Merge branch 'master' into staging

This commit is contained in:
Nikolay Amiantov
2016-08-15 10:34:28 +03:00
121 changed files with 1115 additions and 948 deletions

View File

@@ -2,13 +2,13 @@
stdenv.mkDerivation rec {
name = "android-udev-rules-${version}";
version = "2016-04-26";
version = "20160805";
src = fetchFromGitHub {
owner = "M0Rf30";
repo = "android-udev-rules";
rev = "9af6e552016392db35191142b599a5199cf8a9fa";
sha256 = "1lvh7md6qz91q8jy9phnfxlb19s104lvsk75a5r07d8bjc4w9pxb";
rev = version;
sha256 = "0sdf3insqs73cdzmwl3lqy7nj82f1lprxd3vm0jh3qpf0sd1k93c";
};
installPhase = ''
@@ -16,7 +16,7 @@ stdenv.mkDerivation rec {
'';
meta = with stdenv.lib; {
homepage = https://github.com/M0Rf30/android-udev-rules;
homepage = "https://github.com/M0Rf30/android-udev-rules";
description = "Android udev rules list aimed to be the most comprehensive on the net";
platforms = platforms.linux;
license = licenses.gpl3;

View File

@@ -1,27 +1,27 @@
{ stdenv, fetchurl, flex, bison, linuxHeaders }:
{ stdenv, lib, fetchurl, flex, bison, linuxHeaders, libtirpc, utillinux, nfs-utils, e2fsprogs
, libxml2 }:
let
version = "5.1.1";
version = "5.1.2";
name = "autofs-${version}";
in stdenv.mkDerivation {
inherit name;
src = fetchurl {
url = "mirror://kernel/linux/daemons/autofs/v5/${name}.tar.xz";
sha256 = "1hr1f11wp538h7r298wpa5khfkhfs8va3p1kdixxhrgkkzpz13z0";
sha256 = "031z64hmbzyllgvi72cw87755vnmafvsfwi0w21xksla10wxxdw8";
};
preConfigure = ''
configureFlags="--disable-move-mount --with-path=$PATH"
export MOUNT=/var/run/current-system/sw/bin/mount
export UMOUNT=/var/run/current-system/sw/bin/umount
export MODPROBE=/var/run/current-system/sw/bin/modprobe
# Grrr, rpcgen can't find cpp. (NIXPKGS-48)
mkdir rpcgen
echo "#! $shell" > rpcgen/rpcgen
echo "exec $(type -tp rpcgen) -Y $(dirname $(type -tp cpp)) \"\$@\"" >> rpcgen/rpcgen
chmod +x rpcgen/rpcgen
export RPCGEN=$(pwd)/rpcgen/rpcgen
configureFlags="--enable-force-shutdown --enable-ignore-busy --with-path=$PATH"
export MOUNT=${lib.getBin utillinux}/bin/mount
export MOUNT_NFS=${lib.getBin nfs-utils}/bin/mount.nfs
export UMOUNT=${lib.getBin utillinux}/bin/umount
export MODPROBE=${lib.getBin utillinux}/bin/modprobe
export E2FSCK=${lib.getBin e2fsprogs}/bin/fsck.ext2
export E3FSCK=${lib.getBin e2fsprogs}/bin/fsck.ext3
export E4FSCK=${lib.getBin e2fsprogs}/bin/fsck.ext4
'';
installPhase = ''
@@ -29,7 +29,9 @@ in stdenv.mkDerivation {
#make install SUBDIRS="samples" # impure!
'';
buildInputs = [ flex bison linuxHeaders ];
buildInputs = [ linuxHeaders libtirpc libxml2 ];
nativeBuildInputs = [ flex bison ];
meta = {
inherit version;

View File

@@ -3,13 +3,13 @@
stdenv.mkDerivation rec {
name = "btfs-${version}";
version = "2.10";
version = "2.11";
src = fetchFromGitHub {
owner = "johang";
repo = "btfs";
rev = "2eac5e70a1ed22fa0761b6357c54fd90eea02de6";
sha256 = "146vgwn79dnbkkn35safga55lkwhvarkmilparmr26hjb56cs1dk";
rev = "fe585ca285690579db50b1624cec81ae76279ba2";
sha256 = "1vqya2k8cx5x7jfapl9vmmb002brwbsz4j5xs4417kzv3j2bsms9";
};
buildInputs = [

View File

@@ -1,19 +0,0 @@
{ stdenv, fetchurl, perl, buildLinux, ... } @ args:
import ./generic.nix (args // rec {
version = "4.5.7";
extraMeta.branch = "4.5";
src = fetchurl {
url = "mirror://kernel/linux/kernel/v4.x/linux-${version}.tar.xz";
sha256 = "0azvh7lf9kak1xcs5f9smlvx4gkf45vyandizmxhx0zyjlhacw60";
};
kernelPatches = args.kernelPatches;
features.iwlwifi = true;
features.efiBootStub = true;
features.needsCifsUtils = true;
features.canDisableNetfilterConntrackHelpers = true;
features.netfilterRPFilter = true;
} // (args.argsOverride or {}))

View File

@@ -1,12 +1,12 @@
{ stdenv, fetchurl, perl, buildLinux, ... } @ args:
import ./generic.nix (args // rec {
version = "4.6.5";
version = "4.6.6";
extraMeta.branch = "4.6";
src = fetchurl {
url = "mirror://kernel/linux/kernel/v4.x/linux-${version}.tar.xz";
sha256 = "1i8ksv8w6dn86q54gzk230gxrylqx3m55x789d29q5balg456bby";
sha256 = "1lx00j0z0rasmc87mcvqd1h6r4znb9c2q22jbs2mrissr5w05vgm";
};
kernelPatches = args.kernelPatches;

View File

@@ -16,7 +16,7 @@ stdenv.mkDerivation rec {
meta = with stdenv.lib; {
description = "Support to authenticate against PostgreSQL for PAM-enabled appliations";
homepage = https://github.com/pam-pgsql/pam-pgsql;
homepage = "https://github.com/pam-pgsql/pam-pgsql";
license = licenses.gpl2Plus;
platforms = platforms.linux;
maintainers = with maintainers; [ abbradar ];

View File

@@ -1,4 +1,4 @@
{ fetchFromGitHub, stdenv, autoconf, automake, libtool, coreutils, gawk
{ fetchFromGitHub, stdenv, autoreconfHook, coreutils, gawk
, configFile ? "all"
# Kernel dependencies
@@ -28,14 +28,10 @@ stdenv.mkDerivation rec {
patches = [ ./const.patch ./install_prefix.patch ];
buildInputs = [ autoconf automake libtool ];
nativeBuildInputs = [ autoreconfHook ];
preConfigure = ''
./autogen.sh
substituteInPlace ./module/spl/spl-generic.c --replace /usr/bin/hostid hostid
substituteInPlace ./module/spl/spl-module.c --replace /bin/mknod mknod
substituteInPlace ./module/spl/spl-generic.c --replace "PATH=/sbin:/usr/sbin:/bin:/usr/bin" "PATH=${coreutils}:${gawk}:/bin"
substituteInPlace ./module/splat/splat-vnode.c --replace "PATH=/sbin:/usr/sbin:/bin:/usr/bin" "PATH=${coreutils}:/bin"
substituteInPlace ./module/splat/splat-linux.c --replace "PATH=/sbin:/usr/sbin:/bin:/usr/bin" "PATH=${coreutils}:/bin"

View File

@@ -1,4 +1,4 @@
{ stdenv, fetchgit, libmnl, kernel ? null }:
{ stdenv, fetchurl, libmnl, kernel ? null }:
# module requires Linux >= 4.1 https://www.wireguard.io/install/#kernel-requirements
assert kernel != null -> stdenv.lib.versionAtLeast kernel.version "4.1";
@@ -6,19 +6,20 @@ assert kernel != null -> stdenv.lib.versionAtLeast kernel.version "4.1";
let
name = "wireguard-unstable-${version}";
version = "2016-07-22";
version = "2016-08-08";
src = fetchgit {
url = "https://git.zx2c4.com/WireGuard";
rev = "8e8bf6f848c324603827c0e57f0856d5866ac32d";
sha256 = "11qrf9fxm6mkwjnjq7dgbisdric5w22cyfkqc6zx9fla2dz99mxk";
src = fetchurl {
url = "https://git.zx2c4.com/WireGuard/snapshot/WireGuard-experimental-0.0.20160808.tar.xz";
sha256 = "0z9s9xi8dzkmjnki7ialf2haxb0mn2x5676sjwmjij1jfi9ypxhw";
};
meta = with stdenv.lib; {
homepage = https://www.wireguard.io/;
description = "Fast, modern, secure VPN tunnel";
license = licenses.gpl2;
platforms = platforms.linux;
homepage = https://www.wireguard.io/;
downloadPage = https://git.zx2c4.com/WireGuard/refs/;
description = "Fast, modern, secure VPN tunnel";
maintainers = with maintainers; [ ericsagnes ];
license = licenses.gpl2;
platforms = platforms.linux;
};
module = stdenv.mkDerivation {
@@ -33,7 +34,6 @@ let
INSTALL_MOD_PATH = "\${out}";
buildPhase = "make module";
};
tools = stdenv.mkDerivation {
@@ -50,7 +50,6 @@ let
];
buildPhase = "make tools";
};
in if kernel == null