Merge master into staging-next

This commit is contained in:
Frederik Rietdijk
2019-06-12 09:22:07 +02:00
192 changed files with 2166 additions and 56222 deletions

View File

@@ -1,34 +1,26 @@
{ stdenv, buildPythonPackage, fetchFromGitHub
, python, openssl }:
{ stdenv, buildPythonPackage, fetchPypi, setuptools_scm, fusepy, fuse
, openssl }:
buildPythonPackage rec {
pname = "acme-tiny";
version = "2016-03-26";
version = "4.0.4";
src = fetchFromGitHub {
sha256 = "0ngmr3kxcvlqa9mrv3gx0rg4r67xvdjplqfminxliri3ipak853g";
rev = "7a5a2558c8d6e5ab2a59b9fec9633d9e63127971";
repo = "acme-tiny";
owner = "diafygi";
src = fetchPypi {
inherit pname version;
sha256 = "0vqlmvk34jgvgx3qdsh50q7m4aiy02786jyjjcq45dcws7a4f9f1";
};
# source doesn't have any python "packaging" as such
configurePhase = " ";
buildPhase = " ";
# the tests are... complex
doCheck = false;
patchPhase = ''
substituteInPlace acme_tiny.py --replace "openssl" "${openssl.bin}/bin/openssl"
substituteInPlace acme_tiny.py --replace '"openssl"' '"${openssl.bin}/bin/openssl"'
substituteInPlace tests/monkey.py --replace '"openssl"' '"${openssl.bin}/bin/openssl"'
substituteInPlace tests/test_module.py --replace '"openssl"' '"${openssl.bin}/bin/openssl"'
substituteInPlace tests/monkey.py --replace /etc/ssl/openssl.cnf ${openssl.out}/etc/ssl/openssl.cnf
'';
installPhase = ''
mkdir -p $out/${python.sitePackages}/
cp acme_tiny.py $out/${python.sitePackages}/
mkdir -p $out/bin
ln -s $out/${python.sitePackages}/acme_tiny.py $out/bin/acme_tiny
chmod +x $out/bin/acme_tiny
'';
buildInputs = [ setuptools_scm ];
checkInputs = [ fusepy fuse ];
doCheck = false; # seems to hang, not sure
meta = with stdenv.lib; {
description = "A tiny script to issue and renew TLS certs from Let's Encrypt";

View File

@@ -1,50 +0,0 @@
{ stdenv, buildPythonPackage, pythonOlder
, pyperclip, six, pyparsing, vim
, contextlib2 ? null, subprocess32 ? null
, pytest, mock, which, fetchFromGitHub, glibcLocales
, runtimeShell
}:
buildPythonPackage rec {
pname = "cmd2";
version = "0.8.0";
src = fetchFromGitHub {
owner = "python-cmd2";
repo = "cmd2";
rev = version;
sha256 = "0nw2b7n7zg51bc3glxw0l9fn91mwjnjshklhmxhyvjbsg7khf64z";
};
LC_ALL="en_US.UTF-8";
postPatch = stdenv.lib.optional stdenv.isDarwin ''
# Fake the impure dependencies pbpaste and pbcopy
mkdir bin
echo '#${runtimeShell}' > bin/pbpaste
echo '#${runtimeShell}' > bin/pbcopy
chmod +x bin/{pbcopy,pbpaste}
export PATH=$(realpath bin):$PATH
'';
checkInputs= [ pytest mock which vim glibcLocales ];
checkPhase = ''
# test_path_completion_user_expansion might be fixed in the next release
py.test -k 'not test_path_completion_user_expansion'
'';
doCheck = !stdenv.isDarwin;
propagatedBuildInputs = [
pyperclip
six
pyparsing
]
++ stdenv.lib.optional (pythonOlder "3.5") contextlib2
++ stdenv.lib.optional (pythonOlder "3.0") subprocess32
;
meta = with stdenv.lib; {
description = "Enhancements for standard library's cmd module";
homepage = https://github.com/python-cmd2/cmd2;
maintainers = with maintainers; [ teto ];
};
}

View File

@@ -22,7 +22,7 @@ buildPythonPackage rec {
meta = with stdenv.lib; {
description = "Python interface to Oracle";
homepage = "https://oracle.github.io/python-cx_Oracle";
license = licenses.bsdOriginal;
license = licenses.bsd3;
maintainers = with maintainers; [ y0no ];
};
}

View File

@@ -0,0 +1,24 @@
{ lib, fetchPypi, buildPythonPackage
, coverage, flake8, mock, nose
, cryptography }:
buildPythonPackage rec {
pname = "http_ece";
version = "1.1.0";
src = fetchPypi {
inherit pname version;
sha256 = "1y5ln09ji4dwpzhxr77cggk02kghq7lql60a6969a5n2lwpvqblk";
};
propagatedBuildInputs = [ cryptography ];
checkInputs = [ coverage flake8 mock nose ];
meta = with lib; {
description = "Encipher HTTP Messages";
homepage = https://github.com/martinthomson/encrypted-content-encoding;
license = licenses.mit;
maintainers = with maintainers; [ peterhoeg ];
};
}

View File

@@ -1,26 +1,17 @@
{ fetchPypi, buildPythonPackage, lib, six, singledispatch, isPy3k, fetchpatch }:
buildPythonPackage rec {
version = "3.4";
version = "3.4.3";
pname = "nltk";
src = fetchPypi {
inherit pname version;
extension = "zip";
sha256 = "286f6797204ffdb52525a1d21ec0a221ec68b8e3fa4f2d25f412ac8e63c70e8d";
sha256 = "1cjkv4jmmlr0w4qi399ncgb6lp41mb9i352934288wh9xad15mqj";
};
propagatedBuildInputs = [ six ] ++ lib.optional (!isPy3k) singledispatch;
# TODO: remove patch during update to new version
patches = [
(fetchpatch {
url = https://github.com/nltk/nltk/commit/3966111cbf2f35fb86082b2f12acd90d75e9b8bb.patch;
includes = [ "setup.py" ];
sha256 = "1sxafnvf6nzv6d996xc1rys06x62s36swgpfqhsyh6l1lj7y38jw";
})
];
# Tests require some data, the downloading of which is impure. It would
# probably make sense to make the data another derivation, but then feeding
# that into the tests (given that we need nltk itself to download the data,

View File

@@ -0,0 +1,24 @@
{ lib, buildPythonPackage, fetchPypi
, flake8, mock, nose, pytest
, cryptography
}:
buildPythonPackage rec {
pname = "py-vapid";
version = "1.5.0";
src = fetchPypi {
inherit pname version;
sha256 = "1b3g4ljkpi6ka5n63bl5y47r3qhxjmr6qfamqwxnmna2567b5las";
};
propagatedBuildInputs = [ cryptography ];
checkInputs = [ flake8 mock nose pytest ];
meta = with lib; {
description = "VAPID is a voluntary standard for WebPush subscription providers";
homepage = https://github.com/mozilla-services/vapid;
license = licenses.mpl20;
};
}

View File

@@ -0,0 +1,28 @@
{ lib, fetchPypi, buildPythonPackage
, coverage, flake8, mock, nose
, http-ece, py-vapid, requests }:
buildPythonPackage rec {
pname = "pywebpush";
version = "1.9.4";
src = fetchPypi {
inherit pname version;
sha256 = "03qkijz56fx7p8405sknw2wji4pfj5knajk2lmj9y58mjxydbpp3";
};
propagatedBuildInputs = [
http-ece py-vapid requests
];
checkInputs = [
coverage flake8 mock nose
];
meta = with lib; {
description = "Webpush Data encryption library for Python";
homepage = https://github.com/web-push-libs/pywebpush;
license = licenses.mpl20;
maintainers = with maintainers; [ peterhoeg ];
};
}

View File

@@ -2,11 +2,11 @@
buildPythonPackage rec {
pname = "wsproto";
version = "0.14.0";
version = "0.14.1";
src = fetchPypi {
inherit pname version;
sha256 = "1p24dmym6pfsqsyxps6m2cxfl36cmkri0kdy5y5q7s300j3xmhsm";
sha256 = "051s127qb5dladxa14n9nqajwq7xki1dz1was5r5v9df5a0jq8pd";
};
propagatedBuildInputs = [ h11 enum34 ];