Merge remote-tracking branch 'upstream/master' into staging

This commit is contained in:
Tuomas Tynkkynen 2018-08-04 15:17:42 +03:00
commit 008fd5fcf5
132 changed files with 6166 additions and 2582 deletions

View File

@ -8,7 +8,7 @@ build daemon as so-called channels. To get channel information via git, add
[nixpkgs-channels](https://github.com/NixOS/nixpkgs-channels.git) as a remote: [nixpkgs-channels](https://github.com/NixOS/nixpkgs-channels.git) as a remote:
``` ```
% git remote add channels git://github.com/NixOS/nixpkgs-channels.git % git remote add channels https://github.com/NixOS/nixpkgs-channels.git
``` ```
For stability and maximum binary package support, it is recommended to maintain For stability and maximum binary package support, it is recommended to maintain

View File

@ -9,7 +9,7 @@
<para> <para>
Checkout the Nixpkgs source tree: Checkout the Nixpkgs source tree:
<screen> <screen>
$ git clone git://github.com/NixOS/nixpkgs.git $ git clone https://github.com/NixOS/nixpkgs
$ cd nixpkgs</screen> $ cd nixpkgs</screen>
</para> </para>
</listitem> </listitem>

View File

@ -936,6 +936,11 @@
github = "demin-dmitriy"; github = "demin-dmitriy";
name = "Dmitriy Demin"; name = "Dmitriy Demin";
}; };
demize = {
email = "johannes@kyriasis.com";
github = "kyrias";
name = "Johannes Löthberg";
};
demyanrogozhin = { demyanrogozhin = {
email = "demyan.rogozhin@gmail.com"; email = "demyan.rogozhin@gmail.com";
github = "demyanrogozhin"; github = "demyanrogozhin";
@ -2174,6 +2179,11 @@
github = "nathanielbaxter"; github = "nathanielbaxter";
name = "Nathaniel Baxter"; name = "Nathaniel Baxter";
}; };
lightdiscord = {
email = "arnaud@lightdiscord.me";
github = "lightdiscord";
name = "Arnaud Pascal";
};
lihop = { lihop = {
email = "nixos@leroy.geek.nz"; email = "nixos@leroy.geek.nz";
github = "lihop"; github = "lihop";
@ -3683,6 +3693,11 @@
github = "s-na"; github = "s-na";
name = "S. Nordin Abouzahra"; name = "S. Nordin Abouzahra";
}; };
snaar = {
email = "snaar@snaar.net";
github = "snaar";
name = "Serguei Narojnyi";
};
snyh = { snyh = {
email = "snyh@snyh.org"; email = "snyh@snyh.org";
github = "snyh"; github = "snyh";

View File

@ -14,7 +14,7 @@
xlink:href="http://nixos.org/nixpkgs/manual">Nixpkgs xlink:href="http://nixos.org/nixpkgs/manual">Nixpkgs
manual</link>. In short, you clone Nixpkgs: manual</link>. In short, you clone Nixpkgs:
<screen> <screen>
$ git clone git://github.com/NixOS/nixpkgs.git $ git clone https://github.com/NixOS/nixpkgs
$ cd nixpkgs $ cd nixpkgs
</screen> </screen>
Then you write and test the package as described in the Nixpkgs manual. Then you write and test the package as described in the Nixpkgs manual.

View File

@ -26,6 +26,7 @@
<xref linkend="opt-services.xserver.desktopManager.plasma5.enable"/> = true; <xref linkend="opt-services.xserver.desktopManager.plasma5.enable"/> = true;
<xref linkend="opt-services.xserver.desktopManager.xfce.enable"/> = true; <xref linkend="opt-services.xserver.desktopManager.xfce.enable"/> = true;
<xref linkend="opt-services.xserver.desktopManager.gnome3.enable"/> = true; <xref linkend="opt-services.xserver.desktopManager.gnome3.enable"/> = true;
<xref linkend="opt-services.xserver.desktopManager.mate.enable"/> = true;
<xref linkend="opt-services.xserver.windowManager.xmonad.enable"/> = true; <xref linkend="opt-services.xserver.windowManager.xmonad.enable"/> = true;
<xref linkend="opt-services.xserver.windowManager.twm.enable"/> = true; <xref linkend="opt-services.xserver.windowManager.twm.enable"/> = true;
<xref linkend="opt-services.xserver.windowManager.icewm.enable"/> = true; <xref linkend="opt-services.xserver.windowManager.icewm.enable"/> = true;

View File

@ -11,9 +11,9 @@
modify NixOS, however, you should check out the latest sources from Git. This modify NixOS, however, you should check out the latest sources from Git. This
is as follows: is as follows:
<screen> <screen>
$ git clone git://github.com/NixOS/nixpkgs.git $ git clone https://github.com/NixOS/nixpkgs
$ cd nixpkgs $ cd nixpkgs
$ git remote add channels git://github.com/NixOS/nixpkgs-channels.git $ git remote add channels https://github.com/NixOS/nixpkgs-channels
$ git remote update channels $ git remote update channels
</screen> </screen>
This will check out the latest Nixpkgs sources to This will check out the latest Nixpkgs sources to

View File

@ -81,6 +81,22 @@ $ nix-instantiate -E '(import &lt;nixpkgsunstable&gt; {}).gitFull'
routing tables for instance. routing tables for instance.
</para> </para>
</listitem> </listitem>
<listitem>
<para>
<varname>services.strongswan-swanctl</varname>
is a modern replacement for <varname>services.strongswan</varname>.
You can use either one of them to setup IPsec VPNs but not both at the same time.
</para>
<para>
<varname>services.strongswan-swanctl</varname> uses the
<link xlink:href="https://wiki.strongswan.org/projects/strongswan/wiki/swanctl">swanctl</link>
command which uses the modern
<link xlink:href="https://github.com/strongswan/strongswan/blob/master/src/libcharon/plugins/vici/README.md">vici</link>
<emphasis>Versatile IKE Configuration Interface</emphasis>.
The deprecated <literal>ipsec</literal> command used in <varname>services.strongswan</varname> is using the legacy
<link xlink:href="https://github.com/strongswan/strongswan/blob/master/README_LEGACY.md">stroke configuration interface</link>.
</para>
</listitem>
</itemizedlist> </itemizedlist>
</section> </section>

View File

@ -323,6 +323,7 @@
mapred = 296; mapred = 296;
hadoop = 297; hadoop = 297;
hydron = 298; hydron = 298;
cfssl = 299;
# When adding a uid, make sure it doesn't match an existing gid. And don't use uids above 399! # When adding a uid, make sure it doesn't match an existing gid. And don't use uids above 399!
@ -606,6 +607,7 @@
mapred = 296; mapred = 296;
hadoop = 297; hadoop = 297;
hydron = 298; hydron = 298;
cfssl = 299;
# When adding a gid, make sure it doesn't match an existing # When adding a gid, make sure it doesn't match an existing
# uid. Users and groups with the same name should have equal # uid. Users and groups with the same name should have equal

View File

@ -622,6 +622,7 @@
./services/search/hound.nix ./services/search/hound.nix
./services/search/kibana.nix ./services/search/kibana.nix
./services/search/solr.nix ./services/search/solr.nix
./services/security/cfssl.nix
./services/security/clamav.nix ./services/security/clamav.nix
./services/security/fail2ban.nix ./services/security/fail2ban.nix
./services/security/fprintd.nix ./services/security/fprintd.nix

View File

@ -55,11 +55,11 @@ in {
}; };
musicDirectory = mkOption { musicDirectory = mkOption {
type = types.path; type = with types; either path (strMatching "(http|https|nfs|smb)://.+");
default = "${cfg.dataDir}/music"; default = "${cfg.dataDir}/music";
defaultText = ''''${dataDir}/music''; defaultText = ''''${dataDir}/music'';
description = '' description = ''
The directory where mpd reads music from. The directory or NFS/SMB network share where mpd reads music from.
''; '';
}; };

View File

@ -73,7 +73,7 @@ let
description = '' description = ''
Specify a filter for iptables to use when Specify a filter for iptables to use when
<option>services.prometheus.exporters.${name}.openFirewall</option> <option>services.prometheus.exporters.${name}.openFirewall</option>
is true. It is used as `ip46tables -I INPUT <option>firewallFilter</option> -j ACCEPT`. is true. It is used as `ip46tables -I nixos-fw <option>firewallFilter</option> -j nixos-fw-accept`.
''; '';
}; };
user = mkOption { user = mkOption {
@ -116,9 +116,10 @@ let
mkExporterConf = { name, conf, serviceOpts }: mkExporterConf = { name, conf, serviceOpts }:
mkIf conf.enable { mkIf conf.enable {
networking.firewall.extraCommands = mkIf conf.openFirewall '' networking.firewall.extraCommands = mkIf conf.openFirewall (concatStrings [
ip46tables -I INPUT ${conf.firewallFilter} -j ACCEPT "ip46tables -I nixos-fw ${conf.firewallFilter} "
''; "-m comment --comment ${name}-exporter -j nixos-fw-accept"
]);
systemd.services."prometheus-${name}-exporter" = mkMerge ([{ systemd.services."prometheus-${name}-exporter" = mkMerge ([{
wantedBy = [ "multi-user.target" ]; wantedBy = [ "multi-user.target" ];
after = [ "network.target" ]; after = [ "network.target" ];

View File

@ -0,0 +1,209 @@
{ config, lib, pkgs, ... }:
with lib;
let
cfg = config.services.cfssl;
in {
options.services.cfssl = {
enable = mkEnableOption "the CFSSL CA api-server";
dataDir = mkOption {
default = "/var/lib/cfssl";
type = types.path;
description = "Cfssl work directory.";
};
address = mkOption {
default = "127.0.0.1";
type = types.str;
description = "Address to bind.";
};
port = mkOption {
default = 8888;
type = types.ints.u16;
description = "Port to bind.";
};
ca = mkOption {
defaultText = "\${cfg.dataDir}/ca.pem";
type = types.str;
description = "CA used to sign the new certificate -- accepts '[file:]fname' or 'env:varname'.";
};
caKey = mkOption {
defaultText = "file:\${cfg.dataDir}/ca-key.pem";
type = types.str;
description = "CA private key -- accepts '[file:]fname' or 'env:varname'.";
};
caBundle = mkOption {
default = null;
type = types.nullOr types.path;
description = "Path to root certificate store.";
};
intBundle = mkOption {
default = null;
type = types.nullOr types.path;
description = "Path to intermediate certificate store.";
};
intDir = mkOption {
default = null;
type = types.nullOr types.path;
description = "Intermediates directory.";
};
metadata = mkOption {
default = null;
type = types.nullOr types.path;
description = ''
Metadata file for root certificate presence.
The content of the file is a json dictionary (k,v): each key k is
a SHA-1 digest of a root certificate while value v is a list of key
store filenames.
'';
};
remote = mkOption {
default = null;
type = types.nullOr types.str;
description = "Remote CFSSL server.";
};
configFile = mkOption {
default = null;
type = types.nullOr types.str;
description = "Path to configuration file. Do not put this in nix-store as it might contain secrets.";
};
responder = mkOption {
default = null;
type = types.nullOr types.path;
description = "Certificate for OCSP responder.";
};
responderKey = mkOption {
default = null;
type = types.nullOr types.str;
description = "Private key for OCSP responder certificate. Do not put this in nix-store.";
};
tlsKey = mkOption {
default = null;
type = types.nullOr types.str;
description = "Other endpoint's CA private key. Do not put this in nix-store.";
};
tlsCert = mkOption {
default = null;
type = types.nullOr types.path;
description = "Other endpoint's CA to set up TLS protocol.";
};
mutualTlsCa = mkOption {
default = null;
type = types.nullOr types.path;
description = "Mutual TLS - require clients be signed by this CA.";
};
mutualTlsCn = mkOption {
default = null;
type = types.nullOr types.str;
description = "Mutual TLS - regex for whitelist of allowed client CNs.";
};
tlsRemoteCa = mkOption {
default = null;
type = types.nullOr types.path;
description = "CAs to trust for remote TLS requests.";
};
mutualTlsClientCert = mkOption {
default = null;
type = types.nullOr types.path;
description = "Mutual TLS - client certificate to call remote instance requiring client certs.";
};
mutualTlsClientKey = mkOption {
default = null;
type = types.nullOr types.path;
description = "Mutual TLS - client key to call remote instance requiring client certs. Do not put this in nix-store.";
};
dbConfig = mkOption {
default = null;
type = types.nullOr types.path;
description = "Certificate db configuration file. Path must be writeable.";
};
logLevel = mkOption {
default = 1;
type = types.enum [ 0 1 2 3 4 5 ];
description = "Log level (0 = DEBUG, 5 = FATAL).";
};
};
config = {
users.extraGroups.cfssl = {
gid = config.ids.gids.cfssl;
};
users.extraUsers.cfssl = {
description = "cfssl user";
createHome = true;
home = cfg.dataDir;
group = "cfssl";
uid = config.ids.uids.cfssl;
};
systemd.services.cfssl = mkIf cfg.enable {
description = "CFSSL CA API server";
wantedBy = [ "multi-user.target" ];
after = [ "network.target" ];
serviceConfig = {
WorkingDirectory = cfg.dataDir;
StateDirectory = cfg.dataDir;
StateDirectoryMode = 700;
Restart = "always";
User = "cfssl";
ExecStart = with cfg; let
opt = n: v: optionalString (v != null) ''-${n}="${v}"'';
in
lib.concatStringsSep " \\\n" [
"${pkgs.cfssl}/bin/cfssl serve"
(opt "address" address)
(opt "port" (toString port))
(opt "ca" ca)
(opt "ca-key" caKey)
(opt "ca-bundle" caBundle)
(opt "int-bundle" intBundle)
(opt "int-dir" intDir)
(opt "metadata" metadata)
(opt "remote" remote)
(opt "config" configFile)
(opt "responder" responder)
(opt "responder-key" responderKey)
(opt "tls-key" tlsKey)
(opt "tls-cert" tlsCert)
(opt "mutual-tls-ca" mutualTlsCa)
(opt "mutual-tls-cn" mutualTlsCn)
(opt "mutual-tls-client-key" mutualTlsClientKey)
(opt "mutual-tls-client-cert" mutualTlsClientCert)
(opt "tls-remote-ca" tlsRemoteCa)
(opt "db-config" dbConfig)
(opt "loglevel" (toString logLevel))
];
};
};
services.cfssl = {
ca = mkDefault "${cfg.dataDir}/ca.pem";
caKey = mkDefault "${cfg.dataDir}/ca-key.pem";
};
};
}

View File

@ -1,6 +1,8 @@
{ config, lib, pkgs, ... }: { config, lib, pkgs, ... }:
let cfg = config.services.hydron; let
cfg = config.services.hydron;
postgres = config.services.postgresql;
in with lib; { in with lib; {
options.services.hydron = { options.services.hydron = {
enable = mkEnableOption "hydron"; enable = mkEnableOption "hydron";
@ -25,6 +27,38 @@ in with lib; {
''; '';
}; };
password = mkOption {
type = types.str;
default = "hydron";
example = "dumbpass";
description = "Password for the hydron database.";
};
passwordFile = mkOption {
type = types.path;
default = "/run/keys/hydron-password-file";
example = "/home/okina/hydron/keys/pass";
description = "Password file for the hydron database.";
};
postgresArgs = mkOption {
type = types.str;
description = "Postgresql connection arguments.";
example = ''
{
"driver": "postgres",
"connection": "user=hydron password=dumbpass dbname=hydron sslmode=disable"
}
'';
};
postgresArgsFile = mkOption {
type = types.path;
default = "/run/keys/hydron-postgres-args";
example = "/home/okina/hydron/keys/postgres";
description = "Postgresql connection arguments file.";
};
listenAddress = mkOption { listenAddress = mkOption {
type = types.nullOr types.str; type = types.nullOr types.str;
default = null; default = null;
@ -47,16 +81,36 @@ in with lib; {
}; };
config = mkIf cfg.enable { config = mkIf cfg.enable {
security.sudo.enable = cfg.enable;
services.postgresql.enable = cfg.enable;
services.hydron.passwordFile = mkDefault (pkgs.writeText "hydron-password-file" cfg.password);
services.hydron.postgresArgsFile = mkDefault (pkgs.writeText "hydron-postgres-args" cfg.postgresArgs);
services.hydron.postgresArgs = mkDefault ''
{
"driver": "postgres",
"connection": "user=hydron password=${cfg.password} dbname=hydron sslmode=disable"
}
'';
systemd.services.hydron = { systemd.services.hydron = {
description = "hydron"; description = "hydron";
after = [ "network.target" ]; after = [ "network.target" "postgresql.service" ];
wantedBy = [ "multi-user.target" ]; wantedBy = [ "multi-user.target" ];
preStart = '' preStart = ''
# Ensure folder exists and permissions are correct # Ensure folder exists or create it and permissions are correct
mkdir -p ${escapeShellArg cfg.dataDir}/images mkdir -p ${escapeShellArg cfg.dataDir}/{.hydron,images}
ln -sf ${escapeShellArg cfg.postgresArgsFile} ${escapeShellArg cfg.dataDir}/.hydron/db_conf.json
chmod 750 ${escapeShellArg cfg.dataDir} chmod 750 ${escapeShellArg cfg.dataDir}
chown -R hydron:hydron ${escapeShellArg cfg.dataDir} chown -R hydron:hydron ${escapeShellArg cfg.dataDir}
# Ensure the database is correct or create it
${pkgs.sudo}/bin/sudo -u ${postgres.superUser} ${postgres.package}/bin/createuser \
-SDR hydron || true
${pkgs.sudo}/bin/sudo -u ${postgres.superUser} ${postgres.package}/bin/createdb \
-T template0 -E UTF8 -O hydron hydron || true
${pkgs.sudo}/bin/sudo -u hydron ${postgres.package}/bin/psql \
-c "ALTER ROLE hydron WITH PASSWORD '$(cat ${escapeShellArg cfg.passwordFile})';" || true
''; '';
serviceConfig = { serviceConfig = {
@ -101,5 +155,9 @@ in with lib; {
}; };
}; };
imports = [
(mkRenamedOptionModule [ "services" "hydron" "baseDir" ] [ "services" "hydron" "dataDir" ])
];
meta.maintainers = with maintainers; [ chiiruno ]; meta.maintainers = with maintainers; [ chiiruno ];
} }

View File

@ -1,65 +1,71 @@
{ config, lib, pkgs, ... }: { config, lib, pkgs, ... }:
with lib;
let let
cfg = config.services.meguca; cfg = config.services.meguca;
postgres = config.services.postgresql; postgres = config.services.postgresql;
in in with lib; {
{
options.services.meguca = { options.services.meguca = {
enable = mkEnableOption "meguca"; enable = mkEnableOption "meguca";
baseDir = mkOption { dataDir = mkOption {
type = types.path; type = types.path;
default = "/run/meguca"; default = "/var/lib/meguca";
example = "/home/okina/meguca";
description = "Location where meguca stores it's database and links."; description = "Location where meguca stores it's database and links.";
}; };
password = mkOption { password = mkOption {
type = types.str; type = types.str;
default = "meguca"; default = "meguca";
example = "dumbpass";
description = "Password for the meguca database."; description = "Password for the meguca database.";
}; };
passwordFile = mkOption { passwordFile = mkOption {
type = types.path; type = types.path;
default = "/run/keys/meguca-password-file"; default = "/run/keys/meguca-password-file";
example = "/home/okina/meguca/keys/pass";
description = "Password file for the meguca database."; description = "Password file for the meguca database.";
}; };
reverseProxy = mkOption { reverseProxy = mkOption {
type = types.nullOr types.str; type = types.nullOr types.str;
default = null; default = null;
example = "192.168.1.5";
description = "Reverse proxy IP."; description = "Reverse proxy IP.";
}; };
sslCertificate = mkOption { sslCertificate = mkOption {
type = types.nullOr types.str; type = types.nullOr types.str;
default = null; default = null;
example = "/home/okina/meguca/ssl.cert";
description = "Path to the SSL certificate."; description = "Path to the SSL certificate.";
}; };
listenAddress = mkOption { listenAddress = mkOption {
type = types.nullOr types.str; type = types.nullOr types.str;
default = null; default = null;
example = "127.0.0.1:8000";
description = "Listen on a specific IP address and port."; description = "Listen on a specific IP address and port.";
}; };
cacheSize = mkOption { cacheSize = mkOption {
type = types.nullOr types.int; type = types.nullOr types.int;
default = null; default = null;
example = 256;
description = "Cache size in MB."; description = "Cache size in MB.";
}; };
postgresArgs = mkOption { postgresArgs = mkOption {
type = types.str; type = types.str;
default = "user=meguca password=" + cfg.password + " dbname=meguca sslmode=disable"; example = "user=meguca password=dumbpass dbname=meguca sslmode=disable";
description = "Postgresql connection arguments."; description = "Postgresql connection arguments.";
}; };
postgresArgsFile = mkOption { postgresArgsFile = mkOption {
type = types.path; type = types.path;
default = "/run/keys/meguca-postgres-args"; default = "/run/keys/meguca-postgres-args";
example = "/home/okina/meguca/keys/postgres";
description = "Postgresql connection arguments file."; description = "Postgresql connection arguments file.";
}; };
@ -83,18 +89,11 @@ in
}; };
config = mkIf cfg.enable { config = mkIf cfg.enable {
security.sudo.enable = cfg.enable == true; security.sudo.enable = cfg.enable;
services.postgresql.enable = cfg.enable == true; services.postgresql.enable = cfg.enable;
services.meguca.passwordFile = mkDefault (pkgs.writeText "meguca-password-file" cfg.password);
services.meguca.passwordFile = mkDefault (toString (pkgs.writeTextFile { services.meguca.postgresArgsFile = mkDefault (pkgs.writeText "meguca-postgres-args" cfg.postgresArgs);
name = "meguca-password-file"; services.meguca.postgresArgs = mkDefault "user=meguca password=${cfg.password} dbname=meguca sslmode=disable";
text = cfg.password;
}));
services.meguca.postgresArgsFile = mkDefault (toString (pkgs.writeTextFile {
name = "meguca-postgres-args";
text = cfg.postgresArgs;
}));
systemd.services.meguca = { systemd.services.meguca = {
description = "meguca"; description = "meguca";
@ -102,10 +101,11 @@ in
wantedBy = [ "multi-user.target" ]; wantedBy = [ "multi-user.target" ];
preStart = '' preStart = ''
# Ensure folder exists and links are correct or create them # Ensure folder exists or create it and links and permissions are correct
mkdir -p ${cfg.baseDir} mkdir -p ${escapeShellArg cfg.dataDir}
chmod 750 ${cfg.baseDir} ln -sf ${pkgs.meguca}/share/meguca/www ${escapeShellArg cfg.dataDir}
ln -sf ${pkgs.meguca}/share/meguca/www ${cfg.baseDir} chmod 750 ${escapeShellArg cfg.dataDir}
chown -R meguca:meguca ${escapeShellArg cfg.dataDir}
# Ensure the database is correct or create it # Ensure the database is correct or create it
${pkgs.sudo}/bin/sudo -u ${postgres.superUser} ${postgres.package}/bin/createuser \ ${pkgs.sudo}/bin/sudo -u ${postgres.superUser} ${postgres.package}/bin/createuser \
@ -113,47 +113,46 @@ in
${pkgs.sudo}/bin/sudo -u ${postgres.superUser} ${postgres.package}/bin/createdb \ ${pkgs.sudo}/bin/sudo -u ${postgres.superUser} ${postgres.package}/bin/createdb \
-T template0 -E UTF8 -O meguca meguca || true -T template0 -E UTF8 -O meguca meguca || true
${pkgs.sudo}/bin/sudo -u meguca ${postgres.package}/bin/psql \ ${pkgs.sudo}/bin/sudo -u meguca ${postgres.package}/bin/psql \
-c "ALTER ROLE meguca WITH PASSWORD '$(cat ${cfg.passwordFile})';" || true -c "ALTER ROLE meguca WITH PASSWORD '$(cat ${escapeShellArg cfg.passwordFile})';" || true
''; '';
script = '' script = ''
cd ${cfg.baseDir} cd ${escapeShellArg cfg.dataDir}
${pkgs.meguca}/bin/meguca -d "$(cat ${cfg.postgresArgsFile})"\ ${pkgs.meguca}/bin/meguca -d "$(cat ${escapeShellArg cfg.postgresArgsFile})"''
${optionalString (cfg.reverseProxy != null) " -R ${cfg.reverseProxy}"}\ + optionalString (cfg.reverseProxy != null) " -R ${cfg.reverseProxy}"
${optionalString (cfg.sslCertificate != null) " -S ${cfg.sslCertificate}"}\ + optionalString (cfg.sslCertificate != null) " -S ${cfg.sslCertificate}"
${optionalString (cfg.listenAddress != null) " -a ${cfg.listenAddress}"}\ + optionalString (cfg.listenAddress != null) " -a ${cfg.listenAddress}"
${optionalString (cfg.cacheSize != null) " -c ${toString cfg.cacheSize}"}\ + optionalString (cfg.cacheSize != null) " -c ${toString cfg.cacheSize}"
${optionalString (cfg.compressTraffic) " -g"}\ + optionalString (cfg.compressTraffic) " -g"
${optionalString (cfg.assumeReverseProxy) " -r"}\ + optionalString (cfg.assumeReverseProxy) " -r"
${optionalString (cfg.httpsOnly) " -s"} start + optionalString (cfg.httpsOnly) " -s" + " start";
'';
serviceConfig = { serviceConfig = {
PermissionsStartOnly = true; PermissionsStartOnly = true;
Type = "forking"; Type = "forking";
User = "meguca"; User = "meguca";
Group = "meguca"; Group = "meguca";
RuntimeDirectory = "meguca";
ExecStop = "${pkgs.meguca}/bin/meguca stop"; ExecStop = "${pkgs.meguca}/bin/meguca stop";
}; };
}; };
users = { users = {
groups.meguca.gid = config.ids.gids.meguca;
users.meguca = { users.meguca = {
description = "meguca server service user"; description = "meguca server service user";
home = cfg.baseDir; home = cfg.dataDir;
createHome = true; createHome = true;
group = "meguca"; group = "meguca";
uid = config.ids.uids.meguca; uid = config.ids.uids.meguca;
}; };
groups.meguca = {
gid = config.ids.gids.meguca;
members = [ "meguca" ];
};
}; };
}; };
imports = [
(mkRenamedOptionModule [ "services" "meguca" "baseDir" ] [ "services" "meguca" "dataDir" ])
];
meta.maintainers = with maintainers; [ chiiruno ]; meta.maintainers = with maintainers; [ chiiruno ];
} }

View File

@ -108,7 +108,7 @@ in
}; };
webapps = mkOption { webapps = mkOption {
type = types.listOf types.package; type = types.listOf types.path;
default = [ tomcat.webapps ]; default = [ tomcat.webapps ];
defaultText = "[ pkgs.tomcat85.webapps ]"; defaultText = "[ pkgs.tomcat85.webapps ]";
description = "List containing WAR files or directories with WAR files which are web applications to be deployed on Tomcat"; description = "List containing WAR files or directories with WAR files which are web applications to be deployed on Tomcat";
@ -118,8 +118,15 @@ in
type = types.listOf (types.submodule { type = types.listOf (types.submodule {
options = { options = {
name = mkOption { name = mkOption {
type = types.listOf types.str; type = types.str;
description = "name of the virtualhost"; description = "name of the virtualhost";
};
webapps = mkOption {
type = types.listOf types.path;
description = ''
List containing web application WAR files and/or directories containing
web applications and configuration files for the virtual host.
'';
default = []; default = [];
}; };
}; };

View File

@ -96,13 +96,13 @@ in
else if any (w: w.name == defaultDM) cfg.session.list then else if any (w: w.name == defaultDM) cfg.session.list then
defaultDM defaultDM
else else
throw '' builtins.trace ''
Default desktop manager (${defaultDM}) not found. Default desktop manager (${defaultDM}) not found at evaluation time.
Probably you want to change These are the known valid session names:
services.xserver.desktopManager.default = "${defaultDM}";
to one of
${concatMapStringsSep "\n " (w: "services.xserver.desktopManager.default = \"${w.name}\";") cfg.session.list} ${concatMapStringsSep "\n " (w: "services.xserver.desktopManager.default = \"${w.name}\";") cfg.session.list}
''; It's also possible the default can be found in one of these packages:
${concatMapStringsSep "\n " (p: p.name) config.services.xserver.displayManager.extraSessionFilePackages}
'' defaultDM;
}; };
}; };

View File

@ -57,8 +57,12 @@ in {
sessionPath = mkOption { sessionPath = mkOption {
default = []; default = [];
example = literalExample "[ pkgs.gnome3.gpaste ]"; example = literalExample "[ pkgs.gnome3.gpaste ]";
description = "Additional list of packages to be added to the session search path. description = ''
Useful for gnome shell extensions or gsettings-conditionated autostart."; Additional list of packages to be added to the session search path.
Useful for GNOME Shell extensions or GSettings-conditional autostart.
Note that this should be a last resort; patching the package is preferred (see GPaste).
'';
apply = list: list ++ [ pkgs.gnome3.gnome-shell pkgs.gnome3.gnome-shell-extensions ]; apply = list: list ++ [ pkgs.gnome3.gnome-shell pkgs.gnome3.gnome-shell-extensions ];
}; };
@ -126,18 +130,10 @@ in {
fonts.fonts = [ pkgs.dejavu_fonts pkgs.cantarell-fonts ]; fonts.fonts = [ pkgs.dejavu_fonts pkgs.cantarell-fonts ];
services.xserver.desktopManager.session = singleton services.xserver.displayManager.extraSessionFilePackages = [ pkgs.gnome3.gnome-session ];
{ name = "gnome3";
bgSupport = true;
start = ''
# Set GTK_DATA_PREFIX so that GTK+ can find the themes
export GTK_DATA_PREFIX=${config.system.path}
# find theme engines
export GTK_PATH=${config.system.path}/lib/gtk-3.0:${config.system.path}/lib/gtk-2.0
export XDG_MENU_PREFIX=gnome-
services.xserver.displayManager.sessionCommands = ''
if test "$XDG_CURRENT_DESKTOP" = "GNOME"; then
${concatMapStrings (p: '' ${concatMapStrings (p: ''
if [ -d "${p}/share/gsettings-schemas/${p.name}" ]; then if [ -d "${p}/share/gsettings-schemas/${p.name}" ]; then
export XDG_DATA_DIRS=$XDG_DATA_DIRS''${XDG_DATA_DIRS:+:}${p}/share/gsettings-schemas/${p.name} export XDG_DATA_DIRS=$XDG_DATA_DIRS''${XDG_DATA_DIRS:+:}${p}/share/gsettings-schemas/${p.name}
@ -148,34 +144,28 @@ in {
export LD_LIBRARY_PATH=$LD_LIBRARY_PATH''${LD_LIBRARY_PATH:+:}${p}/lib export LD_LIBRARY_PATH=$LD_LIBRARY_PATH''${LD_LIBRARY_PATH:+:}${p}/lib
fi fi
'') cfg.sessionPath} '') cfg.sessionPath}
fi
'';
# Override default mimeapps environment.variables.GNOME_SESSION_DEBUG = optionalString cfg.debug "1";
export XDG_DATA_DIRS=$XDG_DATA_DIRS''${XDG_DATA_DIRS:+:}${mimeAppsList}/share
# Override gsettings-desktop-schema # Override default mimeapps
export NIX_GSETTINGS_OVERRIDES_DIR=${nixos-gsettings-desktop-schemas}/share/gsettings-schemas/nixos-gsettings-overrides/glib-2.0/schemas environment.variables.XDG_DATA_DIRS = [ "${mimeAppsList}/share" ];
# Let nautilus find extensions # Override GSettings schemas
export NAUTILUS_EXTENSION_DIR=${config.system.path}/lib/nautilus/extensions-3.0/ environment.variables.NIX_GSETTINGS_OVERRIDES_DIR = "${nixos-gsettings-desktop-schemas}/share/gsettings-schemas/nixos-gsettings-overrides/glib-2.0/schemas";
# Find the mouse # Let nautilus find extensions
export XCURSOR_PATH=~/.icons:${config.system.path}/share/icons # TODO: Create nautilus-with-extensions package
environment.variables.NAUTILUS_EXTENSION_DIR = "${config.system.path}/lib/nautilus/extensions-3.0";
# Update user dirs as described in http://freedesktop.org/wiki/Software/xdg-user-dirs/
${pkgs.xdg-user-dirs}/bin/xdg-user-dirs-update
${pkgs.gnome3.gnome-session}/bin/gnome-session ${optionalString cfg.debug "--debug"} &
waitPID=$!
'';
};
services.xserver.updateDbusEnvironment = true;
environment.variables.GIO_EXTRA_MODULES = [ "${lib.getLib pkgs.gnome3.dconf}/lib/gio/modules" environment.variables.GIO_EXTRA_MODULES = [ "${lib.getLib pkgs.gnome3.dconf}/lib/gio/modules"
"${pkgs.gnome3.glib-networking.out}/lib/gio/modules" "${pkgs.gnome3.glib-networking.out}/lib/gio/modules"
"${pkgs.gnome3.gvfs}/lib/gio/modules" ]; "${pkgs.gnome3.gvfs}/lib/gio/modules" ];
environment.systemPackages = pkgs.gnome3.corePackages ++ cfg.sessionPath environment.systemPackages = pkgs.gnome3.corePackages ++ cfg.sessionPath
++ (removePackagesByName pkgs.gnome3.optionalPackages config.environment.gnome3.excludePackages); ++ (removePackagesByName pkgs.gnome3.optionalPackages config.environment.gnome3.excludePackages) ++ [
pkgs.xdg-user-dirs # Update user dirs as described in http://freedesktop.org/wiki/Software/xdg-user-dirs/
];
# Use the correct gnome3 packageSet # Use the correct gnome3 packageSet
networking.networkmanager.basePackages = networking.networkmanager.basePackages =

View File

@ -27,55 +27,26 @@ let
Xft.hintstyle: hintslight Xft.hintstyle: hintslight
''; '';
# file provided by services.xserver.displayManager.session.script # file provided by services.xserver.displayManager.session.wrapper
xsession = wm: dm: pkgs.writeScript "xsession" xsessionWrapper = pkgs.writeScript "xsession-wrapper"
'' ''
#! ${pkgs.bash}/bin/bash #! ${pkgs.bash}/bin/bash
# Expected parameters: # Shared environment setup for graphical sessions.
# $1 = <desktop-manager>+<window-manager>
# Actual parameters (FIXME):
# SDDM is calling this script like the following:
# $1 = /nix/store/xxx-xsession (= $0)
# $2 = <desktop-manager>+<window-manager>
# SLiM is using the following parameter:
# $1 = /nix/store/xxx-xsession <desktop-manager>+<window-manager>
# LightDM keeps the double quotes:
# $1 = /nix/store/xxx-xsession "<desktop-manager>+<window-manager>"
# The fake/auto display manager doesn't use any parameters and GDM is
# broken.
# If you want to "debug" this script don't print the parameters to stdout
# or stderr because this script will be executed multiple times and the
# output won't be visible in the log when the script is executed for the
# first time (e.g. append them to a file instead)!
# All of the above cases are handled by the following hack (FIXME).
# Since this line is *very important* for *all display managers* it is
# very important to test changes to the following line with all display
# managers:
if [ "''${1:0:1}" = "/" ]; then eval exec "$1" "$2" ; fi
# Now it should be safe to assume that the script was called with the
# expected parameters.
. /etc/profile . /etc/profile
cd "$HOME" cd "$HOME"
# The first argument of this script is the session type.
sessionType="$1"
if [ "$sessionType" = default ]; then sessionType=""; fi
${optionalString cfg.startDbusSession '' ${optionalString cfg.startDbusSession ''
if test -z "$DBUS_SESSION_BUS_ADDRESS"; then if test -z "$DBUS_SESSION_BUS_ADDRESS"; then
exec ${pkgs.dbus.dbus-launch} --exit-with-session "$0" "$sessionType" exec ${pkgs.dbus.dbus-launch} --exit-with-session "$0" "$@"
fi fi
''} ''}
${optionalString cfg.displayManager.job.logToJournal '' ${optionalString cfg.displayManager.job.logToJournal ''
if [ -z "$_DID_SYSTEMD_CAT" ]; then if [ -z "$_DID_SYSTEMD_CAT" ]; then
export _DID_SYSTEMD_CAT=1 export _DID_SYSTEMD_CAT=1
exec ${config.systemd.package}/bin/systemd-cat -t xsession "$0" "$sessionType" exec ${config.systemd.package}/bin/systemd-cat -t xsession "$0" "$@"
fi fi
''} ''}
@ -90,7 +61,9 @@ let
} }
# Publish access credentials in the root window. # Publish access credentials in the root window.
${config.hardware.pulseaudio.package.out}/bin/pactl load-module module-x11-publish "display=$DISPLAY" if ${config.hardware.pulseaudio.package.out}/bin/pulseaudio --dump-modules | grep module-x11-publish &> /dev/null; then
${config.hardware.pulseaudio.package.out}/bin/pactl load-module module-x11-publish "display=$DISPLAY"
fi
''} ''}
# Tell systemd about our $DISPLAY and $XAUTHORITY. # Tell systemd about our $DISPLAY and $XAUTHORITY.
@ -101,6 +74,7 @@ let
${config.systemd.package}/bin/systemctl --user import-environment DISPLAY XAUTHORITY DBUS_SESSION_BUS_ADDRESS ${config.systemd.package}/bin/systemctl --user import-environment DISPLAY XAUTHORITY DBUS_SESSION_BUS_ADDRESS
# Load X defaults. # Load X defaults.
# FIXME: Check XDG_SESSION_TYPE against x11
${xorg.xrdb}/bin/xrdb -merge ${xresourcesXft} ${xorg.xrdb}/bin/xrdb -merge ${xresourcesXft}
if test -e ~/.Xresources; then if test -e ~/.Xresources; then
${xorg.xrdb}/bin/xrdb -merge ~/.Xresources ${xorg.xrdb}/bin/xrdb -merge ~/.Xresources
@ -132,12 +106,33 @@ let
# Allow the user to setup a custom session type. # Allow the user to setup a custom session type.
if test -x ~/.xsession; then if test -x ~/.xsession; then
exec ~/.xsession exec ~/.xsession
else
if test "$sessionType" = "custom"; then
sessionType="" # fall-thru if there is no ~/.xsession
fi
fi fi
if test "$1"; then
# Run the supplied session command. Remove any double quotes with eval.
eval exec "$@"
else
# Fall back to the default window/desktopManager
exec ${cfg.displayManager.session.script}
fi
'';
# file provided by services.xserver.displayManager.session.script
xsession = wm: dm: pkgs.writeScript "xsession"
''
#! ${pkgs.bash}/bin/bash
# Legacy session script used to construct .desktop files from
# `services.xserver.displayManager.session` entries. Called from
# `sessionWrapper`.
# Expected parameters:
# $1 = <desktop-manager>+<window-manager>
# The first argument of this script is the session type.
sessionType="$1"
if [ "$sessionType" = default ]; then sessionType=""; fi
# The session type is "<desktop-manager>+<window-manager>", so # The session type is "<desktop-manager>+<window-manager>", so
# extract those (see: # extract those (see:
# http://wiki.bash-hackers.org/syntax/pe#substring_removal). # http://wiki.bash-hackers.org/syntax/pe#substring_removal).
@ -186,19 +181,22 @@ let
allowSubstitutes = false; allowSubstitutes = false;
} }
'' ''
mkdir -p "$out" mkdir -p "$out/share/xsessions"
${concatMapStrings (n: '' ${concatMapStrings (n: ''
cat - > "$out/${n}.desktop" << EODESKTOP cat - > "$out/share/xsessions/${n}.desktop" << EODESKTOP
[Desktop Entry] [Desktop Entry]
Version=1.0 Version=1.0
Type=XSession Type=XSession
TryExec=${cfg.displayManager.session.script} TryExec=${cfg.displayManager.session.script}
Exec=${cfg.displayManager.session.script} "${n}" Exec=${cfg.displayManager.session.script} "${n}"
X-GDM-BypassXsession=true
Name=${n} Name=${n}
Comment= Comment=
EODESKTOP EODESKTOP
'') names} '') names}
${concatMapStrings (pkg: ''
${xorg.lndir}/bin/lndir ${pkg}/share/xsessions $out/share/xsessions
'') cfg.displayManager.extraSessionFilePackages}
''; '';
in in
@ -245,6 +243,14 @@ in
''; '';
}; };
extraSessionFilePackages = mkOption {
type = types.listOf types.package;
default = [];
description = ''
A list of packages containing xsession files to be passed to the display manager.
'';
};
session = mkOption { session = mkOption {
default = []; default = [];
example = literalExample example = literalExample
@ -280,6 +286,7 @@ in
(filter (w: d.name != "none" || w.name != "none") wm)); (filter (w: d.name != "none" || w.name != "none") wm));
desktops = mkDesktops names; desktops = mkDesktops names;
script = xsession wm dm; script = xsession wm dm;
wrapper = xsessionWrapper;
}; };
}; };

View File

@ -109,7 +109,7 @@ in
environment = { environment = {
GDM_X_SERVER_EXTRA_ARGS = toString GDM_X_SERVER_EXTRA_ARGS = toString
(filter (arg: arg != "-terminate") cfg.xserverArgs); (filter (arg: arg != "-terminate") cfg.xserverArgs);
GDM_SESSIONS_DIR = "${cfg.session.desktops}"; GDM_SESSIONS_DIR = "${cfg.session.desktops}/share/xsessions";
# Find the mouse # Find the mouse
XCURSOR_PATH = "~/.icons:${pkgs.gnome3.adwaita-icon-theme}/share/icons"; XCURSOR_PATH = "~/.icons:${pkgs.gnome3.adwaita-icon-theme}/share/icons";
}; };
@ -173,6 +173,8 @@ in
${optionalString cfg.gdm.debug "Enable=true"} ${optionalString cfg.gdm.debug "Enable=true"}
''; '';
environment.etc."gdm/Xsession".source = config.services.xserver.displayManager.session.wrapper;
# GDM LFS PAM modules, adapted somehow to NixOS # GDM LFS PAM modules, adapted somehow to NixOS
security.pam.services = { security.pam.services = {
gdm-launch-environment.text = '' gdm-launch-environment.text = ''

View File

@ -45,11 +45,11 @@ let
greeter-user = ${config.users.users.lightdm.name} greeter-user = ${config.users.users.lightdm.name}
greeters-directory = ${cfg.greeter.package} greeters-directory = ${cfg.greeter.package}
''} ''}
sessions-directory = ${dmcfg.session.desktops} sessions-directory = ${dmcfg.session.desktops}/share/xsessions
[Seat:*] [Seat:*]
xserver-command = ${xserverWrapper} xserver-command = ${xserverWrapper}
session-wrapper = ${dmcfg.session.script} session-wrapper = ${dmcfg.session.wrapper}
${optionalString cfg.greeter.enable '' ${optionalString cfg.greeter.enable ''
greeter-session = ${cfg.greeter.name} greeter-session = ${cfg.greeter.name}
''} ''}
@ -176,21 +176,13 @@ in
LightDM auto-login requires services.xserver.displayManager.lightdm.autoLogin.user to be set LightDM auto-login requires services.xserver.displayManager.lightdm.autoLogin.user to be set
''; '';
} }
{ assertion = cfg.autoLogin.enable -> elem defaultSessionName dmcfg.session.names; { assertion = cfg.autoLogin.enable -> dmDefault != "none" || wmDefault != "none";
message = '' message = ''
LightDM auto-login requires that services.xserver.desktopManager.default and LightDM auto-login requires that services.xserver.desktopManager.default and
services.xserver.windowMananger.default are set to valid values. The current services.xserver.windowMananger.default are set to valid values. The current
default session: ${defaultSessionName} is not valid. default session: ${defaultSessionName} is not valid.
''; '';
} }
{ assertion = hasDefaultUserSession -> elem defaultSessionName dmcfg.session.names;
message = ''
services.xserver.desktopManager.default and
services.xserver.windowMananger.default are not set to valid
values. The current default session: ${defaultSessionName}
is not valid.
'';
}
{ assertion = !cfg.greeter.enable -> (cfg.autoLogin.enable && cfg.autoLogin.timeout == 0); { assertion = !cfg.greeter.enable -> (cfg.autoLogin.enable && cfg.autoLogin.timeout == 0);
message = '' message = ''
LightDM can only run without greeter if automatic login is enabled and the timeout for it LightDM can only run without greeter if automatic login is enabled and the timeout for it

View File

@ -49,8 +49,8 @@ let
MinimumVT=${toString (if xcfg.tty != null then xcfg.tty else 7)} MinimumVT=${toString (if xcfg.tty != null then xcfg.tty else 7)}
ServerPath=${xserverWrapper} ServerPath=${xserverWrapper}
XephyrPath=${pkgs.xorg.xorgserver.out}/bin/Xephyr XephyrPath=${pkgs.xorg.xorgserver.out}/bin/Xephyr
SessionCommand=${dmcfg.session.script} SessionCommand=${dmcfg.session.wrapper}
SessionDir=${dmcfg.session.desktops} SessionDir=${dmcfg.session.desktops}/share/xsessions
XauthPath=${pkgs.xorg.xauth}/bin/xauth XauthPath=${pkgs.xorg.xauth}/bin/xauth
DisplayCommand=${Xsetup} DisplayCommand=${Xsetup}
DisplayStopCommand=${Xstop} DisplayStopCommand=${Xstop}

View File

@ -13,8 +13,8 @@ let
xauth_path ${dmcfg.xauthBin} xauth_path ${dmcfg.xauthBin}
default_xserver ${dmcfg.xserverBin} default_xserver ${dmcfg.xserverBin}
xserver_arguments ${toString dmcfg.xserverArgs} xserver_arguments ${toString dmcfg.xserverArgs}
sessiondir ${dmcfg.session.desktops} sessiondir ${dmcfg.session.desktops}/share/xsessions
login_cmd exec ${pkgs.runtimeShell} ${dmcfg.session.script} "%session" login_cmd exec ${pkgs.runtimeShell} ${dmcfg.session.wrapper} "%session"
halt_cmd ${config.systemd.package}/sbin/shutdown -h now halt_cmd ${config.systemd.package}/sbin/shutdown -h now
reboot_cmd ${config.systemd.package}/sbin/shutdown -r now reboot_cmd ${config.systemd.package}/sbin/shutdown -r now
logfile /dev/stderr logfile /dev/stderr

View File

@ -256,6 +256,7 @@ in rec {
tests.buildbot = callTest tests/buildbot.nix {}; tests.buildbot = callTest tests/buildbot.nix {};
tests.cadvisor = callTestOnMatchingSystems ["x86_64-linux"] tests/cadvisor.nix {}; tests.cadvisor = callTestOnMatchingSystems ["x86_64-linux"] tests/cadvisor.nix {};
tests.ceph = callTestOnMatchingSystems ["x86_64-linux"] tests/ceph.nix {}; tests.ceph = callTestOnMatchingSystems ["x86_64-linux"] tests/ceph.nix {};
tests.cfssl = callTestOnMatchingSystems ["x86_64-linux"] tests/cfssl.nix {};
tests.chromium = (callSubTestsOnMatchingSystems ["x86_64-linux"] tests/chromium.nix {}).stable or {}; tests.chromium = (callSubTestsOnMatchingSystems ["x86_64-linux"] tests/chromium.nix {}).stable or {};
tests.cjdns = callTest tests/cjdns.nix {}; tests.cjdns = callTest tests/cjdns.nix {};
tests.cloud-init = callTest tests/cloud-init.nix {}; tests.cloud-init = callTest tests/cloud-init.nix {};

67
nixos/tests/cfssl.nix Normal file
View File

@ -0,0 +1,67 @@
import ./make-test.nix ({ pkgs, ...} : {
name = "cfssl";
machine = { config, lib, pkgs, ... }:
{
networking.firewall.allowedTCPPorts = [ config.services.cfssl.port ];
services.cfssl.enable = true;
systemd.services.cfssl.after = [ "cfssl-init.service" ];
systemd.services.cfssl-init = {
description = "Initialize the cfssl CA";
wantedBy = [ "multi-user.target" ];
serviceConfig = {
User = "cfssl";
Type = "oneshot";
WorkingDirectory = config.services.cfssl.dataDir;
};
script = with pkgs; ''
${cfssl}/bin/cfssl genkey -initca ${pkgs.writeText "ca.json" (builtins.toJSON {
hosts = [ "ca.example.com" ];
key = {
algo = "rsa"; size = 4096; };
names = [
{
C = "US";
L = "San Francisco";
O = "Internet Widgets, LLC";
OU = "Certificate Authority";
ST = "California";
}
];
})} | ${cfssl}/bin/cfssljson -bare ca
'';
};
};
testScript =
let
cfsslrequest = with pkgs; writeScript "cfsslrequest" ''
curl -X POST -H "Content-Type: application/json" -d @${csr} \
http://localhost:8888/api/v1/cfssl/newkey | ${cfssl}/bin/cfssljson /tmp/certificate
'';
csr = pkgs.writeText "csr.json" (builtins.toJSON {
CN = "www.example.com";
hosts = [ "example.com" "www.example.com" ];
key = {
algo = "rsa";
size = 2048;
};
names = [
{
C = "US";
L = "San Francisco";
O = "Example Company, LLC";
OU = "Operations";
ST = "California";
}
];
});
in
''
$machine->waitForUnit('cfssl.service');
$machine->waitUntilSucceeds('${cfsslrequest}');
$machine->succeed('ls /tmp/certificate-key.pem');
'';
})

View File

@ -15,6 +15,7 @@ import ./make-test.nix ({ pkgs, ...} : {
services.xserver.displayManager.lightdm.autoLogin.enable = true; services.xserver.displayManager.lightdm.autoLogin.enable = true;
services.xserver.displayManager.lightdm.autoLogin.user = "alice"; services.xserver.displayManager.lightdm.autoLogin.user = "alice";
services.xserver.desktopManager.gnome3.enable = true; services.xserver.desktopManager.gnome3.enable = true;
services.xserver.desktopManager.default = "gnome";
virtualisation.memorySize = 1024; virtualisation.memorySize = 1024;
}; };

View File

@ -86,6 +86,7 @@ rec {
}; };
parity = callPackage ./parity { }; parity = callPackage ./parity { };
parity-beta = callPackage ./parity/beta.nix { };
parity-ui = callPackage ./parity-ui { }; parity-ui = callPackage ./parity-ui { };
particl-core = callPackage ./particl/particl-core.nix { boost = boost165; miniupnpc = miniupnpc_2; }; particl-core = callPackage ./particl/particl-core.nix { boost = boost165; miniupnpc = miniupnpc_2; };

View File

@ -0,0 +1,7 @@
let
version = "2.0.1";
sha256 = "0rfq0izpswfwbyvr5kb6zjyf6sd7l1706c0sp7ccy6ykdfb4v6zs";
cargoSha256 = "1ij17bfwvikqi5aj71j1nwf3jhkf3y9a0kwydajviwal47p9grl9";
patches = [ ./patches/vendored-sources-2.0.patch ];
in
import ./parity.nix { inherit version sha256 cargoSha256 patches; }

View File

@ -1,7 +1,7 @@
let let
version = "1.10.9"; version = "1.11.8";
sha256 = "1irfksx887vvvdf97q26qacn22kmyj8fgb3ghh9wv5qnzrn3564g"; sha256 = "0qk5vl8ql3pr9pz5iz7whahwqi1fcbsf8kphn6z4grgc87id7b19";
cargoSha256 = "0rzhabyhprmcg0cdmibbb8zgqf6z4izsdq8m060mppkkv675x0lf"; cargoSha256 = "0p2idd36cyzp2ax81k533bdma4hz0ws2981qj2s7jnhvmj4941l8";
patches = [ ./patches/vendored-sources-1.10.patch ]; patches = [ ./patches/vendored-sources-1.11.patch ];
in in
import ./parity.nix { inherit version sha256 cargoSha256 patches; } import ./parity.nix { inherit version sha256 cargoSha256 patches; }

View File

@ -10,6 +10,8 @@
, pkgconfig , pkgconfig
, openssl , openssl
, systemd , systemd
, cmake
, perl
}: }:
rustPlatform.buildRustPackage rec { rustPlatform.buildRustPackage rec {
@ -18,12 +20,15 @@ rustPlatform.buildRustPackage rec {
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "paritytech"; owner = "paritytech";
repo = "parity"; repo = "parity-ethereum";
rev = "v${version}"; rev = "v${version}";
inherit sha256; inherit sha256;
}; };
buildInputs = [ pkgconfig systemd.lib systemd.dev openssl openssl.dev ]; buildInputs = [
pkgconfig cmake perl
systemd.lib systemd.dev openssl openssl.dev
];
# Some checks failed # Some checks failed
doCheck = false; doCheck = false;

View File

@ -1,5 +1,5 @@
diff --git a/.cargo/config b/.cargo/config diff --git a/.cargo/config b/.cargo/config
index 72652ad2f..b21c6aa7b 100644 index 72652ad2f..57c5c2f8f 100644
--- a/.cargo/config --- a/.cargo/config
+++ b/.cargo/config +++ b/.cargo/config
@@ -1,3 +1,108 @@ @@ -1,3 +1,108 @@
@ -52,19 +52,19 @@ index 72652ad2f..b21c6aa7b 100644
+branch = "master" +branch = "master"
+replace-with = "vendored-sources" +replace-with = "vendored-sources"
+ +
+[source."https://github.com/paritytech/daemonize"]
+git = "https://github.com/paritytech/daemonize"
+branch = "master"
+replace-with = "vendored-sources"
+
+[source."https://github.com/paritytech/hidapi-rs"] +[source."https://github.com/paritytech/hidapi-rs"]
+git = "https://github.com/paritytech/hidapi-rs" +git = "https://github.com/paritytech/hidapi-rs"
+branch = "master" +branch = "master"
+replace-with = "vendored-sources" +replace-with = "vendored-sources"
+ +
+[source."https://github.com/paritytech/hyper"]
+git = "https://github.com/paritytech/hyper"
+branch = "master"
+replace-with = "vendored-sources"
+
+[source."https://github.com/paritytech/jsonrpc.git"] +[source."https://github.com/paritytech/jsonrpc.git"]
+git = "https://github.com/paritytech/jsonrpc.git" +git = "https://github.com/paritytech/jsonrpc.git"
+branch = "parity-1.10" +branch = "parity-1.11"
+replace-with = "vendored-sources" +replace-with = "vendored-sources"
+ +
+[source."https://github.com/paritytech/libusb-rs"] +[source."https://github.com/paritytech/libusb-rs"]
@ -77,6 +77,11 @@ index 72652ad2f..b21c6aa7b 100644
+branch = "master" +branch = "master"
+replace-with = "vendored-sources" +replace-with = "vendored-sources"
+ +
+[source."https://github.com/paritytech/ring"]
+git = "https://github.com/paritytech/ring"
+branch = "master"
+replace-with = "vendored-sources"
+
+[source."https://github.com/paritytech/rust-ctrlc.git"] +[source."https://github.com/paritytech/rust-ctrlc.git"]
+git = "https://github.com/paritytech/rust-ctrlc.git" +git = "https://github.com/paritytech/rust-ctrlc.git"
+branch = "master" +branch = "master"
@ -102,13 +107,7 @@ index 72652ad2f..b21c6aa7b 100644
+branch = "master" +branch = "master"
+replace-with = "vendored-sources" +replace-with = "vendored-sources"
+ +
+[source."https://github.com/tailhook/rotor"]
+git = "https://github.com/tailhook/rotor"
+branch = "master"
+replace-with = "vendored-sources"
+
+[source."https://github.com/tomusdrw/ws-rs"] +[source."https://github.com/tomusdrw/ws-rs"]
+git = "https://github.com/tomusdrw/ws-rs" +git = "https://github.com/tomusdrw/ws-rs"
+branch = "master" +branch = "master"
+replace-with = "vendored-sources" +replace-with = "vendored-sources"
+

View File

@ -0,0 +1,98 @@
diff --git a/.cargo/config b/.cargo/config
index 72652ad2f..3c0eca89a 100644
--- a/.cargo/config
+++ b/.cargo/config
@@ -1,3 +1,93 @@
[target.x86_64-pc-windows-msvc]
# Link the C runtime statically ; https://github.com/paritytech/parity/issues/6643
rustflags = ["-Ctarget-feature=+crt-static"]
+
+[source."https://github.com/alexcrichton/mio-named-pipes"]
+git = "https://github.com/alexcrichton/mio-named-pipes"
+branch = "master"
+replace-with = "vendored-sources"
+
+[source."https://github.com/nikvolf/parity-tokio-ipc"]
+git = "https://github.com/nikvolf/parity-tokio-ipc"
+branch = "master"
+replace-with = "vendored-sources"
+
+[source."https://github.com/nikvolf/tokio-named-pipes"]
+git = "https://github.com/nikvolf/tokio-named-pipes"
+branch = "master"
+replace-with = "vendored-sources"
+
+[source."https://github.com/paritytech/app-dirs-rs"]
+git = "https://github.com/paritytech/app-dirs-rs"
+branch = "master"
+replace-with = "vendored-sources"
+
+[source."https://github.com/paritytech/bn"]
+git = "https://github.com/paritytech/bn"
+branch = "master"
+replace-with = "vendored-sources"
+
+[source."https://github.com/paritytech/daemonize"]
+git = "https://github.com/paritytech/daemonize"
+branch = "master"
+replace-with = "vendored-sources"
+
+[source."https://github.com/paritytech/hidapi-rs"]
+git = "https://github.com/paritytech/hidapi-rs"
+branch = "master"
+replace-with = "vendored-sources"
+
+[source."https://github.com/paritytech/jsonrpc.git"]
+git = "https://github.com/paritytech/jsonrpc.git"
+branch = "parity-1.11"
+replace-with = "vendored-sources"
+
+[source."https://github.com/paritytech/libusb-rs"]
+git = "https://github.com/paritytech/libusb-rs"
+branch = "master"
+replace-with = "vendored-sources"
+
+[source."https://github.com/paritytech/libusb-sys"]
+git = "https://github.com/paritytech/libusb-sys"
+branch = "master"
+replace-with = "vendored-sources"
+
+[source."https://github.com/paritytech/parity-common"]
+git = "https://github.com/paritytech/parity-common"
+branch = "master"
+replace-with = "vendored-sources"
+
+[source."https://github.com/paritytech/ring"]
+git = "https://github.com/paritytech/ring"
+branch = "master"
+replace-with = "vendored-sources"
+
+[source."https://github.com/paritytech/rust-ctrlc.git"]
+git = "https://github.com/paritytech/rust-ctrlc.git"
+branch = "master"
+replace-with = "vendored-sources"
+
+[source."https://github.com/paritytech/rust-rocksdb"]
+git = "https://github.com/paritytech/rust-rocksdb"
+branch = "master"
+replace-with = "vendored-sources"
+
+[source."https://github.com/paritytech/rust-secp256k1"]
+git = "https://github.com/paritytech/rust-secp256k1"
+branch = "master"
+replace-with = "vendored-sources"
+
+[source."https://github.com/paritytech/rust-snappy"]
+git = "https://github.com/paritytech/rust-snappy"
+branch = "master"
+replace-with = "vendored-sources"
+
+[source."https://github.com/paritytech/trezor-sys"]
+git = "https://github.com/paritytech/trezor-sys"
+branch = "master"
+replace-with = "vendored-sources"
+
+[source."https://github.com/tomusdrw/ws-rs"]
+git = "https://github.com/tomusdrw/ws-rs"
+branch = "master"
+replace-with = "vendored-sources"

View File

@ -0,0 +1,81 @@
{ stdenv, fetchurl, autoPatchelfHook, makeWrapper
, alsaLib, xorg
, fetchFromGitHub, pkgconfig, gnome3
, gnome2, gdk_pixbuf, cairo, glib, freetype
, libpulseaudio
}:
let
libSwell = stdenv.mkDerivation {
name = "libSwell";
src = fetchFromGitHub {
owner = "justinfrankel";
repo = "WDL";
rev = "e87f5bdee7327b63398366fde6ec0a3f08bf600d";
sha256 = "147idjqc6nc23w9krl8a9w571k5jx190z3id6ir6cr8zsx0lakdb";
};
nativeBuildInputs = [ pkgconfig ];
buildInputs = [ gnome3.gtk ];
buildPhase = ''
cd WDL/swell
make
'';
installPhase = ''
mv libSwell.so $out
'';
};
in stdenv.mkDerivation rec {
name = "reaper-${version}";
version = "5.94";
src = fetchurl {
url = "https://www.reaper.fm/files/${stdenv.lib.versions.major version}.x/reaper${builtins.replaceStrings ["."] [""] version}_linux_x86_64.tar.xz";
sha256 = "16g5q12wh1cfbl9wq03vb7vpsd870k7i7883z0wn492x7y9syz8z";
};
nativeBuildInputs = [ autoPatchelfHook makeWrapper ];
buildInputs = [
alsaLib
stdenv.cc.cc.lib
xorg.libX11
xorg.libXi
gnome3.gtk
gdk_pixbuf
gnome2.pango
cairo
glib
freetype
];
dontBuild = true;
installPhase = ''
./install-reaper.sh --install $out/opt
rm $out/opt/REAPER/uninstall-reaper.sh
cp ${libSwell.out} $out/opt/REAPER/libSwell.so
wrapProgram $out/opt/REAPER/reaper \
--prefix LD_LIBRARY_PATH : ${libpulseaudio}/lib
mkdir $out/bin
ln -s $out/opt/REAPER/reaper $out/bin/
ln -s $out/opt/REAPER/reamote-server $out/bin/
'';
meta = with stdenv.lib; {
description = "Digital audio workstation";
homepage = https://www.reaper.fm/;
license = licenses.unfree;
platforms = [ "x86_64-linux" ];
maintainers = with maintainers; [ jfrankenau ];
};
}

View File

@ -18,9 +18,9 @@ let
sha256Hash = "016nyn1pqviy089hg0dq7m4cqb39fdxdcy4zknkaq7dmgv1dj6x9"; sha256Hash = "016nyn1pqviy089hg0dq7m4cqb39fdxdcy4zknkaq7dmgv1dj6x9";
}; };
latestVersion = { # canary & dev latestVersion = { # canary & dev
version = "3.3.0.2"; # "Android Studio 3.3 Canary 3" version = "3.3.0.3"; # "Android Studio 3.3 Canary 4"
build = "181.4884283"; build = "182.4924367";
sha256Hash = "0r93yzw87cgzz60p60gknij5vaqmv1a1kyd4cr9gx8cbxw46lhwh"; sha256Hash = "03fxjxlsbrpklsss1nvlkb41skr5ymmq9vdns8iikcm1ng925vfd";
}; };
in rec { in rec {
# Old alias # Old alias

View File

@ -5,7 +5,7 @@
}: }:
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
name = "qgis-2.18.20"; name = "qgis-2.18.22";
buildInputs = [ gdal qt4 flex openssl bison proj geos xlibsWrapper sqlite gsl qwt qscintilla buildInputs = [ gdal qt4 flex openssl bison proj geos xlibsWrapper sqlite gsl qwt qscintilla
fcgi libspatialindex libspatialite postgresql qjson qca2 txt2tags pkgconfig ] fcgi libspatialindex libspatialite postgresql qjson qca2 txt2tags pkgconfig ]
@ -34,7 +34,7 @@ stdenv.mkDerivation rec {
src = fetchurl { src = fetchurl {
url = "https://qgis.org/downloads/${name}.tar.bz2"; url = "https://qgis.org/downloads/${name}.tar.bz2";
sha256 = "0bm9sv268lc3v48zjypsjjs62xnyb7zabzrms4jsy020waz6sk9g"; sha256 = "00b3a2hfn3i7bdx7x96vz2nj0976vpkhid4ss7n8c33fdvw3k82a";
}; };
# CMAKE_FIND_FRAMEWORK=never stops the installer choosing system # CMAKE_FIND_FRAMEWORK=never stops the installer choosing system

View File

@ -1,7 +1,8 @@
{ stdenv, fetchFromGitHub, pythonPackages }: { stdenv, fetchFromGitHub, python3Packages }:
pythonPackages.buildPythonApplication rec { python3Packages.buildPythonApplication rec {
name = "antfs-cli-unstable-2017-02-11"; pname = "antfs-cli";
version = "unstable-2017-02-11";
meta = with stdenv.lib; { meta = with stdenv.lib; {
homepage = https://github.com/Tigge/antfs-cli; homepage = https://github.com/Tigge/antfs-cli;
@ -17,5 +18,5 @@ pythonPackages.buildPythonApplication rec {
sha256 = "0v8y64kldfbs809j1g9d75dd1vxq7mfxnp4b45pz8anpxhjf64fy"; sha256 = "0v8y64kldfbs809j1g9d75dd1vxq7mfxnp4b45pz8anpxhjf64fy";
}; };
propagatedBuildInputs = [ pythonPackages.openant ]; propagatedBuildInputs = [ python3Packages.openant ];
} }

View File

@ -2,7 +2,7 @@
buildGoPackage rec { buildGoPackage rec {
name = "hugo-${version}"; name = "hugo-${version}";
version = "0.42.1"; version = "0.46";
goPackagePath = "github.com/gohugoio/hugo"; goPackagePath = "github.com/gohugoio/hugo";
@ -10,11 +10,13 @@ buildGoPackage rec {
owner = "gohugoio"; owner = "gohugoio";
repo = "hugo"; repo = "hugo";
rev = "v${version}"; rev = "v${version}";
sha256 = "17m8bkldvnd7yyzxi4rc8vv3qfypjzik38bjy4qavb7sjdjmfij9"; sha256 = "0w5xkb6s03hprb4v151gdk8zzsgvy0i406363j1w03bic8ajwgmj";
}; };
goDeps = ./deps.nix; goDeps = ./deps.nix;
buildFlags = "-tags extended";
postInstall = '' postInstall = ''
rm $bin/bin/generate rm $bin/bin/generate
''; '';

View File

@ -1,5 +1,14 @@
# This file was generated by https://github.com/kamilchm/go2nix v1.2.1 # This file was generated by https://github.com/kamilchm/go2nix v1.2.1
[ [
{
goPackagePath = "github.com/BurntSushi/locker";
fetch = {
type = "git";
url = "https://github.com/BurntSushi/locker";
rev = "a6e239ea1c69bff1cfdb20c4b73dadf52f784b6a";
sha256 = "1xak4aync4klswq5217qvw191asgla51jr42y94vp109lirm5dzg";
};
}
{ {
goPackagePath = "github.com/BurntSushi/toml"; goPackagePath = "github.com/BurntSushi/toml";
fetch = { fetch = {
@ -32,8 +41,8 @@
fetch = { fetch = {
type = "git"; type = "git";
url = "https://github.com/alecthomas/chroma"; url = "https://github.com/alecthomas/chroma";
rev = "d7b2ed20a4989ab604703f61f86523560f8a6a87"; rev = "5d7fef2ae60b501bbf28d476c3f273b8017d8261";
sha256 = "0ni2ncck787sxk9gl14xnyjnw4y27ipypjf4kc00g635fvc64ik6"; sha256 = "150jv4vhsdi1gj3liwkgicdrwnzgv5qkq2fwznlnzf64vmfb0b9f";
}; };
} }
{ {
@ -50,8 +59,17 @@
fetch = { fetch = {
type = "git"; type = "git";
url = "https://github.com/bep/gitmap"; url = "https://github.com/bep/gitmap";
rev = "012701e8669671499fc43e9792335a1dcbfe2afb"; rev = "ecb6fe06dbfd6bb4225e7fda7dc15612ecc8d960";
sha256 = "10ixv4zwmrpxvpchws78yzsjvw1zplljw3iqvwpina2mkwwp71ql"; sha256 = "0zqdl5h4ayi2gi5aqf35f1sjszhbcriksm2bf84fkrg7ngr48jn6";
};
}
{
goPackagePath = "github.com/bep/go-tocss";
fetch = {
type = "git";
url = "https://github.com/bep/go-tocss";
rev = "2abb118dc8688b6c7df44e12f4152c2bded9b19c";
sha256 = "12q7h6nydklq4kg65kcgd85209rx7zf64ba6nf3k7y16knj4233q";
}; };
} }
{ {
@ -68,8 +86,8 @@
fetch = { fetch = {
type = "git"; type = "git";
url = "https://github.com/cpuguy83/go-md2man"; url = "https://github.com/cpuguy83/go-md2man";
rev = "48d8747a2ca13185e7cc8efe6e9fc196a83f71a5"; rev = "691ee98543af2f262f35fbb54bdd42f00b9b9cc5";
sha256 = "01hpll16rvxhnvv35vs3z8p51x54c5jyl1gjdm0g7kwfwp2chvjx"; sha256 = "1864g10y9n6ni0p1yqjhvwyjdh0lgxnf7dlb0c4njazdg5rppww9";
}; };
} }
{ {
@ -86,8 +104,8 @@
fetch = { fetch = {
type = "git"; type = "git";
url = "https://github.com/disintegration/imaging"; url = "https://github.com/disintegration/imaging";
rev = "5e63c9a565d0a3260d23d060a795783dab90fefe"; rev = "8021a62ea0dfe0ed2e6107f5ccd37e0d4a92a996";
sha256 = "1mmiz439lygi30dj1rbps57iqh762jkinnpb4wfl382v4h136qvp"; sha256 = "1c32sqfz78g9wxvpng8n9r404lf2lgjn9b24mg8y3rxylx29gks7";
}; };
} }
{ {
@ -176,8 +194,8 @@
fetch = { fetch = {
type = "git"; type = "git";
url = "https://github.com/jdkato/prose"; url = "https://github.com/jdkato/prose";
rev = "e27abfd3f31b84c37bbce37179b0428fcb1384be"; rev = "99216ea17cba4e2f2a4e8bca778643e5a529b7aa";
sha256 = "04rjqh3jdxaqr9czp4vcj14hqfv7yppv4nb7ynb04c9jcq23ajw7"; sha256 = "1mdh276lmj21jbi22ky8ngdsl9hfcdv6czshycbaiwjr5y9cv7bn";
}; };
} }
{ {
@ -234,13 +252,22 @@
sha256 = "0hlqcwx6qqgy3vs13r10wn0d9x0xmww1v9jm09y2dp1ykgbampnk"; sha256 = "0hlqcwx6qqgy3vs13r10wn0d9x0xmww1v9jm09y2dp1ykgbampnk";
}; };
} }
{
goPackagePath = "github.com/mitchellh/hashstructure";
fetch = {
type = "git";
url = "https://github.com/mitchellh/hashstructure";
rev = "2bca23e0e452137f789efbc8610126fd8b94f73b";
sha256 = "0vpacsls26474wya360fjhzi6l4y8s8s251c4szvqxh17n5f5gk1";
};
}
{ {
goPackagePath = "github.com/mitchellh/mapstructure"; goPackagePath = "github.com/mitchellh/mapstructure";
fetch = { fetch = {
type = "git"; type = "git";
url = "https://github.com/mitchellh/mapstructure"; url = "https://github.com/mitchellh/mapstructure";
rev = "bb74f1db0675b241733089d5a1faa5dd8b0ef57b"; rev = "f15292f7a699fcc1a38a80977f80a046874ba8ac";
sha256 = "1aqk9qr46bwgdc5j7n7als61xvssvyjf4qzfsvhacl4izpygqnw7"; sha256 = "0zm3nhdvmj3f8q0vg2sjfw1sm3pwsw0ggz501awz95w99664a8al";
}; };
} }
{ {
@ -257,8 +284,8 @@
fetch = { fetch = {
type = "git"; type = "git";
url = "https://github.com/nicksnyder/go-i18n"; url = "https://github.com/nicksnyder/go-i18n";
rev = "f6ac3d9cf0c4b6a32527779e992ebde26bd3d948"; rev = "461e8b98df7454b4cb46a1611a6734f05ee331d0";
sha256 = "1vg25khaf7lr90xwf97bsyn873cdi1j7nxh68s80jrg2a86zw0ff"; sha256 = "0aq1q06y6azsi6mfmary5xs7gmmg8fh8lhx1wbpdlqk11asm9rq0";
}; };
} }
{ {
@ -275,8 +302,8 @@
fetch = { fetch = {
type = "git"; type = "git";
url = "https://github.com/pelletier/go-toml"; url = "https://github.com/pelletier/go-toml";
rev = "c01d1270ff3e442a8a57cddc1c92dc1138598194"; rev = "c2dbbc24a97911339e01bda0b8cabdbd8f13b602";
sha256 = "1fjzpcjng60mc3a4b2ql5a00d5gah84wj740dabv9kq67mpg8fxy"; sha256 = "0v1dsqnk5zmn6ir8jgxijx14s47jvijlqfz3aq435snfrgybd5rz";
}; };
} }
{ {
@ -320,8 +347,8 @@
fetch = { fetch = {
type = "git"; type = "git";
url = "https://github.com/spf13/cobra"; url = "https://github.com/spf13/cobra";
rev = "1e58aa3361fd650121dceeedc399e7189c05674a"; rev = "7c4570c3ebeb8129a1f7456d0908a8b676b6f9f1";
sha256 = "1d6dy60dw7i2mcab10yp99wi5w28jzhzzf16w4ys6bna7ymndiin"; sha256 = "16amh0prlzqrrbg5j629sg0f688nfzfgn9sair8jyybqampr3wc7";
}; };
} }
{ {
@ -365,8 +392,35 @@
fetch = { fetch = {
type = "git"; type = "git";
url = "https://github.com/spf13/viper"; url = "https://github.com/spf13/viper";
rev = "15738813a09db5c8e5b60a19d67d3f9bd38da3a4"; rev = "d493c32b69b8c6f2377bf30bc4d70267ffbc0793";
sha256 = "1mjfzg8zvnxckaq6l8gw99i2msrfqn9yr04dc3b7kd5bpxi6zr4v"; sha256 = "1jq46790rkjn6c1887wz98dqjk792ij6wnrifzk1maglmfb061hh";
};
}
{
goPackagePath = "github.com/tdewolff/minify";
fetch = {
type = "git";
url = "https://github.com/tdewolff/minify";
rev = "cf3a1790b606e292e4a0ee82e949a4f0d1c7617d";
sha256 = "1r496149l5iqzxkfcbll5dqcqxy4a7jjxvzm62c8hrybmwj574kn";
};
}
{
goPackagePath = "github.com/tdewolff/parse";
fetch = {
type = "git";
url = "https://github.com/tdewolff/parse";
rev = "4ceb50b40fad068875f5b093c5df0619012dc544";
sha256 = "1ap76hdiabn41r7zxc7nq3n3ld7zqf97jaf71zlzzjrphi3fwrg1";
};
}
{
goPackagePath = "github.com/wellington/go-libsass";
fetch = {
type = "git";
url = "https://github.com/wellington/go-libsass";
rev = "615eaa47ef794d037c1906a0eb7bf85375a5decf";
sha256 = "0imjiskn4vq7nml5jwb1scgl61jg53cfpkjnb9rsc6m8gsd8s16s";
}; };
} }
{ {
@ -374,8 +428,8 @@
fetch = { fetch = {
type = "git"; type = "git";
url = "https://github.com/yosssi/ace"; url = "https://github.com/yosssi/ace";
rev = "ea038f4770b6746c3f8f84f14fa60d9fe1205b56"; rev = "2b21b56204aee785bf8d500c3f9dcbe3ed7d4515";
sha256 = "1kbvbc56grrpnl65grygd23gyn3nkkhxdg8awhzkjmd0cvki8w1f"; sha256 = "0cgpq1zdnh8l8zsn9w63asc9k7cm6k4qvjgrb4hr1106h8fjwfma";
}; };
} }
{ {
@ -383,8 +437,8 @@
fetch = { fetch = {
type = "git"; type = "git";
url = "https://go.googlesource.com/image"; url = "https://go.googlesource.com/image";
rev = "af66defab954cb421ca110193eed9477c8541e2a"; rev = "c73c2afc3b812cdd6385de5a50616511c4a3d458";
sha256 = "0dgi7svwzs37c7m5dz2jig3xr45fyjihhr8cg0x8nc8sc8fsyq4h"; sha256 = "1kkafy29vz5xf6r29ghbvvbwrgjxwxvzk6dsa2qhyp1ddk6l2vkz";
}; };
} }
{ {
@ -392,8 +446,8 @@
fetch = { fetch = {
type = "git"; type = "git";
url = "https://go.googlesource.com/net"; url = "https://go.googlesource.com/net";
rev = "db08ff08e8622530d9ed3a0e8ac279f6d4c02196"; rev = "f4c29de78a2a91c00474a2e689954305c350adf9";
sha256 = "1f6q8kbijnrfy6wjqxrzgjf38ippckc5w34lhqsjs7kq045aar9a"; sha256 = "02nibjrr1il8sxnr0w1s5fj7gz6ayhg3hsywf948qhc68n5adv8x";
}; };
} }
{ {
@ -410,8 +464,8 @@
fetch = { fetch = {
type = "git"; type = "git";
url = "https://go.googlesource.com/sys"; url = "https://go.googlesource.com/sys";
rev = "6c888cc515d3ed83fc103cf1d84468aad274b0a7"; rev = "3dc4335d56c789b04b0ba99b7a37249d9b614314";
sha256 = "18anqrdajp4p015v3f5y641k3lmgp2jr0lfyx0pb3ia0qvn93mrp"; sha256 = "1105b7jqzz8g2bfkdbkj2pdzq4vhfmhm42khir88vjqfd1l7ha31";
}; };
} }
{ {
@ -419,8 +473,8 @@
fetch = { fetch = {
type = "git"; type = "git";
url = "https://go.googlesource.com/text"; url = "https://go.googlesource.com/text";
rev = "5c1cf69b5978e5a34c5f9ba09a83e56acc4b7877"; rev = "96e34ec0e18a62a1e59880c7bf617b655efecb66";
sha256 = "03br8p1sb1ffr02l8hyrgcyib7ms0z06wy3v4r1dj2l6q4ghwzfs"; sha256 = "1n1p5zz0vyvlhac40hxml6c5xwpsw8rjx1pbls9381a0s19ncbdg";
}; };
} }
{ {

View File

@ -19,7 +19,7 @@
buildGoPackage rec { buildGoPackage rec {
name = "terraform-provider-libvirt-${version}"; name = "terraform-provider-libvirt-${version}";
version = "0.3"; version = "0.4";
goPackagePath = "github.com/dmacvicar/terraform-provider-libvirt"; goPackagePath = "github.com/dmacvicar/terraform-provider-libvirt";
@ -27,13 +27,13 @@ buildGoPackage rec {
owner = "dmacvicar"; owner = "dmacvicar";
repo = "terraform-provider-libvirt"; repo = "terraform-provider-libvirt";
rev = "v${version}"; rev = "v${version}";
sha256 = "004gxy55p5cf39f2zpah0i2zhvs4x6ixnxy8z9v7314604ggpkna"; sha256 = "05jkjp1kis4ncryv34pkb9cz2yhzbwg62x9qmlqsqlxwz9hqny3r";
}; };
buildInputs = [ libvirt pkgconfig makeWrapper ]; buildInputs = [ libvirt pkgconfig makeWrapper ];
goDeps = ./deps.nix; # mkisofs needed to create ISOs holding cloud-init data,
# and wrapped to terraform via deecb4c1aab780047d79978c636eeb879dd68630
propagatedBuildInputs = [ cdrtools ]; propagatedBuildInputs = [ cdrtools ];
meta = with stdenv.lib; { meta = with stdenv.lib; {

View File

@ -1,12 +0,0 @@
# This file was generated by https://github.com/kamilchm/go2nix v1.2.1
[
{
goPackagePath = "github.com/aws/aws-sdk-go";
fetch = {
type = "git";
url = "https://github.com/aws/aws-sdk-go";
rev = "c861d27d0304a79f727e9a8a4e2ac1e74602fdc0";
sha256 = "023cyg551dvm2l50dx1qsikkj77lk2dhiya7by8in7h65av6hjgl";
};
}
]

View File

@ -4,15 +4,15 @@
{ {
owner = "terraform-providers"; owner = "terraform-providers";
repo = "terraform-provider-alicloud"; repo = "terraform-provider-alicloud";
version = "1.9.5"; version = "1.10.0";
sha256 = "12yhy0p4xciw70i0gvwzbg39f6mfin2cfdblxyqjlv9bwg26k7jz"; sha256 = "19lplakpl8dz4a8xw9va86gd774yq4gayq4kzv3pvr62b03a999x";
}; };
archive = archive =
{ {
owner = "terraform-providers"; owner = "terraform-providers";
repo = "terraform-provider-archive"; repo = "terraform-provider-archive";
version = "1.0.3"; version = "1.1.0";
sha256 = "1il8v9zi838naprr8dqzipk6ns71l8vdqidarxklnn8wdwxmacg4"; sha256 = "1fsynv725cmqz819v9p4i4h4w4y77mbya5y9v81sqvacqvr3i05h";
}; };
arukas = arukas =
{ {
@ -32,29 +32,22 @@
{ {
owner = "terraform-providers"; owner = "terraform-providers";
repo = "terraform-provider-aws"; repo = "terraform-provider-aws";
version = "1.25.0"; version = "1.30.0";
sha256 = "1cg2pch6nip96qdzca7q0ak6308fkjxz9zjdcv74cwg0f65frh7d"; sha256 = "1si2fm5nm7gad90lf410zwjf2q5kd8mv6nkkbfnfdzkpkchavr95";
};
azure-classic =
{
owner = "terraform-providers";
repo = "terraform-provider-azure-classic";
version = "0.1.1";
sha256 = "11myqq3wnxvpysjycvwg7b14ll8d9vkn06xb3r26kmc42fkl5xv1";
}; };
azurerm = azurerm =
{ {
owner = "terraform-providers"; owner = "terraform-providers";
repo = "terraform-provider-azurerm"; repo = "terraform-provider-azurerm";
version = "1.7.0"; version = "1.12.0";
sha256 = "0lf83pc5gdmd61i93221zdg9pdzfpfnvhis8kf1s2jlc6zshbabv"; sha256 = "1avp2vhlj60iw17pw39003p30byms7xvq5lkippm60ak4ky9p51b";
}; };
azurestack = azurestack =
{ {
owner = "terraform-providers"; owner = "terraform-providers";
repo = "terraform-provider-azurestack"; repo = "terraform-provider-azurestack";
version = "0.1.0"; version = "0.2.0";
sha256 = "144dfaq16g41i9y2pcq2ilgygndad3vivr6fbygg8yl10m5l4qp0"; sha256 = "0s1ga0ga0rbpp552hbq1dfnkpdjvk1c40i7qqnqmm20xlz6k55mb";
}; };
bitbucket = bitbucket =
{ {
@ -63,6 +56,13 @@
version = "1.0.0"; version = "1.0.0";
sha256 = "0gi8p1q0y8x5y8lqihijkpqs3v152h0q7icv7ixk33xsdcvb418y"; sha256 = "0gi8p1q0y8x5y8lqihijkpqs3v152h0q7icv7ixk33xsdcvb418y";
}; };
brightbox =
{
owner = "terraform-providers";
repo = "terraform-provider-brightbox";
version = "1.0.5";
sha256 = "0sn7k5bqgms5sxjhjikmby0jf2n6y14z6s4wsifxaw7b0082fy28";
};
chef = chef =
{ {
owner = "terraform-providers"; owner = "terraform-providers";
@ -88,8 +88,8 @@
{ {
owner = "terraform-providers"; owner = "terraform-providers";
repo = "terraform-provider-cloudflare"; repo = "terraform-provider-cloudflare";
version = "1.0.0"; version = "1.1.0";
sha256 = "1ar9wcgr45f2v6bqjn24zii0qwfppla8ya3gjc546sh1a7m0h9p3"; sha256 = "1rmg7gndhmb1wp0zszhwx9vrax8411iy24yrpkmayjify3vsvdpx";
}; };
cloudscale = cloudscale =
{ {
@ -123,8 +123,8 @@
{ {
owner = "terraform-providers"; owner = "terraform-providers";
repo = "terraform-provider-datadog"; repo = "terraform-provider-datadog";
version = "1.0.3"; version = "1.1.0";
sha256 = "0nh2dww3hx6jrkcd9lq5hpnqr3grp9cmqi4nwmxlrc5azf8x0mii"; sha256 = "0ckmjpw9dkj5490kwxamdvnnidnjdgxnb1biqpvwj4139hlcl628";
}; };
digitalocean = digitalocean =
{ {
@ -158,8 +158,8 @@
{ {
owner = "terraform-providers"; owner = "terraform-providers";
repo = "terraform-provider-docker"; repo = "terraform-provider-docker";
version = "0.1.1"; version = "1.0.0";
sha256 = "02lhbl34dq7lsby3g32969i4g9l3z6xw1v00shljd3amgyz2l2r2"; sha256 = "09ribvyv02r907pdvyrwaklr14xyvyn14rijslnm16xp8d4waz9h";
}; };
dyn = dyn =
{ {
@ -179,15 +179,15 @@
{ {
owner = "terraform-providers"; owner = "terraform-providers";
repo = "terraform-provider-fastly"; repo = "terraform-provider-fastly";
version = "0.2.0"; version = "0.3.0";
sha256 = "0vrvyqhzbrvhyhdkg2y2dgadf5j7bj0cbzd13f9m86d146zlf8lb"; sha256 = "1hh4s81g256iy1rvp9snqbyhidz8n6p7pzanlxp89ffrq9p32sp0";
}; };
flexibleengine = flexibleengine =
{ {
owner = "terraform-providers"; owner = "terraform-providers";
repo = "terraform-provider-flexibleengine"; repo = "terraform-provider-flexibleengine";
version = "1.0.1"; version = "1.1.0";
sha256 = "1xf5cmn434a0zr9qxc7f0jma9gf111cp7fm2vgyhkd62hipafcas"; sha256 = "07g6kc211crxf9nvgvghg05jdahd1fb09lpwfcps9ph259pwwam3";
}; };
github = github =
{ {
@ -207,15 +207,15 @@
{ {
owner = "terraform-providers"; owner = "terraform-providers";
repo = "terraform-provider-google"; repo = "terraform-provider-google";
version = "1.15.0"; version = "1.16.2";
sha256 = "0xwijnv7mzlyzplkylfphph568b9bxavrclnlwvp9ylvklq70nzl"; sha256 = "1d8by6rb4s2dggapcbb4b2g5hf280bjayz9p5q9njgsn83579pnm";
}; };
grafana = grafana =
{ {
owner = "terraform-providers"; owner = "terraform-providers";
repo = "terraform-provider-grafana"; repo = "terraform-provider-grafana";
version = "1.0.2"; version = "1.2.0";
sha256 = "17pj4mm7ik9llhgckza822866x6986cdcr821f16dchvn3bfbf2i"; sha256 = "1kn2bbdgci6nfl2gyk4w8w203fscqws2748idv9m53ikczg8n573";
}; };
hcloud = hcloud =
{ {
@ -228,8 +228,8 @@
{ {
owner = "terraform-providers"; owner = "terraform-providers";
repo = "terraform-provider-heroku"; repo = "terraform-provider-heroku";
version = "1.0.1"; version = "1.2.0";
sha256 = "1kx74d0ywzim5zj3y5ac80r18igsqax39yv9qaam546a88ya31yy"; sha256 = "1w2r0wnfcr9aqij5ckq0apd8az8yzdg704hi1zjb1ggb54v97n31";
}; };
http = http =
{ {
@ -238,6 +238,13 @@
version = "1.0.1"; version = "1.0.1";
sha256 = "1bnqrx4xya3lm5wp4byy6npazll6w1g6bv4rawgncswsgx08zqng"; sha256 = "1bnqrx4xya3lm5wp4byy6npazll6w1g6bv4rawgncswsgx08zqng";
}; };
huaweicloud =
{
owner = "terraform-providers";
repo = "terraform-provider-huaweicloud";
version = "1.1.0";
sha256 = "1jsvv5yfxgz998p4wbldbq82hl4ykn1yp21igphl94n3b0jj33dj";
};
icinga2 = icinga2 =
{ {
owner = "terraform-providers"; owner = "terraform-providers";
@ -256,8 +263,8 @@
{ {
owner = "terraform-providers"; owner = "terraform-providers";
repo = "terraform-provider-influxdb"; repo = "terraform-provider-influxdb";
version = "1.0.0"; version = "1.0.1";
sha256 = "1w1izzs22b2w2qmpdxbhaj9kvnfyw0wlq3nigrigwwvqav43knh9"; sha256 = "0713h50675njnpdy4w1azfq8h6yai40gx6w2fbvw4n59h6jlfny4";
}; };
kubernetes = kubernetes =
{ {
@ -347,22 +354,22 @@
{ {
owner = "terraform-providers"; owner = "terraform-providers";
repo = "terraform-provider-oneandone"; repo = "terraform-provider-oneandone";
version = "1.1.0"; version = "1.2.0";
sha256 = "1yps2mcdy61afxva7vg0i82s24zkdrn5abwblm0gcgc0cz588r9d"; sha256 = "1lrcy05zklv7vc8653f8cn3jjc9zjjwi488dpaphsmsl1md3m88b";
}; };
opc = opc =
{ {
owner = "terraform-providers"; owner = "terraform-providers";
repo = "terraform-provider-opc"; repo = "terraform-provider-opc";
version = "1.1.2"; version = "1.2.0";
sha256 = "0v413wgnr8h682han88s0n15cdwd9a0dxr9s2mknpi4664c41qlk"; sha256 = "19rfm12w97ccyrzpdw0qlwfn7gh64lqh17kj3cv11y1f731z8rlw";
}; };
openstack = openstack =
{ {
owner = "terraform-providers"; owner = "terraform-providers";
repo = "terraform-provider-openstack"; repo = "terraform-provider-openstack";
version = "1.6.0"; version = "1.7.0";
sha256 = "14chn2vb8y9rz5irh8m2ky9yxmw2za45gikncjm4gfc3xl6803iq"; sha256 = "0sw2kmcsi9sjzi549fj6knida01q0lnpqvc3cpyjyv92f6w4bznn";
}; };
opentelekomcloud = opentelekomcloud =
{ {
@ -382,15 +389,15 @@
{ {
owner = "terraform-providers"; owner = "terraform-providers";
repo = "terraform-provider-oraclepaas"; repo = "terraform-provider-oraclepaas";
version = "1.2.1"; version = "1.3.0";
sha256 = "0r404rysjhbsxh45ad23k12rs8js2pdczakzavnjx508kr29gcqc"; sha256 = "09vsb52cbf2h1rdwfg4xb54gklwgmaxdgjcdq1yx5gxj7lfbdl9v";
}; };
ovh = ovh =
{ {
owner = "terraform-providers"; owner = "terraform-providers";
repo = "terraform-provider-ovh"; repo = "terraform-provider-ovh";
version = "0.2.0"; version = "0.3.0";
sha256 = "12dpgx0fpmqw64v5a70fihbgixyw71bdjbdi17gal7s2pj1xw159"; sha256 = "05bzkwa50alh8mpslh64dddp815m8df240w1mmphdmp9rsi6hqp8";
}; };
packet = packet =
{ {
@ -417,8 +424,8 @@
{ {
owner = "terraform-providers"; owner = "terraform-providers";
repo = "terraform-provider-postgresql"; repo = "terraform-provider-postgresql";
version = "0.1.1"; version = "0.1.2";
sha256 = "0ls5z02vaalcrbaq375qnk0267pb17rpsx4s3plfnr7qclv21pwn"; sha256 = "08wv03j70mych4nnamivjihwvca3aksjxgjlj8yasz5292qgl05w";
}; };
powerdns = powerdns =
{ {
@ -431,8 +438,8 @@
{ {
owner = "terraform-providers"; owner = "terraform-providers";
repo = "terraform-provider-profitbricks"; repo = "terraform-provider-profitbricks";
version = "1.3.1"; version = "1.3.2";
sha256 = "1g4filwv38rq9wcdbpnpgfnv8qj1kzdnjc8awvbsdlxlj4fa06bi"; sha256 = "0mk77n833np6ahm6bzvpg31a0m1qazaipd0vqzccqfkbz78sm3jb";
}; };
rabbitmq = rabbitmq =
{ {
@ -466,15 +473,15 @@
{ {
owner = "terraform-providers"; owner = "terraform-providers";
repo = "terraform-provider-runscope"; repo = "terraform-provider-runscope";
version = "0.1.0"; version = "0.3.0";
sha256 = "05l305423njds2cmmxg67swpdnp3zibs36dq4cfjk47i4byvipjz"; sha256 = "1srnnlw94q1av8rzy8753fk4vazv5ldbimgr9gd51vrmpvmlgxas";
}; };
scaleway = scaleway =
{ {
owner = "terraform-providers"; owner = "terraform-providers";
repo = "terraform-provider-scaleway"; repo = "terraform-provider-scaleway";
version = "1.4.1"; version = "1.5.1";
sha256 = "1zxb3981w30hv1aax28ayiy0sl0vzrrwkynp4lmwwhfjyhyagnm1"; sha256 = "1b42fh7mwj2cx3g16lgp4sw6ca5qqj0mhm6i7qid8agwsga34v0y";
}; };
softlayer = softlayer =
{ {
@ -487,15 +494,22 @@
{ {
owner = "terraform-providers"; owner = "terraform-providers";
repo = "terraform-provider-spotinst"; repo = "terraform-provider-spotinst";
version = "1.0.0"; version = "1.2.0";
sha256 = "1p05wamv70mywfqf0b3nxpvxc0m8ydb5zcl2kpzsrii9mq21pjrf"; sha256 = "09k79xg5cbs4qhxr0b4f42qpxj6j2795z5vmwbxfkirb5bkpqdq1";
}; };
statuscake = statuscake =
{ {
owner = "terraform-providers"; owner = "terraform-providers";
repo = "terraform-provider-statuscake"; repo = "terraform-provider-statuscake";
version = "0.1.0"; version = "0.2.0";
sha256 = "084520cak2krwpks2ipqcjfw3k4rrzn6gqqncz8c4i6g01f1m7yg"; sha256 = "065izach0hq04664hz7rc3gd0r3l06lzwcbj5800zjfv1inp6pxs";
};
telefonicaopencloud =
{
owner = "terraform-providers";
repo = "terraform-provider-telefonicaopencloud";
version = "1.0.0";
sha256 = "1761wkjz3d2458xl7855lxklyxgyk05fddh92rp6975y0ca6xa5m";
}; };
template = template =
{ {
@ -536,8 +550,8 @@
{ {
owner = "terraform-providers"; owner = "terraform-providers";
repo = "terraform-provider-vault"; repo = "terraform-provider-vault";
version = "1.1.0"; version = "1.1.1";
sha256 = "1g0cca662glqcz83l1skhj3nb7g386x65kwz95kyp59nvyxywvbq"; sha256 = "0kiqpnb4669xw9b8nf6a8ky0jhnp14bipaizml3gdh1hnda6hflw";
}; };
vcd = vcd =
{ {

View File

@ -16,10 +16,5 @@ let
# if the versions are not provided via file paths. # if the versions are not provided via file paths.
postBuild = "mv go/bin/${repo}{,_v${version}}"; postBuild = "mv go/bin/${repo}{,_v${version}}";
}; };
maybeDrv = name: data:
# azure-classic is an archived repo
if name == "azure-classic" then null
else toDrv data;
in in
lib.mapAttrs maybeDrv list lib.mapAttrs (n: v: toDrv v) list

View File

@ -71,7 +71,7 @@ fi
org=terraform-providers org=terraform-providers
repos=$(get_org_repos "$org" | grep terraform-provider- | grep -v terraform-provider-scaffolding | grep -v terraform-provider-telefonicaopencloud | sort) repos=$(get_org_repos "$org" | grep terraform-provider- | grep -v terraform-provider-scaffolding | grep -v terraform-provider-azure-classic | sort)
# Get all the providers with index # Get all the providers with index

View File

@ -13,13 +13,13 @@
}: }:
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
name = "dino-unstable-2018-06-03"; name = "dino-unstable-2018-07-08";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "dino"; owner = "dino";
repo = "dino"; repo = "dino";
rev = "52e116ee44be1667660c08858a28fe8fda125f79"; rev = "df8b5fcb722c4a33ed18cbbaafecb206f127b849";
sha256 = "1yybmjd50r41366clrsw21qybbpjfkvim2n5b3dkcagjnifak0zl"; sha256 = "1r7h9pxix0sylnwab7a8lir9h5yssk98128x2bzva77id9id33vi";
fetchSubmodules = true; fetchSubmodules = true;
}; };

View File

@ -40,11 +40,11 @@ let
in stdenv.mkDerivation rec { in stdenv.mkDerivation rec {
name = "signal-desktop-${version}"; name = "signal-desktop-${version}";
version = "1.14.4"; version = "1.15.0";
src = fetchurl { src = fetchurl {
url = "https://updates.signal.org/desktop/apt/pool/main/s/signal-desktop/signal-desktop_${version}_amd64.deb"; url = "https://updates.signal.org/desktop/apt/pool/main/s/signal-desktop/signal-desktop_${version}_amd64.deb";
sha256 = "0590r7748kv6g7zygq95v8qxf7vi2n5ypj6734x9yshrn8z6p8lr"; sha256 = "1q73jx92h8zwk1dn103ymskz35q6kfiqc44886jr0p7mlpndqsa4";
}; };
phases = [ "unpackPhase" "installPhase" ]; phases = [ "unpackPhase" "installPhase" ];

View File

@ -14,5 +14,7 @@ in {
stable = mkTelegram stableVersion; stable = mkTelegram stableVersion;
preview = mkTelegram (stableVersion // { preview = mkTelegram (stableVersion // {
stable = false; stable = false;
version = "1.3.11";
sha256Hash = "057b7ccba7k2slzbp9xzcs3fni40x7gz3wy13xfgxywr12f04h1r";
}); });
} }

View File

@ -0,0 +1,83 @@
{ stdenv, fetchurl, lib, qtbase, qtmultimedia, qtsvg, qtdeclarative, qttools, full,
libsecret, libGL, libpulseaudio, glib, makeWrapper, makeDesktopItem }:
let
version = "1.0.5-1";
description = ''
An application that runs on your computer in the background and seamlessly encrypts
and decrypts your mail as it enters and leaves your computer
'';
desktopItem = makeDesktopItem {
name = "Desktop-Bridge";
exec = "Desktop-Bridge";
icon = "desktop-bridge";
comment = stdenv.lib.replaceStrings ["\n"] [" "] description;
desktopName = "ProtonMail Bridge";
genericName = "ProtonMail Bridge for Linux";
categories = "Utility;Security;Network;Email";
};
in stdenv.mkDerivation rec {
name = "protonmail-bridge-${version}";
src = fetchurl {
url = "https://protonmail.com/download/protonmail-bridge_${version}_amd64.deb";
sha256 = "1fsf4l5c9ii370fgy721a71h34g7vjfddscal3jblb4mm3ywzxfl";
};
nativeBuildInputs = [ makeWrapper ];
sourceRoot = ".";
unpackCmd = ''
ar p "$src" data.tar.xz | tar xJ
'';
installPhase = ''
mkdir -p $out/{bin,lib,share}
mkdir -p $out/share/{applications,icons/hicolor/scalable/apps}
cp -r usr/lib/protonmail/bridge/Desktop-Bridge{,.sh} $out/lib
cp usr/share/icons/protonmail/Desktop-Bridge.svg $out/share/icons/hicolor/scalable/apps/desktop-bridge.svg
cp ${desktopItem}/share/applications/* $out/share/applications
ln -s $out/lib/Desktop-Bridge $out/bin/Desktop-Bridge
'';
postFixup = let
rpath = lib.makeLibraryPath [
stdenv.cc.cc.lib
qtbase
qtmultimedia
qtsvg
qtdeclarative
qttools
libGL
libsecret
libpulseaudio
glib
];
qtPath = prefix: "${full}/${prefix}";
in ''
patchelf \
--set-interpreter "$(cat $NIX_CC/nix-support/dynamic-linker)" \
--set-rpath "${rpath}" \
$out/lib/Desktop-Bridge
wrapProgram $out/lib/Desktop-Bridge \
--set QT_PLUGIN_PATH "${qtPath qtbase.qtPluginPrefix}" \
--set QML_IMPORT_PATH "${qtPath qtbase.qtQmlPrefix}" \
--set QML2_IMPORT_PATH "${qtPath qtbase.qtQmlPrefix}" \
'';
meta = with stdenv.lib; {
homepage = https://www.protonmail.com/bridge;
license = licenses.mit;
platforms = [ "x86_64-linux" ];
maintainers = with maintainers; [ lightdiscord ];
inherit description;
};
}

View File

@ -15,6 +15,8 @@ stdenv.mkDerivation rec {
buildInputs = [ cmake zlib ncurses ]; buildInputs = [ cmake zlib ncurses ];
enableParallelBuilding = false;
meta = with stdenv.lib; { meta = with stdenv.lib; {
description = "Identify single nucleotide positions that are different between tumor and normal"; description = "Identify single nucleotide positions that are different between tumor and normal";
license = licenses.mit; license = licenses.mit;

View File

@ -1,11 +1,9 @@
{ stdenv, buildPythonApplication, fetchFromGitHub, ncurses, pillow, pytest }: { stdenv, python3, fetchFromGitHub, ncurses }:
let with python3.pkgs; buildPythonApplication rec {
pname = "almonds";
version = "1.25b"; version = "1.25b";
in
buildPythonApplication {
name = "almonds-${version}";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "Tenchi2xh"; owner = "Tenchi2xh";
repo = "Almonds"; repo = "Almonds";

View File

@ -1,20 +1,22 @@
{ stdenv, fetchFromGitHub, python3Packages }: { stdenv, fetchFromGitHub, python3Packages, readline }:
with stdenv.lib; with stdenv.lib;
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
name = "bcal-${version}"; name = "bcal-${version}";
version = "1.8"; version = "1.9";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "jarun"; owner = "jarun";
repo = "bcal"; repo = "bcal";
rev = "v${version}"; rev = "v${version}";
sha256 = "0jdn46wzwq7yn3x6p1xyqarp52pcr0ghnfhkm7nyxv734g1abw7r"; sha256 = "0h6qi5rvzl6c6fsfdpdb3l4jcgip03l18i0b1x08z1y89i56y8mm";
}; };
nativeBuildInputs = [ python3Packages.pytest ]; nativeBuildInputs = [ python3Packages.pytest ];
buildInputs = [ readline ];
doCheck = true; doCheck = true;
checkPhase = '' checkPhase = ''
python3 -m pytest test.py python3 -m pytest test.py

View File

@ -1,4 +1,4 @@
{ stdenv, fetchurl, fetchFromGitHub, makeWrapper { stdenv, fetchpatch, fetchurl, fetchFromGitHub, makeWrapper
, docutils, perl, pkgconfig, python3, which, ffmpeg_4 , docutils, perl, pkgconfig, python3, which, ffmpeg_4
, freefont_ttf, freetype, libass, libpthreadstubs , freefont_ttf, freetype, libass, libpthreadstubs
, lua, luasocket, libuchardet, libiconv ? null, darwin , lua, luasocket, libuchardet, libiconv ? null, darwin
@ -35,7 +35,7 @@
, youtubeSupport ? true, youtube-dl ? null , youtubeSupport ? true, youtube-dl ? null
, vaapiSupport ? true, libva ? null , vaapiSupport ? true, libva ? null
, drmSupport ? true, libdrm ? null , drmSupport ? true, libdrm ? null
, openalSupport ? true, openalSoft ? null , openalSupport ? false, openalSoft ? null
, vapoursynthSupport ? false, vapoursynth ? null , vapoursynthSupport ? false, vapoursynth ? null
, archiveSupport ? false, libarchive ? null , archiveSupport ? false, libarchive ? null
, jackaudioSupport ? false, libjack2 ? null , jackaudioSupport ? false, libjack2 ? null
@ -93,6 +93,13 @@ in stdenv.mkDerivation rec {
sha256 = "0i2nl65diqsjyz28dj07h6d8gq6ix72ysfm0nhs8514hqccaihs3"; sha256 = "0i2nl65diqsjyz28dj07h6d8gq6ix72ysfm0nhs8514hqccaihs3";
}; };
# FIXME: Remove this patch for building on macOS if it gets released in
# the future.
patches = optional stdenv.isDarwin (fetchpatch {
url = https://github.com/mpv-player/mpv/commit/dc553c8cf4349b2ab5d2a373ad2fac8bdd229ebb.patch;
sha256 = "0pa8vlb8rsxvd1s39c4iv7gbaqlkn3hx21a6xnpij99jdjkw3pg8";
});
postPatch = '' postPatch = ''
patchShebangs ./TOOLS/ patchShebangs ./TOOLS/
''; '';
@ -107,6 +114,7 @@ in stdenv.mkDerivation rec {
"--disable-libmpv-static" "--disable-libmpv-static"
"--disable-static-build" "--disable-static-build"
"--disable-build-date" # Purity "--disable-build-date" # Purity
"--disable-macos-cocoa-cb" # Disable whilst Swift isn't supported
(enableFeature archiveSupport "libarchive") (enableFeature archiveSupport "libarchive")
(enableFeature dvdreadSupport "dvdread") (enableFeature dvdreadSupport "dvdread")
(enableFeature dvdnavSupport "dvdnav") (enableFeature dvdnavSupport "dvdnav")
@ -143,7 +151,6 @@ in stdenv.mkDerivation rec {
++ optional speexSupport speex ++ optional speexSupport speex
++ optional bs2bSupport libbs2b ++ optional bs2bSupport libbs2b
++ optional openalSupport openalSoft ++ optional openalSupport openalSoft
++ optional (openalSupport && stdenv.isDarwin) darwin.apple_sdk.frameworks.OpenAL
++ optional libpngSupport libpng ++ optional libpngSupport libpng
++ optional youtubeSupport youtube-dl ++ optional youtubeSupport youtube-dl
++ optional sdl2Support SDL2 ++ optional sdl2Support SDL2
@ -152,11 +159,12 @@ in stdenv.mkDerivation rec {
++ optional drmSupport libdrm ++ optional drmSupport libdrm
++ optional vapoursynthSupport vapoursynth ++ optional vapoursynthSupport vapoursynth
++ optional archiveSupport libarchive ++ optional archiveSupport libarchive
++ optional stdenv.isDarwin libiconv
++ optionals dvdnavSupport [ libdvdnav libdvdnav.libdvdread ] ++ optionals dvdnavSupport [ libdvdnav libdvdnav.libdvdread ]
++ optionals x11Support [ libX11 libXext libGLU_combined libXxf86vm libXrandr ] ++ optionals x11Support [ libX11 libXext libGLU_combined libXxf86vm libXrandr ]
++ optionals waylandSupport [ wayland wayland-protocols libxkbcommon ] ++ optionals waylandSupport [ wayland wayland-protocols libxkbcommon ]
++ optionals stdenv.isDarwin (with darwin.apple_sdk.frameworks; [ ++ optionals stdenv.isDarwin (with darwin.apple_sdk.frameworks; [
CoreFoundation libiconv Cocoa CoreAudio CoreFoundation Cocoa CoreAudio
]); ]);
enableParallelBuilding = true; enableParallelBuilding = true;

View File

@ -0,0 +1,25 @@
{ stdenv, fetchzip }:
let
version = "2.5";
in fetchzip {
name = "inter-ui-${version}";
url = "https://github.com/rsms/inter/releases/download/v${version}/Inter-UI-${version}.zip";
postFetch = ''
mkdir -p $out/share/fonts/opentype
unzip -j $downloadedFile \*.otf -d $out/share/fonts/opentype
'';
sha256 = "1d88y6c9vbjz5siazhavnpfpazfkvpbcbb4pdycbnj03mmx6y07v";
meta = with stdenv.lib; {
homepage = https://rsms.me/inter/;
description = "A typeface specially designed for user interfaces";
license = licenses.ofl;
platforms = platforms.all;
maintainers = with maintainers; [ demize ];
};
}

View File

@ -0,0 +1,47 @@
{ stdenv, fetchurl, meson, ninja, pkgconfig, wrapGAppsHook
, gettext, gnome3, glib, gtk, libpeas
, gnome-online-accounts, gsettings-desktop-schemas
, evolution-data-server, libxml2, libsoup, libical, rest, json-glib }:
let
pname = "gnome-todo";
version = "3.28.1";
in stdenv.mkDerivation rec {
name = "${pname}-${version}";
src = fetchurl {
url = "mirror://gnome/sources/${pname}/${gnome3.versionBranch version}/${name}.tar.xz";
sha256 = "08ygqbib72jlf9y0a16k54zz51sncpq2wa18wp81v46q8301ymy7";
};
nativeBuildInputs = [
meson ninja pkgconfig gettext wrapGAppsHook
];
buildInputs = [
glib gtk libpeas gnome-online-accounts
gsettings-desktop-schemas gnome3.defaultIconTheme
# Plug-ins
evolution-data-server libxml2 libsoup libical
rest json-glib
];
postPatch = ''
chmod +x meson_post_install.py
patchShebangs meson_post_install.py
'';
passthru = {
updateScript = gnome3.updateScript {
packageName = pname;
attrPath = "gnome3.${pname}";
};
};
meta = with stdenv.lib; {
description = "Personal task manager for GNOME";
homepage = https://wiki.gnome.org/Apps/Todo;
license = licenses.gpl3Plus;
maintainers = gnome3.maintainers;
platforms = platforms.linux;
};
}

View File

@ -21,6 +21,7 @@ stdenv.mkDerivation rec {
"--sysconfdir=/etc" "--sysconfdir=/etc"
"--localstatedir=/var" "--localstatedir=/var"
"--with-plymouth=yes" "--with-plymouth=yes"
"--enable-gdm-xsession"
"--with-initial-vt=7" "--with-initial-vt=7"
"--with-systemdsystemunitdir=$(out)/etc/systemd/system" "--with-systemdsystemunitdir=$(out)/etc/systemd/system"
]; ];

View File

@ -1,4 +1,4 @@
{ fetchurl, stdenv, meson, ninja, pkgconfig, gnome3, glib, gtk, gsettings-desktop-schemas { fetchurl, stdenv, substituteAll, meson, ninja, pkgconfig, gnome3, glib, gtk, gsettings-desktop-schemas
, gnome-desktop, dbus, json-glib, libICE, xmlto, docbook_xsl, docbook_xml_dtd_412 , gnome-desktop, dbus, json-glib, libICE, xmlto, docbook_xsl, docbook_xml_dtd_412
, libxslt, gettext, makeWrapper, systemd, xorg, epoxy }: , libxslt, gettext, makeWrapper, systemd, xorg, epoxy }:
@ -11,6 +11,15 @@ stdenv.mkDerivation rec {
sha256 = "14nmbirgrp2nm16khbz109saqdlinlbrlhjnbjydpnrlimfgg4xq"; sha256 = "14nmbirgrp2nm16khbz109saqdlinlbrlhjnbjydpnrlimfgg4xq";
}; };
patches = [
(substituteAll {
src = ./fix-paths.patch;
# FIXME: glib binaries shouldn't be in .dev!
gsettings = "${glib.dev}/bin/gsettings";
dbusLaunch = "${dbus.lib}/bin/dbus-launch";
})
];
mesonFlags = [ "-Dsystemd=true" ]; mesonFlags = [ "-Dsystemd=true" ];
nativeBuildInputs = [ nativeBuildInputs = [
@ -29,15 +38,13 @@ stdenv.mkDerivation rec {
patchShebangs meson_post_install.py patchShebangs meson_post_install.py
''; '';
# FIXME: glib binaries shouldn't be in .dev!
preFixup = '' preFixup = ''
for desktopFile in $(grep -rl "Exec=gnome-session" $out/share) for desktopFile in $(grep -rl "Exec=gnome-session" $out/share)
do do
echo "Patching gnome-session path in: $desktopFile" echo "Patching gnome-session path in: $desktopFile"
sed -i "s,^Exec=gnome-session,Exec=$out/bin/gnome-session," $desktopFile sed -i "s,Exec=gnome-session,Exec=$out/bin/gnome-session," $desktopFile
done done
wrapProgram "$out/bin/gnome-session" \ wrapProgram "$out/bin/gnome-session" \
--prefix PATH : "${glib.dev}/bin" \
--prefix GI_TYPELIB_PATH : "$GI_TYPELIB_PATH" \ --prefix GI_TYPELIB_PATH : "$GI_TYPELIB_PATH" \
--suffix XDG_DATA_DIRS : "$out/share:$GSETTINGS_SCHEMAS_PATH" \ --suffix XDG_DATA_DIRS : "$out/share:$GSETTINGS_SCHEMAS_PATH" \
--suffix XDG_DATA_DIRS : "${gnome3.gnome-shell}/share"\ --suffix XDG_DATA_DIRS : "${gnome3.gnome-shell}/share"\

View File

@ -0,0 +1,22 @@
--- a/gnome-session/gnome-session.in
+++ b/gnome-session/gnome-session.in
@@ -13,7 +13,7 @@
fi
fi
-SETTING=$(gsettings get org.gnome.system.locale region)
+SETTING=$(@gsettings@ get org.gnome.system.locale region)
REGION=${SETTING#\'}
REGION=${REGION%\'}
--- a/gnome-session/main.c
+++ b/gnome-session/main.c
@@ -203,7 +203,7 @@
}
new_argv[i + 2] = NULL;
- if (!execvp ("dbus-launch", new_argv)) {
+ if (!execvp ("@dbusLaunch@", new_argv)) {
g_set_error (error,
G_SPAWN_ERROR,
G_SPAWN_ERROR_FAILED,

View File

@ -30,7 +30,7 @@ lib.makeScope pkgs.newScope (self: with self; {
nautilus-sendto dconf-editor vinagre gnome-weather gnome-logs nautilus-sendto dconf-editor vinagre gnome-weather gnome-logs
gnome-maps gnome-characters gnome-calendar accerciser gnome-nettool gnome-maps gnome-characters gnome-calendar accerciser gnome-nettool
gnome-getting-started-docs gnome-packagekit gnome-software gnome-getting-started-docs gnome-packagekit gnome-software
gnome-power-manager gnome-usage gnome-power-manager gnome-todo gnome-usage
]; ];
gamesPackages = with gnome3; [ swell-foop lightsoff iagno gamesPackages = with gnome3; [ swell-foop lightsoff iagno
@ -291,6 +291,8 @@ lib.makeScope pkgs.newScope (self: with self; {
gnome-sound-recorder = callPackage ./apps/gnome-sound-recorder { }; gnome-sound-recorder = callPackage ./apps/gnome-sound-recorder { };
gnome-todo = callPackage ./apps/gnome-todo {};
gnome-weather = callPackage ./apps/gnome-weather { }; gnome-weather = callPackage ./apps/gnome-weather { };
nautilus-sendto = callPackage ./apps/nautilus-sendto { }; nautilus-sendto = callPackage ./apps/nautilus-sendto { };

View File

@ -10,6 +10,22 @@ stdenv.mkDerivation rec {
sha256 = "1zfx73qpw976hyzp5k569lywsq2b6dbnnzf2cvhjvn3mvkw8pin2"; sha256 = "1zfx73qpw976hyzp5k569lywsq2b6dbnnzf2cvhjvn3mvkw8pin2";
}; };
patches = [
./fix-paths.patch
];
# TODO: switch to substituteAll with placeholder
# https://github.com/NixOS/nix/issues/1846
# https://github.com/NixOS/nixpkgs/pull/37693
postPatch = ''
substituteInPlace src/gnome-shell/extension.js \
--subst-var-by typelibPath "$out/lib/girepository-1.0"
substituteInPlace src/gnome-shell/prefs.js \
--subst-var-by typelibPath "$out/lib/girepository-1.0"
substituteInPlace src/libgpaste/settings/gpaste-settings.c \
--subst-var-by gschemasCompiled "$out/share/gsettings-schemas/${name}/glib-2.0/schemas"
'';
nativeBuildInputs = [ autoreconfHook pkgconfig vala wrapGAppsHook ]; nativeBuildInputs = [ autoreconfHook pkgconfig vala wrapGAppsHook ];
buildInputs = [ glib gjs mutter gnome3.adwaita-icon-theme buildInputs = [ glib gjs mutter gnome3.adwaita-icon-theme
gtk3 gnome3.gnome-control-center dbus gtk3 gnome3.gnome-control-center dbus

View File

@ -0,0 +1,55 @@
--- a/src/gnome-shell/extension.js
+++ b/src/gnome-shell/extension.js
@@ -7,6 +7,8 @@
const Config = imports.misc.config;
+imports.gi.GIRepository.Repository.prepend_search_path('@typelibPath@');
+
imports.gi.versions.Clutter = Config.LIBMUTTER_API_VERSION;
imports.gi.versions.GLib = '2.0';
imports.gi.versions.GPaste = '1.0';
--- a/src/gnome-shell/prefs.js
+++ b/src/gnome-shell/prefs.js
@@ -7,6 +7,8 @@
const Gettext = imports.gettext;
+imports.gi.GIRepository.Repository.prepend_search_path('@typelibPath@');
+
const GPaste = imports.gi.GPaste;
const ExtensionUtils = imports.misc.extensionUtils;
--- a/src/libgpaste/settings/gpaste-settings.c
+++ b/src/libgpaste/settings/gpaste-settings.c
@@ -22,6 +22,8 @@
typedef struct
{
+ GSettingsSchemaSource *schema_source;
+ GSettingsSchema *schema;
GSettings *settings;
GSettings *shell_settings;
@@ -919,6 +921,8 @@
{
g_signal_handler_disconnect (settings, priv->c_signals[C_CHANGED]);
g_clear_object (&priv->settings);
+ g_settings_schema_unref (priv->schema);
+ g_settings_schema_source_unref (priv->schema_source);
}
if (shell_settings)
@@ -1000,7 +1004,11 @@
g_paste_settings_init (GPasteSettings *self)
{
GPasteSettingsPrivate *priv = g_paste_settings_get_instance_private (self);
- GSettings *settings = priv->settings = g_settings_new (G_PASTE_SETTINGS_NAME);
+
+ // library used by introspection requires schemas but we cannot set XDG_DATA_DIRS for the library
+ GSettingsSchemaSource *schema_source = priv->schema_source = g_settings_schema_source_new_from_directory ("@gschemasCompiled@", NULL, FALSE, NULL);
+ priv->schema = g_settings_schema_source_lookup (schema_source, G_PASTE_SETTINGS_NAME, FALSE);
+ GSettings *settings = priv->settings = g_settings_new_full (priv->schema, NULL, NULL);
priv->history_name = NULL;
priv->launch_ui = NULL;

View File

@ -1,4 +1,4 @@
{ stdenv, fetchurl, pkgconfig, intltool, gtk }: { stdenv, fetchurl, pkgconfig, intltool, gtk2 }:
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
p_name = "xfce4-icon-theme"; p_name = "xfce4-icon-theme";
@ -12,7 +12,7 @@ stdenv.mkDerivation rec {
name = "${p_name}-${ver_maj}.${ver_min}"; name = "${p_name}-${ver_maj}.${ver_min}";
nativeBuildInputs = [ pkgconfig ]; nativeBuildInputs = [ pkgconfig ];
buildInputs = [ intltool gtk ]; buildInputs = [ intltool gtk2 ];
meta = { meta = {
homepage = http://www.xfce.org/; homepage = http://www.xfce.org/;

View File

@ -1,4 +1,4 @@
{ stdenv, fetchurl, pkgconfig, intltool, libxfce4util, xfce4-panel, libxfce4ui, libxfcegui4, xfconf, gtk}: { stdenv, fetchurl, pkgconfig, intltool, libxfce4util, xfce4-panel, libxfce4ui, xfconf, gtk2 }:
with stdenv.lib; with stdenv.lib;
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
@ -13,7 +13,7 @@ stdenv.mkDerivation rec {
name = "${p_name}-${ver_maj}.${ver_min}"; name = "${p_name}-${ver_maj}.${ver_min}";
nativeBuildInputs = [ pkgconfig ]; nativeBuildInputs = [ pkgconfig ];
buildInputs = [ intltool libxfce4util libxfce4ui xfce4-panel libxfcegui4 xfconf gtk ]; buildInputs = [ intltool libxfce4util libxfce4ui xfce4-panel xfconf gtk2 ];
meta = { meta = {
homepage = "http://goodies.xfce.org/projects/panel-plugins/${p_name}"; homepage = "http://goodies.xfce.org/projects/panel-plugins/${p_name}";

View File

@ -92,4 +92,24 @@ makeScope newScope (self: with self; {
xfce4-xkb-plugin = callPackage ./xfce4-xkb-plugin { }; xfce4-xkb-plugin = callPackage ./xfce4-xkb-plugin { };
xfwm4 = callPackage ./xfwm4 { }; xfwm4 = callPackage ./xfwm4 { };
## COMMON PARTS WITH XFCE 4.12
gtk-xfce-engine = callPackage ../xfce/core/gtk-xfce-engine.nix { withGtk3 = false; };
xfce4-icon-theme = callPackage ../xfce/art/xfce4-icon-theme.nix { };
xfwm4-themes = callPackage ../xfce/art/xfwm4-themes.nix { };
xfce4-embed-plugin = callPackage ../xfce/panel-plugins/xfce4-embed-plugin.nix { };
xfce4-hardware-monitor-plugin = callPackage ../xfce/panel-plugins/xfce4-hardware-monitor-plugin.nix { };
## THIRD PARTY PLIGINS
xfce4-dockbarx-plugin = callPackage ../xfce/panel-plugins/xfce4-dockbarx-plugin.nix { };
xfce4-namebar-plugin = callPackage ../xfce/panel-plugins/xfce4-namebar-plugin.nix { };
xfce4-windowck-plugin = callPackage ../xfce/panel-plugins/xfce4-windowck-plugin.nix { };
}) })

View File

@ -1,4 +1,4 @@
{ mkXfceDerivation, docbook_xsl, exo, gtk2, libburn, libICE, libisofs, libSM, libxfce4ui, libxslt }: { mkXfceDerivation, docbook_xsl, exo, gtk2, libburn, libisofs, libxfce4ui, libxslt }:
mkXfceDerivation rec { mkXfceDerivation rec {
category = "apps"; category = "apps";
@ -14,5 +14,5 @@ mkXfceDerivation rec {
sha256 = "1lmv48vqrlap1a2ha72g16vqly18zvcwj8y3f3f00l10pmn52bkp"; sha256 = "1lmv48vqrlap1a2ha72g16vqly18zvcwj8y3f3f00l10pmn52bkp";
nativeBuildInputs = [ libxslt ]; nativeBuildInputs = [ libxslt ];
buildInputs = [ exo gtk2 libburn libICE libisofs libSM libxfce4ui ]; buildInputs = [ exo gtk2 libburn libisofs libxfce4ui ];
} }

View File

@ -1,5 +1,4 @@
{ mkXfceDerivation, automakeAddFlags, dbus-glib, gst-plugins-base, gtk2 { mkXfceDerivation, automakeAddFlags, dbus-glib, gtk2, libxfce4ui, libxfce4util, xfce4-panel, xfconf }:
, libICE, libSM, libunique, libxfce4ui, libxfce4util, xfce4-panel, xfconf }:
mkXfceDerivation rec { mkXfceDerivation rec {
category = "apps"; category = "apps";
@ -17,11 +16,7 @@ mkXfceDerivation rec {
buildInputs = [ buildInputs = [
dbus-glib dbus-glib
gst-plugins-base
gtk2 gtk2
libICE
libSM
libunique
libxfce4ui libxfce4ui
libxfce4util libxfce4util
xfce4-panel xfce4-panel

View File

@ -1,6 +1,6 @@
{ stdenv, fetchurl, jdk, gmp, readline, openssl, libjpeg, unixODBC, zlib { stdenv, fetchurl, jdk, gmp, readline, openssl, libjpeg, unixODBC, zlib
, libXinerama, libXft, libXpm, libSM, libXt, freetype, pkgconfig , libXinerama, libarchive, db, pcre, libedit, libossp_uuid, libXft, libXpm
, fontconfig, makeWrapper ? stdenv.isDarwin , libSM, libXt, freetype, pkgconfig, fontconfig, makeWrapper ? stdenv.isDarwin
}: }:
let let
@ -15,7 +15,8 @@ stdenv.mkDerivation {
}; };
buildInputs = [ jdk gmp readline openssl libjpeg unixODBC libXinerama buildInputs = [ jdk gmp readline openssl libjpeg unixODBC libXinerama
libXft libXpm libSM libXt zlib freetype pkgconfig fontconfig ] libarchive db pcre libedit libossp_uuid libXft libXpm libSM libXt
zlib freetype pkgconfig fontconfig ]
++ stdenv.lib.optional stdenv.isDarwin makeWrapper; ++ stdenv.lib.optional stdenv.isDarwin makeWrapper;
hardeningDisable = [ "format" ]; hardeningDisable = [ "format" ];
@ -46,6 +47,6 @@ stdenv.mkDerivation {
license = "LGPL"; license = "LGPL";
platforms = stdenv.lib.platforms.unix; platforms = stdenv.lib.platforms.unix;
maintainers = [ stdenv.lib.maintainers.peti ]; maintainers = [ stdenv.lib.maintainers.peti stdenv.lib.maintainers.meditans ];
}; };
} }

View File

@ -1128,4 +1128,11 @@ self: super: {
# needed because of testing-feat >=0.4.0.2 && <1.1 # needed because of testing-feat >=0.4.0.2 && <1.1
language-ecmascript = doJailbreak super.language-ecmascript; language-ecmascript = doJailbreak super.language-ecmascript;
# sexpr is old, broken and has no issue-tracker. Let's fix it the best we can.
sexpr =
appendPatch (overrideCabal super.sexpr (drv: {
isExecutable = false;
libraryHaskellDepends = drv.libraryHaskellDepends ++ [self.QuickCheck];
})) ./patches/sexpr-0.2.1.patch;
} }

View File

@ -0,0 +1,86 @@
diff -Naurw sexpr-0.2.1/Codec/Sexpr/Internal.hs sexpr-0.2.1-patched/Codec/Sexpr/Internal.hs
--- sexpr-0.2.1/Codec/Sexpr/Internal.hs 2009-04-30 00:51:06.000000000 +0200
+++ sexpr-0.2.1-patched/Codec/Sexpr/Internal.hs 2018-08-03 01:38:08.000000000 +0200
@@ -62,11 +62,6 @@
return $ List []]
arbSexpr n = oneof [Atom <$> arbitrary,
List <$> (resize (n `div` 2) arbitrary)]
- coarbitrary (Atom s) = variant 0 . coarbitrary s
- coarbitrary (HintedAtom h s) = variant 1 . coarbitrary_h . coarbitrary s
- where coarbitrary_h =
- foldr (\a b -> variant (ord a) . variant 1 . b) (variant 0) h
- coarbitrary (List ss) = variant 2 . coarbitrary ss
-- |@fold f s@ applies f to each sub-S-expression of s, from each leaf
-- to the root. @f@ need not preserve the shape of @s@, in contrast
diff -Naurw sexpr-0.2.1/Codec/Sexpr/Printer.hs sexpr-0.2.1-patched/Codec/Sexpr/Printer.hs
--- sexpr-0.2.1/Codec/Sexpr/Printer.hs 2009-04-30 00:51:06.000000000 +0200
+++ sexpr-0.2.1-patched/Codec/Sexpr/Printer.hs 2018-08-03 01:41:56.000000000 +0200
@@ -1,4 +1,4 @@
-{-# LANGUAGE FlexibleInstances, OverlappingInstances #-}
+{-# LANGUAGE FlexibleInstances #-}
-- | Export S-expressions in any of the three ordinary forms:
--
@@ -17,6 +17,8 @@
module Codec.Sexpr.Printer where
+import Prelude hiding ((<>))
+
import Codec.Sexpr.Internal
import Data.Binary.Put
@@ -30,7 +32,7 @@
instance Show (Sexpr String) where
show s = advancedString s
-instance Show s => Show (Sexpr s) where
+instance {-# OVERLAPPABLE #-} Show s => Show (Sexpr s) where
show s = advancedString $ fmap show s
raw :: String -> String -> String
diff -Naurw sexpr-0.2.1/Codec/Sexpr/Tests.hs sexpr-0.2.1-patched/Codec/Sexpr/Tests.hs
--- sexpr-0.2.1/Codec/Sexpr/Tests.hs 2009-04-30 00:51:06.000000000 +0200
+++ sexpr-0.2.1-patched/Codec/Sexpr/Tests.hs 2018-08-03 01:46:32.000000000 +0200
@@ -67,11 +67,9 @@
instance Arbitrary B.ByteString where
arbitrary = B.pack `fmap` arbitrary
- coarbitrary = undefined
instance Arbitrary Char where
arbitrary = choose (32,255) >>= \n -> return (chr n)
- coarbitrary n = variant (ord n)
main :: IO ()
diff -Naurw sexpr-0.2.1/sexpr.cabal sexpr-0.2.1-patched/sexpr.cabal
--- sexpr-0.2.1/sexpr.cabal 2018-08-03 01:36:11.000000000 +0200
+++ sexpr-0.2.1-patched/sexpr.cabal 2018-08-03 01:49:13.000000000 +0200
@@ -13,23 +13,9 @@
maintainer: bts@evenmere.org
build-type: Simple
-flag testing
- description: build test executable
- default: False
-
library
- if flag(testing)
- ghc-options: -Wall
- Build-Depends: base, base64-string, pretty, bytestring, binary
+ Build-Depends: base, base64-string, pretty, bytestring, binary, QuickCheck
Exposed-modules: Codec.Sexpr
-
-executable sexpr-test
- if !flag(testing)
- buildable: False
- ghc-options: -Wall
- main-is: Codec/Sexpr/Tests.hs
- other-modules: Codec.Sexpr
- Codec.Sexpr.Parser
+ other-modules: Codec.Sexpr.Parser
Codec.Sexpr.Printer
Codec.Sexpr.Internal
- build-depends: QuickCheck, random

View File

@ -1,5 +1,5 @@
{ stdenv, fetchFromGitHub, zlib, curl, expat, fuse, openssl { stdenv, fetchFromGitHub, zlib, curl, expat, fuse, openssl
, autoreconfHook, python , autoreconfHook, python3
}: }:
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
@ -14,7 +14,7 @@ stdenv.mkDerivation rec {
}; };
nativeBuildInputs = [ autoreconfHook ]; nativeBuildInputs = [ autoreconfHook ];
buildInputs = [ zlib curl expat fuse openssl python ]; buildInputs = [ zlib curl expat fuse openssl python3 ];
meta = { meta = {
homepage = http://afflib.sourceforge.net/; homepage = http://afflib.sourceforge.net/;

View File

@ -24,6 +24,7 @@ in stdenv.mkDerivation rec {
}) })
# patch taken from gtk_doc # patch taken from gtk_doc
./respect-xml-catalog-files-var.patch ./respect-xml-catalog-files-var.patch
./use-flatpak-from-path.patch
]; ];
nativeBuildInputs = [ nativeBuildInputs = [

View File

@ -0,0 +1,48 @@
--- a/common/flatpak-dir.c
+++ b/common/flatpak-dir.c
@@ -5467,7 +5467,7 @@ export_desktop_file (const char *app,
new_exec = g_string_new ("");
g_string_append_printf (new_exec,
- FLATPAK_BINDIR "/flatpak run --branch=%s --arch=%s",
+ "flatpak run --branch=%s --arch=%s",
escaped_branch,
escaped_arch);
@@ -6644,8 +6644,8 @@ flatpak_dir_deploy (FlatpakDir *self,
error))
return FALSE;
- bin_data = g_strdup_printf ("#!/bin/sh\nexec %s/flatpak run --branch=%s --arch=%s %s \"$@\"\n",
- FLATPAK_BINDIR, escaped_branch, escaped_arch, escaped_app);
+ bin_data = g_strdup_printf ("#!/bin/sh\nexec flatpak run --branch=%s --arch=%s %s \"$@\"\n",
+ escaped_branch, escaped_arch, escaped_app);
if (!g_file_replace_contents (wrapper, bin_data, strlen (bin_data), NULL, FALSE,
G_FILE_CREATE_REPLACE_DESTINATION, NULL, cancellable, error))
return FALSE;
diff --git a/tests/test-bundle.sh b/tests/test-bundle.sh
index 6937b041..01f8add7 100755
--- a/tests/test-bundle.sh
+++ b/tests/test-bundle.sh
@@ -59,7 +59,7 @@ assert_has_dir $FL_DIR/app/org.test.Hello/$ARCH/master/active/files
assert_has_dir $FL_DIR/app/org.test.Hello/$ARCH/master/active/export
assert_has_file $FL_DIR/exports/share/applications/org.test.Hello.desktop
# Ensure Exec key is rewritten
-assert_file_has_content $FL_DIR/exports/share/applications/org.test.Hello.desktop "^Exec=.*/flatpak run --branch=master --arch=$ARCH --command=hello.sh org.test.Hello$"
+assert_file_has_content $FL_DIR/exports/share/applications/org.test.Hello.desktop "^Exec=flatpak run --branch=master --arch=$ARCH --command=hello.sh org.test.Hello$"
assert_has_file $FL_DIR/exports/share/icons/hicolor/64x64/apps/org.test.Hello.png
assert_has_file $FL_DIR/exports/share/icons/HighContrast/64x64/apps/org.test.Hello.png
diff --git a/tests/test-run.sh b/tests/test-run.sh
index 9d83d82e..234e4ec6 100755
--- a/tests/test-run.sh
+++ b/tests/test-run.sh
@@ -42,7 +42,7 @@ assert_has_dir $FL_DIR/app/org.test.Hello/$ARCH/master/active/files
assert_has_dir $FL_DIR/app/org.test.Hello/$ARCH/master/active/export
assert_has_file $FL_DIR/exports/share/applications/org.test.Hello.desktop
# Ensure Exec key is rewritten
-assert_file_has_content $FL_DIR/exports/share/applications/org.test.Hello.desktop "^Exec=.*/flatpak run --branch=master --arch=$ARCH --command=hello.sh org.test.Hello$"
+assert_file_has_content $FL_DIR/exports/share/applications/org.test.Hello.desktop "^Exec=flatpak run --branch=master --arch=$ARCH --command=hello.sh org.test.Hello$"
assert_has_file $FL_DIR/exports/share/icons/hicolor/64x64/apps/org.test.Hello.png
assert_not_has_file $FL_DIR/exports/share/icons/hicolor/64x64/apps/dont-export.png
assert_has_file $FL_DIR/exports/share/icons/HighContrast/64x64/apps/org.test.Hello.png

View File

@ -34,6 +34,8 @@ in stdenv.mkDerivation (rec {
postPatch = '' postPatch = ''
sed '/BUILD_TIMESTAMP=/s/=.*/=1970-01-01T00:01+0000/' -i ./configure sed '/BUILD_TIMESTAMP=/s/=.*/=1970-01-01T00:01+0000/' -i ./configure
'' + lib.optionalString (stdenv.hostPlatform.isArm && stdenv.buildPlatform != stdenv.hostPlatform ) ''
ln -s lock-obj-pub.arm-unknown-linux-gnueabi.h src/syscfg/lock-obj-pub.linux-gnueabihf.h
'' + lib.optionalString stdenv.hostPlatform.isMusl '' '' + lib.optionalString stdenv.hostPlatform.isMusl ''
ln -s lock-obj-pub.x86_64-pc-linux-musl.h src/syscfg/lock-obj-pub.linux-musl.h ln -s lock-obj-pub.x86_64-pc-linux-musl.h src/syscfg/lock-obj-pub.linux-musl.h
''; '';

View File

@ -10,7 +10,11 @@ stdenv.mkDerivation {
sha256= "11a615225baa5f8bb686824423f50e4427acd3f70d394765bdff32801f0fd5b0"; sha256= "11a615225baa5f8bb686824423f50e4427acd3f70d394765bdff32801f0fd5b0";
}; };
configureFlags = stdenv.lib.optional stdenv.isFreeBSD "--with-pic"; configureFlags = [
"ac_cv_va_copy=yes"
] ++ stdenv.lib.optional stdenv.isFreeBSD "--with-pic";
patches = [ ./shtool.patch ];
meta = with stdenv.lib; { meta = with stdenv.lib; {
homepage = http://www.ossp.org/pkg/lib/uuid/; homepage = http://www.ossp.org/pkg/lib/uuid/;

View File

@ -0,0 +1,11 @@
--- a/shtool 2008-07-05 05:43:08.000000000 +0800
+++ b/shtool 2018-07-25 15:45:40.559587471 +0800
@@ -1400,7 +1400,7 @@
if [ ".$opt_t" = .yes ]; then
echo "strip $dsttmp" 1>&2
fi
- strip $dsttmp || shtool_exit $?
+ $STRIP $dsttmp || shtool_exit $?
fi
if [ ".$opt_o" != . ]; then
if [ ".$opt_t" = .yes ]; then

View File

@ -21,7 +21,9 @@ stdenv.mkDerivation rec {
enableParallelBuilding = true; enableParallelBuilding = true;
patchPhase = lib.optionalString stdenv.isDarwin '' patchPhase = ''
patch -p1 < ${./pcre.patch}
'' + lib.optionalString stdenv.isDarwin ''
substituteInPlace GeneratedSaxParser/src/GeneratedSaxParserUtils.cpp \ substituteInPlace GeneratedSaxParser/src/GeneratedSaxParserUtils.cpp \
--replace math.h cmath --replace math.h cmath
''; '';

View File

@ -0,0 +1,14 @@
diff --git a/COLLADABaseUtils/include/COLLADABUPcreCompiledPattern.h b/COLLADABaseUtils/include/COLLADABUPcreCompiledPattern.h
index 22f2598b..269c50ca 100644
--- a/COLLADABaseUtils/include/COLLADABUPcreCompiledPattern.h
+++ b/COLLADABaseUtils/include/COLLADABUPcreCompiledPattern.h
@@ -13,8 +13,7 @@
#include "COLLADABUPrerequisites.h"
-struct real_pcre;
-typedef struct real_pcre pcre;
+#include "pcre.h"
namespace COLLADABU

View File

@ -0,0 +1,30 @@
{ stdenv, fetchurl, unzip, ... }: stdenv.mkDerivation rec {
name = "scriptaculous-${version}";
version = "1.9.0";
src = fetchurl {
url = "https://script.aculo.us/dist/scriptaculous-js-${version}.zip";
sha256 = "1xpnk3cq8n07lxd69k5jxh48s21zh41ihq10z4a6lcnk238rp8qz";
};
nativeBuildInputs = [ unzip ];
installPhase = ''
mkdir $out
cp src/*.js $out
'';
meta = with stdenv.lib; {
description = "A set of JavaScript libraries to enhance the user interface of web sites";
longDescription = ''
script.aculo.us provides you with
easy-to-use, cross-browser user
interface JavaScript libraries to make
your web sites and web applications fly.
'';
homepage = https://script.aculo.us/;
downloadPage = https://script.aculo.us/dist/;
license = licenses.mit;
maintainers = with maintainers; [ das_j ];
};
}

View File

@ -0,0 +1,29 @@
{ stdenv, fetchFromGitHub, ... }: stdenv.mkDerivation rec {
name = "smarty3-${version}";
version = "3.1.32";
src = fetchFromGitHub {
owner = "smarty-php";
repo = "smarty";
rev = "v${version}";
sha256 = "1rfa5pzr23db1bivpivljgmgpn99m6ksgli64kmii5cmpvxi00y2";
};
installPhase = ''
mkdir $out
cp -r libs/* $out
'';
meta = with stdenv.lib; {
description = "Smarty 3 template engine";
longDescription = ''
Smarty is a template engine for PHP, facilitating the
separation of presentation (HTML/CSS) from application
logic. This implies that PHP code is application
logic, and is separated from the presentation.
'';
homepage = https://www.smarty.net;
license = licenses.lgpl21Plus;
maintainers = with maintainers; [ das_j ];
};
}

View File

@ -1,4 +1,4 @@
{ stdenv, fetchgit, python, androidsdk, makeWrapper }: { stdenv, fetchgit, python3, androidsdk, makeWrapper }:
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
name = "adb-sync-${version}"; name = "adb-sync-${version}";
@ -10,7 +10,7 @@ stdenv.mkDerivation rec {
sha256 = "1y016bjky5sn58v91jyqfz7vw8qfqnfhb9s9jd32k8y29hy5vy4d"; sha256 = "1y016bjky5sn58v91jyqfz7vw8qfqnfhb9s9jd32k8y29hy5vy4d";
}; };
buildInputs = [ python androidsdk makeWrapper ]; buildInputs = [ python3 androidsdk makeWrapper ];
phases = "installPhase"; phases = "installPhase";

View File

@ -56,7 +56,7 @@ let
) dependencies); ) dependencies);
# Recursively composes the dependencies of a package # Recursively composes the dependencies of a package
composePackage = { name, packageName, src, dependencies ? [], ... }: composePackage = { name, packageName, src, dependencies ? [], ... }@args:
'' ''
DIR=$(pwd) DIR=$(pwd)
cd $TMPDIR cd $TMPDIR
@ -176,7 +176,7 @@ let
# dependencies in the package.json file to the versions that are actually # dependencies in the package.json file to the versions that are actually
# being used. # being used.
pinpointDependenciesOfPackage = { packageName, dependencies ? [], production ? true, ... }: pinpointDependenciesOfPackage = { packageName, dependencies ? [], production ? true, ... }@args:
'' ''
if [ -d "${packageName}" ] if [ -d "${packageName}" ]
then then

View File

@ -213,10 +213,10 @@ in
pnpm = nodeEnv.buildNodePackage { pnpm = nodeEnv.buildNodePackage {
name = "pnpm"; name = "pnpm";
packageName = "pnpm"; packageName = "pnpm";
version = "2.11.2"; version = "2.12.2";
src = fetchurl { src = fetchurl {
url = "https://registry.npmjs.org/pnpm/-/pnpm-2.11.2.tgz"; url = "https://registry.npmjs.org/pnpm/-/pnpm-2.12.2.tgz";
sha1 = "fc7235c2ec82a6ede6caf47485a68a2c6fa2e1f5"; sha1 = "1b575512ae27d767f4aaec14e94b18e0c70bcc7b";
}; };
buildInputs = globalBuildInputs; buildInputs = globalBuildInputs;
meta = { meta = {

View File

@ -30,6 +30,7 @@
, "forever" , "forever"
, "git-run" , "git-run"
, "git-standup" , "git-standup"
, "graphql-cli"
, "grunt-cli" , "grunt-cli"
, { "guifi-earth": "https://github.com/jmendeth/guifi-earth/tarball/f3ee96835fd4fb0e3e12fadbd2cb782770d64854 " } , { "guifi-earth": "https://github.com/jmendeth/guifi-earth/tarball/f3ee96835fd4fb0e3e12fadbd2cb782770d64854 " }
, "gulp" , "gulp"

File diff suppressed because it is too large Load Diff

View File

@ -22,13 +22,13 @@ let
sha512 = "wOLMflfsszUXej5wSNxo06VgFqeWZ/GQFz/OzcrHv4r3oXvBsFh9KyyvIV6kOLpaZ+8bkOwBWbpGbJZWK00NFQ=="; sha512 = "wOLMflfsszUXej5wSNxo06VgFqeWZ/GQFz/OzcrHv4r3oXvBsFh9KyyvIV6kOLpaZ+8bkOwBWbpGbJZWK00NFQ==";
}; };
}; };
"@cycle/isolate-3.3.0" = { "@cycle/isolate-3.4.0" = {
name = "_at_cycle_slash_isolate"; name = "_at_cycle_slash_isolate";
packageName = "@cycle/isolate"; packageName = "@cycle/isolate";
version = "3.3.0"; version = "3.4.0";
src = fetchurl { src = fetchurl {
url = "https://registry.npmjs.org/@cycle/isolate/-/isolate-3.3.0.tgz"; url = "https://registry.npmjs.org/@cycle/isolate/-/isolate-3.4.0.tgz";
sha512 = "WFbEhrS1+Wx7VrJtGnjE/TQ1GtSoxQi6mBcFgqh8CwFu9FRxbNk1QL5rrwel250m+zEcwRmxo+kUwtJSlj4DCA=="; sha512 = "mOAlwLeTr6wTdHwKWAfaFeuKeD540kKcJlLVKsqLhbfLp6orF1B3CzMfFNlmqNY30t6o6TORCFfV+0EATK9Y7Q==";
}; };
}; };
"@cycle/run-3.4.0" = { "@cycle/run-3.4.0" = {
@ -40,6 +40,15 @@ let
sha512 = "YUZyPu0nC4YDC31mLH5PGxbMoPEH5dNEV+nmgt34GgGgJ0ykDd4PrY7/ph5MAEpQE6rOfov0VN44qQRs6beQow=="; sha512 = "YUZyPu0nC4YDC31mLH5PGxbMoPEH5dNEV+nmgt34GgGgJ0ykDd4PrY7/ph5MAEpQE6rOfov0VN44qQRs6beQow==";
}; };
}; };
"@cycle/run-4.4.0" = {
name = "_at_cycle_slash_run";
packageName = "@cycle/run";
version = "4.4.0";
src = fetchurl {
url = "https://registry.npmjs.org/@cycle/run/-/run-4.4.0.tgz";
sha512 = "vVxnTqKKlgasE+we9X2z3og8z5KouO2RMiIgHWkVek+NomsdaeZwfvbutqzm3VToEImaz0DE2Iln9AxtCOVjpQ==";
};
};
"@cycle/time-0.10.1" = { "@cycle/time-0.10.1" = {
name = "_at_cycle_slash_time"; name = "_at_cycle_slash_time";
packageName = "@cycle/time"; packageName = "@cycle/time";
@ -49,13 +58,13 @@ let
sha1 = "cbc4b9a68981bf0b501ccd06a9058acd65309bf7"; sha1 = "cbc4b9a68981bf0b501ccd06a9058acd65309bf7";
}; };
}; };
"@types/node-10.5.2" = { "@types/node-10.5.5" = {
name = "_at_types_slash_node"; name = "_at_types_slash_node";
packageName = "@types/node"; packageName = "@types/node";
version = "10.5.2"; version = "10.5.5";
src = fetchurl { src = fetchurl {
url = "https://registry.npmjs.org/@types/node/-/node-10.5.2.tgz"; url = "https://registry.npmjs.org/@types/node/-/node-10.5.5.tgz";
sha512 = "m9zXmifkZsMHZBOyxZWilMwmTlpC8x5Ty360JKTiXvlXZfBWYpsg9ZZvP/Ye+iZUh+Q+MxDLjItVTWIsfwz+8Q=="; sha512 = "6Qnb1gXbp3g1JX9QVJj3A6ORzc9XCyhokxUKaoonHgNXcQhmk8adhotxfkeK8El9TnFeUuH72yI6jQ5nDJKS6w==";
}; };
}; };
"@types/superagent-3.5.6" = { "@types/superagent-3.5.6" = {
@ -409,13 +418,13 @@ let
sha1 = "898508da2226f380df904728456849c1501a4b0d"; sha1 = "898508da2226f380df904728456849c1501a4b0d";
}; };
}; };
"asn1-0.2.3" = { "asn1-0.2.4" = {
name = "asn1"; name = "asn1";
packageName = "asn1"; packageName = "asn1";
version = "0.2.3"; version = "0.2.4";
src = fetchurl { src = fetchurl {
url = "https://registry.npmjs.org/asn1/-/asn1-0.2.3.tgz"; url = "https://registry.npmjs.org/asn1/-/asn1-0.2.4.tgz";
sha1 = "dac8787713c9966849fc8180777ebe9c1ddf3b86"; sha512 = "jxwzQpLQjSmWXgwaCZE9Nz+glAG01yF1QnWgbhGwHI5A6FRIEY6IVqtHhIepHqI7/kyEyQEagBC5mBEFlIYvdg==";
}; };
}; };
"assert-plus-0.2.0" = { "assert-plus-0.2.0" = {
@ -805,13 +814,13 @@ let
sha1 = "f8f78b76789888ef39f205cd637f68e702122b2c"; sha1 = "f8f78b76789888ef39f205cd637f68e702122b2c";
}; };
}; };
"buffer-from-1.1.0" = { "buffer-from-1.1.1" = {
name = "buffer-from"; name = "buffer-from";
packageName = "buffer-from"; packageName = "buffer-from";
version = "1.1.0"; version = "1.1.1";
src = fetchurl { src = fetchurl {
url = "https://registry.npmjs.org/buffer-from/-/buffer-from-1.1.0.tgz"; url = "https://registry.npmjs.org/buffer-from/-/buffer-from-1.1.1.tgz";
sha512 = "c5mRlguI/Pe2dSZmpER62rSCu0ryKmWddzRYsuXc50U2/g8jMOulc31VZMa4mYx31U5xsmSOpDCgH88Vl9cDGQ=="; sha512 = "MQcXEUbCKtEo7bhqEs6560Hyd4XaovZlO/k9V3hjVUF/zwW7KBVdSK4gIt/bzwS9MbR5qob+F5jusZsb0YQK2A==";
}; };
}; };
"builtins-1.0.3" = { "builtins-1.0.3" = {
@ -1246,13 +1255,13 @@ let
sha1 = "0433f44d809680fdeb60ed260f1b0c262e82a40b"; sha1 = "0433f44d809680fdeb60ed260f1b0c262e82a40b";
}; };
}; };
"colors-1.3.0" = { "colors-1.3.1" = {
name = "colors"; name = "colors";
packageName = "colors"; packageName = "colors";
version = "1.3.0"; version = "1.3.1";
src = fetchurl { src = fetchurl {
url = "https://registry.npmjs.org/colors/-/colors-1.3.0.tgz"; url = "https://registry.npmjs.org/colors/-/colors-1.3.1.tgz";
sha512 = "EDpX3a7wHMWFA7PUHWPHNWqOxIIRSJetuwl0AS5Oi/5FMV8kWm69RTlgm00GKjBO1xFHMtBbL49yRtMMdticBw=="; sha512 = "jg/vxRmv430jixZrC+La5kMbUWqIg32/JsYNZb94+JEmzceYbWKTsv1OuTp+7EaqiaWRR2tPcykibwCRgclIsw==";
}; };
}; };
"combine-errors-3.0.3" = { "combine-errors-3.0.3" = {
@ -2038,13 +2047,13 @@ let
sha512 = "fO3Di4tBKJpYTFHAxTU00BcfWMY9w24r/x21a6rZRbsD/ToUgGxsMbiGRmB7uVAXeGKXD9MwiLZa5E97EVgIRQ=="; sha512 = "fO3Di4tBKJpYTFHAxTU00BcfWMY9w24r/x21a6rZRbsD/ToUgGxsMbiGRmB7uVAXeGKXD9MwiLZa5E97EVgIRQ==";
}; };
}; };
"ecc-jsbn-0.1.1" = { "ecc-jsbn-0.1.2" = {
name = "ecc-jsbn"; name = "ecc-jsbn";
packageName = "ecc-jsbn"; packageName = "ecc-jsbn";
version = "0.1.1"; version = "0.1.2";
src = fetchurl { src = fetchurl {
url = "https://registry.npmjs.org/ecc-jsbn/-/ecc-jsbn-0.1.1.tgz"; url = "https://registry.npmjs.org/ecc-jsbn/-/ecc-jsbn-0.1.2.tgz";
sha1 = "0fc73a9ed5f0d53c38193398523ef7e543777505"; sha1 = "3a83a904e54353287874c564b7549386849a98c9";
}; };
}; };
"ee-first-1.1.0" = { "ee-first-1.1.0" = {
@ -2254,13 +2263,13 @@ let
sha1 = "5a474353b9f3353ddd8176dfd37b91c83a46f1d4"; sha1 = "5a474353b9f3353ddd8176dfd37b91c83a46f1d4";
}; };
}; };
"extend-3.0.1" = { "extend-3.0.2" = {
name = "extend"; name = "extend";
packageName = "extend"; packageName = "extend";
version = "3.0.1"; version = "3.0.2";
src = fetchurl { src = fetchurl {
url = "https://registry.npmjs.org/extend/-/extend-3.0.1.tgz"; url = "https://registry.npmjs.org/extend/-/extend-3.0.2.tgz";
sha1 = "a755ea7bc1adfcc5a31ce7e762dbaadc5e636444"; sha512 = "fjquC59cD7CyW6urNXK0FBufkZcoiGG80wTuPujX590cB5Ttln20E2UB4S/WARVqhXffZl2LNgS+gQdPIIim/g==";
}; };
}; };
"extend-shallow-2.0.1" = { "extend-shallow-2.0.1" = {
@ -3073,13 +3082,13 @@ let
sha1 = "9aecd925114772f3d95b65a60abb8f7c18fbace1"; sha1 = "9aecd925114772f3d95b65a60abb8f7c18fbace1";
}; };
}; };
"hypercore-6.17.3" = { "hypercore-6.18.1" = {
name = "hypercore"; name = "hypercore";
packageName = "hypercore"; packageName = "hypercore";
version = "6.17.3"; version = "6.18.1";
src = fetchurl { src = fetchurl {
url = "https://registry.npmjs.org/hypercore/-/hypercore-6.17.3.tgz"; url = "https://registry.npmjs.org/hypercore/-/hypercore-6.18.1.tgz";
sha512 = "BJwZ4bRV3tYG3R+iE3ydW3GWpZrPLbi86I75qUg9bQ5jMWgwdh+llKgYFvSJhJtoT/MVxrcuXFDkuHiJ0GYMvw=="; sha512 = "pH2t3ehdTfe/FFrwVq+6w7L9NoWEnFO9Yxix2kj43vSLMHTWCUFdOCJ9/MaOUAG4OeYy4tiT4+IE5NP0bff6Mg==";
}; };
}; };
"hypercore-crypto-1.0.0" = { "hypercore-crypto-1.0.0" = {
@ -4594,22 +4603,22 @@ let
sha512 = "OEUllcVoydBHGN1z84yfQDimn58pZNNNXgZlHXSboxMlFvgI6MXSWpWKpFRra7H1HxpVhHTkrghfRW49k6yjeg=="; sha512 = "OEUllcVoydBHGN1z84yfQDimn58pZNNNXgZlHXSboxMlFvgI6MXSWpWKpFRra7H1HxpVhHTkrghfRW49k6yjeg==";
}; };
}; };
"mime-db-1.33.0" = { "mime-db-1.35.0" = {
name = "mime-db"; name = "mime-db";
packageName = "mime-db"; packageName = "mime-db";
version = "1.33.0"; version = "1.35.0";
src = fetchurl { src = fetchurl {
url = "https://registry.npmjs.org/mime-db/-/mime-db-1.33.0.tgz"; url = "https://registry.npmjs.org/mime-db/-/mime-db-1.35.0.tgz";
sha512 = "BHJ/EKruNIqJf/QahvxwQZXKygOQ256myeN/Ew+THcAa5q+PjyTTMMeNQC4DZw5AwfvelsUrA6B67NKMqXDbzQ=="; sha512 = "JWT/IcCTsB0Io3AhWUMjRqucrHSPsSf2xKLaRldJVULioggvkJvggZ3VXNNSRkCddE6D+BUI4HEIZIA2OjwIvg==";
}; };
}; };
"mime-types-2.1.18" = { "mime-types-2.1.19" = {
name = "mime-types"; name = "mime-types";
packageName = "mime-types"; packageName = "mime-types";
version = "2.1.18"; version = "2.1.19";
src = fetchurl { src = fetchurl {
url = "https://registry.npmjs.org/mime-types/-/mime-types-2.1.18.tgz"; url = "https://registry.npmjs.org/mime-types/-/mime-types-2.1.19.tgz";
sha512 = "lc/aahn+t4/SWV/qcmumYjymLsWfN3ELhpmVuUFjgsORruuZPVSwAQryq+HHGvO/SI2KVX26bx+En+zhM8g8hQ=="; sha512 = "P1tKYHVSZ6uFo26mtnve4HQFE3koh1UWVkp8YUC+ESBHe945xWSoXuHHiGarDqcEZ+whpCDnlNw5LON0kLo+sw==";
}; };
}; };
"mimic-fn-1.2.0" = { "mimic-fn-1.2.0" = {
@ -4990,13 +4999,13 @@ let
sha512 = "YoviGBJYGrPdLOKDIQB0sKxuKy/EEsxzooNkOZak4vSTKT/qH0Pa6dj3t1MJjEQGsefih61IyHDmO1WW7xOFfw=="; sha512 = "YoviGBJYGrPdLOKDIQB0sKxuKy/EEsxzooNkOZak4vSTKT/qH0Pa6dj3t1MJjEQGsefih61IyHDmO1WW7xOFfw==";
}; };
}; };
"nodemon-1.18.2" = { "nodemon-1.18.3" = {
name = "nodemon"; name = "nodemon";
packageName = "nodemon"; packageName = "nodemon";
version = "1.18.2"; version = "1.18.3";
src = fetchurl { src = fetchurl {
url = "https://registry.npmjs.org/nodemon/-/nodemon-1.18.2.tgz"; url = "https://registry.npmjs.org/nodemon/-/nodemon-1.18.3.tgz";
sha512 = "FKuvzVurERMgX231T9KexWWWopjd93vapFY8rLn2JlPZ58uCW2s7U8utKElpGUEAqU5Y33///KFza5O9ndVRHQ=="; sha512 = "XdVfAjGlDKU2nqoGgycxTndkJ5fdwvWJ/tlMGk2vHxMZBrSPVh86OM6z7viAv8BBJWjMgeuYQBofzr6LUoi+7g==";
}; };
}; };
"nopt-1.0.10" = { "nopt-1.0.10" = {
@ -5053,13 +5062,13 @@ let
sha512 = "Yic4bZHJOt9RCFbRP3GgpqhScOY4HH3V2P8yBj6CeYq118Qr+BLXqT2JvpJ00mryLESpgOxf5XlFv4ZjXxLScw=="; sha512 = "Yic4bZHJOt9RCFbRP3GgpqhScOY4HH3V2P8yBj6CeYq118Qr+BLXqT2JvpJ00mryLESpgOxf5XlFv4ZjXxLScw==";
}; };
}; };
"npm-packlist-1.1.10" = { "npm-packlist-1.1.11" = {
name = "npm-packlist"; name = "npm-packlist";
packageName = "npm-packlist"; packageName = "npm-packlist";
version = "1.1.10"; version = "1.1.11";
src = fetchurl { src = fetchurl {
url = "https://registry.npmjs.org/npm-packlist/-/npm-packlist-1.1.10.tgz"; url = "https://registry.npmjs.org/npm-packlist/-/npm-packlist-1.1.11.tgz";
sha512 = "AQC0Dyhzn4EiYEfIUjCdMl0JJ61I2ER9ukf/sLxJUcZHfo+VyEfz2rMJgLZSS1v30OxPQe1cN0LZA1xbcaVfWA=="; sha512 = "CxKlZ24urLkJk+9kCm48RTQ7L4hsmgSVzEk0TLGPzzyuFxD7VNgy5Sl24tOLMzQv773a/NeJ1ce1DKeacqffEA==";
}; };
}; };
"npm-run-path-2.0.2" = { "npm-run-path-2.0.2" = {
@ -5656,6 +5665,15 @@ let
sha512 = "N5ZAX4/LxJmF+7wN74pUD6qAh9/wnvdQcjq9TZjevvXzSUo7bfmw91saqMjzGS2xq91/odN2dW/WOl7qQHNDGA=="; sha512 = "N5ZAX4/LxJmF+7wN74pUD6qAh9/wnvdQcjq9TZjevvXzSUo7bfmw91saqMjzGS2xq91/odN2dW/WOl7qQHNDGA==";
}; };
}; };
"quicktask-1.1.0" = {
name = "quicktask";
packageName = "quicktask";
version = "1.1.0";
src = fetchurl {
url = "https://registry.npmjs.org/quicktask/-/quicktask-1.1.0.tgz";
sha512 = "b3w19IEXnt5auacLAbePVsqPyVQUwmuhJQrrWnVhm4pP8PAMg2U9vFHbAD9XYXXbMDjdLJs0x5NLqwTV8uFK4g==";
};
};
"raf-3.3.2" = { "raf-3.3.2" = {
name = "raf"; name = "raf";
packageName = "raf"; packageName = "raf";
@ -6574,13 +6592,13 @@ let
sha1 = "4d5e433c185261dde623ca3f44c586bcf5c4ad14"; sha1 = "4d5e433c185261dde623ca3f44c586bcf5c4ad14";
}; };
}; };
"stream-each-1.2.2" = { "stream-each-1.2.3" = {
name = "stream-each"; name = "stream-each";
packageName = "stream-each"; packageName = "stream-each";
version = "1.2.2"; version = "1.2.3";
src = fetchurl { src = fetchurl {
url = "https://registry.npmjs.org/stream-each/-/stream-each-1.2.2.tgz"; url = "https://registry.npmjs.org/stream-each/-/stream-each-1.2.3.tgz";
sha512 = "mc1dbFhGBxvTM3bIWmAAINbqiuAk9TATcfIQC8P+/+HJefgaiTlMn2dHvkX8qlI12KeYKSQ1Ua9RrIqrn1VPoA=="; sha512 = "vlMC2f8I2u/bZGqkdfLQW/13Zihpej/7PmSiMQsbYddxuTsJp8vRe2x2FvVExZg7FaOds43ROAuFJwPR4MTZLw==";
}; };
}; };
"stream-parser-0.3.1" = { "stream-parser-0.3.1" = {
@ -6844,13 +6862,13 @@ let
sha1 = "8e4d2a256c0e2185c6b18ad694aec968b83cb1d1"; sha1 = "8e4d2a256c0e2185c6b18ad694aec968b83cb1d1";
}; };
}; };
"tar-4.4.4" = { "tar-4.4.6" = {
name = "tar"; name = "tar";
packageName = "tar"; packageName = "tar";
version = "4.4.4"; version = "4.4.6";
src = fetchurl { src = fetchurl {
url = "https://registry.npmjs.org/tar/-/tar-4.4.4.tgz"; url = "https://registry.npmjs.org/tar/-/tar-4.4.6.tgz";
sha512 = "mq9ixIYfNF9SK0IS/h2HKMu8Q2iaCuhDDsZhdEag/FHv8fOaYld4vN7ouMgcSSt5WKZzPs8atclTcJm36OTh4w=="; sha512 = "tMkTnh9EdzxyfW+6GK6fCahagXsnYk6kE6S9Gr9pjVdys769+laCTbodXDhPAjzVtEBazRgP0gYqOjnk9dQzLg==";
}; };
}; };
"tar-stream-1.6.1" = { "tar-stream-1.6.1" = {
@ -7429,13 +7447,13 @@ let
sha1 = "5fa912d81eb7d0c74afc140de7317f0ca7df437e"; sha1 = "5fa912d81eb7d0c74afc140de7317f0ca7df437e";
}; };
}; };
"validator-10.4.0" = { "validator-10.5.0" = {
name = "validator"; name = "validator";
packageName = "validator"; packageName = "validator";
version = "10.4.0"; version = "10.5.0";
src = fetchurl { src = fetchurl {
url = "https://registry.npmjs.org/validator/-/validator-10.4.0.tgz"; url = "https://registry.npmjs.org/validator/-/validator-10.5.0.tgz";
sha512 = "Q/wBy3LB1uOyssgNlXSRmaf22NxjvDNZM2MtIQ4jaEOAB61xsh1TQxsq1CgzUMBV1lDrVMogIh8GjG1DYW0zLg=="; sha512 = "6OOi+eV2mOxCFLq0f2cJDrdB6lrtLXEUxabhNRGjgOLT/l3SSll9J49Cl+LIloUqkWWTPraK/mucEQ3dc2jStQ==";
}; };
}; };
"variable-diff-1.1.0" = { "variable-diff-1.1.0" = {
@ -7738,10 +7756,14 @@ in
dependencies = [ dependencies = [
sources."@cycle/dom-18.3.0" sources."@cycle/dom-18.3.0"
sources."@cycle/http-14.9.0" sources."@cycle/http-14.9.0"
sources."@cycle/isolate-3.3.0" (sources."@cycle/isolate-3.4.0" // {
dependencies = [
sources."@cycle/run-4.4.0"
];
})
sources."@cycle/run-3.4.0" sources."@cycle/run-3.4.0"
sources."@cycle/time-0.10.1" sources."@cycle/time-0.10.1"
sources."@types/node-10.5.2" sources."@types/node-10.5.5"
sources."@types/superagent-3.5.6" sources."@types/superagent-3.5.6"
sources."ansi-escapes-3.1.0" sources."ansi-escapes-3.1.0"
sources."ansi-regex-2.1.1" sources."ansi-regex-2.1.1"
@ -7777,7 +7799,7 @@ in
sources."es6-symbol-3.1.1" sources."es6-symbol-3.1.1"
sources."escape-string-regexp-1.0.5" sources."escape-string-regexp-1.0.5"
sources."event-emitter-0.3.5" sources."event-emitter-0.3.5"
sources."extend-3.0.1" sources."extend-3.0.2"
sources."external-editor-2.2.0" sources."external-editor-2.2.0"
sources."figures-2.0.0" sources."figures-2.0.0"
sources."form-data-2.3.2" sources."form-data-2.3.2"
@ -7807,8 +7829,8 @@ in
sources."lru-cache-4.1.3" sources."lru-cache-4.1.3"
sources."methods-1.1.2" sources."methods-1.1.2"
sources."mime-1.6.0" sources."mime-1.6.0"
sources."mime-db-1.33.0" sources."mime-db-1.35.0"
sources."mime-types-2.1.18" sources."mime-types-2.1.19"
sources."mimic-fn-1.2.0" sources."mimic-fn-1.2.0"
sources."minimist-1.2.0" sources."minimist-1.2.0"
sources."ms-2.0.0" sources."ms-2.0.0"
@ -7821,6 +7843,7 @@ in
sources."process-nextick-args-2.0.0" sources."process-nextick-args-2.0.0"
sources."pseudomap-1.0.2" sources."pseudomap-1.0.2"
sources."qs-6.5.2" sources."qs-6.5.2"
sources."quicktask-1.1.0"
sources."raf-3.3.2" sources."raf-3.3.2"
sources."readable-stream-2.3.6" sources."readable-stream-2.3.6"
sources."restore-cursor-2.0.0" sources."restore-cursor-2.0.0"
@ -7896,7 +7919,7 @@ in
sources."arr-flatten-1.1.0" sources."arr-flatten-1.1.0"
sources."array-lru-1.1.1" sources."array-lru-1.1.1"
sources."array-unique-0.2.1" sources."array-unique-0.2.1"
sources."asn1-0.2.3" sources."asn1-0.2.4"
sources."assert-plus-1.0.0" sources."assert-plus-1.0.0"
sources."async-0.9.2" sources."async-0.9.2"
sources."asynckit-0.4.0" sources."asynckit-0.4.0"
@ -7922,7 +7945,7 @@ in
sources."buffer-alloc-unsafe-1.1.0" sources."buffer-alloc-unsafe-1.1.0"
sources."buffer-equals-1.0.4" sources."buffer-equals-1.0.4"
sources."buffer-fill-1.0.0" sources."buffer-fill-1.0.0"
sources."buffer-from-1.1.0" sources."buffer-from-1.1.1"
sources."bulk-write-stream-1.1.4" sources."bulk-write-stream-1.1.4"
sources."bytes-3.0.0" sources."bytes-3.0.0"
sources."call-me-maybe-1.0.1" sources."call-me-maybe-1.0.1"
@ -7940,7 +7963,7 @@ in
sources."codecs-1.2.1" sources."codecs-1.2.1"
sources."color-convert-1.9.2" sources."color-convert-1.9.2"
sources."color-name-1.1.1" sources."color-name-1.1.1"
sources."colors-1.3.0" sources."colors-1.3.1"
sources."combined-stream-1.0.6" sources."combined-stream-1.0.6"
sources."concat-map-0.0.1" sources."concat-map-0.0.1"
sources."concat-stream-1.6.2" sources."concat-stream-1.6.2"
@ -7999,13 +8022,13 @@ in
sources."dot-prop-4.2.0" sources."dot-prop-4.2.0"
sources."duplexer3-0.1.4" sources."duplexer3-0.1.4"
sources."duplexify-3.6.0" sources."duplexify-3.6.0"
sources."ecc-jsbn-0.1.1" sources."ecc-jsbn-0.1.2"
sources."end-of-stream-1.4.1" sources."end-of-stream-1.4.1"
sources."escape-string-regexp-1.0.5" sources."escape-string-regexp-1.0.5"
sources."execa-0.7.0" sources."execa-0.7.0"
sources."expand-brackets-0.1.5" sources."expand-brackets-0.1.5"
sources."expand-range-1.8.2" sources."expand-range-1.8.2"
sources."extend-3.0.1" sources."extend-3.0.2"
sources."extglob-0.3.2" sources."extglob-0.3.2"
sources."extsprintf-1.3.0" sources."extsprintf-1.3.0"
sources."eyes-0.1.8" sources."eyes-0.1.8"
@ -8037,7 +8060,7 @@ in
sources."has-flag-3.0.0" sources."has-flag-3.0.0"
sources."http-methods-0.1.0" sources."http-methods-0.1.0"
sources."http-signature-1.2.0" sources."http-signature-1.2.0"
(sources."hypercore-6.17.3" // { (sources."hypercore-6.18.1" // {
dependencies = [ dependencies = [
sources."process-nextick-args-1.0.7" sources."process-nextick-args-1.0.7"
sources."unordered-set-2.0.1" sources."unordered-set-2.0.1"
@ -8120,8 +8143,8 @@ in
sources."merkle-tree-stream-3.0.3" sources."merkle-tree-stream-3.0.3"
sources."micromatch-2.3.11" sources."micromatch-2.3.11"
sources."mime-2.3.1" sources."mime-2.3.1"
sources."mime-db-1.33.0" sources."mime-db-1.35.0"
sources."mime-types-2.1.18" sources."mime-types-2.1.19"
sources."min-document-2.19.0" sources."min-document-2.19.0"
sources."minimatch-3.0.4" sources."minimatch-3.0.4"
sources."minimist-1.2.0" sources."minimist-1.2.0"
@ -8235,7 +8258,7 @@ in
sources."sshpk-1.14.2" sources."sshpk-1.14.2"
sources."stack-trace-0.0.10" sources."stack-trace-0.0.10"
sources."stream-collector-1.0.1" sources."stream-collector-1.0.1"
sources."stream-each-1.2.2" sources."stream-each-1.2.3"
(sources."stream-parser-0.3.1" // { (sources."stream-parser-0.3.1" // {
dependencies = [ dependencies = [
sources."debug-2.6.9" sources."debug-2.6.9"
@ -8422,7 +8445,7 @@ in
sources."ansi-regex-2.1.1" sources."ansi-regex-2.1.1"
sources."aproba-1.2.0" sources."aproba-1.2.0"
sources."are-we-there-yet-1.1.5" sources."are-we-there-yet-1.1.5"
sources."asn1-0.2.3" sources."asn1-0.2.4"
sources."assert-plus-0.2.0" sources."assert-plus-0.2.0"
sources."asynckit-0.4.0" sources."asynckit-0.4.0"
sources."aws-sign2-0.6.0" sources."aws-sign2-0.6.0"
@ -8447,8 +8470,8 @@ in
}) })
sources."delayed-stream-1.0.0" sources."delayed-stream-1.0.0"
sources."delegates-1.0.0" sources."delegates-1.0.0"
sources."ecc-jsbn-0.1.1" sources."ecc-jsbn-0.1.2"
sources."extend-3.0.1" sources."extend-3.0.2"
sources."extsprintf-1.3.0" sources."extsprintf-1.3.0"
sources."forever-agent-0.6.1" sources."forever-agent-0.6.1"
sources."form-data-2.1.4" sources."form-data-2.1.4"
@ -8485,8 +8508,8 @@ in
sources."assert-plus-1.0.0" sources."assert-plus-1.0.0"
]; ];
}) })
sources."mime-db-1.33.0" sources."mime-db-1.35.0"
sources."mime-types-2.1.18" sources."mime-types-2.1.19"
sources."minimatch-3.0.4" sources."minimatch-3.0.4"
sources."minimist-0.0.8" sources."minimist-0.0.8"
sources."mkdirp-0.5.1" sources."mkdirp-0.5.1"
@ -8608,7 +8631,7 @@ in
sources."needle-2.2.1" sources."needle-2.2.1"
sources."nopt-4.0.1" sources."nopt-4.0.1"
sources."npm-bundled-1.0.3" sources."npm-bundled-1.0.3"
sources."npm-packlist-1.1.10" sources."npm-packlist-1.1.11"
sources."npmlog-4.1.2" sources."npmlog-4.1.2"
sources."number-is-nan-1.0.1" sources."number-is-nan-1.0.1"
sources."object-assign-4.1.1" sources."object-assign-4.1.1"
@ -8635,7 +8658,7 @@ in
sources."string_decoder-1.1.1" sources."string_decoder-1.1.1"
sources."strip-ansi-3.0.1" sources."strip-ansi-3.0.1"
sources."strip-json-comments-2.0.1" sources."strip-json-comments-2.0.1"
sources."tar-4.4.4" sources."tar-4.4.6"
sources."util-deprecate-1.0.2" sources."util-deprecate-1.0.2"
sources."wide-align-1.1.3" sources."wide-align-1.1.3"
sources."wrappy-1.0.2" sources."wrappy-1.0.2"
@ -8653,10 +8676,10 @@ in
pnpm = nodeEnv.buildNodePackage { pnpm = nodeEnv.buildNodePackage {
name = "pnpm"; name = "pnpm";
packageName = "pnpm"; packageName = "pnpm";
version = "2.11.2"; version = "2.12.2";
src = fetchurl { src = fetchurl {
url = "https://registry.npmjs.org/pnpm/-/pnpm-2.11.2.tgz"; url = "https://registry.npmjs.org/pnpm/-/pnpm-2.12.2.tgz";
sha1 = "fc7235c2ec82a6ede6caf47485a68a2c6fa2e1f5"; sha1 = "1b575512ae27d767f4aaec14e94b18e0c70bcc7b";
}; };
buildInputs = globalBuildInputs; buildInputs = globalBuildInputs;
meta = { meta = {
@ -8751,7 +8774,7 @@ in
sources."array-union-1.0.2" sources."array-union-1.0.2"
sources."array-uniq-1.0.3" sources."array-uniq-1.0.3"
sources."arrify-1.0.1" sources."arrify-1.0.1"
sources."asn1-0.2.3" sources."asn1-0.2.4"
sources."assert-plus-1.0.0" sources."assert-plus-1.0.0"
sources."async-2.6.1" sources."async-2.6.1"
sources."asynckit-0.4.0" sources."asynckit-0.4.0"
@ -8819,12 +8842,12 @@ in
sources."download-5.0.3" sources."download-5.0.3"
sources."download-git-repo-1.0.2" sources."download-git-repo-1.0.2"
sources."duplexer3-0.1.4" sources."duplexer3-0.1.4"
sources."ecc-jsbn-0.1.1" sources."ecc-jsbn-0.1.2"
sources."enable-1.3.2" sources."enable-1.3.2"
sources."end-of-stream-1.4.1" sources."end-of-stream-1.4.1"
sources."escape-string-regexp-1.0.5" sources."escape-string-regexp-1.0.5"
sources."esprima-4.0.1" sources."esprima-4.0.1"
sources."extend-3.0.1" sources."extend-3.0.2"
sources."extend-shallow-2.0.1" sources."extend-shallow-2.0.1"
sources."external-editor-3.0.0" sources."external-editor-3.0.0"
sources."extsprintf-1.3.0" sources."extsprintf-1.3.0"
@ -8915,8 +8938,8 @@ in
sources."supports-color-2.0.0" sources."supports-color-2.0.0"
]; ];
}) })
sources."mime-db-1.33.0" sources."mime-db-1.35.0"
sources."mime-types-2.1.18" sources."mime-types-2.1.19"
sources."mimic-fn-1.2.0" sources."mimic-fn-1.2.0"
sources."minimatch-3.0.4" sources."minimatch-3.0.4"
sources."minimist-0.0.8" sources."minimist-0.0.8"
@ -9091,7 +9114,7 @@ in
sources."is-extendable-0.1.1" sources."is-extendable-0.1.1"
]; ];
}) })
sources."buffer-from-1.1.0" sources."buffer-from-1.1.1"
(sources."busboy-0.2.14" // { (sources."busboy-0.2.14" // {
dependencies = [ dependencies = [
sources."isarray-0.0.1" sources."isarray-0.0.1"
@ -9205,7 +9228,7 @@ in
sources."kind-of-5.1.0" sources."kind-of-5.1.0"
]; ];
}) })
sources."extend-3.0.1" sources."extend-3.0.2"
sources."extend-shallow-3.0.2" sources."extend-shallow-3.0.2"
(sources."extglob-2.0.4" // { (sources."extglob-2.0.4" // {
dependencies = [ dependencies = [
@ -9370,8 +9393,8 @@ in
sources."methods-1.1.2" sources."methods-1.1.2"
sources."micromatch-3.1.10" sources."micromatch-3.1.10"
sources."mime-1.4.1" sources."mime-1.4.1"
sources."mime-db-1.33.0" sources."mime-db-1.35.0"
sources."mime-types-2.1.18" sources."mime-types-2.1.19"
sources."minimatch-3.0.4" sources."minimatch-3.0.4"
sources."minimist-0.0.8" sources."minimist-0.0.8"
sources."mixin-deep-1.3.1" sources."mixin-deep-1.3.1"
@ -9398,7 +9421,7 @@ in
sources."nan-2.10.0" sources."nan-2.10.0"
sources."nanomatch-1.2.13" sources."nanomatch-1.2.13"
sources."native-promise-only-0.8.1" sources."native-promise-only-0.8.1"
(sources."nodemon-1.18.2" // { (sources."nodemon-1.18.3" // {
dependencies = [ dependencies = [
sources."debug-3.1.0" sources."debug-3.1.0"
sources."supports-color-5.4.0" sources."supports-color-5.4.0"
@ -9655,7 +9678,7 @@ in
sources."util-deprecate-1.0.2" sources."util-deprecate-1.0.2"
sources."utils-merge-1.0.1" sources."utils-merge-1.0.1"
sources."valid-url-1.0.9" sources."valid-url-1.0.9"
sources."validator-10.4.0" sources."validator-10.5.0"
sources."which-1.3.1" sources."which-1.3.1"
sources."widest-line-2.0.0" sources."widest-line-2.0.0"
sources."window-size-0.1.0" sources."window-size-0.1.0"
@ -9684,10 +9707,10 @@ in
npm = nodeEnv.buildNodePackage { npm = nodeEnv.buildNodePackage {
name = "npm"; name = "npm";
packageName = "npm"; packageName = "npm";
version = "6.2.0"; version = "6.3.0";
src = fetchurl { src = fetchurl {
url = "https://registry.npmjs.org/npm/-/npm-6.2.0.tgz"; url = "https://registry.npmjs.org/npm/-/npm-6.3.0.tgz";
sha512 = "GnlNsOnxwVJX4WSfyQY0gY3LnUX2cc46XU0eu1g+WSuZgDRUGmw8tuptitJu6byp0RWGT8ZEAKajblwdhQHN8A=="; sha512 = "oDtLFo3wXue/xe3pU/oks9VHS5501OAWlYrZrApZkFv7l2LXk+9CfPMbjbfZWK7Jqlc1jbNcJMkB6KZC7K/vEA==";
}; };
buildInputs = globalBuildInputs; buildInputs = globalBuildInputs;
meta = { meta = {
@ -9701,10 +9724,10 @@ in
three = nodeEnv.buildNodePackage { three = nodeEnv.buildNodePackage {
name = "three"; name = "three";
packageName = "three"; packageName = "three";
version = "0.94.0"; version = "0.95.0";
src = fetchurl { src = fetchurl {
url = "https://registry.npmjs.org/three/-/three-0.94.0.tgz"; url = "https://registry.npmjs.org/three/-/three-0.95.0.tgz";
sha1 = "4ce6db7f2bfbf79c2d73444aa6e3cfc08a32d762"; sha512 = "vy6jMYs7CDwn47CejYHNi+++OdQue7xGIBhbLfekQ/G6MDxKRm0QB0/xWScz46/JvQAvF6pJAS5Q907l0i5iQA==";
}; };
buildInputs = globalBuildInputs; buildInputs = globalBuildInputs;
meta = { meta = {
@ -9718,10 +9741,10 @@ in
mathjax = nodeEnv.buildNodePackage { mathjax = nodeEnv.buildNodePackage {
name = "mathjax"; name = "mathjax";
packageName = "mathjax"; packageName = "mathjax";
version = "2.7.4"; version = "2.7.5";
src = fetchurl { src = fetchurl {
url = "https://registry.npmjs.org/mathjax/-/mathjax-2.7.4.tgz"; url = "https://registry.npmjs.org/mathjax/-/mathjax-2.7.5.tgz";
sha512 = "B6SLtoETmV08kqTepRyz8eqMRGFzllPy2QASKFdFl0g0YB6SNgQVnWae11RaF3/y8ZKLTJNJ7hLbMIqmBEkLzw=="; sha512 = "OzsJNitEHAJB3y4IIlPCAvS0yoXwYjlo2Y4kmm9KQzyIBZt2d8yKRalby3uTRNN4fZQiGL2iMXjpdP1u2Rq2DQ==";
}; };
buildInputs = globalBuildInputs; buildInputs = globalBuildInputs;
meta = { meta = {

View File

@ -1,5 +1,5 @@
{ stdenv, buildPythonPackage, fetchPypi { stdenv, buildPythonPackage, fetchPypi, fetchpatch
, pep8, nose, unittest2, docutils, blockdiag }: , pep8, nose, unittest2, docutils, blockdiag, reportlab }:
buildPythonPackage rec { buildPythonPackage rec {
pname = "actdiag"; pname = "actdiag";
@ -10,13 +10,17 @@ buildPythonPackage rec {
sha256 = "983071777d9941093aaef3be1f67c198a8ac8d2bba264cdd1f337ca415ab46af"; sha256 = "983071777d9941093aaef3be1f67c198a8ac8d2bba264cdd1f337ca415ab46af";
}; };
patches = fetchpatch {
name = "drop_test_pep8.py.patch";
url = https://bitbucket.org/blockdiag/actdiag/commits/c1f2ed5947a1e93291f5860e4e30cee098bd635d/raw;
sha256 = "1zxzwb0fvwlc8xgs45fx65341sjhb3h6l2p6rdj6i127vg1hsxb4";
};
buildInputs = [ pep8 nose unittest2 docutils ]; buildInputs = [ pep8 nose unittest2 docutils ];
propagatedBuildInputs = [ blockdiag ]; propagatedBuildInputs = [ blockdiag ];
# One test fails: checkInputs = [ reportlab ];
# UnicodeEncodeError: 'ascii' codec can't encode character u'\u3042' in position 0: ordinal not in range(128)
doCheck = false;
meta = with stdenv.lib; { meta = with stdenv.lib; {
description = "Generate activity-diagram image from spec-text file (similar to Graphviz)"; description = "Generate activity-diagram image from spec-text file (similar to Graphviz)";

View File

@ -0,0 +1,30 @@
{ lib
, buildPythonPackage
, fetchPypi
, gcc
, wirelesstools
, isPy27
, isPyPy
}:
buildPythonPackage rec {
pname = "basiciw";
version = "0.2.2";
disabled = isPy27 || isPyPy;
src = fetchPypi {
inherit pname version;
sha256 = "1ajmflvvlkflrcmqmkrx0zaira84z8kv4ssb2jprfwvjh8vfkysb";
};
buildInputs = [ gcc ];
propagatedBuildInputs = [ wirelesstools ];
meta = {
description = "Get info about wireless interfaces using libiw";
homepage = https://github.com/enkore/basiciw;
platforms = lib.platforms.linux;
license = lib.licenses.gpl2;
};
}

View File

@ -0,0 +1,43 @@
{ lib
, buildPythonPackage
, fetchFromGitHub
, nose
, mock
, webtest
, sqlalchemy
, pycrypto
, isPy27
, funcsigs
, pycryptopp
}:
buildPythonPackage rec {
pname = "Beaker";
version = "1.8.0";
# The pypy release do not contains the tests
src = fetchFromGitHub {
owner = "bbangert";
repo = "beaker";
rev = "${version}";
sha256 = "17yfr7a307n8rdl09was4j60xqk2s0hk0hywdkigrpj4qnw0is7g";
};
buildInputs =
[ nose
mock
webtest
];
propagatedBuildInputs = [
sqlalchemy
pycrypto
] ++ lib.optionals (isPy27) [
funcsigs
pycryptopp
];
meta = {
description = "A Session and Caching library with WSGI Middleware";
maintainers = with lib.maintainers; [ garbas domenkozar ];
};
}

View File

@ -0,0 +1,29 @@
{ stdenv, buildPythonPackage, fetchPypi, numpy, scipy, scikitimage, opencv3, six }:
buildPythonPackage rec {
pname = "imgaug";
version = "0.2.6";
src = fetchPypi {
inherit pname version;
sha256 = "1wy8ydkqq0jrwxwdv04q89n3gwsr9pjaspsbw26ipg5a5lnhb9c2";
};
propagatedBuildInputs = [
numpy
scipy
scikitimage
opencv3
six
];
# disable tests when there are no tests in the PyPI archive
doCheck = false;
meta = with stdenv.lib; {
homepage = https://github.com/aleju/imgaug;
description = "Image augmentation for machine learning experiments";
license = licenses.mit;
maintainers = with maintainers; [ cmcdragonkai ];
};
}

View File

@ -0,0 +1,27 @@
{ lib, buildPythonPackage, fetchPypi, numpy, h5py }:
buildPythonPackage rec {
pname = "Keras_Applications";
version = "1.0.4";
src = fetchPypi {
inherit pname version;
sha256 = "8c95300328630ae74fb0828b6fa38269a25c0228a02f1e5181753bfd48961f49";
};
# Cyclic dependency: keras-applications requires keras, which requires keras-applications
postPatch = ''
sed -i "s/keras>=[^']*//" setup.py
'';
# No tests in PyPI tarball
doCheck = false;
propagatedBuildInputs = [ numpy h5py ];
meta = with lib; {
description = "Reference implementations of popular deep learning models";
homepage = https://github.com/keras-team/keras-applications;
license = licenses.mit;
};
}

View File

@ -0,0 +1,27 @@
{ lib, buildPythonPackage, fetchPypi, numpy, scipy, six }:
buildPythonPackage rec {
pname = "Keras_Preprocessing";
version = "1.0.2";
src = fetchPypi {
inherit pname version;
sha256 = "f5306554d2b454d825b36f35e327744f5477bd2ae21017f1a93b2097bed6757e";
};
# Cyclic dependency: keras-preprocessing requires keras, which requires keras-preprocessing
postPatch = ''
sed -i "s/keras>=[^']*//" setup.py
'';
# No tests in PyPI tarball
doCheck = false;
propagatedBuildInputs = [ numpy scipy six ];
meta = with lib; {
description = "Easy data preprocessing and data augmentation for deep learning models";
homepage = https://github.com/keras-team/keras-preprocessing;
license = licenses.mit;
};
}

View File

@ -1,15 +1,16 @@
{ stdenv, buildPythonPackage, fetchPypi { stdenv, buildPythonPackage, fetchPypi
, pytest, pytestcov, pytestpep8, pytest_xdist , pytest, pytestcov, pytestpep8, pytest_xdist
, six, numpy, scipy, pyyaml, h5py , six, numpy, scipy, pyyaml, h5py
, keras-applications, keras-preprocessing
}: }:
buildPythonPackage rec { buildPythonPackage rec {
pname = "Keras"; pname = "Keras";
version = "2.2.0"; version = "2.2.2";
src = fetchPypi { src = fetchPypi {
inherit pname version; inherit pname version;
sha256 = "5b8499d157af217f1a5ee33589e774127ebc3e266c833c22cb5afbb0ed1734bf"; sha256 = "468d98da104ec5c3dbb10c2ef6bb345ab154f6ca2d722d4c250ef4d6105de17a";
}; };
checkInputs = [ checkInputs = [
@ -21,6 +22,7 @@ buildPythonPackage rec {
propagatedBuildInputs = [ propagatedBuildInputs = [
six pyyaml numpy scipy h5py six pyyaml numpy scipy h5py
keras-applications keras-preprocessing
]; ];
# Couldn't get tests working # Couldn't get tests working

View File

@ -0,0 +1,19 @@
{ stdenv, buildPythonPackage, fetchPypi }:
buildPythonPackage rec {
pname = "shippai";
# Please make sure that vdirsyncer still builds if you update this package.
version = "0.2.3";
src = fetchPypi {
inherit pname version;
sha256 = "1ppwywzg4d12h658682ssmingm6ls6a96p4ak26i2w9d4lf8pfsc";
};
meta = with stdenv.lib; {
description = "Use Rust failures as Python exceptions";
homepage = https://github.com/untitaker/shippai;
license = licenses.mit;
maintainers = with maintainers; [ gebner ];
};
}

View File

@ -61,6 +61,15 @@ in buildPythonPackage rec {
# bleach) Hence we disable dependency checking for now. # bleach) Hence we disable dependency checking for now.
installFlags = lib.optional isPy36 "--no-dependencies"; installFlags = lib.optional isPy36 "--no-dependencies";
# Upstream has a pip hack that results in bin/tensorboard being in both tensorflow
# and the propageted input tensorflow-tensorboard which causes environment collisions.
#
# https://github.com/tensorflow/tensorflow/blob/v1.7.1/tensorflow/tools/pip_package/setup.py#L79
postInstall = ''
rm $out/bin/tensorboard
'';
# Note that we need to run *after* the fixup phase because the # Note that we need to run *after* the fixup phase because the
# libraries are loaded at runtime. If we run in preFixup then # libraries are loaded at runtime. If we run in preFixup then
# patchelf --shrink-rpath will remove the cuda libraries. # patchelf --shrink-rpath will remove the cuda libraries.

View File

@ -42,20 +42,20 @@ let
# from the name, version, sha256, and optional per-package arguments above # from the name, version, sha256, and optional per-package arguments above
# #
deriveBioc = mkDerive { deriveBioc = mkDerive {
mkHomepage = {name, biocVersion}: "https://bioconductor.org/packages/${biocVersion}/bioc/html/${name}.html"; mkHomepage = {name, biocVersion, ...}: "https://bioconductor.org/packages/${biocVersion}/bioc/html/${name}.html";
mkUrls = {name, version, biocVersion}: [ "mirror://bioc/${biocVersion}/bioc/src/contrib/${name}_${version}.tar.gz" mkUrls = {name, version, biocVersion}: [ "mirror://bioc/${biocVersion}/bioc/src/contrib/${name}_${version}.tar.gz"
"mirror://bioc/${biocVersion}/bioc/src/contrib/Archive/${name}_${version}.tar.gz" ]; "mirror://bioc/${biocVersion}/bioc/src/contrib/Archive/${name}_${version}.tar.gz" ];
}; };
deriveBiocAnn = mkDerive { deriveBiocAnn = mkDerive {
mkHomepage = {name}: "http://www.bioconductor.org/packages/${name}.html"; mkHomepage = {name, ...}: "http://www.bioconductor.org/packages/${name}.html";
mkUrls = {name, version, biocVersion}: [ "mirror://bioc/${biocVersion}/data/annotation/src/contrib/${name}_${version}.tar.gz" ]; mkUrls = {name, version, biocVersion}: [ "mirror://bioc/${biocVersion}/data/annotation/src/contrib/${name}_${version}.tar.gz" ];
}; };
deriveBiocExp = mkDerive { deriveBiocExp = mkDerive {
mkHomepage = {name}: "http://www.bioconductor.org/packages/${name}.html"; mkHomepage = {name, ...}: "http://www.bioconductor.org/packages/${name}.html";
mkUrls = {name, version, biocVersion}: [ "mirror://bioc/${biocVersion}/data/experiment/src/contrib/${name}_${version}.tar.gz" ]; mkUrls = {name, version, biocVersion}: [ "mirror://bioc/${biocVersion}/data/experiment/src/contrib/${name}_${version}.tar.gz" ];
}; };
deriveCran = mkDerive { deriveCran = mkDerive {
mkHomepage = {name, snapshot}: "http://mran.revolutionanalytics.com/snapshot/${snapshot}/web/packages/${name}/"; mkHomepage = {name, snapshot, ...}: "http://mran.revolutionanalytics.com/snapshot/${snapshot}/web/packages/${name}/";
mkUrls = {name, version, snapshot}: [ "http://mran.revolutionanalytics.com/snapshot/${snapshot}/src/contrib/${name}_${version}.tar.gz" ]; mkUrls = {name, version, snapshot}: [ "http://mran.revolutionanalytics.com/snapshot/${snapshot}/src/contrib/${name}_${version}.tar.gz" ];
}; };
@ -216,7 +216,8 @@ let
# `self` is `_self` with overridden packages; # `self` is `_self` with overridden packages;
# packages in `_self` may depends on overridden packages. # packages in `_self` may depends on overridden packages.
self = (defaultOverrides _self self) // overrides; self = (defaultOverrides _self self) // overrides;
_self = import ./bioc-packages.nix { inherit self; derive = deriveBioc; } // _self = { inherit buildRPackage; } //
import ./bioc-packages.nix { inherit self; derive = deriveBioc; } //
import ./bioc-annotation-packages.nix { inherit self; derive = deriveBiocAnn; } // import ./bioc-annotation-packages.nix { inherit self; derive = deriveBiocAnn; } //
import ./bioc-experiment-packages.nix { inherit self; derive = deriveBiocExp; } // import ./bioc-experiment-packages.nix { inherit self; derive = deriveBiocExp; } //
import ./cran-packages.nix { inherit self; derive = deriveCran; }; import ./cran-packages.nix { inherit self; derive = deriveCran; };

View File

@ -1,10 +1,10 @@
{ stdenv, R, libcxx, xvfb_run, utillinux, Cocoa, Foundation, gettext, gfortran }: { stdenv, R, libcxx, xvfb_run, utillinux, Cocoa, Foundation, gettext, gfortran }:
{ name, buildInputs ? [], ... } @ attrs: { name, buildInputs ? [], requireX ? false, ... } @ attrs:
stdenv.mkDerivation ({ stdenv.mkDerivation ({
buildInputs = buildInputs ++ [R gettext] ++ buildInputs = buildInputs ++ [R gettext] ++
stdenv.lib.optionals attrs.requireX [utillinux xvfb_run] ++ stdenv.lib.optionals requireX [utillinux xvfb_run] ++
stdenv.lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran]; stdenv.lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran];
NIX_CFLAGS_COMPILE = NIX_CFLAGS_COMPILE =
@ -26,7 +26,7 @@ stdenv.mkDerivation ({
else else
[ "--no-test-load" ]; [ "--no-test-load" ];
rCommand = if attrs.requireX or false then rCommand = if requireX then
# Unfortunately, xvfb-run has a race condition even with -a option, so that # Unfortunately, xvfb-run has a race condition even with -a option, so that
# we acquire a lock explicitly. # we acquire a lock explicitly.
"flock ${xvfb_run} xvfb-run -a -e xvfb-error R" "flock ${xvfb_run} xvfb-run -a -e xvfb-error R"

View File

@ -4,8 +4,8 @@ buildRubyGem rec {
inherit ruby; inherit ruby;
name = "${gemName}-${version}"; name = "${gemName}-${version}";
gemName = "bundler"; gemName = "bundler";
version = "1.16.2"; version = "1.16.3";
source.sha256 = "3bb53e03db0a8008161eb4c816ccd317120d3c415ba6fee6f90bbc7f7eec8690"; source.sha256 = "0spddjiq6yscl4sywwcj5zrjk3lq02zacigrz2fh78yfdzyi34fq";
dontPatchShebangs = true; dontPatchShebangs = true;
postFixup = '' postFixup = ''

View File

@ -1,20 +1,19 @@
# This file was generated by https://github.com/kamilchm/go2nix v1.2.1 { stdenv, buildGoPackage, fetchFromGitHub }:
{ stdenv, buildGoPackage, fetchgit }:
buildGoPackage rec { buildGoPackage rec {
name = "easyjson-unstable-${version}"; name = "easyjson-unstable-${version}";
version = "2018-06-06"; version = "2018-07-30";
rev = "3fdea8d05856a0c8df22ed4bc71b3219245e4485";
goPackagePath = "github.com/mailru/easyjson"; goPackagePath = "github.com/mailru/easyjson";
goDeps = ./deps.nix;
src = fetchgit { src = fetchFromGitHub {
inherit rev; owner = "mailru";
url = "https://github.com/mailru/easyjson"; repo = "easyjson";
sha256 = "0g3crph77yhv4ipdnwqc32z4cp87ahi4ikad5kyy6q4znnxliz74"; rev = "03f2033d19d5860aef995fe360ac7d395cd8ce65";
sha256 = "0r62ym6m1ijby7nwplq0gdnhak8in63njyisrwhr3xpx9vkira97";
}; };
goDeps = ./deps.nix; enableParallelBuilding = true;
meta = with stdenv.lib; { meta = with stdenv.lib; {
homepage = "https://github.com/mailru/easyjson"; homepage = "https://github.com/mailru/easyjson";

View File

@ -1,4 +1,4 @@
{stdenv, fetchurl, jdk, python}: { stdenv, fetchurl, jdk, python2 }:
stdenv.mkDerivation { stdenv.mkDerivation {
name = "antlr-2.7.7"; name = "antlr-2.7.7";
@ -7,7 +7,8 @@ stdenv.mkDerivation {
sha256 = "1ffvcwdw73id0dk6pj2mlxjvbg0662qacx4ylayqcxgg381fnfl5"; sha256 = "1ffvcwdw73id0dk6pj2mlxjvbg0662qacx4ylayqcxgg381fnfl5";
}; };
patches = [ ./2.7.7-fixes.patch ]; patches = [ ./2.7.7-fixes.patch ];
buildInputs = [jdk python]; buildInputs = [ jdk ];
nativeBuildInputs = [ python2 ];
meta = with stdenv.lib; { meta = with stdenv.lib; {
description = "Powerful parser generator"; description = "Powerful parser generator";

View File

@ -1,20 +1,19 @@
# This file was generated by https://github.com/kamilchm/go2nix v1.2.1 { stdenv, buildGoPackage, fetchFromGitHub }:
{ stdenv, buildGoPackage, fetchgit }:
buildGoPackage rec { buildGoPackage rec {
name = "quicktemplate-unstable-${version}"; name = "quicktemplate-unstable-${version}";
version = "2018-04-30"; version = "2018-04-30";
rev = "a91e0946457b6583004fbfc159339b8171423aed";
goPackagePath = "github.com/valyala/quicktemplate"; goPackagePath = "github.com/valyala/quicktemplate";
goDeps = ./deps.nix;
src = fetchgit { src = fetchFromGitHub {
inherit rev; owner = "valyala";
url = "https://github.com/valyala/quicktemplate"; repo = "quicktemplate";
rev = "a91e0946457b6583004fbfc159339b8171423aed";
sha256 = "1z89ang5pkq5qs5b2nwhzyrw0zjlsas539l9kix374fhka49n8yc"; sha256 = "1z89ang5pkq5qs5b2nwhzyrw0zjlsas539l9kix374fhka49n8yc";
}; };
goDeps = ./deps.nix; enableParallelBuilding = true;
meta = with stdenv.lib; { meta = with stdenv.lib; {
homepage = "https://github.com/valyala/quicktemplate"; homepage = "https://github.com/valyala/quicktemplate";

View File

@ -5,7 +5,7 @@ let
in in
buildNodejs { buildNodejs {
inherit enableNpm; inherit enableNpm;
version = "10.6.0"; version = "10.7.0";
sha256 = "13vyzh53j2c4mv3q3yb0hkdpl1mag5705k7kmb8nmcvdhcm78q0r"; sha256 = "0qp93ddbnvadimj11wnznwhkq8vq1f7q259iq8siy5b7r936kvil";
patches = lib.optionals stdenv.isDarwin [ ./no-xcode-v7.patch ./no-xcodebuild.patch ]; patches = lib.optionals stdenv.isDarwin [ ./no-xcode-v7.patch ./no-xcodebuild.patch ];
} }

View File

@ -74,7 +74,7 @@ let
installXDGAppLauncher = '' installXDGAppLauncher = ''
launcher="$out/share/applications/cataclysm-dda.desktop" launcher="$out/share/applications/cataclysm-dda.desktop"
install -D -m 444 data/xdg/com.cataclysmdda.cataclysm-dda.desktop -T "$launcher" install -D -m 444 data/xdg/*cataclysm-dda.desktop -T "$launcher"
sed -i "$launcher" -e "s,\(Exec=\)\(cataclysm-tiles\),\1$out/bin/\2," sed -i "$launcher" -e "s,\(Exec=\)\(cataclysm-tiles\),\1$out/bin/\2,"
install -D -m 444 data/xdg/cataclysm-dda.svg -t $out/share/icons/hicolor/scalable/apps install -D -m 444 data/xdg/cataclysm-dda.svg -t $out/share/icons/hicolor/scalable/apps
''; '';

View File

@ -1,4 +1,4 @@
{ lib, stdenv, fetchFromGitHub, cmake, sfml, libX11, glew, python }: { lib, stdenv, fetchFromGitHub, cmake, sfml, libX11, glew, python3 }:
let let
@ -42,7 +42,7 @@ stdenv.mkDerivation rec {
}; };
nativeBuildInputs = [ cmake ]; nativeBuildInputs = [ cmake ];
buildInputs = [ serious-proton sfml glew libX11 python ]; buildInputs = [ serious-proton sfml glew libX11 python3 ];
cmakeFlags = [ cmakeFlags = [
"-DSERIOUS_PROTON_DIR=${serious-proton.src}" "-DSERIOUS_PROTON_DIR=${serious-proton.src}"

Some files were not shown because too many files have changed in this diff Show More