;' jni/com_myJava_file_metadata_posix_jni_wrapper_FileAccessWrapper.c
+ substituteInPlace jni/com_myJava_file_metadata_posix_jni_wrapper_FileAccessWrapper.c --replace attr/xattr.h sys/xattr.h
+
sed -i "s#^PROGRAM_DIR.*#PROGRAM_DIR=$out#g" bin/areca_run.sh
sed -i "s#^LIBRARY_PATH.*#LIBRARY_PATH=$out/lib:${stdenv.lib.makeLibraryPath [ swt acl ]}#g" bin/areca_run.sh
diff --git a/pkgs/applications/editors/android-studio/default.nix b/pkgs/applications/editors/android-studio/default.nix
index 6c68c705b02..1e9cd4857bc 100644
--- a/pkgs/applications/editors/android-studio/default.nix
+++ b/pkgs/applications/editors/android-studio/default.nix
@@ -8,14 +8,14 @@ let
inherit (gnome2) GConf gnome_vfs;
};
stableVersion = {
- version = "3.3.1.0"; # "Android Studio 3.3.1"
- build = "182.5264788";
- sha256Hash = "0fghqkc8pkb7waxclm0qq4nlnsvmv9d3fcj5nnvgbfkjyw032q42";
+ version = "3.3.2.0"; # "Android Studio 3.3.2"
+ build = "182.5314842";
+ sha256Hash = "0smh3d3v8n0isxg7fkls20622gp52f58i2b6wa4a0g8wnvmd6mw2";
};
betaVersion = {
- version = "3.4.0.14"; # "Android Studio 3.4 Beta 5"
- build = "183.5310756";
- sha256Hash = "0np8600qvqpw9kcmgp04i1nak1339ck1iidkzr75kigp5rgdl2bq";
+ version = "3.4.0.15"; # "Android Studio 3.4 RC 1"
+ build = "183.5341121";
+ sha256Hash = "0s7wadnzbrd031ls43b5nbh1nx0paj74bxy2yiczr4qb9n562zzy";
};
latestVersion = { # canary & dev
version = "3.5.0.5"; # "Android Studio 3.5 Canary 6"
diff --git a/pkgs/applications/editors/emacs/default.nix b/pkgs/applications/editors/emacs/default.nix
index 6f56ba6cf49..2f7a4233656 100644
--- a/pkgs/applications/editors/emacs/default.nix
+++ b/pkgs/applications/editors/emacs/default.nix
@@ -10,6 +10,7 @@
, withXwidgets ? false, webkitgtk ? null, wrapGAppsHook ? null, glib-networking ? null
, withCsrc ? true
, srcRepo ? false, autoconf ? null, automake ? null, texinfo ? null
+, siteStart ? ./site-start.el
}:
assert (libXft != null) -> libpng != null; # probably a bug
@@ -100,7 +101,7 @@ stdenv.mkDerivation rec {
postInstall = ''
mkdir -p $out/share/emacs/site-lisp
- cp ${./site-start.el} $out/share/emacs/site-lisp/site-start.el
+ cp ${siteStart} $out/share/emacs/site-lisp/site-start.el
$out/bin/emacs --batch -f batch-byte-compile $out/share/emacs/site-lisp/site-start.el
rm -rf $out/var
diff --git a/pkgs/applications/editors/featherpad/default.nix b/pkgs/applications/editors/featherpad/default.nix
index b1e26910f1f..89e10ea25fa 100644
--- a/pkgs/applications/editors/featherpad/default.nix
+++ b/pkgs/applications/editors/featherpad/default.nix
@@ -3,13 +3,13 @@
with qt5;
stdenv.mkDerivation rec {
- version = "0.9.2";
+ version = "0.9.4";
name = "featherpad-${version}";
src = fetchFromGitHub {
owner = "tsujan";
repo = "FeatherPad";
rev = "V${version}";
- sha256 = "1kpv8x3m4hiz7q9k7qadgbrys5nyzm7v5mhjyk22hawnp98m9x4q";
+ sha256 = "18zna6rx2qyiplr44wrkvr4avk9yy2l1s23fy3d7ql9f1fq12z3w";
};
nativeBuildInputs = [ qmake pkgconfig qttools ];
buildInputs = [ qtbase qtsvg qtx11extras ];
diff --git a/pkgs/applications/editors/quilter/default.nix b/pkgs/applications/editors/quilter/default.nix
index 82bcc403164..9cdaeb043c3 100644
--- a/pkgs/applications/editors/quilter/default.nix
+++ b/pkgs/applications/editors/quilter/default.nix
@@ -4,13 +4,13 @@
stdenv.mkDerivation rec {
pname = "quilter";
- version = "1.7.0";
+ version = "1.7.5";
src = fetchFromGitHub {
owner = "lainsce";
repo = pname;
rev = version;
- sha256 = "0dqji6zwpn0k89mpmh10rq59hzrq8kqr30dz1hp06ygk8rlnv2ys";
+ sha256 = "0czf6rm908pz6zwiaq2phci923q8xa8x7q7kvdk6s3km4i1rrgkn";
};
nativeBuildInputs = [
diff --git a/pkgs/applications/editors/sublime/3/common.nix b/pkgs/applications/editors/sublime/3/common.nix
index 937764f0ab8..8f304524dff 100644
--- a/pkgs/applications/editors/sublime/3/common.nix
+++ b/pkgs/applications/editors/sublime/3/common.nix
@@ -1,8 +1,9 @@
-{buildVersion, x32sha256, x64sha256}:
+{buildVersion, x32sha256, x64sha256, dev ? false}:
{ fetchurl, stdenv, glib, xorg, cairo, gtk2, gtk3, pango, makeWrapper, wrapGAppsHook, openssl, bzip2, runtimeShell,
pkexecPath ? "/run/wrappers/bin/pkexec", libredirect,
- gksuSupport ? false, gksu, unzip, zip, bash}:
+ gksuSupport ? false, gksu, unzip, zip, bash,
+ writeScript, common-updater-scripts, curl, gnugrep}:
assert gksuSupport -> gksu != null;
@@ -26,7 +27,7 @@ in let
# package with just the binaries
sublime = stdenv.mkDerivation {
- name = "sublimetext3-${buildVersion}-bin";
+ name = "sublimetext3-bin-${buildVersion}";
src =
fetchurl {
name = "sublimetext-${buildVersion}.tar.bz2";
@@ -127,6 +128,22 @@ in stdenv.mkDerivation (rec {
ln -s $sublime/Icon/256x256/ $out/share/icons
'';
+ passthru.updateScript = writeScript "sublime3-update-script" ''
+ #!${stdenv.shell}
+ set -o errexit
+ PATH=${stdenv.lib.makeBinPath [ common-updater-scripts curl gnugrep ]}
+
+ latestVersion=$(curl https://www.sublimetext.com/3${stdenv.lib.optionalString dev "dev"} | grep -Po '(?<=Version: Build )([0-9]+)')
+
+ for platform in ${stdenv.lib.concatStringsSep " " meta.platforms}; do
+ package=sublime3${stdenv.lib.optionalString dev "-dev"}
+ # The script will not perform an update when the version attribute is up to date from previous platform run
+ # We need to clear it before each run
+ update-source-version ''${package}.sublime 0 0000000000000000000000000000000000000000000000000000000000000000 --file=pkgs/applications/editors/sublime/3/packages.nix --version-key=buildVersion --system=$platform
+ update-source-version ''${package}.sublime $latestVersion --file=pkgs/applications/editors/sublime/3/packages.nix --version-key=buildVersion --system=$platform
+ done
+ '';
+
meta = with stdenv.lib; {
description = "Sophisticated text editor for code, markup and prose";
homepage = https://www.sublimetext.com/;
diff --git a/pkgs/applications/editors/sublime/3/packages.nix b/pkgs/applications/editors/sublime/3/packages.nix
index 2d214f18e9f..6d4b511e598 100644
--- a/pkgs/applications/editors/sublime/3/packages.nix
+++ b/pkgs/applications/editors/sublime/3/packages.nix
@@ -6,6 +6,7 @@ in
rec {
sublime3-dev = common {
buildVersion = "3184";
+ dev = true;
x32sha256 = "1b6f1fid75g5z247dbnyyj276lrlv99scrdk1vvfcr6vyws77vzr";
x64sha256 = "03127jhfjr17ai96p3axh5b5940fds8jcw6vkid8y6dmvd2dpylz";
} {};
diff --git a/pkgs/applications/editors/vscode/default.nix b/pkgs/applications/editors/vscode/default.nix
index 78d7d96d396..0506250766b 100644
--- a/pkgs/applications/editors/vscode/default.nix
+++ b/pkgs/applications/editors/vscode/default.nix
@@ -18,16 +18,16 @@ let
}.${system};
sha256 = {
- "i686-linux" = "04kbx1cx40lsy9irxy1arp1rixzk49ldhg34w3llmfbx63a4hchf";
- "x86_64-linux" = "1plvx0mjcbizl6iffib95p5224r9frf0mn6c5xp14p3qnrp32jhm";
- "x86_64-darwin" = "14h9gs6jpxydgd1h16ybq3ifw5jc7k83yg22pw3sk6vhy7hx7pxr";
+ "i686-linux" = "0iqsbny25946fyvrm8qwgbd1xmwb8psg2n2c4wdk8x52259pxfvq";
+ "x86_64-linux" = "0v1gbaqlaismrykl8igks5dl9bh5xh56v5aw8mffg8wxdr0alrvv";
+ "x86_64-darwin" = "0awq1jgqbpirrhs09x7hn4m96idb4lazm053nf5jf5yrx8pq1l9i";
}.${system};
archive_fmt = if system == "x86_64-darwin" then "zip" else "tar.gz";
in
stdenv.mkDerivation rec {
name = "vscode-${version}";
- version = "1.31.1";
+ version = "1.32.1";
src = fetchurl {
name = "VSCode_${version}_${plat}.${archive_fmt}";
diff --git a/pkgs/applications/graphics/ImageMagick/7.0.nix b/pkgs/applications/graphics/ImageMagick/7.0.nix
index efbf5864faa..f8753ecd1eb 100644
--- a/pkgs/applications/graphics/ImageMagick/7.0.nix
+++ b/pkgs/applications/graphics/ImageMagick/7.0.nix
@@ -84,6 +84,7 @@ stdenv.mkDerivation rec {
description = "A software suite to create, edit, compose, or convert bitmap images";
platforms = platforms.linux ++ platforms.darwin;
license = licenses.asl20;
+ broken = ghostscript != null; # https://github.com/NixOS/nixpkgs/issues/55118
maintainers = with maintainers; [ the-kenny ];
};
}
diff --git a/pkgs/applications/graphics/ImageMagick/default.nix b/pkgs/applications/graphics/ImageMagick/default.nix
index b3a1b64cae9..7981403eb75 100644
--- a/pkgs/applications/graphics/ImageMagick/default.nix
+++ b/pkgs/applications/graphics/ImageMagick/default.nix
@@ -100,6 +100,7 @@ stdenv.mkDerivation rec {
description = "A software suite to create, edit, compose, or convert bitmap images";
platforms = platforms.linux ++ platforms.darwin;
maintainers = with maintainers; [ the-kenny ];
+ broken = ghostscript != null; # https://github.com/NixOS/nixpkgs/issues/55118
license = licenses.asl20;
};
}
diff --git a/pkgs/applications/graphics/digikam/default.nix b/pkgs/applications/graphics/digikam/default.nix
index 7fcdb46e32e..cc2b955fcc2 100644
--- a/pkgs/applications/graphics/digikam/default.nix
+++ b/pkgs/applications/graphics/digikam/default.nix
@@ -23,6 +23,7 @@
, boost
, eigen
, exiv2
+, ffmpeg
, flex
, jasper
, lcms2
@@ -66,6 +67,7 @@ mkDerivation rec {
boost
eigen
exiv2
+ ffmpeg
flex
jasper
lcms2
diff --git a/pkgs/applications/graphics/ipe/default.nix b/pkgs/applications/graphics/ipe/default.nix
index 140227eb9ec..d30f8c209c5 100644
--- a/pkgs/applications/graphics/ipe/default.nix
+++ b/pkgs/applications/graphics/ipe/default.nix
@@ -7,7 +7,7 @@ stdenv.mkDerivation rec {
src = fetchurl {
url = "https://dl.bintray.com/otfried/generic/ipe/7.2/${name}-src.tar.gz";
- sha256 = "0rm31kvyg30452bz12yi49bkhdmi4bjdx6zann5cdlbi0pvmx7xh";
+ sha256 = "0gw45d0albrsa0pbc5g4w3fmmjfxrdbpzyc7723ncbhncdyda01h";
};
sourceRoot = "${name}/src";
diff --git a/pkgs/applications/graphics/xournalpp/default.nix b/pkgs/applications/graphics/xournalpp/default.nix
new file mode 100644
index 00000000000..30a8907275b
--- /dev/null
+++ b/pkgs/applications/graphics/xournalpp/default.nix
@@ -0,0 +1,74 @@
+{ stdenv
+, lib
+, fetchFromGitHub
+, fetchpatch
+
+, cmake
+, gettext
+, wrapGAppsHook
+, pkgconfig
+
+, glib
+, gsettings-desktop-schemas
+, gtk3
+, hicolor-icon-theme
+, libsndfile
+, libxml2
+, pcre
+, poppler
+, portaudio
+, zlib
+
+# Plugins don't appear to be working in this version, so disable them by not
+# building with Lua support by default. In a future version, try switching this
+# to 'true' and seeing if the top-level Plugin menu appears.
+, withLua ? false, lua
+}:
+
+stdenv.mkDerivation rec {
+ name = "xournalpp-${version}";
+ version = "1.0.8";
+
+ src = fetchFromGitHub {
+ owner = "xournalpp";
+ repo = "xournalpp";
+ rev = version;
+ sha256 = "01q84xjp9z1krna10gjj562km6i3wdq8cg7paxax1k6bh52ryvf6";
+ };
+
+ patches = [
+ # This patch removes the unused 'xopp-recording.sh' file which breaks the
+ # cmake build; this patch isn't in a release yet, and should be removed at
+ # or after 1.0.9 is released.
+ (fetchpatch {
+ name = "remove-xopp-recording.sh.patch";
+ url = "https://github.com/xournalpp/xournalpp/commit/a17a3f2c80c607a22d0fdeb66d38358bea7e4d85.patch";
+ sha256 = "10pcpvklm6kr0lv2xrsbpg2037ni9j6dmxgjf56p466l3gz60iwy";
+ })
+ ];
+
+ nativeBuildInputs = [ cmake gettext pkgconfig wrapGAppsHook ];
+ buildInputs =
+ [ glib
+ gsettings-desktop-schemas
+ gtk3
+ hicolor-icon-theme
+ libsndfile
+ libxml2
+ pcre
+ poppler
+ portaudio
+ zlib
+ ]
+ ++ lib.optional withLua lua;
+
+ enableParallelBuilding = true;
+
+ meta = with stdenv.lib; {
+ description = "Xournal++ is a handwriting Notetaking software with PDF annotation support";
+ homepage = https://github.com/xournalpp/xournalpp;
+ license = licenses.gpl2;
+ maintainers = with maintainers; [ andrew-d ];
+ platforms = platforms.linux;
+ };
+}
diff --git a/pkgs/applications/misc/appeditor/default.nix b/pkgs/applications/misc/appeditor/default.nix
new file mode 100644
index 00000000000..0530ec9c1b8
--- /dev/null
+++ b/pkgs/applications/misc/appeditor/default.nix
@@ -0,0 +1,56 @@
+{ stdenv
+, fetchFromGitHub
+, meson
+, ninja
+, pkgconfig
+, pantheon
+, python3
+, gettext
+, glib
+, gtk3
+, hicolor-icon-theme
+, libgee
+, wrapGAppsHook }:
+
+stdenv.mkDerivation rec {
+ pname = "appeditor";
+ version = "1.1.0";
+
+ src = fetchFromGitHub {
+ owner = "donadigo";
+ repo = "appeditor";
+ rev = version;
+ sha256 = "04x2f4x4dp5ca2y3qllqjgirbyl6383pfl4bi9bkcqlg8b5081rg";
+ };
+
+ nativeBuildInputs = [
+ gettext
+ meson
+ ninja
+ pantheon.vala
+ pkgconfig
+ python3
+ wrapGAppsHook
+ ];
+
+ buildInputs = [
+ glib
+ gtk3
+ hicolor-icon-theme
+ pantheon.granite
+ libgee
+ ];
+
+ postPatch = ''
+ chmod +x meson/post_install.py
+ patchShebangs meson/post_install.py
+ '';
+
+ meta = with stdenv.lib; {
+ description = "Edit the Pantheon desktop application menu";
+ homepage = https://github.com/donadigo/appeditor;
+ maintainers = with maintainers; [ kjuvi ] ++ pantheon.maintainers;
+ platforms = platforms.linux;
+ license = licenses.gpl3;
+ };
+}
diff --git a/pkgs/applications/misc/calibre/default.nix b/pkgs/applications/misc/calibre/default.nix
index b52156beac6..39b4dbe0fe5 100644
--- a/pkgs/applications/misc/calibre/default.nix
+++ b/pkgs/applications/misc/calibre/default.nix
@@ -5,12 +5,12 @@
}:
stdenv.mkDerivation rec {
- version = "3.39.1";
+ version = "3.40.1";
name = "calibre-${version}";
src = fetchurl {
url = "https://download.calibre-ebook.com/${version}/${name}.tar.xz";
- sha256 = "08c1wsdn0giv9zfb6bis9bbrw687rci8fs26qsal8ijmjk55dfsh";
+ sha256 = "1s1kq8axfymr7agg7dqw47kanlrkzzhsy8pcj1fs5644zjp5n0bq";
};
patches = [
diff --git a/pkgs/applications/misc/cheat/default.nix b/pkgs/applications/misc/cheat/default.nix
index 1a162aca0d7..41660bc7f2b 100644
--- a/pkgs/applications/misc/cheat/default.nix
+++ b/pkgs/applications/misc/cheat/default.nix
@@ -1,30 +1,37 @@
-{ stdenv, python3Packages, fetchFromGitHub }:
+{ stdenv, python3, fetchFromGitHub }:
-with python3Packages;
+with python3.pkgs;
buildPythonApplication rec {
name = "${pname}-${version}";
pname = "cheat";
- version = "2.3.1";
+ version = "2.5.1";
- propagatedBuildInputs = [ docopt pygments ];
+ propagatedBuildInputs = [ docopt pygments termcolor ];
src = fetchFromGitHub {
owner = "chrisallenlane";
repo = "cheat";
rev = version;
- sha256 = "1dcpjvbv648r8325qjf30m8b4cyrrjbzc2kvh40zy2mbjsa755zr";
+ sha256 = "1i543hvg1yizamfd83bawflfcb500hvc72i59ikck8j1hjk50hsl";
};
# no tests available
doCheck = false;
postInstall = ''
install -D man1/cheat.1.gz $out/share/man/man1/cheat.1.gz
+ mv $out/${python3.sitePackages}/etc $out/
+ mv $out/${python3.sitePackages}/usr/share/* $out/share/
+ rm -r $out/${python3.sitePackages}/usr
'';
+ makeWrapperArgs = [
+ "--suffix" "CHEAT_PATH" ":" "$out/share/cheat"
+ ];
+
meta = with stdenv.lib; {
description = "cheat allows you to create and view interactive cheatsheets on the command-line";
maintainers = with maintainers; [ mic92 ];
- license = with licenses; [gpl3 mit];
+ license = with licenses; [ gpl3 mit ];
homepage = https://github.com/chrisallenlane/cheat;
};
}
diff --git a/pkgs/applications/misc/cherrytree/default.nix b/pkgs/applications/misc/cherrytree/default.nix
index 78059191c2c..0578393dfca 100644
--- a/pkgs/applications/misc/cherrytree/default.nix
+++ b/pkgs/applications/misc/cherrytree/default.nix
@@ -4,11 +4,11 @@ with stdenv.lib;
stdenv.mkDerivation rec {
name = "cherrytree-${version}";
- version = "0.38.7";
+ version = "0.38.8";
src = fetchurl {
url = "https://www.giuspen.com/software/${name}.tar.xz";
- sha256 = "1ls7vz993hj5gd99imlrzahxznfg6fa4n77ikkj79va4csw9b892";
+ sha256 = "1ns87xl2sgrf3nha4xkhp0xcxlycqszlp6xdrn95lg6vzm0fa8dg";
};
buildInputs = with pythonPackages;
diff --git a/pkgs/applications/misc/curaengine/default.nix b/pkgs/applications/misc/curaengine/default.nix
index 22215a7e2c6..ac0f9d542dd 100644
--- a/pkgs/applications/misc/curaengine/default.nix
+++ b/pkgs/applications/misc/curaengine/default.nix
@@ -1,4 +1,4 @@
-{ stdenv, fetchFromGitHub, fetchpatch, cmake, libarcus, stb }:
+{ stdenv, fetchFromGitHub, fetchpatch, cmake, libarcus, stb, protobuf }:
stdenv.mkDerivation rec {
name = "curaengine-${version}";
@@ -12,7 +12,7 @@ stdenv.mkDerivation rec {
};
nativeBuildInputs = [ cmake ];
- buildInputs = [ libarcus stb ];
+ buildInputs = [ libarcus stb protobuf ];
cmakeFlags = [ "-DCURA_ENGINE_VERSION=${version}" ];
diff --git a/pkgs/applications/misc/filet/default.nix b/pkgs/applications/misc/filet/default.nix
new file mode 100644
index 00000000000..edee9ab33e9
--- /dev/null
+++ b/pkgs/applications/misc/filet/default.nix
@@ -0,0 +1,23 @@
+{ stdenv, fetchFromGitHub }:
+
+stdenv.mkDerivation rec {
+ pname = "filet";
+ version = "0.1.3";
+
+ src = fetchFromGitHub {
+ owner = "buffet";
+ repo = "filet";
+ rev = version;
+ sha256 = "0hm7589ih30axafqxhhs4fg1pvfhlqzyzzmfi2ilx8haq5111fsf";
+ };
+
+ makeFlags = [ "PREFIX=$(out)" ];
+
+ meta = with stdenv.lib; {
+ description = "A fucking fucking fast file fucker (afffff)";
+ homepage = https://github.com/buffet/filet;
+ license = licenses.mpl20;
+ platforms = platforms.all;
+ maintainers = with maintainers; [ buffet ];
+ };
+}
diff --git a/pkgs/applications/misc/ganttproject-bin/default.nix b/pkgs/applications/misc/ganttproject-bin/default.nix
index 2257b2a98fb..6bc18ba3790 100644
--- a/pkgs/applications/misc/ganttproject-bin/default.nix
+++ b/pkgs/applications/misc/ganttproject-bin/default.nix
@@ -1,12 +1,13 @@
-{ stdenv, fetchzip, makeDesktopItem, makeWrapper
-, jre }:
+{ stdenv, lib, fetchzip, makeDesktopItem, makeWrapper
+, jre
+}:
stdenv.mkDerivation rec {
name = "ganttproject-bin-${version}";
- version = "2.7.2";
+ version = "2.8.10";
- src = let build = "r1954"; in fetchzip {
- sha256 = "0l655w6n88j7klz56af8xkpiv1pwlkfl5x1d33sqv9dnyisyw2hc";
+ src = let build = "r2364"; in fetchzip {
+ sha256 = "0cclgyqv4f9pjsdlh93cqvgbzrp8ajvrpc2xszs03sknqz2kdh7r";
url = "https://dl.ganttproject.biz/ganttproject-${version}/"
+ "ganttproject-${version}-${build}.zip";
};
@@ -28,18 +29,21 @@ stdenv.mkDerivation rec {
categories = "Office;Application;";
};
+ javaOptions = [
+ "-Dawt.useSystemAAFontSettings=on"
+ ];
+
in ''
mkdir -pv "$out/share/ganttproject"
cp -rv * "$out/share/ganttproject"
mkdir -pv "$out/bin"
wrapProgram "$out/share/ganttproject/ganttproject" \
- --set JAVA_HOME "${jre}"
+ --set JAVA_HOME "${jre}" \
+ --set _JAVA_OPTIONS "${builtins.toString javaOptions}"
+
mv -v "$out/share/ganttproject/ganttproject" "$out/bin"
- install -v -Dm644 \
- plugins/net.sourceforge.ganttproject/data/resources/icons/ganttproject.png \
- "$out/share/pixmaps/ganttproject.png"
cp -rv "${desktopItem}/share/applications" "$out/share"
'';
@@ -51,5 +55,6 @@ stdenv.mkDerivation rec {
# ‘GPL3-compatible’. See ${downloadPage} for detailed information.
license = licenses.gpl3Plus;
platforms = platforms.linux;
+ maintainers = [ maintainers.vidbina ];
};
}
diff --git a/pkgs/applications/misc/gtk2fontsel/default.nix b/pkgs/applications/misc/gtk2fontsel/default.nix
index cf409b4c185..8f683272e12 100644
--- a/pkgs/applications/misc/gtk2fontsel/default.nix
+++ b/pkgs/applications/misc/gtk2fontsel/default.nix
@@ -1,4 +1,4 @@
-{stdenv, fetchurl, pkgconfig, gtk }:
+{stdenv, fetchurl, pkgconfig, gtk2 }:
stdenv.mkDerivation rec {
version = "0.1";
@@ -10,7 +10,7 @@ stdenv.mkDerivation rec {
};
nativeBuildInputs = [ pkgconfig ];
- buildInputs = [ stdenv gtk ];
+ buildInputs = [ stdenv gtk2 ];
preferLocalBuild = true;
diff --git a/pkgs/applications/misc/hyper/default.nix b/pkgs/applications/misc/hyper/default.nix
index 04c3e0320f6..2fd7e2f94af 100644
--- a/pkgs/applications/misc/hyper/default.nix
+++ b/pkgs/applications/misc/hyper/default.nix
@@ -11,11 +11,11 @@ let
];
in
stdenv.mkDerivation rec {
- version = "2.1.1";
+ version = "2.1.2";
name = "hyper-${version}";
src = fetchurl {
url = "https://github.com/zeit/hyper/releases/download/${version}/hyper_${version}_amd64.deb";
- sha256 = "1vr4j2vb2wpn8qzgq30l8kfck2an03jwchwywyx4zsl2vz3qp70x";
+ sha256 = "1n4qlbk7q9zkhhg72mdks95g15xgyrc6ixf882ghvrqghd4zxplm";
};
buildInputs = [ dpkg ];
unpackPhase = ''
diff --git a/pkgs/applications/misc/ocropus/default.nix b/pkgs/applications/misc/ocropus/default.nix
index 40432c18aa3..a604349afb0 100644
--- a/pkgs/applications/misc/ocropus/default.nix
+++ b/pkgs/applications/misc/ocropus/default.nix
@@ -18,12 +18,12 @@ let
in
pythonPackages.buildPythonApplication rec {
- name = "ocropus-${version}";
- version = "20170811";
+ pname = "ocropus";
+ version = "1.3.3";
src = fetchFromGitHub {
- sha256 = "0qx0d8yj0w66qglkrmfavp5dh1sky72njfaqii7bnrpv5n4j3q39";
- rev = "ae84a8edaf0b76135f749ba66fc30c272d0726d0";
+ sha256 = "02p1334mic5cfhvpfphfrbim4036yfd8s2zzpwm0xmm829z71nr7";
+ rev = "v${version}";
repo = "ocropy";
owner = "tmbdev";
};
diff --git a/pkgs/applications/misc/udiskie/default.nix b/pkgs/applications/misc/udiskie/default.nix
index 1eb65098fd5..459104aba63 100644
--- a/pkgs/applications/misc/udiskie/default.nix
+++ b/pkgs/applications/misc/udiskie/default.nix
@@ -1,14 +1,11 @@
{ stdenv, fetchFromGitHub, asciidoc-full, gettext
, gobject-introspection, gtk3, hicolor-icon-theme, libappindicator-gtk3, libnotify, librsvg
, udisks2, wrapGAppsHook
-, buildPythonApplication
-, docopt
-, pygobject3
-, pyyaml
+, python3Packages
}:
-buildPythonApplication rec {
- name = "udiskie-${version}";
+python3Packages.buildPythonApplication rec {
+ pname = "udiskie";
version = "1.7.7";
src = fetchFromGitHub {
@@ -18,16 +15,27 @@ buildPythonApplication rec {
sha256 = "1j17z26vy44il2s9zgchvhq280vq8ag64ddi35f35b444wz2azlb";
};
- buildInputs = [
+ nativeBuildInputs = [
+ gettext
asciidoc-full # For building man page.
- hicolor-icon-theme
+ gobject-introspection
wrapGAppsHook
- librsvg # required for loading svg icons (udiskie uses svg icons)
];
- propagatedBuildInputs = [
- gettext gobject-introspection gtk3 libnotify docopt
- pygobject3 pyyaml udisks2 libappindicator-gtk3
+ buildInputs = [
+ hicolor-icon-theme
+ librsvg # required for loading svg icons (udiskie uses svg icons)
+ gobject-introspection
+ libnotify
+ gtk3
+ udisks2
+ libappindicator-gtk3
+ ];
+
+ propagatedBuildInputs = with python3Packages; [
+ docopt
+ pygobject3
+ pyyaml
];
postBuild = "make -C doc";
@@ -37,8 +45,14 @@ buildPythonApplication rec {
cp -v doc/udiskie.8 $out/share/man/man8/
'';
- # tests require dbusmock
- doCheck = false;
+ checkInputs = with python3Packages; [
+ nose
+ keyutils
+ ];
+
+ checkPhase = ''
+ nosetests
+ '';
meta = with stdenv.lib; {
description = "Removable disk automounter for udisks";
diff --git a/pkgs/applications/misc/xpdf/default.nix b/pkgs/applications/misc/xpdf/default.nix
index a2f39faaea7..eb76448391e 100644
--- a/pkgs/applications/misc/xpdf/default.nix
+++ b/pkgs/applications/misc/xpdf/default.nix
@@ -59,6 +59,5 @@ stdenv.mkDerivation {
'';
license = with licenses; [ gpl2 gpl3 ];
platforms = platforms.unix;
- maintainers = [ maintainers.peti ];
};
}
diff --git a/pkgs/applications/misc/xteddy/default.nix b/pkgs/applications/misc/xteddy/default.nix
new file mode 100644
index 00000000000..6f67ed96c57
--- /dev/null
+++ b/pkgs/applications/misc/xteddy/default.nix
@@ -0,0 +1,40 @@
+{ stdenv, fetchzip, pkg-config, xorg, imlib2, makeWrapper }:
+
+stdenv.mkDerivation rec {
+ name = "xteddy-${version}";
+ version = "2.2";
+ src = fetchzip {
+ url = "https://deb.debian.org/debian/pool/main/x/xteddy/xteddy_${version}.orig.tar.gz";
+ sha256 = "0sap4fqvs0888ymf5ga10p3n7n5kr35j38kfsfd7nj0xm4hmcma3";
+ };
+ nativeBuildInputs = [ pkg-config makeWrapper ];
+ buildInputs = [ imlib2 xorg.libX11 xorg.libXext ];
+
+ makeFlags = [ "LIBS=-lXext" ];
+
+ postPatch = ''
+ sed -i 's/man 1 xteddy/man 6 xteddy/' xteddy.c
+ sed -i "s:/usr/games/xteddy:$out/bin/xteddy:" xtoys
+ sed -i "s:/usr/share/xteddy:$out/share/xteddy:" xtoys
+ '';
+
+ postInstall = ''
+ cp -R images $out/share/images
+ # remove broken test script
+ rm $out/bin/xteddy_test
+ '';
+
+ postFixup = ''
+ # this is needed, because xteddy expects images to reside
+ # in the current working directory
+ wrapProgram $out/bin/xteddy --run "cd $out/share/images/"
+ '';
+
+ meta = with stdenv.lib; {
+ description = "Cuddly teddy bear for your X desktop";
+ homepage = https://weber.itn.liu.se/~stegu/xteddy/;
+ license = licenses.gpl2;
+ maintainers = [ maintainers.xaverdh ];
+ platforms = platforms.linux;
+ };
+}
diff --git a/pkgs/applications/networking/browsers/chromium/common.nix b/pkgs/applications/networking/browsers/chromium/common.nix
index 5d59f7514c6..36576df4b73 100644
--- a/pkgs/applications/networking/browsers/chromium/common.nix
+++ b/pkgs/applications/networking/browsers/chromium/common.nix
@@ -11,7 +11,7 @@
, nspr, systemd, kerberos
, utillinux, alsaLib
, bison, gperf
-, glib, gtk2, gtk3, dbus-glib
+, glib, gtk3, dbus-glib
, glibc
, libXScrnSaver, libXcursor, libXtst, libGLU_combined
, protobuf, speechd, libXdamage, cups
@@ -104,7 +104,7 @@ let
else result;
base = rec {
- name = "${packageName}-${version}";
+ name = "${packageName}-unwrapped-${version}";
inherit (upstream-info) version;
inherit packageName buildType buildPath;
@@ -120,7 +120,7 @@ let
nspr nss systemd
utillinux alsaLib
bison gperf kerberos
- glib gtk2 gtk3 dbus-glib
+ glib gtk3 dbus-glib
libXScrnSaver libXcursor libXtst libGLU_combined
pciutils protobuf speechd libXdamage at-spi2-core
] ++ optional gnomeKeyringSupport libgnome-keyring3
@@ -132,6 +132,8 @@ let
patches = optional enableWideVine ./patches/widevine.patch ++ [
./patches/nix_plugin_paths_68.patch
./patches/remove-webp-include-69.patch
+ ./patches/jumbo-sorted.patch
+ ./patches/no-build-timestamps.patch
# Unfortunately, chromium regularly breaks on major updates and
# then needs various patches backported in order to be compiled with GCC.
diff --git a/pkgs/applications/networking/browsers/chromium/patches/jumbo-sorted.patch b/pkgs/applications/networking/browsers/chromium/patches/jumbo-sorted.patch
new file mode 100644
index 00000000000..cdf0f695f76
--- /dev/null
+++ b/pkgs/applications/networking/browsers/chromium/patches/jumbo-sorted.patch
@@ -0,0 +1,11 @@
+--- chromium-70.0.3538.67/build/config/merge_for_jumbo.py.old 2018-10-25 19:15:54.578222230 +0300
++++ chromium-70.0.3538.67/build/config/merge_for_jumbo.py 2018-10-25 19:20:44.397613032 +0300
+@@ -132,6 +132,8 @@
+ assert not inputs
+ continue
+
++ inputs.sort()
++ outputs.sort()
+ write_jumbo_files(inputs, outputs, written_input_set, written_output_set)
+
+ assert set(args.outputs) == written_output_set, "Did not fill all outputs"
diff --git a/pkgs/applications/networking/browsers/chromium/patches/no-build-timestamps.patch b/pkgs/applications/networking/browsers/chromium/patches/no-build-timestamps.patch
new file mode 100644
index 00000000000..e06d848095c
--- /dev/null
+++ b/pkgs/applications/networking/browsers/chromium/patches/no-build-timestamps.patch
@@ -0,0 +1,17 @@
+--- chromium-70.0.3538.67/build/compute_build_timestamp.py.orig 2018-11-02 16:00:34.368933077 +0200
++++ chromium-70.0.3538.67/build/compute_build_timestamp.py 2018-11-08 04:06:21.658105129 +0200
+@@ -94,6 +94,14 @@
+ 'build_type', help='The type of build', choices=('official', 'default'))
+ args = argument_parser.parse_args()
+
++ # I don't trust LASTCHANGE magic, and I definelly want something deterministic here
++ SOURCE_DATE_EPOCH = os.getenv("SOURCE_DATE_EPOCH", None)
++ if SOURCE_DATE_EPOCH is not None:
++ print SOURCE_DATE_EPOCH
++ return 0
++ else:
++ raise RuntimeError("SOURCE_DATE_EPOCH not set")
++
+ # The mtime of the revision in build/util/LASTCHANGE is stored in a file
+ # next to it. Read it, to get a deterministic time close to "now".
+ # That date is then modified as described at the top of the file so that
diff --git a/pkgs/applications/networking/browsers/chromium/upstream-info.nix b/pkgs/applications/networking/browsers/chromium/upstream-info.nix
index 804702b08d5..322f75d9e78 100644
--- a/pkgs/applications/networking/browsers/chromium/upstream-info.nix
+++ b/pkgs/applications/networking/browsers/chromium/upstream-info.nix
@@ -11,7 +11,7 @@
version = "74.0.3717.0";
};
stable = {
- sha256 = "0ylig933xzn6c0018nxq95xhl0wkxcm95fdiy2c7s4a4h3hkr5dk";
+ sha256 = "07xwmlvmzfga61nrimqmzl7s29jb4kc94nkzwwlb7sh6nr55a7jc";
sha256bin64 = "1jdj2jp4jvzi5a24dm56ls5kx6xpiiv98yx4si9z19lm5srrji8j";
version = "72.0.3626.121";
};
diff --git a/pkgs/applications/networking/browsers/firefox/update.nix b/pkgs/applications/networking/browsers/firefox/update.nix
index b03720f988a..0ead6de123a 100644
--- a/pkgs/applications/networking/browsers/firefox/update.nix
+++ b/pkgs/applications/networking/browsers/firefox/update.nix
@@ -32,5 +32,5 @@ writeScript "update-${attrPath}" ''
sort --version-sort | \
tail -n 1`
- update-source-version ${attrPath} "$version" "" "" ${versionKey}
+ update-source-version ${attrPath} "$version" "" "" --version-key=${versionKey}
''
diff --git a/pkgs/applications/networking/browsers/uzbl/default.nix b/pkgs/applications/networking/browsers/uzbl/default.nix
index 12cf108355c..1d08895f1b0 100644
--- a/pkgs/applications/networking/browsers/uzbl/default.nix
+++ b/pkgs/applications/networking/browsers/uzbl/default.nix
@@ -1,5 +1,5 @@
{ stdenv, fetchurl, pkgconfig, python3, makeWrapper
-, webkit, glib-networking, gsettings-desktop-schemas, python2Packages
+, webkitgtk, glib-networking, gsettings-desktop-schemas, python2Packages
}:
# This package needs python3 during buildtime,
# but Python 2 + packages during runtime.
@@ -40,6 +40,6 @@ stdenv.mkDerivation rec {
nativeBuildInputs = [ pkgconfig python3 makeWrapper ];
- buildInputs = [ gsettings-desktop-schemas webkit ];
+ buildInputs = [ gsettings-desktop-schemas webkitgtk ];
propagatedBuildInputs = with python2Packages; [ pygtk six ];
}
diff --git a/pkgs/applications/networking/browsers/vimb/default.nix b/pkgs/applications/networking/browsers/vimb/default.nix
index 569a4593dfe..cc9bc38bc4d 100644
--- a/pkgs/applications/networking/browsers/vimb/default.nix
+++ b/pkgs/applications/networking/browsers/vimb/default.nix
@@ -1,4 +1,4 @@
-{ stdenv, fetchFromGitHub, pkgconfig, libsoup, webkit, gtk3, glib-networking
+{ stdenv, fetchFromGitHub, pkgconfig, libsoup, webkitgtk, gtk3, glib-networking
, gsettings-desktop-schemas, wrapGAppsHook
}:
@@ -14,7 +14,7 @@ stdenv.mkDerivation rec {
};
nativeBuildInputs = [ wrapGAppsHook pkgconfig ];
- buildInputs = [ gtk3 libsoup webkit glib-networking gsettings-desktop-schemas ];
+ buildInputs = [ gtk3 libsoup webkitgtk glib-networking gsettings-desktop-schemas ];
makeFlags = [ "PREFIX=${placeholder "out"}" ];
diff --git a/pkgs/applications/networking/browsers/vimprobable2/default.nix b/pkgs/applications/networking/browsers/vimprobable2/default.nix
index 9de7518677d..678f226816a 100644
--- a/pkgs/applications/networking/browsers/vimprobable2/default.nix
+++ b/pkgs/applications/networking/browsers/vimprobable2/default.nix
@@ -1,5 +1,5 @@
{ stdenv, fetchurl, makeWrapper, glib-networking, gtk2, libsoup, libX11, perl,
- pkgconfig, webkit, gsettings-desktop-schemas }:
+ pkgconfig, webkitgtk, gsettings-desktop-schemas }:
stdenv.mkDerivation rec {
version = "1.4.2";
@@ -10,7 +10,7 @@ stdenv.mkDerivation rec {
};
nativeBuildInputs = [ pkgconfig ];
- buildInputs = [ makeWrapper gtk2 libsoup libX11 perl webkit gsettings-desktop-schemas ];
+ buildInputs = [ makeWrapper gtk2 libsoup libX11 perl webkitgtk gsettings-desktop-schemas ];
hardeningDisable = [ "format" ];
diff --git a/pkgs/applications/networking/browsers/vivaldi/default.nix b/pkgs/applications/networking/browsers/vivaldi/default.nix
index a90fd74eced..9537f1365bd 100644
--- a/pkgs/applications/networking/browsers/vivaldi/default.nix
+++ b/pkgs/applications/networking/browsers/vivaldi/default.nix
@@ -13,11 +13,11 @@
stdenv.mkDerivation rec {
name = "${product}-${version}";
product = "vivaldi";
- version = "2.3.1440.57-1";
+ version = "2.3.1440.60-1";
src = fetchurl {
url = "https://downloads.vivaldi.com/stable/${product}-stable_${version}_amd64.deb";
- sha256 = "0q8kdhsgk7ppc6cckzfk730ab136qqfdk8zrxkindjpzvl1lmmlv";
+ sha256 = "1vw4lyqs87cw7v1jy3dcsgnb56s61zl21q95a3kiavqw7412sips";
};
unpackPhase = ''
diff --git a/pkgs/applications/networking/browsers/vivaldi/ffmpeg-codecs.nix b/pkgs/applications/networking/browsers/vivaldi/ffmpeg-codecs.nix
index 4839ec1a2c8..ec2646440b3 100644
--- a/pkgs/applications/networking/browsers/vivaldi/ffmpeg-codecs.nix
+++ b/pkgs/applications/networking/browsers/vivaldi/ffmpeg-codecs.nix
@@ -6,11 +6,11 @@
stdenv.mkDerivation rec {
name = "${product}-${version}";
product = "vivaldi-ffmpeg-codecs";
- version = "72.0.3626.121";
+ version = "72.0.3626.122";
src = fetchurl {
url = "https://commondatastorage.googleapis.com/chromium-browser-official/chromium-${version}.tar.xz";
- sha512 = "2bcwgv75cmv92i89vhwd253hcgzgjxjpxr9zp46wfcw5hbiya1xx95p01wsny0blnwv76s9n7n41z3r7fkv6mnv1zb2mnb2lrzvmghb";
+ sha512 = "1477g5dgi4m0zbiqwm9w6jqkmjfmgjlbl3qs9ljldx8bif8my1jbz4hzws954aqxyxdbf5rjpvmrrqqppk5347prvsyl37rbsndaaqf";
};
buildInputs = [ ];
diff --git a/pkgs/applications/networking/cluster/cni/plugins.nix b/pkgs/applications/networking/cluster/cni/plugins.nix
index 27e0a038310..6d50c598de7 100644
--- a/pkgs/applications/networking/cluster/cni/plugins.nix
+++ b/pkgs/applications/networking/cluster/cni/plugins.nix
@@ -13,10 +13,9 @@ stdenv.mkDerivation rec {
buildInputs = [ removeReferencesTo go ];
- GOCACHE = "off";
-
buildPhase = ''
patchShebangs build.sh
+ export "GOCACHE=$TMPDIR/go-cache"
./build.sh
'';
diff --git a/pkgs/applications/networking/cluster/hetzner-kube/default.nix b/pkgs/applications/networking/cluster/hetzner-kube/default.nix
index fe2420a719d..2c7d9c1d5a1 100644
--- a/pkgs/applications/networking/cluster/hetzner-kube/default.nix
+++ b/pkgs/applications/networking/cluster/hetzner-kube/default.nix
@@ -1,18 +1,19 @@
{ lib, buildGoPackage, fetchFromGitHub, ... }:
-let version = "0.3.1"; in
-
-buildGoPackage {
- name = "hetzner-kube-${version}";
+buildGoPackage rec {
+ pname = "hetzner-kube";
+ version = "0.3.2-rc1";
src = fetchFromGitHub {
owner = "xetys";
repo = "hetzner-kube";
- rev = "${version}";
- sha256 = "1xldh1ca8ym8cg3w5cxizmhqxwi5kmiin28f320mxdr28fzljc2w";
+ rev = version;
+ sha256 = "16pzcpcr98rcrv5k57fa7h9a82wiv4p2ckhkmisynkr7f1xk60mw";
};
goPackagePath = "github.com/xetys/hetzner-kube";
+ subPackages = ["."];
+ goDeps = ./deps.nix;
meta = {
description = "A CLI tool for provisioning Kubernetes clusters on Hetzner Cloud";
diff --git a/pkgs/applications/networking/cluster/hetzner-kube/deps.nix b/pkgs/applications/networking/cluster/hetzner-kube/deps.nix
new file mode 100644
index 00000000000..7b4328eddfc
--- /dev/null
+++ b/pkgs/applications/networking/cluster/hetzner-kube/deps.nix
@@ -0,0 +1,255 @@
+# file generated from Gopkg.lock using dep2nix (https://github.com/nixcloud/dep2nix)
+[
+ {
+ goPackagePath = "github.com/Pallinder/go-randomdata";
+ fetch = {
+ type = "git";
+ url = "https://github.com/Pallinder/go-randomdata";
+ rev = "15df0648130a623e418886f81b2aaecd0a00547b";
+ sha256 = "1kdrchnhp71spz6amcbxr5m0pdksbqx8jjydvxb82pw43rrbx6s7";
+ };
+ }
+ {
+ goPackagePath = "github.com/andreyvit/diff";
+ fetch = {
+ type = "git";
+ url = "https://github.com/andreyvit/diff";
+ rev = "c7f18ee00883bfd3b00e0a2bf7607827e0148ad4";
+ sha256 = "1s4qjkxig5yqahpzfl4xqh4kzi9mymdpkzq6kj3f4dr5dl3hlynr";
+ };
+ }
+ {
+ goPackagePath = "github.com/fsnotify/fsnotify";
+ fetch = {
+ type = "git";
+ url = "https://github.com/fsnotify/fsnotify";
+ rev = "c2828203cd70a50dcccfb2761f8b1f8ceef9a8e9";
+ sha256 = "07va9crci0ijlivbb7q57d2rz9h27zgn2fsm60spjsqpdbvyrx4g";
+ };
+ }
+ {
+ goPackagePath = "github.com/go-kit/kit";
+ fetch = {
+ type = "git";
+ url = "https://github.com/go-kit/kit";
+ rev = "ca4112baa34cb55091301bdc13b1420a122b1b9e";
+ sha256 = "0vsqmjnd3zj3qxg455kz27fjd9zh2vx5x17hfgzjv2pqsg3jas13";
+ };
+ }
+ {
+ goPackagePath = "github.com/go-logfmt/logfmt";
+ fetch = {
+ type = "git";
+ url = "https://github.com/go-logfmt/logfmt";
+ rev = "390ab7935ee28ec6b286364bba9b4dd6410cb3d5";
+ sha256 = "1gkgh3k5w1xwb2qbjq52p6azq3h1c1rr6pfwjlwj1zrijpzn2xb9";
+ };
+ }
+ {
+ goPackagePath = "github.com/go-stack/stack";
+ fetch = {
+ type = "git";
+ url = "https://github.com/go-stack/stack";
+ rev = "259ab82a6cad3992b4e21ff5cac294ccb06474bc";
+ sha256 = "0irkqifyj84cbnq4n66ax2r591id2285diw5hzcz2k3bga8d8lqr";
+ };
+ }
+ {
+ goPackagePath = "github.com/gosuri/uilive";
+ fetch = {
+ type = "git";
+ url = "https://github.com/gosuri/uilive";
+ rev = "ac356e6e42cd31fcef8e6aec13ae9ed6fe87713e";
+ sha256 = "1k28zbc14p1yqzhamp9rcagjdw6wsdb55m08nx758jwlr31az6jy";
+ };
+ }
+ {
+ goPackagePath = "github.com/gosuri/uiprogress";
+ fetch = {
+ type = "git";
+ url = "https://github.com/gosuri/uiprogress";
+ rev = "d0567a9d84a1c40dd7568115ea66f4887bf57b33";
+ sha256 = "1m7rxf71mn8w2yysc8wmf2703avhci6f4nkiijjl1f2cx4kzykck";
+ };
+ }
+ {
+ goPackagePath = "github.com/hashicorp/hcl";
+ fetch = {
+ type = "git";
+ url = "https://github.com/hashicorp/hcl";
+ rev = "ef8a98b0bbce4a65b5aa4c368430a80ddc533168";
+ sha256 = "1qalfsc31fra7hcw2lc3s20aj7al62fq3j5fn5kga3mg99b82nyr";
+ };
+ }
+ {
+ goPackagePath = "github.com/hetznercloud/hcloud-go";
+ fetch = {
+ type = "git";
+ url = "https://github.com/hetznercloud/hcloud-go";
+ rev = "400c6f026bf3c8d5fead3df7806e6981a16bb6b8";
+ sha256 = "0y6y7glnzbrzmly2j139vj8279w3c8bm1zc2mzljwyjpa6pvp7di";
+ };
+ }
+ {
+ goPackagePath = "github.com/inconshreveable/mousetrap";
+ fetch = {
+ type = "git";
+ url = "https://github.com/inconshreveable/mousetrap";
+ rev = "76626ae9c91c4f2a10f34cad8ce83ea42c93bb75";
+ sha256 = "1mn0kg48xkd74brf48qf5hzp0bc6g8cf5a77w895rl3qnlpfw152";
+ };
+ }
+ {
+ goPackagePath = "github.com/kr/logfmt";
+ fetch = {
+ type = "git";
+ url = "https://github.com/kr/logfmt";
+ rev = "b84e30acd515aadc4b783ad4ff83aff3299bdfe0";
+ sha256 = "02ldzxgznrfdzvghfraslhgp19la1fczcbzh7wm2zdc6lmpd1qq9";
+ };
+ }
+ {
+ goPackagePath = "github.com/magiconair/properties";
+ fetch = {
+ type = "git";
+ url = "https://github.com/magiconair/properties";
+ rev = "c2353362d570a7bfa228149c62842019201cfb71";
+ sha256 = "1a10362wv8a8qwb818wygn2z48lgzch940hvpv81hv8gc747ajxn";
+ };
+ }
+ {
+ goPackagePath = "github.com/mattn/go-isatty";
+ fetch = {
+ type = "git";
+ url = "https://github.com/mattn/go-isatty";
+ rev = "0360b2af4f38e8d38c7fce2a9f4e702702d73a39";
+ sha256 = "06w45aqz2a6yrk25axbly2k5wmsccv8cspb94bfmz4izvw8h927n";
+ };
+ }
+ {
+ goPackagePath = "github.com/mitchellh/go-homedir";
+ fetch = {
+ type = "git";
+ url = "https://github.com/mitchellh/go-homedir";
+ rev = "58046073cbffe2f25d425fe1331102f55cf719de";
+ sha256 = "0kwflrwsjdsy8vbhyzicc4c2vdi7lhdvn4rarfr18x1qsrb7n1bx";
+ };
+ }
+ {
+ goPackagePath = "github.com/mitchellh/mapstructure";
+ fetch = {
+ type = "git";
+ url = "https://github.com/mitchellh/mapstructure";
+ rev = "f15292f7a699fcc1a38a80977f80a046874ba8ac";
+ sha256 = "0zm3nhdvmj3f8q0vg2sjfw1sm3pwsw0ggz501awz95w99664a8al";
+ };
+ }
+ {
+ goPackagePath = "github.com/pelletier/go-toml";
+ fetch = {
+ type = "git";
+ url = "https://github.com/pelletier/go-toml";
+ rev = "c01d1270ff3e442a8a57cddc1c92dc1138598194";
+ sha256 = "1fjzpcjng60mc3a4b2ql5a00d5gah84wj740dabv9kq67mpg8fxy";
+ };
+ }
+ {
+ goPackagePath = "github.com/sergi/go-diff";
+ fetch = {
+ type = "git";
+ url = "https://github.com/sergi/go-diff";
+ rev = "1744e2970ca51c86172c8190fadad617561ed6e7";
+ sha256 = "0swiazj8wphs2zmk1qgq75xza6m19snif94h2m6fi8dqkwqdl7c7";
+ };
+ }
+ {
+ goPackagePath = "github.com/spf13/afero";
+ fetch = {
+ type = "git";
+ url = "https://github.com/spf13/afero";
+ rev = "787d034dfe70e44075ccc060d346146ef53270ad";
+ sha256 = "0138rjiacl71h7kvhzinviwvy6qa2m6rflpv9lgqv15hnjvhwvg1";
+ };
+ }
+ {
+ goPackagePath = "github.com/spf13/cast";
+ fetch = {
+ type = "git";
+ url = "https://github.com/spf13/cast";
+ rev = "8965335b8c7107321228e3e3702cab9832751bac";
+ sha256 = "177bk7lq40jbgv9p9r80aydpaccfk8ja3a7jjhfwiwk9r1pa4rr2";
+ };
+ }
+ {
+ goPackagePath = "github.com/spf13/cobra";
+ fetch = {
+ type = "git";
+ url = "https://github.com/spf13/cobra";
+ rev = "ef82de70bb3f60c65fb8eebacbb2d122ef517385";
+ sha256 = "1q1nsx05svyv9fv3fy6xv6gs9ffimkyzsfm49flvl3wnvf1ncrkd";
+ };
+ }
+ {
+ goPackagePath = "github.com/spf13/jwalterweatherman";
+ fetch = {
+ type = "git";
+ url = "https://github.com/spf13/jwalterweatherman";
+ rev = "14d3d4c518341bea657dd8a226f5121c0ff8c9f2";
+ sha256 = "1f9154lijbz0kkgqwmbphykwl4adv4fvkx6n1p7fdq3x5j9g8i17";
+ };
+ }
+ {
+ goPackagePath = "github.com/spf13/pflag";
+ fetch = {
+ type = "git";
+ url = "https://github.com/spf13/pflag";
+ rev = "9a97c102cda95a86cec2345a6f09f55a939babf5";
+ sha256 = "005598piihl3l83a71ahj10cpq9pbhjck4xishx1b4dzc02r9xr2";
+ };
+ }
+ {
+ goPackagePath = "github.com/spf13/viper";
+ fetch = {
+ type = "git";
+ url = "https://github.com/spf13/viper";
+ rev = "907c19d40d9a6c9bb55f040ff4ae45271a4754b9";
+ sha256 = "177ziws6mwxdlvicmgpv7w7zy5ri2wgnw2f2v3789b5skv9d6a6b";
+ };
+ }
+ {
+ goPackagePath = "golang.org/x/crypto";
+ fetch = {
+ type = "git";
+ url = "https://go.googlesource.com/crypto";
+ rev = "de0752318171da717af4ce24d0a2e8626afaeb11";
+ sha256 = "1ps1dl2a5lwr3vbwcy8n4i1v73m567y024sk961fk281phrzp13i";
+ };
+ }
+ {
+ goPackagePath = "golang.org/x/sys";
+ fetch = {
+ type = "git";
+ url = "https://go.googlesource.com/sys";
+ rev = "1c9583448a9c3aa0f9a6a5241bf73c0bd8aafded";
+ sha256 = "0g0nc549pmdmvja4mdqh0kgvznnw6wliqmx5wrnj02l3a23vizmi";
+ };
+ }
+ {
+ goPackagePath = "golang.org/x/text";
+ fetch = {
+ type = "git";
+ url = "https://go.googlesource.com/text";
+ rev = "f21a4dfb5e38f5895301dc265a8def02365cc3d0";
+ sha256 = "0r6x6zjzhr8ksqlpiwm5gdd7s209kwk5p4lw54xjvz10cs3qlq19";
+ };
+ }
+ {
+ goPackagePath = "gopkg.in/yaml.v2";
+ fetch = {
+ type = "git";
+ url = "https://github.com/go-yaml/yaml";
+ rev = "5420a8b6744d3b0345ab293f6fcba19c978f1183";
+ sha256 = "0dwjrs2lp2gdlscs7bsrmyc5yf6mm4fvgw71bzr9mv2qrd2q73s1";
+ };
+ }
+]
\ No newline at end of file
diff --git a/pkgs/applications/networking/cluster/jx/default.nix b/pkgs/applications/networking/cluster/jx/default.nix
new file mode 100644
index 00000000000..c31389a78c2
--- /dev/null
+++ b/pkgs/applications/networking/cluster/jx/default.nix
@@ -0,0 +1,59 @@
+{ buildGoPackage, fetchFromGitHub, lib }:
+
+let
+ removeVendoredPackages = goDeps:
+ ''
+ echo "Removing any vendored duplicate of direct dependency... "
+ for dir in $(find $NIX_BUILD_TOP/go/src -type d -name vendor); do
+ ${builtins.concatStringsSep "\n" (map (goDep: ''
+ if test -d $dir/${goDep.goPackagePath}; then
+ echo "Removing duplicate directory at $dir/${goDep.goPackagePath}"
+ rm -rf $dir/${goDep.goPackagePath}
+ fi
+ '') goDeps)}
+ done
+ echo "Done"
+ '';
+in
+buildGoPackage rec {
+ name = "jx";
+ version = "1.3.955";
+
+ goPackagePath = "github.com/jenkins-x/jx";
+ subPackages = [ "cmd/jx" ];
+
+ src = fetchFromGitHub {
+ owner = "jenkins-x";
+ repo = "jx";
+ rev = "v${version}";
+ sha256 = "0h4ck1a8rlyg10gaxbnwvlabwjlhdrigrina84x4m2gsqr3lnp9a";
+ };
+
+ # Some of the dependencies have their own checked in vendor directory that
+ # vendor their dependencies. However, some of those dependencies are also
+ # directly pulled down through the vgo modules. Removing these dependencies
+ # as they confuse the go compiler and causes the build to fail.
+ # Removing all the vendor directories also breaks the build.
+ preBuild = removeVendoredPackages (import goDeps);
+
+ buildFlagsArray = ''
+ -ldflags=
+ -X ${goPackagePath}/pkg/version.Version=${version}
+ -X ${goPackagePath}/pkg/version.Revision=${version}
+ '';
+
+ goDeps = ./deps.nix;
+
+ meta = with lib; {
+ description = "JX is a command line tool for installing and using Jenkins X.";
+ longDescription = ''
+ Jenkins X provides automated CI+CD for Kubernetes with Preview
+ Environments on Pull Requests using Jenkins, Knative Build, Prow,
+ Skaffold and Helm.
+ '';
+ homepage = https://github.com/jenkins-x/jx;
+ license = licenses.asl20 ;
+ maintainers = with maintainers; [ kalbasit ];
+ platforms = platforms.linux ++ platforms.darwin;
+ };
+}
diff --git a/pkgs/applications/networking/cluster/jx/deps.nix b/pkgs/applications/networking/cluster/jx/deps.nix
new file mode 100644
index 00000000000..1e8beb18738
--- /dev/null
+++ b/pkgs/applications/networking/cluster/jx/deps.nix
@@ -0,0 +1,3380 @@
+# file generated from go.mod using vgo2nix (https://github.com/adisbladis/vgo2nix)
+# file was patched manually to account for the `replace` statements in the
+# upstream go.mod that's not yet supported by vgo2nix.
+[
+ {
+ goPackagePath = "cloud.google.com/go";
+ fetch = {
+ type = "git";
+ url = "https://code.googlesource.com/gocloud";
+ rev = "v0.34.0";
+ sha256 = "1kclgclwar3r37zbvb9gg3qxbgzkb50zk3s9778zlh2773qikmai";
+ };
+ }
+ {
+ goPackagePath = "code.gitea.io/sdk";
+ fetch = {
+ type = "git";
+ url = "https://github.com/go-gitea/go-sdk";
+ rev = "79a281c4e34a";
+ sha256 = "1bkcsmjagsyaynyi562rsi3xvypnb2z38inq6ni5k9mxk9q5r8h0";
+ };
+ }
+ {
+ goPackagePath = "contrib.go.opencensus.io/exporter/aws";
+ fetch = {
+ type = "git";
+ url = "https://github.com/census-ecosystem/opencensus-go-exporter-aws";
+ rev = "dd54a7ef511e";
+ sha256 = "05xs00w0miw7ci329dmfhxdav3wfjcn3z63px7s8cqd78k18a4sn";
+ };
+ }
+ {
+ goPackagePath = "contrib.go.opencensus.io/exporter/stackdriver";
+ fetch = {
+ type = "git";
+ url = "https://github.com/census-ecosystem/opencensus-go-exporter-stackdriver";
+ rev = "v0.6.0";
+ sha256 = "0qhxpfmzn5jsh1qrq7w2zkg87xvalqam2ciq65qfq38mfkssda3v";
+ };
+ }
+ {
+ goPackagePath = "contrib.go.opencensus.io/integrations/ocsql";
+ fetch = {
+ type = "git";
+ url = "https://github.com/opencensus-integrations/ocsql";
+ rev = "v0.1.2";
+ sha256 = "0rs8dyr8jp4907h8f6ih3bgqbqjhq9q7m8b3pfvargmr7kq5si70";
+ };
+ }
+ {
+ goPackagePath = "git.apache.org/thrift.git";
+ fetch = {
+ type = "git";
+ url = "https://github.com/apache/thrift.git";
+ rev = "2566ecd5d999";
+ sha256 = "14gl0j85x3hj3gncf417f8zf92phrpvkj4clxmvbcq1dcgjdn6mc";
+ };
+ }
+ {
+ goPackagePath = "github.com/Azure/azure-pipeline-go";
+ fetch = {
+ type = "git";
+ url = "https://github.com/Azure/azure-pipeline-go";
+ rev = "v0.1.8";
+ sha256 = "0p2m31l893377na7dmsjfpjd5swqnb7p0vhsng3vyn237i8f1336";
+ };
+ }
+ {
+ goPackagePath = "github.com/Azure/azure-sdk-for-go";
+ fetch = {
+ type = "git";
+ url = "https://github.com/Azure/azure-sdk-for-go";
+ rev = "v21.1.0";
+ sha256 = "1rway7ksn6c98pxs036hl8nvljs3vxspgsjj9y1ncc0vzavg29d1";
+ };
+ }
+ {
+ goPackagePath = "github.com/Azure/azure-storage-blob-go";
+ fetch = {
+ type = "git";
+ url = "https://github.com/Azure/azure-storage-blob-go";
+ rev = "cf01652132cc";
+ sha256 = "0pcb59nsn094flpqwl7yz7cqvvwki0wam9r8gjbzqbsjn7ib3gac";
+ };
+ }
+ {
+ goPackagePath = "github.com/Azure/draft";
+ fetch = {
+ type = "git";
+ url = "https://github.com/Azure/draft";
+ rev = "v0.15.0";
+ sha256 = "03396zlalfsdxaiqpb97m8x9r060yyydvh0dkg7506pz5zrfm4pn";
+ };
+ }
+ {
+ goPackagePath = "github.com/Azure/go-ansiterm";
+ fetch = {
+ type = "git";
+ url = "https://github.com/Azure/go-ansiterm";
+ rev = "d6e3b3328b78";
+ sha256 = "010khrkhkf9cxlvvb6ncqv4c1qcdmpbz9jn38g4fxf4xsma8xx1q";
+ };
+ }
+ {
+ goPackagePath = "github.com/Azure/go-autorest";
+ fetch = {
+ type = "git";
+ url = "https://github.com/Azure/go-autorest";
+ rev = "v10.15.5";
+ sha256 = "158xbd8wn1bna1k1ichlirz6a1zvlh3rg7klr9cnp72l2q8jwvcl";
+ };
+ }
+ {
+ goPackagePath = "github.com/BurntSushi/toml";
+ fetch = {
+ type = "git";
+ url = "https://github.com/BurntSushi/toml";
+ rev = "v0.3.0";
+ sha256 = "0k7v2i1d2d6si8gswn83qb84czhhia53v2wdy33yz9ppdidxk0ry";
+ };
+ }
+ {
+ goPackagePath = "github.com/DataDog/datadog-go";
+ fetch = {
+ type = "git";
+ url = "https://github.com/DataDog/datadog-go";
+ rev = "281ae9f2d895";
+ sha256 = "1n82vl636zcpfrhh7yhmszvdxdba5hn2fjl39dvnk0a8pm2afmkx";
+ };
+ }
+ {
+ goPackagePath = "github.com/GoogleCloudPlatform/cloudsql-proxy";
+ fetch = {
+ type = "git";
+ url = "https://github.com/GoogleCloudPlatform/cloudsql-proxy";
+ rev = "ac834ce67862";
+ sha256 = "07n2hfhqa9hinabmx79aqqwxzzkky76x3jvpd89kch14fijbh532";
+ };
+ }
+ {
+ goPackagePath = "github.com/IBM-Cloud/bluemix-go";
+ fetch = {
+ type = "git";
+ url = "https://github.com/IBM-Cloud/bluemix-go";
+ rev = "d718d474c7c2";
+ sha256 = "1div1yrr7lbamh469hkd41acbjsln7jyaf0kzjxbjgb4rwmnh2jk";
+ };
+ }
+ {
+ goPackagePath = "github.com/Jeffail/gabs";
+ fetch = {
+ type = "git";
+ url = "https://github.com/Jeffail/gabs";
+ rev = "v1.1.1";
+ sha256 = "1lk6cn7fnnfyq8xb0xlv8zv3gvdd0vb2g8ikc9rfcppl7hwy51n8";
+ };
+ }
+ {
+ goPackagePath = "github.com/MakeNowJust/heredoc";
+ fetch = {
+ type = "git";
+ url = "https://github.com/MakeNowJust/heredoc";
+ rev = "e9091a26100e";
+ sha256 = "04lh2vm6d6s1vikzh9xb4ya744snr5c4v5797y2b8ri4pyfgd9h2";
+ };
+ }
+ {
+ goPackagePath = "github.com/Masterminds/semver";
+ fetch = {
+ type = "git";
+ url = "https://github.com/Masterminds/semver";
+ rev = "v1.4.2";
+ sha256 = "0k2fpk2x8jbvqkqxx5hkx1ygrsppzmzypqb90i1r33yq7ac7zlxj";
+ };
+ }
+ {
+ goPackagePath = "github.com/Masterminds/sprig";
+ fetch = {
+ type = "git";
+ url = "https://github.com/Masterminds/sprig";
+ rev = "6b2a58267f6a";
+ sha256 = "10vzhx710vaxqzh45vrkw4vc3fgcbycpn04shcylzcmlxmfnpjv1";
+ };
+ }
+ {
+ goPackagePath = "github.com/Microsoft/go-winio";
+ fetch = {
+ type = "git";
+ url = "https://github.com/Microsoft/go-winio";
+ rev = "v0.4.6";
+ sha256 = "0i3z8yrxlldq0n70ic30517437jzzxmvbglhbxrz75qnlzrglhlp";
+ };
+ }
+ {
+ goPackagePath = "github.com/NYTimes/gziphandler";
+ fetch = {
+ type = "git";
+ url = "https://github.com/NYTimes/gziphandler";
+ rev = "63027b26b87e";
+ sha256 = "1px0rlhxpap7rk37w0qlq66zzxwfvbpdc2sps2i2rqxgd3w5n31g";
+ };
+ }
+ {
+ goPackagePath = "github.com/Netflix/go-expect";
+ fetch = {
+ type = "git";
+ url = "https://github.com/Netflix/go-expect";
+ rev = "124a37274874";
+ sha256 = "1cq3d7d4cpwgyzb0syka4a4dspcymq5582qzvbdkbkc4s81kjr4c";
+ };
+ }
+ {
+ goPackagePath = "github.com/Nvveen/Gotty";
+ fetch = {
+ type = "git";
+ url = "https://github.com/Nvveen/Gotty";
+ rev = "cd527374f1e5";
+ sha256 = "1ylvr1p6p036ns3g3wdz8f92f69symshkc8j54fa6gpg4hyk0k6q";
+ };
+ }
+ {
+ goPackagePath = "github.com/Pallinder/go-randomdata";
+ fetch = {
+ type = "git";
+ url = "https://github.com/Pallinder/go-randomdata";
+ rev = "15df0648130a";
+ sha256 = "1kdrchnhp71spz6amcbxr5m0pdksbqx8jjydvxb82pw43rrbx6s7";
+ };
+ }
+ {
+ goPackagePath = "github.com/PuerkitoBio/purell";
+ fetch = {
+ type = "git";
+ url = "https://github.com/PuerkitoBio/purell";
+ rev = "v1.1.0";
+ sha256 = "0vsxyn1fbm7g873b8kf3hcsgqgncb5nmfq3zfsc35a9yhzarka91";
+ };
+ }
+ {
+ goPackagePath = "github.com/PuerkitoBio/urlesc";
+ fetch = {
+ type = "git";
+ url = "https://github.com/PuerkitoBio/urlesc";
+ rev = "de5bf2ad4578";
+ sha256 = "0n0srpqwbaan1wrhh2b7ysz543pjs1xw2rghvqyffg9l0g8kzgcw";
+ };
+ }
+ {
+ goPackagePath = "github.com/SAP/go-hdb";
+ fetch = {
+ type = "git";
+ url = "https://github.com/SAP/go-hdb";
+ rev = "v0.13.2";
+ sha256 = "0gzw594y039chx22a3zn9y3j2y6bqsgi9zq7lzpf7schzl52ii7h";
+ };
+ }
+ {
+ goPackagePath = "github.com/SermoDigital/jose";
+ fetch = {
+ type = "git";
+ url = "https://github.com/SermoDigital/jose";
+ rev = "v0.9.1";
+ sha256 = "0fc6w0hl9n39ixpayg1j3b4nvnr06bgvhqx5mxgxcydjci5pqi8m";
+ };
+ }
+ {
+ goPackagePath = "github.com/StackExchange/wmi";
+ fetch = {
+ type = "git";
+ url = "https://github.com/StackExchange/wmi";
+ rev = "5d049714c4a6";
+ sha256 = "1slw6v1fl8i0hz4db9lph55pbhnrxhqyndq6vm27dgvpj22k29fk";
+ };
+ }
+ {
+ goPackagePath = "github.com/acarl005/stripansi";
+ fetch = {
+ type = "git";
+ url = "https://github.com/acarl005/stripansi";
+ rev = "5a71ef0e047d";
+ sha256 = "02sxiishdixm791jqbkmhdcvc712l0fb8rqmibxzgc61h0qs6rs3";
+ };
+ }
+ {
+ goPackagePath = "github.com/alcortesm/tgz";
+ fetch = {
+ type = "git";
+ url = "https://github.com/alcortesm/tgz";
+ rev = "9c5fe88206d7";
+ sha256 = "04dcwnz2c2i4wbq2vx3g2wrdgqpncr2r1h6p1k08rdwk4bq1h8c5";
+ };
+ }
+ {
+ goPackagePath = "github.com/alecthomas/template";
+ fetch = {
+ type = "git";
+ url = "https://github.com/alecthomas/template";
+ rev = "a0175ee3bccc";
+ sha256 = "0qjgvvh26vk1cyfq9fadyhfgdj36f1iapbmr5xp6zqipldz8ffxj";
+ };
+ }
+ {
+ goPackagePath = "github.com/alecthomas/units";
+ fetch = {
+ type = "git";
+ url = "https://github.com/alecthomas/units";
+ rev = "2efee857e7cf";
+ sha256 = "1j65b91qb9sbrml9cpabfrcf07wmgzzghrl7809hjjhrmbzri5bl";
+ };
+ }
+ {
+ goPackagePath = "github.com/alexflint/go-filemutex";
+ fetch = {
+ type = "git";
+ url = "https://github.com/alexflint/go-filemutex";
+ rev = "d358565f3c3f";
+ sha256 = "19fzbm0x8821awsmqj9ig49dxxkd72p1yfqbijmdwwszvw2r0ggz";
+ };
+ }
+ {
+ goPackagePath = "github.com/andygrunwald/go-gerrit";
+ fetch = {
+ type = "git";
+ url = "https://github.com/andygrunwald/go-gerrit";
+ rev = "43cfd7a94eb4";
+ sha256 = "1350r7pvvgl26kiiz4x96ac5gym2xc9968ddx18z8wlv776azidr";
+ };
+ }
+ {
+ goPackagePath = "github.com/andygrunwald/go-jira";
+ fetch = {
+ type = "git";
+ url = "https://github.com/andygrunwald/go-jira";
+ rev = "v1.5.0";
+ sha256 = "13fp8qim22znvlqclsg2sdlpvbnmgh549rrsa9cxk04klgaapdqy";
+ };
+ }
+ {
+ goPackagePath = "github.com/anmitsu/go-shlex";
+ fetch = {
+ type = "git";
+ url = "https://github.com/anmitsu/go-shlex";
+ rev = "648efa622239";
+ sha256 = "10rgdp5d106iisgz25ic8k6f44s9adh4sjh6fyxq9ccm21gw49b7";
+ };
+ }
+ {
+ goPackagePath = "github.com/antham/chyle";
+ fetch = {
+ type = "git";
+ url = "https://github.com/antham/chyle";
+ rev = "v1.4.0";
+ sha256 = "144ja4g7b238dm3hwgqbl71skxp5mx7438w78hjpbfn5zq2cbrs2";
+ };
+ }
+ {
+ goPackagePath = "github.com/antham/envh";
+ fetch = {
+ type = "git";
+ url = "https://github.com/antham/envh";
+ rev = "v1.2.0";
+ sha256 = "0l0mn4vwns9b6faxvx464a38mjgk5rhn58sxai1g7l8c3qqr3g0h";
+ };
+ }
+ {
+ goPackagePath = "github.com/antham/strumt";
+ fetch = {
+ type = "git";
+ url = "https://github.com/antham/strumt";
+ rev = "6776189777d3";
+ sha256 = "0m7xhjnfpxvhx3a59k46k33i0zmy427vxmx67smndjxgxgmpqzd0";
+ };
+ }
+ {
+ goPackagePath = "github.com/aokoli/goutils";
+ fetch = {
+ type = "git";
+ url = "https://github.com/aokoli/goutils";
+ rev = "v1.0.1";
+ sha256 = "1yj4yjfwylica31sgj69ygb04p9xxi22kgfxd0j5f58zr8vwww2n";
+ };
+ }
+ {
+ goPackagePath = "github.com/armon/circbuf";
+ fetch = {
+ type = "git";
+ url = "https://github.com/armon/circbuf";
+ rev = "bbbad097214e";
+ sha256 = "1idpr0lzb2px2p3wgfq2276yl7jpaz43df6n91kf790404s4zmk3";
+ };
+ }
+ {
+ goPackagePath = "github.com/armon/go-metrics";
+ fetch = {
+ type = "git";
+ url = "https://github.com/armon/go-metrics";
+ rev = "f0300d1749da";
+ sha256 = "13l7c35ps0r27vxfil2w0xhhc7w5rh00awvlmn4cz0a937b9ffpv";
+ };
+ }
+ {
+ goPackagePath = "github.com/armon/go-radix";
+ fetch = {
+ type = "git";
+ url = "https://github.com/armon/go-radix";
+ rev = "v1.0.0";
+ sha256 = "1m1k0jz9gjfrk4m7hjm7p03qmviamfgxwm2ghakqxw3hdds8v503";
+ };
+ }
+ {
+ goPackagePath = "github.com/asaskevich/govalidator";
+ fetch = {
+ type = "git";
+ url = "https://github.com/asaskevich/govalidator";
+ rev = "f9ffefc3facf";
+ sha256 = "02rsz7v49in9bmgsjciqcyik9xmy3yfz0znw739ssgy6px00cg04";
+ };
+ }
+ {
+ goPackagePath = "github.com/aws/aws-k8s-tester";
+ fetch = {
+ type = "git";
+ url = "https://github.com/aws/aws-k8s-tester";
+ rev = "b411acf57dfe";
+ sha256 = "1yhgmkdd003v99w9kdl96phfmg3f3a5ahmn49srdbakc3p1wwxh8";
+ };
+ }
+ {
+ goPackagePath = "github.com/aws/aws-sdk-go";
+ fetch = {
+ type = "git";
+ url = "https://github.com/aws/aws-sdk-go";
+ rev = "v1.16.20";
+ sha256 = "0a5wwmjmlbdgmsv1myxr9vmr9k9cic5d31kc30qbasm7p15ljxr1";
+ };
+ }
+ {
+ goPackagePath = "github.com/banzaicloud/bank-vaults";
+ fetch = {
+ type = "git";
+ url = "https://github.com/banzaicloud/bank-vaults";
+ rev = "e31657d7c4fe";
+ sha256 = "0f642k5prrvq7wcm96hk7vw8ma86x7k1bvkr8mrcvabnvvp5jcfk";
+ };
+ }
+ {
+ goPackagePath = "github.com/bazelbuild/buildtools";
+ fetch = {
+ type = "git";
+ url = "https://github.com/bazelbuild/buildtools";
+ rev = "80c7f0d45d7e";
+ sha256 = "1r2590m283k2449ikjmvrifz1ik8gn4wyq563r4v03ssylf3rv40";
+ };
+ }
+ {
+ goPackagePath = "github.com/beevik/etree";
+ fetch = {
+ type = "git";
+ url = "https://github.com/beevik/etree";
+ rev = "v1.0.1";
+ sha256 = "0f3lj7azxd5qq29hqd32211ds7n56i3rgmfll6c1f4css1f3srxg";
+ };
+ }
+ {
+ goPackagePath = "github.com/beorn7/perks";
+ fetch = {
+ type = "git";
+ url = "https://github.com/beorn7/perks";
+ rev = "3a771d992973";
+ sha256 = "1l2lns4f5jabp61201sh88zf3b0q793w4zdgp9nll7mmfcxxjif3";
+ };
+ }
+ {
+ goPackagePath = "github.com/bgentry/speakeasy";
+ fetch = {
+ type = "git";
+ url = "https://github.com/bgentry/speakeasy";
+ rev = "v0.1.0";
+ sha256 = "02dfrj0wyphd3db9zn2mixqxwiz1ivnyc5xc7gkz58l5l27nzp8s";
+ };
+ }
+ {
+ goPackagePath = "github.com/bitly/go-hostpool";
+ fetch = {
+ type = "git";
+ url = "https://github.com/bitly/go-hostpool";
+ rev = "a3a6125de932";
+ sha256 = "1m82mvnfw6k2ylpn598bcsg8mdgbq4fnsk7yc23hpvps9glsrbb6";
+ };
+ }
+ {
+ goPackagePath = "github.com/blang/semver";
+ fetch = {
+ type = "git";
+ url = "https://github.com/blang/semver";
+ rev = "v3.5.1";
+ sha256 = "13ws259bwcibkclbr82ilhk6zadm63kxklxhk12wayklj8ghhsmy";
+ };
+ }
+ {
+ goPackagePath = "github.com/bmizerany/assert";
+ fetch = {
+ type = "git";
+ url = "https://github.com/bmizerany/assert";
+ rev = "b7ed37b82869";
+ sha256 = "18hy1wyl9zdi7sgxafrn3m7fadh6in0rhhb8l0cvkxqzdl0jcw2s";
+ };
+ }
+ {
+ goPackagePath = "github.com/bouk/monkey";
+ fetch = {
+ type = "git";
+ url = "https://github.com/bouk/monkey";
+ rev = "v1.0.0";
+ sha256 = "1ngcjmn6bys10zd22x8fh5lf0iyqkjqmbx47b0inw9ddh56sdzph";
+ };
+ }
+ {
+ goPackagePath = "github.com/bwmarrin/snowflake";
+ fetch = {
+ type = "git";
+ url = "https://github.com/bwmarrin/snowflake";
+ rev = "68117e6bbede";
+ sha256 = "1zpjxm82d55map8bvvpa1l9xjxg03005dza3rd7a6bapm31f3107";
+ };
+ }
+ {
+ goPackagePath = "github.com/c2h5oh/datasize";
+ fetch = {
+ type = "git";
+ url = "https://github.com/c2h5oh/datasize";
+ rev = "4eba002a5eae";
+ sha256 = "02sxd659q7m7axfywiqfxk5rh6djh2m5240bin1makldj1nj16j3";
+ };
+ }
+ {
+ goPackagePath = "github.com/cenkalti/backoff";
+ fetch = {
+ type = "git";
+ url = "https://github.com/cenkalti/backoff";
+ rev = "v2.0.0";
+ sha256 = "0k4899ifpir6kmfxli8a2xfj5zdh0xb2jd0fq2r38wzd4pk25ipr";
+ };
+ }
+ {
+ goPackagePath = "github.com/chai2010/gettext-go";
+ fetch = {
+ type = "git";
+ url = "https://github.com/chai2010/gettext-go";
+ rev = "bf70f2a70fb1";
+ sha256 = "0bwjwvjl7zqm7kxram1rzz0ri3h897kiin13ljy9hx3fzz1i9lml";
+ };
+ }
+ {
+ goPackagePath = "github.com/chromedp/cdproto";
+ fetch = {
+ type = "git";
+ url = "https://github.com/chromedp/cdproto";
+ rev = "57cf4773008d";
+ sha256 = "1m9qq4nvdj5rbpq123s88agiv3604lvg0q2af7fhr1m16rs4xg1k";
+ };
+ }
+ {
+ goPackagePath = "github.com/chromedp/chromedp";
+ fetch = {
+ type = "git";
+ url = "https://github.com/chromedp/chromedp";
+ rev = "v0.1.1";
+ sha256 = "1wcj54ff3qa6sypl8bdaabwlhf3v9b7br3nr9rq0ls64jfdw1sla";
+ };
+ }
+ {
+ goPackagePath = "github.com/circonus-labs/circonus-gometrics";
+ fetch = {
+ type = "git";
+ url = "https://github.com/circonus-labs/circonus-gometrics";
+ rev = "v2.2.6";
+ sha256 = "11j6bm05baskaavjzjkf48jkxis5sk621wkvi3j2315abkyhsf6f";
+ };
+ }
+ {
+ goPackagePath = "github.com/client9/misspell";
+ fetch = {
+ type = "git";
+ url = "https://github.com/client9/misspell";
+ rev = "v0.3.4";
+ sha256 = "1vwf33wsc4la25zk9nylpbp9px3svlmldkm0bha4hp56jws4q9cs";
+ };
+ }
+ {
+ goPackagePath = "github.com/codeship/codeship-go";
+ fetch = {
+ type = "git";
+ url = "https://github.com/codeship/codeship-go";
+ rev = "7793ca823354";
+ sha256 = "1jr93ddbb1v27vd4w8wx2dcha8g32gc6rl0chyz75rmypi6888h7";
+ };
+ }
+ {
+ goPackagePath = "github.com/containerd/continuity";
+ fetch = {
+ type = "git";
+ url = "https://github.com/containerd/continuity";
+ rev = "004b46473808";
+ sha256 = "0js7wjap44db6vvdpz4dvblqx6j36r1kb09ggvlwx4inkwg2ds2d";
+ };
+ }
+ {
+ goPackagePath = "github.com/coreos/bbolt";
+ fetch = {
+ type = "git";
+ url = "https://github.com/coreos/bbolt";
+ rev = "v1.3.1-coreos.6";
+ sha256 = "0r39wj5fv6d7nkkirjnnrnhikcp6sqa5dgmr6cimz5s0smvfm8vw";
+ };
+ }
+ {
+ goPackagePath = "github.com/coreos/etcd";
+ fetch = {
+ type = "git";
+ url = "https://github.com/coreos/etcd";
+ rev = "v3.3.10";
+ sha256 = "1x2ii1hj8jraba8rbxz6dmc03y3sjxdnzipdvg6fywnlq1f3l3wl";
+ };
+ }
+ {
+ goPackagePath = "github.com/coreos/go-semver";
+ fetch = {
+ type = "git";
+ url = "https://github.com/coreos/go-semver";
+ rev = "v0.2.0";
+ sha256 = "1gghi5bnqj50hfxhqc1cxmynqmh2yk9ii7ab9gsm75y5cp94ymk0";
+ };
+ }
+ {
+ goPackagePath = "github.com/coreos/go-systemd";
+ fetch = {
+ type = "git";
+ url = "https://github.com/coreos/go-systemd";
+ rev = "c6f51f82210d";
+ sha256 = "1vnccmnkjl6n539l4cliz6sznpqn6igf5v7mbmsgahb838742clb";
+ };
+ }
+ {
+ goPackagePath = "github.com/coreos/pkg";
+ fetch = {
+ type = "git";
+ url = "https://github.com/coreos/pkg";
+ rev = "399ea9e2e55f";
+ sha256 = "0nxbn0m7lr4dg0yrwnvlkfiyg3ndv8vdpssjx7b714nivpc6ar0y";
+ };
+ }
+ {
+ goPackagePath = "github.com/cpuguy83/go-md2man";
+ fetch = {
+ type = "git";
+ url = "https://github.com/cpuguy83/go-md2man";
+ rev = "v1.0.8";
+ sha256 = "1w22dfdamsq63b5rvalh9k2y7rbwfkkjs7vm9vd4a13h2ql70lg2";
+ };
+ }
+ {
+ goPackagePath = "github.com/danwakefield/fnmatch";
+ fetch = {
+ type = "git";
+ url = "https://github.com/danwakefield/fnmatch";
+ rev = "cbb64ac3d964";
+ sha256 = "0cbf511ppsa6hf59mdl7nbyn2b2n71y0bpkzbmfkdqjhanqh1lqz";
+ };
+ }
+ {
+ goPackagePath = "github.com/davecgh/go-spew";
+ fetch = {
+ type = "git";
+ url = "https://github.com/davecgh/go-spew";
+ rev = "v1.1.1";
+ sha256 = "0hka6hmyvp701adzag2g26cxdj47g21x6jz4sc6jjz1mn59d474y";
+ };
+ }
+ {
+ goPackagePath = "github.com/deckarep/golang-set";
+ fetch = {
+ type = "git";
+ url = "https://github.com/deckarep/golang-set";
+ rev = "1d4478f51bed";
+ sha256 = "01kaqrc5ywbwa46b6lz3db7kkg8q6v383h4lnxds4z3kjglkqaff";
+ };
+ }
+ {
+ goPackagePath = "github.com/denisenkom/go-mssqldb";
+ fetch = {
+ type = "git";
+ url = "https://github.com/denisenkom/go-mssqldb";
+ rev = "2fea367d496d";
+ sha256 = "0qq3b68ziqhfy8j9xrzpq2czsbacakbraicm7gp7l6mdbifi06zr";
+ };
+ }
+ {
+ goPackagePath = "github.com/denormal/go-gitignore";
+ fetch = {
+ type = "git";
+ url = "https://github.com/denormal/go-gitignore";
+ rev = "75ce8f3e513c";
+ sha256 = "0yqicwkrw7plrc6zybv025ssaqzhy01s0c7x8ifp0x3vmxrzy57k";
+ };
+ }
+ {
+ goPackagePath = "github.com/dgrijalva/jwt-go";
+ fetch = {
+ type = "git";
+ url = "https://github.com/dgrijalva/jwt-go";
+ rev = "v3.2.0";
+ sha256 = "08m27vlms74pfy5z79w67f9lk9zkx6a9jd68k3c4msxy75ry36mp";
+ };
+ }
+ {
+ goPackagePath = "github.com/disintegration/imaging";
+ fetch = {
+ type = "git";
+ url = "https://github.com/disintegration/imaging";
+ rev = "v1.4.2";
+ sha256 = "0dzwqy1xcm0d481z1fa2r60frdlf5fzjligpiqh5g8lhqskk2lx8";
+ };
+ }
+ {
+ goPackagePath = "github.com/djherbis/atime";
+ fetch = {
+ type = "git";
+ url = "https://github.com/djherbis/atime";
+ rev = "v1.0.0";
+ sha256 = "1zwxsk2r2p53qpgsxkky4x1gvxca4fx6qy9y10jvgpn4wf57m4ja";
+ };
+ }
+ {
+ goPackagePath = "github.com/dnaeon/go-vcr";
+ fetch = {
+ type = "git";
+ url = "https://github.com/dnaeon/go-vcr";
+ rev = "v1.0.1";
+ sha256 = "1d0kpqr12qrqlamz5a47bp05mx49za2v6l1k7c6z71xahfmb7v2d";
+ };
+ }
+ {
+ goPackagePath = "github.com/docker/distribution";
+ fetch = {
+ type = "git";
+ url = "https://github.com/docker/distribution";
+ rev = "edc3ab29cdff";
+ sha256 = "1nqjaq1q6fs3c0avpb02sib0a906xfbk3m74hk2mqjdbyx9y8b4m";
+ };
+ }
+ {
+ goPackagePath = "github.com/docker/docker";
+ fetch = {
+ type = "git";
+ url = "https://github.com/docker/docker";
+ rev = "5e5fadb3c020";
+ sha256 = "14rbpynz304xh0aqphjspld3955wcis1d1gcg4dicw0q1klhhw8v";
+ };
+ }
+ {
+ goPackagePath = "github.com/docker/go-connections";
+ fetch = {
+ type = "git";
+ url = "https://github.com/docker/go-connections";
+ rev = "v0.3.0";
+ sha256 = "0v1pkr8apwmhyzbjfriwdrs1ihlk6pw7izm57r24mf9jdmg3fyb0";
+ };
+ }
+ {
+ goPackagePath = "github.com/docker/go-units";
+ fetch = {
+ type = "git";
+ url = "https://github.com/docker/go-units";
+ rev = "v0.3.2";
+ sha256 = "1sqwvcszxqpv77xf2d8fxvryxphdwj9v8f93231wpnk9kpilhyii";
+ };
+ }
+ {
+ goPackagePath = "github.com/docker/spdystream";
+ fetch = {
+ type = "git";
+ url = "https://github.com/docker/spdystream";
+ rev = "bc6354cbbc29";
+ sha256 = "08746a15snvmax6cnzn2qy7cvsspxbsx97vdbjpdadir3pypjxya";
+ };
+ }
+ {
+ goPackagePath = "github.com/dsnet/compress";
+ fetch = {
+ type = "git";
+ url = "https://github.com/dsnet/compress";
+ rev = "cc9eb1d7ad76";
+ sha256 = "159liclywmyb6zx88ga5gn42hfl4cpk1660zss87fkx31hdq9fgx";
+ };
+ }
+ {
+ goPackagePath = "github.com/duosecurity/duo_api_golang";
+ fetch = {
+ type = "git";
+ url = "https://github.com/duosecurity/duo_api_golang";
+ rev = "539434bf0d45";
+ sha256 = "1dzf280gin51gww2hkcc5r5dmrjfjirsmkmksjw2ipkgy8kp40nz";
+ };
+ }
+ {
+ goPackagePath = "github.com/dustin/go-humanize";
+ fetch = {
+ type = "git";
+ url = "https://github.com/dustin/go-humanize";
+ rev = "v1.0.0";
+ sha256 = "1kqf1kavdyvjk7f8kx62pnm7fbypn9z1vbf8v2qdh3y7z7a0cbl3";
+ };
+ }
+ {
+ goPackagePath = "github.com/elazarl/go-bindata-assetfs";
+ fetch = {
+ type = "git";
+ url = "https://github.com/elazarl/go-bindata-assetfs";
+ rev = "v1.0.0";
+ sha256 = "1swfb37g6sga3awvcmxf49ngbpvjv7ih5an9f8ixjqcfcwnb7nzp";
+ };
+ }
+ {
+ goPackagePath = "github.com/elazarl/goproxy";
+ fetch = {
+ type = "git";
+ url = "https://github.com/elazarl/goproxy";
+ rev = "2ce16c963a8a";
+ sha256 = "1jdgwbma4zs77w66y6hf7677hwpww1wzw27qdk1dr0pms0y7zlzp";
+ };
+ }
+ {
+ goPackagePath = "github.com/emicklei/go-restful";
+ fetch = {
+ type = "git";
+ url = "https://github.com/emicklei/go-restful";
+ rev = "v2.8.0";
+ sha256 = "1zqcjhg4q7788hyrkhwg4b6r1vc4qnzbw8c5j994mr18x42brxzg";
+ };
+ }
+ {
+ goPackagePath = "github.com/emirpasic/gods";
+ fetch = {
+ type = "git";
+ url = "https://github.com/emirpasic/gods";
+ rev = "v1.9.0";
+ sha256 = "1zhkppqzy149fp561pif8d5d92jd9chl3l9z4yi5f8n60ibdmmjf";
+ };
+ }
+ {
+ goPackagePath = "github.com/erikstmartin/go-testdb";
+ fetch = {
+ type = "git";
+ url = "https://github.com/erikstmartin/go-testdb";
+ rev = "8d10e4a1bae5";
+ sha256 = "1fhrqcpv8x74qwxx9gpnhgqbz5wkp2bnsq92w418l1fnrgh4ppmq";
+ };
+ }
+ {
+ goPackagePath = "github.com/evanphx/json-patch";
+ fetch = {
+ type = "git";
+ url = "https://github.com/evanphx/json-patch";
+ rev = "v4.1.0";
+ sha256 = "1yqakqyqspdwpq2dzvrd9rb79z24zmrafscj284dnrl421ns3zvh";
+ };
+ }
+ {
+ goPackagePath = "github.com/fatih/color";
+ fetch = {
+ type = "git";
+ url = "https://github.com/fatih/color";
+ rev = "v1.7.0";
+ sha256 = "0v8msvg38r8d1iiq2i5r4xyfx0invhc941kjrsg5gzwvagv55inv";
+ };
+ }
+ {
+ goPackagePath = "github.com/fatih/structs";
+ fetch = {
+ type = "git";
+ url = "https://github.com/fatih/structs";
+ rev = "v1.0.0";
+ sha256 = "040grl40gcqd1y852lnf0l1l5wi73g0crnaihzl0nfsas9ydk3h4";
+ };
+ }
+ {
+ goPackagePath = "github.com/flynn/go-shlex";
+ fetch = {
+ type = "git";
+ url = "https://github.com/flynn/go-shlex";
+ rev = "3f9db97f8568";
+ sha256 = "1j743lysygkpa2s2gii2xr32j7bxgc15zv4113b0q9jhn676ysia";
+ };
+ }
+ {
+ goPackagePath = "github.com/fsnotify/fsnotify";
+ fetch = {
+ type = "git";
+ url = "https://github.com/fsnotify/fsnotify";
+ rev = "v1.4.7";
+ sha256 = "07va9crci0ijlivbb7q57d2rz9h27zgn2fsm60spjsqpdbvyrx4g";
+ };
+ }
+ {
+ goPackagePath = "github.com/fsouza/fake-gcs-server";
+ fetch = {
+ type = "git";
+ url = "https://github.com/fsouza/fake-gcs-server";
+ rev = "e85be23bdaa8";
+ sha256 = "185kw9cap458s9ldlb2nm0vlwx82rd6jnx13600p8hnb5y36fjw7";
+ };
+ }
+ {
+ goPackagePath = "github.com/gfleury/go-bitbucket-v1";
+ fetch = {
+ type = "git";
+ url = "https://github.com/gfleury/go-bitbucket-v1";
+ rev = "3a732135aa4d";
+ sha256 = "0bnzxd1p6kbv3cym38l0kry1jbxhyz905lkbkhmiswmjg7mmlq1k";
+ };
+ }
+ {
+ goPackagePath = "github.com/ghodss/yaml";
+ fetch = {
+ type = "git";
+ url = "https://github.com/ghodss/yaml";
+ rev = "v1.0.0";
+ sha256 = "0skwmimpy7hlh7pva2slpcplnm912rp3igs98xnqmn859kwa5v8g";
+ };
+ }
+ {
+ goPackagePath = "github.com/gliderlabs/ssh";
+ fetch = {
+ type = "git";
+ url = "https://github.com/gliderlabs/ssh";
+ rev = "v0.1.1";
+ sha256 = "0bylkc7yg8bxxffhchikcnzwli5n95cfmbji6v2a4mn1h5n36mdm";
+ };
+ }
+ {
+ goPackagePath = "github.com/go-ini/ini";
+ fetch = {
+ type = "git";
+ url = "https://github.com/go-ini/ini";
+ rev = "v1.39.0";
+ sha256 = "0j7pyl5v7xfzkhsyz193iq56ilan69pp11g2n5jw1k4h4g8s4k9b";
+ };
+ }
+ {
+ goPackagePath = "github.com/go-kit/kit";
+ fetch = {
+ type = "git";
+ url = "https://github.com/go-kit/kit";
+ rev = "v0.8.0";
+ sha256 = "1rcywbc2pvab06qyf8pc2rdfjv7r6kxdv2v4wnpqnjhz225wqvc0";
+ };
+ }
+ {
+ goPackagePath = "github.com/go-ldap/ldap";
+ fetch = {
+ type = "git";
+ url = "https://github.com/go-ldap/ldap";
+ rev = "v3.0.1";
+ sha256 = "0dn4v340wdrfhah5kp2pyi69a1kwwllrz84whsiiwbial8fac483";
+ };
+ }
+ {
+ goPackagePath = "github.com/go-logfmt/logfmt";
+ fetch = {
+ type = "git";
+ url = "https://github.com/go-logfmt/logfmt";
+ rev = "v0.3.0";
+ sha256 = "1gkgh3k5w1xwb2qbjq52p6azq3h1c1rr6pfwjlwj1zrijpzn2xb9";
+ };
+ }
+ {
+ goPackagePath = "github.com/go-ole/go-ole";
+ fetch = {
+ type = "git";
+ url = "https://github.com/go-ole/go-ole";
+ rev = "v1.2.1";
+ sha256 = "114h8x7dh4jp7w7k678fm98lr9icavsf74v6jfipyq7q35bsfr1p";
+ };
+ }
+ {
+ goPackagePath = "github.com/go-openapi/jsonpointer";
+ fetch = {
+ type = "git";
+ url = "https://github.com/go-openapi/jsonpointer";
+ rev = "v0.17.0";
+ sha256 = "0sv2k1fwj6rsigc9489c19ap0jib1d0widm040h0sjdw2nadh3i2";
+ };
+ }
+ {
+ goPackagePath = "github.com/go-openapi/jsonreference";
+ fetch = {
+ type = "git";
+ url = "https://github.com/go-openapi/jsonreference";
+ rev = "v0.17.0";
+ sha256 = "1d0rk17wn755xsfi9pxifdpgs2p23bc0rkf95kjwxczyy6jbqdaj";
+ };
+ }
+ {
+ goPackagePath = "github.com/go-openapi/spec";
+ fetch = {
+ type = "git";
+ url = "https://github.com/go-openapi/spec";
+ rev = "v0.17.1";
+ sha256 = "14n5x2nxlj2x62v3km96yw7rncxk2b9v94k3j0c22r43c60m38mx";
+ };
+ }
+ {
+ goPackagePath = "github.com/go-openapi/swag";
+ fetch = {
+ type = "git";
+ url = "https://github.com/go-openapi/swag";
+ rev = "v0.17.0";
+ sha256 = "1hhgbx59f7lcsqiza2is8q9walhf8mxfkwj7xql1scrn6ms2jmlv";
+ };
+ }
+ {
+ goPackagePath = "github.com/go-sql-driver/mysql";
+ fetch = {
+ type = "git";
+ url = "https://github.com/go-sql-driver/mysql";
+ rev = "v1.4.0";
+ sha256 = "1jwz2j3vd5hlzmnkh20d4276yd8cxy7pac3x3dfi52jkm82ms99n";
+ };
+ }
+ {
+ goPackagePath = "github.com/go-stack/stack";
+ fetch = {
+ type = "git";
+ url = "https://github.com/go-stack/stack";
+ rev = "v1.8.0";
+ sha256 = "0wk25751ryyvxclyp8jdk5c3ar0cmfr8lrjb66qbg4808x66b96v";
+ };
+ }
+ {
+ goPackagePath = "github.com/go-test/deep";
+ fetch = {
+ type = "git";
+ url = "https://github.com/go-test/deep";
+ rev = "v1.0.1";
+ sha256 = "0f4rbdl6qmlq4bzh0443i634bm675bbrkyzwp8wkc1yhdl9qsij7";
+ };
+ }
+ {
+ goPackagePath = "github.com/go-yaml/yaml";
+ fetch = {
+ type = "git";
+ url = "https://github.com/go-yaml/yaml";
+ rev = "v2.1.0";
+ sha256 = "0k7afgp9gkx6pmilijx1wf1sgl3vfbnlfjj05qhnw3whhy4yyyqs";
+ };
+ }
+ {
+ goPackagePath = "github.com/gobuffalo/envy";
+ fetch = {
+ type = "git";
+ url = "https://github.com/gobuffalo/envy";
+ rev = "v1.6.5";
+ sha256 = "14ak10gap2xmy0vxwl0kplck8dhg6xyqcvra5wfana9w1520a622";
+ };
+ }
+ {
+ goPackagePath = "github.com/gobwas/glob";
+ fetch = {
+ type = "git";
+ url = "https://github.com/gobwas/glob";
+ rev = "v0.2.3";
+ sha256 = "0jxk1x806zn5x86342s72dq2qy64ksb3zrvrlgir2avjhwb18n6z";
+ };
+ }
+ {
+ goPackagePath = "github.com/gocql/gocql";
+ fetch = {
+ type = "git";
+ url = "https://github.com/gocql/gocql";
+ rev = "8516aabb0f99";
+ sha256 = "0b68630xizfzndl368l7inda8q8py69wxh967y9knvx33yfs7bzp";
+ };
+ }
+ {
+ goPackagePath = "github.com/gogo/protobuf";
+ fetch = {
+ type = "git";
+ url = "https://github.com/gogo/protobuf";
+ rev = "v1.1.1";
+ sha256 = "1525pq7r6h3s8dncvq8gxi893p2nq8dxpzvq0nfl5b4p6mq0v1c2";
+ };
+ }
+ {
+ goPackagePath = "github.com/golang/glog";
+ fetch = {
+ type = "git";
+ url = "https://github.com/golang/glog";
+ rev = "23def4e6c14b";
+ sha256 = "0jb2834rw5sykfr937fxi8hxi2zy80sj2bdn9b3jb4b26ksqng30";
+ };
+ }
+ {
+ goPackagePath = "github.com/golang/groupcache";
+ fetch = {
+ type = "git";
+ url = "https://github.com/golang/groupcache";
+ rev = "6f2cf27854a4";
+ sha256 = "01wzacrqyqz10g29s88yjcm6w2wisffbadfppas51pfqmijhc11k";
+ };
+ }
+ {
+ goPackagePath = "github.com/golang/lint";
+ fetch = {
+ type = "git";
+ url = "https://github.com/golang/lint";
+ rev = "06c8688daad7";
+ sha256 = "0xi94dwvz50a66bq1hp9fyqkym5mcpdxdb1hrfvicldgjf37lc47";
+ };
+ }
+ {
+ goPackagePath = "github.com/golang/mock";
+ fetch = {
+ type = "git";
+ url = "https://github.com/golang/mock";
+ rev = "v1.1.1";
+ sha256 = "0ap8wb6pdl6ccmdb43advjll2ly4sz26wsc3axw0hbrjrybybzgy";
+ };
+ }
+ {
+ goPackagePath = "github.com/golang/protobuf";
+ fetch = {
+ type = "git";
+ url = "https://github.com/golang/protobuf";
+ rev = "v1.2.0";
+ sha256 = "0kf4b59rcbb1cchfny2dm9jyznp8ri2hsb14n8iak1q8986xa0ab";
+ };
+ }
+ {
+ goPackagePath = "github.com/golang/snappy";
+ fetch = {
+ type = "git";
+ url = "https://github.com/golang/snappy";
+ rev = "2e65f85255db";
+ sha256 = "05w6mpc4qcy0pv8a2bzng8nf4s5rf5phfang4jwy9rgf808q0nxf";
+ };
+ }
+ {
+ goPackagePath = "github.com/google/btree";
+ fetch = {
+ type = "git";
+ url = "https://github.com/google/btree";
+ rev = "4030bb1f1f0c";
+ sha256 = "0ba430m9fbnagacp57krgidsyrgp3ycw5r7dj71brgp5r52g82p6";
+ };
+ }
+ {
+ goPackagePath = "github.com/google/go-cmp";
+ fetch = {
+ type = "git";
+ url = "https://github.com/google/go-cmp";
+ rev = "v0.2.0";
+ sha256 = "1fbv0x27k9sn8svafc0hjwsnckk864lv4yi7bvzrxvmd3d5hskds";
+ };
+ }
+ {
+ goPackagePath = "github.com/google/go-github";
+ fetch = {
+ type = "git";
+ url = "https://github.com/google/go-github";
+ rev = "v17.0.0";
+ sha256 = "1kvw95l77a5n5rgal9n1xjh58zxb3a40ij1j722b1h4z8yg9jhg4";
+ };
+ }
+ {
+ goPackagePath = "github.com/google/go-querystring";
+ fetch = {
+ type = "git";
+ url = "https://github.com/google/go-querystring";
+ rev = "53e6ce116135";
+ sha256 = "0lkbm067nhmxk66pyjx59d77dbjjzwyi43gdvzyx2f8m1942rq7f";
+ };
+ }
+ {
+ goPackagePath = "github.com/google/gofuzz";
+ fetch = {
+ type = "git";
+ url = "https://github.com/google/gofuzz";
+ rev = "24818f796faf";
+ sha256 = "0cq90m2lgalrdfrwwyycrrmn785rgnxa3l3vp9yxkvnv88bymmlm";
+ };
+ }
+ {
+ goPackagePath = "github.com/google/martian";
+ fetch = {
+ type = "git";
+ url = "https://github.com/google/martian";
+ rev = "v2.1.0";
+ sha256 = "197hil6vrjk50b9wvwyzf61csid83whsjj6ik8mc9r2lryxlyyrp";
+ };
+ }
+ {
+ goPackagePath = "github.com/google/subcommands";
+ fetch = {
+ type = "git";
+ url = "https://github.com/google/subcommands";
+ rev = "46f0354f6315";
+ sha256 = "043j9y17kp73972vblkzmr222143hja3gg6cnry4wsiri9lslc2l";
+ };
+ }
+ {
+ goPackagePath = "github.com/google/uuid";
+ fetch = {
+ type = "git";
+ url = "https://github.com/google/uuid";
+ rev = "v1.1.0";
+ sha256 = "0yx4kiafyshdshrmrqcf2say5mzsviz7r94a0y1l6xfbkkyvnc86";
+ };
+ }
+ {
+ goPackagePath = "github.com/google/wire";
+ fetch = {
+ type = "git";
+ url = "https://github.com/google/wire";
+ rev = "v0.2.0";
+ sha256 = "07arvzwyari18dz1lq4kzysm2dnph93wsbbdzq58hzcmar9snm8g";
+ };
+ }
+ {
+ goPackagePath = "github.com/googleapis/gax-go";
+ fetch = {
+ type = "git";
+ url = "https://github.com/googleapis/gax-go";
+ rev = "v2.0.0";
+ sha256 = "0h92x579vbrv2fka8q2ddy1kq6a63qbqa8zc09ygl6skzn9gw1dh";
+ };
+ }
+ {
+ goPackagePath = "github.com/googleapis/gnostic";
+ fetch = {
+ type = "git";
+ url = "https://github.com/googleapis/gnostic";
+ rev = "v0.2.0";
+ sha256 = "0yh3ckd7m0r9h50wmxxvba837d0wb1k5yd439zq4p1kpp4390z12";
+ };
+ }
+ {
+ goPackagePath = "github.com/gophercloud/gophercloud";
+ fetch = {
+ type = "git";
+ url = "https://github.com/gophercloud/gophercloud";
+ rev = "bdd8b1ecd793";
+ sha256 = "0q9rss8yl11v9l10nb2203crsqzqpfxwnwfckaaszjx37rnd98cg";
+ };
+ }
+ {
+ goPackagePath = "github.com/gopherjs/gopherjs";
+ fetch = {
+ type = "git";
+ url = "https://github.com/gopherjs/gopherjs";
+ rev = "0766667cb4d1";
+ sha256 = "13pfc9sxiwjky2lm1xb3i3lcisn8p6mgjk2d927l7r92ysph8dmw";
+ };
+ }
+ {
+ goPackagePath = "github.com/gorilla/context";
+ fetch = {
+ type = "git";
+ url = "https://github.com/gorilla/context";
+ rev = "v1.1.1";
+ sha256 = "03p4hn87vcmfih0p9w663qbx9lpsf7i7j3lc7yl7n84la3yz63m4";
+ };
+ }
+ {
+ goPackagePath = "github.com/gorilla/mux";
+ fetch = {
+ type = "git";
+ url = "https://github.com/gorilla/mux";
+ rev = "v1.6.2";
+ sha256 = "0pvzm23hklxysspnz52mih6h1q74vfrdhjfm1l3sa9r8hhqmmld2";
+ };
+ }
+ {
+ goPackagePath = "github.com/gorilla/securecookie";
+ fetch = {
+ type = "git";
+ url = "https://github.com/gorilla/securecookie";
+ rev = "v1.1.1";
+ sha256 = "16bqimpxs9vj5n59vm04y04v665l7jh0sddxn787pfafyxcmh410";
+ };
+ }
+ {
+ goPackagePath = "github.com/gorilla/sessions";
+ fetch = {
+ type = "git";
+ url = "https://github.com/gorilla/sessions";
+ rev = "v1.1.3";
+ sha256 = "0a99mlw5gvqbghnc1nx76gaanpxzjqfd74klp3s3sgbss69clayi";
+ };
+ }
+ {
+ goPackagePath = "github.com/gorilla/websocket";
+ fetch = {
+ type = "git";
+ url = "https://github.com/gorilla/websocket";
+ rev = "v1.4.0";
+ sha256 = "00i4vb31nsfkzzk7swvx3i75r2d960js3dri1875vypk3v2s0pzk";
+ };
+ }
+ {
+ goPackagePath = "github.com/gotestyourself/gotestyourself";
+ fetch = {
+ type = "git";
+ url = "https://github.com/gotestyourself/gotestyourself";
+ rev = "v2.2.0";
+ sha256 = "0yif3gdyckmf8i54jq0xn00kflla5rhib9sarw66ngnbl7bn9kyl";
+ };
+ }
+ {
+ goPackagePath = "github.com/gregjones/httpcache";
+ fetch = {
+ type = "git";
+ url = "https://github.com/gregjones/httpcache";
+ rev = "9cad4c3443a7";
+ sha256 = "0wjdwcwqqcx2d5y68qvhg6qyj977il5ijmnn9h9cd6wjbdy0ay6s";
+ };
+ }
+ {
+ goPackagePath = "github.com/grpc-ecosystem/go-grpc-middleware";
+ fetch = {
+ type = "git";
+ url = "https://github.com/grpc-ecosystem/go-grpc-middleware";
+ rev = "v1.0.0";
+ sha256 = "0lwgxih021xfhfb1xb9la5f98bpgpaiz63sbllx77qwwl2rmhrsp";
+ };
+ }
+ {
+ goPackagePath = "github.com/grpc-ecosystem/go-grpc-prometheus";
+ fetch = {
+ type = "git";
+ url = "https://github.com/grpc-ecosystem/go-grpc-prometheus";
+ rev = "v1.2.0";
+ sha256 = "1lzk54h7np32b3acidg1ggbn8ppbnns0m71gcg9d1qkkdh8zrijl";
+ };
+ }
+ {
+ goPackagePath = "github.com/grpc-ecosystem/grpc-gateway";
+ fetch = {
+ type = "git";
+ url = "https://github.com/grpc-ecosystem/grpc-gateway";
+ rev = "v1.5.1";
+ sha256 = "1q3l6ydf37lm6hdm9df8y385bacycj4pin1b06w7dpm6m045l3sp";
+ };
+ }
+ {
+ goPackagePath = "github.com/hailocab/go-hostpool";
+ fetch = {
+ type = "git";
+ url = "https://github.com/hailocab/go-hostpool";
+ rev = "e80d13ce29ed";
+ sha256 = "05ld4wp3illkbgl043yf8jq9y1ld0zzvrcg8jdij129j50xgfxny";
+ };
+ }
+ {
+ goPackagePath = "github.com/hashicorp/consul";
+ fetch = {
+ type = "git";
+ url = "https://github.com/hashicorp/consul";
+ rev = "v1.4.2";
+ sha256 = "1nprl9kcb98ikcmk7safji3hl4kfacx0gnh05k8m4ysfz6mr7zri";
+ };
+ }
+ {
+ goPackagePath = "github.com/hashicorp/errwrap";
+ fetch = {
+ type = "git";
+ url = "https://github.com/hashicorp/errwrap";
+ rev = "v1.0.0";
+ sha256 = "0slfb6w3b61xz04r32bi0a1bygc82rjzhqkxj2si2074wynqnr1c";
+ };
+ }
+ {
+ goPackagePath = "github.com/hashicorp/go-cleanhttp";
+ fetch = {
+ type = "git";
+ url = "https://github.com/hashicorp/go-cleanhttp";
+ rev = "v0.5.0";
+ sha256 = "1mwl96a815x1843pnqn7lk38s05bgn5rdjw57xd46jzr62izcnsq";
+ };
+ }
+ {
+ goPackagePath = "github.com/hashicorp/go-hclog";
+ fetch = {
+ type = "git";
+ url = "https://github.com/hashicorp/go-hclog";
+ rev = "4783caec6f2e";
+ sha256 = "1sjhmsysr5vp5y6y9s0l49hjgqb14s0m9p7wwc2m4cga4qps299s";
+ };
+ }
+ {
+ goPackagePath = "github.com/hashicorp/go-immutable-radix";
+ fetch = {
+ type = "git";
+ url = "https://github.com/hashicorp/go-immutable-radix";
+ rev = "v1.0.0";
+ sha256 = "1v3nmsnk1s8bzpclrhirz7iq0g5xxbw9q5gvrg9ss6w9crs72qr6";
+ };
+ }
+ {
+ goPackagePath = "github.com/hashicorp/go-memdb";
+ fetch = {
+ type = "git";
+ url = "https://github.com/hashicorp/go-memdb";
+ rev = "032f93b25bec";
+ sha256 = "1bkbvx93a7li9myy2vs27wh6yyxn67gyvlmb6ywidr4lf50azi5v";
+ };
+ }
+ {
+ goPackagePath = "github.com/hashicorp/go-msgpack";
+ fetch = {
+ type = "git";
+ url = "https://github.com/hashicorp/go-msgpack";
+ rev = "v0.5.3";
+ sha256 = "00jv0ajqd58pkb2yyhlrjp0rv1mvb1ijx3yqjyikcmzvk9jb4h5m";
+ };
+ }
+ {
+ goPackagePath = "github.com/hashicorp/go-multierror";
+ fetch = {
+ type = "git";
+ url = "https://github.com/hashicorp/go-multierror";
+ rev = "v1.0.0";
+ sha256 = "00nyn8llqzbfm8aflr9kwsvpzi4kv8v45c141v88xskxp5xf6z49";
+ };
+ }
+ {
+ goPackagePath = "github.com/hashicorp/go-plugin";
+ fetch = {
+ type = "git";
+ url = "https://github.com/hashicorp/go-plugin";
+ rev = "362c99b11937";
+ sha256 = "0q23ri3s5r2w7z20bpk76vlb79mdwz0xbk7ppdlcbrkbylrpw9ai";
+ };
+ }
+ {
+ goPackagePath = "github.com/hashicorp/go-retryablehttp";
+ fetch = {
+ type = "git";
+ url = "https://github.com/hashicorp/go-retryablehttp";
+ rev = "e651d75abec6";
+ sha256 = "1bw09c1q3hlgmp954w9y0xqzb1m82im28z2yfc85hanm3v71f76y";
+ };
+ }
+ {
+ goPackagePath = "github.com/hashicorp/go-rootcerts";
+ fetch = {
+ type = "git";
+ url = "https://github.com/hashicorp/go-rootcerts";
+ rev = "6bb64b370b90";
+ sha256 = "1a81fcm1i0ji2iva0dcimiichgwpbcb7lx0vyaks87zj5wf04qy9";
+ };
+ }
+ {
+ goPackagePath = "github.com/hashicorp/go-sockaddr";
+ fetch = {
+ type = "git";
+ url = "https://github.com/hashicorp/go-sockaddr";
+ rev = "v1.0.0";
+ sha256 = "1yn1xq8ysn0lszmkygz3a9lgpswbz1p91jv7q8l20s4749a22xgi";
+ };
+ }
+ {
+ goPackagePath = "github.com/hashicorp/go-syslog";
+ fetch = {
+ type = "git";
+ url = "https://github.com/hashicorp/go-syslog";
+ rev = "v1.0.0";
+ sha256 = "09vccqggz212cg0jir6vv708d6mx0f9w5bxrcdah3h6chgmal6v1";
+ };
+ }
+ {
+ goPackagePath = "github.com/hashicorp/go-uuid";
+ fetch = {
+ type = "git";
+ url = "https://github.com/hashicorp/go-uuid";
+ rev = "v1.0.1";
+ sha256 = "0jvb88m0rq41bwgirsadgw7mnayl27av3gd2vqa3xvxp3fy0hp5k";
+ };
+ }
+ {
+ goPackagePath = "github.com/hashicorp/go-version";
+ fetch = {
+ type = "git";
+ url = "https://github.com/hashicorp/go-version";
+ rev = "270f2f71b1ee";
+ sha256 = "1d43wlp932nqbwkca4bhw8l4x6cg25jyh8l1s3814vddscfpfz2v";
+ };
+ }
+ {
+ goPackagePath = "github.com/hashicorp/go.net";
+ fetch = {
+ type = "git";
+ url = "https://github.com/hashicorp/go.net";
+ rev = "v0.0.1";
+ sha256 = "06arwi95xp5rxyz7rndvhc3wlwg0jn9a5z6djf3yyg5h9zfab9i4";
+ };
+ }
+ {
+ goPackagePath = "github.com/hashicorp/golang-lru";
+ fetch = {
+ type = "git";
+ url = "https://github.com/hashicorp/golang-lru";
+ rev = "v0.5.0";
+ sha256 = "12k2cp2k615fjvfa5hyb9k2alian77wivds8s65diwshwv41939f";
+ };
+ }
+ {
+ goPackagePath = "github.com/hashicorp/hcl";
+ fetch = {
+ type = "git";
+ url = "https://github.com/hashicorp/hcl";
+ rev = "ef8a98b0bbce";
+ sha256 = "1qalfsc31fra7hcw2lc3s20aj7al62fq3j5fn5kga3mg99b82nyr";
+ };
+ }
+ {
+ goPackagePath = "github.com/hashicorp/logutils";
+ fetch = {
+ type = "git";
+ url = "https://github.com/hashicorp/logutils";
+ rev = "v1.0.0";
+ sha256 = "076wf4sh5p3f953ndqk1cc0x7jhmlqrxak9953rz79rcdw77rjvv";
+ };
+ }
+ {
+ goPackagePath = "github.com/hashicorp/mdns";
+ fetch = {
+ type = "git";
+ url = "https://github.com/hashicorp/mdns";
+ rev = "v1.0.0";
+ sha256 = "0qr4l91hhi97s8a1isnrw3s4q8pjzacqiks870vnwh15v7ig3axd";
+ };
+ }
+ {
+ goPackagePath = "github.com/hashicorp/memberlist";
+ fetch = {
+ type = "git";
+ url = "https://github.com/hashicorp/memberlist";
+ rev = "v0.1.3";
+ sha256 = "0k1spq7dagvqj3baqw2dhxx1zxrb02y6m3apzr3a7gyirii890g3";
+ };
+ }
+ {
+ goPackagePath = "github.com/hashicorp/serf";
+ fetch = {
+ type = "git";
+ url = "https://github.com/hashicorp/serf";
+ rev = "v0.8.2";
+ sha256 = "0nrslghvdjhaczr2xp9mn8xgcx1dxl4jgpbk0l61ssmxahpx4iyc";
+ };
+ }
+ {
+ goPackagePath = "github.com/hashicorp/vault";
+ fetch = {
+ type = "git";
+ url = "https://github.com/hashicorp/vault";
+ rev = "v0.11.4";
+ sha256 = "0snqa3kar40mygcacdv55k60k9blq2zqx9hfcv42v7p0x3zqh0z0";
+ };
+ }
+ {
+ goPackagePath = "github.com/hashicorp/vault-plugin-secrets-kv";
+ fetch = {
+ type = "git";
+ url = "https://github.com/hashicorp/vault-plugin-secrets-kv";
+ rev = "edbfe287c5d9";
+ sha256 = "0rg7k3azsmk2kiwjvylfryhadxly7x2yj0gb4wkaacvka728kxrz";
+ };
+ }
+ {
+ goPackagePath = "github.com/hashicorp/yamux";
+ fetch = {
+ type = "git";
+ url = "https://github.com/hashicorp/yamux";
+ rev = "3520598351bb";
+ sha256 = "15r8yzj7a7bki9d0k3da5pab6byhyc63kvmi0by92x61mz7svqa5";
+ };
+ }
+ {
+ goPackagePath = "github.com/heptio/sonobuoy";
+ fetch = {
+ type = "git";
+ url = "https://github.com/jenkins-x/sonobuoy";
+ rev = "dad27c12bf17";
+ sha256 = "1xs8h3rx4s9yvv0klxwjb2qw05qh65hllxhz688wrw7ynyrwcmr1";
+ };
+ }
+ {
+ goPackagePath = "github.com/hinshun/vt10x";
+ fetch = {
+ type = "git";
+ url = "https://github.com/hinshun/vt10x";
+ rev = "d55458df857c";
+ sha256 = "0vwsp5iii7pf4na8pkd7cn3bawkwnsimkv1sysy7bslclg5jm370";
+ };
+ }
+ {
+ goPackagePath = "github.com/hpcloud/tail";
+ fetch = {
+ type = "git";
+ url = "https://github.com/hpcloud/tail";
+ rev = "v1.0.0";
+ sha256 = "1njpzc0pi1acg5zx9y6vj9xi6ksbsc5d387rd6904hy6rh2m6kn0";
+ };
+ }
+ {
+ goPackagePath = "github.com/huandu/xstrings";
+ fetch = {
+ type = "git";
+ url = "https://github.com/huandu/xstrings";
+ rev = "v1.0.0";
+ sha256 = "0bnyh4awmr9aagqhhi19xdadzksrkl01d987ycqx86dwlvqqxnxf";
+ };
+ }
+ {
+ goPackagePath = "github.com/iancoleman/orderedmap";
+ fetch = {
+ type = "git";
+ url = "https://github.com/iancoleman/orderedmap";
+ rev = "22c6ecc9fe13";
+ sha256 = "0k8axkkg84ik5v5b4m398c7lbaygb815y1wsj7fn5y2d1mqndd4q";
+ };
+ }
+ {
+ goPackagePath = "github.com/imdario/mergo";
+ fetch = {
+ type = "git";
+ url = "https://github.com/imdario/mergo";
+ rev = "v0.3.6";
+ sha256 = "1lbzy8p8wv439sqgf0n21q52flf2wbamp6qa1jkyv6an0nc952q7";
+ };
+ }
+ {
+ goPackagePath = "github.com/inconshreveable/mousetrap";
+ fetch = {
+ type = "git";
+ url = "https://github.com/inconshreveable/mousetrap";
+ rev = "v1.0.0";
+ sha256 = "1mn0kg48xkd74brf48qf5hzp0bc6g8cf5a77w895rl3qnlpfw152";
+ };
+ }
+ {
+ goPackagePath = "github.com/influxdata/influxdb";
+ fetch = {
+ type = "git";
+ url = "https://github.com/influxdata/influxdb";
+ rev = "049f9b42e9a5";
+ sha256 = "1m9p7zwwwk3fb9z3xxzv86avpnknvc1nya8l6q8maylyb89rk6ir";
+ };
+ }
+ {
+ goPackagePath = "github.com/jbenet/go-context";
+ fetch = {
+ type = "git";
+ url = "https://github.com/jbenet/go-context";
+ rev = "d14ea06fba99";
+ sha256 = "0q91f5549n81w3z5927n4a1mdh220bdmgl42zi3h992dcc4ls0sl";
+ };
+ }
+ {
+ goPackagePath = "github.com/jbrukh/bayesian";
+ fetch = {
+ type = "git";
+ url = "https://github.com/jbrukh/bayesian";
+ rev = "bf3f261f9a9c";
+ sha256 = "12xylsachg2br784909nf0n2c4bk1k7qwabfy4nccbvadyqscg82";
+ };
+ }
+ {
+ goPackagePath = "github.com/jefferai/jsonx";
+ fetch = {
+ type = "git";
+ url = "https://github.com/jefferai/jsonx";
+ rev = "v1.0.0";
+ sha256 = "15j4lch1k2bdrkcc2wnqbdcsf8avair0b7fn9ymhjqkz1zcqvpby";
+ };
+ }
+ {
+ goPackagePath = "github.com/jenkins-x/draft-repo";
+ fetch = {
+ type = "git";
+ url = "https://github.com/jenkins-x/draft-repo";
+ rev = "2f66cc518135";
+ sha256 = "1rwyyzakij8c13wvphksdf903dq9kw1k32lwsjwg3pxcr3rw9nr6";
+ };
+ }
+ {
+ goPackagePath = "github.com/jenkins-x/golang-jenkins";
+ fetch = {
+ type = "git";
+ url = "https://github.com/jenkins-x/golang-jenkins";
+ rev = "65b83ad42314";
+ sha256 = "1mvvwklcp0cwg4vrsycamly7k9zck185bma3j9rr7pga12cwdsid";
+ };
+ }
+ {
+ goPackagePath = "github.com/jetstack/cert-manager";
+ fetch = {
+ type = "git";
+ url = "https://github.com/jetstack/cert-manager";
+ rev = "v0.5.2";
+ sha256 = "0xic07v4fzvhn14sri6dlwklilq1966pc0l6vv664p4msgqldc9a";
+ };
+ }
+ {
+ goPackagePath = "github.com/jinzhu/gorm";
+ fetch = {
+ type = "git";
+ url = "https://github.com/jinzhu/gorm";
+ rev = "572d0a0ab1eb";
+ sha256 = "1fzxbq89gdi57ql1pd9hf5q6jqzinz54v84lwp1bkv0mpipxqydr";
+ };
+ }
+ {
+ goPackagePath = "github.com/jinzhu/inflection";
+ fetch = {
+ type = "git";
+ url = "https://github.com/jinzhu/inflection";
+ rev = "3272df6c21d0";
+ sha256 = "129xn1lm768ikbvwy5cap20d3p38hw4d631za34zapfxyy2p96c0";
+ };
+ }
+ {
+ goPackagePath = "github.com/jinzhu/now";
+ fetch = {
+ type = "git";
+ url = "https://github.com/jinzhu/now";
+ rev = "8ec929ed50c3";
+ sha256 = "0ydl9cx17zkx21b5cqhrl8x4j7yhmyl3ki4kn1c0ql38jw4pww7y";
+ };
+ }
+ {
+ goPackagePath = "github.com/jmespath/go-jmespath";
+ fetch = {
+ type = "git";
+ url = "https://github.com/jmespath/go-jmespath";
+ rev = "c2b33e8439af";
+ sha256 = "1r6w7ydx8ydryxk3sfhzsk8m6f1nsik9jg3i1zhi69v4kfl4d5cz";
+ };
+ }
+ {
+ goPackagePath = "github.com/joho/godotenv";
+ fetch = {
+ type = "git";
+ url = "https://github.com/joho/godotenv";
+ rev = "v1.3.0";
+ sha256 = "0ri8if0pc3x6jg4c3i8wr58xyfpxkwmcjk3rp8gb398a1aa3gpjm";
+ };
+ }
+ {
+ goPackagePath = "github.com/jonboulle/clockwork";
+ fetch = {
+ type = "git";
+ url = "https://github.com/jonboulle/clockwork";
+ rev = "v0.1.0";
+ sha256 = "1pqxhsdavbp1n5grgyx2j6ylvql2fzn2cvpsgkc8li69dil7sibl";
+ };
+ }
+ {
+ goPackagePath = "github.com/json-iterator/go";
+ fetch = {
+ type = "git";
+ url = "https://github.com/json-iterator/go";
+ rev = "v1.1.5";
+ sha256 = "11wn4hpmrs8bmpvd93wqk49jfbbgylakhi35f9k5qd7jd479ci4s";
+ };
+ }
+ {
+ goPackagePath = "github.com/jtolds/gls";
+ fetch = {
+ type = "git";
+ url = "https://github.com/jtolds/gls";
+ rev = "v4.2.1";
+ sha256 = "1vm37pvn0k4r6d3m620swwgama63laz8hhj3pyisdhxwam4m2g1h";
+ };
+ }
+ {
+ goPackagePath = "github.com/julienschmidt/httprouter";
+ fetch = {
+ type = "git";
+ url = "https://github.com/julienschmidt/httprouter";
+ rev = "v1.2.0";
+ sha256 = "1k8bylc9s4vpvf5xhqh9h246dl1snxrzzz0614zz88cdh8yzs666";
+ };
+ }
+ {
+ goPackagePath = "github.com/kballard/go-shellquote";
+ fetch = {
+ type = "git";
+ url = "https://github.com/kballard/go-shellquote";
+ rev = "95032a82bc51";
+ sha256 = "1rspvmnsikdq95jmx3dykxd4k1rmgl98ryjrysvl0cf18hl1vq80";
+ };
+ }
+ {
+ goPackagePath = "github.com/kevinburke/ssh_config";
+ fetch = {
+ type = "git";
+ url = "https://github.com/kevinburke/ssh_config";
+ rev = "9fc7bb800b55";
+ sha256 = "102icrla92zmr5zngipc8c9yfbqhf73zs2w2jq6s7p0gdjifigc8";
+ };
+ }
+ {
+ goPackagePath = "github.com/keybase/go-crypto";
+ fetch = {
+ type = "git";
+ url = "https://github.com/keybase/go-crypto";
+ rev = "255a5089e85a";
+ sha256 = "0c2n05lpkpq7ii8c2x3p228x3sm6msn33532zyfk2k9dk7zigzy9";
+ };
+ }
+ {
+ goPackagePath = "github.com/kisielk/gotool";
+ fetch = {
+ type = "git";
+ url = "https://github.com/kisielk/gotool";
+ rev = "v1.0.0";
+ sha256 = "14af2pa0ssyp8bp2mvdw184s5wcysk6akil3wzxmr05wwy951iwn";
+ };
+ }
+ {
+ goPackagePath = "github.com/knative/build";
+ fetch = {
+ type = "git";
+ url = "https://github.com/knative/build";
+ rev = "v0.3.0";
+ sha256 = "1zn9ngl3wr8mgg31m8dw1w5jfjdiq0gkrdv0936vabazxjgsyb5q";
+ };
+ }
+ {
+ goPackagePath = "github.com/knative/build-pipeline";
+ fetch = {
+ type = "git";
+ url = "https://github.com/knative/build-pipeline";
+ rev = "7c289d8aedf7";
+ sha256 = "132flxjg6aj12xmz5px6dyljj630q0icdmxr9dz7l6j01ll4yagk";
+ };
+ }
+ {
+ goPackagePath = "github.com/knative/pkg";
+ fetch = {
+ type = "git";
+ url = "https://github.com/knative/pkg";
+ rev = "994b801b03ef";
+ sha256 = "15xpdk9zmsljdd3rwcxmk1nml9nync9yj71pqih69bgxfqpbyrx1";
+ };
+ }
+ {
+ goPackagePath = "github.com/knq/snaker";
+ fetch = {
+ type = "git";
+ url = "https://github.com/knq/snaker";
+ rev = "d9ad1e7f342a";
+ sha256 = "1020q2faxm12lshmyd6qh1dnhls145nyrmisw4gy3zlk3ccy5jif";
+ };
+ }
+ {
+ goPackagePath = "github.com/knq/sysutil";
+ fetch = {
+ type = "git";
+ url = "https://github.com/knq/sysutil";
+ rev = "0218e141a794";
+ sha256 = "11nsjv7bm370gbiwv7l4kp573gv5zj1xajxjf4x57wynzxhij5lq";
+ };
+ }
+ {
+ goPackagePath = "github.com/konsorten/go-windows-terminal-sequences";
+ fetch = {
+ type = "git";
+ url = "https://github.com/konsorten/go-windows-terminal-sequences";
+ rev = "v1.0.1";
+ sha256 = "1lchgf27n276vma6iyxa0v1xds68n2g8lih5lavqnx5x6q5pw2ip";
+ };
+ }
+ {
+ goPackagePath = "github.com/kr/logfmt";
+ fetch = {
+ type = "git";
+ url = "https://github.com/kr/logfmt";
+ rev = "b84e30acd515";
+ sha256 = "02ldzxgznrfdzvghfraslhgp19la1fczcbzh7wm2zdc6lmpd1qq9";
+ };
+ }
+ {
+ goPackagePath = "github.com/kr/pretty";
+ fetch = {
+ type = "git";
+ url = "https://github.com/kr/pretty";
+ rev = "v0.1.0";
+ sha256 = "18m4pwg2abd0j9cn5v3k2ksk9ig4vlwxmlw9rrglanziv9l967qp";
+ };
+ }
+ {
+ goPackagePath = "github.com/kr/pty";
+ fetch = {
+ type = "git";
+ url = "https://github.com/kr/pty";
+ rev = "v1.1.2";
+ sha256 = "1jhi5g23xsrqkfjg9a7l7rqzgx2mlf2w11892nng9p9f7xp55k6h";
+ };
+ }
+ {
+ goPackagePath = "github.com/kr/text";
+ fetch = {
+ type = "git";
+ url = "https://github.com/kr/text";
+ rev = "v0.1.0";
+ sha256 = "1gm5bsl01apvc84bw06hasawyqm4q84vx1pm32wr9jnd7a8vjgj1";
+ };
+ }
+ {
+ goPackagePath = "github.com/lib/pq";
+ fetch = {
+ type = "git";
+ url = "https://github.com/lib/pq";
+ rev = "v1.0.0";
+ sha256 = "1zqnnyczaf00xi6xh53vq758v5bdlf0iz7kf22l02cal4i6px47i";
+ };
+ }
+ {
+ goPackagePath = "github.com/lusis/go-slackbot";
+ fetch = {
+ type = "git";
+ url = "https://github.com/lusis/go-slackbot";
+ rev = "401027ccfef5";
+ sha256 = "125rraz8nwid7vw7x8xj4cz7i74xycx3jddvzn0r3sqajnq94s0l";
+ };
+ }
+ {
+ goPackagePath = "github.com/lusis/slack-test";
+ fetch = {
+ type = "git";
+ url = "https://github.com/lusis/slack-test";
+ rev = "3c758769bfa6";
+ sha256 = "110gs02k9bqrch248jycb7a3yzx2i3yh02k9s16fhdw612ag2sak";
+ };
+ }
+ {
+ goPackagePath = "github.com/magiconair/properties";
+ fetch = {
+ type = "git";
+ url = "https://github.com/magiconair/properties";
+ rev = "v1.8.0";
+ sha256 = "1a10362wv8a8qwb818wygn2z48lgzch940hvpv81hv8gc747ajxn";
+ };
+ }
+ {
+ goPackagePath = "github.com/mailru/easyjson";
+ fetch = {
+ type = "git";
+ url = "https://github.com/mailru/easyjson";
+ rev = "60711f1a8329";
+ sha256 = "0234jp6134wkihdpdwq1hvzqblgl5khc1wp6dyi2h0hgh88bhdk1";
+ };
+ }
+ {
+ goPackagePath = "github.com/markbates/inflect";
+ fetch = {
+ type = "git";
+ url = "https://github.com/markbates/inflect";
+ rev = "v1.0.4";
+ sha256 = "0pd50b8q6bib84yab14csd6nc08hfdapzbh1nnw6qrmc1zxi7r7m";
+ };
+ }
+ {
+ goPackagePath = "github.com/mattbaird/jsonpatch";
+ fetch = {
+ type = "git";
+ url = "https://github.com/mattbaird/jsonpatch";
+ rev = "81af80346b1a";
+ sha256 = "0ll22kpf75m72r7i5ddg3r87gdlagbj2x24bppgbi8jp018pdq95";
+ };
+ }
+ {
+ goPackagePath = "github.com/mattn/go-colorable";
+ fetch = {
+ type = "git";
+ url = "https://github.com/mattn/go-colorable";
+ rev = "v0.0.9";
+ sha256 = "1nwjmsppsjicr7anq8na6md7b1z84l9ppnlr045hhxjvbkqwalvx";
+ };
+ }
+ {
+ goPackagePath = "github.com/mattn/go-isatty";
+ fetch = {
+ type = "git";
+ url = "https://github.com/mattn/go-isatty";
+ rev = "v0.0.4";
+ sha256 = "0zs92j2cqaw9j8qx1sdxpv3ap0rgbs0vrvi72m40mg8aa36gd39w";
+ };
+ }
+ {
+ goPackagePath = "github.com/mattn/go-runewidth";
+ fetch = {
+ type = "git";
+ url = "https://github.com/mattn/go-runewidth";
+ rev = "v0.0.2";
+ sha256 = "0vkrfrz3fzn5n6ix4k8s0cg0b448459sldq8bp4riavsxm932jzb";
+ };
+ }
+ {
+ goPackagePath = "github.com/mattn/go-sqlite3";
+ fetch = {
+ type = "git";
+ url = "https://github.com/mattn/go-sqlite3";
+ rev = "38ee283dabf1";
+ sha256 = "18xyi0n1dhspvy6z982k7v545w7k0idpmvlqmrn6nkd6dkw7pfdw";
+ };
+ }
+ {
+ goPackagePath = "github.com/mattn/go-zglob";
+ fetch = {
+ type = "git";
+ url = "https://github.com/mattn/go-zglob";
+ rev = "49693fbb3fe3";
+ sha256 = "1j7li9jbqfakm3glj1hf0bl062y25jmaqw3d6v973c1vcgmdxvgw";
+ };
+ }
+ {
+ goPackagePath = "github.com/matttproud/golang_protobuf_extensions";
+ fetch = {
+ type = "git";
+ url = "https://github.com/matttproud/golang_protobuf_extensions";
+ rev = "v1.0.1";
+ sha256 = "1d0c1isd2lk9pnfq2nk0aih356j30k3h1gi2w0ixsivi5csl7jya";
+ };
+ }
+ {
+ goPackagePath = "github.com/mgutz/ansi";
+ fetch = {
+ type = "git";
+ url = "https://github.com/mgutz/ansi";
+ rev = "9520e82c474b";
+ sha256 = "00bz22314j26736w1f0q4jy9d9dfaml17vn890n5zqy3cmvmww1j";
+ };
+ }
+ {
+ goPackagePath = "github.com/mholt/archiver";
+ fetch = {
+ type = "git";
+ url = "https://github.com/mholt/archiver";
+ rev = "v3.1.1";
+ sha256 = "1v18xzzwi836rdxnr5dssllc083rdiry9baqaqnz6x3f1xvfnqp9";
+ };
+ }
+ {
+ goPackagePath = "github.com/miekg/dns";
+ fetch = {
+ type = "git";
+ url = "https://github.com/miekg/dns";
+ rev = "v1.0.14";
+ sha256 = "1qgli6yp59bv6vc6zag84cwxmcxgnyxm1q2f301yyijk3wy5b2ak";
+ };
+ }
+ {
+ goPackagePath = "github.com/mitchellh/cli";
+ fetch = {
+ type = "git";
+ url = "https://github.com/mitchellh/cli";
+ rev = "v1.0.0";
+ sha256 = "1i9kmr7rcf10d2hji8h4247hmc0nbairv7a0q51393aw2h1bnwg2";
+ };
+ }
+ {
+ goPackagePath = "github.com/mitchellh/copystructure";
+ fetch = {
+ type = "git";
+ url = "https://github.com/mitchellh/copystructure";
+ rev = "v1.0.0";
+ sha256 = "05njg92w1088v4yl0js0zdrpfq6k37i9j14mxkr3p90p5yd9rrrr";
+ };
+ }
+ {
+ goPackagePath = "github.com/mitchellh/go-homedir";
+ fetch = {
+ type = "git";
+ url = "https://github.com/mitchellh/go-homedir";
+ rev = "3864e76763d9";
+ sha256 = "1n8vya16l60i5jms43yb8fzdgwvqa2q926p5wkg3lbrk8pxy1nv0";
+ };
+ }
+ {
+ goPackagePath = "github.com/mitchellh/go-testing-interface";
+ fetch = {
+ type = "git";
+ url = "https://github.com/mitchellh/go-testing-interface";
+ rev = "v1.0.0";
+ sha256 = "1dl2js8di858bawg7dadlf1qjpkl2g3apziihjyf5imri3znyfpw";
+ };
+ }
+ {
+ goPackagePath = "github.com/mitchellh/gox";
+ fetch = {
+ type = "git";
+ url = "https://github.com/mitchellh/gox";
+ rev = "v0.4.0";
+ sha256 = "1q4fdkw904mrmh1q5z8pfd3r0gcn5dm776kldqawddy93iiwnp8r";
+ };
+ }
+ {
+ goPackagePath = "github.com/mitchellh/iochan";
+ fetch = {
+ type = "git";
+ url = "https://github.com/mitchellh/iochan";
+ rev = "v1.0.0";
+ sha256 = "058n9bbf536f2nw3pbs7pysrg9cqvgkb28z2zf5wjyrzrknyk53g";
+ };
+ }
+ {
+ goPackagePath = "github.com/mitchellh/ioprogress";
+ fetch = {
+ type = "git";
+ url = "https://github.com/mitchellh/ioprogress";
+ rev = "6a23b12fa88e";
+ sha256 = "1fcfwi5fzv17iahif42y7dhjfnjwkslk03zb9cniw42wyiwhj3jk";
+ };
+ }
+ {
+ goPackagePath = "github.com/mitchellh/mapstructure";
+ fetch = {
+ type = "git";
+ url = "https://github.com/mitchellh/mapstructure";
+ rev = "f15292f7a699";
+ sha256 = "0zm3nhdvmj3f8q0vg2sjfw1sm3pwsw0ggz501awz95w99664a8al";
+ };
+ }
+ {
+ goPackagePath = "github.com/mitchellh/reflectwalk";
+ fetch = {
+ type = "git";
+ url = "https://github.com/mitchellh/reflectwalk";
+ rev = "v1.0.0";
+ sha256 = "0wzkp0fdx22n8f7y9y37dgmnlrlfsv9zjdb48cbx7rsqsbnny7l0";
+ };
+ }
+ {
+ goPackagePath = "github.com/modern-go/concurrent";
+ fetch = {
+ type = "git";
+ url = "https://github.com/modern-go/concurrent";
+ rev = "bacd9c7ef1dd";
+ sha256 = "0s0fxccsyb8icjmiym5k7prcqx36hvgdwl588y0491gi18k5i4zs";
+ };
+ }
+ {
+ goPackagePath = "github.com/modern-go/reflect2";
+ fetch = {
+ type = "git";
+ url = "https://github.com/modern-go/reflect2";
+ rev = "v1.0.1";
+ sha256 = "06a3sablw53n1dqqbr2f53jyksbxdmmk8axaas4yvnhyfi55k4lf";
+ };
+ }
+ {
+ goPackagePath = "github.com/mwitkow/go-conntrack";
+ fetch = {
+ type = "git";
+ url = "https://github.com/mwitkow/go-conntrack";
+ rev = "cc309e4a2223";
+ sha256 = "0nbrnpk7bkmqg9mzwsxlm0y8m7s9qd9phr1q30qlx2qmdmz7c1mf";
+ };
+ }
+ {
+ goPackagePath = "github.com/nbio/st";
+ fetch = {
+ type = "git";
+ url = "https://github.com/nbio/st";
+ rev = "e9e8d9816f32";
+ sha256 = "14r4acm82gp9ikqnp41a06bm4mrdlbskakhibbxsc5ljav7bni27";
+ };
+ }
+ {
+ goPackagePath = "github.com/nlopes/slack";
+ fetch = {
+ type = "git";
+ url = "https://github.com/nlopes/slack";
+ rev = "347a74b1ea30";
+ sha256 = "0wkj2kvvg2jl01bajkjavcpn1c98yhxd96cadpm522ag3gqdlw81";
+ };
+ }
+ {
+ goPackagePath = "github.com/nwaples/rardecode";
+ fetch = {
+ type = "git";
+ url = "https://github.com/nwaples/rardecode";
+ rev = "v1.0.0";
+ sha256 = "1dsq1wcddl7r1y0d94px368biiy1dgzl3nab47f0rb0fp1b24l1x";
+ };
+ }
+ {
+ goPackagePath = "github.com/oklog/run";
+ fetch = {
+ type = "git";
+ url = "https://github.com/oklog/run";
+ rev = "v1.0.0";
+ sha256 = "1pbjza4claaj95fpqvvfrysvs10y7dm0pl6qr5lzh6qy1vnhmcgw";
+ };
+ }
+ {
+ goPackagePath = "github.com/olekukonko/tablewriter";
+ fetch = {
+ type = "git";
+ url = "https://github.com/olekukonko/tablewriter";
+ rev = "a0225b3f23b5";
+ sha256 = "0bp9r6xzy6d3p7l2hjmvr25y3rp3p8c9xv1agkllkksm45ng6681";
+ };
+ }
+ {
+ goPackagePath = "github.com/onsi/ginkgo";
+ fetch = {
+ type = "git";
+ url = "https://github.com/onsi/ginkgo";
+ rev = "v1.6.0";
+ sha256 = "0x0gc89vgq38xhgmi2h22bhr73cf2gmk42g89nz89k8dgg9hhr25";
+ };
+ }
+ {
+ goPackagePath = "github.com/onsi/gomega";
+ fetch = {
+ type = "git";
+ url = "https://github.com/onsi/gomega";
+ rev = "v1.4.2";
+ sha256 = "0f1lpgdcfan3bj545xjrlkdkmi7g0l8gn82gsxay1x6rsqv6nl0b";
+ };
+ }
+ {
+ goPackagePath = "github.com/opencontainers/go-digest";
+ fetch = {
+ type = "git";
+ url = "https://github.com/opencontainers/go-digest";
+ rev = "v1.0.0-rc1";
+ sha256 = "01gc7fpn8ax429024p2fcx3yb18axwz5bjf2hqxlii1jbsgw4bh9";
+ };
+ }
+ {
+ goPackagePath = "github.com/opencontainers/image-spec";
+ fetch = {
+ type = "git";
+ url = "https://github.com/opencontainers/image-spec";
+ rev = "v1.0.1";
+ sha256 = "03dvbj3dln8c55v9gp79mgmz2yi2ws3r08iyz2fk41y3i22iaw1q";
+ };
+ }
+ {
+ goPackagePath = "github.com/opencontainers/runc";
+ fetch = {
+ type = "git";
+ url = "https://github.com/opencontainers/runc";
+ rev = "v0.1.1";
+ sha256 = "09fm7f1k4lvx8v3crqb0cli1x2brlz8ka7f7qa8d2sb6ln58h7w7";
+ };
+ }
+ {
+ goPackagePath = "github.com/openzipkin/zipkin-go";
+ fetch = {
+ type = "git";
+ url = "https://github.com/openzipkin/zipkin-go";
+ rev = "v0.1.1";
+ sha256 = "0kd5yc4117dlqc80v0f29kb2l8nrx2da9c03ljns5n8hynnjgb27";
+ };
+ }
+ {
+ goPackagePath = "github.com/operator-framework/operator-sdk";
+ fetch = {
+ type = "git";
+ url = "https://github.com/operator-framework/operator-sdk";
+ rev = "913cbf711929";
+ sha256 = "1fq6g8q11qx842zsj8k16ng6p2xpmp52v91m24vz35rh9pl4kdg0";
+ };
+ }
+ {
+ goPackagePath = "github.com/ory/dockertest";
+ fetch = {
+ type = "git";
+ url = "https://github.com/ory/dockertest";
+ rev = "v3.3.4";
+ sha256 = "0gwdbxszjzv3cr42kmwjvqab1y8y8g9j0p3yl1n0rzmsfxcz1mmb";
+ };
+ }
+ {
+ goPackagePath = "github.com/pascaldekloe/goe";
+ fetch = {
+ type = "git";
+ url = "https://github.com/pascaldekloe/goe";
+ rev = "57f6aae5913c";
+ sha256 = "1dqd3mfb4z2vmv6pg6fhgvfc53vhndk24wcl9lj1rz02n6m279fq";
+ };
+ }
+ {
+ goPackagePath = "github.com/patrickmn/go-cache";
+ fetch = {
+ type = "git";
+ url = "https://github.com/patrickmn/go-cache";
+ rev = "v2.1.0";
+ sha256 = "10020inkzrm931r4bixf8wqr9n39wcrb78vfyxmbvjavvw4zybgs";
+ };
+ }
+ {
+ goPackagePath = "github.com/pborman/uuid";
+ fetch = {
+ type = "git";
+ url = "https://github.com/pborman/uuid";
+ rev = "e790cca94e6c";
+ sha256 = "0y1crv4wkly2naki2f68ln9sc8l9skswkc696vr8vc43p4p67wam";
+ };
+ }
+ {
+ goPackagePath = "github.com/pelletier/go-buffruneio";
+ fetch = {
+ type = "git";
+ url = "https://github.com/pelletier/go-buffruneio";
+ rev = "v0.2.0";
+ sha256 = "0l83p1gg6g5mmhmxjisrhfimhbm71lwn1r2w7d6siwwqm9q08sd2";
+ };
+ }
+ {
+ goPackagePath = "github.com/pelletier/go-toml";
+ fetch = {
+ type = "git";
+ url = "https://github.com/pelletier/go-toml";
+ rev = "v1.2.0";
+ sha256 = "1fjzpcjng60mc3a4b2ql5a00d5gah84wj740dabv9kq67mpg8fxy";
+ };
+ }
+ {
+ goPackagePath = "github.com/petar/GoLLRB";
+ fetch = {
+ type = "git";
+ url = "https://github.com/petar/GoLLRB";
+ rev = "53be0d36a84c";
+ sha256 = "01xp3lcamqkvl91jg6ly202gdsgf64j39rkrcqxi6v4pbrcv7hz0";
+ };
+ }
+ {
+ goPackagePath = "github.com/peterbourgon/diskv";
+ fetch = {
+ type = "git";
+ url = "https://github.com/peterbourgon/diskv";
+ rev = "v2.0.1";
+ sha256 = "1mxpa5aad08x30qcbffzk80g9540wvbca4blc1r2qyzl65b8929b";
+ };
+ }
+ {
+ goPackagePath = "github.com/petergtz/pegomock";
+ fetch = {
+ type = "git";
+ url = "https://github.com/petergtz/pegomock";
+ rev = "b113d17a7e81";
+ sha256 = "1si2dxz6wvx7px8g1455gz1vvlfwsm014wdbvyr69c3m2ad86wm0";
+ };
+ }
+ {
+ goPackagePath = "github.com/pierrec/lz4";
+ fetch = {
+ type = "git";
+ url = "https://github.com/pierrec/lz4";
+ rev = "v2.0.5";
+ sha256 = "0y5rh7z01zycd59nnjpkqq0ydyjmcg9j1xw15q1i600l9j9g617p";
+ };
+ }
+ {
+ goPackagePath = "github.com/pkg/browser";
+ fetch = {
+ type = "git";
+ url = "https://github.com/pkg/browser";
+ rev = "c90ca0c84f15";
+ sha256 = "05xpqsns08blmwdh8aw5kpq2d9x4fl91535j6np1ylw1q2b67b8i";
+ };
+ }
+ {
+ goPackagePath = "github.com/pkg/errors";
+ fetch = {
+ type = "git";
+ url = "https://github.com/pkg/errors";
+ rev = "v0.8.0";
+ sha256 = "001i6n71ghp2l6kdl3qq1v2vmghcz3kicv9a5wgcihrzigm75pp5";
+ };
+ }
+ {
+ goPackagePath = "github.com/pmezard/go-difflib";
+ fetch = {
+ type = "git";
+ url = "https://github.com/pmezard/go-difflib";
+ rev = "v1.0.0";
+ sha256 = "0c1cn55m4rypmscgf0rrb88pn58j3ysvc2d0432dp3c6fqg6cnzw";
+ };
+ }
+ {
+ goPackagePath = "github.com/posener/complete";
+ fetch = {
+ type = "git";
+ url = "https://github.com/posener/complete";
+ rev = "v1.1.1";
+ sha256 = "1nbdiybjizbaxbf5q0xwbq0cjqw4bl6jggvsjzrpif0w86fcjda2";
+ };
+ }
+ {
+ goPackagePath = "github.com/prometheus/client_golang";
+ fetch = {
+ type = "git";
+ url = "https://github.com/prometheus/client_golang";
+ rev = "v0.9.1";
+ sha256 = "01gnylazia30pcp069xcng482gwmm3xcx5zgrlwdkhic1lyb6i9l";
+ };
+ }
+ {
+ goPackagePath = "github.com/prometheus/client_model";
+ fetch = {
+ type = "git";
+ url = "https://github.com/prometheus/client_model";
+ rev = "5c3871d89910";
+ sha256 = "04psf81l9fjcwascsys428v03fx4fi894h7fhrj2vvcz723q57k0";
+ };
+ }
+ {
+ goPackagePath = "github.com/prometheus/common";
+ fetch = {
+ type = "git";
+ url = "https://github.com/prometheus/common";
+ rev = "v0.2.0";
+ sha256 = "02kym6lcfnlq23qbv277jr0q1n7jj0r14gqg93c7wn7gc44jv3vp";
+ };
+ }
+ {
+ goPackagePath = "github.com/prometheus/procfs";
+ fetch = {
+ type = "git";
+ url = "https://github.com/prometheus/procfs";
+ rev = "185b4288413d";
+ sha256 = "0d85429kdw5dgj5zhyiz1sq3i5691vj2gjnda93nnxxzx9acg8cv";
+ };
+ }
+ {
+ goPackagePath = "github.com/qor/inflection";
+ fetch = {
+ type = "git";
+ url = "https://github.com/qor/inflection";
+ rev = "04140366298a";
+ sha256 = "1s4qcnwaajp3c5ykwx4dfy32hykwsm0ki7kx8lcw8b0z0grkz6qh";
+ };
+ }
+ {
+ goPackagePath = "github.com/rifflock/lfshook";
+ fetch = {
+ type = "git";
+ url = "https://github.com/rifflock/lfshook";
+ rev = "bf539943797a";
+ sha256 = "0hns4zidw8g3s5l9dyl894fnyjr0a5xgdvx26rnal9jrn4n6z835";
+ };
+ }
+ {
+ goPackagePath = "github.com/rodaine/hclencoder";
+ fetch = {
+ type = "git";
+ url = "https://github.com/rodaine/hclencoder";
+ rev = "0680c4321930";
+ sha256 = "0xyzmbhg0qnaybbd4sxly8932kswx2gplcw788gh811ylhjj2liy";
+ };
+ }
+ {
+ goPackagePath = "github.com/russross/blackfriday";
+ fetch = {
+ type = "git";
+ url = "https://github.com/russross/blackfriday";
+ rev = "v1.5.1";
+ sha256 = "0qmavm5d14kj6im6sqzpqnlhpy524428vkn4hnfwknndr9rycmn0";
+ };
+ }
+ {
+ goPackagePath = "github.com/ryanuber/columnize";
+ fetch = {
+ type = "git";
+ url = "https://github.com/ryanuber/columnize";
+ rev = "9b3edd62028f";
+ sha256 = "1ya1idkbb0a9fjlhkcnh5a9yvpwzwfmbyg7d56lpplwr9rqi1da4";
+ };
+ }
+ {
+ goPackagePath = "github.com/ryanuber/go-glob";
+ fetch = {
+ type = "git";
+ url = "https://github.com/ryanuber/go-glob";
+ rev = "256dc444b735";
+ sha256 = "07rsd7hranghwc68ib0r2zxd9d5djanzjvd84j9dgj3wqsyg5mi2";
+ };
+ }
+ {
+ goPackagePath = "github.com/satori/go.uuid";
+ fetch = {
+ type = "git";
+ url = "https://github.com/satori/go.uuid";
+ rev = "v1.2.0";
+ sha256 = "1j4s5pfg2ldm35y8ls8jah4dya2grfnx2drb4jcbjsyrp4cm5yfb";
+ };
+ }
+ {
+ goPackagePath = "github.com/sean-/seed";
+ fetch = {
+ type = "git";
+ url = "https://github.com/sean-/seed";
+ rev = "e2103e2c3529";
+ sha256 = "0glir8jxi1w7aga2jwdb63pp1h8q4whknili7xixsqzwyy716125";
+ };
+ }
+ {
+ goPackagePath = "github.com/sergi/go-diff";
+ fetch = {
+ type = "git";
+ url = "https://github.com/sergi/go-diff";
+ rev = "v1.0.0";
+ sha256 = "0swiazj8wphs2zmk1qgq75xza6m19snif94h2m6fi8dqkwqdl7c7";
+ };
+ }
+ {
+ goPackagePath = "github.com/sethgrid/pester";
+ fetch = {
+ type = "git";
+ url = "https://github.com/sethgrid/pester";
+ rev = "03e26c9abbbf";
+ sha256 = "0xhzs8xjaxr00n0sc0hjhlp78l01jwqqv9r6yfcxqy86cfyrdfgw";
+ };
+ }
+ {
+ goPackagePath = "github.com/sethvargo/go-password";
+ fetch = {
+ type = "git";
+ url = "https://github.com/sethvargo/go-password";
+ rev = "v0.1.2";
+ sha256 = "0z6jz4b7cfdwiqrzhcyvraq2s1rw4fpw4fbna9r7xi1vvj26gyrf";
+ };
+ }
+ {
+ goPackagePath = "github.com/shirou/gopsutil";
+ fetch = {
+ type = "git";
+ url = "https://github.com/shirou/gopsutil";
+ rev = "eb1f1ab16f2e";
+ sha256 = "0qn5nn4kcqcw5wkcg82s9jbjh6wvrfq88zinm35xlpwhpdklznjw";
+ };
+ }
+ {
+ goPackagePath = "github.com/shirou/w32";
+ fetch = {
+ type = "git";
+ url = "https://github.com/shirou/w32";
+ rev = "bb4de0191aa4";
+ sha256 = "0xh5vqblhr2c3mlaswawx6nipi4rc2x73rbdvlkakmgi0nnl50m4";
+ };
+ }
+ {
+ goPackagePath = "github.com/shurcooL/githubv4";
+ fetch = {
+ type = "git";
+ url = "https://github.com/shurcooL/githubv4";
+ rev = "51d7b505e2e9";
+ sha256 = "0zy2aci0gr9x08fl8bicknc2v9nqnxhqr3y05dzvmr0b5av9q24f";
+ };
+ }
+ {
+ goPackagePath = "github.com/shurcooL/go";
+ fetch = {
+ type = "git";
+ url = "https://github.com/shurcooL/go";
+ rev = "9e1955d9fb6e";
+ sha256 = "1lad9bvs75jsn61cfza19739c2c057k0bqxg2b4xz3z3l4w1mkqj";
+ };
+ }
+ {
+ goPackagePath = "github.com/shurcooL/graphql";
+ fetch = {
+ type = "git";
+ url = "https://github.com/shurcooL/graphql";
+ rev = "e4a3a37e6d42";
+ sha256 = "0d4a6njigzis6hgac5dpxaw6nzrm4cqmfyj53icr3isa38c2isrf";
+ };
+ }
+ {
+ goPackagePath = "github.com/sirupsen/logrus";
+ fetch = {
+ type = "git";
+ url = "https://github.com/sirupsen/logrus";
+ rev = "v1.2.0";
+ sha256 = "0r6334x2bls8ddznvzaldx4g88msjjns4mlks95rqrrg7h0ijigg";
+ };
+ }
+ {
+ goPackagePath = "github.com/smartystreets/assertions";
+ fetch = {
+ type = "git";
+ url = "https://github.com/smartystreets/assertions";
+ rev = "b2de0cb4f26d";
+ sha256 = "1i7ldgavgl35c7gk25p7bvdr282ckng090zr4ch9mk1705akx09y";
+ };
+ }
+ {
+ goPackagePath = "github.com/smartystreets/goconvey";
+ fetch = {
+ type = "git";
+ url = "https://github.com/smartystreets/goconvey";
+ rev = "ef6db91d284a";
+ sha256 = "16znlpsms8z2qc3airawyhzvrzcp70p9bx375i19bg489hgchxb7";
+ };
+ }
+ {
+ goPackagePath = "github.com/soheilhy/cmux";
+ fetch = {
+ type = "git";
+ url = "https://github.com/soheilhy/cmux";
+ rev = "v0.1.4";
+ sha256 = "1f736g68d9vwlyfb6g0fxkr0r875369xafk30cz8kaq5niaqwv0h";
+ };
+ }
+ {
+ goPackagePath = "github.com/spf13/afero";
+ fetch = {
+ type = "git";
+ url = "https://github.com/spf13/afero";
+ rev = "v1.1.1";
+ sha256 = "0138rjiacl71h7kvhzinviwvy6qa2m6rflpv9lgqv15hnjvhwvg1";
+ };
+ }
+ {
+ goPackagePath = "github.com/spf13/cast";
+ fetch = {
+ type = "git";
+ url = "https://github.com/spf13/cast";
+ rev = "v1.2.0";
+ sha256 = "177bk7lq40jbgv9p9r80aydpaccfk8ja3a7jjhfwiwk9r1pa4rr2";
+ };
+ }
+ {
+ goPackagePath = "github.com/spf13/cobra";
+ fetch = {
+ type = "git";
+ url = "https://github.com/spf13/cobra";
+ rev = "v0.0.3";
+ sha256 = "1q1nsx05svyv9fv3fy6xv6gs9ffimkyzsfm49flvl3wnvf1ncrkd";
+ };
+ }
+ {
+ goPackagePath = "github.com/spf13/jwalterweatherman";
+ fetch = {
+ type = "git";
+ url = "https://github.com/spf13/jwalterweatherman";
+ rev = "7c0cea34c8ec";
+ sha256 = "132p84i20b9s5r6fs597lsa6648vd415ch7c0d018vm8smzqpd0h";
+ };
+ }
+ {
+ goPackagePath = "github.com/spf13/pflag";
+ fetch = {
+ type = "git";
+ url = "https://github.com/spf13/pflag";
+ rev = "v1.0.3";
+ sha256 = "1cj3cjm7d3zk0mf1xdybh0jywkbbw7a6yr3y22x9sis31scprswd";
+ };
+ }
+ {
+ goPackagePath = "github.com/spf13/viper";
+ fetch = {
+ type = "git";
+ url = "https://github.com/spf13/viper";
+ rev = "v1.0.2";
+ sha256 = "0y3r6ysi5vn0yq5c7pbl62yg2i64fkv54xgj2jf1hn3v6zzyimis";
+ };
+ }
+ {
+ goPackagePath = "github.com/src-d/gcfg";
+ fetch = {
+ type = "git";
+ url = "https://github.com/src-d/gcfg";
+ rev = "v1.3.0";
+ sha256 = "1hrdxlha4kkcpyydmjqd929rmwn5a9xq7arvwhryxppxq7502axk";
+ };
+ }
+ {
+ goPackagePath = "github.com/stoewer/go-strcase";
+ fetch = {
+ type = "git";
+ url = "https://github.com/stoewer/go-strcase";
+ rev = "v1.0.1";
+ sha256 = "0axc5sq5n9gkhy7npn9w12ycxddngmbphdywhfrsskm44kvd8rpx";
+ };
+ }
+ {
+ goPackagePath = "github.com/streadway/amqp";
+ fetch = {
+ type = "git";
+ url = "https://github.com/streadway/amqp";
+ rev = "27835f1a64e9";
+ sha256 = "1py7lsrk0a4r0fx91jq6nn0vdv8phzw5wlnjbl38gmlq32hsff7k";
+ };
+ }
+ {
+ goPackagePath = "github.com/stretchr/objx";
+ fetch = {
+ type = "git";
+ url = "https://github.com/stretchr/objx";
+ rev = "v0.1.1";
+ sha256 = "0iph0qmpyqg4kwv8jsx6a56a7hhqq8swrazv40ycxk9rzr0s8yls";
+ };
+ }
+ {
+ goPackagePath = "github.com/stretchr/testify";
+ fetch = {
+ type = "git";
+ url = "https://github.com/stretchr/testify";
+ rev = "v1.3.0";
+ sha256 = "0wjchp2c8xbgcbbq32w3kvblk6q6yn533g78nxl6iskq6y95lxsy";
+ };
+ }
+ {
+ goPackagePath = "github.com/tidwall/gjson";
+ fetch = {
+ type = "git";
+ url = "https://github.com/tidwall/gjson";
+ rev = "v1.1.0";
+ sha256 = "0m19fh7djlwl188ddw4myspck92hq0pck4xwmvx6msq7pz2mhds9";
+ };
+ }
+ {
+ goPackagePath = "github.com/tidwall/match";
+ fetch = {
+ type = "git";
+ url = "https://github.com/tidwall/match";
+ rev = "1731857f09b1";
+ sha256 = "14nv96h0mjki5q685qx8y331h4yga6hlfh3z9nz6acvnv284q578";
+ };
+ }
+ {
+ goPackagePath = "github.com/tmc/grpc-websocket-proxy";
+ fetch = {
+ type = "git";
+ url = "https://github.com/tmc/grpc-websocket-proxy";
+ rev = "830351dc03c6";
+ sha256 = "0d1b7jydlwfx9m78fbmfdva2yf1cd8x4j0bq5wxj5n7ihwyf07jg";
+ };
+ }
+ {
+ goPackagePath = "github.com/trivago/tgo";
+ fetch = {
+ type = "git";
+ url = "https://github.com/trivago/tgo";
+ rev = "v1.0.1";
+ sha256 = "10243ai91r57fkh8jpyxg9dz503cb5nkmlsj10p3g8a38v808mrl";
+ };
+ }
+ {
+ goPackagePath = "github.com/ugorji/go";
+ fetch = {
+ type = "git";
+ url = "https://github.com/ugorji/go";
+ rev = "8333dd449516";
+ sha256 = "16bix8957bgszzm176jn12q1dzi6flha4bif5h8j8lqbxc6pab3q";
+ };
+ }
+ {
+ goPackagePath = "github.com/ulikunitz/xz";
+ fetch = {
+ type = "git";
+ url = "https://github.com/ulikunitz/xz";
+ rev = "v0.5.6";
+ sha256 = "1qpk02c0nfgfyg110nmbaiy5x12fpn0pm8gy7h1s8pwns133n831";
+ };
+ }
+ {
+ goPackagePath = "github.com/urfave/cli";
+ fetch = {
+ type = "git";
+ url = "https://github.com/urfave/cli";
+ rev = "v1.18.0";
+ sha256 = "0al7w7yjyijx9dldndnj1bws5w1li0a7wjbwbkxa5kd0z7l39x81";
+ };
+ }
+ {
+ goPackagePath = "github.com/viniciuschiele/tarx";
+ fetch = {
+ type = "git";
+ url = "https://github.com/viniciuschiele/tarx";
+ rev = "6e3da540444d";
+ sha256 = "0r7d6s5znbr69xm9334c8b404yk1jqg0h8n6bjs8zwgwk20cwxjf";
+ };
+ }
+ {
+ goPackagePath = "github.com/wbrefvem/go-bitbucket";
+ fetch = {
+ type = "git";
+ url = "https://github.com/wbrefvem/go-bitbucket";
+ rev = "fc08fd046abb";
+ sha256 = "1h7wpl442cl4qfhm2115rwnch8bs2314qi09kwgy2zjrv5gq969n";
+ };
+ }
+ {
+ goPackagePath = "github.com/xanzy/go-gitlab";
+ fetch = {
+ type = "git";
+ url = "https://github.com/xanzy/go-gitlab";
+ rev = "f3bc634ab936";
+ sha256 = "1lznkdlhm1jvka745qkynlyci4svw38s9chrz0lvwpl680kazv1q";
+ };
+ }
+ {
+ goPackagePath = "github.com/xanzy/ssh-agent";
+ fetch = {
+ type = "git";
+ url = "https://github.com/xanzy/ssh-agent";
+ rev = "v0.2.0";
+ sha256 = "069nlriymqswg52ggiwi60qhwrin9nzhd2g65a7h59z2qbcvk2hy";
+ };
+ }
+ {
+ goPackagePath = "github.com/xi2/xz";
+ fetch = {
+ type = "git";
+ url = "https://github.com/xi2/xz";
+ rev = "48954b6210f8";
+ sha256 = "178r0fa2dpzxf0sabs7dn0c8fa7vs87zlxk6spkn374ls9pir7nq";
+ };
+ }
+ {
+ goPackagePath = "github.com/xiang90/probing";
+ fetch = {
+ type = "git";
+ url = "https://github.com/xiang90/probing";
+ rev = "07dd2e8dfe18";
+ sha256 = "0r8rq27yigz72mk8z7p61yjfan8id021dnp1v421ln9byzpvabn2";
+ };
+ }
+ {
+ goPackagePath = "github.com/xlab/handysort";
+ fetch = {
+ type = "git";
+ url = "https://github.com/xlab/handysort";
+ rev = "fb3537ed64a1";
+ sha256 = "0g1q7qx259xhywkiqmcf0siwvyqbwdyc4ng0hz5z8r9zc68ic647";
+ };
+ }
+ {
+ goPackagePath = "go.etcd.io/bbolt";
+ fetch = {
+ type = "git";
+ url = "https://github.com/etcd-io/bbolt";
+ rev = "v1.3.1-etcd.7";
+ sha256 = "0f2brc4zyc1z3s1bw9krgj7gijdrdz9sw2w8i7s0xvidd54qr32l";
+ };
+ }
+ {
+ goPackagePath = "go.etcd.io/etcd";
+ fetch = {
+ type = "git";
+ url = "https://github.com/etcd-io/etcd";
+ rev = "83304cfc808c";
+ sha256 = "1jfiv4a6n6ik5l1sscgmvll9yyic5ax0a03vis8n3b5g5qycws34";
+ };
+ }
+ {
+ goPackagePath = "go.opencensus.io";
+ fetch = {
+ type = "git";
+ url = "https://github.com/census-instrumentation/opencensus-go";
+ rev = "v0.18.0";
+ sha256 = "0flvv47h3988k1sg56qyh3hfskn563kblp4bs7mi6kzjc9jqz817";
+ };
+ }
+ {
+ goPackagePath = "go.uber.org/atomic";
+ fetch = {
+ type = "git";
+ url = "https://github.com/uber-go/atomic";
+ rev = "v1.3.2";
+ sha256 = "11pzvjys5ddjjgrv94pgk9pnip9yyb54z7idf33zk7p7xylpnsv6";
+ };
+ }
+ {
+ goPackagePath = "go.uber.org/multierr";
+ fetch = {
+ type = "git";
+ url = "https://github.com/uber-go/multierr";
+ rev = "v1.1.0";
+ sha256 = "1slfc6syvw8cvr6rbrjsy6ja5w8gsx0f8aq8qm16rp2x5c2pj07w";
+ };
+ }
+ {
+ goPackagePath = "go.uber.org/zap";
+ fetch = {
+ type = "git";
+ url = "https://github.com/uber-go/zap";
+ rev = "v1.9.1";
+ sha256 = "19a1i6fipqj8w7h6qjmg1sfbg18yzzqsgfn0vmr55hkgc0y6nmny";
+ };
+ }
+ {
+ goPackagePath = "gocloud.dev";
+ fetch = {
+ type = "git";
+ url = "https://github.com/google/go-cloud";
+ rev = "v0.9.0";
+ sha256 = "0rk0k2iy4rk0vqjyq98l89zkhq194bgdr95542ks5jbwinc82h36";
+ };
+ }
+ {
+ goPackagePath = "golang.org/x/crypto";
+ fetch = {
+ type = "git";
+ url = "https://go.googlesource.com/crypto";
+ rev = "505ab145d0a9";
+ sha256 = "1vbsvcvmjz6c00p5vf8ls533p52fx2y3gy6v4k5qrdlzl4wf0i5s";
+ };
+ }
+ {
+ goPackagePath = "golang.org/x/exp";
+ fetch = {
+ type = "git";
+ url = "https://go.googlesource.com/exp";
+ rev = "509febef88a4";
+ sha256 = "02isrh39z8znrp5znplzy0dip2gnrl3jm1355raliyvhnhg04j6q";
+ };
+ }
+ {
+ goPackagePath = "golang.org/x/image";
+ fetch = {
+ type = "git";
+ url = "https://go.googlesource.com/image";
+ rev = "c73c2afc3b81";
+ sha256 = "1kkafy29vz5xf6r29ghbvvbwrgjxwxvzk6dsa2qhyp1ddk6l2vkz";
+ };
+ }
+ {
+ goPackagePath = "golang.org/x/lint";
+ fetch = {
+ type = "git";
+ url = "https://go.googlesource.com/lint";
+ rev = "c67002cb31c3";
+ sha256 = "0gymbggskjmphqxqcx4s0vnlcz7mygbix0vhwcwv5r67c0bf6765";
+ };
+ }
+ {
+ goPackagePath = "golang.org/x/net";
+ fetch = {
+ type = "git";
+ url = "https://go.googlesource.com/net";
+ rev = "351d144fa1fc";
+ sha256 = "1c5x25qjyz83y92bq0lll5kmznyi3m02wd4c54scgf0866gy938k";
+ };
+ }
+ {
+ goPackagePath = "golang.org/x/oauth2";
+ fetch = {
+ type = "git";
+ url = "https://go.googlesource.com/oauth2";
+ rev = "d668ce993890";
+ sha256 = "17m8d02fazil0dwvk33vpwvsb91asgbmmpqy05751csrfqhhdqna";
+ };
+ }
+ {
+ goPackagePath = "golang.org/x/sync";
+ fetch = {
+ type = "git";
+ url = "https://go.googlesource.com/sync";
+ rev = "37e7f081c4d4";
+ sha256 = "1bb0mw6ckb1k7z8v3iil2qlqwfj408fvvp8m1cik2b46p7snyjhm";
+ };
+ }
+ {
+ goPackagePath = "golang.org/x/sys";
+ fetch = {
+ type = "git";
+ url = "https://go.googlesource.com/sys";
+ rev = "aca44879d564";
+ sha256 = "106vs2md02h16rwnk9mq2h4ix7iyv2n6bfm7v9zp0kknswlag1x0";
+ };
+ }
+ {
+ goPackagePath = "golang.org/x/text";
+ fetch = {
+ type = "git";
+ url = "https://go.googlesource.com/text";
+ rev = "v0.3.0";
+ sha256 = "0r6x6zjzhr8ksqlpiwm5gdd7s209kwk5p4lw54xjvz10cs3qlq19";
+ };
+ }
+ {
+ goPackagePath = "golang.org/x/time";
+ fetch = {
+ type = "git";
+ url = "https://go.googlesource.com/time";
+ rev = "fbb02b2291d2";
+ sha256 = "0jjqcv6rzihlgg4i797q80g1f6ch5diz2kxqh6488gwkb6nds4h4";
+ };
+ }
+ {
+ goPackagePath = "golang.org/x/tools";
+ fetch = {
+ type = "git";
+ url = "https://go.googlesource.com/tools";
+ rev = "06f26fdaaa28";
+ sha256 = "07qj9wfjygy64krr8rgbxf43v007y7hmbimh8j95qfrq5fh7bp21";
+ };
+ }
+ {
+ goPackagePath = "google.golang.org/api";
+ fetch = {
+ type = "git";
+ url = "https://code.googlesource.com/google-api-go-client";
+ rev = "v0.1.0";
+ sha256 = "1az6n10i35ls13wry20nnm5afzr3j3s391nia8ghgx5vfskgzn56";
+ };
+ }
+ {
+ goPackagePath = "google.golang.org/appengine";
+ fetch = {
+ type = "git";
+ url = "https://github.com/golang/appengine";
+ rev = "v1.3.0";
+ sha256 = "13cyhqwmvc2nia4ssdwwdzscq52aj3z9zjikx17wk4kb0j8vr370";
+ };
+ }
+ {
+ goPackagePath = "google.golang.org/genproto";
+ fetch = {
+ type = "git";
+ url = "https://github.com/google/go-genproto";
+ rev = "082222b4a5c5";
+ sha256 = "1q57b7c01wwcgd488fdkipizaxnwm4pkl0bzs2p7wbdagsbvv1g9";
+ };
+ }
+ {
+ goPackagePath = "google.golang.org/grpc";
+ fetch = {
+ type = "git";
+ url = "https://github.com/grpc/grpc-go";
+ rev = "v1.17.0";
+ sha256 = "0ibwav7p5cqng8yslarix521i1s11r7w9y2rjliahm75cj5crrb8";
+ };
+ }
+ {
+ goPackagePath = "gopkg.in/AlecAivazis/survey.v1";
+ fetch = {
+ type = "git";
+ url = "https://gopkg.in/AlecAivazis/survey.v1";
+ rev = "v1.6.2";
+ sha256 = "1w8pfgnnr0wz13fcnfhjkc20yh42in3ia7v6nczzyn38r2fdr43g";
+ };
+ }
+ {
+ goPackagePath = "gopkg.in/airbrake/gobrake.v2";
+ fetch = {
+ type = "git";
+ url = "https://gopkg.in/airbrake/gobrake.v2";
+ rev = "v2.0.9";
+ sha256 = "1x06f7n7qlyzqgyz0sdfcidf3w4ldn6zs6qx2mhibggk2z4whcjw";
+ };
+ }
+ {
+ goPackagePath = "gopkg.in/alecthomas/kingpin.v2";
+ fetch = {
+ type = "git";
+ url = "https://gopkg.in/alecthomas/kingpin.v2";
+ rev = "v2.2.6";
+ sha256 = "0mndnv3hdngr3bxp7yxfd47cas4prv98sqw534mx7vp38gd88n5r";
+ };
+ }
+ {
+ goPackagePath = "gopkg.in/asn1-ber.v1";
+ fetch = {
+ type = "git";
+ url = "https://gopkg.in/asn1-ber.v1";
+ rev = "f715ec2f112d";
+ sha256 = "00ixms8x3lrhywbvq5v2sagcqsxa1pcnlk17dp5lnwckv3xg4psb";
+ };
+ }
+ {
+ goPackagePath = "gopkg.in/check.v1";
+ fetch = {
+ type = "git";
+ url = "https://gopkg.in/check.v1";
+ rev = "788fd7840127";
+ sha256 = "0v3bim0j375z81zrpr5qv42knqs0y2qv2vkjiqi5axvb78slki1a";
+ };
+ }
+ {
+ goPackagePath = "gopkg.in/cheggaaa/pb.v1";
+ fetch = {
+ type = "git";
+ url = "https://gopkg.in/cheggaaa/pb.v1";
+ rev = "v1.0.25";
+ sha256 = "0vxqiw6f3xyv0zy3g4lksf8za0z8i0hvfpw92hqimsy84f79j3dp";
+ };
+ }
+ {
+ goPackagePath = "gopkg.in/fsnotify.v1";
+ fetch = {
+ type = "git";
+ url = "https://gopkg.in/fsnotify.v1";
+ rev = "v1.4.7";
+ sha256 = "07va9crci0ijlivbb7q57d2rz9h27zgn2fsm60spjsqpdbvyrx4g";
+ };
+ }
+ {
+ goPackagePath = "gopkg.in/gemnasium/logrus-airbrake-hook.v2";
+ fetch = {
+ type = "git";
+ url = "https://gopkg.in/gemnasium/logrus-airbrake-hook.v2";
+ rev = "v2.1.2";
+ sha256 = "0sbg0dn6cysmf8f2bi209jwl4jnpiwp4rdghnxlzirw3c32ms5y5";
+ };
+ }
+ {
+ goPackagePath = "gopkg.in/h2non/gock.v0";
+ fetch = {
+ type = "git";
+ url = "https://gopkg.in/h2non/gock.v0";
+ rev = "1baf36abac00";
+ sha256 = "1gddy7cl8d84r3s2kkzm25bm19n8ml8iznch94q6wnsrz3g6bsqq";
+ };
+ }
+ {
+ goPackagePath = "gopkg.in/inf.v0";
+ fetch = {
+ type = "git";
+ url = "https://gopkg.in/inf.v0";
+ rev = "v0.9.1";
+ sha256 = "00k5iqjcp371fllqxncv7jkf80hn1zww92zm78cclbcn4ybigkng";
+ };
+ }
+ {
+ goPackagePath = "gopkg.in/ini.v1";
+ fetch = {
+ type = "git";
+ url = "https://gopkg.in/ini.v1";
+ rev = "v1.39.0";
+ sha256 = "0j7pyl5v7xfzkhsyz193iq56ilan69pp11g2n5jw1k4h4g8s4k9b";
+ };
+ }
+ {
+ goPackagePath = "gopkg.in/mgo.v2";
+ fetch = {
+ type = "git";
+ url = "https://gopkg.in/mgo.v2";
+ rev = "9856a29383ce";
+ sha256 = "1gfbcmvpwwf1lydxj3g42wv2g9w3pf0y02igqk4f4f21h02sazkw";
+ };
+ }
+ {
+ goPackagePath = "gopkg.in/pipe.v2";
+ fetch = {
+ type = "git";
+ url = "https://gopkg.in/pipe.v2";
+ rev = "3c2ca4d52544";
+ sha256 = "090wrj4n6a6pzdlakcxy9qnkngc8hp6m49ipbnlszs0hyj2hnngv";
+ };
+ }
+ {
+ goPackagePath = "gopkg.in/robfig/cron.v2";
+ fetch = {
+ type = "git";
+ url = "https://gopkg.in/robfig/cron.v2";
+ rev = "be2e0b0deed5";
+ sha256 = "1cmm6dc4cl8269wlknxmicyn1s63irg66lj76b9ncjjfrvijpf0y";
+ };
+ }
+ {
+ goPackagePath = "gopkg.in/src-d/go-billy.v4";
+ fetch = {
+ type = "git";
+ url = "https://gopkg.in/src-d/go-billy.v4";
+ rev = "v4.2.0";
+ sha256 = "18fghcyk69g460px8rvmhmqldkbhw17dpnhg45qwdvaq90b0bkx9";
+ };
+ }
+ {
+ goPackagePath = "gopkg.in/src-d/go-git-fixtures.v3";
+ fetch = {
+ type = "git";
+ url = "https://gopkg.in/src-d/go-git-fixtures.v3";
+ rev = "v3.3.0";
+ sha256 = "1xbnd2ln95xgr6385ahl1y7108ifr3fh0zhy7fmb7cjasq8zlvw9";
+ };
+ }
+ {
+ goPackagePath = "gopkg.in/src-d/go-git.v4";
+ fetch = {
+ type = "git";
+ url = "https://gopkg.in/src-d/go-git.v4";
+ rev = "v4.5.0";
+ sha256 = "1krg24ncckwalmhzs2vlp8rwyk4rfnhfydwg8iw7gaywww2c1wfc";
+ };
+ }
+ {
+ goPackagePath = "gopkg.in/tomb.v1";
+ fetch = {
+ type = "git";
+ url = "https://gopkg.in/tomb.v1";
+ rev = "dd632973f1e7";
+ sha256 = "1lqmq1ag7s4b3gc3ddvr792c5xb5k6sfn0cchr3i2s7f1c231zjv";
+ };
+ }
+ {
+ goPackagePath = "gopkg.in/warnings.v0";
+ fetch = {
+ type = "git";
+ url = "https://gopkg.in/warnings.v0";
+ rev = "v0.1.2";
+ sha256 = "1kzj50jn708cingn7a13c2wdlzs6qv89dr2h4zj8d09647vlnd81";
+ };
+ }
+ {
+ goPackagePath = "gopkg.in/yaml.v2";
+ fetch = {
+ type = "git";
+ url = "https://gopkg.in/yaml.v2";
+ rev = "v2.2.1";
+ sha256 = "0dwjrs2lp2gdlscs7bsrmyc5yf6mm4fvgw71bzr9mv2qrd2q73s1";
+ };
+ }
+ {
+ goPackagePath = "gotest.tools";
+ fetch = {
+ type = "git";
+ url = "https://github.com/gotestyourself/gotest.tools";
+ rev = "v2.2.0";
+ sha256 = "0yif3gdyckmf8i54jq0xn00kflla5rhib9sarw66ngnbl7bn9kyl";
+ };
+ }
+ {
+ goPackagePath = "honnef.co/go/tools";
+ fetch = {
+ type = "git";
+ url = "https://github.com/dominikh/go-tools";
+ rev = "88497007e858";
+ sha256 = "0rinkyx3r2bq45mgcasnn5jb07cwbv3p3s2wwcrzxsarsj6wa5lc";
+ };
+ }
+ {
+ goPackagePath = "k8s.io/api";
+ fetch = {
+ type = "git";
+ url = "https://github.com/kubernetes/api";
+ rev = "6db15a15d2d3";
+ sha256 = "0jqb0c57yzaajrl17hbziw19x5n14q46dg73y0gmv0blpa6laxcy";
+ };
+ }
+ {
+ goPackagePath = "k8s.io/apiextensions-apiserver";
+ fetch = {
+ type = "git";
+ url = "https://github.com/kubernetes/apiextensions-apiserver";
+ rev = "1f84094d7e8e";
+ sha256 = "1b73cwjgsxjr00jbygmgs13bgyz6593kqqx2xksn9rir42qb3zil";
+ };
+ }
+ {
+ goPackagePath = "k8s.io/apimachinery";
+ fetch = {
+ type = "git";
+ url = "https://github.com/kubernetes/apimachinery";
+ rev = "bebe27e40fb7";
+ sha256 = "1g1q2f77b320z0v9b1gmal056dz189wf069400a44c0v5y61ak8l";
+ };
+ }
+ {
+ goPackagePath = "k8s.io/cli-runtime";
+ fetch = {
+ type = "git";
+ url = "https://github.com/kubernetes/cli-runtime";
+ rev = "1ee5ba10d7e3";
+ sha256 = "1nr5s217sy9s23xkhn2fpa6ck473wxq3a8m3vrmxq6xd0c60fkyy";
+ };
+ }
+ {
+ goPackagePath = "k8s.io/client-go";
+ fetch = {
+ type = "git";
+ url = "https://github.com/kubernetes/client-go";
+ rev = "701b91367003";
+ sha256 = "1qmz3s7yfa1l07lpyn3g7x9wnc9bxc0lk0p893vana96xj177zih";
+ };
+ }
+ {
+ goPackagePath = "k8s.io/code-generator";
+ fetch = {
+ type = "git";
+ url = "https://github.com/kubernetes/code-generator";
+ rev = "8c97d6ab64da";
+ sha256 = "137ih44qiaaidjw5xk7giqngi0x01awvknb0vrnf60ajq2dy9sdh";
+ };
+ }
+ {
+ goPackagePath = "k8s.io/gengo";
+ fetch = {
+ type = "git";
+ url = "https://github.com/kubernetes/gengo";
+ rev = "906d99f89cd6";
+ sha256 = "08hcvmn6n02a5yjl9yby1n6ybqf7b4jwzppj0v6rr73hh6w3kfi4";
+ };
+ }
+ {
+ goPackagePath = "k8s.io/helm";
+ fetch = {
+ type = "git";
+ url = "https://github.com/kubernetes/helm";
+ rev = "v2.7.2";
+ sha256 = "087f8wnf0kcbkh6flxlv07knrb964zyszi2k4i1ihaajg3bkbpq6";
+ };
+ }
+ {
+ goPackagePath = "k8s.io/kube-openapi";
+ fetch = {
+ type = "git";
+ url = "https://github.com/kubernetes/kube-openapi";
+ rev = "d8ea2fe547a4";
+ sha256 = "1m64xrp2vz7il2b3nikdjxf8l4yw2b2yp8997mwkj4rldznfxlxb";
+ };
+ }
+ {
+ goPackagePath = "k8s.io/kubernetes";
+ fetch = {
+ type = "git";
+ url = "https://github.com/kubernetes/kubernetes";
+ rev = "v1.11.3";
+ sha256 = "123qk5y9cwsj1cyswbpbdha84ynraam1xmqd5cpr4w29kw7nsjr8";
+ };
+ }
+ {
+ goPackagePath = "k8s.io/metrics";
+ fetch = {
+ type = "git";
+ url = "https://github.com/kubernetes/metrics";
+ rev = "3954d62a524d";
+ sha256 = "0y3ywkbhc9kdzp1dl4crphijx0ajd7apqpq3gvrmq4v224078hic";
+ };
+ }
+ {
+ goPackagePath = "k8s.io/test-infra";
+ fetch = {
+ type = "git";
+ url = "https://github.com/kubernetes/test-infra";
+ rev = "a22cef183a8f";
+ sha256 = "17cjbbadx2qsr1si5v6pb1ma59j9162mzk62zdimr8jr8q2pc402";
+ };
+ }
+ {
+ goPackagePath = "k8s.io/utils";
+ fetch = {
+ type = "git";
+ url = "https://github.com/kubernetes/utils";
+ rev = "5e321f9a457c";
+ sha256 = "0bgmjzjhxjldbd2n046fywk8351xnp8acf3nh8si0f0s5saniy7i";
+ };
+ }
+ {
+ goPackagePath = "sigs.k8s.io/yaml";
+ fetch = {
+ type = "git";
+ url = "https://github.com/kubernetes-sigs/yaml";
+ rev = "v1.1.0";
+ sha256 = "1p7hvjdr5jsyk7nys1g1pmgnf3ys6n320i6hds85afppk81k01kb";
+ };
+ }
+ {
+ goPackagePath = "vbom.ml/util";
+ fetch = {
+ type = "git";
+ url = "https://github.com/fvbommel/util";
+ rev = "256737ac55c4";
+ sha256 = "0pvsbh23fpa8w1gx2hv2rcw6nlb7r4nalfhfy3385sj0pc0b62lc";
+ };
+ }
+]
diff --git a/pkgs/applications/networking/cluster/minikube/default.nix b/pkgs/applications/networking/cluster/minikube/default.nix
index c44b7ac1dc7..13c7f59f794 100644
--- a/pkgs/applications/networking/cluster/minikube/default.nix
+++ b/pkgs/applications/networking/cluster/minikube/default.nix
@@ -14,9 +14,9 @@ let
in buildGoPackage rec {
pname = "minikube";
name = "${pname}-${version}";
- version = "0.30.0";
+ version = "0.35.0";
- kubernetesVersion = "1.11.2";
+ kubernetesVersion = "1.13.4";
goPackagePath = "k8s.io/minikube";
@@ -24,7 +24,7 @@ in buildGoPackage rec {
owner = "kubernetes";
repo = "minikube";
rev = "v${version}";
- sha256 = "02jxwh8qrvjn31rzjwx23908nd1i592drfdykxbc5b6a62fwp02z";
+ sha256 = "1qb342zs50sdfvfb8vbn7vrx11qqjy1hw518c053s7p34ljb24qd";
};
buildInputs = [ go-bindata makeWrapper gpgme ] ++ stdenv.lib.optional stdenv.hostPlatform.isDarwin vmnet;
@@ -35,7 +35,9 @@ in buildGoPackage rec {
go-bindata -nomemcopy -o pkg/minikube/assets/assets.go -pkg assets deploy/addons/...
- ISO_VERSION=$(grep "^ISO_VERSION" Makefile | sed "s/^.*\s//")
+ VERSION_MAJOR=$(grep "^VERSION_MAJOR" Makefile | sed "s/^.*\s//")
+ VERSION_MINOR=$(grep "^VERSION_MINOR" Makefile | sed "s/^.*\s//")
+ ISO_VERSION=v$VERSION_MAJOR.$VERSION_MINOR.0
ISO_BUCKET=$(grep "^ISO_BUCKET" Makefile | sed "s/^.*\s//")
KUBERNETES_VERSION=${kubernetesVersion}
@@ -66,7 +68,7 @@ in buildGoPackage rec {
homepage = https://github.com/kubernetes/minikube;
description = "A tool that makes it easy to run Kubernetes locally";
license = licenses.asl20;
- maintainers = with maintainers; [ ebzzry copumpkin ];
+ maintainers = with maintainers; [ ebzzry copumpkin vdemeester ];
platforms = with platforms; unix;
};
}
diff --git a/pkgs/applications/networking/cluster/minishift/default.nix b/pkgs/applications/networking/cluster/minishift/default.nix
index bb10349470f..9515b6ce3d0 100644
--- a/pkgs/applications/networking/cluster/minishift/default.nix
+++ b/pkgs/applications/networking/cluster/minishift/default.nix
@@ -4,10 +4,10 @@
}:
let
- version = "1.31.0";
+ version = "1.32.0";
# Update these on version bumps according to Makefile
- centOsIsoVersion = "v1.14.0";
+ centOsIsoVersion = "v1.15.0";
openshiftVersion = "v3.11.0";
in buildGoPackage rec {
@@ -18,7 +18,7 @@ in buildGoPackage rec {
owner = "minishift";
repo = "minishift";
rev = "v${version}";
- sha256 = "0v5hngfz393yi3x4c328g5bjazw02jr59ljqh6ws0j6wzxzm8jxf";
+ sha256 = "06qhcycnr06fw5dmmzwizmknm0j34j43894nl3kxa5mxh8x542pa";
};
nativeBuildInputs = [ pkgconfig go-bindata makeWrapper ];
diff --git a/pkgs/applications/networking/cluster/pachyderm/default.nix b/pkgs/applications/networking/cluster/pachyderm/default.nix
index c276c2e752f..618bea36de8 100644
--- a/pkgs/applications/networking/cluster/pachyderm/default.nix
+++ b/pkgs/applications/networking/cluster/pachyderm/default.nix
@@ -2,7 +2,7 @@
buildGoPackage rec {
name = "pachyderm-${version}";
- version = "1.4.6";
+ version = "1.8.5";
rev = "v${version}";
goPackagePath = "github.com/pachyderm/pachyderm";
@@ -12,7 +12,7 @@ buildGoPackage rec {
inherit rev;
owner = "pachyderm";
repo = "pachyderm";
- sha256 = "1fivihn9s04lmzdiwg0f05qm708fb14xy81pbc31wxdyjw28m8ns";
+ sha256 = "1b9x2xn0sxsjid15lnwr79lps8xzf24i7jfl0i48nabdigmi04wp";
};
meta = with lib; {
diff --git a/pkgs/applications/networking/cluster/terraform-providers/data.nix b/pkgs/applications/networking/cluster/terraform-providers/data.nix
index 86787a12c6a..34945ea87a4 100644
--- a/pkgs/applications/networking/cluster/terraform-providers/data.nix
+++ b/pkgs/applications/networking/cluster/terraform-providers/data.nix
@@ -4,15 +4,15 @@
{
owner = "terraform-providers";
repo = "terraform-provider-acme";
- version = "1.0.1";
- sha256 = "1yh0dqmrwa1gqpnzj4mdv9p9081azpcskqjrbmy2lzmn3di2ag3r";
+ version = "1.1.0";
+ sha256 = "1ha56pr5hixpz2nmqy5558ljkvcs4c23i0jnw4vqdv1a00hi035z";
};
alicloud =
{
owner = "terraform-providers";
repo = "terraform-provider-alicloud";
- version = "1.28.0";
- sha256 = "1clivywiv41dbdiix5cqghncf782jvpixlh02hlj4hn2cwq2j6mn";
+ version = "1.32.1";
+ sha256 = "0gdx54iw6q3w5pkci7433rd5yrplv1f08svsl7r3a75pww16j103";
};
archive =
{
@@ -39,8 +39,8 @@
{
owner = "terraform-providers";
repo = "terraform-provider-aws";
- version = "1.56.0";
- sha256 = "1jsvkqr3l88z2lq89rjw0nrnm8dsm57nydi45mbzjl3k0j7g028m";
+ version = "2.0.0";
+ sha256 = "17hf59wavv44a8a2vy2smcs3sxnws30h81jxiimg91vh1rrhisrw";
};
azuread =
{
@@ -53,8 +53,8 @@
{
owner = "terraform-providers";
repo = "terraform-provider-azurerm";
- version = "1.21.0";
- sha256 = "1xvw884nmr3h5ai2ijm2vms12cghas0jbkb52mqbqbaqci7273lc";
+ version = "1.22.1";
+ sha256 = "0jg2vsfkk3z1gppcfwla5aqbn9vaxbl8px1hps7nhmylp06l9avv";
};
azurestack =
{
@@ -81,8 +81,8 @@
{
owner = "terraform-providers";
repo = "terraform-provider-brightbox";
- version = "1.0.5";
- sha256 = "0sn7k5bqgms5sxjhjikmby0jf2n6y14z6s4wsifxaw7b0082fy28";
+ version = "1.0.6";
+ sha256 = "02wbx36kdbxxjwsbbwry3drdx5injllglpsb56dw1fvqymmal7wl";
};
chef =
{
@@ -200,15 +200,15 @@
{
owner = "terraform-providers";
repo = "terraform-provider-fastly";
- version = "0.5.0";
- sha256 = "08mnpf5j0pwhd38yl0phy5ipdvk9hwh8q9kcbv997y8mzpn5703g";
+ version = "0.6.0";
+ sha256 = "1z9qrqcib2rxy8s4glb4ggdkqcq7rwphiclsr1zncyly2n6887yj";
};
flexibleengine =
{
owner = "terraform-providers";
repo = "terraform-provider-flexibleengine";
- version = "1.3.1";
- sha256 = "19jncf24hl448srk4r2vqn8sca1mx8pcql9p5nxn015q6gig510v";
+ version = "1.4.0";
+ sha256 = "1gj3y9xw9zzh2fs2i6q0afw591lhy1lvcn80xac4da08r5l3si6g";
};
github =
{
@@ -221,22 +221,22 @@
{
owner = "terraform-providers";
repo = "terraform-provider-gitlab";
- version = "1.1.0";
- sha256 = "07mj69w0bvvkbzgfj17z7j34dg19db1d2m4gxwzjj81qmgmvzs3x";
+ version = "1.2.0";
+ sha256 = "11j84kyw2lsqsn6ya070hx0k6igb3hhjl8zlnr4q3gpmv51y23qc";
};
google =
{
owner = "terraform-providers";
repo = "terraform-provider-google";
- version = "1.20.0";
- sha256 = "1brkq4iz140miai6gzvzxfl28qi4j8gcc22igd7cb4qzafnlbxaj";
+ version = "2.1.0";
+ sha256 = "1dcdk60xwqr9sazllzxai8g6ghk0pnrz4zwm5qf6m9d3l39y2gkr";
};
google-beta =
{
owner = "terraform-providers";
repo = "terraform-provider-google-beta";
- version = "1.20.0";
- sha256 = "0qbzacfm1ai0lflwrq49sjy5y84n8zvaxsp6yz7ifvylqmirj1j0";
+ version = "2.1.0";
+ sha256 = "04lx43bb1kwd36a78l49knk8n6g5bh6p970yhniyypr28zrss1by";
};
grafana =
{
@@ -249,29 +249,29 @@
{
owner = "terraform-providers";
repo = "terraform-provider-hcloud";
- version = "1.7.0";
- sha256 = "10i043mlcp4vvlsd22zcdj2ma3372cxfklrx30kav7w3lfsqgcl6";
+ version = "1.8.0";
+ sha256 = "1gahka6012rq1p2wwvsbb1w353vm4aaifgb08a6s9la47ca7944s";
};
hedvig =
{
owner = "terraform-providers";
repo = "terraform-provider-hedvig";
- version = "1.0.1";
- sha256 = "1cbvr43qb2kxvsg17cnf91lnfv6cmj0dmc1manxrq1nicsnz6v5f";
+ version = "1.0.2";
+ sha256 = "1zk93iv57f9b8qcr1byhpxjpf1mxpbsd94iyv5k5r2xzw53ccv7q";
};
helm =
{
owner = "terraform-providers";
repo = "terraform-provider-helm";
- version = "0.7.0";
- sha256 = "172l5cpl6vfdz75s3s60iqcavi5m66gwbrm7aw47hby8lv5ivflc";
+ version = "0.8.0";
+ sha256 = "1v30sr5dql2365bf63gcr0hqn85gk6lk9lzz1i3w0j232jw700bh";
};
heroku =
{
owner = "terraform-providers";
repo = "terraform-provider-heroku";
- version = "1.7.2";
- sha256 = "0wliiks1cvxai3rca2nzy6dhc763fkrzagsl92c5xsz1zs59vy98";
+ version = "1.8.0";
+ sha256 = "0gansylgmc8fx9lskpc4dkjjc3v3jxbmcgscbgc4qfiiybxf5j8n";
};
http =
{
@@ -305,15 +305,15 @@
{
owner = "terraform-providers";
repo = "terraform-provider-influxdb";
- version = "1.0.2";
- sha256 = "05l2i0z35x6462mm1inn6jhp1pfi7df6hv52lhcyypk0lv2rgqf9";
+ version = "1.0.3";
+ sha256 = "1mdarb65v977680q55bis9ds84vx8vv84p7sgf0f0svfwq8z9r0k";
};
kubernetes =
{
owner = "terraform-providers";
repo = "terraform-provider-kubernetes";
- version = "1.5.0";
- sha256 = "1rzydw8bg2rmwvcvjp1h2qd4izkfs96rnmff42h0av22sfxkd7ng";
+ version = "1.5.2";
+ sha256 = "0g1f5cbmzrd46abwd0rdyrf8wj8w9bx1251gf4s9z41adrxjy2lp";
};
librato =
{
@@ -326,8 +326,8 @@
{
owner = "terraform-providers";
repo = "terraform-provider-linode";
- version = "1.4.0";
- sha256 = "0ak102bmi6yh7x9d3ryyvpck49vgdgwhbk958bbyhfpdr6jrvsrr";
+ version = "1.5.0";
+ sha256 = "1vp20jxxrzm57z6ldni2rbw9plwws17gpzv3z0ffqa9rijqxh3fr";
};
local =
{
@@ -361,8 +361,8 @@
{
owner = "terraform-providers";
repo = "terraform-provider-mysql";
- version = "1.5.0";
- sha256 = "1fsqfqz1db1pv8agr5zgqqyhizd7647n6rznf24iwapy1q0wkvmi";
+ version = "1.5.1";
+ sha256 = "0i5s62z3cdg3mhahf09nyw8l2hcx6d7jp3hr3n8rcjwj3ajj8qis";
};
netlify =
{
@@ -375,8 +375,8 @@
{
owner = "terraform-providers";
repo = "terraform-provider-newrelic";
- version = "1.2.0";
- sha256 = "1dh2i7qps7nr876y54jrjb414vdjhd8c7m1zwdiny93ggvl8f5j2";
+ version = "1.4.0";
+ sha256 = "09asrq9y0l49vq3cg96zmshdpgv7dgkvi2yda45cqz04bi6jvszz";
};
nomad =
{
@@ -389,22 +389,22 @@
{
owner = "terraform-providers";
repo = "terraform-provider-ns1";
- version = "1.1.0";
- sha256 = "1qfzm35p6kgamm1ffdvll96br025sj496nqzhsnfh3n3hsxzf0b8";
+ version = "1.1.2";
+ sha256 = "0ayxw40yg0k64i3y4hsghzyv3q3bqr1y142y7mc2xwnvgvgzzg98";
};
nsxt =
{
owner = "terraform-providers";
repo = "terraform-provider-nsxt";
- version = "1.0.0";
- sha256 = "09yliw59wp9flfgmkznbf4syl510wpxsplzr8sa9m2vw0yc78jnq";
+ version = "1.1.0";
+ sha256 = "0y9n4acbrjf5n2v8j10qfnz8677gil60by5miz3wd2qpxwgmhhm8";
};
null =
{
owner = "terraform-providers";
repo = "terraform-provider-null";
- version = "2.0.0";
- sha256 = "1qbb4pyzqys2010g6b4yzdzgalrf6az1s24y4sa577q2bix8x45v";
+ version = "2.1.0";
+ sha256 = "0hgdg5hl33kx9hzj2y0aqfq32q92b3hbdvx1a391c0miz6rn2k8k";
};
nutanix =
{
@@ -417,8 +417,8 @@
{
owner = "terraform-providers";
repo = "terraform-provider-oci";
- version = "3.12.0";
- sha256 = "00mwyangy7n665wlvvr6jmrlfbhnw5spy47q64rmm4pp66gg9brw";
+ version = "3.17.0-rc1";
+ sha256 = "0c49i4fic0bqgpwg05q60a99w7a236kxyhdww5k4sk04cdg3aa1f";
};
oneandone =
{
@@ -438,15 +438,15 @@
{
owner = "terraform-providers";
repo = "terraform-provider-openstack";
- version = "1.14.0";
- sha256 = "05vlcfnbfs4xwzfx8lihq63zya19gdgq2xh5ddwprzddm42v1i1z";
+ version = "1.16.0";
+ sha256 = "1s0fclqclq1rrwz6217jw4qh6bz3zlk6zxsaabxvzbsg4b7vwnrh";
};
opentelekomcloud =
{
owner = "terraform-providers";
repo = "terraform-provider-opentelekomcloud";
- version = "1.5.2";
- sha256 = "1zprj2k86wad9c35jgv22imld8l8f1jjgv54dj54ry56964nhkh8";
+ version = "1.6.1";
+ sha256 = "143sbfhc44bw21wa86lyd2m7vdihhnqs7grrdxpmw4w7bcx9sql2";
};
opsgenie =
{
@@ -459,8 +459,8 @@
{
owner = "terraform-providers";
repo = "terraform-provider-oraclepaas";
- version = "1.4.1";
- sha256 = "12jsqsyrkmrxpz8zashjwnvn6nkrd6ya06d58m116a0qija1a4s3";
+ version = "1.4.3";
+ sha256 = "0lyz2fjs4hr28ymx1qlzp93r3w4qn74bglipgv5mf55k543dmwdz";
};
ovh =
{
@@ -473,8 +473,8 @@
{
owner = "terraform-providers";
repo = "terraform-provider-packet";
- version = "1.2.5";
- sha256 = "1c40w1q18piip4fn572mnf67g07h6g03hnin23c7jw265m4yr222";
+ version = "1.4.1";
+ sha256 = "0wky3kw3vhb1bn7n7h03nbd6n7bz1xbmygs0ipnkgq4qyzydjrhh";
};
pagerduty =
{
@@ -487,15 +487,15 @@
{
owner = "terraform-providers";
repo = "terraform-provider-panos";
- version = "1.4.1";
- sha256 = "1mlz01v01675cf9ja8i42c6ssklf65kd8wpjzf0j472lfwki4xpp";
+ version = "1.5.1";
+ sha256 = "17w4zkc445bpfq6pqx575y5njsak18yca1y2by4chg9d05inphqd";
};
postgresql =
{
owner = "terraform-providers";
repo = "terraform-provider-postgresql";
- version = "0.1.3";
- sha256 = "1jx907wrq3b9cvx0z4731d1vkp40g358czgpgmky6k8wg70mhp17";
+ version = "0.2.1";
+ sha256 = "025s3wgj1v6iwaliyics33cb5sx4614658z1vxxrxx7xb9pf328w";
};
powerdns =
{
@@ -508,8 +508,8 @@
{
owner = "terraform-providers";
repo = "terraform-provider-profitbricks";
- version = "1.4.0";
- sha256 = "1yrmlpqc1bzgs3c8pxhfbscf4anjri6gv6sd8i8rn764z8xhwaff";
+ version = "1.4.2";
+ sha256 = "0raz070sj5csyqn3gav1a5p5dsbrym9ba8nfw43hbnk5ixxr0izk";
};
rabbitmq =
{
@@ -560,12 +560,12 @@
version = "1.8.0";
sha256 = "1vr3im5jas7m3yn5529m6ghhx4lxf2lksqbznpwyi351sbsn4ji2";
};
- selvpc =
+ selectel =
{
owner = "terraform-providers";
- repo = "terraform-provider-selvpc";
- version = "1.1.0";
- sha256 = "045mp6j5hll0lym9z035swxmdjq43mdpf881qgmk8sz8j2wgvm5f";
+ repo = "terraform-provider-selectel";
+ version = "2.0.0";
+ sha256 = "1yw1526llvqc3ibrmjffan2lvqas99x93h6rlz9lrgzylgxnqaxy";
};
skytap =
{
@@ -585,8 +585,8 @@
{
owner = "terraform-providers";
repo = "terraform-provider-spotinst";
- version = "1.5.0";
- sha256 = "15ggn37qsgzb78g0f6bj1l89zy65yqj66abs7xq5kjxsh62h9dij";
+ version = "1.8.0";
+ sha256 = "1j6gab5vva21m01p5gh0x1p64jnx9ch2q3zd4f1s8ch9mba6zgsl";
};
statuscake =
{
@@ -606,8 +606,8 @@
{
owner = "terraform-providers";
repo = "terraform-provider-template";
- version = "2.0.0";
- sha256 = "0rn2qavvx1y0hv25iw8yd6acvrclmz17hzg2jpb161mnlh8q94r4";
+ version = "2.1.0";
+ sha256 = "1db9gr4f5awryqxq5iahv2xj5p0msd44j3lgklkqw2q3kswlvckr";
};
tencentcloud =
{
@@ -627,8 +627,8 @@
{
owner = "terraform-providers";
repo = "terraform-provider-tfe";
- version = "0.6.0";
- sha256 = "1p8l034cjpj81vcvnz8mr2yyw3bz4zffmdg9pz9mp62s8rrrvwkw";
+ version = "0.7.1";
+ sha256 = "0iqr1r4fd14c9fyj4f21kmnlypxsdi1w787gdj2jr27acqkq3pqh";
};
tls =
{
@@ -648,8 +648,8 @@
{
owner = "terraform-providers";
repo = "terraform-provider-ucloud";
- version = "1.1.0";
- sha256 = "0v4f7rvyiwmm64v6gwqdz3mn9sjq5y8mlhd7v9saq7rh56pfx3n2";
+ version = "1.2.0";
+ sha256 = "1pq0288lgj288xjs647n740fbpxgbly0hxy5kz9xr3lf7ld1cclq";
};
ultradns =
{
@@ -662,15 +662,15 @@
{
owner = "terraform-providers";
repo = "terraform-provider-vault";
- version = "1.4.1";
- sha256 = "1nkhcgd2y7wyi179l2znjpakmjjcxarwc9j5mb7r191p2m27k27s";
+ version = "1.5.0";
+ sha256 = "1lny94555ws0nd2lp9zkbq6c1324h50izfk88941irl7apjmwzw5";
};
vcd =
{
owner = "terraform-providers";
repo = "terraform-provider-vcd";
- version = "1.0.0";
- sha256 = "0sjqdb37lalvizf4imxwn7nmry1c76dw2fpnrfmal34gghddm91p";
+ version = "2.0.0";
+ sha256 = "1h4zcxbrg6j4xy3hw84f9mmnz535a91jgxvymnrjadgm91bn6g8s";
};
vsphere =
{
@@ -679,12 +679,19 @@
version = "1.9.1";
sha256 = "07pxzy8fw0n0kq9mf43bz4cycbwxp8vy0jbl44sknszmzbn4pam7";
};
+ yandex =
+ {
+ owner = "terraform-providers";
+ repo = "terraform-provider-yandex";
+ version = "0.1.15";
+ sha256 = "03ynfzdlpl5z7lpq5yisqkzsk53lfz71ss30bfvx0q3qhv7514dy";
+ };
matchbox =
{
owner = "coreos";
repo = "terraform-provider-matchbox";
- version = "0.2.2";
- sha256 = "07lzslbl41i3h84bpsmxhvchm5kqk87yzin2yvpbq0m3m7r2f547";
+ version = "0.2.3";
+ sha256 = "12vf8krzx79yrsk3lk2k6vwwk1f18617ky7g2yf60bf2x836lg09";
};
nixos =
{
@@ -697,7 +704,14 @@
{
owner = "tweag";
repo = "terraform-provider-secret";
- version = "0.0.1";
- sha256 = "1mqs1il8y97hf9havcmxdfwjcpkrxa1hpkifzzy4rjc88m2m4q9r";
+ version = "1.0.0";
+ sha256 = "03q78d0g3b4j4213qjlacj1adh7hjwcqcqrwm8c2r2k5w9kb25k0";
+ };
+ segment =
+ {
+ owner = "ajbosco";
+ repo = "terraform-provider-segment";
+ version = "0.2.0";
+ sha256 = "0ic5b9djhnb1bs2bz3zdprgy3r55dng09xgc4d9l9fyp85g2amaz";
};
}
diff --git a/pkgs/applications/networking/cluster/terraform-providers/providers.txt b/pkgs/applications/networking/cluster/terraform-providers/providers.txt
index c32d6d7b7d6..3352fb79f1e 100644
--- a/pkgs/applications/networking/cluster/terraform-providers/providers.txt
+++ b/pkgs/applications/networking/cluster/terraform-providers/providers.txt
@@ -17,3 +17,6 @@ tweag/terraform-provider-nixos
# include terraform-provider-secret
tweag/terraform-provider-secret
+
+# include terraform-provider-segment
+ajbosco/terraform-provider-segment
diff --git a/pkgs/applications/networking/cluster/terraform/default.nix b/pkgs/applications/networking/cluster/terraform/default.nix
index a9d8faf62b5..45c8dcf9800 100644
--- a/pkgs/applications/networking/cluster/terraform/default.nix
+++ b/pkgs/applications/networking/cluster/terraform/default.nix
@@ -97,8 +97,8 @@ in rec {
terraform_0_11-full = terraform_0_11.full;
terraform_0_12 = pluggable (generic {
- version = "0.12.0-alpha4";
- sha256 = "16cwqxxb19m91d7rx7awri1awz7d8cfnrv0rbql9rbg5qjyqxcp9";
+ version = "0.12.0-beta1";
+ sha256 = "0djakf2agbhpfqis4x0lf2i8s1ahvrdyfkcgr6lzp0nsks652rcm";
patches = [ ./provider-path.patch ];
passthru = { inherit plugins; };
});
diff --git a/pkgs/applications/networking/davmail/default.nix b/pkgs/applications/networking/davmail/default.nix
index f66692d1056..589cd04057e 100644
--- a/pkgs/applications/networking/davmail/default.nix
+++ b/pkgs/applications/networking/davmail/default.nix
@@ -1,10 +1,11 @@
{ fetchurl, stdenv, jre, glib, libXtst, gtk2, makeWrapper, unzip }:
stdenv.mkDerivation rec {
- name = "davmail-4.8.6";
+ pname = "davmail";
+ version = "5.2.0";
src = fetchurl {
- url = "mirror://sourceforge/davmail/4.8.6/davmail-4.8.6-2600.zip";
- sha256 = "1wk4jxb46qlyipxj57flqadgm4mih243rhqq9sp9m5pifjqrw9dp";
+ url = "mirror://sourceforge/${pname}/${version}/${pname}-${version}-2961.zip";
+ sha256 = "0jw6sjg7k7zg8ab0srz6cjjj5hnw5ppxx1w35sw055dlg54fh2m5";
};
sourceRoot = ".";
@@ -14,7 +15,7 @@ stdenv.mkDerivation rec {
installPhase = ''
mkdir -p $out/share/davmail
cp -vR ./* $out/share/davmail
- makeWrapper $out/share/davmail/davmail.sh $out/bin/davmail \
+ makeWrapper $out/share/davmail/davmail $out/bin/davmail \
--prefix PATH : ${jre}/bin \
--prefix LD_LIBRARY_PATH : ${stdenv.lib.makeLibraryPath [ glib gtk2 libXtst ]}
'';
diff --git a/pkgs/applications/networking/feedreaders/feedreader/default.nix b/pkgs/applications/networking/feedreaders/feedreader/default.nix
index 1e25db0a381..22b2e2f43c4 100644
--- a/pkgs/applications/networking/feedreaders/feedreader/default.nix
+++ b/pkgs/applications/networking/feedreaders/feedreader/default.nix
@@ -1,6 +1,6 @@
{ stdenv, fetchFromGitHub, fetchpatch, meson, ninja, pkgconfig, vala, gettext, python3
, appstream-glib, desktop-file-utils, glibcLocales, wrapGAppsHook
-, gtk3, libgee, libpeas, librest, webkitgtk, gsettings-desktop-schemas
+, gtk3, libgee, libpeas, librest, webkitgtk, gsettings-desktop-schemas, hicolor-icon-theme
, curl, glib, gnome3, gst_all_1, json-glib, libnotify, libsecret, sqlite, gumbo, libxml2
}:
@@ -24,6 +24,7 @@ stdenv.mkDerivation rec {
curl glib json-glib libnotify libsecret sqlite gumbo gtk3
libgee libpeas gnome3.libsoup librest webkitgtk gsettings-desktop-schemas
gnome3.gnome-online-accounts
+ hicolor-icon-theme # for setup hook
] ++ (with gst_all_1; [
gstreamer gst-plugins-base gst-plugins-good
]);
diff --git a/pkgs/applications/networking/instant-messengers/ekiga/default.nix b/pkgs/applications/networking/instant-messengers/ekiga/default.nix
index 0fea8f0574b..7129e0a1e83 100644
--- a/pkgs/applications/networking/instant-messengers/ekiga/default.nix
+++ b/pkgs/applications/networking/instant-messengers/ekiga/default.nix
@@ -1,6 +1,6 @@
{ stdenv, glib, fetchurl, fetchpatch, cyrus_sasl, gettext, openldap, ptlib, opal, libXv, rarian, intltool
, perlPackages, evolution-data-server, gnome-doc-utils, avahi, autoreconfHook
-, libsigcxx, gtk, dbus-glib, libnotify, libXext, xorgproto, gnome3, boost, libsecret
+, libsigcxx, gtk2, dbus-glib, libnotify, libXext, xorgproto, gnome3, boost, libsecret
, pkgconfig, libxml2, unixODBC, db, nspr, nss, zlib
, libXrandr, which, libxslt, libtasn1, gmp, nettle, sqlite, makeWrapper }:
@@ -14,7 +14,7 @@ stdenv.mkDerivation rec {
buildInputs = [ cyrus_sasl gettext openldap ptlib opal libXv rarian intltool
evolution-data-server gnome-doc-utils avahi
- libsigcxx gtk dbus-glib libnotify libXext xorgproto sqlite
+ libsigcxx gtk2 dbus-glib libnotify libXext xorgproto sqlite
gnome3.libsoup glib gnome3.adwaita-icon-theme boost
autoreconfHook pkgconfig libxml2 unixODBC db nspr
nss zlib libsecret libXrandr which libxslt libtasn1
diff --git a/pkgs/applications/networking/instant-messengers/spectral/default.nix b/pkgs/applications/networking/instant-messengers/spectral/default.nix
index 5dd8bf5f69a..aff3cf82dc9 100644
--- a/pkgs/applications/networking/instant-messengers/spectral/default.nix
+++ b/pkgs/applications/networking/instant-messengers/spectral/default.nix
@@ -1,26 +1,42 @@
{ stdenv, fetchgit
-, pkgconfig
+, pkgconfig, makeWrapper
, qmake, qtbase, qtquickcontrols2, qtmultimedia
, libpulseaudio
# Not mentioned but seems needed
, qtgraphicaleffects
-# Unsure but needed by similar
-, qtdeclarative, qtsvg
+, qtdeclarative
}:
-stdenv.mkDerivation rec {
- name = "spectral-${version}";
- version = "2018-09-24";
+let
+ # Following "borrowed" from yubikey-manager-qt
+ qmlPath = qmlLib: "${qmlLib}/${qtbase.qtQmlPrefix}";
+
+ inherit (stdenv) lib;
+
+ qml2ImportPath = lib.concatMapStringsSep ":" qmlPath [
+ qtbase.bin qtdeclarative.bin qtquickcontrols2.bin qtgraphicaleffects qtmultimedia
+ ];
+
+in stdenv.mkDerivation rec {
+ pname = "spectral";
+ version = "2019-03-03";
src = fetchgit {
url = "https://gitlab.com/b0/spectral.git";
- rev = "c9d1d6887722860a52b597a0f74d0ce39c8622e1";
- sha256 = "1ym8jlqls4lcq5rd81vxw1dni79fc6ph00ip8nsydl6i16fngl4c";
+ rev = "0473f25d38a064ee4e18203ec16eeae84fea4866";
+ sha256 = "1n09ginw6g0p42xj3zgxm52dvyyvj5psllv70vx21i50lvkbh9rw";
fetchSubmodules = true;
};
- nativeBuildInputs = [ pkgconfig qmake ];
- buildInputs = [ qtbase qtquickcontrols2 qtmultimedia qtgraphicaleffects qtdeclarative qtsvg ]
+ qmakeFlags = [ "CONFIG+=qtquickcompiler" "BUNDLE_FONT=true" ];
+
+ postInstall = ''
+ wrapProgram $out/bin/spectral \
+ --set QML2_IMPORT_PATH "${qml2ImportPath}"
+ '';
+
+ nativeBuildInputs = [ pkgconfig qmake makeWrapper ];
+ buildInputs = [ qtbase qtquickcontrols2 qtmultimedia qtgraphicaleffects qtdeclarative ]
++ stdenv.lib.optional stdenv.hostPlatform.isLinux libpulseaudio;
meta = with stdenv.lib; {
diff --git a/pkgs/applications/networking/instant-messengers/teamspeak/server.nix b/pkgs/applications/networking/instant-messengers/teamspeak/server.nix
index fdb3326803c..f79622b39cf 100644
--- a/pkgs/applications/networking/instant-messengers/teamspeak/server.nix
+++ b/pkgs/applications/networking/instant-messengers/teamspeak/server.nix
@@ -1,7 +1,7 @@
{ stdenv, fetchurl, makeWrapper }:
let
- version = "3.5.1";
+ version = "3.6.1";
arch = if stdenv.is64bit then "amd64" else "x86";
libDir = if stdenv.is64bit then "lib64" else "lib";
in
@@ -15,8 +15,8 @@ stdenv.mkDerivation {
"http://teamspeak.gameserver.gamed.de/ts3/releases/${version}/teamspeak3-server_linux_${arch}-${version}.tar.bz2"
];
sha256 = if stdenv.is64bit
- then "0ygb867ff2fvi9n9hgs4hldpg4y012w4i1d9cx4f5mpli1xim6da"
- else "0g1cixsldpdbfzg2vain7h3hr5j3xjdngjw66r0aqnzbx743gjzj";
+ then "0wgnb7fdy393anridymm1frlgr86j0awxnzvd498ar5fch06ij87"
+ else "0x6p1z4qvgy464n6gnkaqrm7dns1ysyadm68sr260d39a7028q1c";
};
buildInputs = [ makeWrapper ];
diff --git a/pkgs/applications/networking/instant-messengers/turses/default.nix b/pkgs/applications/networking/instant-messengers/turses/default.nix
index 97f04eea2d7..cffe74a0e80 100644
--- a/pkgs/applications/networking/instant-messengers/turses/default.nix
+++ b/pkgs/applications/networking/instant-messengers/turses/default.nix
@@ -1,10 +1,11 @@
-{ stdenv, python3Packages }:
+{ stdenv, python36Packages }:
with stdenv.lib;
-with python3Packages;
+
+# Needs Python <3.7 for now, see https://github.com/louipc/turses/issues/4
+with python36Packages;
buildPythonPackage rec {
- name = "${pname}-${version}";
pname = "turses";
version = "0.3.1";
@@ -13,7 +14,9 @@ buildPythonPackage rec {
sha256 = "15mkhm3b5ka42h8qph0mhh8izfc1200v7651c62k7ldcs50ib9j6";
};
- buildInputs = [ mock pytest coverage tox ];
+ disabled = ! python36Packages.pythonOlder "3.7";
+
+ checkInputs = [ mock pytest coverage tox ];
propagatedBuildInputs = [ urwid tweepy future ];
checkPhase = ''
diff --git a/pkgs/applications/networking/ipfs-cluster/default.nix b/pkgs/applications/networking/ipfs-cluster/default.nix
index a0513f7dfb1..870e40d8128 100644
--- a/pkgs/applications/networking/ipfs-cluster/default.nix
+++ b/pkgs/applications/networking/ipfs-cluster/default.nix
@@ -2,7 +2,7 @@
buildGoPackage rec {
name = "ipfs-cluster-${version}";
- version = "0.8.0";
+ version = "0.9.0";
rev = "v${version}";
goPackagePath = "github.com/ipfs/ipfs-cluster";
@@ -10,7 +10,7 @@ buildGoPackage rec {
extraSrcPaths = [
(fetchgx {
inherit name src;
- sha256 = "0vqj6h885dy0d3zabris8f5sbqdwm5ljhpf8z466pwm7qx8m5afn";
+ sha256 = "1k7xcirvi07p5g9gr9jcx5h39wk7jxfsyjrn5yraa8xdqhn6b6nx";
})
];
@@ -18,7 +18,7 @@ buildGoPackage rec {
owner = "ipfs";
repo = "ipfs-cluster";
inherit rev;
- sha256 = "0q5j825hzsrlfv3y79376l6pd2d3hiczymw3w9nqh955rphjg7ci";
+ sha256 = "1bxwcp0355f1ykjcidbxv218zp9d20nma7lnpn9xcjqc8vaq03kn";
};
nativeBuildInputs = [ gx-go ];
diff --git a/pkgs/applications/networking/ipfs/default.nix b/pkgs/applications/networking/ipfs/default.nix
index 08b5ca077af..28eec458ee0 100644
--- a/pkgs/applications/networking/ipfs/default.nix
+++ b/pkgs/applications/networking/ipfs/default.nix
@@ -2,7 +2,7 @@
buildGoPackage rec {
name = "ipfs-${version}";
- version = "0.4.18";
+ version = "0.4.19";
rev = "v${version}";
goPackagePath = "github.com/ipfs/go-ipfs";
@@ -10,7 +10,7 @@ buildGoPackage rec {
extraSrcPaths = [
(fetchgx {
inherit name src;
- sha256 = "05d5m6c2i2kl4rvb0hddyqbidn76ljr2zryi8v2r9i8dbi0164gm";
+ sha256 = "0bj2kzxjssp7szp1wr9pp08bsi55jgf0k7gi4h70phlib2q673j2";
})
];
@@ -18,7 +18,7 @@ buildGoPackage rec {
owner = "ipfs";
repo = "go-ipfs";
inherit rev;
- sha256 = "0h4j18qpycfmmlhb9khvhbk8c1zqajflvw8gk3l8j7wxrxh5j2s6";
+ sha256 = "061mgkawimhw3gq506h8m6kw50a2v26qysa5kc5jdqgaqx5yvqh4";
};
meta = with stdenv.lib; {
diff --git a/pkgs/applications/networking/ipget/default.nix b/pkgs/applications/networking/ipget/default.nix
index 23c9d7df812..45835248d0d 100644
--- a/pkgs/applications/networking/ipget/default.nix
+++ b/pkgs/applications/networking/ipget/default.nix
@@ -2,25 +2,25 @@
buildGoPackage rec {
name = "ipget-${version}";
- version = "0.2.5";
+ version = "0.3.2";
rev = "v${version}";
goPackagePath = "github.com/ipfs/ipget";
-
+
extraSrcPaths = [
(fetchgx {
inherit name src;
- sha256 = "1d4w8zl5mcppn3d4bl7qdkiqlf8gi3z2a62nygx17bqpa3da8cf3";
+ sha256 = "07l9hpkhk5phr95zp1l5wd3ii38bw91hy4dlw2rsfbzcsc8bq4s8";
})
];
-
+
goDeps = ../../../tools/package-management/gx/deps.nix;
src = fetchFromGitHub {
owner = "ipfs";
repo = "ipget";
inherit rev;
- sha256 = "0a8yxqhl469ipiznrgkp3yi1xz3xzcbpx60wabqppq8hccrdiybk";
+ sha256 = "1ljf5ddvc1p5swmgn4m1ivfj74fykk56myk2r9c4grdjzksf4a15";
};
meta = with stdenv.lib; {
diff --git a/pkgs/applications/networking/mailreaders/claws-mail/default.nix b/pkgs/applications/networking/mailreaders/claws-mail/default.nix
index 34361e1dab9..42f29574eef 100644
--- a/pkgs/applications/networking/mailreaders/claws-mail/default.nix
+++ b/pkgs/applications/networking/mailreaders/claws-mail/default.nix
@@ -2,7 +2,7 @@
, curl, dbus, dbus-glib, enchant, gtk2, gnutls, gnupg, gpgme, hicolor-icon-theme
, libarchive, libcanberra-gtk2, libetpan, libnotify, libsoup, libxml2, networkmanager
, openldap, perl, pkgconfig, poppler, python, shared-mime-info, webkitgtk24x-gtk2
-, glib-networking, gsettings-desktop-schemas, libSM, libytnef
+, glib-networking, gsettings-desktop-schemas, libSM, libytnef, libical
# Build options
# TODO: A flag to build the manual.
# TODO: Plugins that complain about their missing dependencies, even when
@@ -69,7 +69,8 @@ stdenv.mkDerivation rec {
++ optional enableNetworkManager networkmanager
++ optional enableLdap openldap
++ optional enablePluginPdf poppler
- ++ optional enablePluginFancy webkitgtk24x-gtk2;
+ ++ optional enablePluginFancy webkitgtk24x-gtk2
+ ++ optional enablePluginVcalendar libical;
configureFlags =
optional (!enableLdap) "--disable-ldap"
diff --git a/pkgs/applications/networking/mailreaders/notmuch/default.nix b/pkgs/applications/networking/mailreaders/notmuch/default.nix
index b6d552d96d5..305535029c2 100644
--- a/pkgs/applications/networking/mailreaders/notmuch/default.nix
+++ b/pkgs/applications/networking/mailreaders/notmuch/default.nix
@@ -12,7 +12,7 @@
with stdenv.lib;
stdenv.mkDerivation rec {
- version = "0.28.2";
+ version = "0.28.3";
name = "notmuch-${version}";
passthru = {
@@ -22,7 +22,7 @@ stdenv.mkDerivation rec {
src = fetchurl {
url = "https://notmuchmail.org/releases/${name}.tar.gz";
- sha256 = "0cg9ff7h7mklgbqqknxigxxx1j3p3s2a9cxvrs5ih7j56f04k9l5";
+ sha256 = "1v0ff6qqwj42p3n6qw30czzqi52nvgf3dn05vd7a03g39a5js8af";
};
nativeBuildInputs = [ pkgconfig ];
diff --git a/pkgs/applications/networking/mumble/default.nix b/pkgs/applications/networking/mumble/default.nix
index 2d008492050..d4e624e6ad5 100644
--- a/pkgs/applications/networking/mumble/default.nix
+++ b/pkgs/applications/networking/mumble/default.nix
@@ -1,4 +1,4 @@
-{ stdenv, fetchurl, fetchFromGitHub, fetchpatch, pkgconfig
+{ stdenv, fetchurl, fetchFromGitHub, fetchpatch, makeWrapper, pkgconfig
, qt4, qmake4Hook, qt5, avahi, boost, libopus, libsndfile, protobuf, speex, libcap
, alsaLib, python
, jackSupport ? false, libjack2 ? null
@@ -154,5 +154,12 @@ in {
murmur = server stableSource;
murmur_git = (server gitSource).overrideAttrs (old: {
meta = old.meta // { broken = iceSupport; };
+
+ nativeBuildInputs = old.nativeBuildInputs or [] ++ [ makeWrapper ];
+
+ installPhase = old.installPhase or "" + ''
+ wrapProgram $out/bin/murmurd --suffix QT_PLUGIN_PATH : \
+ ${getBin qt5.qtbase}/${qt5.qtbase.qtPluginPrefix}
+ '';
});
}
diff --git a/pkgs/applications/networking/p2p/torrential/default.nix b/pkgs/applications/networking/p2p/torrential/default.nix
new file mode 100644
index 00000000000..999f80a7bbd
--- /dev/null
+++ b/pkgs/applications/networking/p2p/torrential/default.nix
@@ -0,0 +1,60 @@
+{ stdenv
+, fetchFromGitHub
+, cmake
+, pkgconfig
+, pantheon
+, curl
+, glib
+, gtk3
+, hicolor-icon-theme
+, libb64
+, libevent
+, libgee
+, libnatpmp
+, libunity
+, miniupnpc
+, openssl
+, wrapGAppsHook }:
+
+stdenv.mkDerivation rec {
+ pname = "torrential";
+ version = "1.1.0";
+
+ src = fetchFromGitHub {
+ owner = "davidmhewitt";
+ repo = "torrential";
+ rev = version;
+ fetchSubmodules = true;
+ sha256 = "17aby0c17ybyzyzyc1cg1j6q1a186801fy84avlaxahqp7vdammx";
+ };
+
+ nativeBuildInputs = [
+ cmake
+ pantheon.vala
+ pkgconfig
+ wrapGAppsHook
+ ];
+
+ buildInputs = [
+ curl
+ glib
+ gtk3
+ hicolor-icon-theme
+ libb64
+ libevent
+ libgee
+ libnatpmp
+ libunity
+ miniupnpc
+ openssl
+ pantheon.granite
+ ];
+
+ meta = with stdenv.lib; {
+ description = "Download torrents in style with this speedy, minimalist torrent client for elementary OS";
+ homepage = https://github.com/davidmhewitt/torrential;
+ maintainers = with maintainers; [ kjuvi ] ++ pantheon.maintainers;
+ platforms = platforms.linux;
+ license = licenses.gpl3;
+ };
+}
diff --git a/pkgs/applications/networking/p2p/zeronet/default.nix b/pkgs/applications/networking/p2p/zeronet/default.nix
index 1dc4e3e4351..88f07f0a8a5 100644
--- a/pkgs/applications/networking/p2p/zeronet/default.nix
+++ b/pkgs/applications/networking/p2p/zeronet/default.nix
@@ -2,14 +2,14 @@
python2Packages.buildPythonApplication rec {
pname = "zeronet";
- version = "0.6.4";
+ version = "0.6.5";
format = "other";
src = fetchFromGitHub {
owner = "HelloZeroNet";
repo = "ZeroNet";
rev = "v${version}";
- sha256 = "04mpnkx0pbvcfjs337f0ajabdbh6h0gypnaz6n395avkf8r1g4c3";
+ sha256 = "1b9jg525jq40czyw9xh9ck90fl9rzrdmzl2mzhqqhz23idb60j4a";
};
propagatedBuildInputs = with python2Packages; [ msgpack gevent ];
diff --git a/pkgs/applications/networking/protonmail-bridge/default.nix b/pkgs/applications/networking/protonmail-bridge/default.nix
index 7557f04dc58..eac1acb1e6a 100644
--- a/pkgs/applications/networking/protonmail-bridge/default.nix
+++ b/pkgs/applications/networking/protonmail-bridge/default.nix
@@ -2,7 +2,7 @@
libsecret, libGL, libpulseaudio, glib, makeWrapper, makeDesktopItem }:
let
- version = "1.1.1-1";
+ version = "1.1.3-1";
description = ''
An application that runs on your computer in the background and seamlessly encrypts
@@ -25,7 +25,7 @@ in stdenv.mkDerivation rec {
src = fetchurl {
url = "https://protonmail.com/download/protonmail-bridge_${version}_amd64.deb";
- sha256 = "148syyz92yqxp2fw18fhflhmdrakxz7cc30va7h0pwysz97gni2p";
+ sha256 = "15kyhyx1v4bb2sqzwq7bqrxxw7g733p5jnsgjqka2ygzg6dl2c5n";
};
nativeBuildInputs = [ makeWrapper ];
@@ -40,7 +40,7 @@ in stdenv.mkDerivation rec {
mkdir -p $out/{bin,lib,share/applications}
mkdir -p $out/share/{applications,icons/hicolor/scalable/apps}
- cp -r usr/lib/protonmail/bridge/protonmail-bridge{,.sh} $out/lib
+ cp -r usr/lib/protonmail/bridge/protonmail-bridge $out/lib
cp usr/share/icons/protonmail/ProtonMail_Bridge.svg $out/share/icons/hicolor/scalable/apps/protonmail-bridge.svg
cp ${desktopItem}/share/applications/* $out/share/applications
diff --git a/pkgs/applications/office/gnucash/default.nix b/pkgs/applications/office/gnucash/default.nix
index bd3425e282a..e7aacb9de0f 100644
--- a/pkgs/applications/office/gnucash/default.nix
+++ b/pkgs/applications/office/gnucash/default.nix
@@ -1,6 +1,6 @@
{ fetchurl, stdenv, pkgconfig, makeWrapper, cmake, gtest
, boost, icu, libxml2, libxslt, gettext, swig, isocodes, gtk3, glibcLocales
-, webkit, dconf, hicolor-icon-theme, libofx, aqbanking, gwenhywfar, libdbi
+, webkitgtk, dconf, hicolor-icon-theme, libofx, aqbanking, gwenhywfar, libdbi
, libdbiDrivers, guile, perl, perlPackages
}:
@@ -36,7 +36,7 @@ stdenv.mkDerivation rec {
buildInputs = [
boost icu libxml2 libxslt gettext swig isocodes gtk3 glibcLocales
- webkit dconf hicolor-icon-theme libofx aqbanking gwenhywfar libdbi
+ webkitgtk dconf hicolor-icon-theme libofx aqbanking gwenhywfar libdbi
libdbiDrivers guile
perlWrapper perl
] ++ (with perlPackages; [ FinanceQuote DateManip ]);
diff --git a/pkgs/applications/office/spice-up/default.nix b/pkgs/applications/office/spice-up/default.nix
index c7e39180ae2..df8276718c5 100644
--- a/pkgs/applications/office/spice-up/default.nix
+++ b/pkgs/applications/office/spice-up/default.nix
@@ -1,38 +1,35 @@
{ stdenv
, fetchFromGitHub
-, gettext
-, libxml2
-, pkgconfig
-, gtk3
-, gnome3
-, gobject-introspection
-, json-glib
, cmake
+, gdk_pixbuf
+, gtk3
+, gettext
, ninja
+, pantheon
+, pkgconfig
+, json-glib
, libgudev
, libevdev
+, libgee
, libsoup
-, pantheon
, wrapGAppsHook }:
stdenv.mkDerivation rec {
- name = "spice-up-${version}";
- version = "1.7.0";
+ pname = "spice-up";
+ version = "1.8.0";
src = fetchFromGitHub {
owner = "Philip-Scott";
repo = "Spice-up";
rev = version;
- sha256 = "1qb1hlw7g581dmgg5mh832ixjkcgqm3lqzj6xma2cz8wdncwwjaq";
+ sha256 = "0jbqgf936pqss8ha27fcyjbhvkn4ij96b3d87c6gcx90glmq33zb";
};
- USER = "nix-build-user";
+ USER = "pbuilder";
nativeBuildInputs = [
cmake
gettext
- gobject-introspection # For setup hook
- libxml2
ninja
pkgconfig
pantheon.vala
@@ -41,18 +38,19 @@ stdenv.mkDerivation rec {
buildInputs = [
pantheon.elementary-icon-theme
pantheon.granite
- gnome3.libgee
+ gdk_pixbuf
gtk3
json-glib
libevdev
+ libgee
libgudev
libsoup
];
meta = with stdenv.lib; {
- description = "Create simple and beautiful presentations on the Linux desktop";
+ description = "Create simple and beautiful presentations";
homepage = https://github.com/Philip-Scott/Spice-up;
- maintainers = with maintainers; [ samdroid-apps ];
+ maintainers = with maintainers; [ samdroid-apps kjuvi ] ++ pantheon.maintainers;
platforms = platforms.linux;
# The COPYING file has GPLv3; some files have GPLv2+ and some have GPLv3+
license = licenses.gpl3Plus;
diff --git a/pkgs/applications/office/trilium/default.nix b/pkgs/applications/office/trilium/default.nix
index 7ea4de46466..dc9f0b89b2f 100644
--- a/pkgs/applications/office/trilium/default.nix
+++ b/pkgs/applications/office/trilium/default.nix
@@ -13,11 +13,11 @@ let
in stdenv.mkDerivation rec {
name = "trilium-${version}";
- version = "0.29.1";
+ version = "0.30.4";
src = fetchurl {
url = "https://github.com/zadam/trilium/releases/download/v${version}/trilium-linux-x64-${version}.tar.xz";
- sha256 = "1yyd650l628x3kvyn73d5b35sj7ixmdlqkb6h1swdjp0z2n00w4w";
+ sha256 = "1541z56rk329sj7a20llhhmv2f552amj1n3cisvqga4gn2yq3hnm";
};
# Fetch from source repo, no longer included in release.
diff --git a/pkgs/applications/radio/chirp/default.nix b/pkgs/applications/radio/chirp/default.nix
index 4ed278ebd67..72adb38c62e 100644
--- a/pkgs/applications/radio/chirp/default.nix
+++ b/pkgs/applications/radio/chirp/default.nix
@@ -3,11 +3,11 @@
stdenv.mkDerivation rec {
pname = "chirp-daily";
- version = "20190206";
+ version = "20190304";
src = fetchurl {
url = "https://trac.chirp.danplanet.com/chirp_daily/daily-${version}/${pname}-${version}.tar.gz";
- sha256 = "16agynxjl2b6y9ly2fl1imgy51k4fqnzn1w6bah2gnmifssxfny3";
+ sha256 = "1m18f7j0bdimp0fvs5ms02amd5pzis581hqn38y8qffny4y9f6ij";
};
nativeBuildInputs = [ makeWrapper ];
diff --git a/pkgs/applications/radio/fldigi/default.nix b/pkgs/applications/radio/fldigi/default.nix
index ad5b120b788..3d5ca845503 100644
--- a/pkgs/applications/radio/fldigi/default.nix
+++ b/pkgs/applications/radio/fldigi/default.nix
@@ -2,12 +2,12 @@
libsamplerate, libpulseaudio, libXinerama, gettext, pkgconfig, alsaLib }:
stdenv.mkDerivation rec {
- version = "4.1.00";
+ version = "4.1.01";
pname = "fldigi";
src = fetchurl {
url = "mirror://sourceforge/${pname}/${pname}-${version}.tar.gz";
- sha256 = "1hm2n4p3pdd029kizgzwf3zzgsy1m6z83z7rr2kyjhrq2vp5gf0s";
+ sha256 = "1pznq18rv8q7qflpnnk6wvbwfqvhvyx1a77jlp3kzjh19pjaqldy";
};
buildInputs = [ libXinerama gettext hamlib fltk13 libjpeg libpng portaudio
diff --git a/pkgs/applications/radio/gnuradio/limesdr.nix b/pkgs/applications/radio/gnuradio/limesdr.nix
index 0a5d4f56d27..45e416a6c94 100644
--- a/pkgs/applications/radio/gnuradio/limesdr.nix
+++ b/pkgs/applications/radio/gnuradio/limesdr.nix
@@ -1,4 +1,4 @@
-{ stdenv, fetchFromGitHub, cmake, boost, gnuradio
+{ stdenv, fetchFromGitHub, cmake, pkgconfig, boost, gnuradio
, pythonSupport ? true, python, swig, limesuite
} :
@@ -19,6 +19,7 @@ in stdenv.mkDerivation rec {
nativeBuildInputs = [
cmake
+ pkgconfig
] ++ stdenv.lib.optionals pythonSupport [ swig ];
buildInputs = [
diff --git a/pkgs/applications/science/astronomy/gildas/default.nix b/pkgs/applications/science/astronomy/gildas/default.nix
index 57cecb3cb4c..186f3f9ca03 100644
--- a/pkgs/applications/science/astronomy/gildas/default.nix
+++ b/pkgs/applications/science/astronomy/gildas/default.nix
@@ -7,8 +7,8 @@ let
in
stdenv.mkDerivation rec {
- srcVersion = "feb19b";
- version = "20190201_b";
+ srcVersion = "mar19a";
+ version = "20190301_a";
name = "gildas-${version}";
src = fetchurl {
@@ -16,7 +16,7 @@ stdenv.mkDerivation rec {
# source code of the previous release to a different directory
urls = [ "http://www.iram.fr/~gildas/dist/gildas-src-${srcVersion}.tar.gz"
"http://www.iram.fr/~gildas/dist/archive/gildas/gildas-src-${srcVersion}.tar.gz" ];
- sha256 = "5b6da12ac869176d7a9a3d6a6620db1dbaa44a4785e2dd59dd1a8c38ea9cab87";
+ sha256 = "98085417b0e9785ae1ab1a75c73b7a8b4c1b2ca2873f9474883f7a945488ceff";
};
enableParallelBuilding = true;
diff --git a/pkgs/applications/science/biology/igv/default.nix b/pkgs/applications/science/biology/igv/default.nix
index 19ba508d758..95dc2b612e2 100644
--- a/pkgs/applications/science/biology/igv/default.nix
+++ b/pkgs/applications/science/biology/igv/default.nix
@@ -2,11 +2,11 @@
stdenv.mkDerivation rec {
name = "igv-${version}";
- version = "2.4.17";
+ version = "2.4.19";
src = fetchurl {
url = "https://data.broadinstitute.org/igv/projects/downloads/2.4/IGV_${version}.zip";
- sha256 = "02zl0r1yhyllh000cad6pjk0ic0xm6l05jzkglsf8wdz17nh15nr";
+ sha256 = "048dgrhxcb854d24kyjkqz12bw04bsv49i5jawb75yzkswwfkb0z";
};
buildInputs = [ unzip jre ];
diff --git a/pkgs/applications/science/biology/star/default.nix b/pkgs/applications/science/biology/star/default.nix
index 4d1d60469f0..eb62a8c331f 100644
--- a/pkgs/applications/science/biology/star/default.nix
+++ b/pkgs/applications/science/biology/star/default.nix
@@ -2,13 +2,13 @@
stdenv.mkDerivation rec {
name = "star-${version}";
- version = "2.7.0a";
+ version = "2.7.0c";
src = fetchFromGitHub {
repo = "STAR";
owner = "alexdobin";
rev = version;
- sha256 = "1yx28gra6gqdx1ps5y8mpdinsn8r0dhsc2m3gcvjfrk71i9yhd6l";
+ sha256 = "0r5jcckr45f71jwhz8xazi1w6kfhszq3y6r7f6zl9963ms1q1gfv";
};
sourceRoot = "source/source";
diff --git a/pkgs/applications/science/electronics/gtkwave/default.nix b/pkgs/applications/science/electronics/gtkwave/default.nix
index e2ac4c4b44c..7d9d7a662f2 100644
--- a/pkgs/applications/science/electronics/gtkwave/default.nix
+++ b/pkgs/applications/science/electronics/gtkwave/default.nix
@@ -2,11 +2,11 @@
stdenv.mkDerivation rec {
name = "gtkwave-${version}";
- version = "3.3.98";
+ version = "3.3.99";
src = fetchurl {
url = "mirror://sourceforge/gtkwave/${name}.tar.gz";
- sha256 = "1xi2b9yck8fagnjhnhhwrhz5rfvrs2h2m6m64m210m5xnfzbp9pg";
+ sha256 = "0lc4y2vizrbxldjk5yw2i4y7pyprjdjqx3iafzjfnin694zp2630";
};
nativeBuildInputs = [ pkgconfig ];
diff --git a/pkgs/applications/science/logic/sad/default.nix b/pkgs/applications/science/logic/sad/default.nix
index 426f1928938..8e94356f376 100644
--- a/pkgs/applications/science/logic/sad/default.nix
+++ b/pkgs/applications/science/logic/sad/default.nix
@@ -1,4 +1,4 @@
-{ stdenv, fetchurl, ghc, spass }:
+{ stdenv, fetchurl, haskell, spass }:
stdenv.mkDerivation {
name = "system-for-automated-deduction-2.3.25";
@@ -6,7 +6,7 @@ stdenv.mkDerivation {
url = "http://nevidal.org/download/sad-2.3-25.tar.gz";
sha256 = "10jd93xgarik7xwys5lq7fx4vqp7c0yg1gfin9cqfch1k1v8ap4b";
};
- buildInputs = [ ghc spass ];
+ buildInputs = [ haskell.compiler.ghc844 spass ];
patches = [
./patch
# Since the LTS 12.0 update, <> is an operator in Prelude, colliding with
diff --git a/pkgs/applications/science/math/form/default.nix b/pkgs/applications/science/math/form/default.nix
index 88f2367e334..23ab2184266 100644
--- a/pkgs/applications/science/math/form/default.nix
+++ b/pkgs/applications/science/math/form/default.nix
@@ -1,13 +1,13 @@
{ stdenv, fetchurl, gmp, zlib }:
stdenv.mkDerivation rec {
- version = "4.2.0";
+ version = "4.2.1";
name = "form-${version}";
# This tarball is released by author, it is not downloaded from tag, so can't use fetchFromGitHub
src = fetchurl {
- url = "https://github.com/vermaseren/form/releases/download/v4.2.0/form-4.2.0.tar.gz";
- sha256 = "19528aphn4hvm151lyyhd7wz0bp2s3rla8jv6s7d8jwfp5ljzysm";
+ url = "https://github.com/vermaseren/form/releases/download/v4.2.1/form-4.2.1.tar.gz";
+ sha256 = "0a0smc10gm85vxd85942n5azy88w5qs5avbqrw0lw0yb9injswpj";
};
buildInputs = [ gmp zlib ];
diff --git a/pkgs/applications/science/math/gmsh/default.nix b/pkgs/applications/science/math/gmsh/default.nix
index 76e5071908f..e3760533eda 100644
--- a/pkgs/applications/science/math/gmsh/default.nix
+++ b/pkgs/applications/science/math/gmsh/default.nix
@@ -1,14 +1,14 @@
{ stdenv, fetchurl, cmake, openblasCompat, gfortran, gmm, fltk, libjpeg
, zlib, libGLU_combined, libGLU, xorg }:
-let version = "4.1.5"; in
+let version = "4.2.1"; in
stdenv.mkDerivation {
name = "gmsh-${version}";
src = fetchurl {
url = "http://gmsh.info/src/gmsh-${version}-source.tgz";
- sha256 = "654d38203f76035a281006b77dcb838987a44fd549287f11c53a1e9cdf598f46";
+ sha256 = "1f11481e68900dc256f88aaed18d03e93b416ba01e9e8c3dc3f6d59a211f0561";
};
buildInputs = [ cmake openblasCompat gmm fltk libjpeg zlib libGLU_combined
diff --git a/pkgs/applications/science/math/maxima/5.41.nix b/pkgs/applications/science/math/maxima/5.41.nix
new file mode 100644
index 00000000000..583391d08dd
--- /dev/null
+++ b/pkgs/applications/science/math/maxima/5.41.nix
@@ -0,0 +1,102 @@
+{ stdenv, fetchurl, fetchpatch, sbcl, texinfo, perl, python, makeWrapper, rlwrap ? null
+, tk ? null, gnuplot ? null, ecl ? null, ecl-fasl ? false
+}:
+
+let
+ name = "maxima";
+ # old version temporarily kept for sage, see discussion at
+ # https://github.com/NixOS/nixpkgs/commit/82254747af35f3e0e0d6f78023ded3a81e25331b
+ version = "5.41.0";
+
+ searchPath =
+ stdenv.lib.makeBinPath
+ (stdenv.lib.filter (x: x != null) [ sbcl ecl rlwrap tk gnuplot ]);
+in
+stdenv.mkDerivation ({
+ inherit version;
+ name = "${name}-${version}";
+
+ src = fetchurl {
+ url = "mirror://sourceforge/${name}/${name}-${version}.tar.gz";
+ sha256 = "0x0n81z0s4pl8nwpf7ivlsbvsdphm9w42250g7qdkizl0132by6s";
+ };
+
+ buildInputs = stdenv.lib.filter (x: x != null) [
+ sbcl ecl texinfo perl python makeWrapper
+ ];
+
+ postInstall = ''
+ # Make sure that maxima can find its runtime dependencies.
+ for prog in "$out/bin/"*; do
+ wrapProgram "$prog" --prefix PATH ":" "$out/bin:${searchPath}"
+ done
+ # Move emacs modules and documentation into the right place.
+ mkdir -p $out/share/emacs $out/share/doc
+ ln -s ../maxima/${version}/emacs $out/share/emacs/site-lisp
+ ln -s ../maxima/${version}/doc $out/share/doc/maxima
+ ''
+ + (stdenv.lib.optionalString ecl-fasl ''
+ cp src/binary-ecl/maxima.fas* "$out/lib/maxima/${version}/binary-ecl/"
+ '')
+ ;
+
+ patches = [
+ # fix path to info dir (see https://trac.sagemath.org/ticket/11348)
+ (fetchpatch {
+ url = "https://git.sagemath.org/sage.git/plain/build/pkgs/maxima/patches/infodir.patch?id=07d6c37d18811e2b377a9689790a7c5e24da16ba";
+ sha256 = "09v64n60f7i6frzryrj0zd056lvdpms3ajky4f9p6kankhbiv21x";
+ })
+
+ # fix https://sourceforge.net/p/maxima/bugs/2596/
+ (fetchpatch {
+ url = "https://git.sagemath.org/sage.git/plain/build/pkgs/maxima/patches/matrixexp.patch?id=07d6c37d18811e2b377a9689790a7c5e24da16ba";
+ sha256 = "06961hn66rhjijfvyym21h39wk98sfxhp051da6gz0n9byhwc6zg";
+ })
+
+ # undo https://sourceforge.net/p/maxima/code/ci/f5e9b0f7eb122c4e48ea9df144dd57221e5ea0ca, see see https://trac.sagemath.org/ticket/13364#comment:93
+ (fetchpatch {
+ url = "https://git.sagemath.org/sage.git/plain/build/pkgs/maxima/patches/undoing_true_false_printing_patch.patch?id=07d6c37d18811e2b377a9689790a7c5e24da16ba";
+ sha256 = "0fvi3rcjv6743sqsbgdzazy9jb6r1p1yq63zyj9fx42wd1hgf7yx";
+ })
+
+ # upstream bug https://sourceforge.net/p/maxima/bugs/2520/ (not fixed)
+ # introduced in https://trac.sagemath.org/ticket/13364
+ (fetchpatch {
+ url = "https://git.sagemath.org/sage.git/plain/build/pkgs/maxima/patches/0001-taylor2-Avoid-blowing-the-stack-when-diff-expand-isn.patch?id=07d6c37d18811e2b377a9689790a7c5e24da16ba";
+ sha256 = "0xa0b6cr458zp7lc7qi0flv5ar0r3ivsqhjl0c3clv86di2y522d";
+ })
+ ] ++ stdenv.lib.optionals ecl-fasl [
+ # build fasl, needed for ECL support
+ (fetchpatch {
+ url = "https://git.sagemath.org/sage.git/plain/build/pkgs/maxima/patches/maxima.system.patch?id=07d6c37d18811e2b377a9689790a7c5e24da16ba";
+ sha256 = "18zafig8vflhkr80jq2ivk46k92dkszqlyq8cfmj0b2vcfjwwbar";
+ })
+ # There are some transient test failures. I hope this disables all those tests.
+ # If those test failures ever happen in the non-ecl version, that should be
+ # reportetd upstream.
+ ./known-ecl-failures.patch
+ ];
+
+ # Failures in the regression test suite won't abort the build process. We run
+ # the suite only so that potential errors show up in the build log. See also:
+ # https://sourceforge.net/tracker/?func=detail&aid=3365831&group_id=4933&atid=104933.
+ doCheck = true;
+
+ enableParallelBuilding = true;
+
+ meta = {
+ description = "Computer algebra system";
+ homepage = http://maxima.sourceforge.net;
+ license = stdenv.lib.licenses.gpl2;
+
+ longDescription = ''
+ Maxima is a fairly complete computer algebra system written in
+ lisp with an emphasis on symbolic computation. It is based on
+ DOE-MACSYMA and licensed under the GPL. Its abilities include
+ symbolic integration, 3D plotting, and an ODE solver.
+ '';
+
+ platforms = stdenv.lib.platforms.unix;
+ maintainers = [ stdenv.lib.maintainers.peti ];
+ };
+})
diff --git a/pkgs/applications/science/math/maxima/default.nix b/pkgs/applications/science/math/maxima/default.nix
index 9f6e281849d..5843f38a74a 100644
--- a/pkgs/applications/science/math/maxima/default.nix
+++ b/pkgs/applications/science/math/maxima/default.nix
@@ -4,7 +4,7 @@
let
name = "maxima";
- version = "5.41.0";
+ version = "5.42.2";
searchPath =
stdenv.lib.makeBinPath
@@ -16,11 +16,12 @@ stdenv.mkDerivation ({
src = fetchurl {
url = "mirror://sourceforge/${name}/${name}-${version}.tar.gz";
- sha256 = "0x0n81z0s4pl8nwpf7ivlsbvsdphm9w42250g7qdkizl0132by6s";
+ sha256 = "0kdncy6137sg3rradirxzj10mkcvafxd892zlclwhr9sa7b12zhn";
};
buildInputs = stdenv.lib.filter (x: x != null) [
sbcl ecl texinfo perl python makeWrapper
+ gnuplot # required in the test suite
];
postInstall = ''
@@ -69,16 +70,19 @@ stdenv.mkDerivation ({
url = "https://git.sagemath.org/sage.git/plain/build/pkgs/maxima/patches/maxima.system.patch?id=07d6c37d18811e2b377a9689790a7c5e24da16ba";
sha256 = "18zafig8vflhkr80jq2ivk46k92dkszqlyq8cfmj0b2vcfjwwbar";
})
- # There are some transient test failures. I hope this disables all those tests.
- # If those test failures ever happen in the non-ecl version, that should be
- # reportetd upstream.
- ./known-ecl-failures.patch
];
- # Failures in the regression test suite won't abort the build process. We run
- # the suite only so that potential errors show up in the build log. See also:
- # https://sourceforge.net/tracker/?func=detail&aid=3365831&group_id=4933&atid=104933.
- doCheck = true;
+ # The test suite is disabled since 5.42.2 because of the following issues:
+ #
+ # Errors found in /build/maxima-5.42.2/share/linearalgebra/rtest_matrixexp.mac, problems:
+ # (20 21 22)
+ # Error found in rtest_arag, problem:
+ # (error break)
+ # 3 tests failed out of 3,881 total tests.
+ #
+ # These failures don't look serious. It would be nice to fix them, but I
+ # don't know how and probably won't have the time to find out.
+ doCheck = false; # try to re-enable after next version update
enableParallelBuilding = true;
diff --git a/pkgs/applications/science/math/pari/default.nix b/pkgs/applications/science/math/pari/default.nix
index 32e4d81acec..72827112c50 100644
--- a/pkgs/applications/science/math/pari/default.nix
+++ b/pkgs/applications/science/math/pari/default.nix
@@ -1,20 +1,37 @@
-{ stdenv, fetchurl
-, gmp, readline, libX11, tex, perl
+{ stdenv
+, fetchurl
+, fetchpatch
+, gmp
+, readline
+, libX11
+, tex
+, perl
, withThread ? true, libpthreadstubs
}:
assert withThread -> libpthreadstubs != null;
stdenv.mkDerivation rec {
-
- name = "pari-${version}";
+ pname = "pari";
version = "2.11.1";
src = fetchurl {
- url = "https://pari.math.u-bordeaux.fr/pub/pari/unix/${name}.tar.gz";
+ url = "https://pari.math.u-bordeaux.fr/pub/pari/unix/${pname}-${version}.tar.gz";
sha256 = "1jfax92jpydjd02fwl30r6b8kfzqqd6sm4yx94gidyz9lqjb7a94";
};
+ patches = [
+ # Fix a off-by-one bug that can potentially lead to segfaults (accepted upstream)
+ # https://pari.math.u-bordeaux.fr/cgi-bin/bugreport.cgi?bug=2117
+ # https://trac.sagemath.org/ticket/27335
+ (fetchpatch {
+ name = "fix-off-by-one-error.patch";
+ # only relevant parts of https://pari.math.u-bordeaux.fr/cgi-bin/gitweb.cgi?p=pari.git;a=patch;h=aa1ee6e0898d177e6bcf49237d82c804bc410985
+ url = "https://git.sagemath.org/sage.git/plain/build/pkgs/pari/patches/red_montgomery.patch?id=bbea55c96e1f05302b3c7f593cf64492497047c5";
+ sha256 = "0vqkmhgv9splsdswp6zjnkj50z76rc1m6k9iy3cf9dxwqw3h3nr6";
+ })
+ ];
+
buildInputs = [
gmp
readline
@@ -70,7 +87,7 @@ stdenv.mkDerivation rec {
homepage = http://pari.math.u-bordeaux.fr;
downloadPage = http://pari.math.u-bordeaux.fr/download.html;
license = licenses.gpl2Plus;
- maintainers = with maintainers; [ ertes raskin AndersonTorres ];
+ maintainers = with maintainers; [ ertes raskin AndersonTorres timokau ];
platforms = platforms.linux ++ platforms.darwin;
updateWalker = true;
};
diff --git a/pkgs/applications/science/math/sage/default.nix b/pkgs/applications/science/math/sage/default.nix
index ddb22bcb1ef..92ec32d5cc5 100644
--- a/pkgs/applications/science/math/sage/default.nix
+++ b/pkgs/applications/science/math/sage/default.nix
@@ -60,7 +60,7 @@ let
# the files its looking fore are located. Also see `sage-env`.
env-locations = callPackage ./env-locations.nix {
inherit pari_data ecl;
- inherit singular;
+ inherit singular maxima-ecl;
cysignals = python.pkgs.cysignals;
three = nodePackages.three;
mathjax = nodePackages.mathjax;
@@ -71,21 +71,21 @@ let
sage-env = callPackage ./sage-env.nix {
sagelib = python.pkgs.sagelib;
inherit env-locations;
- inherit python ecl singular palp flint pynac pythonEnv;
+ inherit python ecl singular palp flint pynac pythonEnv maxima-ecl;
pkg-config = pkgs.pkgconfig; # not to confuse with pythonPackages.pkgconfig
};
# The documentation for sage, building it takes a lot of ram.
sagedoc = callPackage ./sagedoc.nix {
inherit sage-with-env;
- inherit python;
+ inherit python maxima-ecl;
};
# sagelib with added wrappers and a dependency on sage-tests to make sure thet tests were run.
sage-with-env = callPackage ./sage-with-env.nix {
inherit pythonEnv;
inherit sage-env;
- inherit pynac singular;
+ inherit pynac singular maxima-ecl;
pkg-config = pkgs.pkgconfig; # not to confuse with pythonPackages.pkgconfig
three = nodePackages.three;
};
@@ -129,6 +129,9 @@ let
singular = pkgs.singular.override { inherit flint; };
+ # https://trac.sagemath.org/ticket/26625
+ maxima-ecl = pkgs.maxima-ecl-5_41;
+
# *not* to confuse with the python package "pynac"
pynac = pkgs.pynac.override { inherit singular flint; };
diff --git a/pkgs/applications/science/math/sage/patches/ignore-pip-deprecation.patch b/pkgs/applications/science/math/sage/patches/ignore-pip-deprecation.patch
new file mode 100644
index 00000000000..95b377dc955
--- /dev/null
+++ b/pkgs/applications/science/math/sage/patches/ignore-pip-deprecation.patch
@@ -0,0 +1,22 @@
+diff --git a/src/sage/misc/package.py b/src/sage/misc/package.py
+index 689e5a23b9..4e16fe3a8d 100644
+--- a/src/sage/misc/package.py
++++ b/src/sage/misc/package.py
+@@ -142,9 +142,14 @@ def pip_installed_packages():
+ sage: d['beautifulsoup'] # optional - beautifulsoup
+ u'...'
+ """
+- proc = subprocess.Popen(["pip", "list", "--no-index", "--format", "json"], stdout=subprocess.PIPE)
+- stdout = proc.communicate()[0].decode()
+- return {package['name'].lower():package['version'] for package in json.loads(stdout)}
++ with open(os.devnull, 'w') as devnull:
++ proc = subprocess.Popen(
++ ["pip", "list", "--no-index", "--format", "json"],
++ stdout=subprocess.PIPE,
++ stderr=devnull,
++ )
++ stdout = proc.communicate()[0].decode()
++ return {package['name'].lower():package['version'] for package in json.loads(stdout)}
+
+ def list_packages(*pkg_types, **opts):
+ r"""
diff --git a/pkgs/applications/science/math/sage/sage-src.nix b/pkgs/applications/science/math/sage/sage-src.nix
index 7302b5e337d..83459021687 100644
--- a/pkgs/applications/science/math/sage/sage-src.nix
+++ b/pkgs/applications/science/math/sage/sage-src.nix
@@ -112,6 +112,9 @@ stdenv.mkDerivation rec {
url = "https://git.sagemath.org/sage.git/patch?id=a05b6b038e1571ab15464e98f76d1927c0c3fd12";
sha256 = "05yq97pq84xi60wb1p9skrad5h5x770gq98ll4frr7hvvmlwsf58";
})
+
+ # https://trac.sagemath.org/ticket/27405
+ ./patches/ignore-pip-deprecation.patch
];
patches = nixPatches ++ packageUpgradePatches;
diff --git a/pkgs/applications/science/math/sage/sagelib.nix b/pkgs/applications/science/math/sage/sagelib.nix
index 814eef9560e..d7f9cb9ee32 100644
--- a/pkgs/applications/science/math/sage/sagelib.nix
+++ b/pkgs/applications/science/math/sage/sagelib.nix
@@ -65,11 +65,13 @@ buildPythonPackage rec {
perl
jupyter_core
pkg-config
+ pip # needed to query installed packages
];
buildInputs = [
gd
readline
+ iml
];
propagatedBuildInputs = [
diff --git a/pkgs/applications/science/math/wxmaxima/default.nix b/pkgs/applications/science/math/wxmaxima/default.nix
index d9de12d4576..13ccd70c83f 100644
--- a/pkgs/applications/science/math/wxmaxima/default.nix
+++ b/pkgs/applications/science/math/wxmaxima/default.nix
@@ -4,7 +4,7 @@
stdenv.mkDerivation rec {
name = "wxmaxima-${version}";
- version = "18.02.0";
+ version = "19.03.0";
src = fetchFromGitHub {
owner = "andrejv";
@@ -26,7 +26,7 @@ stdenv.mkDerivation rec {
meta = with stdenv.lib; {
description = "Cross platform GUI for the computer algebra system Maxima";
license = licenses.gpl2;
- homepage = http://wxmaxima.sourceforge.net;
+ homepage = https://wxmaxima-developers.github.io/wxmaxima/;
platforms = platforms.linux;
maintainers = [ maintainers.peti ];
};
diff --git a/pkgs/applications/science/misc/openmodelica/default.nix b/pkgs/applications/science/misc/openmodelica/default.nix
index 9e9a10a011e..1a1ae3df942 100644
--- a/pkgs/applications/science/misc/openmodelica/default.nix
+++ b/pkgs/applications/science/misc/openmodelica/default.nix
@@ -1,5 +1,5 @@
{stdenv, fetchgit, fetchsvn, autoconf, automake, libtool, gfortran, clang, cmake, gnumake,
-hwloc, jre, liblapack, blas, hdf5, expat, ncurses, readline, qt4, webkit, which,
+hwloc, jre, liblapack, blas, hdf5, expat, ncurses, readline, qt4, webkitgtk, which,
lp_solve, omniorb, sqlite, libatomic_ops, pkgconfig, file, gettext, flex, bison,
doxygen, boost, openscenegraph, gnome2, pangox_compat, xorg, git, bash, gtk2, makeWrapper }:
@@ -15,7 +15,7 @@ stdenv.mkDerivation {
src = fetchgit (import ./src-main.nix);
buildInputs = [autoconf cmake automake libtool gfortran clang gnumake
- hwloc jre liblapack blas hdf5 expat ncurses readline qt4 webkit which
+ hwloc jre liblapack blas hdf5 expat ncurses readline qt4 webkitgtk which
lp_solve omniorb sqlite libatomic_ops pkgconfig file gettext flex bison
doxygen boost openscenegraph gnome2.gtkglext pangox_compat xorg.libXmu
git gtk2 makeWrapper];
diff --git a/pkgs/applications/science/misc/simgrid/default.nix b/pkgs/applications/science/misc/simgrid/default.nix
index 258073e4080..0b663b2fb63 100644
--- a/pkgs/applications/science/misc/simgrid/default.nix
+++ b/pkgs/applications/science/misc/simgrid/default.nix
@@ -104,7 +104,7 @@ stdenv.mkDerivation rec {
scheduling on distributed computing platforms ranging from simple
network of workstations to Computational Grids.
'';
- homepage = http://simgrid.gforge.inria.fr/;
+ homepage = https://simgrid.org/;
license = licenses.lgpl2Plus;
maintainers = with maintainers; [ mickours ];
platforms = ["x86_64-linux"];
diff --git a/pkgs/applications/version-management/git-and-tools/git-secrets/default.nix b/pkgs/applications/version-management/git-and-tools/git-secrets/default.nix
index fb85bb7da46..211685c8edb 100644
--- a/pkgs/applications/version-management/git-and-tools/git-secrets/default.nix
+++ b/pkgs/applications/version-management/git-and-tools/git-secrets/default.nix
@@ -2,13 +2,13 @@
stdenv.mkDerivation rec {
name = "git-secrets-${version}";
- version = "1.2.1";
+ version = "1.3.0";
src = fetchFromGitHub {
owner = "awslabs";
repo = "git-secrets";
rev = "${version}";
- sha256 = "14jsm4ks3k5d9iq3jr23829izw040pqpmv7dz8fhmvx6qz8fybzg";
+ sha256 = "10lnxg0q855zi3d6804ivlrn6dc817kilzdh05mmz8a0ccvm2qc7";
};
nativeBuildInputs = [ makeWrapper ];
diff --git a/pkgs/applications/version-management/git-and-tools/gita/default.nix b/pkgs/applications/version-management/git-and-tools/gita/default.nix
index 6979a47cdfc..899f33218a1 100644
--- a/pkgs/applications/version-management/git-and-tools/gita/default.nix
+++ b/pkgs/applications/version-management/git-and-tools/gita/default.nix
@@ -1,12 +1,12 @@
{ lib, python3Packages }:
python3Packages.buildPythonApplication rec {
- version = "0.7.3";
+ version = "0.8.2";
pname = "gita";
src = python3Packages.fetchPypi {
inherit pname version;
- sha256 = "0ccqjf288513im7cvafiw4ypbp9s3z0avyzd4jzr13m38jrsss3r";
+ sha256 = "16jpnl323x86dkrnh4acyvi9jknhgi3r0ccv63rkjcmd0srkaxkk";
};
propagatedBuildInputs = with python3Packages; [
diff --git a/pkgs/applications/version-management/gitea/default.nix b/pkgs/applications/version-management/gitea/default.nix
index 54b7272b0d4..6f72b2e1775 100644
--- a/pkgs/applications/version-management/gitea/default.nix
+++ b/pkgs/applications/version-management/gitea/default.nix
@@ -1,6 +1,7 @@
{ stdenv, buildGoPackage, fetchFromGitHub, makeWrapper
-, git, bash, gzip, openssh
+, git, bash, gzip, openssh, pam
, sqliteSupport ? true
+, pamSupport ? true
}:
with stdenv.lib;
@@ -31,9 +32,11 @@ buildGoPackage rec {
substituteInPlace modules/setting/setting.go --subst-var data
'';
- nativeBuildInputs = [ makeWrapper ];
+ nativeBuildInputs = [ makeWrapper ]
+ ++ optional pamSupport pam;
- buildFlags = optional sqliteSupport "-tags sqlite";
+ buildFlags = optional sqliteSupport "-tags sqlite"
+ ++ optional pamSupport "-tags pam";
buildFlagsArray = ''
-ldflags=
-X=main.Version=${version}
diff --git a/pkgs/applications/version-management/gitlab/gitlab-shell/default.nix b/pkgs/applications/version-management/gitlab/gitlab-shell/default.nix
index 895e1e13bec..b9423ccb328 100644
--- a/pkgs/applications/version-management/gitlab/gitlab-shell/default.nix
+++ b/pkgs/applications/version-management/gitlab/gitlab-shell/default.nix
@@ -13,6 +13,8 @@ stdenv.mkDerivation rec {
buildInputs = [ ruby bundler go ];
+ GOCACHE="$TMPDIR/go-cache";
+
patches = [ ./remove-hardcoded-locations.patch ];
installPhase = ''
diff --git a/pkgs/applications/version-management/gitlab/gitlab-workhorse/default.nix b/pkgs/applications/version-management/gitlab/gitlab-workhorse/default.nix
index ad3b11f3b2c..c49bbe9ccef 100644
--- a/pkgs/applications/version-management/gitlab/gitlab-workhorse/default.nix
+++ b/pkgs/applications/version-management/gitlab/gitlab-workhorse/default.nix
@@ -14,7 +14,7 @@ stdenv.mkDerivation rec {
buildInputs = [ git go ];
- makeFlags = [ "PREFIX=$(out)" "VERSION=${version}" ];
+ makeFlags = [ "PREFIX=$(out)" "VERSION=${version}" "GOCACHE=$(TMPDIR)/go-cache" ];
meta = with stdenv.lib; {
homepage = http://www.gitlab.com/;
diff --git a/pkgs/applications/version-management/gogs/default.nix b/pkgs/applications/version-management/gogs/default.nix
index 56e41136896..238540a1c98 100644
--- a/pkgs/applications/version-management/gogs/default.nix
+++ b/pkgs/applications/version-management/gogs/default.nix
@@ -1,19 +1,20 @@
{ stdenv, buildGoPackage, fetchFromGitHub, makeWrapper
-, git, bash, gzip, openssh
+, git, bash, gzip, openssh, pam
, sqliteSupport ? true
+, pamSupport ? true
}:
with stdenv.lib;
buildGoPackage rec {
name = "gogs-${version}";
- version = "0.11.66";
+ version = "0.11.86";
src = fetchFromGitHub {
owner = "gogs";
repo = "gogs";
rev = "v${version}";
- sha256 = "1b9ilk4xlsllsj5pzmxwsz4a1zvgd06a8mi9ni9hbvmfl3w8xf28";
+ sha256 = "0l8mwy0cyy3cdxqinf8ydb35kf7c8pj09xrhpr7rr7lldnvczabw";
};
patches = [ ./static-root-path.patch ];
@@ -23,9 +24,11 @@ buildGoPackage rec {
substituteInPlace pkg/setting/setting.go --subst-var data
'';
- nativeBuildInputs = [ makeWrapper ];
+ nativeBuildInputs = [ makeWrapper ]
+ ++ optional pamSupport pam;
- buildFlags = optionalString sqliteSupport "-tags sqlite";
+ buildFlags = optional sqliteSupport "-tags sqlite"
+ ++ optional pamSupport "-tags pam";
outputs = [ "bin" "out" "data" ];
diff --git a/pkgs/applications/video/clipgrab/default.nix b/pkgs/applications/video/clipgrab/default.nix
index 3937244f25b..a94bb7ade33 100644
--- a/pkgs/applications/video/clipgrab/default.nix
+++ b/pkgs/applications/video/clipgrab/default.nix
@@ -1,17 +1,20 @@
-{ stdenv, fetchurl, makeDesktopItem, ffmpeg, qt4, qmake4Hook }:
+{ stdenv, fetchurl, makeDesktopItem, ffmpeg
+, qmake, qttools
+, qtbase, qtdeclarative, qtlocation, qtquickcontrols2, qtwebchannel, qtwebengine
+}:
stdenv.mkDerivation rec {
name = "clipgrab-${version}";
- version = "3.7.2";
+ version = "3.8.2";
src = fetchurl {
- sha256 = "1xkap4zgx8k0h0qfcqfwi3lj7s3mqsj0dp1cddiqmxbibbmg3rcc";
+ sha256 = "0dhiv1mldp5f555im6mkjxdh6iivn1hnx2xdaqa6wxzsrwrvv5dd";
# The .tar.bz2 "Download" link is a binary blob, the source is the .tar.gz!
url = "https://download.clipgrab.org/${name}.tar.gz";
};
- buildInputs = [ ffmpeg qt4 ];
- nativeBuildInputs = [ qmake4Hook ];
+ buildInputs = [ ffmpeg qtbase qtdeclarative qtlocation qtquickcontrols2 qtwebchannel qtwebengine ];
+ nativeBuildInputs = [ qmake qttools ];
postPatch = stdenv.lib.optionalString (ffmpeg != null) ''
substituteInPlace converter_ffmpeg.cpp \
diff --git a/pkgs/applications/video/shotcut/default.nix b/pkgs/applications/video/shotcut/default.nix
index bbb11c49766..27a0fa3388e 100644
--- a/pkgs/applications/video/shotcut/default.nix
+++ b/pkgs/applications/video/shotcut/default.nix
@@ -8,13 +8,13 @@ assert stdenv.lib.versionAtLeast mlt.version "6.8.0";
stdenv.mkDerivation rec {
name = "shotcut-${version}";
- version = "18.12.23";
+ version = "19.02.28";
src = fetchFromGitHub {
owner = "mltframework";
repo = "shotcut";
rev = "v${version}";
- sha256 = "1i6gkqvg31q7g5s3zgqzg4i5kyas7k4svclgbk459i5h1ar3v5vn";
+ sha256 = "14l0cm81jy7syi08d8dg4nzp7s9zji9cycnf2mvh7zc7x069d1jr";
};
enableParallelBuilding = true;
diff --git a/pkgs/applications/video/streamlink/default.nix b/pkgs/applications/video/streamlink/default.nix
index dbf22aa9f8e..4cc0890a847 100644
--- a/pkgs/applications/video/streamlink/default.nix
+++ b/pkgs/applications/video/streamlink/default.nix
@@ -1,14 +1,14 @@
{ stdenv, pythonPackages, fetchFromGitHub, rtmpdump, ffmpeg }:
pythonPackages.buildPythonApplication rec {
- version = "0.14.2";
+ version = "1.0.0";
name = "streamlink-${version}";
src = fetchFromGitHub {
owner = "streamlink";
repo = "streamlink";
rev = "${version}";
- sha256 = "1njwfy1h8a9n5z6crrfnknlw4ys0bap2jam6ga6njgkd10aly9qr";
+ sha256 = "12x8gnp6lv3vi1z2wfb0vjim2wm6abpr938yy48kqj7qff385ihd";
};
checkInputs = with pythonPackages; [ pytest mock requests-mock freezegun ];
diff --git a/pkgs/applications/virtualization/containerd/default.nix b/pkgs/applications/virtualization/containerd/default.nix
index 94b21a77a70..b0f60fd8b87 100644
--- a/pkgs/applications/virtualization/containerd/default.nix
+++ b/pkgs/applications/virtualization/containerd/default.nix
@@ -4,13 +4,13 @@ with lib;
buildGoPackage rec {
name = "containerd-${version}";
- version = "1.2.2";
+ version = "1.2.4";
src = fetchFromGitHub {
owner = "containerd";
repo = "containerd";
rev = "v${version}";
- sha256 = "065snv0s3v3z0ghadlii4w78qnhchcbx2kfdrvm8fk8gb4pkx1ya";
+ sha256 = "1rw7f0y3iv0mapxid1rgpns80dcy8nhgmxmw27x8qzrzic5viivy";
};
goPackagePath = "github.com/containerd/containerd";
diff --git a/pkgs/applications/virtualization/docker/default.nix b/pkgs/applications/virtualization/docker/default.nix
index e7c8a302c27..d4ba9568fed 100644
--- a/pkgs/applications/virtualization/docker/default.nix
+++ b/pkgs/applications/virtualization/docker/default.nix
@@ -100,6 +100,7 @@ rec {
export AUTO_GOPATH=1
export DOCKER_GITCOMMIT="${rev}"
export VERSION="${version}"
+ export GOCACHE="$TMPDIR/go-cache"
./hack/make.sh dynbinary
cd -
'') + ''
diff --git a/pkgs/applications/virtualization/podman/conmon.nix b/pkgs/applications/virtualization/podman/conmon.nix
index 42907bc84ba..6089aa7f69c 100644
--- a/pkgs/applications/virtualization/podman/conmon.nix
+++ b/pkgs/applications/virtualization/podman/conmon.nix
@@ -4,13 +4,13 @@ with lib;
stdenv.mkDerivation rec {
name = "conmon-${version}";
- version = "unstable-2018-11-28";
- rev = "8fba206232c249a8fc4e2fac1469fb2fddbf5cf7";
+ version = "unstable-2019-02-15";
+ rev = "cc2b49590a485da9bd358440f92f219dfd6b230f";
src = fetchFromGitHub {
owner = "containers";
repo = "conmon";
- sha256 = "07ar0dk9i072b14f6il51yqahxp5c4fkf5jzar8rxcpvymkdy8zq";
+ sha256 = "13f5as4a9y6nkmr7cg0n27c2hfx9pkr75fxq2m0hlpcwhaardbm7";
inherit rev;
};
diff --git a/pkgs/applications/virtualization/podman/default.nix b/pkgs/applications/virtualization/podman/default.nix
index 7fc74de1d2e..e50803db4e3 100644
--- a/pkgs/applications/virtualization/podman/default.nix
+++ b/pkgs/applications/virtualization/podman/default.nix
@@ -5,13 +5,13 @@
buildGoPackage rec {
name = "podman-${version}";
- version = "1.0.0";
+ version = "1.1.2";
src = fetchFromGitHub {
owner = "containers";
repo = "libpod";
rev = "v${version}";
- sha256 = "1py6vbmpm25j1gb51dn973pckvgjl9q63y9qyzszvc3q3wsxsqhw";
+ sha256 = "180sv1a7k3866ilb0mxbhiysms9xy4v6xbpy4in6ch8m8qym9amh";
};
goPackagePath = "github.com/containers/libpod";
diff --git a/pkgs/applications/virtualization/rkt/default.nix b/pkgs/applications/virtualization/rkt/default.nix
index 777dc6fe930..42aad06d0c0 100644
--- a/pkgs/applications/virtualization/rkt/default.nix
+++ b/pkgs/applications/virtualization/rkt/default.nix
@@ -48,6 +48,7 @@ in stdenv.mkDerivation rec {
preBuild = ''
export BUILDDIR
+ export GOCACHE="$TMPDIR/go-cache"
'';
installPhase = ''
diff --git a/pkgs/applications/virtualization/x11docker/default.nix b/pkgs/applications/virtualization/x11docker/default.nix
index 8e248061cd5..94682893d51 100644
--- a/pkgs/applications/virtualization/x11docker/default.nix
+++ b/pkgs/applications/virtualization/x11docker/default.nix
@@ -1,12 +1,12 @@
{ stdenv, fetchFromGitHub, makeWrapper, nx-libs, xorg }:
stdenv.mkDerivation rec {
name = "x11docker-${version}";
- version = "5.4.1";
+ version = "5.4.4";
src = fetchFromGitHub {
owner = "mviereck";
repo = "x11docker";
rev = "v${version}";
- sha256 = "0fcdr8i3crf4cina41h030q2jf5zvafll97iff129dl3sb27jnvi";
+ sha256 = "1p45dyd1zfjxlawsy190q71hwl083f90ryaslslhxsadsi9m64dq";
};
nativeBuildInputs = [ makeWrapper ];
buildInputs = [ nx-libs xorg.xhost xorg.xinit ];
diff --git a/pkgs/applications/window-managers/sway/beta.nix b/pkgs/applications/window-managers/sway/beta.nix
index a887016782e..83c8e9328ca 100644
--- a/pkgs/applications/window-managers/sway/beta.nix
+++ b/pkgs/applications/window-managers/sway/beta.nix
@@ -10,13 +10,13 @@
stdenv.mkDerivation rec {
name = "${pname}-${version}";
pname = "sway";
- version = "1.0-rc4";
+ version = "1.0-rc5";
src = fetchFromGitHub {
owner = "swaywm";
repo = "sway";
rev = version;
- sha256 = "1f0mvf48dvsivdd850r1gd2h90cbn62qflwiff6x2addn868bvxa";
+ sha256 = "1jkacibmxy9rpq5mxnq7bkwcy0c592zk4vf20j5qbbljp9h7c87i";
};
postPatch = ''
diff --git a/pkgs/build-support/docker/default.nix b/pkgs/build-support/docker/default.nix
index 011ff368509..8d47f157013 100644
--- a/pkgs/build-support/docker/default.nix
+++ b/pkgs/build-support/docker/default.nix
@@ -77,6 +77,7 @@ rec {
cp ${./tarsum.go} tarsum.go
export GOPATH=$(pwd)
+ export GOCACHE="$TMPDIR/go-cache"
mkdir -p src/github.com/docker/docker/pkg
ln -sT ${docker.src}/components/engine/pkg/tarsum src/github.com/docker/docker/pkg/tarsum
go build
diff --git a/pkgs/build-support/docker/examples.nix b/pkgs/build-support/docker/examples.nix
index d78e35c5662..8a1b35f02d9 100644
--- a/pkgs/build-support/docker/examples.nix
+++ b/pkgs/build-support/docker/examples.nix
@@ -87,9 +87,9 @@ rec {
# 4. example of pulling an image. could be used as a base for other images
nixFromDockerHub = pullImage {
imageName = "nixos/nix";
- imageDigest = "sha256:20d9485b25ecfd89204e843a962c1bd70e9cc6858d65d7f5fadc340246e2116b";
- sha256 = "0mqjy3zq2v6rrhizgb9nvhczl87lcfphq9601wcprdika2jz7qh8";
- finalImageTag = "1.11";
+ imageDigest = "sha256:85299d86263a3059cf19f419f9d286cc9f06d3c13146a8ebbb21b3437f598357";
+ sha256 = "0vnp3mhpk4ny3xa3cgngqsargnmvfgld54d5sn4b5av6yqzzp67z";
+ finalImageTag = "2.2.1";
};
# 5. example of multiple contents, emacs and vi happily coexisting
diff --git a/pkgs/build-support/emacs/wrapper.nix b/pkgs/build-support/emacs/wrapper.nix
index e161daffbd3..dfdd5b60851 100644
--- a/pkgs/build-support/emacs/wrapper.nix
+++ b/pkgs/build-support/emacs/wrapper.nix
@@ -121,21 +121,25 @@ stdenv.mkDerivation {
siteStart="$out/share/emacs/site-lisp/site-start.el"
siteStartByteCompiled="$siteStart"c
+ subdirs="$out/share/emacs/site-lisp/subdirs.el"
+ subdirsByteCompiled="$subdirs"c
- # A dependency may have brought the original siteStart, delete it and
- # create our own
+ # A dependency may have brought the original siteStart or subdirs, delete
+ # it and create our own
# Begin the new site-start.el by loading the original, which sets some
# NixOS-specific paths. Paths are searched in the reverse of the order
# they are specified in, so user and system profile paths are searched last.
- rm -f $siteStart $siteStartByteCompiled
+ rm -f $siteStart $siteStartByteCompiled $subdirs $subdirsByteCompiled
cat >"$siteStart" <&2
+ echo "$scriptName: error: $1" >&2
exit 1
}
-# Usage: update-source-hash [] [] []
-attr=$1
-newVersion=$2
-newHash=$3
-newUrl=$4
-versionKey=$5
+usage() {
+ echo "Usage: $scriptName [] []"
+ echo " [--version-key=] [--system=] [--file=]"
+}
+
+args=()
+
+for arg in "$@"; do
+ case $arg in
+ --system=*)
+ systemArg="--system ${arg#*=}"
+ ;;
+ --version-key=*)
+ versionKey="${arg#*=}"
+ ;;
+ --file=*)
+ nixFile="${arg#*=}"
+ if [ ! -f "$nixFile" ]; then
+ die "Could not find provided file $nixFile"
+ fi
+ ;;
+ --help)
+ usage
+ exit 0
+ ;;
+ --*)
+ echo "$scriptName: Unknown argument: " $arg
+ usage
+ exit 1
+ ;;
+ *)
+ args["${#args[*]}"]=$arg
+ ;;
+ esac
+done
+
+attr=${args[0]}
+newVersion=${args[1]}
+newHash=${args[2]}
+newUrl=${args[3]}
+
+if [ "${#args[*]}" -lt 2 ]; then
+ echo "$scriptName: Too few arguments"
+ usage
+ exit 1
+fi
+
+if [ "${#args[*]}" -gt 4 ]; then
+ echo "$scriptName: Too many arguments"
+ usage
+ exit 1
+fi
if [ -z "$versionKey" ]; then
versionKey=version
fi
-nixFile=$(nix-instantiate --eval --strict -A "$attr.meta.position" | sed -re 's/^"(.*):[0-9]+"$/\1/')
-if [ ! -f "$nixFile" ]; then
- die "Couldn't evaluate '$attr.meta.position' to locate the .nix file!"
+if [ -z "$nixFile" ]; then
+ nixFile=$(nix-instantiate $systemArg --eval --strict -A "$attr.meta.position" | sed -re 's/^"(.*):[0-9]+"$/\1/')
+ if [ ! -f "$nixFile" ]; then
+ die "Couldn't evaluate '$attr.meta.position' to locate the .nix file!"
+ fi
fi
-oldHashAlgo=$(nix-instantiate --eval --strict -A "$attr.src.drvAttrs.outputHashAlgo" | tr -d '"')
-oldHash=$(nix-instantiate --eval --strict -A "$attr.src.drvAttrs.outputHash" | tr -d '"')
+oldHashAlgo=$(nix-instantiate $systemArg --eval --strict -A "$attr.src.drvAttrs.outputHashAlgo" | tr -d '"')
+oldHash=$(nix-instantiate $systemArg --eval --strict -A "$attr.src.drvAttrs.outputHash" | tr -d '"')
if [ -z "$oldHashAlgo" -o -z "$oldHash" ]; then
die "Couldn't evaluate old source hash from '$attr.src'!"
@@ -33,21 +83,21 @@ if [ $(grep -c "$oldHash" "$nixFile") != 1 ]; then
die "Couldn't locate old source hash '$oldHash' (or it appeared more than once) in '$nixFile'!"
fi
-oldUrl=$(nix-instantiate --eval -E "with import ./. {}; builtins.elemAt $attr.src.drvAttrs.urls 0" | tr -d '"')
+oldUrl=$(nix-instantiate $systemArg --eval -E "with import ./. {}; builtins.elemAt $attr.src.drvAttrs.urls 0" | tr -d '"')
if [ -z "$oldUrl" ]; then
die "Couldn't evaluate source url from '$attr.name'!"
fi
-drvName=$(nix-instantiate --eval -E "with import ./. {}; (builtins.parseDrvName $attr.name).name" | tr -d '"')
-oldVersion=$(nix-instantiate --eval -E "with import ./. {}; $attr.version or (builtins.parseDrvName $attr.name).version" | tr -d '"')
+drvName=$(nix-instantiate $systemArg --eval -E "with import ./. {}; (builtins.parseDrvName $attr.name).name" | tr -d '"')
+oldVersion=$(nix-instantiate $systemArg --eval -E "with import ./. {}; $attr.version or (builtins.parseDrvName $attr.name).version" | tr -d '"')
if [ -z "$drvName" -o -z "$oldVersion" ]; then
die "Couldn't evaluate name and version from '$attr.name'!"
fi
if [ "$oldVersion" = "$newVersion" ]; then
- echo "$0: New version same as old version, nothing to do." >&2
+ echo "$scriptName: New version same as old version, nothing to do." >&2
exit 0
fi
@@ -94,7 +144,7 @@ fi
# If new hash not given on the command line, recalculate it ourselves.
if [ -z "$newHash" ]; then
- nix-build --no-out-link -A "$attr.src" 2>"$attr.fetchlog" >/dev/null || true
+ nix-build $systemArg --no-out-link -A "$attr.src" 2>"$attr.fetchlog" >/dev/null || true
# FIXME: use nix-build --hash here once https://github.com/NixOS/nix/issues/1172 is fixed
newHash=$(egrep -v "killing process|dependencies couldn't be built|wanted: " "$attr.fetchlog" | tail -n2 | sed "s~output path .* has .* hash ‘\(.*\)’ when .* was expected\|fixed-output derivation produced path '.*' with .* hash '\(.*\)' instead of the expected hash '.*'\| got: .*:\(.*\)~\1\2\3~" | head -n1)
fi
diff --git a/pkgs/data/documentation/man-pages/default.nix b/pkgs/data/documentation/man-pages/default.nix
index 6d657472e66..280202c2200 100644
--- a/pkgs/data/documentation/man-pages/default.nix
+++ b/pkgs/data/documentation/man-pages/default.nix
@@ -2,11 +2,11 @@
stdenv.mkDerivation rec {
name = "man-pages-${version}";
- version = "4.16";
+ version = "5.00";
src = fetchurl {
url = "mirror://kernel/linux/docs/man-pages/${name}.tar.xz";
- sha256 = "1d2d6llazg3inwjiz22cn46mbm5ydpbyh9qb55z4j3nm4w6wrzs7";
+ sha256 = "006rcqhs4ay9q8wip2kbgk3065gwvfbzrqgv2dsydwvcnwv50bss";
};
makeFlags = [ "MANDIR=$(out)/share/man" ];
diff --git a/pkgs/data/fonts/emojione/default.nix b/pkgs/data/fonts/emojione/default.nix
index 9d4c1e22e14..f466a5b230d 100644
--- a/pkgs/data/fonts/emojione/default.nix
+++ b/pkgs/data/fonts/emojione/default.nix
@@ -2,13 +2,13 @@
stdenv.mkDerivation rec {
name = "emojione-${version}";
- version = "1.3";
+ version = "1.4";
src = fetchFromGitHub {
owner = "eosrei";
repo = "emojione-color-font";
rev = "v${version}";
- sha256 = "0hgs661g1j91lkafhrfx5ix7ymarh5bzcx34r2id6jl7dc3j41l3";
+ sha256 = "1781kxfbhnvylypbkwxc3mx6hi0gcjisfjr9cf0jdz4d1zkf09b3";
};
preBuild = ''
diff --git a/pkgs/data/fonts/unifont/default.nix b/pkgs/data/fonts/unifont/default.nix
index 943eb9572b2..b167a7802d1 100644
--- a/pkgs/data/fonts/unifont/default.nix
+++ b/pkgs/data/fonts/unifont/default.nix
@@ -2,16 +2,16 @@
stdenv.mkDerivation rec {
name = "unifont-${version}";
- version = "11.0.03";
+ version = "12.0.01";
ttf = fetchurl {
url = "mirror://gnu/unifont/${name}/${name}.ttf";
- sha256 = "1fqlf3kczh1y7vhpcdcs1i9043idg5x9jisfqfd99sikvcbw7w75";
+ sha256 = "191vgddv5fksg7g01q692nfcb02ks2y28fi9fv8aghvs36q4iana";
};
pcf = fetchurl {
url = "mirror://gnu/unifont/${name}/${name}.pcf.gz";
- sha256 = "0wqcmvkqdww60hqh245whzh4mx3frrx2712lay826f9h5s4ywz6g";
+ sha256 = "14xbrsdrnllly8h2afan3b4v486vd4y8iff8zqmcfliw0cipm8v4";
};
nativeBuildInputs = [ mkfontscale mkfontdir ];
@@ -30,7 +30,7 @@ stdenv.mkDerivation rec {
outputHashAlgo = "sha256";
outputHashMode = "recursive";
- outputHash = "006jbla4zfwccyy84sm4ck869sq5az5s5cfkcmdgj7ah3rz4d7dn";
+ outputHash = "1jccbz7wyyk7rpyapgsppcgakgpm1l9fqqxs7fg9naav7i0nzzpg";
meta = with stdenv.lib; {
description = "Unicode font for Base Multilingual Plane";
diff --git a/pkgs/data/fonts/unifont_upper/default.nix b/pkgs/data/fonts/unifont_upper/default.nix
index 29ba4bfb540..d94a2cc0242 100644
--- a/pkgs/data/fonts/unifont_upper/default.nix
+++ b/pkgs/data/fonts/unifont_upper/default.nix
@@ -1,15 +1,15 @@
{ stdenv, fetchzip }:
let
- version = "10.0.06";
+ version = "12.0.01";
in fetchzip rec {
name = "unifont_upper-${version}";
- url = "http://unifoundry.com/pub/unifont-${version}/font-builds/${name}.ttf";
+ url = "mirror://gnu/unifont/unifont-${version}/${name}.ttf";
postFetch = "install -Dm644 $downloadedFile $out/share/fonts/truetype/unifont_upper.ttf";
- sha256 = "13x5z8iyh9xz5fllcy89yinnz1iy16a2pjf3vip66nz10sq8crlr";
+ sha256 = "1mmbndyi91fcdj7ykk5y7rypmm5jf2zf5pp5ab8hq3aa9y7invw3";
meta = with stdenv.lib; {
description = "Unicode font for glyphs above the Unicode Basic Multilingual Plane";
diff --git a/pkgs/data/icons/zafiro-icons/default.nix b/pkgs/data/icons/zafiro-icons/default.nix
index b37ed1931a2..455147d7aa7 100644
--- a/pkgs/data/icons/zafiro-icons/default.nix
+++ b/pkgs/data/icons/zafiro-icons/default.nix
@@ -2,13 +2,13 @@
stdenv.mkDerivation rec {
pname = "zafiro-icons";
- version = "0.8.4";
+ version = "0.8.7";
src = fetchFromGitHub {
owner = "zayronxio";
repo = pname;
rev = "v${version}";
- sha256 = "1jdijiccazn2g42x1w1m4hl94ach9b2kl3rwb0mpy7ykdzmj6vj0";
+ sha256 = "09zdaly9g11k6p36xdd7skgl78s6j78hn3gy1jnpsxh0136md89h";
};
nativeBuildInputs = [ gtk3 ];
diff --git a/pkgs/data/misc/hackage/default.nix b/pkgs/data/misc/hackage/default.nix
index b167069cd89..3ec29402b1a 100644
--- a/pkgs/data/misc/hackage/default.nix
+++ b/pkgs/data/misc/hackage/default.nix
@@ -1,6 +1,6 @@
{ fetchurl }:
fetchurl {
- url = "https://github.com/commercialhaskell/all-cabal-hashes/archive/f59e85c25b8e9f07459338884e25d16752839b54.tar.gz";
- sha256 = "0yapmana2kzsixmgghj76w3s546d258rbzw7qmfqhi6bxyhc6a86";
+ url = "https://github.com/commercialhaskell/all-cabal-hashes/archive/179aac2faddbba8921029ca9851ad97bcaa79991.tar.gz";
+ sha256 = "17cbapnvpasdpza2r1y7lf4y4b31k094jqsnx89dn8zwp8n862lv";
}
diff --git a/pkgs/data/misc/osinfo-db/default.nix b/pkgs/data/misc/osinfo-db/default.nix
index d8f5ebf56b9..4e6a5bde55d 100644
--- a/pkgs/data/misc/osinfo-db/default.nix
+++ b/pkgs/data/misc/osinfo-db/default.nix
@@ -1,11 +1,12 @@
{ stdenv, fetchurl, osinfo-db-tools, intltool, libxml2 }:
stdenv.mkDerivation rec {
- name = "osinfo-db-20181214";
+ pname = "osinfo-db";
+ version = "20190301";
src = fetchurl {
- url = "https://releases.pagure.org/libosinfo/${name}.tar.xz";
- sha256 = "18ym54wvhvjk66fqpsfvfd5b7d7743dvfqrcq91w1n71r20fkhcd";
+ url = "https://releases.pagure.org/libosinfo/${pname}-${version}.tar.xz";
+ sha256 = "1rjqizsglgdcjxi7kpbwm26krdkrlxacinjp9684sfzhqwdqi4as";
};
nativeBuildInputs = [ osinfo-db-tools intltool libxml2 ];
diff --git a/pkgs/data/misc/wireless-regdb/default.nix b/pkgs/data/misc/wireless-regdb/default.nix
index b5293c6d341..e44526cbe66 100644
--- a/pkgs/data/misc/wireless-regdb/default.nix
+++ b/pkgs/data/misc/wireless-regdb/default.nix
@@ -1,18 +1,18 @@
{ stdenv, fetchurl }:
stdenv.mkDerivation rec {
- name = "wireless-regdb-${version}";
- version = "2018.10.24";
+ pname = "wireless-regdb";
+ version = "2019.03.01";
src = fetchurl {
- url = "https://www.kernel.org/pub/software/network/wireless-regdb/${name}.tar.xz";
- sha256 = "05lixkdzy7f3wpan6svh1n9f70rs0kfw6hl6p34sl8bxqxd88ghd";
+ url = "https://www.kernel.org/pub/software/network/${pname}/${pname}-${version}.tar.xz";
+ sha256 = "0pwipig8bik1gca440hfv0xa23bi49jfiqc69xvcb6sr0rq6ykis";
};
dontBuild = true;
makeFlags = [
- "DESTDIR=$(out)"
+ "DESTDIR=${placeholder "out"}"
"PREFIX="
];
diff --git a/pkgs/data/themes/plata/default.nix b/pkgs/data/themes/plata/default.nix
index 79e573087a4..de15034590d 100644
--- a/pkgs/data/themes/plata/default.nix
+++ b/pkgs/data/themes/plata/default.nix
@@ -18,13 +18,13 @@
stdenv.mkDerivation rec {
name = "plata-theme-${version}";
- version = "0.5.0";
+ version = "0.6.0";
src = fetchFromGitLab {
owner = "tista500";
repo = "plata-theme";
rev = version;
- sha256 = "16kpdil2bmapbd0g2znwz4ddplykzabydw6g2i8wxs9c5r1hx0q5";
+ sha256 = "182i2wbviwpdvmkmayyqggjx6fvlpf4vsmhsyi6nlg9m4n1djxp8";
};
preferLocalBuild = true;
diff --git a/pkgs/desktops/deepin/dde-api/default.nix b/pkgs/desktops/deepin/dde-api/default.nix
index c1321acb853..6e61a30e258 100644
--- a/pkgs/desktops/deepin/dde-api/default.nix
+++ b/pkgs/desktops/deepin/dde-api/default.nix
@@ -44,6 +44,7 @@ buildGoPackage rec {
'';
buildPhase = ''
+ export GOCACHE="$TMPDIR/go-cache";
make -C go/src/${goPackagePath}
'';
diff --git a/pkgs/desktops/deepin/default.nix b/pkgs/desktops/deepin/default.nix
index 4fe787bc5d4..4c0e44f6b72 100644
--- a/pkgs/desktops/deepin/default.nix
+++ b/pkgs/desktops/deepin/default.nix
@@ -1,13 +1,19 @@
-{ pkgs, makeScope, libsForQt5 }:
+{ pkgs, makeScope, libsForQt5, go_1_11 }:
let
packages = self: with self; {
updateScript = callPackage ./update.nix { };
dbus-factory = callPackage ./dbus-factory { };
- dde-api = callPackage ./dde-api { };
+ dde-api = callPackage ./dde-api {
+ # XXX: the build is finding references to Go when compiled with go v1.12
+ go = go_1_11;
+ };
dde-calendar = callPackage ./dde-calendar { };
- dde-daemon = callPackage ./dde-daemon { };
+ dde-daemon = callPackage ./dde-daemon {
+ # XXX: the build is finding references to Go when compiled with go v1.12
+ go = go_1_11;
+ };
dde-qt-dbus-factory = callPackage ./dde-qt-dbus-factory { };
dde-session-ui = callPackage ./dde-session-ui { };
deepin-desktop-base = callPackage ./deepin-desktop-base { };
diff --git a/pkgs/desktops/deepin/go-dbus-generator/default.nix b/pkgs/desktops/deepin/go-dbus-generator/default.nix
index 28873d8459e..137ad3dafe0 100644
--- a/pkgs/desktops/deepin/go-dbus-generator/default.nix
+++ b/pkgs/desktops/deepin/go-dbus-generator/default.nix
@@ -19,7 +19,7 @@ stdenv.mkDerivation rec {
makeFlags = [
"PREFIX=$(out)"
- "GOCACHE=off"
+ "GOCACHE=$TMPDIR/go-cache"
];
passthru.updateScript = deepin.updateScript { inherit name; };
diff --git a/pkgs/desktops/deepin/go-gir-generator/default.nix b/pkgs/desktops/deepin/go-gir-generator/default.nix
index d33837b21c3..e6e70d2c167 100644
--- a/pkgs/desktops/deepin/go-gir-generator/default.nix
+++ b/pkgs/desktops/deepin/go-gir-generator/default.nix
@@ -37,7 +37,7 @@ stdenv.mkDerivation rec {
makeFlags = [
"PREFIX=$(out)"
- "GOCACHE=off"
+ "GOCACHE=$TMPDIR/go-cache"
];
passthru.updateScript = deepin.updateScript { inherit name; };
diff --git a/pkgs/desktops/gnome-2/bindings/gnome-python-desktop/default.nix b/pkgs/desktops/gnome-2/bindings/gnome-python-desktop/default.nix
index e7f687d9606..31dd985af2a 100644
--- a/pkgs/desktops/gnome-2/bindings/gnome-python-desktop/default.nix
+++ b/pkgs/desktops/gnome-2/bindings/gnome-python-desktop/default.nix
@@ -1,4 +1,4 @@
-{ stdenv, fetchurl, gnome_python, librsvg, libwnck, libgtop, pkgconfig, python2, gtk }:
+{ stdenv, fetchurl, gnome_python, librsvg, libwnck, libgtop, pkgconfig, python2, gtk2 }:
let
inherit (python2.pkgs) python pygtk;
@@ -14,7 +14,7 @@ in stdenv.mkDerivation rec {
};
nativeBuildInputs = [ pkgconfig ];
- buildInputs = [ gtk librsvg libwnck libgtop python ];
+ buildInputs = [ gtk2 librsvg libwnck libgtop python ];
propagatedBuildInputs = [ gnome_python pygtk ];
# gnome-python-desktop expects that .pth file is already installed by PyGTK
diff --git a/pkgs/desktops/gnome-2/bindings/gnome-python/default.nix b/pkgs/desktops/gnome-2/bindings/gnome-python/default.nix
index f571cf8738f..37bd631adbc 100644
--- a/pkgs/desktops/gnome-2/bindings/gnome-python/default.nix
+++ b/pkgs/desktops/gnome-2/bindings/gnome-python/default.nix
@@ -1,4 +1,4 @@
-{ stdenv, fetchurl, python2, pkgconfig, libgnome, GConf, glib, gtk, gnome_vfs }:
+{ stdenv, fetchurl, python2, pkgconfig, libgnome, GConf, glib, gtk2, gnome_vfs }:
with stdenv.lib;
@@ -14,7 +14,7 @@ in stdenv.mkDerivation rec {
};
nativeBuildInputs = [ pkgconfig ];
- buildInputs = [ python glib gtk GConf libgnome gnome_vfs ];
+ buildInputs = [ python glib gtk2 GConf libgnome gnome_vfs ];
propagatedBuildInputs = [ pygobject2 pygtk dbus-python ];
# gnome-python expects that .pth file is already installed by PyGTK in the
diff --git a/pkgs/desktops/gnome-2/bindings/libglademm/default.nix b/pkgs/desktops/gnome-2/bindings/libglademm/default.nix
index d4813eb2a93..177a9f47c31 100644
--- a/pkgs/desktops/gnome-2/bindings/libglademm/default.nix
+++ b/pkgs/desktops/gnome-2/bindings/libglademm/default.nix
@@ -1,8 +1,8 @@
-{ stdenv, fetchurl, pkgconfig, intltool, gtkmm, libglade }:
+{ stdenv, fetchurl, pkgconfig, intltool, gtkmm2, libglade }:
stdenv.mkDerivation rec {
name = "libglademm-2.6.7";
-
+
src = fetchurl {
url = "mirror://gnome/sources/libglademm/2.6/${name}.tar.bz2";
sha256 = "1hrbg9l5qb7w0xvr7013qamkckyj0fqc426c851l69zpmhakqm1q";
@@ -12,6 +12,6 @@ stdenv.mkDerivation rec {
nativeBuildInputs = [ pkgconfig ];
buildInputs = [ intltool ];
-
- propagatedBuildInputs = [ gtkmm libglade ];
+
+ propagatedBuildInputs = [ gtkmm2 libglade ];
}
diff --git a/pkgs/desktops/gnome-2/default.nix b/pkgs/desktops/gnome-2/default.nix
index f67dc13c854..b1a2d6ae7fa 100644
--- a/pkgs/desktops/gnome-2/default.nix
+++ b/pkgs/desktops/gnome-2/default.nix
@@ -1,20 +1,11 @@
-{ callPackage, self, stdenv, gettext, gvfs, libunique, bison2, rarian
-, libstartup_notification, overrides ? {} }:
+{ config, stdenv, pkgs, lib }:
-let overridden = set // overrides; set = with overridden; {
- # Backward compatibility.
- gtkdoc = self.gtk-doc;
- startup_notification = libstartup_notification;
- startupnotification = libstartup_notification;
- gnomedocutils = self.gnome-doc-utils;
- gnomeicontheme = self.gnome_icon_theme;
- gnome_common = gnome-common;
- inherit rarian;
+lib.makeScope pkgs.newScope (self: with self; {
#### PLATFORM
libIDL = callPackage ./platform/libIDL {
- gettext = if stdenv.isDarwin then gettext else null;
+ gettext = if stdenv.isDarwin then pkgs.gettext else null;
};
ORBit2 = callPackage ./platform/ORBit2 { };
@@ -23,9 +14,7 @@ let overridden = set // overrides; set = with overridden; {
libglade = callPackage ./platform/libglade { };
- libgnomeprint = callPackage ./platform/libgnomeprint {
- bison = bison2;
- };
+ libgnomeprint = callPackage ./platform/libgnomeprint { };
libgnomeprintui = callPackage ./platform/libgnomeprintui { };
@@ -47,7 +36,6 @@ let overridden = set // overrides; set = with overridden; {
gnome_python = callPackage ./bindings/gnome-python { };
gnome_python_desktop = callPackage ./bindings/gnome-python-desktop { };
- python_rsvg = overridden.gnome_python_desktop;
gnome_vfs = callPackage ./platform/gnome-vfs { };
@@ -63,14 +51,11 @@ let overridden = set // overrides; set = with overridden; {
gtkhtml4 = callPackage ./platform/gtkhtml/4.x.nix { };
- # Required for nautilus
- inherit (libunique);
-
gtkglext = callPackage ./platform/gtkglext { };
#### DESKTOP
- gvfs = gvfs.override { gnome = self; };
+ gvfs = pkgs.gvfs.override { gnome = self; };
# Removed from recent GNOME releases, but still required
scrollkeeper = callPackage ./desktop/scrollkeeper { };
@@ -85,4 +70,22 @@ let overridden = set // overrides; set = with overridden; {
libglademm = callPackage ./bindings/libglademm { };
-}; in overridden
+} // lib.optionalAttrs (config.allowAliases or true) {
+ inherit (pkgs)
+ # GTK Libs
+ glib glibmm atk atkmm cairo pango pangomm gdk_pixbuf gtkmm2 libcanberra-gtk2
+
+ # Included for backwards compatibility
+ libsoup libwnck gtk-doc gnome-doc-utils rarian;
+
+ gtk = pkgs.gtk2;
+ gtkmm = pkgs.gtkmm2;
+ python_rsvg = self.gnome_python_desktop;
+
+ gtkdoc = pkgs.gtk-doc;
+ startup_notification = pkgs.libstartup_notification;
+ startupnotification = pkgs.libstartup_notification;
+ gnomedocutils = pkgs.gnome-doc-utils;
+ gnomeicontheme = self.gnome_icon_theme;
+ gnome_common = gnome-common;
+})
diff --git a/pkgs/desktops/gnome-2/desktop/gnome-icon-theme/default.nix b/pkgs/desktops/gnome-2/desktop/gnome-icon-theme/default.nix
index dd7e269f94e..0f2a98c61f6 100644
--- a/pkgs/desktops/gnome-2/desktop/gnome-icon-theme/default.nix
+++ b/pkgs/desktops/gnome-2/desktop/gnome-icon-theme/default.nix
@@ -1,4 +1,4 @@
-{ stdenv, fetchurl, pkgconfig, intltool, iconnamingutils, gtk }:
+{ stdenv, fetchurl, pkgconfig, intltool, iconnamingutils, gtk2 }:
stdenv.mkDerivation rec {
name = "gnome-icon-theme-2.91.93";
@@ -9,7 +9,7 @@ stdenv.mkDerivation rec {
sha256 = "cc7f15e54e2640697b58c26e74cc3f6ebadeb4ef6622bffe9c1e6874cc3478d6";
};
- nativeBuildInputs = [ pkgconfig intltool iconnamingutils gtk ];
+ nativeBuildInputs = [ pkgconfig intltool iconnamingutils gtk2 ];
# remove a tree of dirs with no files within
postInstall = '' rm -r "$out/share/locale" '';
diff --git a/pkgs/desktops/gnome-2/desktop/gtksourceview/default.nix b/pkgs/desktops/gnome-2/desktop/gtksourceview/default.nix
index b40cb98cbef..03440c02c14 100644
--- a/pkgs/desktops/gnome-2/desktop/gtksourceview/default.nix
+++ b/pkgs/desktops/gnome-2/desktop/gtksourceview/default.nix
@@ -1,5 +1,5 @@
{stdenv, fetchpatch, fetchurl, autoreconfHook, pkgconfig, atk, cairo, glib
-, gnome-common, gtk, pango
+, gnome-common, gtk2, pango
, libxml2Python, perl, intltool, gettext, gtk-mac-integration-gtk2 }:
with stdenv.lib;
@@ -28,7 +28,7 @@ stdenv.mkDerivation rec {
nativeBuildInputs = [ pkgconfig ];
buildInputs = [
- atk cairo glib gtk
+ atk cairo glib gtk2
pango libxml2Python perl intltool
gettext
] ++ optionals stdenv.isDarwin [
diff --git a/pkgs/desktops/gnome-2/desktop/vte/default.nix b/pkgs/desktops/gnome-2/desktop/vte/default.nix
index 0c8efc57c71..c774468852e 100644
--- a/pkgs/desktops/gnome-2/desktop/vte/default.nix
+++ b/pkgs/desktops/gnome-2/desktop/vte/default.nix
@@ -1,4 +1,4 @@
-{ stdenv, fetchurl, fetchpatch, intltool, pkgconfig, glib, gtk, ncurses
+{ stdenv, fetchurl, fetchpatch, intltool, pkgconfig, glib, gtk2, ncurses
, pythonSupport ? false, python27Packages}:
let
@@ -29,7 +29,7 @@ in stdenv.mkDerivation rec {
];
nativeBuildInputs = [ pkgconfig ];
- buildInputs = [ intltool glib gtk ncurses ] ++
+ buildInputs = [ intltool glib gtk2 ncurses ] ++
stdenv.lib.optionals pythonSupport [python pygtk];
configureFlags = [
diff --git a/pkgs/desktops/gnome-2/platform/gtkglext/default.nix b/pkgs/desktops/gnome-2/platform/gtkglext/default.nix
index 834ec220158..369880c4fc1 100644
--- a/pkgs/desktops/gnome-2/platform/gtkglext/default.nix
+++ b/pkgs/desktops/gnome-2/platform/gtkglext/default.nix
@@ -1,4 +1,4 @@
-{ stdenv, fetchurl, fetchpatch, pkgconfig, glib, gtk, libGLU_combined, pango, pangox_compat, xorg }:
+{ stdenv, fetchurl, fetchpatch, pkgconfig, glib, gtk2, libGLU_combined, pango, pangox_compat, xorg }:
stdenv.mkDerivation rec {
name = "gtkglext-1.2.0";
@@ -9,7 +9,7 @@ stdenv.mkDerivation rec {
};
buildInputs = with xorg;
- [ pkgconfig glib gtk libGLU_combined pango libX11 libXmu ];
+ [ pkgconfig glib gtk2 libGLU_combined pango libX11 libXmu ];
propagatedBuildInputs = [ pangox_compat ];
patches = [
diff --git a/pkgs/desktops/gnome-2/platform/gtkhtml/default.nix b/pkgs/desktops/gnome-2/platform/gtkhtml/default.nix
index b4615683939..5ff687adcf6 100644
--- a/pkgs/desktops/gnome-2/platform/gtkhtml/default.nix
+++ b/pkgs/desktops/gnome-2/platform/gtkhtml/default.nix
@@ -1,4 +1,4 @@
-{ stdenv, fetchurl, pkgconfig, gtk, intltool,
+{ stdenv, fetchurl, pkgconfig, gtk2, intltool,
GConf, enchant, isocodes, gnome_icon_theme }:
stdenv.mkDerivation rec {
@@ -14,7 +14,7 @@ stdenv.mkDerivation rec {
patches = [ ./01_remove-disable-deprecated.patch ];
nativeBuildInputs = [ pkgconfig ];
- buildInputs = [ gtk intltool GConf enchant isocodes gnome_icon_theme ];
+ buildInputs = [ gtk2 intltool GConf enchant isocodes gnome_icon_theme ];
NIX_LDFLAGS = [ "-lgthread-2.0" ];
}
diff --git a/pkgs/desktops/gnome-2/platform/libbonoboui/default.nix b/pkgs/desktops/gnome-2/platform/libbonoboui/default.nix
index a71d6eb789b..0be9d7acb9c 100644
--- a/pkgs/desktops/gnome-2/platform/libbonoboui/default.nix
+++ b/pkgs/desktops/gnome-2/platform/libbonoboui/default.nix
@@ -1,4 +1,4 @@
-{ stdenv, fetchurl, bison, pkgconfig, popt, libxml2, gtk, libtool
+{ stdenv, fetchurl, bison, pkgconfig, popt, libxml2, gtk2, libtool
, intltool, libbonobo, GConf, libgnomecanvas, libgnome, libglade }:
stdenv.mkDerivation rec {
@@ -13,6 +13,6 @@ stdenv.mkDerivation rec {
outputs = [ "out" "dev" ];
nativeBuildInputs = [ pkgconfig intltool ];
- buildInputs = [ bison popt gtk libxml2 GConf libglade libtool ];
+ buildInputs = [ bison popt gtk2 libxml2 GConf libglade libtool ];
propagatedBuildInputs = [ libbonobo libgnomecanvas libgnome ];
}
diff --git a/pkgs/desktops/gnome-2/platform/libglade/default.nix b/pkgs/desktops/gnome-2/platform/libglade/default.nix
index 1f4af86ffeb..c61ecc16f15 100644
--- a/pkgs/desktops/gnome-2/platform/libglade/default.nix
+++ b/pkgs/desktops/gnome-2/platform/libglade/default.nix
@@ -1,4 +1,4 @@
-{stdenv, fetchurl, pkgconfig, gtk, libxml2, python, gettext}:
+{stdenv, fetchurl, pkgconfig, gtk2, libxml2, python, gettext}:
stdenv.mkDerivation {
name = "libglade-2.6.4";
@@ -11,7 +11,7 @@ stdenv.mkDerivation {
outputs = [ "out" "dev" ];
nativeBuildInputs = [ pkgconfig ];
- buildInputs = [ gtk python gettext ];
+ buildInputs = [ gtk2 python gettext ];
NIX_LDFLAGS = "-lgmodule-2.0";
diff --git a/pkgs/desktops/gnome-2/platform/libgnomecanvas/default.nix b/pkgs/desktops/gnome-2/platform/libgnomecanvas/default.nix
index 2be8c29e493..72928d82037 100644
--- a/pkgs/desktops/gnome-2/platform/libgnomecanvas/default.nix
+++ b/pkgs/desktops/gnome-2/platform/libgnomecanvas/default.nix
@@ -1,4 +1,4 @@
-{ stdenv, fetchurl, pkgconfig, gtk, intltool, libart_lgpl, libglade }:
+{ stdenv, fetchurl, pkgconfig, gtk2, intltool, libart_lgpl, libglade }:
stdenv.mkDerivation rec {
name = "libgnomecanvas-${minVer}.3";
@@ -13,5 +13,5 @@ stdenv.mkDerivation rec {
buildInputs = [ libglade ];
nativeBuildInputs = [ pkgconfig intltool ];
- propagatedBuildInputs = [ libart_lgpl gtk ];
+ propagatedBuildInputs = [ libart_lgpl gtk2 ];
}
diff --git a/pkgs/desktops/gnome-2/platform/libgnomecanvasmm/default.nix b/pkgs/desktops/gnome-2/platform/libgnomecanvasmm/default.nix
index 9d22488c25d..d2539889fdb 100644
--- a/pkgs/desktops/gnome-2/platform/libgnomecanvasmm/default.nix
+++ b/pkgs/desktops/gnome-2/platform/libgnomecanvasmm/default.nix
@@ -1,4 +1,4 @@
-{ stdenv, fetchurl, pkgconfig, libgnomecanvas, gtkmm }:
+{ stdenv, fetchurl, pkgconfig, libgnomecanvas, gtkmm2 }:
stdenv.mkDerivation {
name = "libgnomecanvasmm-2.26.0";
@@ -9,5 +9,5 @@ stdenv.mkDerivation {
};
nativeBuildInputs = [ pkgconfig ];
- buildInputs = [ libgnomecanvas gtkmm ];
+ buildInputs = [ libgnomecanvas gtkmm2 ];
}
diff --git a/pkgs/desktops/gnome-2/platform/libgnomecups/default.nix b/pkgs/desktops/gnome-2/platform/libgnomecups/default.nix
index 2365e166d5e..ee0282147de 100644
--- a/pkgs/desktops/gnome-2/platform/libgnomecups/default.nix
+++ b/pkgs/desktops/gnome-2/platform/libgnomecups/default.nix
@@ -1,4 +1,4 @@
-{ stdenv, fetchurl, pkgconfig, gtk, gettext, libxml2, intltool, libart_lgpl }:
+{ stdenv, fetchurl, pkgconfig, gtk2, gettext, libxml2, intltool, libart_lgpl }:
stdenv.mkDerivation rec {
name = "libgnomecups-0.2.3";
@@ -13,7 +13,7 @@ stdenv.mkDerivation rec {
patches = [ ./glib.patch ./cups_1.6.patch ];
nativeBuildInputs = [ pkgconfig ];
- buildInputs = [ gtk gettext intltool libart_lgpl ];
+ buildInputs = [ gtk2 gettext intltool libart_lgpl ];
propagatedBuildInputs = [ libxml2 ];
}
diff --git a/pkgs/desktops/gnome-2/platform/libgnomeprint/default.nix b/pkgs/desktops/gnome-2/platform/libgnomeprint/default.nix
index 6945ad1f04b..453a4459fdd 100644
--- a/pkgs/desktops/gnome-2/platform/libgnomeprint/default.nix
+++ b/pkgs/desktops/gnome-2/platform/libgnomeprint/default.nix
@@ -1,5 +1,5 @@
-{ stdenv, fetchurl, pkgconfig, gtk, gettext, libxml2, intltool, libart_lgpl
-, libgnomecups, bison, flex }:
+{ stdenv, fetchurl, pkgconfig, gtk2, gettext, libxml2, intltool, libart_lgpl
+, libgnomecups, bison2, flex }:
stdenv.mkDerivation rec {
name = "libgnomeprint-2.18.8";
@@ -12,7 +12,7 @@ stdenv.mkDerivation rec {
patches = [ ./bug653388.patch ];
nativeBuildInputs = [ pkgconfig ];
- buildInputs = [ gtk gettext intltool libart_lgpl libgnomecups bison flex ];
+ buildInputs = [ gtk2 gettext intltool libart_lgpl libgnomecups bison2 flex ];
propagatedBuildInputs = [ libxml2 ];
diff --git a/pkgs/desktops/gnome-2/platform/libgnomeprintui/default.nix b/pkgs/desktops/gnome-2/platform/libgnomeprintui/default.nix
index a8072aa3752..215c9eb3e5e 100644
--- a/pkgs/desktops/gnome-2/platform/libgnomeprintui/default.nix
+++ b/pkgs/desktops/gnome-2/platform/libgnomeprintui/default.nix
@@ -1,4 +1,4 @@
-{stdenv, fetchurl, pkgconfig, gtk, gettext, intltool, libgnomecanvas, libgnomeprint, gnomeicontheme}:
+{stdenv, fetchurl, pkgconfig, gtk2, gettext, intltool, libgnomecanvas, libgnomeprint, gnome_icon_theme}:
stdenv.mkDerivation {
name = "libgnomeprintui-2.18.6";
@@ -9,5 +9,5 @@ stdenv.mkDerivation {
};
nativeBuildInputs = [ pkgconfig ];
- buildInputs = [ gtk gettext intltool libgnomecanvas libgnomeprint gnomeicontheme];
+ buildInputs = [ gtk2 gettext intltool libgnomecanvas libgnomeprint gnome_icon_theme];
}
diff --git a/pkgs/desktops/gnome-2/platform/libgtkhtml/default.nix b/pkgs/desktops/gnome-2/platform/libgtkhtml/default.nix
index b9db3422723..cf34c7e7c68 100644
--- a/pkgs/desktops/gnome-2/platform/libgtkhtml/default.nix
+++ b/pkgs/desktops/gnome-2/platform/libgtkhtml/default.nix
@@ -1,4 +1,4 @@
-{stdenv, fetchurl, pkgconfig, gtk, gettext, libxml2 }:
+{stdenv, fetchurl, pkgconfig, gtk2, gettext, libxml2 }:
stdenv.mkDerivation {
name = "libgtkhtml-2.11.1";
@@ -9,7 +9,7 @@ stdenv.mkDerivation {
};
nativeBuildInputs = [ pkgconfig ];
- buildInputs = [ gtk gettext ];
+ buildInputs = [ gtk2 gettext ];
propagatedBuildInputs = [ libxml2 ];
hardeningDisable = [ "format" ];
diff --git a/pkgs/desktops/gnome-3/core/evolution-data-server/default.nix b/pkgs/desktops/gnome-3/core/evolution-data-server/default.nix
index 806c3f32d2b..62ed7aaa3d8 100644
--- a/pkgs/desktops/gnome-3/core/evolution-data-server/default.nix
+++ b/pkgs/desktops/gnome-3/core/evolution-data-server/default.nix
@@ -33,7 +33,7 @@ stdenv.mkDerivation rec {
libcanberra-gtk3 pcre
];
- propagatedBuildInputs = [ libsecret nss nspr libical db ];
+ propagatedBuildInputs = [ libsecret nss nspr libical db libsoup ];
cmakeFlags = [
"-DENABLE_UOA=OFF"
diff --git a/pkgs/desktops/gnome-3/extensions/dash-to-dock/default.nix b/pkgs/desktops/gnome-3/extensions/dash-to-dock/default.nix
index 62420bf42b2..4e94f07692b 100644
--- a/pkgs/desktops/gnome-3/extensions/dash-to-dock/default.nix
+++ b/pkgs/desktops/gnome-3/extensions/dash-to-dock/default.nix
@@ -2,13 +2,13 @@
stdenv.mkDerivation rec {
name = "gnome-shell-dash-to-dock-${version}";
- version = "64";
+ version = "65";
src = fetchFromGitHub {
owner = "micheleg";
repo = "dash-to-dock";
rev = "extensions.gnome.org-v" + version;
- sha256 = "1cfkdi4raim50wif47fly4c0lzyamysv40qd5ppr1h824bamzxcm";
+ sha256 = "0ln49l9s0yfl30pi77pz7xlmh63l9vjppi863kry5lay10dsvz47";
};
nativeBuildInputs = [
diff --git a/pkgs/desktops/gnome-3/extensions/sound-output-device-chooser/default.nix b/pkgs/desktops/gnome-3/extensions/sound-output-device-chooser/default.nix
new file mode 100644
index 00000000000..a1cc96d8b7b
--- /dev/null
+++ b/pkgs/desktops/gnome-3/extensions/sound-output-device-chooser/default.nix
@@ -0,0 +1,28 @@
+{ stdenv, fetchFromGitHub }:
+
+stdenv.mkDerivation rec {
+ pname = "gnome-shell-extension-sound-output-device-chooser";
+ version = "unstable-2018-12-30";
+
+ src = fetchFromGitHub {
+ owner = "kgshank";
+ repo = "gse-sound-output-device-chooser";
+ rev = "3ec8aded413034e7943eb36ee509405873ccc575";
+ sha256 = "1svc3d3pr2j7fr0660a0zj2n320vld8zkkddf5iphbdwivmkrh3n";
+ };
+
+ dontBuild = true;
+
+ uuid = "sound-output-device-chooser@kgshank.net";
+ installPhase = ''
+ mkdir -p $out/share/gnome-shell/extensions
+ cp -r ${uuid} $out/share/gnome-shell/extensions
+ '';
+
+ meta = with stdenv.lib; {
+ description = "GNOME Shell extension adding audio device chooser to panel";
+ license = licenses.gpl3;
+ maintainers = with maintainers; [ jtojnar ];
+ homepage = https://github.com/kgshank/gse-sound-output-device-chooser;
+ };
+}
diff --git a/pkgs/desktops/gnome-3/extensions/window-corner-preview/default.nix b/pkgs/desktops/gnome-3/extensions/window-corner-preview/default.nix
new file mode 100644
index 00000000000..b0e45c2b7bf
--- /dev/null
+++ b/pkgs/desktops/gnome-3/extensions/window-corner-preview/default.nix
@@ -0,0 +1,28 @@
+{ stdenv, fetchFromGitHub }:
+
+stdenv.mkDerivation rec {
+ pname = "gnome-shell-extension-window-corner-preview";
+ version = "unstable-2019-02-27";
+
+ src = fetchFromGitHub {
+ owner = "medenagan";
+ repo = "window-corner-preview";
+ rev = "9c1e97c7f7ecd530abac572050f6ec89c1ac7571";
+ sha256 = "12yx3zfnqkpy9g8mhniw02q61axgb14aqiyj6pdfcdmd6hrgsmz6";
+ };
+
+ dontBuild = true;
+
+ uuid = "window-corner-preview@fabiomereu.it";
+ installPhase = ''
+ mkdir -p $out/share/gnome-shell/extensions
+ cp -r ${uuid} $out/share/gnome-shell/extensions
+ '';
+
+ meta = with stdenv.lib; {
+ description = "GNOME Shell extension showing a video preview on the corner of the screen";
+ license = licenses.mit;
+ maintainers = with maintainers; [ jtojnar ];
+ homepage = https://github.com/medenagan/window-corner-preview;
+ };
+}
diff --git a/pkgs/desktops/gnome-3/misc/geary/default.nix b/pkgs/desktops/gnome-3/misc/geary/default.nix
index c522fbec57b..154ebb04a4b 100644
--- a/pkgs/desktops/gnome-3/misc/geary/default.nix
+++ b/pkgs/desktops/gnome-3/misc/geary/default.nix
@@ -6,11 +6,11 @@
stdenv.mkDerivation rec {
pname = "geary";
- version = "0.13.1";
+ version = "0.13.2";
src = fetchurl {
url = "mirror://gnome/sources/${pname}/${stdenv.lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
- sha256 = "0h9pf2mdskq7mylib1m9hw86nwfmdzyngjl7ywangqipm1k5svjx";
+ sha256 = "1fp3zzgpkm1l4d0g5194wnriz2spxa9kgrgy98kvvffl7ac860kk";
};
patches = [
@@ -20,12 +20,6 @@ stdenv.mkDerivation rec {
url = https://gitlab.gnome.org/GNOME/geary/commit/d2f1b1076aa942d140e83fdf03b66621c11229f5.patch;
sha256 = "1dsj4ybnibpi572w9hafm0w90jbjv7wzdl6j8d4c2qg5h7knlvfk";
})
- # Fixes tests on Aarch64
- # https://gitlab.gnome.org/GNOME/geary/issues/259
- (fetchpatch {
- url = https://gitlab.gnome.org/GNOME/geary/commit/9c3fdbfb5c792daeb9c3924f798fa83a15096d8a.patch;
- sha256 = "1ihjxnaj0g6gx264kd8cbhs88yp37vwmmcd3lvmz44agf7qcv2ri";
- })
];
nativeBuildInputs = [
diff --git a/pkgs/desktops/pantheon/apps/elementary-calculator/default.nix b/pkgs/desktops/pantheon/apps/elementary-calculator/default.nix
index c8ade1c9c35..9aed8ffcc27 100644
--- a/pkgs/desktops/pantheon/apps/elementary-calculator/default.nix
+++ b/pkgs/desktops/pantheon/apps/elementary-calculator/default.nix
@@ -5,7 +5,7 @@
stdenv.mkDerivation rec {
pname = "calculator";
- version = "1.5.1";
+ version = "1.5.2";
name = "elementary-${pname}-${version}";
@@ -13,7 +13,7 @@ stdenv.mkDerivation rec {
owner = "elementary";
repo = pname;
rev = version;
- sha256 = "0vc27kjmfkly2jkqjiyzlybxyjqhwal3xrxca5b4abfgb379yswa";
+ sha256 = "1vdgl89hdf9q1ya6as7310hlr0xls3w7js2gzsd9z8arb6037ccl";
};
passthru = {
diff --git a/pkgs/desktops/pantheon/apps/elementary-calendar/default.nix b/pkgs/desktops/pantheon/apps/elementary-calendar/default.nix
index 28983db7f91..c165df26f60 100644
--- a/pkgs/desktops/pantheon/apps/elementary-calendar/default.nix
+++ b/pkgs/desktops/pantheon/apps/elementary-calendar/default.nix
@@ -6,7 +6,7 @@
stdenv.mkDerivation rec {
pname = "calendar";
- version = "4.2.3";
+ version = "5.0";
name = "elementary-${pname}-${version}";
@@ -14,7 +14,7 @@ stdenv.mkDerivation rec {
owner = "elementary";
repo = pname;
rev = version;
- sha256 = "100wy8lkp4nrxj57ywyx44ckm3k7n8h5l6av92hr5pyx8fxn9m48";
+ sha256 = "0yiis5ig98gjw4s2qh8lppkdmv1cgi6qchxqncsjdki7yxyyni35";
};
passthru = {
diff --git a/pkgs/desktops/pantheon/apps/elementary-code/default.nix b/pkgs/desktops/pantheon/apps/elementary-code/default.nix
index ad890bc4610..7b6ee323091 100644
--- a/pkgs/desktops/pantheon/apps/elementary-code/default.nix
+++ b/pkgs/desktops/pantheon/apps/elementary-code/default.nix
@@ -5,7 +5,7 @@
stdenv.mkDerivation rec {
pname = "code";
- version = "3.0.2";
+ version = "3.1.0";
name = "elementary-${pname}-${version}";
@@ -13,7 +13,7 @@ stdenv.mkDerivation rec {
owner = "elementary";
repo = pname;
rev = version;
- sha256 = "0zmm4a7galrs9phiplf6cygwq3rplghv7r8g47mi4nlndgxqyssg";
+ sha256 = "04clzms1gw7dr611kr8bhca2dww0x65186al4sjqmln4g12ry1gx";
};
passthru = {
@@ -51,9 +51,6 @@ stdenv.mkDerivation rec {
zeitgeist
];
- # See: https://github.com/elementary/code/pull/626
- LIBRARY_PATH = stdenv.lib.makeLibraryPath [ editorconfig-core-c ];
-
# install script fails with UnicodeDecodeError because of printing a fancy elipsis character
LC_ALL = "C.UTF-8";
diff --git a/pkgs/desktops/pantheon/apps/elementary-screenshot-tool/default.nix b/pkgs/desktops/pantheon/apps/elementary-screenshot-tool/default.nix
index f1c07b8d3f5..2644d31d798 100644
--- a/pkgs/desktops/pantheon/apps/elementary-screenshot-tool/default.nix
+++ b/pkgs/desktops/pantheon/apps/elementary-screenshot-tool/default.nix
@@ -2,12 +2,6 @@
, ninja, vala, python3, desktop-file-utils, gtk3, granite, libgee
, libcanberra, gobject-introspection, elementary-icon-theme, wrapGAppsHook }:
-let
-
- redacted-script = callPackage ./redacted-script.nix {};
-
-in
-
stdenv.mkDerivation rec {
pname = "screenshot-tool"; # This will be renamed to "screenshot" soon. See -> https://github.com/elementary/screenshot/pull/93
version = "1.6.2";
@@ -52,11 +46,6 @@ stdenv.mkDerivation rec {
patchShebangs meson/post_install.py
'';
- postInstall = ''
- mkdir -p $out/share/fonts/truetype
- cp -rva ${redacted-script}/share/fonts/truetype/redacted-elementary $out/share/fonts/truetype
- '';
-
meta = with stdenv.lib; {
description = "Screenshot tool designed for elementary OS";
homepage = https://github.com/elementary/screenshot;
diff --git a/pkgs/desktops/pantheon/apps/elementary-screenshot-tool/redacted-script.nix b/pkgs/desktops/pantheon/apps/elementary-screenshot-tool/redacted-script.nix
deleted file mode 100644
index db1d9d240c4..00000000000
--- a/pkgs/desktops/pantheon/apps/elementary-screenshot-tool/redacted-script.nix
+++ /dev/null
@@ -1,28 +0,0 @@
-{ stdenv, fetchFromGitHub, pantheon }:
-
-stdenv.mkDerivation rec {
- name = "elementary-redacted-script-${version}";
- version = "5.1.0";
-
- src = fetchFromGitHub {
- owner = "elementary";
- repo = "fonts";
- rev = version;
- sha256 = "16x2w7w29k4jx2nwc5932h9rqvb216vxsziazisv2rpll74kn8b2";
- };
-
- dontConfigure = true;
-
- installPhase = ''
- mkdir -p $out/share/fonts/truetype/redacted-elementary
- cp -a redacted/*.ttf $out/share/fonts/truetype/redacted-elementary
- '';
-
- meta = with stdenv.lib; {
- description = "Redacted Script Font for elementary";
- homepage = https://github.com/elementary/fonts;
- license = licenses.ofl;
- maintainers = pantheon.maintainers;
- platforms = platforms.linux;
- };
-}
diff --git a/pkgs/desktops/pantheon/apps/switchboard-plugs/keyboard/default.nix b/pkgs/desktops/pantheon/apps/switchboard-plugs/keyboard/default.nix
index f38f15e3c6d..c87723007bb 100644
--- a/pkgs/desktops/pantheon/apps/switchboard-plugs/keyboard/default.nix
+++ b/pkgs/desktops/pantheon/apps/switchboard-plugs/keyboard/default.nix
@@ -3,13 +3,13 @@
stdenv.mkDerivation rec {
pname = "switchboard-plug-keyboard";
- version = "2.3.4";
+ version = "2.3.5";
src = fetchFromGitHub {
owner = "elementary";
repo = pname;
rev = version;
- sha256 = "1997hnhlcp2jmf3z70na42vl1b7i5vxhp7k5ga5sl68dv0g4126y";
+ sha256 = "17iijb7imxw5zv7vkrbc1vsp87k900yqgyv7ycz1gw37xb4klsyp";
};
passthru = {
@@ -43,8 +43,6 @@ stdenv.mkDerivation rec {
})
];
- LIBRARY_PATH = stdenv.lib.makeLibraryPath [ libgnomekbd ];
-
PKG_CONFIG_SWITCHBOARD_2_0_PLUGSDIR = "lib/switchboard";
meta = with stdenv.lib; {
diff --git a/pkgs/desktops/pantheon/artwork/elementary-gtk-theme/default.nix b/pkgs/desktops/pantheon/artwork/elementary-gtk-theme/default.nix
index 2f7e79f9f9b..fe04d2b698b 100644
--- a/pkgs/desktops/pantheon/artwork/elementary-gtk-theme/default.nix
+++ b/pkgs/desktops/pantheon/artwork/elementary-gtk-theme/default.nix
@@ -2,7 +2,7 @@
stdenv.mkDerivation rec {
pname = "stylesheet";
- version = "5.2.1";
+ version = "5.2.2";
name = "elementary-gtk-theme-${version}";
@@ -10,7 +10,7 @@ stdenv.mkDerivation rec {
owner = "elementary";
repo = pname;
rev = version;
- sha256 = "03l8m87f7z25svxk0hhcqnn4qnnqvasr5qwzq3s87lx25gwjml29";
+ sha256 = "10b44dz7ndrckvq25pdxav59rzjcjbcpxb64z4nz62rfshvnrn8q";
};
passthru = {
diff --git a/pkgs/desktops/pantheon/artwork/elementary-redacted-script/default.nix b/pkgs/desktops/pantheon/artwork/elementary-redacted-script/default.nix
new file mode 100644
index 00000000000..061feb4b2d9
--- /dev/null
+++ b/pkgs/desktops/pantheon/artwork/elementary-redacted-script/default.nix
@@ -0,0 +1,28 @@
+{ stdenv, fetchFromGitHub, pantheon }:
+
+stdenv.mkDerivation rec {
+ pname = "elementary-redacted-script";
+ version = "unstable-2016-06-03";
+
+ src = fetchFromGitHub {
+ owner = "png2378";
+ repo = "redacted-elementary";
+ rev = "346440ff9ce19465e6d5c3d6d67a8573f992c746";
+ sha256 = "1jpd13sxkarclr0mlm66wzgpjh52ghzjzn4mywhyshyyskwn7jg1";
+ };
+
+ dontBuild = true;
+
+ installPhase = ''
+ mkdir -p $out/share/fonts/truetype/redacted-elementary
+ cp -a truetype/*.ttf $out/share/fonts/truetype/redacted-elementary
+ '';
+
+ meta = with stdenv.lib; {
+ description = "Font for concealing text";
+ homepage = https://github.com/png2378/redacted-elementary;
+ license = licenses.ofl;
+ maintainers = pantheon.maintainers;
+ platforms = platforms.linux;
+ };
+}
diff --git a/pkgs/desktops/pantheon/default.nix b/pkgs/desktops/pantheon/default.nix
index 27e6e02a4a3..8271abc1506 100644
--- a/pkgs/desktops/pantheon/default.nix
+++ b/pkgs/desktops/pantheon/default.nix
@@ -217,6 +217,8 @@ lib.makeScope pkgs.newScope (self: with self; {
elementary-icon-theme = callPackage ./artwork/elementary-icon-theme { };
+ elementary-redacted-script = callPackage ./artwork/elementary-redacted-script { };
+
elementary-sound-theme = callPackage ./artwork/elementary-sound-theme { };
elementary-wallpapers = callPackage ./artwork/elementary-wallpapers { };
diff --git a/pkgs/desktops/pantheon/desktop/wingpanel-indicators/keyboard/default.nix b/pkgs/desktops/pantheon/desktop/wingpanel-indicators/keyboard/default.nix
index e2faccedbb7..be5cd93eb0d 100644
--- a/pkgs/desktops/pantheon/desktop/wingpanel-indicators/keyboard/default.nix
+++ b/pkgs/desktops/pantheon/desktop/wingpanel-indicators/keyboard/default.nix
@@ -4,13 +4,13 @@
stdenv.mkDerivation rec {
pname = "wingpanel-indicator-keyboard";
- version = "2.1.1";
+ version = "2.1.2";
src = fetchFromGitHub {
owner = "elementary";
repo = pname;
rev = version;
- sha256 = "0x0bdd9svw4sffx8pa0pqlh6mrj3fqp4mgrb4n7ys26k2w20ngnb";
+ sha256 = "0lrd474m6p8di73hqjilqnnl7qg72ky5narkgcvm4lk8dyi78mz0";
};
passthru = {
diff --git a/pkgs/desktops/pantheon/desktop/wingpanel-indicators/session/default.nix b/pkgs/desktops/pantheon/desktop/wingpanel-indicators/session/default.nix
index b910f6a7180..8227ca6f57e 100644
--- a/pkgs/desktops/pantheon/desktop/wingpanel-indicators/session/default.nix
+++ b/pkgs/desktops/pantheon/desktop/wingpanel-indicators/session/default.nix
@@ -4,13 +4,13 @@
stdenv.mkDerivation rec {
pname = "wingpanel-indicator-session";
- version = "2.2.2";
+ version = "2.2.3";
src = fetchFromGitHub {
owner = "elementary";
repo = pname;
rev = version;
- sha256 = "15ghhiabk74m7fm5pzr2qmdwpc330jczvvkwbf5pf7qczfyipjln";
+ sha256 = "1y0blff02p3w23sv17yg7fq0yq0g2k8j7vjmk92k664fx72kjjzh";
};
passthru = {
diff --git a/pkgs/desktops/pantheon/desktop/wingpanel-indicators/sound/default.nix b/pkgs/desktops/pantheon/desktop/wingpanel-indicators/sound/default.nix
index 003e431bcf7..65a4b1abd2c 100644
--- a/pkgs/desktops/pantheon/desktop/wingpanel-indicators/sound/default.nix
+++ b/pkgs/desktops/pantheon/desktop/wingpanel-indicators/sound/default.nix
@@ -5,13 +5,13 @@
stdenv.mkDerivation rec {
pname = "wingpanel-indicator-sound";
- version = "2.1.2";
+ version = "2.1.3";
src = fetchFromGitHub {
owner = "elementary";
repo = pname;
rev = version;
- sha256 = "0hxbr5dp8d1czq8ffw339r41c7srqb72vr48hxph8g091d3mcgcl";
+ sha256 = "0lgjl969c7s31nszh6d4pr1vsxfdsizplsihvd8r02mm1mlxmsda";
};
passthru = {
diff --git a/pkgs/desktops/pantheon/desktop/wingpanel/default.nix b/pkgs/desktops/pantheon/desktop/wingpanel/default.nix
index a5ca227bbc2..c34beab7600 100644
--- a/pkgs/desktops/pantheon/desktop/wingpanel/default.nix
+++ b/pkgs/desktops/pantheon/desktop/wingpanel/default.nix
@@ -1,4 +1,4 @@
-{ stdenv, fetchFromGitHub, pantheon, wrapGAppsHook, pkgconfig, meson, ninja
+{ stdenv, fetchFromGitHub, pantheon, fetchpatch, wrapGAppsHook, pkgconfig, meson, ninja
, vala, gala, gtk3, libgee, granite, gettext, glib-networking, mutter, json-glib
, python3, gobject-introspection }:
@@ -40,7 +40,14 @@ stdenv.mkDerivation rec {
mutter
];
- patches = [ ./indicators.patch ];
+ patches = [
+ ./indicators.patch
+ # Fix wingpanel potentially overlapping windows: https://github.com/elementary/wingpanel/pull/198
+ (fetchpatch {
+ url = "https://github.com/elementary/wingpanel/commit/fc1b8ea3d6cfc5d6e4034af177eecd4542a59833.patch";
+ sha256 = "0w5z56di5lxwg9vb96f9y4r2q05znwpn814m2w12l3impf5xsdqs";
+ })
+ ];
postPatch = ''
chmod +x meson/post_install.py
diff --git a/pkgs/desktops/xfce/default.nix b/pkgs/desktops/xfce/default.nix
index abf03d4277b..e5182a12d43 100644
--- a/pkgs/desktops/xfce/default.nix
+++ b/pkgs/desktops/xfce/default.nix
@@ -3,7 +3,7 @@
lib.makeScope pkgs.newScope (self: with self; {
#### NixOS support
- inherit (pkgs.gnome2) libglade libwnck vte gtksourceview;
+ inherit (pkgs.gnome2) libglade vte gtksourceview;
inherit (pkgs.gnome3) dconf;
inherit (pkgs.perlPackages) URI;
diff --git a/pkgs/development/arduino/arduino-core/default.nix b/pkgs/development/arduino/arduino-core/default.nix
index 269df6a07cd..2df5d16dbac 100644
--- a/pkgs/development/arduino/arduino-core/default.nix
+++ b/pkgs/development/arduino/arduino-core/default.nix
@@ -2,8 +2,8 @@
, libusb, libusb1, unzip, zlib, ncurses, readline
, withGui ? false, gtk2 ? null, withTeensyduino ? false
/* Packages needed for Teensyduino */
-, upx, fontconfig, xorg, gcc, xdotool, xvfb_run
-, atk, glib, pango, gdk_pixbuf, libpng12, expat, freetype
+, upx, fontconfig, xorg, gcc
+, atk, glib, pango, gdk_pixbuf, libpng12, expat, freetype,
}:
assert withGui -> gtk2 != null;
@@ -68,19 +68,32 @@ stdenv.mkDerivation rec {
sha256 = "0ww72qfk7fyvprz15lc80i1axfdacb5fij4h5j5pakrg76mng2c3";
};
+ teensyduino_version = "145";
teensyduino_src = fetchurl {
- url = "https://www.pjrc.com/teensy/td_140/TeensyduinoInstall.${teensy_architecture}";
+ url = "https://www.pjrc.com/teensy/td_${teensyduino_version}/TeensyduinoInstall.${teensy_architecture}";
sha256 =
lib.optionalString ("${teensy_architecture}" == "linux64")
- "0127a1ak31252dbmr5niqa5mkvbm8dnz1cfcnmydzx9qn9rk00ir"
+ "0n8812znwdyvy7d1321p4r6j5pixg1sr31z5pfr7i0ikw0jxfrxb"
+ lib.optionalString ("${teensy_architecture}" == "linux32")
- "01mxj5xsr7gka652c9rp4szy5mkcka8mljk044v4agk3sxvx3v3i"
+ "1p74rb8g4v6kd09a0af1yra8xjzy3iyv5w5b6h6ljfhb022v3l57"
+ lib.optionalString ("${teensy_architecture}" == "linuxarm")
- "1dff3alhvk9x8qzy3n85qrg6rfmy6l9pj6fmrlzpli63lzykvv4i";
+ "0jd9dvr8zx9hlyn6j979d66qdvzgv3dmx5x9yviqvrn1f3w4hfbf";
+ };
+ # Used because teensyduino requires jars be a specific size
+ arduino_dist_src = fetchurl {
+ url = "http://downloads.arduino.cc/arduino-${version}-${teensy_architecture}.tar.xz";
+ sha256 =
+ lib.optionalString ("${teensy_architecture}" == "linux64")
+ "1f8s3by5lc6fazyaa9zc9kz3ar8zj8jabab1fy5jzh49fbd8bydx"
+ + lib.optionalString ("${teensy_architecture}" == "linux32")
+ "1r9ral9aq5vp02dwgagifk5h403l7knxdyi1w23rqpcbbpa423lw"
+ + lib.optionalString ("${teensy_architecture}" == "linuxarm")
+ "0sz18wns00kysmb2zv7a67dy9wpxiawq3ykfr07wjyg8h1fy3p6h";
};
+
buildInputs = [ jdk ant libusb libusb1 unzip zlib ncurses5 readline
- ] ++ stdenv.lib.optionals withTeensyduino [ upx xvfb_run xdotool ];
+ ] ++ stdenv.lib.optionals withTeensyduino [ upx ];
downloadSrcList = builtins.attrValues externalDownloads;
downloadDstList = builtins.attrNames externalDownloads;
@@ -116,8 +129,8 @@ stdenv.mkDerivation rec {
installPhase = ''
mkdir -p $out/share/arduino
- cp -r ./build/linux/work/* "$out/share/arduino/" #*/
- echo ${version} > $out/share/arduino/lib/version.txt
+ cp -r ./build/linux/work/* "$out/share/arduino/"
+ echo -n ${version} > $out/share/arduino/lib/version.txt
${stdenv.lib.optionalString withGui ''
mkdir -p $out/bin
@@ -135,6 +148,18 @@ stdenv.mkDerivation rec {
''}
${stdenv.lib.optionalString withTeensyduino ''
+ # Back up the original jars
+ mv $out/share/arduino/lib/arduino-core.jar $out/share/arduino/lib/arduino-core.jar.bak
+ mv $out/share/arduino/lib/pde.jar $out/share/arduino/lib/pde.jar.bak
+ # Extract jars from the arduino distributable package
+ mkdir arduino_dist
+ cd arduino_dist
+ tar xfJ ${arduino_dist_src} arduino-${version}/lib/arduino-core.jar arduino-${version}/lib/pde.jar
+ cd ..
+ # Replace the built jars with the official arduino jars
+ mv arduino_dist/arduino-${version}/lib/{arduino-core,pde}.jar $out/share/arduino/lib/
+ # Delete the directory now that the jars are copied out
+ rm -r arduino_dist
# Extract and patch the Teensyduino installer
cp ${teensyduino_src} ./TeensyduinoInstall.${teensy_architecture}
chmod +w ./TeensyduinoInstall.${teensy_architecture}
@@ -143,39 +168,12 @@ stdenv.mkDerivation rec {
--set-rpath "${teensy_libpath}" \
./TeensyduinoInstall.${teensy_architecture}
chmod +x ./TeensyduinoInstall.${teensy_architecture}
-
- # Run the GUI-only installer in a virtual X server
- # Script thanks to AUR package. See:
- #
- echo "Running Teensyduino installer..."
- # Trick the GUI into using HOME as the install directory.
- export HOME=$out/share/arduino
- # Run the installer in a virtual X server in memory.
- xvfb-run -n 99 ./TeensyduinoInstall.${teensy_architecture} &
- sleep 4
- echo "Waiting for Teensyduino to install (about 1 minute)..."
- # Control the installer GUI with xdotool.
- DISPLAY=:99 xdotool search --class "teensyduino" \
- windowfocus \
- key space sleep 1 \
- key Tab sleep 0.4 \
- key Tab sleep 0.4 \
- key Tab sleep 0.4 \
- key Tab sleep 0.4 \
- key space sleep 1 \
- key Tab sleep 0.4 \
- key Tab sleep 0.4 \
- key Tab sleep 0.4 \
- key Tab sleep 0.4 \
- key space sleep 1 \
- key Tab sleep 0.4 \
- key space sleep 35 \
- key space sleep 2 &
- # Wait for xdotool to terminate and swallow the inevitable XIO error
- wait $! || true
-
+ ./TeensyduinoInstall.${teensy_architecture} --dir=$out/share/arduino
# Check for successful installation
[ -d $out/share/arduino/hardware/teensy ] || exit 1
+ # After the install, copy the built jars back
+ mv $out/share/arduino/lib/arduino-core.jar.bak $out/share/arduino/lib/arduino-core.jar
+ mv $out/share/arduino/lib/pde.jar.bak $out/share/arduino/lib/pde.jar
''}
'';
diff --git a/pkgs/development/compilers/compcert/default.nix b/pkgs/development/compilers/compcert/default.nix
index 4a9f585b252..de01d7afdf0 100644
--- a/pkgs/development/compilers/compcert/default.nix
+++ b/pkgs/development/compilers/compcert/default.nix
@@ -12,11 +12,11 @@ let
in
stdenv.mkDerivation rec {
name = "compcert-${version}";
- version = "3.4";
+ version = "3.5";
src = fetchurl {
url = "http://compcert.inria.fr/release/${name}.tgz";
- sha256 = "12gchwvkzhd2bhrnwzfb4a06wc4hgv98z987k06vj7ga31ii763h";
+ sha256 = "127s8nwsmpl7ng7h4yy8cci8p6ncsw8i8jq3z0pyhx2siryddq0v";
};
nativeBuildInputs = [ makeWrapper ];
@@ -24,6 +24,7 @@ stdenv.mkDerivation rec {
enableParallelBuilding = true;
patchPhase = ''
+ substituteInPlace ./VERSION --replace 3.4 3.5
substituteInPlace ./configure \
--replace '{toolprefix}gcc' '{toolprefix}cc'
'';
diff --git a/pkgs/development/compilers/crystal/default.nix b/pkgs/development/compilers/crystal/default.nix
index b2b92908f95..3c6f3693401 100644
--- a/pkgs/development/compilers/crystal/default.nix
+++ b/pkgs/development/compilers/crystal/default.nix
@@ -73,6 +73,7 @@ let
FLAGS = [
"--release"
+ "--no-debug"
"--single-module" # needed for deterministic builds
];
diff --git a/pkgs/development/compilers/fasm/bin.nix b/pkgs/development/compilers/fasm/bin.nix
index 0c4a48656b7..cedaf3ef859 100644
--- a/pkgs/development/compilers/fasm/bin.nix
+++ b/pkgs/development/compilers/fasm/bin.nix
@@ -3,11 +3,11 @@
stdenvNoCC.mkDerivation rec {
name = "fasm-bin-${version}";
- version = "1.73.08";
+ version = "1.73.09";
src = fetchurl {
url = "https://flatassembler.net/fasm-${version}.tgz";
- sha256 = "1l4my3fran06h5jiygswx4fsj53dvpfgg9ksfbdzsdg20r672997";
+ sha256 = "197bcj9aa5wpkvrlaafc1smxjss0fwdspq5fwhwgyy9cc7z5g0ym";
};
installPhase = ''
diff --git a/pkgs/development/compilers/ghc/8.6.2.nix b/pkgs/development/compilers/ghc/8.6.2.nix
deleted file mode 100644
index 07d4420804d..00000000000
--- a/pkgs/development/compilers/ghc/8.6.2.nix
+++ /dev/null
@@ -1,230 +0,0 @@
-{ stdenv, targetPackages
-
-# build-tools
-, bootPkgs
-, autoconf, automake, coreutils, fetchurl, fetchpatch, perl, python3, m4, sphinx
-
-, libiconv ? null, ncurses
-
-, useLLVM ? !stdenv.targetPlatform.isx86 || (stdenv.targetPlatform.isMusl && stdenv.hostPlatform != stdenv.targetPlatform)
-, # LLVM is conceptually a run-time-only depedendency, but for
- # non-x86, we need LLVM to bootstrap later stages, so it becomes a
- # build-time dependency too.
- buildLlvmPackages, llvmPackages
-
-, # If enabled, GHC will be built with the GPL-free but slower integer-simple
- # library instead of the faster but GPLed integer-gmp library.
- enableIntegerSimple ? !(stdenv.lib.any (stdenv.lib.meta.platformMatch stdenv.hostPlatform) gmp.meta.platforms), gmp
-
-, # If enabled, use -fPIC when compiling static libs.
- enableRelocatedStaticLibs ? stdenv.targetPlatform != stdenv.hostPlatform
-
-, # Whether to build dynamic libs for the standard library (on the target
- # platform). Static libs are always built.
- enableShared ? !stdenv.targetPlatform.isWindows && !stdenv.targetPlatform.useiOSPrebuilt
-
-, # Whetherto build terminfo.
- enableTerminfo ? !stdenv.targetPlatform.isWindows
-
-, # What flavour to build. An empty string indicates no
- # specific flavour and falls back to ghc default values.
- ghcFlavour ? stdenv.lib.optionalString (stdenv.targetPlatform != stdenv.hostPlatform) "perf-cross"
-}:
-
-assert !enableIntegerSimple -> gmp != null;
-
-let
- inherit (stdenv) buildPlatform hostPlatform targetPlatform;
-
- inherit (bootPkgs) ghc;
-
- # TODO(@Ericson2314) Make unconditional
- targetPrefix = stdenv.lib.optionalString
- (targetPlatform != hostPlatform)
- "${targetPlatform.config}-";
-
- buildMK = ''
- BuildFlavour = ${ghcFlavour}
- ifneq \"\$(BuildFlavour)\" \"\"
- include mk/flavours/\$(BuildFlavour).mk
- endif
- DYNAMIC_GHC_PROGRAMS = ${if enableShared then "YES" else "NO"}
- INTEGER_LIBRARY = ${if enableIntegerSimple then "integer-simple" else "integer-gmp"}
- '' + stdenv.lib.optionalString (targetPlatform != hostPlatform) ''
- Stage1Only = ${if targetPlatform.system == hostPlatform.system then "NO" else "YES"}
- CrossCompilePrefix = ${targetPrefix}
- HADDOCK_DOCS = NO
- BUILD_SPHINX_HTML = NO
- BUILD_SPHINX_PDF = NO
- '' + stdenv.lib.optionalString enableRelocatedStaticLibs ''
- GhcLibHcOpts += -fPIC
- GhcRtsHcOpts += -fPIC
- '' + stdenv.lib.optionalString targetPlatform.useAndroidPrebuilt ''
- EXTRA_CC_OPTS += -std=gnu99
- '';
-
- # Splicer will pull out correct variations
- libDeps = platform: stdenv.lib.optional enableTerminfo [ ncurses ]
- ++ stdenv.lib.optional (!enableIntegerSimple) gmp
- ++ stdenv.lib.optional (platform.libc != "glibc" && !targetPlatform.isWindows) libiconv;
-
- toolsForTarget =
- if hostPlatform == buildPlatform then
- [ targetPackages.stdenv.cc ] ++ stdenv.lib.optional useLLVM llvmPackages.llvm
- else assert targetPlatform == hostPlatform; # build != host == target
- [ stdenv.cc ] ++ stdenv.lib.optional useLLVM buildLlvmPackages.llvm;
-
- targetCC = builtins.head toolsForTarget;
-
-in
-stdenv.mkDerivation (rec {
- version = "8.6.2";
- name = "${targetPrefix}ghc-${version}";
-
- src = fetchurl {
- url = "https://downloads.haskell.org/~ghc/${version}/ghc-${version}-src.tar.xz";
- sha256 = "1mbn3n2ynmpfpb7jfnhpzzli31qqxqyi8ws71blws3i846fq3ana";
- };
-
- enableParallelBuilding = true;
-
- outputs = [ "out" "doc" ];
-
- patches = [(fetchpatch rec { # https://phabricator.haskell.org/D5123
- url = "http://tarballs.nixos.org/sha256/${sha256}";
- name = "D5123.diff";
- sha256 = "0nhqwdamf2y4gbwqxcgjxs0kqx23w9gv5kj0zv6450dq19rji82n";
- })];
-
- postPatch = "patchShebangs .";
-
- # GHC is a bit confused on its cross terminology.
- preConfigure = ''
- for env in $(env | grep '^TARGET_' | sed -E 's|\+?=.*||'); do
- export "''${env#TARGET_}=''${!env}"
- done
- # GHC is a bit confused on its cross terminology, as these would normally be
- # the *host* tools.
- export CC="${targetCC}/bin/${targetCC.targetPrefix}cc"
- export CXX="${targetCC}/bin/${targetCC.targetPrefix}cxx"
- # Use gold to work around https://sourceware.org/bugzilla/show_bug.cgi?id=16177
- export LD="${targetCC.bintools}/bin/${targetCC.bintools.targetPrefix}ld${stdenv.lib.optionalString targetPlatform.isAarch32 ".gold"}"
- export AS="${targetCC.bintools.bintools}/bin/${targetCC.bintools.targetPrefix}as"
- export AR="${targetCC.bintools.bintools}/bin/${targetCC.bintools.targetPrefix}ar"
- export NM="${targetCC.bintools.bintools}/bin/${targetCC.bintools.targetPrefix}nm"
- export RANLIB="${targetCC.bintools.bintools}/bin/${targetCC.bintools.targetPrefix}ranlib"
- export READELF="${targetCC.bintools.bintools}/bin/${targetCC.bintools.targetPrefix}readelf"
- export STRIP="${targetCC.bintools.bintools}/bin/${targetCC.bintools.targetPrefix}strip"
-
- echo -n "${buildMK}" > mk/build.mk
- sed -i -e 's|-isysroot /Developer/SDKs/MacOSX10.5.sdk||' configure
- '' + stdenv.lib.optionalString (!stdenv.isDarwin) ''
- export NIX_LDFLAGS+=" -rpath $out/lib/ghc-${version}"
- '' + stdenv.lib.optionalString stdenv.isDarwin ''
- export NIX_LDFLAGS+=" -no_dtrace_dof"
- '' + stdenv.lib.optionalString targetPlatform.useAndroidPrebuilt ''
- sed -i -e '5i ,("armv7a-unknown-linux-androideabi", ("e-m:e-p:32:32-i64:64-v128:64:128-a:0:32-n32-S64", "cortex-a8", ""))' llvm-targets
- '' + stdenv.lib.optionalString targetPlatform.isMusl ''
- echo "patching llvm-targets for musl targets..."
- echo "Cloning these existing '*-linux-gnu*' targets:"
- grep linux-gnu llvm-targets | sed 's/^/ /'
- echo "(go go gadget sed)"
- sed -i 's,\(^.*linux-\)gnu\(.*\)$,\0\n\1musl\2,' llvm-targets
- echo "llvm-targets now contains these '*-linux-musl*' targets:"
- grep linux-musl llvm-targets | sed 's/^/ /'
-
- echo "And now patching to preserve '-musleabi' as done with '-gnueabi'"
- # (aclocal.m4 is actual source, but patch configure as well since we don't re-gen)
- for x in configure aclocal.m4; do
- substituteInPlace $x \
- --replace '*-android*|*-gnueabi*)' \
- '*-android*|*-gnueabi*|*-musleabi*)'
- done
- '';
-
- # TODO(@Ericson2314): Always pass "--target" and always prefix.
- configurePlatforms = [ "build" "host" ]
- ++ stdenv.lib.optional (targetPlatform != hostPlatform) "target";
- # `--with` flags for libraries needed for RTS linker
- configureFlags = [
- "--datadir=$doc/share/doc/ghc"
- "--with-curses-includes=${ncurses.dev}/include" "--with-curses-libraries=${ncurses.out}/lib"
- ] ++ stdenv.lib.optional (targetPlatform == hostPlatform && !enableIntegerSimple) [
- "--with-gmp-includes=${targetPackages.gmp.dev}/include" "--with-gmp-libraries=${targetPackages.gmp.out}/lib"
- ] ++ stdenv.lib.optional (targetPlatform == hostPlatform && hostPlatform.libc != "glibc" && !targetPlatform.isWindows) [
- "--with-iconv-includes=${libiconv}/include" "--with-iconv-libraries=${libiconv}/lib"
- ] ++ stdenv.lib.optionals (targetPlatform != hostPlatform) [
- "--enable-bootstrap-with-devel-snapshot"
- ] ++ stdenv.lib.optionals (targetPlatform.isAarch32) [
- "CFLAGS=-fuse-ld=gold"
- "CONF_GCC_LINKER_OPTS_STAGE1=-fuse-ld=gold"
- "CONF_GCC_LINKER_OPTS_STAGE2=-fuse-ld=gold"
- ] ++ stdenv.lib.optionals (targetPlatform.isDarwin && targetPlatform.isAarch64) [
- # fix for iOS: https://www.reddit.com/r/haskell/comments/4ttdz1/building_an_osxi386_to_iosarm64_cross_compiler/d5qvd67/
- "--disable-large-address-space"
- ];
-
- # Make sure we never relax`$PATH` and hooks support for compatability.
- strictDeps = true;
-
- # Don’t add -liconv to LDFLAGS automatically so that GHC will add it itself.
- dontAddExtraLibs = true;
-
- nativeBuildInputs = [
- perl autoconf automake m4 python3 sphinx
- ghc bootPkgs.alex bootPkgs.happy bootPkgs.hscolour
- ];
-
- # For building runtime libs
- depsBuildTarget = toolsForTarget;
-
- buildInputs = [ perl ] ++ (libDeps hostPlatform);
-
- propagatedBuildInputs = [ targetPackages.stdenv.cc ]
- ++ stdenv.lib.optional useLLVM llvmPackages.llvm;
-
- depsTargetTarget = map stdenv.lib.getDev (libDeps targetPlatform);
- depsTargetTargetPropagated = map (stdenv.lib.getOutput "out") (libDeps targetPlatform);
-
- # required, because otherwise all symbols from HSffi.o are stripped, and
- # that in turn causes GHCi to abort
- stripDebugFlags = [ "-S" ] ++ stdenv.lib.optional (!targetPlatform.isDarwin) "--keep-file-symbols";
-
- checkTarget = "test";
-
- hardeningDisable = [ "format" ] ++ stdenv.lib.optional stdenv.targetPlatform.isMusl "pie";
-
- postInstall = ''
- # Install the bash completion file.
- install -D -m 444 utils/completion/ghc.bash $out/share/bash-completion/completions/${targetPrefix}ghc
-
- # Patch scripts to include "readelf" and "cat" in $PATH.
- for i in "$out/bin/"*; do
- test ! -h $i || continue
- egrep --quiet '^#!' <(head -n 1 $i) || continue
- sed -i -e '2i export PATH="$PATH:${stdenv.lib.makeBinPath [ targetPackages.stdenv.cc.bintools coreutils ]}"' $i
- done
- '';
-
- passthru = {
- inherit bootPkgs targetPrefix;
-
- inherit llvmPackages;
- inherit enableShared;
-
- # Our Cabal compiler name
- haskellCompilerName = "ghc-8.6.2";
- };
-
- meta = {
- homepage = http://haskell.org/ghc;
- description = "The Glasgow Haskell Compiler";
- maintainers = with stdenv.lib.maintainers; [ marcweber andres peti ];
- inherit (ghc.meta) license platforms;
- };
-
-} // stdenv.lib.optionalAttrs targetPlatform.useAndroidPrebuilt {
- dontStrip = true;
- dontPatchELF = true;
- noAuditTmpdir = true;
-})
diff --git a/pkgs/development/compilers/ghc/8.6.3.nix b/pkgs/development/compilers/ghc/8.6.3.nix
index 605e442553d..a2378b59568 100644
--- a/pkgs/development/compilers/ghc/8.6.3.nix
+++ b/pkgs/development/compilers/ghc/8.6.3.nix
@@ -172,6 +172,9 @@ stdenv.mkDerivation (rec {
# Make sure we never relax`$PATH` and hooks support for compatability.
strictDeps = true;
+ # Don’t add -liconv to LDFLAGS automatically so that GHC will add it itself.
+ dontAddExtraLibs = true;
+
nativeBuildInputs = [
perl autoconf automake m4 python3 sphinx
ghc bootPkgs.alex bootPkgs.happy bootPkgs.hscolour
diff --git a/pkgs/development/compilers/ghc/8.6.1.nix b/pkgs/development/compilers/ghc/8.6.4.nix
similarity index 95%
rename from pkgs/development/compilers/ghc/8.6.1.nix
rename to pkgs/development/compilers/ghc/8.6.4.nix
index b54164ccc69..140cea22442 100644
--- a/pkgs/development/compilers/ghc/8.6.1.nix
+++ b/pkgs/development/compilers/ghc/8.6.4.nix
@@ -6,6 +6,9 @@
, libiconv ? null, ncurses
+, # GHC can be built with system libffi or a bundled one.
+ libffi ? null
+
, useLLVM ? !stdenv.targetPlatform.isx86 || (stdenv.targetPlatform.isMusl && stdenv.hostPlatform != stdenv.targetPlatform)
, # LLVM is conceptually a run-time-only depedendency, but for
# non-x86, we need LLVM to bootstrap later stages, so it becomes a
@@ -65,6 +68,7 @@ let
# Splicer will pull out correct variations
libDeps = platform: stdenv.lib.optional enableTerminfo [ ncurses ]
+ ++ [libffi]
++ stdenv.lib.optional (!enableIntegerSimple) gmp
++ stdenv.lib.optional (platform.libc != "glibc" && !targetPlatform.isWindows) libiconv;
@@ -78,12 +82,12 @@ let
in
stdenv.mkDerivation (rec {
- version = "8.6.1";
+ version = "8.6.4";
name = "${targetPrefix}ghc-${version}";
src = fetchurl {
url = "https://downloads.haskell.org/~ghc/${version}/ghc-${version}-src.tar.xz";
- sha256 = "0dkh7idgrqr567fq94a0f5x3w0r4cm2ydn51nb5wfisw3rnw499c";
+ sha256 = "0fihs1sr0hpk67dn9cmrsav13kkcp9hz8ggdqcrs80rj8vj0fpav";
};
enableParallelBuilding = true;
@@ -149,6 +153,7 @@ stdenv.mkDerivation (rec {
configureFlags = [
"--datadir=$doc/share/doc/ghc"
"--with-curses-includes=${ncurses.dev}/include" "--with-curses-libraries=${ncurses.out}/lib"
+ ] ++ stdenv.lib.optionals (libffi != null) ["--with-system-libffi" "--with-ffi-includes=${libffi.dev}/include" "--with-ffi-libraries=${libffi.out}/lib"
] ++ stdenv.lib.optional (targetPlatform == hostPlatform && !enableIntegerSimple) [
"--with-gmp-includes=${targetPackages.gmp.dev}/include" "--with-gmp-libraries=${targetPackages.gmp.out}/lib"
] ++ stdenv.lib.optional (targetPlatform == hostPlatform && hostPlatform.libc != "glibc" && !targetPlatform.isWindows) [
@@ -168,7 +173,7 @@ stdenv.mkDerivation (rec {
strictDeps = true;
# Don’t add -liconv to LDFLAGS automatically so that GHC will add it itself.
- dontAddExtraLibs = true;
+ dontAddExtraLibs = true;
nativeBuildInputs = [
perl autoconf automake m4 python3 sphinx
@@ -213,7 +218,7 @@ stdenv.mkDerivation (rec {
inherit enableShared;
# Our Cabal compiler name
- haskellCompilerName = "ghc-8.6.1";
+ haskellCompilerName = "ghc-8.6.4";
};
meta = {
diff --git a/pkgs/development/compilers/go/1.12.nix b/pkgs/development/compilers/go/1.12.nix
new file mode 100644
index 00000000000..d7bbd4eaf0f
--- /dev/null
+++ b/pkgs/development/compilers/go/1.12.nix
@@ -0,0 +1,244 @@
+{ stdenv, fetchurl, tzdata, iana-etc, go_bootstrap, runCommand, writeScriptBin
+, perl, which, pkgconfig, patch, procps, pcre, cacert, llvm, Security, Foundation
+, mailcap, runtimeShell
+, buildPackages, targetPackages }:
+
+let
+
+ inherit (stdenv.lib) optionals optionalString;
+
+ goBootstrap = runCommand "go-bootstrap" {} ''
+ mkdir $out
+ cp -rf ${buildPackages.go_bootstrap}/* $out/
+ chmod -R u+w $out
+ find $out -name "*.c" -delete
+ cp -rf $out/bin/* $out/share/go/bin/
+ '';
+
+ goarch = platform: {
+ "i686" = "386";
+ "x86_64" = "amd64";
+ "aarch64" = "arm64";
+ "arm" = "arm";
+ "armv5tel" = "arm";
+ "armv6l" = "arm";
+ "armv7l" = "arm";
+ }.${platform.parsed.cpu.name} or (throw "Unsupported system");
+
+in
+
+stdenv.mkDerivation rec {
+ name = "go-${version}";
+ version = "1.12";
+
+ src = fetchurl {
+ url = "https://dl.google.com/go/go${version}.src.tar.gz";
+ sha256 = "1wl8kq21fbzmv4plnaza5acz8dhbaaq6smjzk3r6cf3l6qrkvi09";
+ };
+
+ # perl is used for testing go vet
+ nativeBuildInputs = [ perl which pkgconfig patch procps ];
+ buildInputs = [ cacert pcre ]
+ ++ optionals stdenv.isLinux [ stdenv.cc.libc.out ]
+ ++ optionals (stdenv.hostPlatform.libc == "glibc") [ stdenv.cc.libc.static ];
+
+
+ propagatedBuildInputs = optionals stdenv.isDarwin [ Security Foundation ];
+
+ hardeningDisable = [ "all" ];
+
+ prePatch = ''
+ patchShebangs ./ # replace /bin/bash
+
+ # This source produces shell script at run time,
+ # and thus it is not corrected by patchShebangs.
+ substituteInPlace misc/cgo/testcarchive/carchive_test.go \
+ --replace '#!/usr/bin/env bash' '#!${runtimeShell}'
+
+ # Patch the mimetype database location which is missing on NixOS.
+ substituteInPlace src/mime/type_unix.go \
+ --replace '/etc/mime.types' '${mailcap}/etc/mime.types'
+
+ # Disabling the 'os/http/net' tests (they want files not available in
+ # chroot builds)
+ rm src/net/{listen,parse}_test.go
+ rm src/syscall/exec_linux_test.go
+
+ # !!! substituteInPlace does not seems to be effective.
+ # The os test wants to read files in an existing path. Just don't let it be /usr/bin.
+ sed -i 's,/usr/bin,'"`pwd`", src/os/os_test.go
+ sed -i 's,/bin/pwd,'"`type -P pwd`", src/os/os_test.go
+ # Disable the unix socket test
+ sed -i '/TestShutdownUnix/areturn' src/net/net_test.go
+ # Disable the hostname test
+ sed -i '/TestHostname/areturn' src/os/os_test.go
+ # ParseInLocation fails the test
+ sed -i '/TestParseInSydney/areturn' src/time/format_test.go
+ # Remove the api check as it never worked
+ sed -i '/src\/cmd\/api\/run.go/ireturn nil' src/cmd/dist/test.go
+ # Remove the coverage test as we have removed this utility
+ sed -i '/TestCoverageWithCgo/areturn' src/cmd/go/go_test.go
+ # Remove the timezone naming test
+ sed -i '/TestLoadFixed/areturn' src/time/time_test.go
+ # Remove disable setgid test
+ sed -i '/TestRespectSetgidDir/areturn' src/cmd/go/internal/work/build_test.go
+ # Remove cert tests that conflict with NixOS's cert resolution
+ sed -i '/TestEnvVars/areturn' src/crypto/x509/root_unix_test.go
+ # TestWritevError hangs sometimes
+ sed -i '/TestWritevError/areturn' src/net/writev_test.go
+ # TestVariousDeadlines fails sometimes
+ sed -i '/TestVariousDeadlines/areturn' src/net/timeout_test.go
+
+ sed -i 's,/etc/protocols,${iana-etc}/etc/protocols,' src/net/lookup_unix.go
+ sed -i 's,/etc/services,${iana-etc}/etc/services,' src/net/port_unix.go
+
+ # Disable cgo lookup tests not works, they depend on resolver
+ rm src/net/cgo_unix_test.go
+
+ '' + optionalString stdenv.isLinux ''
+ sed -i 's,/usr/share/zoneinfo/,${tzdata}/share/zoneinfo/,' src/time/zoneinfo_unix.go
+ '' + optionalString stdenv.isAarch32 ''
+ echo '#!${runtimeShell}' > misc/cgo/testplugin/test.bash
+ '' + optionalString stdenv.isDarwin ''
+ substituteInPlace src/race.bash --replace \
+ "sysctl machdep.cpu.extfeatures | grep -qv EM64T" true
+ sed -i 's,strings.Contains(.*sysctl.*,true {,' src/cmd/dist/util.go
+ sed -i 's,"/etc","'"$TMPDIR"'",' src/os/os_test.go
+ sed -i 's,/_go_os_test,'"$TMPDIR"'/_go_os_test,' src/os/path_test.go
+
+ sed -i '/TestChdirAndGetwd/areturn' src/os/os_test.go
+ sed -i '/TestCredentialNoSetGroups/areturn' src/os/exec/exec_posix_test.go
+ sed -i '/TestRead0/areturn' src/os/os_test.go
+ sed -i '/TestSystemRoots/areturn' src/crypto/x509/root_darwin_test.go
+
+ sed -i '/TestGoInstallRebuildsStalePackagesInOtherGOPATH/areturn' src/cmd/go/go_test.go
+ sed -i '/TestBuildDashIInstallsDependencies/areturn' src/cmd/go/go_test.go
+
+ sed -i '/TestDisasmExtld/areturn' src/cmd/objdump/objdump_test.go
+
+ sed -i 's/unrecognized/unknown/' src/cmd/link/internal/ld/lib.go
+
+ # TestCurrent fails because Current is not implemented on Darwin
+ sed -i 's/TestCurrent/testCurrent/g' src/os/user/user_test.go
+ sed -i 's/TestLookup/testLookup/g' src/os/user/user_test.go
+
+ touch $TMPDIR/group $TMPDIR/hosts $TMPDIR/passwd
+ '';
+
+ patches = [
+ ./remove-tools-1.11.patch
+ ./remove-test-pie.patch
+ ./creds-test.patch
+ ./go-1.9-skip-flaky-19608.patch
+ ./go-1.9-skip-flaky-20072.patch
+ ./skip-external-network-tests.patch
+ ./skip-nohup-tests.patch
+ # breaks under load: https://github.com/golang/go/issues/25628
+ ./skip-test-extra-files-on-386.patch
+ ];
+
+ postPatch = ''
+ find . -name '*.orig' -exec rm {} ';'
+ '' + optionalString stdenv.isDarwin ''
+ echo "substitute hardcoded dsymutil with ${llvm}/bin/llvm-dsymutil"
+ substituteInPlace "src/cmd/link/internal/ld/lib.go" --replace dsymutil ${llvm}/bin/llvm-dsymutil
+ '';
+
+ GOOS = stdenv.targetPlatform.parsed.kernel.name;
+ GOARCH = goarch stdenv.targetPlatform;
+ # GOHOSTOS/GOHOSTARCH must match the building system, not the host system.
+ # Go will nevertheless build a for host system that we will copy over in
+ # the install phase.
+ GOHOSTOS = stdenv.buildPlatform.parsed.kernel.name;
+ GOHOSTARCH = goarch stdenv.buildPlatform;
+
+ # {CC,CXX}_FOR_TARGET must be only set for cross compilation case as go expect those
+ # to be different from CC/CXX
+ CC_FOR_TARGET = if (stdenv.hostPlatform != stdenv.targetPlatform) then
+ "${targetPackages.stdenv.cc}/bin/${targetPackages.stdenv.cc.targetPrefix}cc"
+ else if (stdenv.buildPlatform != stdenv.targetPlatform) then
+ "${stdenv.cc.targetPrefix}cc"
+ else
+ null;
+ CXX_FOR_TARGET = if (stdenv.hostPlatform != stdenv.targetPlatform) then
+ "${targetPackages.stdenv.cc}/bin/${targetPackages.stdenv.cc.targetPrefix}c++"
+ else if (stdenv.buildPlatform != stdenv.targetPlatform) then
+ "${stdenv.cc.targetPrefix}c++"
+ else
+ null;
+
+ GOARM = toString (stdenv.lib.intersectLists [(stdenv.hostPlatform.parsed.cpu.version or "")] ["5" "6" "7"]);
+ GO386 = 387; # from Arch: don't assume sse2 on i686
+ CGO_ENABLED = 1;
+ # Hopefully avoids test timeouts on Hydra
+ GO_TEST_TIMEOUT_SCALE = 3;
+
+ # Indicate that we are running on build infrastructure
+ # Some tests assume things like home directories and users exists
+ GO_BUILDER_NAME = "nix";
+
+ GOROOT_BOOTSTRAP="${goBootstrap}/share/go";
+
+ postConfigure = ''
+ export GOCACHE=$TMPDIR/go-cache
+ # this is compiled into the binary
+ export GOROOT_FINAL=$out/share/go
+
+ export PATH=$(pwd)/bin:$PATH
+
+ # Independent from host/target, CC should produce code for the building system.
+ export CC=${buildPackages.stdenv.cc}/bin/cc
+ ulimit -a
+ '';
+
+ postBuild = ''
+ (cd src && ./make.bash)
+ '';
+
+ doCheck = stdenv.hostPlatform == stdenv.targetPlatform;
+
+ checkPhase = ''
+ runHook preCheck
+ (cd src && HOME=$TMPDIR GOCACHE=$TMPDIR/go-cache ./run.bash --no-rebuild)
+ runHook postCheck
+ '';
+
+ preInstall = ''
+ rm -r pkg/{bootstrap,obj}
+ # Contains the wrong perl shebang when cross compiling,
+ # since it is not used for anything we can deleted as well.
+ rm src/regexp/syntax/make_perl_groups.pl
+ '' + (if (stdenv.buildPlatform != stdenv.hostPlatform) then ''
+ mv bin/*_*/* bin
+ rmdir bin/*_*
+ ${optionalString (!(GOHOSTARCH == GOARCH && GOOS == GOHOSTOS)) ''
+ rm -rf pkg/${GOHOSTOS}_${GOHOSTARCH} pkg/tool/${GOHOSTOS}_${GOHOSTARCH}
+ ''}
+ '' else if (stdenv.hostPlatform != stdenv.targetPlatform) then ''
+ rm -rf bin/*_*
+ ${optionalString (!(GOHOSTARCH == GOARCH && GOOS == GOHOSTOS)) ''
+ rm -rf pkg/${GOOS}_${GOARCH} pkg/tool/${GOOS}_${GOARCH}
+ ''}
+ '' else "");
+
+ installPhase = ''
+ runHook preInstall
+ mkdir -p $GOROOT_FINAL
+ cp -a bin pkg src lib misc api doc $GOROOT_FINAL
+ ln -s $GOROOT_FINAL/bin $out/bin
+ runHook postInstall
+ '';
+
+ setupHook = ./setup-hook.sh;
+
+ disallowedReferences = [ goBootstrap ];
+
+ meta = with stdenv.lib; {
+ branch = "1.12";
+ homepage = http://golang.org/;
+ description = "The Go Programming language";
+ license = licenses.bsd3;
+ maintainers = with maintainers; [ cstrahan orivej velovix mic92 ];
+ platforms = platforms.linux ++ platforms.darwin;
+ };
+}
diff --git a/pkgs/development/compilers/julia/0002-use-system-suitesparse.patch b/pkgs/development/compilers/julia/0002-use-system-suitesparse.patch
deleted file mode 100644
index 17f49ad5ca9..00000000000
--- a/pkgs/development/compilers/julia/0002-use-system-suitesparse.patch
+++ /dev/null
@@ -1,25 +0,0 @@
-From e2b0ed6664fe4adfd0f9ce8fa14732d47b30ab5c Mon Sep 17 00:00:00 2001
-From: Thomas Tuegel
-Date: Sat, 10 Oct 2015 16:18:53 -0500
-Subject: [PATCH 2/3] use system suitesparse
-
----
- base/sparse/cholmod.jl | 2 +-
- 1 file changed, 1 insertion(+), 1 deletion(-)
-
-diff --git a/base/sparse/cholmod.jl b/base/sparse/cholmod.jl
-index ec7e980..f834cc1 100644
---- a/base/sparse/cholmod.jl
-+++ b/base/sparse/cholmod.jl
-@@ -151,7 +151,7 @@ function __init__()
-
- # Register gc tracked allocator if CHOLMOD is new enough
- if current_version >= v"3.0.0"
-- cnfg = cglobal((:SuiteSparse_config, :libsuitesparseconfig), Ptr{Void})
-+ cnfg = cglobal((:SuiteSparse_config, :libsuitesparse), Ptr{Void})
- unsafe_store!(cnfg, cglobal(:jl_malloc, Ptr{Void}), 1)
- unsafe_store!(cnfg, cglobal(:jl_calloc, Ptr{Void}), 2)
- unsafe_store!(cnfg, cglobal(:jl_realloc, Ptr{Void}), 3)
---
-2.5.2
-
diff --git a/pkgs/development/compilers/julia/default.nix b/pkgs/development/compilers/julia/default.nix
deleted file mode 100644
index 4c0b1359bd8..00000000000
--- a/pkgs/development/compilers/julia/default.nix
+++ /dev/null
@@ -1,201 +0,0 @@
-{ stdenv, fetchurl, fetchzip
-# build tools
-, gfortran, m4, makeWrapper, patchelf, perl, which, python2
-# libjulia dependencies
-, libunwind, readline, utf8proc, zlib
-, llvm
-# standard library dependencies
-, curl, fftwSinglePrec, fftw, gmp, libgit2, mpfr, openlibm, openspecfun, pcre2
-# linear algebra
-, openblas, arpack, suitesparse
-# Darwin frameworks
-, CoreServices, ApplicationServices
-}:
-
-with stdenv.lib;
-
-# All dependencies must use the same OpenBLAS.
-let
- arpack_ = arpack;
- suitesparse_ = suitesparse;
-in
-let
- arpack = arpack_.override { inherit openblas; };
- suitesparse = suitesparse_.override { inherit openblas; };
-in
-
-let
- dsfmtVersion = "2.2.3";
- dsfmt = fetchurl {
- url = "http://www.math.sci.hiroshima-u.ac.jp/~m-mat/MT/SFMT/dSFMT-src-${dsfmtVersion}.tar.gz";
- sha256 = "03kaqbjbi6viz0n33dk5jlf6ayxqlsq4804n7kwkndiga9s4hd42";
- };
-
- libuvVersion = "d8ab1c6a33e77bf155facb54215dd8798e13825d";
- libuv = fetchurl {
- url = "https://api.github.com/repos/JuliaLang/libuv/tarball/${libuvVersion}";
- sha256 = "0q5ahc9dzca2yc6cjbhpfi9nwc4yhhjbgxgsychksn13d24gv7ba";
- };
-
- rmathVersion = "0.1";
- rmath-julia = fetchurl {
- url = "https://api.github.com/repos/JuliaLang/Rmath-julia/tarball/v${rmathVersion}";
- sha256 = "1qyps217175qhid46l8f5i1v8i82slgp23ia63x2hzxwfmx8617p";
- };
-
- virtualenvVersion = "15.0.0";
- virtualenv = fetchurl {
- url = "mirror://pypi/v/virtualenv/virtualenv-${virtualenvVersion}.tar.gz";
- sha256 = "06fw4liazpx5vf3am45q2pdiwrv0id7ckv7n6zmpml29x6vkzmkh";
- };
-
- majorVersion = "0";
- minorVersion = "6";
- maintenanceVersion = "4";
- version = "${majorVersion}.${minorVersion}.${maintenanceVersion}";
-in
-
-stdenv.mkDerivation rec {
- pname = "julia";
- inherit version;
- name = "${pname}-${version}";
-
- src = fetchzip {
- url = "https://github.com/JuliaLang/${pname}/releases/download/v${version}/${name}.tar.gz";
- sha256 = "09axkkj914al7lzvcvhb33hz5wp083lk18llsvrn622fqhmyqabl";
- };
- prePatch = ''
- mkdir deps/srccache
- cp "${dsfmt}" "./deps/srccache/dsfmt-${dsfmtVersion}.tar.gz"
- cp "${rmath-julia}" "./deps/srccache/Rmath-julia-${rmathVersion}.tar.gz"
- cp "${libuv}" "./deps/srccache/libuv-${libuvVersion}.tar.gz"
- cp "${virtualenv}" "./deps/srccache/virtualenv-${virtualenvVersion}.tar.gz"
- '';
-
- patches = [
- ./0001.1-use-system-utf8proc.patch
- ./0002-use-system-suitesparse.patch
- ];
-
- postPatch = ''
- patchShebangs . contrib
- for i in backtrace replutil cmdlineargs compile; do
- mv test/$i.jl{,.off}
- touch test/$i.jl
- done
-
- sed -e 's/Invalid Content-Type:/invalid Content-Type:/g' -i test/libgit2.jl
- sed -e 's/Failed to resolve /failed to resolve /g' -i test/libgit2.jl
- '';
-
- buildInputs = [
- arpack fftw fftwSinglePrec gmp libgit2 libunwind mpfr
- pcre2.dev openblas openlibm openspecfun readline suitesparse utf8proc
- zlib llvm
- ]
- ++ stdenv.lib.optionals stdenv.isDarwin [CoreServices ApplicationServices]
- ;
-
- nativeBuildInputs = [ curl gfortran m4 makeWrapper patchelf perl python2 which ];
-
- makeFlags =
- let
- arch = head (splitString "-" stdenv.hostPlatform.system);
- march = { "x86_64" = "x86-64"; "i686" = "pentium4"; }."${arch}"
- or (throw "unsupported architecture: ${arch}");
- # Julia requires Pentium 4 (SSE2) or better
- cpuTarget = { "x86_64" = "x86-64"; "i686" = "pentium4"; }."${arch}"
- or (throw "unsupported architecture: ${arch}");
- in [
- "ARCH=${arch}"
- "MARCH=${march}"
- "JULIA_CPU_TARGET=${cpuTarget}"
- "PREFIX=$(out)"
- "prefix=$(out)"
- "SHELL=${stdenv.shell}"
-
- "USE_SYSTEM_BLAS=1"
- "USE_BLAS64=${if openblas.blas64 then "1" else "0"}"
- "LIBBLAS=-lopenblas"
- "LIBBLASNAME=libopenblas"
-
- "USE_SYSTEM_LAPACK=1"
- "LIBLAPACK=-lopenblas"
- "LIBLAPACKNAME=libopenblas"
-
- "USE_SYSTEM_SUITESPARSE=1"
- "SUITESPARSE_LIB=-lsuitesparse"
- "SUITESPARSE_INC=-I${suitesparse}/include"
-
- "USE_SYSTEM_ARPACK=1"
- "USE_SYSTEM_FFTW=1"
- "USE_SYSTEM_GMP=1"
- "USE_SYSTEM_LIBGIT2=1"
- "USE_SYSTEM_LIBUNWIND=1"
-
- "USE_SYSTEM_LLVM=1"
- "LLVM_VER=3.9.1"
-
- "USE_SYSTEM_MPFR=1"
- "USE_SYSTEM_OPENLIBM=1"
- "USE_SYSTEM_OPENSPECFUN=1"
- "USE_SYSTEM_PATCHELF=1"
- "USE_SYSTEM_PCRE=1"
- "PCRE_CONFIG=${pcre2.dev}/bin/pcre2-config"
- "PCRE_INCL_PATH=${pcre2.dev}/include/pcre2.h"
- "USE_SYSTEM_READLINE=1"
- "USE_SYSTEM_UTF8PROC=1"
- "USE_SYSTEM_ZLIB=1"
- ];
-
- NIX_CFLAGS_COMPILE = [ "-fPIC" ];
-
- LD_LIBRARY_PATH = makeLibraryPath [
- arpack fftw fftwSinglePrec gmp libgit2 mpfr openblas openlibm
- openspecfun pcre2 suitesparse llvm
- ];
-
- dontStrip = true;
- dontPatchELF = true;
-
- enableParallelBuilding = true;
-
- doCheck = !stdenv.isDarwin;
- checkTarget = "testall";
- # Julia's tests require read/write access to $HOME
- preCheck = ''
- export HOME="$NIX_BUILD_TOP"
- '';
-
- preBuild = ''
- sed -e '/^install:/s@[^ ]*/doc/[^ ]*@@' -i Makefile
- sed -e '/[$](DESTDIR)[$](docdir)/d' -i Makefile
- export LD_LIBRARY_PATH=${LD_LIBRARY_PATH}
- '';
-
- postInstall = ''
- # Symlink shared libraries from LD_LIBRARY_PATH into lib/julia,
- # as using a wrapper with LD_LIBRARY_PATH causes segmentation
- # faults when program returns an error:
- # $ julia -e 'throw(Error())'
- find $(echo $LD_LIBRARY_PATH | sed 's|:| |g') -maxdepth 1 -name '*.${if stdenv.isDarwin then "dylib" else "so"}*' | while read lib; do
- if [[ ! -e $out/lib/julia/$(basename $lib) ]]; then
- ln -sv $lib $out/lib/julia/$(basename $lib)
- fi
- done
- '';
-
- passthru = {
- inherit majorVersion minorVersion maintenanceVersion;
- site = "share/julia/site/v${majorVersion}.${minorVersion}";
- };
-
- meta = {
- description = "High-level performance-oriented dynamical language for technical computing";
- homepage = https://julialang.org/;
- license = stdenv.lib.licenses.mit;
- maintainers = with stdenv.lib.maintainers; [ raskin ];
- platforms = [ "i686-linux" "x86_64-linux" "x86_64-darwin" ];
- broken = stdenv.isi686;
- };
-}
diff --git a/pkgs/development/compilers/llvm/8/bintools.nix b/pkgs/development/compilers/llvm/8/bintools.nix
new file mode 100644
index 00000000000..72a2a733193
--- /dev/null
+++ b/pkgs/development/compilers/llvm/8/bintools.nix
@@ -0,0 +1,19 @@
+{ runCommand, stdenv, llvm, lld, version }:
+
+let
+ prefix =
+ if stdenv.hostPlatform != stdenv.targetPlatform
+ then "${stdenv.targetPlatform.config}-"
+ else "";
+in runCommand "llvm-binutils-${version}" { preferLocalBuild = true; } ''
+ mkdir -p $out/bin
+ for prog in ${lld}/bin/*; do
+ ln -s $prog $out/bin/${prefix}$(basename $prog)
+ done
+ for prog in ${llvm}/bin/*; do
+ ln -s $prog $out/bin/${prefix}$(echo $(basename $prog) | sed -e "s|llvm-||")
+ ln -sf $prog $out/bin/${prefix}$(basename $prog)
+ done
+ rm -f $out/bin/${prefix}cat
+ ln -s ${lld}/bin/lld $out/bin/${prefix}ld
+''
diff --git a/pkgs/development/compilers/llvm/8/clang/default.nix b/pkgs/development/compilers/llvm/8/clang/default.nix
new file mode 100644
index 00000000000..ad630094261
--- /dev/null
+++ b/pkgs/development/compilers/llvm/8/clang/default.nix
@@ -0,0 +1,112 @@
+{ stdenv, fetch, cmake, libxml2, llvm, version, clang-tools-extra_src, python
+, fixDarwinDylibNames
+, enableManpages ? false
+, enablePolly ? false # TODO: get this info from llvm (passthru?)
+}:
+
+let
+ self = stdenv.mkDerivation ({
+ name = "clang-${version}";
+
+ unpackPhase = ''
+ unpackFile ${fetch "cfe" "0z5si83w0i3l445c7624204mxsv82naps96icnv7v20s6njbsbsi"}
+ mv cfe-${version}* clang
+ sourceRoot=$PWD/clang
+ unpackFile ${clang-tools-extra_src}
+ mv clang-tools-extra-* $sourceRoot/tools/extra
+ '';
+
+ nativeBuildInputs = [ cmake python ]
+ ++ stdenv.lib.optional enableManpages python.pkgs.sphinx;
+
+ buildInputs = [ libxml2 llvm ]
+ ++ stdenv.lib.optional stdenv.isDarwin fixDarwinDylibNames;
+
+ cmakeFlags = [
+ "-DCMAKE_CXX_FLAGS=-std=c++11"
+ ] ++ stdenv.lib.optionals enableManpages [
+ "-DCLANG_INCLUDE_DOCS=ON"
+ "-DLLVM_ENABLE_SPHINX=ON"
+ "-DSPHINX_OUTPUT_MAN=ON"
+ "-DSPHINX_OUTPUT_HTML=OFF"
+ "-DSPHINX_WARNINGS_AS_ERRORS=OFF"
+ ] ++ stdenv.lib.optionals enablePolly [
+ "-DWITH_POLLY=ON"
+ "-DLINK_POLLY_INTO_TOOLS=ON"
+ ];
+
+ patches = [ ./purity.patch ];
+
+ postPatch = ''
+ sed -i -e 's/DriverArgs.hasArg(options::OPT_nostdlibinc)/true/' \
+ -e 's/Args.hasArg(options::OPT_nostdlibinc)/true/' \
+ lib/Driver/ToolChains/*.cpp
+
+ # Patch for standalone doc building
+ sed -i '1s,^,find_package(Sphinx REQUIRED)\n,' docs/CMakeLists.txt
+ '' + stdenv.lib.optionalString stdenv.hostPlatform.isMusl ''
+ sed -i -e 's/lgcc_s/lgcc_eh/' lib/Driver/ToolChains/*.cpp
+ '' + stdenv.lib.optionalString stdenv.hostPlatform.isDarwin ''
+ substituteInPlace tools/extra/clangd/CMakeLists.txt \
+ --replace "NOT HAVE_CXX_ATOMICS64_WITHOUT_LIB" FALSE
+ '';
+
+ outputs = [ "out" "lib" "python" ];
+
+ # Clang expects to find LLVMgold in its own prefix
+ postInstall = ''
+ if [ -e ${llvm}/lib/LLVMgold.so ]; then
+ ln -sv ${llvm}/lib/LLVMgold.so $out/lib
+ fi
+
+ ln -sv $out/bin/clang $out/bin/cpp
+
+ # Move libclang to 'lib' output
+ moveToOutput "lib/libclang.*" "$lib"
+ substituteInPlace $out/lib/cmake/clang/ClangTargets-release.cmake \
+ --replace "\''${_IMPORT_PREFIX}/lib/libclang." "$lib/lib/libclang."
+
+ mkdir -p $python/bin $python/share/clang/
+ mv $out/bin/{git-clang-format,scan-view} $python/bin
+ if [ -e $out/bin/set-xcode-analyzer ]; then
+ mv $out/bin/set-xcode-analyzer $python/bin
+ fi
+ mv $out/share/clang/*.py $python/share/clang
+ rm $out/bin/c-index-test
+ '';
+
+ enableParallelBuilding = true;
+
+ passthru = {
+ isClang = true;
+ inherit llvm;
+ } // stdenv.lib.optionalAttrs (stdenv.targetPlatform.isLinux || (stdenv.cc.isGNU && stdenv.cc.cc ? gcc)) {
+ gcc = if stdenv.cc.isGNU then stdenv.cc.cc else stdenv.cc.cc.gcc;
+ };
+
+ meta = {
+ description = "A c, c++, objective-c, and objective-c++ frontend for the llvm compiler";
+ homepage = http://llvm.org/;
+ license = stdenv.lib.licenses.ncsa;
+ platforms = stdenv.lib.platforms.all;
+ };
+ } // stdenv.lib.optionalAttrs enableManpages {
+ name = "clang-manpages-${version}";
+
+ buildPhase = ''
+ make docs-clang-man
+ '';
+
+ installPhase = ''
+ mkdir -p $out/share/man/man1
+ # Manually install clang manpage
+ cp docs/man/*.1 $out/share/man/man1/
+ '';
+
+ outputs = [ "out" ];
+
+ doCheck = false;
+
+ meta.description = "man page for Clang ${version}";
+ });
+in self
diff --git a/pkgs/development/compilers/llvm/8/clang/purity.patch b/pkgs/development/compilers/llvm/8/clang/purity.patch
new file mode 100644
index 00000000000..b30d0d0b5d5
--- /dev/null
+++ b/pkgs/development/compilers/llvm/8/clang/purity.patch
@@ -0,0 +1,30 @@
+From 4add81bba40dcec62c4ea4481be8e35ac53e89d8 Mon Sep 17 00:00:00 2001
+From: Will Dietz
+Date: Thu, 18 May 2017 11:56:12 -0500
+Subject: [PATCH] "purity" patch for 5.0
+
+---
+ lib/Driver/ToolChains/Gnu.cpp | 7 -------
+ 1 file changed, 7 deletions(-)
+
+diff --git a/lib/Driver/ToolChains/Gnu.cpp b/lib/Driver/ToolChains/Gnu.cpp
+index fe3c0191bb..c6a482bece 100644
+--- a/lib/Driver/ToolChains/Gnu.cpp
++++ b/lib/Driver/ToolChains/Gnu.cpp
+@@ -494,13 +494,6 @@ void tools::gnutools::Linker::ConstructJob(Compilation &C, const JobAction &JA,
+ if (!Args.hasArg(options::OPT_static)) {
+ if (Args.hasArg(options::OPT_rdynamic))
+ CmdArgs.push_back("-export-dynamic");
+-
+- if (!Args.hasArg(options::OPT_shared)) {
+- const std::string Loader =
+- D.DyldPrefix + ToolChain.getDynamicLinker(Args);
+- CmdArgs.push_back("-dynamic-linker");
+- CmdArgs.push_back(Args.MakeArgString(Loader));
+- }
+ }
+
+ CmdArgs.push_back("-o");
+--
+2.11.0
+
diff --git a/pkgs/development/compilers/llvm/8/compiler-rt-clock_gettime.patch b/pkgs/development/compilers/llvm/8/compiler-rt-clock_gettime.patch
new file mode 100644
index 00000000000..f9323ed95c0
--- /dev/null
+++ b/pkgs/development/compilers/llvm/8/compiler-rt-clock_gettime.patch
@@ -0,0 +1,74 @@
+commit f00c7bccf7955b7dfbb4859fd9019e9eb3349f2d
+Author: Tobias Mayer
+Date: Wed Feb 13 12:44:17 2019 +0100
+
+ Provide clock_gettime for xray on macos < 10.12
+
+diff --git a/lib/xray/xray_basic_logging.cc b/lib/xray/xray_basic_logging.cc
+index a46c151af..38aea6932 100644
+--- a/lib/xray/xray_basic_logging.cc
++++ b/lib/xray/xray_basic_logging.cc
+@@ -36,6 +36,29 @@
+ #include "xray_tsc.h"
+ #include "xray_utils.h"
+
++#if __MACH__
++#include
++#include
++enum clockid_t {
++ CLOCK_MONOTONIC = REALTIME_CLOCK,
++ CLOCK_REALTIME = REALTIME_CLOCK
++};
++
++int clock_gettime(clockid_t clock_id, struct timespec *ts) {
++ if (ts != NULL) {
++ clock_serv_t cclock;
++ mach_timespec_t mts;
++ host_get_clock_service(mach_host_self(), clock_id, &cclock);
++ clock_get_time(cclock, &mts);
++ mach_port_deallocate(mach_task_self(), cclock);
++ ts->tv_sec = mts.tv_sec;
++ ts->tv_nsec = mts.tv_nsec;
++ return 0;
++ }
++ return -1;
++}
++#endif
++
+ namespace __xray {
+
+ SpinMutex LogMutex;
+diff --git a/lib/xray/xray_fdr_logging.cc b/lib/xray/xray_fdr_logging.cc
+index 4b308b27f..1d044c8fd 100644
+--- a/lib/xray/xray_fdr_logging.cc
++++ b/lib/xray/xray_fdr_logging.cc
+@@ -38,6 +38,29 @@
+ #include "xray_tsc.h"
+ #include "xray_utils.h"
+
++#if __MACH__
++#include
++#include
++enum clockid_t {
++ CLOCK_MONOTONIC = REALTIME_CLOCK,
++ CLOCK_REALTIME = REALTIME_CLOCK
++};
++
++int clock_gettime(clockid_t clock_id, struct timespec *ts) {
++ if (ts != NULL) {
++ clock_serv_t cclock;
++ mach_timespec_t mts;
++ host_get_clock_service(mach_host_self(), clock_id, &cclock);
++ clock_get_time(cclock, &mts);
++ mach_port_deallocate(mach_task_self(), cclock);
++ ts->tv_sec = mts.tv_sec;
++ ts->tv_nsec = mts.tv_nsec;
++ return 0;
++ }
++ return -1;
++}
++#endif
++
+ namespace __xray {
+
+ atomic_sint32_t LoggingStatus = {XRayLogInitStatus::XRAY_LOG_UNINITIALIZED};
diff --git a/pkgs/development/compilers/llvm/8/compiler-rt-codesign.patch b/pkgs/development/compilers/llvm/8/compiler-rt-codesign.patch
new file mode 100644
index 00000000000..3cc12b94b20
--- /dev/null
+++ b/pkgs/development/compilers/llvm/8/compiler-rt-codesign.patch
@@ -0,0 +1,33 @@
+From 3dec5f3475a26aeb4678627795c4b67c6b7b4785 Mon Sep 17 00:00:00 2001
+From: Will Dietz
+Date: Tue, 19 Sep 2017 13:13:06 -0500
+Subject: [PATCH] remove codesign use on Apple, disable ios sim testing that
+ needs it
+
+---
+ cmake/Modules/AddCompilerRT.cmake | 8 ------
+ test/asan/CMakeLists.txt | 52 ---------------------------------------
+ test/tsan/CMakeLists.txt | 47 -----------------------------------
+ 3 files changed, 107 deletions(-)
+
+diff --git a/cmake/Modules/AddCompilerRT.cmake b/cmake/Modules/AddCompilerRT.cmake
+index bc5fb9ff7..b64eb4246 100644
+--- a/cmake/Modules/AddCompilerRT.cmake
++++ b/cmake/Modules/AddCompilerRT.cmake
+@@ -210,14 +210,6 @@ function(add_compiler_rt_runtime name type)
+ set_target_properties(${libname} PROPERTIES IMPORT_PREFIX "")
+ set_target_properties(${libname} PROPERTIES IMPORT_SUFFIX ".lib")
+ endif()
+- if(APPLE)
+- # Ad-hoc sign the dylibs
+- add_custom_command(TARGET ${libname}
+- POST_BUILD
+- COMMAND codesign --sign - $
+- WORKING_DIRECTORY ${COMPILER_RT_LIBRARY_OUTPUT_DIR}
+- )
+- endif()
+ endif()
+ install(TARGETS ${libname}
+ ARCHIVE DESTINATION ${COMPILER_RT_LIBRARY_INSTALL_DIR}
+2.14.1
+
diff --git a/pkgs/development/compilers/llvm/8/compiler-rt.nix b/pkgs/development/compilers/llvm/8/compiler-rt.nix
new file mode 100644
index 00000000000..4e7df060e50
--- /dev/null
+++ b/pkgs/development/compilers/llvm/8/compiler-rt.nix
@@ -0,0 +1,61 @@
+{ stdenv, version, fetch, cmake, python, llvm, libcxxabi }:
+stdenv.mkDerivation rec {
+ name = "compiler-rt-${version}";
+ inherit version;
+ src = fetch "compiler-rt" "1rxa1rcn7r3yfn9cj0sx5gd90kslbd13q080rdyqb6jr9a9i1avb";
+
+ nativeBuildInputs = [ cmake python llvm ];
+ buildInputs = stdenv.lib.optional stdenv.hostPlatform.isDarwin libcxxabi;
+
+ cmakeFlags = [
+ "-DCOMPILER_RT_DEFAULT_TARGET_ONLY=ON"
+ "-DCMAKE_C_COMPILER_TARGET=${stdenv.hostPlatform.config}"
+ "-DCMAKE_ASM_COMPILER_TARGET=${stdenv.hostPlatform.config}"
+ ] ++ stdenv.lib.optional (stdenv.hostPlatform != stdenv.buildPlatform) [
+ "-DCMAKE_C_FLAGS=-nodefaultlibs"
+ "-DCMAKE_CXX_COMPILER_WORKS=ON"
+ "-DCOMPILER_RT_BUILD_SANITIZERS=OFF"
+ "-DCOMPILER_RT_BUILD_XRAY=OFF"
+ "-DCOMPILER_RT_BUILD_LIBFUZZER=OFF"
+ "-DCOMPILER_RT_BUILD_PROFILE=OFF"
+ "-DCOMPILER_RT_BAREMETAL_BUILD=ON"
+ "-DCMAKE_SIZEOF_VOID_P=${toString (stdenv.hostPlatform.parsed.cpu.bits / 8)}"
+ ];
+
+ outputs = [ "out" "dev" ];
+
+ patches = [
+ ./compiler-rt-codesign.patch # Revert compiler-rt commit that makes codesign mandatory
+ ] ++ stdenv.lib.optional stdenv.hostPlatform.isMusl ./sanitizers-nongnu.patch
+ ++ stdenv.lib.optional (stdenv.hostPlatform != stdenv.buildPlatform) ./crtbegin-and-end.patch
+ ++ stdenv.lib.optional stdenv.hostPlatform.isDarwin ./compiler-rt-clock_gettime.patch;
+
+ # TSAN requires XPC on Darwin, which we have no public/free source files for. We can depend on the Apple frameworks
+ # to get it, but they're unfree. Since LLVM is rather central to the stdenv, we patch out TSAN support so that Hydra
+ # can build this. If we didn't do it, basically the entire nixpkgs on Darwin would have an unfree dependency and we'd
+ # get no binary cache for the entire platform. If you really find yourself wanting the TSAN, make this controllable by
+ # a flag and turn the flag off during the stdenv build.
+ postPatch = stdenv.lib.optionalString stdenv.isDarwin ''
+ substituteInPlace cmake/config-ix.cmake \
+ --replace 'set(COMPILER_RT_HAS_TSAN TRUE)' 'set(COMPILER_RT_HAS_TSAN FALSE)'
+ '' + stdenv.lib.optionalString (stdenv.hostPlatform != stdenv.buildPlatform) ''
+ substituteInPlace lib/builtins/int_util.c \
+ --replace "#include " ""
+ substituteInPlace lib/builtins/clear_cache.c \
+ --replace "#include " ""
+ substituteInPlace lib/builtins/cpu_model.c \
+ --replace "#include " ""
+ '';
+
+ # Hack around weird upsream RPATH bug
+ postInstall = stdenv.lib.optionalString stdenv.isDarwin ''
+ ln -s "$out/lib"/*/* "$out/lib"
+ '' + stdenv.lib.optionalString (stdenv.hostPlatform != stdenv.buildPlatform) ''
+ ln -s $out/lib/*/clang_rt.crtbegin-*.o $out/lib/crtbegin.o
+ ln -s $out/lib/*/cclang_rt.crtend-*.o $out/lib/crtend.o
+ ln -s $out/lib/*/clang_rt.crtbegin_shared-*.o $out/lib/crtbeginS.o
+ ln -s $out/lib/*/clang_rt.crtend_shared-*.o $out/lib/crtendS.o
+ '';
+
+ enableParallelBuilding = true;
+}
diff --git a/pkgs/development/compilers/llvm/8/crtbegin-and-end.patch b/pkgs/development/compilers/llvm/8/crtbegin-and-end.patch
new file mode 100644
index 00000000000..032b04708d1
--- /dev/null
+++ b/pkgs/development/compilers/llvm/8/crtbegin-and-end.patch
@@ -0,0 +1,595 @@
+Get crtbegin and crtend without compiler GCC! PR is at https://reviews.llvm.org/D28791
+
+Index: compiler-rt/CMakeLists.txt
+===================================================================
+--- compiler-rt/CMakeLists.txt
++++ compiler-rt/CMakeLists.txt
+@@ -29,6 +29,8 @@
+
+ option(COMPILER_RT_BUILD_BUILTINS "Build builtins" ON)
+ mark_as_advanced(COMPILER_RT_BUILD_BUILTINS)
++option(COMPILER_RT_BUILD_CRT "Build crtbegin.o/crtend.o" ON)
++mark_as_advanced(COMPILER_RT_BUILD_CRT)
+ option(COMPILER_RT_BUILD_SANITIZERS "Build sanitizers" ON)
+ mark_as_advanced(COMPILER_RT_BUILD_SANITIZERS)
+ option(COMPILER_RT_BUILD_XRAY "Build xray" ON)
+Index: compiler-rt/cmake/Modules/AddCompilerRT.cmake
+===================================================================
+--- compiler-rt/cmake/Modules/AddCompilerRT.cmake
++++ compiler-rt/cmake/Modules/AddCompilerRT.cmake
+@@ -132,7 +132,7 @@
+ # Adds static or shared runtime for a list of architectures and operating
+ # systems and puts it in the proper directory in the build and install trees.
+ # add_compiler_rt_runtime(
+-# {STATIC|SHARED}
++# {OBJECT|STATIC|SHARED}
+ # ARCHS
+ # OS
+ # SOURCES
+@@ -144,8 +144,8 @@
+ # PARENT_TARGET
+ # ADDITIONAL_HEADERS )
+ function(add_compiler_rt_runtime name type)
+- if(NOT type MATCHES "^(STATIC|SHARED)$")
+- message(FATAL_ERROR "type argument must be STATIC or SHARED")
++ if(NOT type MATCHES "^(OBJECT|STATIC|SHARED)$")
++ message(FATAL_ERROR "type argument must be OBJECT, STATIC or SHARED")
+ return()
+ endif()
+ cmake_parse_arguments(LIB
+@@ -204,7 +204,10 @@
+ message(FATAL_ERROR "Architecture ${arch} can't be targeted")
+ return()
+ endif()
+- if(type STREQUAL "STATIC")
++ if(type STREQUAL "OBJECT")
++ set(libname "${name}-${arch}")
++ set(output_name_${libname} ${libname}${COMPILER_RT_OS_SUFFIX})
++ elseif(type STREQUAL "STATIC")
+ set(libname "${name}-${arch}")
+ set_output_name(output_name_${libname} ${name} ${arch})
+ else()
+@@ -270,12 +273,34 @@
+ set(COMPONENT_OPTION COMPONENT ${libname})
+ endif()
+
+- add_library(${libname} ${type} ${sources_${libname}})
+- set_target_compile_flags(${libname} ${extra_cflags_${libname}})
+- set_target_link_flags(${libname} ${extra_link_flags_${libname}})
+- set_property(TARGET ${libname} APPEND PROPERTY
+- COMPILE_DEFINITIONS ${LIB_DEFS})
+- set_target_output_directories(${libname} ${output_dir_${libname}})
++ if(type STREQUAL "OBJECT")
++ string(TOUPPER ${CMAKE_BUILD_TYPE} config)
++ get_property(cflags SOURCE ${sources_${libname}} PROPERTY COMPILE_FLAGS)
++ separate_arguments(cflags)
++ add_custom_command(
++ OUTPUT ${output_dir_${libname}}/${libname}.o
++ COMMAND ${CMAKE_C_COMPILER} ${sources_${libname}} ${cflags} ${extra_cflags_${libname}} -c -o ${output_dir_${libname}}/${libname}.o
++ DEPENDS ${sources_${libname}}
++ COMMENT "Building C object ${libname}.o")
++ add_custom_target(${libname} DEPENDS ${output_dir_${libname}}/${libname}.o)
++ install(FILES ${output_dir_${libname}}/${libname}.o
++ DESTINATION ${install_dir_${libname}}
++ ${COMPONENT_OPTION})
++ else()
++ add_library(${libname} ${type} ${sources_${libname}})
++ set_target_compile_flags(${libname} ${extra_cflags_${libname}})
++ set_target_link_flags(${libname} ${extra_link_flags_${libname}})
++ set_property(TARGET ${libname} APPEND PROPERTY
++ COMPILE_DEFINITIONS ${LIB_DEFS})
++ set_target_output_directories(${libname} ${output_dir_${libname}})
++ install(TARGETS ${libname}
++ ARCHIVE DESTINATION ${install_dir_${libname}}
++ ${COMPONENT_OPTION}
++ LIBRARY DESTINATION ${install_dir_${libname}}
++ ${COMPONENT_OPTION}
++ RUNTIME DESTINATION ${install_dir_${libname}}
++ ${COMPONENT_OPTION})
++ endif()
+ set_target_properties(${libname} PROPERTIES
+ OUTPUT_NAME ${output_name_${libname}})
+ set_target_properties(${libname} PROPERTIES FOLDER "Compiler-RT Runtime")
+@@ -299,13 +324,6 @@
+ )
+ endif()
+ endif()
+- install(TARGETS ${libname}
+- ARCHIVE DESTINATION ${install_dir_${libname}}
+- ${COMPONENT_OPTION}
+- LIBRARY DESTINATION ${install_dir_${libname}}
+- ${COMPONENT_OPTION}
+- RUNTIME DESTINATION ${install_dir_${libname}}
+- ${COMPONENT_OPTION})
+
+ # We only want to generate per-library install targets if you aren't using
+ # an IDE because the extra targets get cluttered in IDEs.
+Index: compiler-rt/cmake/config-ix.cmake
+===================================================================
+--- compiler-rt/cmake/config-ix.cmake
++++ compiler-rt/cmake/config-ix.cmake
+@@ -227,6 +227,7 @@
+ ${ARM32} ${ARM64} ${MIPS32} ${MIPS64} ${S390X})
+ set(ALL_ASAN_SUPPORTED_ARCH ${X86} ${X86_64} ${ARM32} ${ARM64}
+ ${MIPS32} ${MIPS64} ${PPC64} ${S390X})
++set(ALL_CRT_SUPPORTED_ARCH ${X86} ${X86_64} ${ARM32} ${ARM64})
+ set(ALL_DFSAN_SUPPORTED_ARCH ${X86_64} ${MIPS64} ${ARM64})
+ set(ALL_FUZZER_SUPPORTED_ARCH ${X86_64} ${ARM64})
+
+@@ -474,6 +475,7 @@
+ SANITIZER_COMMON_SUPPORTED_ARCH)
+
+ else()
++ filter_available_targets(CRT_SUPPORTED_ARCH ${ALL_CRT_SUPPORTED_ARCH})
+ # Architectures supported by compiler-rt libraries.
+ filter_available_targets(SANITIZER_COMMON_SUPPORTED_ARCH
+ ${ALL_SANITIZER_COMMON_SUPPORTED_ARCH})
+@@ -563,6 +565,12 @@
+
+ # TODO: Add builtins support.
+
++if (CRT_SUPPORTED_ARCH AND OS_NAME MATCHES "Linux")
++ set(COMPILER_RT_HAS_CRT TRUE)
++else()
++ set(COMPILER_RT_HAS_CRT FALSE)
++endif()
++
+ if (COMPILER_RT_HAS_SANITIZER_COMMON AND DFSAN_SUPPORTED_ARCH AND
+ OS_NAME MATCHES "Linux")
+ set(COMPILER_RT_HAS_DFSAN TRUE)
+Index: compiler-rt/lib/CMakeLists.txt
+===================================================================
+--- compiler-rt/lib/CMakeLists.txt
++++ compiler-rt/lib/CMakeLists.txt
+@@ -17,6 +17,10 @@
+ add_subdirectory(builtins)
+ endif()
+
++if(COMPILER_RT_BUILD_CRT)
++ add_subdirectory(crt)
++endif()
++
+ function(compiler_rt_build_runtime runtime)
+ string(TOUPPER ${runtime} runtime_uppercase)
+ if(COMPILER_RT_HAS_${runtime_uppercase})
+Index: compiler-rt/lib/crt/CMakeLists.txt
+===================================================================
+--- /dev/null
++++ compiler-rt/lib/crt/CMakeLists.txt
+@@ -0,0 +1,101 @@
++add_compiler_rt_component(crt)
++
++function(check_cxx_section_exists section output)
++ cmake_parse_arguments(ARG "" "" "SOURCE;FLAGS" ${ARGN})
++ if(NOT ARG_SOURCE)
++ set(ARG_SOURCE "int main() { return 0; }\n")
++ endif()
++
++ string(RANDOM TARGET_NAME)
++ set(TARGET_NAME "${CMAKE_BINARY_DIR}${CMAKE_FILES_DIRECTORY}/cmTC_${TARGET_NAME}.dir")
++ file(MAKE_DIRECTORY ${TARGET_NAME})
++
++ file(WRITE "${TARGET_NAME}/CheckSectionExists.c" "${ARG_SOURCE}\n")
++
++ string(REGEX MATCHALL "<[A-Za-z0-9_]*>" substitutions
++ ${CMAKE_C_COMPILE_OBJECT})
++
++ set(try_compile_flags "${ARG_FLAGS}")
++ if(CMAKE_C_COMPILER_ID MATCHES Clang AND CMAKE_C_COMPILER_TARGET)
++ list(APPEND try_compile_flags "-target ${CMAKE_C_COMPILER_TARGET}")
++ endif()
++
++ string(REPLACE ";" " " extra_flags "${try_compile_flags}")
++
++ set(test_compile_command "${CMAKE_C_COMPILE_OBJECT}")
++ foreach(substitution ${substitutions})
++ if(substitution STREQUAL "")
++ string(REPLACE ""
++ "${CMAKE_C_COMPILER}" test_compile_command ${test_compile_command})
++ elseif(substitution STREQUAL "")
++ string(REPLACE "" "${TARGET_NAME}/CheckSectionExists.o"
++ test_compile_command ${test_compile_command})
++ elseif(substitution STREQUAL "")
++ string(REPLACE "" "${TARGET_NAME}/CheckSectionExists.c"
++ test_compile_command ${test_compile_command})
++ elseif(substitution STREQUAL "")
++ string(REPLACE "" "${CMAKE_C_FLAGS} ${extra_flags}"
++ test_compile_command ${test_compile_command})
++ else()
++ string(REPLACE "${substitution}" "" test_compile_command
++ ${test_compile_command})
++ endif()
++ endforeach()
++
++ string(REPLACE " " ";" test_compile_command "${test_compile_command}")
++
++ execute_process(
++ COMMAND ${test_compile_command}
++ RESULT_VARIABLE TEST_RESULT
++ OUTPUT_VARIABLE TEST_OUTPUT
++ ERROR_VARIABLE TEST_ERROR
++ )
++
++ execute_process(
++ COMMAND ${CMAKE_OBJDUMP} -h "${TARGET_NAME}/CheckSectionExists.o"
++ RESULT_VARIABLE CHECK_RESULT
++ OUTPUT_VARIABLE CHECK_OUTPUT
++ ERROR_VARIABLE CHECK_ERROR
++ )
++ string(FIND ${CHECK_OUTPUT} ${section} SECTION_FOUND)
++
++ if(NOT SECTION_FOUND EQUAL -1)
++ set(${output} TRUE PARENT_SCOPE)
++ else()
++ set(${output} FALSE PARENT_SCOPE)
++ endif()
++
++ file(REMOVE_RECURSE ${TARGET_NAME})
++endfunction()
++
++check_cxx_section_exists(".init_array" COMPILER_RT_HAS_INITFINI_ARRAY
++ SOURCE "__attribute__((constructor)) void f() {}\nint main() { return 0; }\n")
++
++append_list_if(COMPILER_RT_HAS_INITFINI_ARRAY -DCRT_HAS_INITFINI_ARRAY CRT_CFLAGS)
++
++foreach(arch ${CRT_SUPPORTED_ARCH})
++ add_compiler_rt_runtime(clang_rt.crtbegin
++ OBJECT
++ ARCHS ${arch}
++ SOURCES ${CMAKE_CURRENT_SOURCE_DIR}/crtbegin.c
++ CFLAGS ${CRT_CFLAGS}
++ PARENT_TARGET crt)
++ add_compiler_rt_runtime(clang_rt.crtbegin_shared
++ OBJECT
++ ARCHS ${arch}
++ SOURCES ${CMAKE_CURRENT_SOURCE_DIR}/crtbegin.c
++ CFLAGS ${CRT_CFLAGS} -DCRT_SHARED -fPIC
++ PARENT_TARGET crt)
++ add_compiler_rt_runtime(clang_rt.crtend
++ OBJECT
++ ARCHS ${arch}
++ SOURCES ${CMAKE_CURRENT_SOURCE_DIR}/crtend.c
++ CFLAGS ${CRT_CFLAGS}
++ PARENT_TARGET crt)
++ add_compiler_rt_runtime(clang_rt.crtend_shared
++ OBJECT
++ ARCHS ${arch}
++ SOURCES ${CMAKE_CURRENT_SOURCE_DIR}/crtend.c
++ CFLAGS ${CRT_CFLAGS} -DCRT_SHARED -fPIC
++ PARENT_TARGET crt)
++endforeach()
+Index: compiler-rt/lib/crt/crtbegin.c
+===================================================================
+--- /dev/null
++++ compiler-rt/lib/crt/crtbegin.c
+@@ -0,0 +1,110 @@
++/* ===-- crtbegin.c - Start of constructors and destructors ----------------===
++ *
++ * The LLVM Compiler Infrastructure
++ *
++ * This file is dual licensed under the MIT and the University of Illinois Open
++ * Source Licenses. See LICENSE.TXT for details.
++ *
++ * ===----------------------------------------------------------------------===
++ */
++
++#include
++
++__attribute__((visibility("hidden")))
++#ifdef CRT_SHARED
++void *__dso_handle = &__dso_handle;
++#else
++void *__dso_handle = (void *)0;
++#endif
++
++static long __EH_FRAME_LIST__[] __attribute__((
++ section(".eh_frame"), aligned(sizeof(void *)), visibility("hidden"))) = {};
++
++extern void __register_frame_info(const void *, void *) __attribute__((weak));
++extern void *__deregister_frame_info(const void *) __attribute__((weak));
++
++#ifndef CRT_HAS_INITFINI_ARRAY
++typedef void (*fp)(void);
++
++static fp __CTOR_LIST__[]
++ __attribute__((section(".ctors"), aligned(sizeof(fp)), visibility("hidden"),
++ used)) = {(fp)-1};
++extern fp __CTOR_LIST_END__[] __attribute__((visibility("hidden")));
++#endif
++
++#ifdef CRT_SHARED
++extern void __cxa_finalize(void *) __attribute__((weak));
++#endif
++
++static void __attribute__((used)) __do_init() {
++ static _Bool __initialized;
++ if (__builtin_expect(__initialized, 0))
++ return;
++ __initialized = 1;
++
++ static struct { void *p[8]; } __object;
++ if (__register_frame_info)
++ __register_frame_info(__EH_FRAME_LIST__, &__object);
++
++#ifndef CRT_HAS_INITFINI_ARRAY
++ const size_t n = __CTOR_LIST_END__ - __CTOR_LIST__ - 1;
++ for (size_t i = n; i >= 1; i--) __CTOR_LIST__[i]();
++#endif
++}
++
++#ifdef CRT_HAS_INITFINI_ARRAY
++__attribute__((section(".init_array"),
++ used)) static void (*__init)(void) = __do_init;
++#else // CRT_HAS_INITFINI_ARRAY
++#if defined(__i386__) || defined(__x86_64__)
++asm(".pushsection .init,\"ax\",@progbits\n\t"
++ "call " __USER_LABEL_PREFIX__ "__do_init\n\t"
++ ".popsection");
++#elif defined(__arm__)
++asm(".pushsection .init,\"ax\",%progbits\n\t"
++ "bl " __USER_LABEL_PREFIX__ "__do_init\n\t"
++ ".popsection");
++#endif // CRT_HAS_INITFINI_ARRAY
++#endif
++
++#ifndef CRT_HAS_INITFINI_ARRAY
++static fp __DTOR_LIST__[]
++ __attribute__((section(".dtors"), aligned(sizeof(fp)), visibility("hidden"),
++ used)) = {(fp)-1};
++extern fp __DTOR_LIST_END__[] __attribute__((visibility("hidden")));
++#endif
++
++static void __attribute__((used)) __do_fini() {
++ static _Bool __finalized;
++ if (__builtin_expect(__finalized, 0))
++ return;
++ __finalized = 1;
++
++#ifdef CRT_SHARED
++ if (__cxa_finalize)
++ __cxa_finalize(__dso_handle);
++#endif
++
++#ifndef CRT_HAS_INITFINI_ARRAY
++ if (__deregister_frame_info)
++ __deregister_frame_info(__EH_FRAME_LIST__);
++
++ const size_t n = __DTOR_LIST_END__ - __DTOR_LIST__ - 1;
++ for (size_t i = 1; i < n; i++) __DTOR_LIST__[i]();
++#endif
++}
++
++#ifdef CRT_HAS_INITFINI_ARRAY
++__attribute__((section(".fini_array"),
++ used)) static void (*__fini)(void) = __do_fini;
++#else // CRT_HAS_INITFINI_ARRAY
++#if defined(__i386__) || defined(__x86_64__)
++asm(".pushsection .fini,\"ax\",@progbits\n\t"
++ "call " __USER_LABEL_PREFIX__ "__do_fini\n\t"
++ ".popsection");
++#elif defined(__arm__)
++asm(".pushsection .fini,\"ax\",%progbits\n\t"
++ "bl " __USER_LABEL_PREFIX__ "__do_fini\n\t"
++ ".popsection");
++#endif
++#endif // CRT_HAS_INIT_FINI_ARRAY
+Index: compiler-rt/lib/crt/crtend.c
+===================================================================
+--- /dev/null
++++ compiler-rt/lib/crt/crtend.c
+@@ -0,0 +1,23 @@
++/* ===-- crtend.c - End of constructors and destructors --------------------===
++ *
++ * The LLVM Compiler Infrastructure
++ *
++ * This file is dual licensed under the MIT and the University of Illinois Open
++ * Source Licenses. See LICENSE.TXT for details.
++ *
++ * ===----------------------------------------------------------------------===
++ */
++
++#include
++
++// Put 4-byte zero which is the length field in FDE at the end as a terminator.
++const int32_t __EH_FRAME_LIST_END__[]
++ __attribute__((section(".eh_frame"), aligned(sizeof(int32_t)), used)) = {0};
++
++#ifndef CRT_HAS_INITFINI_ARRAY
++typedef void (*fp)(void);
++fp __CTOR_LIST_END__[]
++ __attribute__((section(".ctors"), visibility("hidden"), used)) = {0};
++fp __DTOR_LIST_END__[]
++ __attribute__((section(".dtors"), visibility("hidden"), used)) = {0};
++#endif
+Index: compiler-rt/test/CMakeLists.txt
+===================================================================
+--- compiler-rt/test/CMakeLists.txt
++++ compiler-rt/test/CMakeLists.txt
+@@ -73,6 +73,9 @@
+ if(COMPILER_RT_BUILD_XRAY)
+ compiler_rt_test_runtime(xray)
+ endif()
++ if(COMPILER_RT_HAS_CRT)
++ add_subdirectory(crt)
++ endif()
+ # ShadowCallStack does not yet provide a runtime with compiler-rt, the tests
+ # include their own minimal runtime
+ add_subdirectory(shadowcallstack)
+Index: compiler-rt/test/crt/CMakeLists.txt
+===================================================================
+--- /dev/null
++++ compiler-rt/test/crt/CMakeLists.txt
+@@ -0,0 +1,31 @@
++set(CRT_LIT_SOURCE_DIR ${CMAKE_CURRENT_SOURCE_DIR})
++
++set(CRT_TESTSUITES)
++
++set(CRT_TEST_DEPS "")
++
++if(NOT COMPILER_RT_STANDALONE_BUILD AND COMPILER_RT_BUILD_CRT AND
++ COMPILER_RT_HAS_CRT)
++ list(APPEND CRT_TEST_DEPS crt)
++endif()
++
++set(CRT_TEST_ARCH ${CRT_SUPPORTED_ARCH})
++if (COMPILER_RT_BUILD_CRT AND COMPILER_RT_HAS_CRT)
++ foreach(arch ${CRT_TEST_ARCH})
++ set(CRT_TEST_TARGET_ARCH ${arch})
++ string(TOLOWER "-${arch}-${OS_NAME}" CRT_TEST_CONFIG_SUFFIX)
++ get_test_cc_for_arch(${arch} CRT_TEST_TARGET_CC CRT_TEST_TARGET_CFLAGS)
++ string(TOUPPER ${arch} ARCH_UPPER_CASE)
++ set(CONFIG_NAME ${ARCH_UPPER_CASE}${OS_NAME}Config)
++
++ configure_lit_site_cfg(
++ ${CMAKE_CURRENT_SOURCE_DIR}/lit.site.cfg.in
++ ${CMAKE_CURRENT_BINARY_DIR}/${CONFIG_NAME}/lit.site.cfg)
++ list(APPEND CRT_TESTSUITES ${CMAKE_CURRENT_BINARY_DIR}/${CONFIG_NAME})
++ endforeach()
++endif()
++
++add_lit_testsuite(check-crt "Running the CRT tests"
++ ${CRT_TESTSUITES}
++ DEPENDS ${CRT_TEST_DEPS})
++set_target_properties(check-crt PROPERTIES FOLDER "Compiler-RT Misc")
+Index: compiler-rt/test/crt/dso_handle.cpp
+===================================================================
+--- /dev/null
++++ compiler-rt/test/crt/dso_handle.cpp
+@@ -0,0 +1,33 @@
++// RUN: %clangxx -g -DCRT_SHARED -c %s -fPIC -o %tshared.o
++// RUN: %clangxx -g -c %s -fPIC -o %t.o
++// RUN: %clangxx -g -shared -o %t.so -nostdlib %crti %shared_crtbegin %tshared.o %libstdcxx -lc -lm -lgcc_s %shared_crtend %crtn
++// RUN: %clangxx -g -o %t -nostdlib %crt1 %crti %crtbegin %t.o %libstdcxx -lc -lm %libgcc %t.so %crtend %crtn
++// RUN: %run %t 2>&1 | FileCheck %s
++
++#include
++
++// CHECK: 1
++// CHECK-NEXT: ~A()
++
++#ifdef CRT_SHARED
++bool G;
++void C() {
++ printf("%d\n", G);
++}
++
++struct A {
++ A() { G = true; }
++ ~A() {
++ printf("~A()\n");
++ }
++};
++
++A a;
++#else
++void C();
++
++int main() {
++ C();
++ return 0;
++}
++#endif
+Index: compiler-rt/test/crt/lit.cfg
+===================================================================
+--- /dev/null
++++ compiler-rt/test/crt/lit.cfg
+@@ -0,0 +1,80 @@
++# -*- Python -*-
++
++import os
++import subprocess
++
++# Setup config name.
++config.name = 'CRT' + config.name_suffix
++
++# Setup source root.
++config.test_source_root = os.path.dirname(__file__)
++
++
++def get_library_path(file):
++ cmd = subprocess.Popen([config.clang.strip(),
++ config.target_cflags.strip(),
++ '-print-file-name=%s' % file],
++ stdout=subprocess.PIPE,
++ env=config.environment)
++ if not cmd.stdout:
++ lit_config.fatal("Couldn't find the library path for '%s'" % file)
++ dir = cmd.stdout.read().strip()
++ if sys.platform in ['win32'] and execute_external:
++ # Don't pass dosish path separator to msys bash.exe.
++ dir = dir.replace('\\', '/')
++ # Ensure the result is an ascii string, across Python2.5+ - Python3.
++ return str(dir.decode('ascii'))
++
++
++def get_libgcc_file_name():
++ cmd = subprocess.Popen([config.clang.strip(),
++ config.target_cflags.strip(),
++ '-print-libgcc-file-name'],
++ stdout=subprocess.PIPE,
++ env=config.environment)
++ if not cmd.stdout:
++ lit_config.fatal("Couldn't find the library path for '%s'" % file)
++ dir = cmd.stdout.read().strip()
++ if sys.platform in ['win32'] and execute_external:
++ # Don't pass dosish path separator to msys bash.exe.
++ dir = dir.replace('\\', '/')
++ # Ensure the result is an ascii string, across Python2.5+ - Python3.
++ return str(dir.decode('ascii'))
++
++
++def build_invocation(compile_flags):
++ return ' ' + ' '.join([config.clang] + compile_flags) + ' '
++
++
++# Setup substitutions.
++config.substitutions.append(
++ ('%clang ', build_invocation([config.target_cflags])))
++config.substitutions.append(
++ ('%clangxx ',
++ build_invocation(config.cxx_mode_flags + [config.target_cflags])))
++
++base_lib = os.path.join(
++ config.compiler_rt_libdir, "clang_rt.%%s-%s.o" % config.target_arch)
++config.substitutions.append(('%crtbegin', base_lib % "crtbegin"))
++config.substitutions.append(('%shared_crtbegin', base_lib % "crtbegin_shared"))
++config.substitutions.append(('%crtend', base_lib % "crtend"))
++config.substitutions.append(('%shared_crtend', base_lib % "crtend_shared"))
++
++config.substitutions.append(
++ ('%crt1', get_library_path('crt1.o')))
++config.substitutions.append(
++ ('%crti', get_library_path('crti.o')))
++config.substitutions.append(
++ ('%crtn', get_library_path('crtn.o')))
++
++config.substitutions.append(
++ ('%libgcc', get_libgcc_file_name()))
++
++config.substitutions.append(
++ ('%libstdcxx', '-l' + config.sanitizer_cxx_lib.lstrip('lib')))
++
++# Default test suffixes.
++config.suffixes = ['.c', '.cc', '.cpp']
++
++if config.host_os not in ['Linux']:
++ config.unsupported = True
+Index: compiler-rt/test/crt/lit.site.cfg.in
+===================================================================
+--- /dev/null
++++ compiler-rt/test/crt/lit.site.cfg.in
+@@ -0,0 +1,14 @@
++@LIT_SITE_CFG_IN_HEADER@
++
++# Tool-specific config options.
++config.name_suffix = "@CRT_TEST_CONFIG_SUFFIX@"
++config.crt_lit_source_dir = "@CRT_LIT_SOURCE_DIR@"
++config.target_cflags = "@CRT_TEST_TARGET_CFLAGS@"
++config.target_arch = "@CRT_TEST_TARGET_ARCH@"
++config.sanitizer_cxx_lib = "@SANITIZER_TEST_CXX_LIBNAME@"
++
++# Load common config for all compiler-rt lit tests
++lit_config.load_config(config, "@COMPILER_RT_BINARY_DIR@/test/lit.common.configured")
++
++# Load tool-specific config that would do the real work.
++lit_config.load_config(config, "@CRT_LIT_SOURCE_DIR@/lit.cfg")
diff --git a/pkgs/development/compilers/llvm/8/default.nix b/pkgs/development/compilers/llvm/8/default.nix
new file mode 100644
index 00000000000..f70585632e8
--- /dev/null
+++ b/pkgs/development/compilers/llvm/8/default.nix
@@ -0,0 +1,149 @@
+{ lowPrio, newScope, pkgs, stdenv, cmake, libstdcxxHook
+, libxml2, python, isl, fetchurl, overrideCC, wrapCCWith, wrapBintoolsWith
+, buildLlvmTools # tools, but from the previous stage, for cross
+, targetLlvmLibraries # libraries, but from the next stage, for cross
+}:
+
+let
+ release_version = "8.0.0";
+ version = release_version + "rc2"; # differentiating these is important for rc's
+
+ fetch = name: sha256: fetchurl {
+ url = "https://prereleases.llvm.org/${release_version}/rc2/${name}-${version}.src.tar.xz";
+ inherit sha256;
+ };
+
+ clang-tools-extra_src = fetch "clang-tools-extra" "1ypzbk7lf9dzkqh4p37dlr1bggjdrixr5gwb71jk9gh98grr2m5g";
+
+ tools = stdenv.lib.makeExtensible (tools: let
+ callPackage = newScope (tools // { inherit stdenv cmake libxml2 python isl release_version version fetch; });
+ mkExtraBuildCommands = cc: ''
+ rsrc="$out/resource-root"
+ mkdir "$rsrc"
+ ln -s "${cc}/lib/clang/${release_version}/include" "$rsrc"
+ ln -s "${targetLlvmLibraries.compiler-rt.out}/lib" "$rsrc/lib"
+ echo "-resource-dir=$rsrc" >> $out/nix-support/cc-cflags
+ '' + stdenv.lib.optionalString (stdenv.targetPlatform.isLinux && tools.clang-unwrapped ? gcc) ''
+ echo "--gcc-toolchain=${tools.clang-unwrapped.gcc}" >> $out/nix-support/cc-cflags
+ '';
+ in {
+
+ llvm = callPackage ./llvm.nix { };
+ llvm-polly = callPackage ./llvm.nix { enablePolly = true; };
+
+ clang-unwrapped = callPackage ./clang {
+ inherit clang-tools-extra_src;
+ };
+ clang-polly-unwrapped = callPackage ./clang {
+ inherit clang-tools-extra_src;
+ llvm = tools.llvm-polly;
+ enablePolly = true;
+ };
+
+ llvm-manpages = lowPrio (tools.llvm.override {
+ enableManpages = true;
+ python = pkgs.python; # don't use python-boot
+ });
+
+ clang-manpages = lowPrio (tools.clang-unwrapped.override {
+ enableManpages = true;
+ python = pkgs.python; # don't use python-boot
+ });
+
+ libclang = tools.clang-unwrapped.lib;
+
+ clang = if stdenv.cc.isGNU then tools.libstdcxxClang else tools.libcxxClang;
+
+ libstdcxxClang = wrapCCWith rec {
+ cc = tools.clang-unwrapped;
+ extraPackages = [
+ libstdcxxHook
+ targetLlvmLibraries.compiler-rt
+ ];
+ extraBuildCommands = mkExtraBuildCommands cc;
+ };
+
+ libcxxClang = wrapCCWith rec {
+ cc = tools.clang-unwrapped;
+ libcxx = targetLlvmLibraries.libcxx;
+ extraPackages = [
+ targetLlvmLibraries.libcxx
+ targetLlvmLibraries.libcxxabi
+ targetLlvmLibraries.compiler-rt
+ ];
+ extraBuildCommands = mkExtraBuildCommands cc;
+ };
+
+ lld = callPackage ./lld.nix {};
+
+ lldb = callPackage ./lldb.nix {};
+
+ bintools = callPackage ./bintools.nix {};
+
+ lldClang = wrapCCWith rec {
+ cc = tools.clang-unwrapped;
+ bintools = wrapBintoolsWith {
+ inherit (tools) bintools;
+ };
+ extraPackages = [
+ # targetLlvmLibraries.libcxx
+ # targetLlvmLibraries.libcxxabi
+ targetLlvmLibraries.compiler-rt
+ ];
+ extraBuildCommands = ''
+ echo "-target ${stdenv.targetPlatform.config} -rtlib=compiler-rt" >> $out/nix-support/cc-cflags
+ '' + mkExtraBuildCommands cc;
+ };
+
+ lldClangNoLibc = wrapCCWith rec {
+ cc = tools.clang-unwrapped;
+ bintools = wrapBintoolsWith {
+ inherit (tools) bintools;
+ libc = null;
+ };
+ extraPackages = [
+ # targetLlvmLibraries.libcxx
+ # targetLlvmLibraries.libcxxabi
+ targetLlvmLibraries.compiler-rt
+ ];
+ extraBuildCommands = ''
+ echo "-target ${stdenv.targetPlatform.config} -rtlib=compiler-rt" >> $out/nix-support/cc-cflags
+ '' + mkExtraBuildCommands cc;
+ };
+
+ lldClangNoCompilerRt = wrapCCWith rec {
+ cc = tools.clang-unwrapped;
+ bintools = wrapBintoolsWith {
+ inherit (tools) bintools;
+ libc = null;
+ };
+ extraPackages = [ ];
+ extraBuildCommands = ''
+ echo "-nostartfiles -target ${stdenv.targetPlatform.config}" >> $out/nix-support/cc-cflags
+ '';
+ };
+
+ });
+
+ libraries = stdenv.lib.makeExtensible (libraries: let
+ callPackage = newScope (libraries // buildLlvmTools // { inherit stdenv cmake libxml2 python isl release_version version fetch; });
+ in {
+
+ compiler-rt = callPackage ./compiler-rt.nix {
+ stdenv = if stdenv.hostPlatform.useLLVM or false
+ then overrideCC stdenv buildLlvmTools.lldClangNoCompilerRt
+ else stdenv;
+ };
+
+ stdenv = overrideCC stdenv buildLlvmTools.clang;
+
+ libcxxStdenv = overrideCC stdenv buildLlvmTools.libcxxClang;
+
+ libcxx = callPackage ./libc++ {};
+
+ libcxxabi = callPackage ./libc++abi.nix {};
+
+ openmp = callPackage ./openmp.nix {};
+ });
+
+in { inherit tools libraries; } // libraries // tools
diff --git a/pkgs/development/compilers/llvm/8/libc++/default.nix b/pkgs/development/compilers/llvm/8/libc++/default.nix
new file mode 100644
index 00000000000..52a1dc53d35
--- /dev/null
+++ b/pkgs/development/compilers/llvm/8/libc++/default.nix
@@ -0,0 +1,50 @@
+{ lib, stdenv, fetch, cmake, python, libcxxabi, fixDarwinDylibNames, version }:
+
+stdenv.mkDerivation rec {
+ name = "libc++-${version}";
+
+ src = fetch "libcxx" "1c8idvlqm4ik62q0llsndk9449yrgkj8hv5lz411hnbqjs09q9qq";
+
+ postUnpack = ''
+ unpackFile ${libcxxabi.src}
+ export LIBCXXABI_INCLUDE_DIR="$PWD/$(ls -d libcxxabi-${version}*)/include"
+ '';
+
+ patches = stdenv.lib.optional stdenv.hostPlatform.isMusl ../../libcxx-0001-musl-hacks.patch;
+
+ prePatch = ''
+ substituteInPlace lib/CMakeLists.txt --replace "/usr/lib/libc++" "\''${LIBCXX_LIBCXXABI_LIB_PATH}/libc++"
+ '';
+
+ preConfigure = ''
+ # Get headers from the cxxabi source so we can see private headers not installed by the cxxabi package
+ cmakeFlagsArray=($cmakeFlagsArray -DLIBCXX_CXX_ABI_INCLUDE_PATHS="$LIBCXXABI_INCLUDE_DIR")
+ '' + lib.optionalString stdenv.hostPlatform.isMusl ''
+ patchShebangs utils/cat_files.py
+ '';
+ nativeBuildInputs = [ cmake ] ++ stdenv.lib.optional stdenv.hostPlatform.isMusl python;
+
+ buildInputs = [ libcxxabi ] ++ lib.optional stdenv.isDarwin fixDarwinDylibNames;
+
+ cmakeFlags = [
+ "-DLIBCXX_LIBCXXABI_LIB_PATH=${libcxxabi}/lib"
+ "-DLIBCXX_LIBCPPABI_VERSION=2"
+ "-DLIBCXX_CXX_ABI=libcxxabi"
+ ] ++ stdenv.lib.optional stdenv.hostPlatform.isMusl "-DLIBCXX_HAS_MUSL_LIBC=1";
+
+ enableParallelBuilding = true;
+
+ linkCxxAbi = stdenv.isLinux;
+
+ setupHooks = [
+ ../../../../../build-support/setup-hooks/role.bash
+ ./setup-hook.sh
+ ];
+
+ meta = {
+ homepage = http://libcxx.llvm.org/;
+ description = "A new implementation of the C++ standard library, targeting C++11";
+ license = with stdenv.lib.licenses; [ ncsa mit ];
+ platforms = stdenv.lib.platforms.unix;
+ };
+}
diff --git a/pkgs/development/compilers/llvm/8/libc++/setup-hook.sh b/pkgs/development/compilers/llvm/8/libc++/setup-hook.sh
new file mode 100644
index 00000000000..6611259165a
--- /dev/null
+++ b/pkgs/development/compilers/llvm/8/libc++/setup-hook.sh
@@ -0,0 +1,6 @@
+# See pkgs/build-support/setup-hooks/role.bash
+getHostRole
+
+linkCxxAbi="@linkCxxAbi@"
+export NIX_${role_pre}CXXSTDLIB_COMPILE+=" -isystem @out@/include/c++/v1"
+export NIX_${role_pre}CXXSTDLIB_LINK=" -stdlib=libc++${linkCxxAbi:+" -lc++abi"}"
diff --git a/pkgs/development/compilers/llvm/8/libc++abi.nix b/pkgs/development/compilers/llvm/8/libc++abi.nix
new file mode 100644
index 00000000000..9c3bfe5e1ff
--- /dev/null
+++ b/pkgs/development/compilers/llvm/8/libc++abi.nix
@@ -0,0 +1,50 @@
+{ stdenv, cmake, fetch, libcxx, libunwind, llvm, version }:
+
+stdenv.mkDerivation {
+ name = "libc++abi-${version}";
+
+ src = fetch "libcxxabi" "0hdg7xw8vazw85i675qld7i6wqx502srny84cp0w6wi6pk44xiqr";
+
+ nativeBuildInputs = [ cmake ];
+ buildInputs = stdenv.lib.optional (!stdenv.isDarwin && !stdenv.isFreeBSD) libunwind;
+
+ postUnpack = ''
+ unpackFile ${libcxx.src}
+ unpackFile ${llvm.src}
+ export cmakeFlags="-DLLVM_PATH=$PWD/$(ls -d llvm-*) -DLIBCXXABI_LIBCXX_PATH=$PWD/$(ls -d libcxx-*)"
+ '' + stdenv.lib.optionalString stdenv.isDarwin ''
+ export TRIPLE=x86_64-apple-darwin
+ '' + stdenv.lib.optionalString stdenv.hostPlatform.isMusl ''
+ patch -p1 -d $(ls -d libcxx-*) -i ${../libcxx-0001-musl-hacks.patch}
+ '';
+
+ installPhase = if stdenv.isDarwin
+ then ''
+ for file in lib/*.dylib; do
+ # this should be done in CMake, but having trouble figuring out
+ # the magic combination of necessary CMake variables
+ # if you fancy a try, take a look at
+ # http://www.cmake.org/Wiki/CMake_RPATH_handling
+ install_name_tool -id $out/$file $file
+ done
+ make install
+ install -d 755 $out/include
+ install -m 644 ../include/*.h $out/include
+ ''
+ else ''
+ install -d -m 755 $out/include $out/lib
+ install -m 644 lib/libc++abi.a $out/lib
+ install -m 644 lib/libc++abi.so.1.0 $out/lib
+ install -m 644 ../include/cxxabi.h $out/include
+ ln -s libc++abi.so.1.0 $out/lib/libc++abi.so
+ ln -s libc++abi.so.1.0 $out/lib/libc++abi.so.1
+ '';
+
+ meta = {
+ homepage = http://libcxxabi.llvm.org/;
+ description = "A new implementation of low level support for a standard C++ library";
+ license = with stdenv.lib.licenses; [ ncsa mit ];
+ maintainers = with stdenv.lib.maintainers; [ vlstill ];
+ platforms = stdenv.lib.platforms.unix;
+ };
+}
diff --git a/pkgs/development/compilers/llvm/8/lld.nix b/pkgs/development/compilers/llvm/8/lld.nix
new file mode 100644
index 00000000000..ba7f888f4dd
--- /dev/null
+++ b/pkgs/development/compilers/llvm/8/lld.nix
@@ -0,0 +1,32 @@
+{ stdenv
+, fetch
+, cmake
+, libxml2
+, llvm
+, version
+}:
+
+stdenv.mkDerivation {
+ name = "lld-${version}";
+
+ src = fetch "lld" "14nganpwr5y111zhwws95p6ikp8kfiybfdr2yfz5cmhb3zkcgk4h";
+
+ nativeBuildInputs = [ cmake ];
+ buildInputs = [ llvm libxml2 ];
+
+ outputs = [ "out" "dev" ];
+
+ enableParallelBuilding = true;
+
+ postInstall = ''
+ moveToOutput include "$dev"
+ moveToOutput lib "$dev"
+ '';
+
+ meta = {
+ description = "The LLVM Linker";
+ homepage = http://lld.llvm.org/;
+ license = stdenv.lib.licenses.ncsa;
+ platforms = stdenv.lib.platforms.all;
+ };
+}
diff --git a/pkgs/development/compilers/llvm/8/lldb.nix b/pkgs/development/compilers/llvm/8/lldb.nix
new file mode 100644
index 00000000000..ead507ea2ca
--- /dev/null
+++ b/pkgs/development/compilers/llvm/8/lldb.nix
@@ -0,0 +1,56 @@
+{ stdenv
+, fetch
+, cmake
+, zlib
+, ncurses
+, swig
+, which
+, libedit
+, libxml2
+, llvm
+, clang-unwrapped
+, python
+, version
+, darwin
+}:
+
+stdenv.mkDerivation {
+ name = "lldb-${version}";
+
+ src = fetch "lldb" "0r364w49m0l0808wm06g777qd14gwxnz0z267dbnwqkw6zc361lc";
+
+ postPatch = ''
+ # Fix up various paths that assume llvm and clang are installed in the same place
+ sed -i 's,".*ClangConfig.cmake","${clang-unwrapped}/lib/cmake/clang/ClangConfig.cmake",' \
+ cmake/modules/LLDBStandalone.cmake
+ sed -i 's,".*tools/clang/include","${clang-unwrapped}/include",' \
+ cmake/modules/LLDBStandalone.cmake
+ sed -i 's,"$.LLVM_LIBRARY_DIR.",${llvm}/lib ${clang-unwrapped}/lib,' \
+ cmake/modules/LLDBStandalone.cmake
+ '';
+
+ nativeBuildInputs = [ cmake python which swig ];
+ buildInputs = [ ncurses zlib libedit libxml2 llvm ]
+ ++ stdenv.lib.optionals stdenv.isDarwin [ darwin.libobjc darwin.apple_sdk.libs.xpc darwin.apple_sdk.frameworks.Foundation darwin.bootstrap_cmds darwin.apple_sdk.frameworks.Carbon darwin.apple_sdk.frameworks.Cocoa darwin.cf-private ];
+
+ CXXFLAGS = "-fno-rtti";
+ hardeningDisable = [ "format" ];
+
+ cmakeFlags = [
+ "-DLLDB_CODESIGN_IDENTITY=" # codesigning makes nondeterministic
+ ];
+
+ enableParallelBuilding = true;
+
+ postInstall = ''
+ mkdir -p $out/share/man/man1
+ cp ../docs/lldb.1 $out/share/man/man1/
+ '';
+
+ meta = with stdenv.lib; {
+ description = "A next-generation high-performance debugger";
+ homepage = http://llvm.org/;
+ license = licenses.ncsa;
+ platforms = platforms.all;
+ };
+}
diff --git a/pkgs/development/compilers/llvm/8/llvm-outputs.patch b/pkgs/development/compilers/llvm/8/llvm-outputs.patch
new file mode 100644
index 00000000000..40096fa3497
--- /dev/null
+++ b/pkgs/development/compilers/llvm/8/llvm-outputs.patch
@@ -0,0 +1,26 @@
+diff --git a/tools/llvm-config/llvm-config.cpp b/tools/llvm-config/llvm-config.cpp
+index 94d426b..37f7794 100644
+--- a/tools/llvm-config/llvm-config.cpp
++++ b/tools/llvm-config/llvm-config.cpp
+@@ -333,6 +333,21 @@ int main(int argc, char **argv) {
+ ActiveIncludeOption = "-I" + ActiveIncludeDir;
+ }
+
++ /// Nix-specific multiple-output handling: override ActiveLibDir if --link-shared
++ if (!IsInDevelopmentTree) {
++ bool WantShared = true;
++ for (int i = 1; i < argc; ++i) {
++ StringRef Arg = argv[i];
++ if (Arg == "--link-shared")
++ WantShared = true;
++ else if (Arg == "--link-static")
++ WantShared = false; // the last one wins
++ }
++
++ if (WantShared)
++ ActiveLibDir = std::string("@lib@") + "/lib" + LLVM_LIBDIR_SUFFIX;
++ }
++
+ /// We only use `shared library` mode in cases where the static library form
+ /// of the components provided are not available; note however that this is
+ /// skipped if we're run from within the build dir. However, once installed,
diff --git a/pkgs/development/compilers/llvm/8/llvm.nix b/pkgs/development/compilers/llvm/8/llvm.nix
new file mode 100644
index 00000000000..273e33893fe
--- /dev/null
+++ b/pkgs/development/compilers/llvm/8/llvm.nix
@@ -0,0 +1,172 @@
+{ stdenv
+, fetch
+, fetchpatch
+, cmake
+, python
+, libffi
+, libbfd
+, libpfm
+, libxml2
+, ncurses
+, version
+, release_version
+, zlib
+, buildPackages
+, debugVersion ? false
+, enableManpages ? false
+, enableSharedLibraries ? true
+, enablePFM ? !stdenv.isDarwin
+, enablePolly ? false
+}:
+
+let
+ inherit (stdenv.lib) optional optionals optionalString;
+
+ src = fetch "llvm" "1h9zqgf968si0nzdmsa9rz634zrmz6mprvz2ifw6ky0h7va5rcvq";
+ polly_src = fetch "polly" "1wwnn0cxnrmiqb6kg577myz6kb8sm18jwc020lf0b1k5as7aw2kq";
+
+ # Used when creating a version-suffixed symlink of libLLVM.dylib
+ shortVersion = with stdenv.lib;
+ concatStringsSep "." (take 1 (splitString "." release_version));
+
+in stdenv.mkDerivation (rec {
+ name = "llvm-${version}";
+
+ unpackPhase = ''
+ unpackFile ${src}
+ mv llvm-${version}* llvm
+ sourceRoot=$PWD/llvm
+ '' + optionalString enablePolly ''
+ unpackFile ${polly_src}
+ mv polly-* $sourceRoot/tools/polly
+ '';
+
+ outputs = [ "out" "python" ]
+ ++ optional enableSharedLibraries "lib";
+
+ nativeBuildInputs = [ cmake python ]
+ ++ optionals enableManpages [ python.pkgs.sphinx python.pkgs.recommonmark ];
+
+ buildInputs = [ libxml2 libffi ]
+ ++ optional enablePFM libpfm; # exegesis
+
+ propagatedBuildInputs = [ ncurses zlib ];
+
+ postPatch = optionalString stdenv.isDarwin ''
+ substituteInPlace cmake/modules/AddLLVM.cmake \
+ --replace 'set(_install_name_dir INSTALL_NAME_DIR "@rpath")' "set(_install_name_dir)" \
+ --replace 'set(_install_rpath "@loader_path/../lib" ''${extra_libdir})' ""
+ ''
+ # Patch llvm-config to return correct library path based on --link-{shared,static}.
+ + optionalString (enableSharedLibraries) ''
+ substitute '${./llvm-outputs.patch}' ./llvm-outputs.patch --subst-var lib
+ patch -p1 < ./llvm-outputs.patch
+ '' + ''
+ # FileSystem permissions tests fail with various special bits
+ substituteInPlace unittests/Support/CMakeLists.txt \
+ --replace "Path.cpp" ""
+ rm unittests/Support/Path.cpp
+ '' + optionalString stdenv.hostPlatform.isMusl ''
+ patch -p1 -i ${../TLI-musl.patch}
+ substituteInPlace unittests/Support/CMakeLists.txt \
+ --replace "add_subdirectory(DynamicLibrary)" ""
+ rm unittests/Support/DynamicLibrary/DynamicLibraryTest.cpp
+ '' + ''
+ patchShebangs test/BugPoint/compile-custom.ll.py
+ '';
+
+ # hacky fix: created binaries need to be run before installation
+ preBuild = ''
+ mkdir -p $out/
+ ln -sv $PWD/lib $out
+ '';
+
+ cmakeFlags = with stdenv; [
+ "-DCMAKE_BUILD_TYPE=${if debugVersion then "Debug" else "Release"}"
+ "-DLLVM_INSTALL_UTILS=ON" # Needed by rustc
+ "-DLLVM_BUILD_TESTS=ON"
+ "-DLLVM_ENABLE_FFI=ON"
+ "-DLLVM_ENABLE_RTTI=ON"
+ "-DLLVM_HOST_TRIPLE=${stdenv.hostPlatform.config}"
+ "-DLLVM_DEFAULT_TARGET_TRIPLE=${stdenv.hostPlatform.config}"
+ "-DLLVM_ENABLE_DUMP=ON"
+ ] ++ optionals enableSharedLibraries [
+ "-DLLVM_LINK_LLVM_DYLIB=ON"
+ ] ++ optionals enableManpages [
+ "-DLLVM_BUILD_DOCS=ON"
+ "-DLLVM_ENABLE_SPHINX=ON"
+ "-DSPHINX_OUTPUT_MAN=ON"
+ "-DSPHINX_OUTPUT_HTML=OFF"
+ "-DSPHINX_WARNINGS_AS_ERRORS=OFF"
+ ] ++ optionals (!isDarwin) [
+ "-DLLVM_BINUTILS_INCDIR=${libbfd.dev}/include"
+ ] ++ optionals (isDarwin) [
+ "-DLLVM_ENABLE_LIBCXX=ON"
+ "-DCAN_TARGET_i386=false"
+ ] ++ optionals (stdenv.hostPlatform != stdenv.buildPlatform) [
+ "-DCMAKE_CROSSCOMPILING=True"
+ "-DLLVM_TABLEGEN=${buildPackages.llvm_7}/bin/llvm-tblgen"
+ ];
+
+ postBuild = ''
+ rm -fR $out
+ '';
+
+ preCheck = ''
+ export LD_LIBRARY_PATH=$LD_LIBRARY_PATH:$PWD/lib
+ '';
+
+ postInstall = ''
+ mkdir -p $python/share
+ mv $out/share/opt-viewer $python/share/opt-viewer
+ ''
+ + optionalString enableSharedLibraries ''
+ moveToOutput "lib/libLLVM-*" "$lib"
+ moveToOutput "lib/libLLVM${stdenv.hostPlatform.extensions.sharedLibrary}" "$lib"
+ substituteInPlace "$out/lib/cmake/llvm/LLVMExports-${if debugVersion then "debug" else "release"}.cmake" \
+ --replace "\''${_IMPORT_PREFIX}/lib/libLLVM-" "$lib/lib/libLLVM-"
+ ''
+ + optionalString (stdenv.isDarwin && enableSharedLibraries) ''
+ substituteInPlace "$out/lib/cmake/llvm/LLVMExports-${if debugVersion then "debug" else "release"}.cmake" \
+ --replace "\''${_IMPORT_PREFIX}/lib/libLLVM.dylib" "$lib/lib/libLLVM.dylib"
+ ln -s $lib/lib/libLLVM.dylib $lib/lib/libLLVM-${shortVersion}.dylib
+ ln -s $lib/lib/libLLVM.dylib $lib/lib/libLLVM-${release_version}.dylib
+ '';
+
+ doCheck = stdenv.isLinux && (!stdenv.isx86_32);
+
+ checkTarget = "check-all";
+
+ enableParallelBuilding = true;
+
+ passthru.src = src;
+
+ meta = {
+ description = "Collection of modular and reusable compiler and toolchain technologies";
+ homepage = http://llvm.org/;
+ license = stdenv.lib.licenses.ncsa;
+ maintainers = with stdenv.lib.maintainers; [ lovek323 raskin dtzWill ];
+ platforms = stdenv.lib.platforms.all;
+ };
+} // stdenv.lib.optionalAttrs enableManpages {
+ name = "llvm-manpages-${version}";
+
+ buildPhase = ''
+ make docs-llvm-man
+ '';
+
+ propagatedBuildInputs = [];
+
+ installPhase = ''
+ make -C docs install
+ '';
+
+ postPatch = null;
+ postInstall = null;
+
+ outputs = [ "out" ];
+
+ doCheck = false;
+
+ meta.description = "man pages for LLVM ${version}";
+})
diff --git a/pkgs/development/compilers/llvm/8/openmp.nix b/pkgs/development/compilers/llvm/8/openmp.nix
new file mode 100644
index 00000000000..1a628cf6dd4
--- /dev/null
+++ b/pkgs/development/compilers/llvm/8/openmp.nix
@@ -0,0 +1,25 @@
+{ stdenv
+, fetch
+, cmake
+, llvm
+, perl
+, version
+}:
+
+stdenv.mkDerivation {
+ name = "openmp-${version}";
+
+ src = fetch "openmp" "1xxxclzizcrfh0k870n4n3hh0khw14sv5i7s2kbdwl099k8b96cv";
+
+ nativeBuildInputs = [ cmake perl ];
+ buildInputs = [ llvm ];
+
+ enableParallelBuilding = true;
+
+ meta = {
+ description = "Components required to build an executable OpenMP program";
+ homepage = http://openmp.llvm.org/;
+ license = stdenv.lib.licenses.mit;
+ platforms = stdenv.lib.platforms.all;
+ };
+}
diff --git a/pkgs/development/compilers/llvm/8/sanitizers-nongnu.patch b/pkgs/development/compilers/llvm/8/sanitizers-nongnu.patch
new file mode 100644
index 00000000000..1f2ac97818e
--- /dev/null
+++ b/pkgs/development/compilers/llvm/8/sanitizers-nongnu.patch
@@ -0,0 +1,412 @@
+From f7a253f8f85d0f49df6b73996737a3e84ac64236 Mon Sep 17 00:00:00 2001
+From: Will Dietz
+Date: Mon, 24 Sep 2018 11:17:25 -0500
+Subject: [PATCH] Ported to 7.0, taken from gentoo-musl project.
+
+------
+Ported to compiler-rt-sanitizers-5.0.0. Taken from
+
+https://gist.githubusercontent.com/pwaller/2337f3290f12634cad3e3730cff0a6c1/raw/83c87a8585e2f9662494db5662e5361beb093c26/nongnu.patch
+Signed-off-by: Jory A. Pratt
+
+Taken from gentoo-musl project, with a few additional minor fixes.
+---
+ lib/asan/asan_linux.cc | 4 +-
+ lib/interception/interception_linux.cc | 2 +-
+ lib/interception/interception_linux.h | 2 +-
+ lib/msan/msan_linux.cc | 2 +-
+ lib/sanitizer_common/sanitizer_allocator.cc | 2 +-
+ .../sanitizer_common_interceptors_ioctl.inc | 4 +-
+ .../sanitizer_common_syscalls.inc | 2 +-
+ lib/sanitizer_common/sanitizer_linux.cc | 8 +++-
+ .../sanitizer_linux_libcdep.cc | 10 ++---
+ lib/sanitizer_common/sanitizer_platform.h | 6 +++
+ .../sanitizer_platform_interceptors.h | 4 +-
+ .../sanitizer_platform_limits_posix.cc | 37 +++++++++++--------
+ lib/tsan/rtl/tsan_platform_linux.cc | 2 +-
+ 13 files changed, 51 insertions(+), 34 deletions(-)
+
+diff --git a/lib/asan/asan_linux.cc b/lib/asan/asan_linux.cc
+index 625f32d40..73cf77aca 100644
+--- a/lib/asan/asan_linux.cc
++++ b/lib/asan/asan_linux.cc
+@@ -46,7 +46,7 @@
+ #include
+ #endif
+
+-#if SANITIZER_ANDROID || SANITIZER_FREEBSD || SANITIZER_SOLARIS
++#if SANITIZER_ANDROID || SANITIZER_FREEBSD || SANITIZER_SOLARIS || SANITIZER_NONGNU
+ #include
+ extern "C" void* _DYNAMIC;
+ #elif SANITIZER_NETBSD
+@@ -139,7 +139,7 @@ void AsanApplyToGlobals(globals_op_fptr op, const void *needle) {
+ UNIMPLEMENTED();
+ }
+
+-#if SANITIZER_ANDROID
++#if SANITIZER_ANDROID || SANITIZER_NONGNU
+ // FIXME: should we do anything for Android?
+ void AsanCheckDynamicRTPrereqs() {}
+ void AsanCheckIncompatibleRT() {}
+diff --git a/lib/interception/interception_linux.cc b/lib/interception/interception_linux.cc
+index 26bfcd8f6..529b234f7 100644
+--- a/lib/interception/interception_linux.cc
++++ b/lib/interception/interception_linux.cc
+@@ -43,7 +43,7 @@ bool GetRealFunctionAddress(const char *func_name, uptr *func_addr,
+ }
+
+ // Android and Solaris do not have dlvsym
+-#if !SANITIZER_ANDROID && !SANITIZER_SOLARIS && !SANITIZER_OPENBSD
++#if !SANITIZER_ANDROID && !SANITIZER_SOLARIS && !SANITIZER_OPENBSD && !SANITIZER_NONGNU
+ void *GetFuncAddrVer(const char *func_name, const char *ver) {
+ return dlvsym(RTLD_NEXT, func_name, ver);
+ }
+diff --git a/lib/interception/interception_linux.h b/lib/interception/interception_linux.h
+index 942c25609..24a4d5080 100644
+--- a/lib/interception/interception_linux.h
++++ b/lib/interception/interception_linux.h
+@@ -36,7 +36,7 @@ void *GetFuncAddrVer(const char *func_name, const char *ver);
+ (::__interception::uptr) & WRAP(func))
+
+ // Android, Solaris and OpenBSD do not have dlvsym
+-#if !SANITIZER_ANDROID && !SANITIZER_SOLARIS && !SANITIZER_OPENBSD
++#if !SANITIZER_ANDROID && !SANITIZER_SOLARIS && !SANITIZER_OPENBSD && !SANITIZER_NONGNU
+ #define INTERCEPT_FUNCTION_VER_LINUX_OR_FREEBSD(func, symver) \
+ (::__interception::real_##func = (func##_f)( \
+ unsigned long)::__interception::GetFuncAddrVer(#func, symver))
+diff --git a/lib/msan/msan_linux.cc b/lib/msan/msan_linux.cc
+index 385a650c4..6e30a8ce9 100644
+--- a/lib/msan/msan_linux.cc
++++ b/lib/msan/msan_linux.cc
+@@ -13,7 +13,7 @@
+ //===----------------------------------------------------------------------===//
+
+ #include "sanitizer_common/sanitizer_platform.h"
+-#if SANITIZER_FREEBSD || SANITIZER_LINUX || SANITIZER_NETBSD
++#if SANITIZER_FREEBSD || (SANITIZER_LINUX && !SANITIZER_NONGNU) || SANITIZER_NETBSD
+
+ #include "msan.h"
+ #include "msan_report.h"
+diff --git a/lib/sanitizer_common/sanitizer_allocator.cc b/lib/sanitizer_common/sanitizer_allocator.cc
+index 6bfd5e5ee..048f6154f 100644
+--- a/lib/sanitizer_common/sanitizer_allocator.cc
++++ b/lib/sanitizer_common/sanitizer_allocator.cc
+@@ -27,7 +27,7 @@ const char *SecondaryAllocatorName = "LargeMmapAllocator";
+
+ // ThreadSanitizer for Go uses libc malloc/free.
+ #if SANITIZER_GO || defined(SANITIZER_USE_MALLOC)
+-# if SANITIZER_LINUX && !SANITIZER_ANDROID
++# if SANITIZER_LINUX && !SANITIZER_ANDROID && !SANITIZER_NONGNU
+ extern "C" void *__libc_malloc(uptr size);
+ # if !SANITIZER_GO
+ extern "C" void *__libc_memalign(uptr alignment, uptr size);
+diff --git a/lib/sanitizer_common/sanitizer_common_interceptors_ioctl.inc b/lib/sanitizer_common/sanitizer_common_interceptors_ioctl.inc
+index 2d633c173..b6eb23116 100644
+--- a/lib/sanitizer_common/sanitizer_common_interceptors_ioctl.inc
++++ b/lib/sanitizer_common/sanitizer_common_interceptors_ioctl.inc
+@@ -104,7 +104,7 @@ static void ioctl_table_fill() {
+ _(SIOCGETVIFCNT, WRITE, struct_sioc_vif_req_sz);
+ #endif
+
+-#if SANITIZER_LINUX
++#if SANITIZER_LINUX && !SANITIZER_NONGNU
+ // Conflicting request ids.
+ // _(CDROMAUDIOBUFSIZ, NONE, 0);
+ // _(SNDCTL_TMR_CONTINUE, NONE, 0);
+@@ -365,7 +365,7 @@ static void ioctl_table_fill() {
+ _(VT_WAITACTIVE, NONE, 0);
+ #endif
+
+-#if SANITIZER_LINUX && !SANITIZER_ANDROID
++#if SANITIZER_LINUX && !SANITIZER_ANDROID && !SANITIZER_NONGNU
+ // _(SIOCDEVPLIP, WRITE, struct_ifreq_sz); // the same as EQL_ENSLAVE
+ _(CYGETDEFTHRESH, WRITE, sizeof(int));
+ _(CYGETDEFTIMEOUT, WRITE, sizeof(int));
+diff --git a/lib/sanitizer_common/sanitizer_common_syscalls.inc b/lib/sanitizer_common/sanitizer_common_syscalls.inc
+index 469c8eb7e..24f87867d 100644
+--- a/lib/sanitizer_common/sanitizer_common_syscalls.inc
++++ b/lib/sanitizer_common/sanitizer_common_syscalls.inc
+@@ -2038,7 +2038,7 @@ POST_SYSCALL(setrlimit)(long res, long resource, void *rlim) {
+ }
+ }
+
+-#if !SANITIZER_ANDROID
++#if !SANITIZER_ANDROID && !SANITIZER_NONGNU
+ PRE_SYSCALL(prlimit64)(long pid, long resource, const void *new_rlim,
+ void *old_rlim) {
+ if (new_rlim) PRE_READ(new_rlim, struct_rlimit64_sz);
+diff --git a/lib/sanitizer_common/sanitizer_linux.cc b/lib/sanitizer_common/sanitizer_linux.cc
+index 96d6c1eff..9e2b7fb9d 100644
+--- a/lib/sanitizer_common/sanitizer_linux.cc
++++ b/lib/sanitizer_common/sanitizer_linux.cc
+@@ -541,13 +541,13 @@ const char *GetEnv(const char *name) {
+ #endif
+ }
+
+-#if !SANITIZER_FREEBSD && !SANITIZER_NETBSD && !SANITIZER_OPENBSD
++#if !SANITIZER_FREEBSD && !SANITIZER_NETBSD && !SANITIZER_OPENBSD && !SANITIZER_NONGNU
+ extern "C" {
+ SANITIZER_WEAK_ATTRIBUTE extern void *__libc_stack_end;
+ }
+ #endif
+
+-#if !SANITIZER_GO && !SANITIZER_FREEBSD && !SANITIZER_NETBSD && \
++#if (!SANITIZER_GO || SANITIZER_NONGNU) && !SANITIZER_FREEBSD && !SANITIZER_NETBSD && \
+ !SANITIZER_OPENBSD
+ static void ReadNullSepFileToArray(const char *path, char ***arr,
+ int arr_size) {
+@@ -590,6 +590,10 @@ static void GetArgsAndEnv(char ***argv, char ***envp) {
+ #elif SANITIZER_NETBSD
+ *argv = __ps_strings->ps_argvstr;
+ *envp = __ps_strings->ps_envstr;
++#elif SANITIZER_NONGNU
++ static const int kMaxArgv = 2000, kMaxEnvp = 2000;
++ ReadNullSepFileToArray("/proc/self/cmdline", argv, kMaxArgv);
++ ReadNullSepFileToArray("/proc/self/environ", envp, kMaxEnvp);
+ #else // SANITIZER_FREEBSD
+ #if !SANITIZER_GO
+ if (&__libc_stack_end) {
+diff --git a/lib/sanitizer_common/sanitizer_linux_libcdep.cc b/lib/sanitizer_common/sanitizer_linux_libcdep.cc
+index 4962ff832..438f94dbe 100644
+--- a/lib/sanitizer_common/sanitizer_linux_libcdep.cc
++++ b/lib/sanitizer_common/sanitizer_linux_libcdep.cc
+@@ -179,7 +179,7 @@ __attribute__((unused)) static bool GetLibcVersion(int *major, int *minor,
+ }
+
+ #if !SANITIZER_FREEBSD && !SANITIZER_ANDROID && !SANITIZER_GO && \
+- !SANITIZER_NETBSD && !SANITIZER_OPENBSD && !SANITIZER_SOLARIS
++ !SANITIZER_NETBSD && !SANITIZER_OPENBSD && !SANITIZER_SOLARIS && !SANITIZER_NONGNU
+ static uptr g_tls_size;
+
+ #ifdef __i386__
+@@ -261,7 +261,7 @@ void InitTlsSize() { }
+ #if (defined(__x86_64__) || defined(__i386__) || defined(__mips__) || \
+ defined(__aarch64__) || defined(__powerpc64__) || defined(__s390__) || \
+ defined(__arm__)) && \
+- SANITIZER_LINUX && !SANITIZER_ANDROID
++ SANITIZER_LINUX && !SANITIZER_ANDROID && !SANITIZER_NONGNU
+ // sizeof(struct pthread) from glibc.
+ static atomic_uintptr_t thread_descriptor_size;
+
+@@ -426,7 +426,7 @@ int GetSizeFromHdr(struct dl_phdr_info *info, size_t size, void *data) {
+
+ #if !SANITIZER_GO
+ static void GetTls(uptr *addr, uptr *size) {
+-#if SANITIZER_LINUX && !SANITIZER_ANDROID
++#if SANITIZER_LINUX && !SANITIZER_ANDROID && !SANITIZER_NONGNU
+ # if defined(__x86_64__) || defined(__i386__) || defined(__s390__)
+ *addr = ThreadSelf();
+ *size = GetTlsSize();
+@@ -470,7 +470,7 @@ static void GetTls(uptr *addr, uptr *size) {
+ #elif SANITIZER_OPENBSD
+ *addr = 0;
+ *size = 0;
+-#elif SANITIZER_ANDROID
++#elif SANITIZER_ANDROID || SANITIZER_NONGNU
+ *addr = 0;
+ *size = 0;
+ #elif SANITIZER_SOLARIS
+@@ -486,7 +486,7 @@ static void GetTls(uptr *addr, uptr *size) {
+ #if !SANITIZER_GO
+ uptr GetTlsSize() {
+ #if SANITIZER_FREEBSD || SANITIZER_ANDROID || SANITIZER_NETBSD || \
+- SANITIZER_OPENBSD || SANITIZER_SOLARIS
++ SANITIZER_OPENBSD || SANITIZER_SOLARIS || SANITIZER_NONGNU
+ uptr addr, size;
+ GetTls(&addr, &size);
+ return size;
+diff --git a/lib/sanitizer_common/sanitizer_platform.h b/lib/sanitizer_common/sanitizer_platform.h
+index d81e25580..e10680ac8 100644
+--- a/lib/sanitizer_common/sanitizer_platform.h
++++ b/lib/sanitizer_common/sanitizer_platform.h
+@@ -208,6 +208,12 @@
+ # define SANITIZER_SOLARIS32 0
+ #endif
+
++#if defined(__linux__) && !defined(__GLIBC__)
++# define SANITIZER_NONGNU 1
++#else
++# define SANITIZER_NONGNU 0
++#endif
++
+ #if defined(__myriad2__)
+ # define SANITIZER_MYRIAD2 1
+ #else
+diff --git a/lib/sanitizer_common/sanitizer_platform_interceptors.h b/lib/sanitizer_common/sanitizer_platform_interceptors.h
+index f95539a73..6c53b3415 100644
+--- a/lib/sanitizer_common/sanitizer_platform_interceptors.h
++++ b/lib/sanitizer_common/sanitizer_platform_interceptors.h
+@@ -39,7 +39,7 @@
+ # include "sanitizer_platform_limits_solaris.h"
+ #endif
+
+-#if SANITIZER_LINUX && !SANITIZER_ANDROID
++#if SANITIZER_LINUX && !SANITIZER_ANDROID && !SANITIZER_NONGNU
+ # define SI_LINUX_NOT_ANDROID 1
+ #else
+ # define SI_LINUX_NOT_ANDROID 0
+@@ -322,7 +322,7 @@
+ #define SANITIZER_INTERCEPT_ETHER_R (SI_FREEBSD || SI_LINUX_NOT_ANDROID)
+ #define SANITIZER_INTERCEPT_SHMCTL \
+ (SI_NETBSD || SI_OPENBSD || SI_SOLARIS || \
+- ((SI_FREEBSD || SI_LINUX_NOT_ANDROID) && \
++ ((SI_FREEBSD || SI_LINUX_NOT_ANDROID || SANITIZER_NONGNU) && \
+ SANITIZER_WORDSIZE == 64)) // NOLINT
+ #define SANITIZER_INTERCEPT_RANDOM_R SI_LINUX_NOT_ANDROID
+ #define SANITIZER_INTERCEPT_PTHREAD_ATTR_GET SI_POSIX
+diff --git a/lib/sanitizer_common/sanitizer_platform_limits_posix.cc b/lib/sanitizer_common/sanitizer_platform_limits_posix.cc
+index 54da635d7..2f6ff69c3 100644
+--- a/lib/sanitizer_common/sanitizer_platform_limits_posix.cc
++++ b/lib/sanitizer_common/sanitizer_platform_limits_posix.cc
+@@ -14,6 +14,9 @@
+
+ #include "sanitizer_platform.h"
+
++// Workaround musl <--> linux conflicting definition of 'struct sysinfo'
++#define _LINUX_SYSINFO_H
++
+ #if SANITIZER_LINUX || SANITIZER_FREEBSD || SANITIZER_MAC
+ // Tests in this file assume that off_t-dependent data structures match the
+ // libc ABI. For example, struct dirent here is what readdir() function (as
+@@ -138,12 +141,14 @@ typedef struct user_fpregs elf_fpregset_t;
+
+ #if SANITIZER_LINUX && !SANITIZER_ANDROID
+ #include
+-#include
++# if !SANITIZER_NONGNU
++# include
++# endif
+ #include
+-#include
+-#include
+-#include
+-#include
++#include
++#include
++#include
++#include
+ #if HAVE_RPC_XDR_H
+ # include
+ #elif HAVE_TIRPC_RPC_XDR_H
+@@ -251,7 +256,7 @@ namespace __sanitizer {
+ unsigned struct_itimerspec_sz = sizeof(struct itimerspec);
+ #endif // SANITIZER_LINUX || SANITIZER_FREEBSD
+
+-#if SANITIZER_LINUX && !SANITIZER_ANDROID
++#if SANITIZER_LINUX && !SANITIZER_ANDROID && !SANITIZER_NONGNU
+ // Use pre-computed size of struct ustat to avoid which
+ // has been removed from glibc 2.28.
+ #if defined(__aarch64__) || defined(__s390x__) || defined (__mips64) \
+@@ -322,7 +327,7 @@ unsigned struct_ElfW_Phdr_sz = sizeof(ElfW(Phdr));
+ unsigned struct_ElfW_Phdr_sz = sizeof(Elf_Phdr);
+ #endif
+
+-#if (SANITIZER_LINUX || SANITIZER_FREEBSD) && !SANITIZER_ANDROID
++#if (SANITIZER_LINUX || SANITIZER_FREEBSD) && !SANITIZER_ANDROID && !SANITIZER_NONGNU
+ int glob_nomatch = GLOB_NOMATCH;
+ int glob_altdirfunc = GLOB_ALTDIRFUNC;
+ #endif
+@@ -416,7 +421,7 @@ unsigned struct_ElfW_Phdr_sz = sizeof(Elf_Phdr);
+ unsigned struct_termios_sz = sizeof(struct termios);
+ unsigned struct_winsize_sz = sizeof(struct winsize);
+
+-#if SANITIZER_LINUX
++#if SANITIZER_LINUX && !SANITIZER_NONGNU
+ unsigned struct_arpreq_sz = sizeof(struct arpreq);
+ unsigned struct_cdrom_msf_sz = sizeof(struct cdrom_msf);
+ unsigned struct_cdrom_multisession_sz = sizeof(struct cdrom_multisession);
+@@ -466,7 +471,7 @@ unsigned struct_ElfW_Phdr_sz = sizeof(Elf_Phdr);
+ unsigned struct_vt_mode_sz = sizeof(struct vt_mode);
+ #endif // SANITIZER_LINUX || SANITIZER_FREEBSD
+
+-#if SANITIZER_LINUX && !SANITIZER_ANDROID
++#if SANITIZER_LINUX && !SANITIZER_ANDROID && !SANITIZER_NONGNU
+ unsigned struct_ax25_parms_struct_sz = sizeof(struct ax25_parms_struct);
+ unsigned struct_cyclades_monitor_sz = sizeof(struct cyclades_monitor);
+ #if EV_VERSION > (0x010000)
+@@ -834,7 +839,7 @@ unsigned struct_ElfW_Phdr_sz = sizeof(Elf_Phdr);
+ unsigned IOCTL_VT_WAITACTIVE = VT_WAITACTIVE;
+ #endif // SANITIZER_LINUX || SANITIZER_FREEBSD
+
+-#if SANITIZER_LINUX && !SANITIZER_ANDROID
++#if SANITIZER_LINUX && !SANITIZER_ANDROID && !SANITIZER_NONGNU
+ unsigned IOCTL_CYGETDEFTHRESH = CYGETDEFTHRESH;
+ unsigned IOCTL_CYGETDEFTIMEOUT = CYGETDEFTIMEOUT;
+ unsigned IOCTL_CYGETMON = CYGETMON;
+@@ -989,7 +994,7 @@ CHECK_SIZE_AND_OFFSET(dl_phdr_info, dlpi_phdr);
+ CHECK_SIZE_AND_OFFSET(dl_phdr_info, dlpi_phnum);
+ #endif // SANITIZER_LINUX || SANITIZER_FREEBSD
+
+-#if (SANITIZER_LINUX || SANITIZER_FREEBSD) && !SANITIZER_ANDROID
++#if (SANITIZER_LINUX || SANITIZER_FREEBSD) && !SANITIZER_ANDROID && !SANITIZER_NONGNU
+ CHECK_TYPE_SIZE(glob_t);
+ CHECK_SIZE_AND_OFFSET(glob_t, gl_pathc);
+ CHECK_SIZE_AND_OFFSET(glob_t, gl_pathv);
+@@ -1023,6 +1028,7 @@ CHECK_TYPE_SIZE(iovec);
+ CHECK_SIZE_AND_OFFSET(iovec, iov_base);
+ CHECK_SIZE_AND_OFFSET(iovec, iov_len);
+
++#if !SANITIZER_NONGNU
+ CHECK_TYPE_SIZE(msghdr);
+ CHECK_SIZE_AND_OFFSET(msghdr, msg_name);
+ CHECK_SIZE_AND_OFFSET(msghdr, msg_namelen);
+@@ -1036,6 +1042,7 @@ CHECK_TYPE_SIZE(cmsghdr);
+ CHECK_SIZE_AND_OFFSET(cmsghdr, cmsg_len);
+ CHECK_SIZE_AND_OFFSET(cmsghdr, cmsg_level);
+ CHECK_SIZE_AND_OFFSET(cmsghdr, cmsg_type);
++#endif
+
+ #ifndef __GLIBC_PREREQ
+ #define __GLIBC_PREREQ(x, y) 0
+@@ -1145,7 +1152,7 @@ CHECK_SIZE_AND_OFFSET(mntent, mnt_passno);
+
+ CHECK_TYPE_SIZE(ether_addr);
+
+-#if (SANITIZER_LINUX || SANITIZER_FREEBSD) && !SANITIZER_ANDROID
++#if (SANITIZER_LINUX || SANITIZER_FREEBSD) && !SANITIZER_ANDROID && !SANITIZER_NONGNU
+ CHECK_TYPE_SIZE(ipc_perm);
+ # if SANITIZER_FREEBSD
+ CHECK_SIZE_AND_OFFSET(ipc_perm, key);
+@@ -1206,7 +1213,7 @@ CHECK_SIZE_AND_OFFSET(ifaddrs, ifa_dstaddr);
+ CHECK_SIZE_AND_OFFSET(ifaddrs, ifa_data);
+ #endif
+
+-#if SANITIZER_LINUX
++#if SANITIZER_LINUX && !SANITIZER_NONGNU
+ COMPILER_CHECK(sizeof(__sanitizer_mallinfo) == sizeof(struct mallinfo));
+ #endif
+
+@@ -1256,7 +1263,7 @@ COMPILER_CHECK(__sanitizer_XDR_DECODE == XDR_DECODE);
+ COMPILER_CHECK(__sanitizer_XDR_FREE == XDR_FREE);
+ #endif
+
+-#if SANITIZER_LINUX && !SANITIZER_ANDROID
++#if SANITIZER_LINUX && !SANITIZER_ANDROID && !SANITIZER_NONGNU
+ COMPILER_CHECK(sizeof(__sanitizer_FILE) <= sizeof(FILE));
+ CHECK_SIZE_AND_OFFSET(FILE, _flags);
+ CHECK_SIZE_AND_OFFSET(FILE, _IO_read_ptr);
+@@ -1275,7 +1282,7 @@ CHECK_SIZE_AND_OFFSET(FILE, _chain);
+ CHECK_SIZE_AND_OFFSET(FILE, _fileno);
+ #endif
+
+-#if SANITIZER_LINUX && !SANITIZER_ANDROID
++#if SANITIZER_LINUX && !SANITIZER_ANDROID && !SANITIZER_NONGNU
+ COMPILER_CHECK(sizeof(__sanitizer__obstack_chunk) <= sizeof(_obstack_chunk));
+ CHECK_SIZE_AND_OFFSET(_obstack_chunk, limit);
+ CHECK_SIZE_AND_OFFSET(_obstack_chunk, prev);
+diff --git a/lib/tsan/rtl/tsan_platform_linux.cc b/lib/tsan/rtl/tsan_platform_linux.cc
+index de989b780..51a97b554 100644
+--- a/lib/tsan/rtl/tsan_platform_linux.cc
++++ b/lib/tsan/rtl/tsan_platform_linux.cc
+@@ -294,7 +294,7 @@ void InitializePlatform() {
+ // This is required to properly "close" the fds, because we do not see internal
+ // closes within glibc. The code is a pure hack.
+ int ExtractResolvFDs(void *state, int *fds, int nfd) {
+-#if SANITIZER_LINUX && !SANITIZER_ANDROID
++#if SANITIZER_LINUX && !SANITIZER_ANDROID && !SANITIZER_NONGNU
+ int cnt = 0;
+ struct __res_state *statp = (struct __res_state*)state;
+ for (int i = 0; i < MAXNS && cnt < nfd; i++) {
+--
+2.19.0
+
diff --git a/pkgs/development/compilers/ponyc/default.nix b/pkgs/development/compilers/ponyc/default.nix
index fbb4db72bd4..767eafc456c 100644
--- a/pkgs/development/compilers/ponyc/default.nix
+++ b/pkgs/development/compilers/ponyc/default.nix
@@ -3,13 +3,13 @@
stdenv.mkDerivation ( rec {
name = "ponyc-${version}";
- version = "0.26.0";
+ version = "0.27.0";
src = fetchFromGitHub {
owner = "ponylang";
repo = "ponyc";
rev = version;
- sha256 = "1k1ysqk7j8kpysndps2ic9hprvp0z0d32d6jvqlapjrfccghy7dh";
+ sha256 = "11vdfvv9xirfi92y7zza9pqimfx33w74vw7rg5n7l60qqc8y2cla";
};
buildInputs = [ llvm makeWrapper which ];
@@ -25,25 +25,15 @@ stdenv.mkDerivation ( rec {
substituteInPlace packages/process/_test.pony \
--replace '=/bin' "${coreutils}/bin"
-
- # Fix llvm-ar check for darwin
- substituteInPlace Makefile \
- --replace "llvm-ar-3.8" "llvm-ar"
-
# Remove impure system refs
substituteInPlace src/libponyc/pkg/package.c \
- --replace "/usr/local/lib" ""
- substituteInPlace src/libponyc/pkg/package.c \
+ --replace "/usr/local/lib" "" \
--replace "/opt/local/lib" ""
for file in `grep -irl '/usr/local/opt/libressl/lib' ./*`; do
substituteInPlace $file --replace '/usr/local/opt/libressl/lib' "${stdenv.lib.getLib libressl}/lib"
done
- # Fix ponypath issue
- substituteInPlace Makefile \
- --replace "PONYPATH=." "PONYPATH=.:\$(PONYPATH)"
-
export LLVM_CONFIG=${llvm}/bin/llvm-config
'' + stdenv.lib.optionalString ((!stdenv.isDarwin) && (!cc.isClang) && lto) ''
export LTO_PLUGIN=`find ${cc.cc}/ -name liblto_plugin.so`
@@ -73,9 +63,7 @@ stdenv.mkDerivation ( rec {
wrapProgram $out/bin/ponyc \
--prefix PATH ":" "${stdenv.cc}/bin" \
--set-default CC "$CC" \
- --prefix PONYPATH : "$out/lib" \
- --prefix PONYPATH : "${stdenv.lib.getLib pcre2}/lib" \
- --prefix PONYPATH : "${stdenv.lib.getLib libressl}/lib"
+ --prefix PONYPATH : "${stdenv.lib.makeLibraryPath [ pcre2 libressl (placeholder "out") ]}"
'';
# Stripping breaks linking for ponyc
diff --git a/pkgs/development/compilers/ponyc/pony-stable.nix b/pkgs/development/compilers/ponyc/pony-stable.nix
index 6dfb099242d..821a9b8125c 100644
--- a/pkgs/development/compilers/ponyc/pony-stable.nix
+++ b/pkgs/development/compilers/ponyc/pony-stable.nix
@@ -2,20 +2,18 @@
stdenv.mkDerivation rec {
name = "pony-stable-${version}";
- version = "0.1.6";
+ version = "0.2.0";
src = fetchFromGitHub {
owner = "ponylang";
repo = "pony-stable";
rev = version;
- sha256 = "02lqba75psnxcxj2y8lm1fy1hmwa088nvxjghhpnlkqbwz7wa2sw";
+ sha256 = "0zzcq0vsl6kcrsxwqzd3s9mq7aq5sg8si5c83rxyi9n6a06gnbh7";
};
buildInputs = [ ponyc ];
- installPhase = ''
- make prefix=$out install
- '';
+ installFlags = [ "prefix=${placeholder "out"}" "install" ];
meta = {
description = "A simple dependency manager for the Pony language.";
diff --git a/pkgs/development/compilers/solc/default.nix b/pkgs/development/compilers/solc/default.nix
index bd4b10ddec0..2f3674fdbea 100644
--- a/pkgs/development/compilers/solc/default.nix
+++ b/pkgs/development/compilers/solc/default.nix
@@ -3,11 +3,12 @@
}:
assert z3Support -> z3 != null;
+assert z3Support -> stdenv.lib.versionAtLeast z3.version "4.6.0";
let
- version = "0.5.3";
- rev = "10d17f245839f208ec5085309022a32cd2502f55";
- sha256 = "1jq41pd3nj534cricy1nq6wgk4wlwg239387n785aswpwd705jbb";
+ version = "0.5.4";
+ rev = "9549d8fff7343908228c3e8bedc309d1b83fc204";
+ sha256 = "1r6wklp3ab2s1lrm70zv6p7blv9917ph1arjsb250j7b7bpjg5pq";
jsoncppURL = https://github.com/open-source-parsers/jsoncpp/archive/1.8.4.tar.gz;
jsoncpp = fetchzip {
url = jsoncppURL;
diff --git a/pkgs/development/compilers/swi-prolog/default.nix b/pkgs/development/compilers/swi-prolog/default.nix
index 3ddffd58505..1aea771e499 100644
--- a/pkgs/development/compilers/swi-prolog/default.nix
+++ b/pkgs/development/compilers/swi-prolog/default.nix
@@ -47,6 +47,6 @@ stdenv.mkDerivation {
license = "LGPL";
platforms = stdenv.lib.platforms.unix;
- maintainers = [ stdenv.lib.maintainers.peti stdenv.lib.maintainers.meditans ];
+ maintainers = [ stdenv.lib.maintainers.meditans ];
};
}
diff --git a/pkgs/development/compilers/swift/default.nix b/pkgs/development/compilers/swift/default.nix
index 468c04b5c96..91fb962f87c 100644
--- a/pkgs/development/compilers/swift/default.nix
+++ b/pkgs/development/compilers/swift/default.nix
@@ -34,7 +34,7 @@
}:
let
- v_base = "4.2.2";
+ v_base = "4.2.3";
version = "${v_base}-RELEASE";
version_friendly = "${v_base}";
@@ -84,16 +84,16 @@ let
};
foundation = fetch {
repo = "swift-corelibs-foundation";
- sha256 = "1ki9vc723r13zgm6bcmif43aypavb2hz299gbhp93qkndz8hqkx5";
+ sha256 = "11kwc5pcq4ibxkyglmqs7h7gka3xkzl9j856x1rq2xdvq756wq2s";
};
libdispatch = fetch {
repo = "swift-corelibs-libdispatch";
- sha256 = "0fibrx54nbaawhsgd7cbr356ji9qvf8y8ahd5bdx28fpj6q0cnwc";
+ sha256 = "09c15mn9s5lf2akzfhik70zk91h97nnm8pq1ppfqry2nn3vmib2i";
fetchSubmodules = true;
};
swift = fetch {
repo = "swift";
- sha256 = "1hwi6hi9ss1kj1s65v5q8v8d872c0914qfy1018xijd029lwq694";
+ sha256 = "09wksqad0w6pk3xdxc278w4mj300h48rvbvx0m4an7npkj6i7n9q";
};
};
diff --git a/pkgs/development/haskell-modules/configuration-common.nix b/pkgs/development/haskell-modules/configuration-common.nix
index e27348b9455..de3c875cbbf 100644
--- a/pkgs/development/haskell-modules/configuration-common.nix
+++ b/pkgs/development/haskell-modules/configuration-common.nix
@@ -1075,6 +1075,9 @@ self: super: {
cborg = doJailbreak super.cborg;
serialise = doJailbreak (dontCheck super.serialise);
+ # https://github.com/haskell-hvr/netrc/pull/2#issuecomment-469526558
+ netrc = doJailbreak super.netrc;
+
# https://github.com/phadej/tree-diff/issues/19
tree-diff = doJailbreak super.tree-diff;
@@ -1216,8 +1219,11 @@ self: super: {
# Use latest pandoc despite what LTS says.
# Test suite fails in both 2.5 and 2.6: https://github.com/jgm/pandoc/issues/5309.
- pandoc = doDistribute (dontCheck super.pandoc_2_6);
- pandoc-citeproc = self.pandoc-citeproc_0_16_1;
+ pandoc = doDistribute super.pandoc_2_7;
+ pandoc-citeproc = self.pandoc-citeproc_0_16_1_1;
+ skylighting = self.skylighting_0_7_7;
+ skylighting-core = self.skylighting-core_0_7_7;
+ texmath = self.texmath_0_11_2_1;
# https://github.com/qfpl/tasty-hedgehog/issues/24
tasty-hedgehog = dontCheck super.tasty-hedgehog;
diff --git a/pkgs/development/haskell-modules/configuration-ghc-8.4.x.nix b/pkgs/development/haskell-modules/configuration-ghc-8.4.x.nix
index 4e953b7b6af..e8c138e594c 100644
--- a/pkgs/development/haskell-modules/configuration-ghc-8.4.x.nix
+++ b/pkgs/development/haskell-modules/configuration-ghc-8.4.x.nix
@@ -40,6 +40,10 @@ self: super: {
unix = null;
xhtml = null;
+ # Restricts aeson to <1.4
+ # https://github.com/purescript/purescript/pull/3537
+ purescript = doJailbreak super.purescript;
+
# https://github.com/jcristovao/enclosed-exceptions/issues/12
enclosed-exceptions = dontCheck super.enclosed-exceptions;
diff --git a/pkgs/development/haskell-modules/configuration-hackage2nix.yaml b/pkgs/development/haskell-modules/configuration-hackage2nix.yaml
index 28022fdf41c..be824e62f86 100644
--- a/pkgs/development/haskell-modules/configuration-hackage2nix.yaml
+++ b/pkgs/development/haskell-modules/configuration-hackage2nix.yaml
@@ -46,7 +46,7 @@ default-package-overrides:
# Newer versions don't work in LTS-12.x
- alsa-mixer < 0.3
- cassava-megaparsec < 2
- # LTS Haskell 13.9
+ # LTS Haskell 13.10
- abstract-deque ==0.3
- abstract-deque-tests ==0.3
- abstract-par ==0.3.3
@@ -981,8 +981,8 @@ default-package-overrides:
- hsdns ==1.7.1
- hsebaysdk ==0.4.0.0
- hsemail ==2
- - hset ==2.2.0
- HSet ==0.0.1
+ - hset ==2.2.0
- hsexif ==0.6.1.6
- hs-functors ==0.1.3.0
- hs-GeoIP ==0.3
@@ -1028,8 +1028,8 @@ default-package-overrides:
- html-entities ==1.1.4.2
- html-entity-map ==0.1.0.0
- htoml ==1.0.0.3
- - HTTP ==4000.3.12
- http2 ==1.6.4
+ - HTTP ==4000.3.12
- http-api-data ==0.4
- http-client ==0.5.14
- http-client-tls ==0.3.5.3
diff --git a/pkgs/development/haskell-modules/hackage-packages.nix b/pkgs/development/haskell-modules/hackage-packages.nix
index 8b0f62c60f9..773ebe5e63e 100644
--- a/pkgs/development/haskell-modules/hackage-packages.nix
+++ b/pkgs/development/haskell-modules/hackage-packages.nix
@@ -1861,8 +1861,8 @@ self: {
}:
mkDerivation {
pname = "BlogLiterately";
- version = "0.8.6.2";
- sha256 = "0prk58bxmy0va5i1blc02w8szspavnj4jz6dv9pjg7z64cs863jy";
+ version = "0.8.6.3";
+ sha256 = "02a4mjz9lbx19plkanmdlm730dwphkdi79a5b5hcnrbilcy8k71n";
isLibrary = true;
isExecutable = true;
libraryHaskellDepends = [
@@ -1880,17 +1880,18 @@ self: {
"BlogLiterately-diagrams" = callPackage
({ mkDerivation, base, BlogLiterately, containers, diagrams-builder
, diagrams-lib, diagrams-rasterific, directory, filepath
- , JuicyPixels, pandoc, safe
+ , JuicyPixels, pandoc, safe, split
}:
mkDerivation {
pname = "BlogLiterately-diagrams";
- version = "0.2.0.6";
- sha256 = "1ps9k7x0s7w0pbf8v7fphm1nyfh5dbxjm3zc1bfjxry4ciqljfyq";
+ version = "0.2.1";
+ sha256 = "0ki56kc51p1b9zkvs91adgj140pchnbdwfmhsvb4qzzf9sz90kjb";
isLibrary = true;
isExecutable = true;
libraryHaskellDepends = [
base BlogLiterately containers diagrams-builder diagrams-lib
diagrams-rasterific directory filepath JuicyPixels pandoc safe
+ split
];
executableHaskellDepends = [ base BlogLiterately ];
description = "Include images in blog posts with inline diagrams code";
@@ -12610,6 +12611,8 @@ self: {
pname = "MonadRandom";
version = "0.5.1.1";
sha256 = "0w44jl1n3kqvqaflh82l1wj3xxbhzfs3kf4m8rk7w6fgg8llmnmb";
+ revision = "1";
+ editedCabalFile = "14izcj2myfsvfwiy1w78q5zddxd6za77yy6b8zwb1x49lnw7jpck";
libraryHaskellDepends = [
base mtl primitive random transformers transformers-compat
];
@@ -22042,8 +22045,8 @@ self: {
pname = "aeson-extra";
version = "0.4.1.1";
sha256 = "1y7xss382hdxrv4jzprsm3b7ij7wiw8jgjg9wp49dx6bfvcnb2nl";
- revision = "3";
- editedCabalFile = "0b9ccv529msmqay0gw2xcxm67n08hmv6s45ivyd8vq0rig4wz407";
+ revision = "4";
+ editedCabalFile = "0ja5vr9w22wyknkjyl7w43frdfdfnxphvrai1b18lhinjqcd9bl5";
libraryHaskellDepends = [
aeson aeson-compat attoparsec attoparsec-iso8601 base
base-compat-batteries bytestring containers deepseq exceptions
@@ -22814,8 +22817,8 @@ self: {
}:
mkDerivation {
pname = "aip";
- version = "0.1.1";
- sha256 = "05pv8m5wjzpj5wxsad6rzka9fcch5aakd73697ndaiwasqajvx3d";
+ version = "0.1.3";
+ sha256 = "10gc9k74ag5i7qbir1jarpap919b010k9zgqadj15cg1hb138k18";
isLibrary = true;
isExecutable = true;
libraryHaskellDepends = [
@@ -28874,6 +28877,8 @@ self: {
pname = "arbor-monad-metric-datadog";
version = "1.0.0";
sha256 = "07hqghjrl25ky0rn4mnwia5b90zhf88w6zkqyscs527c0c6dkybc";
+ revision = "2";
+ editedCabalFile = "0x8dp7xh1rpd9db2kiya8sr9nc7wzka256jxsvxqfmphd08yc4ad";
libraryHaskellDepends = [
arbor-datadog arbor-monad-metric base bytestring containers
generic-lens lens mtl network resourcet stm text transformers
@@ -32106,6 +32111,40 @@ self: {
license = stdenv.lib.licenses.bsd3;
}) {};
+ "avro_0_4_3_0" = callPackage
+ ({ mkDerivation, aeson, array, base, base16-bytestring, bifunctors
+ , binary, bytestring, containers, data-binary-ieee754, deepseq
+ , directory, extra, fail, gauge, hashable, hspec, hspec-discover
+ , lens, lens-aeson, mtl, pure-zlib, QuickCheck, random, scientific
+ , semigroups, tagged, template-haskell, text, tf-random
+ , transformers, unordered-containers, vector, zlib
+ }:
+ mkDerivation {
+ pname = "avro";
+ version = "0.4.3.0";
+ sha256 = "0sv1l51gv6yf4zr4xv5icksmj59qxfzz80y0k5y10mzh7qgyxf88";
+ libraryHaskellDepends = [
+ aeson array base base16-bytestring bifunctors binary bytestring
+ containers data-binary-ieee754 deepseq fail hashable mtl scientific
+ semigroups tagged template-haskell text tf-random
+ unordered-containers vector zlib
+ ];
+ testHaskellDepends = [
+ aeson array base base16-bytestring bifunctors binary bytestring
+ containers directory extra fail hashable hspec lens lens-aeson mtl
+ pure-zlib QuickCheck scientific semigroups tagged template-haskell
+ text tf-random transformers unordered-containers vector
+ ];
+ testToolDepends = [ hspec-discover ];
+ benchmarkHaskellDepends = [
+ aeson base bytestring containers gauge hashable mtl random text
+ transformers unordered-containers vector
+ ];
+ description = "Avro serialization support for Haskell";
+ license = stdenv.lib.licenses.bsd3;
+ hydraPlatforms = stdenv.lib.platforms.none;
+ }) {};
+
"avwx" = callPackage
({ mkDerivation, attoparsec, base, HTTP, lens, optparse-applicative
, parsers, pretty-show, text
@@ -34471,7 +34510,7 @@ self: {
description = "BDCS API Server";
license = stdenv.lib.licenses.gpl3;
hydraPlatforms = stdenv.lib.platforms.none;
- }) {inherit (pkgs.gnome3) libgit2-glib;};
+ }) {inherit (pkgs) libgit2-glib;};
"bdd" = callPackage
({ mkDerivation, base, directory, HUnit, mtl, process
@@ -37782,7 +37821,7 @@ self: {
description = "Proof-of-concept tool for writing using binary choices";
license = "GPL";
hydraPlatforms = stdenv.lib.platforms.none;
- }) {gtk2 = pkgs.gnome2.gtk; inherit (pkgs.gnome2) pango;};
+ }) {inherit (pkgs) gtk2; inherit (pkgs) pango;};
"bitstream" = callPackage
({ mkDerivation, base, base-unicode-symbols, bytestring, QuickCheck
@@ -38952,7 +38991,7 @@ self: {
description = "full-featured tiling for the GNOME desktop environment";
license = stdenv.lib.licenses.bsd3;
hydraPlatforms = stdenv.lib.platforms.none;
- }) {gtk2 = pkgs.gnome2.gtk;};
+ }) {inherit (pkgs) gtk2;};
"bluetileutils" = callPackage
({ mkDerivation, base, gtk }:
@@ -43067,8 +43106,8 @@ self: {
}:
mkDerivation {
pname = "cabal2nix";
- version = "2.14.1";
- sha256 = "1bkhh5s3x6as4pz70p2rgwkrb121k5ic7j5dhmlh0rwvhrr9g1z2";
+ version = "2.14.2";
+ sha256 = "0fa0rhglp3xlv8zr9pnx2l14bz7jvdvdxwiy63rpvf44jzjdknkr";
isLibrary = true;
isExecutable = true;
libraryHaskellDepends = [
@@ -43278,6 +43317,23 @@ self: {
license = stdenv.lib.licenses.bsd3;
}) {};
+ "cached" = callPackage
+ ({ mkDerivation, base, containers, directory, doctest, filepath
+ , protolude, QuickCheck, quickcheck-assertions, shake, text
+ }:
+ mkDerivation {
+ pname = "cached";
+ version = "0.1.0.0";
+ sha256 = "19x5pwcdkhmk32w9ccb2ixc73k2hhqki61yi39lahda5k86jisdv";
+ libraryHaskellDepends = [ base containers protolude shake text ];
+ testHaskellDepends = [
+ base containers directory doctest filepath protolude QuickCheck
+ quickcheck-assertions shake text
+ ];
+ description = "Cache values to disk";
+ license = stdenv.lib.licenses.bsd3;
+ }) {};
+
"cached-io" = callPackage
({ mkDerivation, base, stm, time, transformers }:
mkDerivation {
@@ -43309,36 +43365,39 @@ self: {
"cachix" = callPackage
({ mkDerivation, async, base, base16-bytestring, base64-bytestring
- , bifunctors, bytestring, cachix-api, conduit, conduit-extra
- , cookie, cryptonite, data-default, dhall, directory, ed25519
- , filepath, fsnotify, here, hspec, hspec-discover, http-client
+ , bytestring, cachix-api, conduit, conduit-extra, cookie
+ , cryptonite, data-default, dhall, directory, ed25519, filepath
+ , fsnotify, here, hspec, hspec-discover, http-client
, http-client-tls, http-conduit, http-types, lzma-conduit
- , megaparsec, memory, mmorph, optparse-applicative, process
- , protolude, resourcet, retry, safe-exceptions, servant
- , servant-auth, servant-auth-client, servant-client
- , servant-client-core, servant-streaming-client, streaming, text
- , unix, uri-bytestring, versions
+ , megaparsec, memory, mmorph, netrc, optparse-applicative, process
+ , protolude, retry, safe-exceptions, servant, servant-auth
+ , servant-auth-client, servant-client, servant-client-core
+ , servant-conduit, temporary, text, unix, uri-bytestring, versions
}:
mkDerivation {
pname = "cachix";
- version = "0.1.3";
- sha256 = "0vhgkdrrj8wmnzqsjwyrhflwprnizjibgjwcwn5771mjv38amyx0";
+ version = "0.2.0";
+ sha256 = "0nk6ay0vdq656bwkbnd16y95ivjbi34k8k58gcabr91bgypp1fhn";
+ revision = "1";
+ editedCabalFile = "103ypqp0kclc1814q2ci5fi2jpfbxwmjqfsnkvwf3c1vr8cqplmh";
isLibrary = true;
isExecutable = true;
+ enableSeparateDataOutput = true;
libraryHaskellDepends = [
- async base base16-bytestring base64-bytestring bifunctors
- bytestring cachix-api conduit conduit-extra cookie cryptonite
- data-default dhall directory ed25519 filepath fsnotify here
- http-client http-client-tls http-conduit http-types lzma-conduit
- megaparsec memory mmorph optparse-applicative process protolude
- resourcet retry safe-exceptions servant servant-auth
- servant-auth-client servant-client servant-client-core
- servant-streaming-client streaming text unix uri-bytestring
- versions
+ async base base16-bytestring base64-bytestring bytestring
+ cachix-api conduit conduit-extra cookie cryptonite data-default
+ dhall directory ed25519 filepath fsnotify here http-client
+ http-client-tls http-conduit http-types lzma-conduit megaparsec
+ memory mmorph netrc optparse-applicative process protolude retry
+ safe-exceptions servant servant-auth servant-auth-client
+ servant-client servant-client-core servant-conduit text unix
+ uri-bytestring versions
];
executableHaskellDepends = [ base cachix-api ];
executableToolDepends = [ hspec-discover ];
- testHaskellDepends = [ base cachix-api here hspec protolude ];
+ testHaskellDepends = [
+ base cachix-api directory here hspec protolude temporary
+ ];
description = "Command line client for Nix binary cache hosting https://cachix.org";
license = stdenv.lib.licenses.asl20;
hydraPlatforms = stdenv.lib.platforms.none;
@@ -43379,6 +43438,42 @@ self: {
hydraPlatforms = stdenv.lib.platforms.none;
}) {};
+ "cachix-api_0_2_0" = callPackage
+ ({ mkDerivation, aeson, base, base16-bytestring, bytestring
+ , conduit, cookie, cryptonite, deepseq, exceptions, hspec
+ , hspec-discover, http-api-data, http-media, lens, memory
+ , protolude, resourcet, servant, servant-auth, servant-auth-server
+ , servant-auth-swagger, servant-client, servant-swagger
+ , servant-swagger-ui-core, string-conv, swagger2, text
+ , transformers
+ }:
+ mkDerivation {
+ pname = "cachix-api";
+ version = "0.2.0";
+ sha256 = "1wmyxknd5fliqfsavngpj01i34jcl39rsm1lx0nf13vlsf279wkk";
+ isLibrary = true;
+ isExecutable = true;
+ libraryHaskellDepends = [
+ aeson base base16-bytestring bytestring conduit cookie cryptonite
+ deepseq exceptions http-api-data http-media lens memory resourcet
+ servant servant-auth servant-auth-server servant-auth-swagger
+ servant-client servant-swagger string-conv swagger2 text
+ transformers
+ ];
+ executableHaskellDepends = [ aeson base ];
+ testHaskellDepends = [
+ aeson base base16-bytestring bytestring conduit cookie cryptonite
+ hspec http-api-data http-media lens memory protolude servant
+ servant-auth servant-auth-server servant-auth-swagger
+ servant-swagger servant-swagger-ui-core string-conv swagger2 text
+ transformers
+ ];
+ testToolDepends = [ hspec-discover ];
+ description = "Servant HTTP API specification for https://cachix.org";
+ license = stdenv.lib.licenses.asl20;
+ hydraPlatforms = stdenv.lib.platforms.none;
+ }) {};
+
"cacophony" = callPackage
({ mkDerivation, aeson, async, attoparsec, base, base16-bytestring
, bytestring, criterion, cryptonite, deepseq, directory, exceptions
@@ -45481,7 +45576,7 @@ self: {
description = "Raw CEF3 bindings";
license = stdenv.lib.licenses.bsd3;
hydraPlatforms = stdenv.lib.platforms.none;
- }) {cef = null; gtk2 = pkgs.gnome2.gtk;};
+ }) {cef = null; inherit (pkgs) gtk2;};
"cef3-simple" = callPackage
({ mkDerivation, base, cef3-raw }:
@@ -45531,7 +45626,7 @@ self: {
description = "Cairo-based CellRenderer";
license = stdenv.lib.licenses.bsd3;
hydraPlatforms = stdenv.lib.platforms.none;
- }) {gtk2 = pkgs.gnome2.gtk;};
+ }) {inherit (pkgs) gtk2;};
"celtchar" = callPackage
({ mkDerivation, base, bytestring, directory, file-embed, filepath
@@ -49288,7 +49383,7 @@ self: {
description = "Bindings to the Clutter animation library";
license = "LGPL";
hydraPlatforms = stdenv.lib.platforms.none;
- }) {inherit (pkgs) clutter; inherit (pkgs.gnome2) pango;};
+ }) {inherit (pkgs) clutter; inherit (pkgs) pango;};
"cmaes" = callPackage
({ mkDerivation, base, doctest, doctest-prop, mtl, process, random
@@ -55212,21 +55307,23 @@ self: {
({ mkDerivation, base, binary, bytestring, bzlib
, composition-prelude, containers, cpphs, dhall, directory
, filemanip, filepath, hashable, hspec, hspec-megaparsec
- , http-client, http-client-tls, lzma, megaparsec, microlens, mtl
- , network-uri, optparse-applicative, prettyprinter, process
- , recursion, tar, temporary, text, zip-archive, zlib
+ , http-client, http-client-tls, libarchive, lzma, megaparsec
+ , microlens, mtl, network-uri, optparse-applicative, prettyprinter
+ , process, recursion, tar, temporary, text, zip-archive, zlib
}:
mkDerivation {
pname = "cpkg";
- version = "0.1.0.0";
- sha256 = "1hfnmxcwlm6jnh0q1mm0bzi2xirqanz9ygijp3rzngv51m69n35q";
+ version = "0.1.1.0";
+ sha256 = "1qmz4m9kbkmcb0i7iy1ay1hkkqh826v98lpqf0zpk7sin686xjv4";
+ revision = "1";
+ editedCabalFile = "004178xsld8mmy07z23x51vzbjrjprv17k8mq29vgibkm5kd1l5r";
isLibrary = true;
isExecutable = true;
libraryHaskellDepends = [
base binary bytestring bzlib composition-prelude containers dhall
directory filemanip filepath hashable http-client http-client-tls
- lzma megaparsec microlens mtl network-uri prettyprinter process
- recursion tar temporary text zip-archive zlib
+ libarchive lzma megaparsec microlens mtl network-uri prettyprinter
+ process recursion tar temporary text zip-archive zlib
];
libraryToolDepends = [ cpphs ];
executableHaskellDepends = [
@@ -60535,27 +60632,30 @@ self: {
}) {};
"datadog-tracing" = callPackage
- ({ mkDerivation, aeson, base, bytestring, containers
- , generic-random, hspec-golden-aeson, prettyprinter, QuickCheck
- , quickcheck-text, refined, servant, servant-client, servant-server
- , tasty, tasty-discover, tasty-hspec, text, time, warp
+ ({ mkDerivation, aeson, base, bytestring, containers, ffunctor
+ , generic-random, hspec-golden-aeson, mtl, prettyprinter
+ , QuickCheck, quickcheck-text, refined, servant, servant-client
+ , servant-server, tasty, tasty-discover, tasty-hspec, text, time
+ , warp
}:
mkDerivation {
pname = "datadog-tracing";
- version = "1.1.0";
- sha256 = "1zrdbgljm35r8nqw0lg4pq1ywcv76ifplgdh860zq9sjdz5f5lxi";
+ version = "1.2.0";
+ sha256 = "1227rkrmlbqbxbvmyhm5yg5wd0jbbiy7vjyqq6vzksvpx2kifsdy";
isLibrary = true;
isExecutable = true;
libraryHaskellDepends = [
- aeson base bytestring containers generic-random prettyprinter
- QuickCheck quickcheck-text refined servant servant-client text time
+ aeson base bytestring containers ffunctor generic-random mtl
+ prettyprinter QuickCheck quickcheck-text refined servant
+ servant-client text time
];
executableHaskellDepends = [
- aeson base bytestring containers servant servant-server text warp
+ aeson base bytestring containers mtl servant servant-server text
+ warp
];
testHaskellDepends = [
- aeson base bytestring containers hspec-golden-aeson servant tasty
- tasty-hspec text
+ aeson base bytestring containers hspec-golden-aeson mtl servant
+ tasty tasty-hspec text
];
testToolDepends = [ tasty-discover ];
description = "Datadog tracing client and mock agent";
@@ -62745,14 +62845,14 @@ self: {
license = stdenv.lib.licenses.mit;
}) {};
- "deque_0_3_1" = callPackage
+ "deque_0_4_0_2" = callPackage
({ mkDerivation, base, mtl, QuickCheck, quickcheck-instances
, rerebase, strict-list, tasty, tasty-hunit, tasty-quickcheck
}:
mkDerivation {
pname = "deque";
- version = "0.3.1";
- sha256 = "0gf5jy0vx3i3s3sdf8xiq2gk4m9hi0vacg8ifhx8j41papp9afl9";
+ version = "0.4.0.2";
+ sha256 = "01ipk4dw8lgc5r3d224va9imli8wa5i8dknk7xzfv64pmm6gh6wa";
libraryHaskellDepends = [ base mtl strict-list ];
testHaskellDepends = [
QuickCheck quickcheck-instances rerebase tasty tasty-hunit
@@ -66322,8 +66422,8 @@ self: {
}:
mkDerivation {
pname = "distribution-nixpkgs";
- version = "1.1.1";
- sha256 = "1694crd3l9cyc0c5xvqmx62154519g2cnpzc5qmlypwrk258bssm";
+ version = "1.2";
+ sha256 = "0123plf001136q5gd9brq6vhpnx7db6gixx5sagp5l8jd2qpb244";
libraryHaskellDepends = [
aeson base bytestring Cabal containers deepseq language-nix lens
pretty process split
@@ -67977,8 +68077,8 @@ self: {
}:
mkDerivation {
pname = "drifter";
- version = "0.2.3";
- sha256 = "0f16v4v0ff27qk71a6fsrcwy02nc53g9q1qrfscn8q3swi3rslyz";
+ version = "0.2.4";
+ sha256 = "012x67lncwlrf2kjmfki4lz3sclpj1gjf7wyszagwm523grp1qly";
libraryHaskellDepends = [ base containers fgl text ];
testHaskellDepends = [
base tasty tasty-hunit tasty-quickcheck text
@@ -68364,8 +68464,8 @@ self: {
pname = "dual-game";
version = "0.1.0.1";
sha256 = "1w69d7d2xbpi82n41gq08qdmldh834ka7qwvy159vsac556wwcfg";
- revision = "2";
- editedCabalFile = "077gbc640ab3846bijbiif89r3ska3aab7g2r9cd7dl9c7iy35w8";
+ revision = "4";
+ editedCabalFile = "1ln3lwx4h7yi3gf5r4ix92nvjcjjhphiqan1lnci81wn0frs9wrz";
isLibrary = false;
isExecutable = true;
executableHaskellDepends = [
@@ -72288,6 +72388,18 @@ self: {
license = stdenv.lib.licenses.bsd3;
}) {};
+ "error-codes" = callPackage
+ ({ mkDerivation, base, primitive }:
+ mkDerivation {
+ pname = "error-codes";
+ version = "0.1.0.0";
+ sha256 = "1i78vxk5ldasbn0fs8nwjfsjzkxjmg05i6vgzs4jlj1ajsgwhhkj";
+ libraryHaskellDepends = [ base primitive ];
+ testHaskellDepends = [ base ];
+ description = "Error code functions";
+ license = stdenv.lib.licenses.bsd3;
+ }) {};
+
"error-context" = callPackage
({ mkDerivation, aeson, base, bytestring, exceptions, katip
, monad-logger, mtl, resourcet, safe-exceptions, tasty, tasty-hunit
@@ -72707,6 +72819,35 @@ self: {
hydraPlatforms = stdenv.lib.platforms.none;
}) {};
+ "esqueleto_2_7_0" = callPackage
+ ({ mkDerivation, base, blaze-html, bytestring, conduit, containers
+ , hspec, monad-logger, mysql, mysql-simple, persistent
+ , persistent-mysql, persistent-postgresql, persistent-sqlite
+ , persistent-template, postgresql-libpq, postgresql-simple
+ , resourcet, tagged, text, time, transformers, unliftio
+ , unordered-containers
+ }:
+ mkDerivation {
+ pname = "esqueleto";
+ version = "2.7.0";
+ sha256 = "1cxf26qfymsx578yzpmpdhs7w79s3xw5ar8d359cxbk04j0im2ib";
+ libraryHaskellDepends = [
+ base blaze-html bytestring conduit monad-logger persistent
+ resourcet tagged text time transformers unliftio
+ unordered-containers
+ ];
+ testHaskellDepends = [
+ base blaze-html bytestring conduit containers hspec monad-logger
+ mysql mysql-simple persistent persistent-mysql
+ persistent-postgresql persistent-sqlite persistent-template
+ postgresql-libpq postgresql-simple resourcet tagged text time
+ transformers unliftio unordered-containers
+ ];
+ description = "Type-safe EDSL for SQL queries on persistent backends";
+ license = stdenv.lib.licenses.bsd3;
+ hydraPlatforms = stdenv.lib.platforms.none;
+ }) {};
+
"ess" = callPackage
({ mkDerivation, base }:
mkDerivation {
@@ -73599,6 +73740,42 @@ self: {
hydraPlatforms = stdenv.lib.platforms.none;
}) {};
+ "eventstore_1_2_2" = callPackage
+ ({ mkDerivation, aeson, array, async, base, bifunctors, bytestring
+ , cereal, clock, connection, containers, dns, dotnet-timespan
+ , ekg-core, exceptions, fast-logger, file-embed, hashable
+ , http-client, interpolate, lifted-async, lifted-base, machines
+ , monad-control, monad-logger, mono-traversable, mtl, protobuf
+ , random, safe, safe-exceptions, semigroups, stm, stm-chans
+ , streaming, tasty, tasty-hspec, tasty-hunit, text, time
+ , transformers-base, unordered-containers, uuid, vector
+ }:
+ mkDerivation {
+ pname = "eventstore";
+ version = "1.2.2";
+ sha256 = "0p2qz8z44mdlswan9cp9xpxwbbq345g9r4kh777q18x1k5jbf61j";
+ libraryHaskellDepends = [
+ aeson array base bifunctors bytestring cereal clock connection
+ containers dns dotnet-timespan ekg-core exceptions fast-logger
+ hashable http-client interpolate lifted-async lifted-base machines
+ monad-control monad-logger mono-traversable mtl protobuf random
+ safe safe-exceptions semigroups stm stm-chans streaming text time
+ transformers-base unordered-containers uuid vector
+ ];
+ testHaskellDepends = [
+ aeson async base bytestring cereal connection containers
+ dotnet-timespan exceptions fast-logger file-embed hashable
+ lifted-async lifted-base monad-control mono-traversable protobuf
+ safe safe-exceptions semigroups stm stm-chans streaming tasty
+ tasty-hspec tasty-hunit text time transformers-base
+ unordered-containers uuid vector
+ ];
+ description = "EventStore TCP Client";
+ license = stdenv.lib.licenses.bsd3;
+ platforms = [ "x86_64-darwin" "x86_64-linux" ];
+ hydraPlatforms = stdenv.lib.platforms.none;
+ }) {};
+
"every" = callPackage
({ mkDerivation, async, base, stm }:
mkDerivation {
@@ -75196,6 +75373,29 @@ self: {
hydraPlatforms = stdenv.lib.platforms.none;
}) {inherit (pkgs.xorg) libXtst;};
+ "fakedata" = callPackage
+ ({ mkDerivation, base, bytestring, containers, directory
+ , exceptions, filepath, hspec, hspec-discover, random
+ , template-haskell, text, vector, yaml
+ }:
+ mkDerivation {
+ pname = "fakedata";
+ version = "0.1.0.0";
+ sha256 = "1qghjb2avamn731jr7x87grvx588wksacnza7xkv47j17gxnbbkk";
+ enableSeparateDataOutput = true;
+ libraryHaskellDepends = [
+ base bytestring containers directory exceptions filepath random
+ template-haskell text vector yaml
+ ];
+ testHaskellDepends = [
+ base bytestring containers directory exceptions filepath hspec
+ hspec-discover random template-haskell text vector yaml
+ ];
+ testToolDepends = [ hspec-discover ];
+ description = "Library for producing fake data";
+ license = stdenv.lib.licenses.bsd3;
+ }) {};
+
"faker" = callPackage
({ mkDerivation, base, gimlh, random, split }:
mkDerivation {
@@ -76826,6 +77026,19 @@ self: {
license = stdenv.lib.licenses.bsd3;
}) {};
+ "fib" = callPackage
+ ({ mkDerivation, base-noprelude, integer-gmp, semirings }:
+ mkDerivation {
+ pname = "fib";
+ version = "0.1";
+ sha256 = "19ppp760993wz4d1w3i5s60k4yqcx40il7l0ak0ylcqqym619zlk";
+ revision = "1";
+ editedCabalFile = "1pi7hhil698v9yk17ncw7raw0sf20yj679jvs2d0p7q8ypl9b1lh";
+ libraryHaskellDepends = [ base-noprelude integer-gmp semirings ];
+ description = "fibonacci algebra";
+ license = stdenv.lib.licenses.bsd3;
+ }) {};
+
"fibon" = callPackage
({ mkDerivation, attoparsec, base, bytestring, bytestring-lexing
, Cabal, cereal, containers, directory, filepath, hslogger, mtl
@@ -82024,6 +82237,8 @@ self: {
pname = "funcons-values";
version = "0.1.0.7";
sha256 = "0jdgwv44gs4zr8z5pg6lzikrgn3dzna8z0vriq71anlifjyci8yq";
+ revision = "1";
+ editedCabalFile = "1aam84wminmcy530vkv8g2qkag6gz45yyx5xks7gq1y7jifm1kkb";
libraryHaskellDepends = [
base bv containers multiset text vector
];
@@ -84677,8 +84892,8 @@ self: {
({ mkDerivation, base, dimensional, lens, semigroups }:
mkDerivation {
pname = "geodetic-types";
- version = "0.0.2";
- sha256 = "1y37ad3x8kkj5mhvaj94bf8mm4ssavkbd3fc513qkyazp1c64g15";
+ version = "0.0.3";
+ sha256 = "0ivadapval9bvrf3kjp3j3rz7dy1dr04y5jh0x25ssrn7sgfxvj0";
libraryHaskellDepends = [ base dimensional lens semigroups ];
description = "Types for geodetic operations";
license = stdenv.lib.licenses.bsd3;
@@ -86016,6 +86231,26 @@ self: {
hydraPlatforms = stdenv.lib.platforms.none;
}) {};
+ "ghci-dap" = callPackage
+ ({ mkDerivation, array, base, bytestring, containers, deepseq
+ , directory, filepath, ghc, ghc-boot, ghc-paths, ghci, haskeline
+ , haskell-dap, process, text, time, transformers, unix
+ }:
+ mkDerivation {
+ pname = "ghci-dap";
+ version = "0.0.11.0";
+ sha256 = "19skxwhv5lgm4vs53y7gckrdrqhcsp7p47gc3lxfkdjqrvskvzks";
+ isLibrary = false;
+ isExecutable = true;
+ executableHaskellDepends = [
+ array base bytestring containers deepseq directory filepath ghc
+ ghc-boot ghc-paths ghci haskeline haskell-dap process text time
+ transformers unix
+ ];
+ description = "ghci-dap is a GHCi having DAP interface";
+ license = stdenv.lib.licenses.bsd3;
+ }) {};
+
"ghci-diagrams" = callPackage
({ mkDerivation, base, cairo, colour, diagrams, gtk }:
mkDerivation {
@@ -86618,7 +86853,7 @@ self: {
doHaddock = false;
description = "DbusmenuGtk bindings";
license = stdenv.lib.licenses.lgpl21;
- }) {gtk3 = pkgs.gtk3; inherit (pkgs) libdbusmenu-gtk3;};
+ }) {inherit (pkgs) gtk3; inherit (pkgs) libdbusmenu-gtk3;};
"gi-gdk" = callPackage
({ mkDerivation, base, bytestring, Cabal, containers, gi-cairo
@@ -86639,7 +86874,7 @@ self: {
libraryPkgconfigDepends = [ gtk3 ];
description = "Gdk bindings";
license = stdenv.lib.licenses.lgpl21;
- }) {gtk3 = pkgs.gtk3;};
+ }) {inherit (pkgs) gtk3;};
"gi-gdkpixbuf" = callPackage
({ mkDerivation, base, bytestring, Cabal, containers, gdk_pixbuf
@@ -86680,7 +86915,7 @@ self: {
doHaddock = false;
description = "GdkX11 bindings";
license = stdenv.lib.licenses.lgpl21;
- }) {gtk3 = pkgs.gtk3;};
+ }) {inherit (pkgs) gtk3;};
"gi-ggit" = callPackage
({ mkDerivation, base, bytestring, Cabal, containers, gi-gio
@@ -86700,7 +86935,7 @@ self: {
doHaddock = false;
description = "libgit2-glib bindings";
license = stdenv.lib.licenses.lgpl21;
- }) {inherit (pkgs.gnome3) libgit2-glib;};
+ }) {inherit (pkgs) libgit2-glib;};
"gi-gio" = callPackage
({ mkDerivation, base, bytestring, Cabal, containers, gi-glib
@@ -86923,7 +87158,7 @@ self: {
libraryPkgconfigDepends = [ gtk3 ];
description = "Gtk bindings";
license = stdenv.lib.licenses.lgpl21;
- }) {gtk3 = pkgs.gtk3;};
+ }) {inherit (pkgs) gtk3;};
"gi-gtk-declarative" = callPackage
({ mkDerivation, base, criterion, gi-gdk, gi-glib, gi-gobject
@@ -87021,7 +87256,7 @@ self: {
doHaddock = false;
description = "GtkSource bindings";
license = stdenv.lib.licenses.lgpl21;
- }) {gtksourceview3 = pkgs.gtksourceview3;};
+ }) {inherit (pkgs) gtksourceview3;};
"gi-javascriptcore" = callPackage
({ mkDerivation, base, bytestring, Cabal, containers, gi-glib
@@ -87107,7 +87342,7 @@ self: {
'';
description = "Pango bindings";
license = stdenv.lib.licenses.lgpl21;
- }) {inherit (pkgs) cairo; inherit (pkgs.gnome2) pango;};
+ }) {inherit (pkgs) cairo; inherit (pkgs) pango;};
"gi-pangocairo" = callPackage
({ mkDerivation, base, bytestring, Cabal, cairo, containers
@@ -87132,7 +87367,7 @@ self: {
'';
description = "PangoCairo bindings";
license = stdenv.lib.licenses.lgpl21;
- }) {inherit (pkgs) cairo; inherit (pkgs.gnome2) pango;};
+ }) {inherit (pkgs) cairo; inherit (pkgs) pango;};
"gi-poppler" = callPackage
({ mkDerivation, base, bytestring, Cabal, containers, gi-cairo
@@ -87173,7 +87408,7 @@ self: {
doHaddock = false;
description = "Libsecret bindings";
license = stdenv.lib.licenses.lgpl21;
- }) {inherit (pkgs.gnome3) libsecret;};
+ }) {inherit (pkgs) libsecret;};
"gi-soup" = callPackage
({ mkDerivation, base, bytestring, Cabal, containers, gi-gio
@@ -87193,7 +87428,7 @@ self: {
doHaddock = false;
description = "Libsoup bindings";
license = stdenv.lib.licenses.lgpl21;
- }) {inherit (pkgs.gnome2) libsoup;};
+ }) {inherit (pkgs) libsoup;};
"gi-vte" = callPackage
({ mkDerivation, base, bytestring, Cabal, containers, gi-atk
@@ -87266,7 +87501,7 @@ self: {
({ mkDerivation, base, bytestring, Cabal, containers, gi-gio
, gi-gobject, gi-gtk, gi-javascriptcore, gi-soup, haskell-gi
, haskell-gi-base, haskell-gi-overloading, text, transformers
- , webkitgtk-web-extension
+ , webkitgtk
}:
mkDerivation {
pname = "gi-webkit2webextension";
@@ -87278,12 +87513,12 @@ self: {
gi-javascriptcore gi-soup haskell-gi haskell-gi-base
haskell-gi-overloading text transformers
];
- libraryPkgconfigDepends = [ webkitgtk-web-extension ];
+ libraryPkgconfigDepends = [ webkitgtk ];
doHaddock = false;
description = "WebKit2-WebExtension bindings";
license = stdenv.lib.licenses.lgpl21;
hydraPlatforms = stdenv.lib.platforms.none;
- }) {webkitgtk-web-extension = null;};
+ }) {inherit (pkgs) webkitgtk;};
"gi-wnck" = callPackage
({ mkDerivation, base, bytestring, Cabal, containers, gi-atk
@@ -87306,7 +87541,7 @@ self: {
description = "Wnck bindings";
license = stdenv.lib.licenses.lgpl21;
hydraPlatforms = stdenv.lib.platforms.none;
- }) {inherit (pkgs.gnome2) libwnck;};
+ }) {inherit (pkgs) libwnck;};
"gi-xlib" = callPackage
({ mkDerivation, base, bytestring, Cabal, containers, haskell-gi
@@ -88662,6 +88897,27 @@ self: {
license = stdenv.lib.licenses.bsd3;
}) {};
+ "glabrous_2_0_0" = callPackage
+ ({ mkDerivation, aeson, aeson-pretty, attoparsec, base, bytestring
+ , cereal, cereal-text, directory, either, hspec, text
+ , unordered-containers
+ }:
+ mkDerivation {
+ pname = "glabrous";
+ version = "2.0.0";
+ sha256 = "001w81x2xmmd4vwp0m0142xgwyx60pr3mjx76czbc3by6iv41l5b";
+ libraryHaskellDepends = [
+ aeson aeson-pretty attoparsec base bytestring cereal cereal-text
+ either text unordered-containers
+ ];
+ testHaskellDepends = [
+ base directory either hspec text unordered-containers
+ ];
+ description = "A template DSL library";
+ license = stdenv.lib.licenses.bsd3;
+ hydraPlatforms = stdenv.lib.platforms.none;
+ }) {};
+
"glade" = callPackage
({ mkDerivation, base, Cabal, glib, gtk, gtk2hs-buildtools
, libglade
@@ -88995,8 +89251,8 @@ self: {
}:
mkDerivation {
pname = "glob-posix";
- version = "0.1.0.1";
- sha256 = "1brw6vd6k787z5n56sdz8c5f35iv0w6m2qpgb2lyxb7bfwn3hi9j";
+ version = "0.2.0.1";
+ sha256 = "1h9my41nhq0xxlwvajwijbgpranyn2ffabbjvx1pbr7vdb4zp8q3";
libraryHaskellDepends = [ base ];
testHaskellDepends = [
base directory filepath tasty tasty-expected-failure tasty-hunit
@@ -89528,7 +89784,7 @@ self: {
"gnome-keyring" = callPackage
({ mkDerivation, base, bytestring, c2hs, gnome-keyring
- , libgnome_keyring, text, time
+ , libgnome-keyring, text, time
}:
mkDerivation {
pname = "gnome-keyring";
@@ -89536,12 +89792,12 @@ self: {
sha256 = "08fayi4ixqyzin7lxyx2s3yap377y6nrdf4fmv7bi895j2k642l8";
libraryHaskellDepends = [ base bytestring text time ];
librarySystemDepends = [ gnome-keyring ];
- libraryPkgconfigDepends = [ libgnome_keyring ];
+ libraryPkgconfigDepends = [ libgnome-keyring ];
libraryToolDepends = [ c2hs ];
description = "Bindings for libgnome-keyring";
license = stdenv.lib.licenses.gpl3;
}) {inherit (pkgs.gnome3) gnome-keyring;
- inherit (pkgs) libgnome_keyring;};
+ inherit (pkgs) libgnome-keyring;};
"gnomevfs" = callPackage
({ mkDerivation, array, base, containers, glib, gnome-vfs
@@ -92218,8 +92474,8 @@ self: {
}:
mkDerivation {
pname = "google-server-api";
- version = "0.3.1.0";
- sha256 = "12n3cd4k515z8shi6klxa2s3cbccqk8h38y45h1lqk1j8ydp3r21";
+ version = "0.3.1.1";
+ sha256 = "0rkjwib59iz07pcjlq7b16i8zivf8wpy4p0l2i6wr13vfhkq75js";
libraryHaskellDepends = [
aeson aeson-casing base base64-bytestring bytestring HsOpenSSL
http-api-data http-client http-client-tls mime-mail monad-control
@@ -93778,6 +94034,28 @@ self: {
license = stdenv.lib.licenses.bsd3;
}) {};
+ "grid-proto" = callPackage
+ ({ mkDerivation, aeson, base, bytestring, containers, linear, sdl2
+ , sdl2-fps, sdl2-gfx, sdl2-mixer, sdl2-ttf, StateVar, text, vector
+ }:
+ mkDerivation {
+ pname = "grid-proto";
+ version = "0.1.0.0";
+ sha256 = "0jwwgnzv27af5wcynfi2rm1xnp5lvqrnaqi1asw27ng4413y3jqk";
+ isLibrary = true;
+ isExecutable = true;
+ libraryHaskellDepends = [
+ aeson base bytestring containers linear sdl2 sdl2-fps sdl2-gfx
+ sdl2-mixer sdl2-ttf StateVar text vector
+ ];
+ executableHaskellDepends = [
+ aeson base bytestring containers linear sdl2 sdl2-fps sdl2-gfx
+ sdl2-mixer sdl2-ttf StateVar text vector
+ ];
+ description = "Grid-based prototyping framework";
+ license = stdenv.lib.licenses.bsd3;
+ }) {};
+
"gridbounds" = callPackage
({ mkDerivation, base, earclipper, gjk, gridbox, hspec }:
mkDerivation {
@@ -94504,7 +94782,7 @@ self: {
description = "Binding to the Gtk+ graphical user interface library";
license = stdenv.lib.licenses.lgpl21;
hydraPlatforms = stdenv.lib.platforms.none;
- }) {gtk2 = pkgs.gnome2.gtk;};
+ }) {inherit (pkgs) gtk2;};
"gtk-helpers" = callPackage
({ mkDerivation, array, base, gio, glib, gtk, mtl, process
@@ -94584,7 +94862,7 @@ self: {
description = "GTK+ Serialized event";
license = stdenv.lib.licenses.lgpl21;
hydraPlatforms = stdenv.lib.platforms.none;
- }) {gtk2 = pkgs.gnome2.gtk;};
+ }) {inherit (pkgs) gtk2;};
"gtk-simple-list-view" = callPackage
({ mkDerivation, base, gtk }:
@@ -94627,7 +94905,7 @@ self: {
description = "A standalone StatusNotifierItem/AppIndicator tray";
license = stdenv.lib.licenses.bsd3;
hydraPlatforms = stdenv.lib.platforms.none;
- }) {gtk3 = pkgs.gtk3;};
+ }) {inherit (pkgs) gtk3;};
"gtk-strut" = callPackage
({ mkDerivation, base, gi-gdk, gi-gtk, text, transformers }:
@@ -94946,7 +95224,7 @@ self: {
description = "Binding to the GtkSourceView library";
license = stdenv.lib.licenses.lgpl21;
hydraPlatforms = stdenv.lib.platforms.none;
- }) {inherit (pkgs.gnome2) gtksourceview;};
+ }) {inherit (pkgs) gtksourceview;};
"gtksourceview3" = callPackage
({ mkDerivation, array, base, Cabal, containers, glib
@@ -94966,7 +95244,7 @@ self: {
description = "Binding to the GtkSourceView library";
license = stdenv.lib.licenses.lgpl21;
hydraPlatforms = stdenv.lib.platforms.none;
- }) {gtksourceview3 = pkgs.gtksourceview3;};
+ }) {inherit (pkgs) gtksourceview3;};
"guarded-allocation" = callPackage
({ mkDerivation, base }:
@@ -96277,8 +96555,8 @@ self: {
pname = "hackage-security";
version = "0.5.3.0";
sha256 = "08bwawc7ramgdh54vcly2m9pvfchp0ahhs8117jajni6x4bnx66v";
- revision = "3";
- editedCabalFile = "07h13j203wafvimfhswpjl2a43iaavy9579hm16z5m565m7f8hwy";
+ revision = "4";
+ editedCabalFile = "1mkk6vkq681rgq159rgr73vlkch0z5cj3vbmz0n6540y8i3zs3mp";
libraryHaskellDepends = [
base base16-bytestring base64-bytestring bytestring Cabal
containers cryptohash-sha256 directory ed25519 filepath ghc-prim
@@ -96463,8 +96741,8 @@ self: {
pname = "hackertyper";
version = "0.1.0.1";
sha256 = "17c77f687874bfwahmzcz2v6k8z9p4fv555r5r1f38snsdi825gf";
- revision = "1";
- editedCabalFile = "1slyp8ncpiv204yxb2p7z0kwz4xhqv8czfrx4p78cbbhrlkmgnpm";
+ revision = "3";
+ editedCabalFile = "0g8nw9sqya5ycamprc2wiq3ri90hp228csj235lg2mc56pllzpmv";
isLibrary = false;
isExecutable = true;
enableSeparateDataOutput = true;
@@ -96902,18 +97180,21 @@ self: {
"haeredes" = callPackage
({ mkDerivation, base, bytestring, cmdargs, dns, doctest, filemanip
- , iproute, MissingH, parallel-io
+ , iproute, parallel-io, process
}:
mkDerivation {
pname = "haeredes";
- version = "0.4.4";
- sha256 = "1b3455grm9dy6m4yf2y5mncrjdplq2kslljszgqd8l3c2xml9hmx";
+ version = "0.5.1";
+ sha256 = "1y4r487z2k6l7xi5bi1rb3rz0i7yki2j2mmpnpfdy2bba1s51a6n";
isLibrary = false;
isExecutable = true;
executableHaskellDepends = [
- base bytestring cmdargs dns iproute MissingH parallel-io
+ base bytestring cmdargs dns iproute parallel-io
+ ];
+ testHaskellDepends = [
+ base bytestring cmdargs dns doctest filemanip iproute parallel-io
+ process
];
- testHaskellDepends = [ base doctest filemanip ];
description = "Confirm delegation of NS and MX records";
license = stdenv.lib.licenses.agpl3;
}) {};
@@ -97713,6 +97994,8 @@ self: {
pname = "halipeto";
version = "2.4.1";
sha256 = "1anyf6mh13rmj5a0lsayrcxzvm3zk0a2943pzkgz06y3aqgmcbdb";
+ revision = "1";
+ editedCabalFile = "0x30z8l7kfxvw4qzva7qgqair76v2ml8lgmd7lh4pkihq11f678q";
libraryHaskellDepends = [ base directory HaXml pandoc ];
description = "Haskell Static Web Page Generator";
license = "GPL";
@@ -100314,24 +100597,28 @@ self: {
}) {};
"haskell-ci" = callPackage
- ({ mkDerivation, ansi-terminal, base, bytestring, Cabal, containers
- , deepseq, Diff, directory, filepath, tasty, tasty-golden
- , transformers
+ ({ mkDerivation, ansi-terminal, base, base-compat, bytestring
+ , Cabal, containers, deepseq, Diff, directory, filepath
+ , generic-lens, HsYAML, microlens, optparse-applicative, parsec
+ , pretty, ShellCheck, tasty, tasty-golden, text, transformers
}:
mkDerivation {
pname = "haskell-ci";
- version = "0.1.0.0";
- sha256 = "1bfl9k0ypak7p39xkx0zslamd9cd5jvvxf57wqigbcpgcmsd7z40";
- isLibrary = true;
+ version = "0.2.1";
+ sha256 = "07h99vq4bmphrpi1ggm7h06ard7hyxkmsxypicghvv24cgzl3c70";
+ isLibrary = false;
isExecutable = true;
libraryHaskellDepends = [
- base Cabal containers deepseq directory filepath transformers
+ base base-compat bytestring Cabal containers deepseq directory
+ filepath generic-lens HsYAML microlens optparse-applicative parsec
+ pretty ShellCheck text transformers
];
executableHaskellDepends = [ base ];
testHaskellDepends = [
ansi-terminal base bytestring Diff directory filepath tasty
tasty-golden transformers
];
+ doHaddock = false;
description = "Cabal package script generator for Travis-CI";
license = stdenv.lib.licenses.bsd3;
hydraPlatforms = stdenv.lib.platforms.none;
@@ -100425,8 +100712,8 @@ self: {
}:
mkDerivation {
pname = "haskell-dap";
- version = "0.0.11.0";
- sha256 = "098j65f241giy8z576s1iafcskl8m6qnj173476iw3sggw6iw1f1";
+ version = "0.0.12.0";
+ sha256 = "0n1abvz7a03d3xgkykkk2ggm74lsh1kg0jv0z1k9874pncxx4li4";
isLibrary = true;
isExecutable = true;
libraryHaskellDepends = [ base containers ];
@@ -100440,6 +100727,40 @@ self: {
hydraPlatforms = stdenv.lib.platforms.none;
}) {};
+ "haskell-debug-adapter" = callPackage
+ ({ mkDerivation, aeson, async, base, bytestring, Cabal, clock
+ , cmdargs, conduit, conduit-extra, containers, data-default
+ , directory, filepath, fsnotify, haskell-dap, hslogger, hspec, lens
+ , MissingH, mtl, parsec, process, resourcet, safe-exceptions, text
+ }:
+ mkDerivation {
+ pname = "haskell-debug-adapter";
+ version = "0.0.29.0";
+ sha256 = "1m4lirrlgw1vavk1rnr22lcbzasa0sd90mn1ghzwhij86dmfxldr";
+ isLibrary = true;
+ isExecutable = true;
+ libraryHaskellDepends = [
+ aeson async base bytestring Cabal clock cmdargs conduit
+ conduit-extra containers data-default directory filepath fsnotify
+ haskell-dap hslogger lens MissingH mtl parsec process resourcet
+ safe-exceptions text
+ ];
+ executableHaskellDepends = [
+ aeson async base bytestring Cabal clock cmdargs conduit
+ conduit-extra containers data-default directory filepath fsnotify
+ haskell-dap hslogger lens MissingH mtl parsec process resourcet
+ safe-exceptions text
+ ];
+ testHaskellDepends = [
+ aeson async base bytestring Cabal clock cmdargs conduit
+ conduit-extra containers data-default directory filepath fsnotify
+ haskell-dap hslogger hspec lens MissingH mtl parsec process
+ resourcet safe-exceptions text
+ ];
+ description = "Haskell Debug Adapter";
+ license = stdenv.lib.licenses.bsd3;
+ }) {};
+
"haskell-disque" = callPackage
({ mkDerivation, base, bytestring, hedis, string-conversions
, transformers
@@ -100631,7 +100952,7 @@ self: {
testHaskellDepends = [ base doctest process ];
description = "Generate Haskell bindings for GObject Introspection capable libraries";
license = stdenv.lib.licenses.lgpl21;
- }) {inherit (pkgs) glib gobject-introspection;};
+ }) {inherit (pkgs) glib; inherit (pkgs) gobject-introspection;};
"haskell-gi-base" = callPackage
({ mkDerivation, base, bytestring, containers, glib, text }:
@@ -103437,16 +103758,16 @@ self: {
"haskus-binary" = callPackage
({ mkDerivation, base, bytestring, cereal, criterion, directory
- , doctest, ghc-prim, haskus-utils, haskus-utils-data
+ , doctest, filepath, ghc-prim, haskus-utils, haskus-utils-data
, haskus-utils-types, megaparsec, mtl, primitive, QuickCheck, tasty
, tasty-quickcheck, template-haskell, transformers
}:
mkDerivation {
pname = "haskus-binary";
- version = "1.3";
- sha256 = "06smbrvkpiz3rwmlsrxv6a5zh5952ivpl7wg85li6bc90dnz04rm";
+ version = "1.4";
+ sha256 = "0riqgfy9ai1vb7555l1w9rfcp10ylg7sbk46ph1f2y00pjbxsmv3";
libraryHaskellDepends = [
- base bytestring cereal directory ghc-prim haskus-utils
+ base bytestring cereal directory filepath ghc-prim haskus-utils
haskus-utils-data haskus-utils-types megaparsec mtl primitive
template-haskell transformers
];
@@ -103467,8 +103788,8 @@ self: {
}:
mkDerivation {
pname = "haskus-system-build";
- version = "1.0";
- sha256 = "1xzl5f8wilmdq9bg37zzdcv59cqp8kxnhbm6fd8pzqnj8w1pkwdk";
+ version = "1.1";
+ sha256 = "1krclfcv2hj7y9hapfm8xmc2q41v54r2pkh3rfhdnxffgcszad1z";
isLibrary = false;
isExecutable = true;
executableHaskellDepends = [
@@ -103535,13 +103856,14 @@ self: {
}) {};
"haskus-utils-types" = callPackage
- ({ mkDerivation, base }:
+ ({ mkDerivation, base, doctest }:
mkDerivation {
pname = "haskus-utils-types";
- version = "1.3.1";
- sha256 = "1qsji8pcncwqj7dgww7azlfk4vdjbalsspkj53cbwxfcib1nmcsw";
+ version = "1.4.1";
+ sha256 = "0nypn55fj86llpgdlsbr5qk7jkix5qazz03f8c5a8kn787n2bkpz";
libraryHaskellDepends = [ base ];
- description = "Haskus utility modules";
+ testHaskellDepends = [ base doctest ];
+ description = "Haskus types utility modules";
license = stdenv.lib.licenses.bsd3;
}) {};
@@ -103552,8 +103874,8 @@ self: {
}:
mkDerivation {
pname = "haskus-utils-variant";
- version = "2.5";
- sha256 = "1nbaq2f33a2q2qpxalvq52sqn47bil41klkp84qdan3rfzh8a7rh";
+ version = "2.6.1";
+ sha256 = "1zq76dsp29warrr0ym4lp9lrgar7yairwp91qklf3k6qb8h41qw8";
libraryHaskellDepends = [
base deepseq exceptions haskus-utils-data haskus-utils-types
template-haskell transformers
@@ -104249,8 +104571,8 @@ self: {
}:
mkDerivation {
pname = "hath";
- version = "0.4.2";
- sha256 = "1x8xmrsircrpk19jz2w5n2nq29qq576ci4pq1vx0ps3w1pkzh9ds";
+ version = "0.5.0";
+ sha256 = "16597w35xbv0hq14bdz4g8w52iy7z54wrqfmd929xrzbxbnc41r6";
isLibrary = false;
isExecutable = true;
executableHaskellDepends = [
@@ -109695,6 +110017,8 @@ self: {
pname = "hledger-interest";
version = "1.5.3";
sha256 = "1ff113z2ir07ihdvfa5fca4x326zwm2jd7sjy6hjpr4qgi1mszvs";
+ revision = "1";
+ editedCabalFile = "1myqv7hci32hvm98d4fn2zqdvkxsdx1g821n1fwr6814yn89kwjj";
isLibrary = false;
isExecutable = true;
executableHaskellDepends = [
@@ -111916,6 +112240,8 @@ self: {
pname = "hopenssl";
version = "2.2.4";
sha256 = "0wbnibaffpmk453jbvh95r1d1scz1ivkj59ddrbd3hf4iwr6rx4x";
+ revision = "1";
+ editedCabalFile = "14bs0wjrqnnn1v8c4yznfzggvmgypm2lssgl0cr498kmp54if0lf";
libraryHaskellDepends = [ base bytestring ];
librarySystemDepends = [ openssl ];
testHaskellDepends = [ base bytestring HUnit ];
@@ -112493,6 +112819,45 @@ self: {
license = stdenv.lib.licenses.mit;
}) {};
+ "hpack_0_31_2" = callPackage
+ ({ mkDerivation, aeson, base, bifunctors, bytestring, Cabal
+ , containers, cryptonite, deepseq, directory, filepath, Glob, hspec
+ , hspec-discover, http-client, http-client-tls, http-types, HUnit
+ , infer-license, interpolate, mockery, pretty, QuickCheck
+ , scientific, template-haskell, temporary, text, transformers
+ , unordered-containers, vector, yaml
+ }:
+ mkDerivation {
+ pname = "hpack";
+ version = "0.31.2";
+ sha256 = "1l2d6185lawwhsj70swxkvcacm0hvcn9qsrlx4ph4gs6k578603g";
+ isLibrary = true;
+ isExecutable = true;
+ libraryHaskellDepends = [
+ aeson base bifunctors bytestring Cabal containers cryptonite
+ deepseq directory filepath Glob http-client http-client-tls
+ http-types infer-license pretty scientific text transformers
+ unordered-containers vector yaml
+ ];
+ executableHaskellDepends = [
+ aeson base bifunctors bytestring Cabal containers cryptonite
+ deepseq directory filepath Glob http-client http-client-tls
+ http-types infer-license pretty scientific text transformers
+ unordered-containers vector yaml
+ ];
+ testHaskellDepends = [
+ aeson base bifunctors bytestring Cabal containers cryptonite
+ deepseq directory filepath Glob hspec http-client http-client-tls
+ http-types HUnit infer-license interpolate mockery pretty
+ QuickCheck scientific template-haskell temporary text transformers
+ unordered-containers vector yaml
+ ];
+ testToolDepends = [ hspec-discover ];
+ description = "A modern format for Haskell packages";
+ license = stdenv.lib.licenses.mit;
+ hydraPlatforms = stdenv.lib.platforms.none;
+ }) {};
+
"hpack-convert" = callPackage
({ mkDerivation, aeson, aeson-qq, base, base-compat, bytestring
, Cabal, containers, deepseq, directory, filepath, Glob, hspec
@@ -112555,6 +112920,37 @@ self: {
license = stdenv.lib.licenses.bsd3;
}) {};
+ "hpack-dhall_0_5_2" = callPackage
+ ({ mkDerivation, aeson, aeson-pretty, base, bytestring, Cabal
+ , dhall, dhall-json, Diff, directory, filepath, hpack, megaparsec
+ , microlens, optparse-applicative, prettyprinter, tasty
+ , tasty-golden, text, transformers, utf8-string, yaml
+ }:
+ mkDerivation {
+ pname = "hpack-dhall";
+ version = "0.5.2";
+ sha256 = "16mnh9hwp0224cn3rlpbjgqklgvbaffbzjskyksakpgxc0phk1zi";
+ isLibrary = true;
+ isExecutable = true;
+ libraryHaskellDepends = [
+ aeson aeson-pretty base bytestring dhall dhall-json filepath hpack
+ megaparsec microlens prettyprinter text transformers yaml
+ ];
+ executableHaskellDepends = [
+ aeson aeson-pretty base bytestring dhall dhall-json filepath hpack
+ megaparsec microlens optparse-applicative prettyprinter text
+ transformers yaml
+ ];
+ testHaskellDepends = [
+ aeson aeson-pretty base bytestring Cabal dhall dhall-json Diff
+ directory filepath hpack megaparsec microlens prettyprinter tasty
+ tasty-golden text transformers utf8-string yaml
+ ];
+ description = "hpack's dhalling";
+ license = stdenv.lib.licenses.bsd3;
+ hydraPlatforms = stdenv.lib.platforms.none;
+ }) {};
+
"hpaco" = callPackage
({ mkDerivation, aeson, base, cmdargs, filepath, hpaco-lib, strict
, utf8-string, yaml
@@ -115055,7 +115451,7 @@ self: {
hydraPlatforms = stdenv.lib.platforms.none;
}) {};
- "hsdev_0_3_3_0" = callPackage
+ "hsdev_0_3_3_1" = callPackage
({ mkDerivation, aeson, aeson-pretty, array, async, attoparsec
, base, bytestring, Cabal, containers, cpphs, data-default, deepseq
, direct-sqlite, directory, exceptions, filepath, fsnotify, ghc
@@ -115069,8 +115465,8 @@ self: {
}:
mkDerivation {
pname = "hsdev";
- version = "0.3.3.0";
- sha256 = "17pylby88xmr8hibhpiyygzdnjwznh1zss4969z6w2dk2489lkrz";
+ version = "0.3.3.1";
+ sha256 = "09i1m3xkvjzq69mpzf73g3jxf3g5md8lfrxjwza6ns8ii9m4xcqh";
isLibrary = true;
isExecutable = true;
libraryHaskellDepends = [
@@ -115149,6 +115545,8 @@ self: {
pname = "hsdns";
version = "1.8";
sha256 = "0jxnfgzsshhaf3n8ywhxy84l6ldhz5cdwaayr61v26iqgm3c3qk0";
+ revision = "1";
+ editedCabalFile = "09ixj0xywmbigfhqmq58dwqns8l3w6wprykafg52fx69bvhg9yph";
isLibrary = true;
isExecutable = true;
libraryHaskellDepends = [ base containers network ];
@@ -115335,6 +115733,29 @@ self: {
hydraPlatforms = stdenv.lib.platforms.none;
}) {};
+ "hsforce" = callPackage
+ ({ mkDerivation, aeson, base, bytestring, fast-tagsoup, HaXml
+ , http-conduit, network-uri, regex-posix, tagsoup, template-haskell
+ , text, unordered-containers, uri-encode
+ }:
+ mkDerivation {
+ pname = "hsforce";
+ version = "0.1.0.1";
+ sha256 = "1n4zg3g0287j7z7vmmafv4gjwjl6f5dljl5gbhm9kr0ailsr1dr3";
+ libraryHaskellDepends = [
+ aeson base bytestring fast-tagsoup HaXml http-conduit network-uri
+ regex-posix tagsoup template-haskell text unordered-containers
+ uri-encode
+ ];
+ testHaskellDepends = [
+ aeson base bytestring fast-tagsoup HaXml http-conduit network-uri
+ regex-posix tagsoup template-haskell text unordered-containers
+ uri-encode
+ ];
+ description = "Salesforce API Client";
+ license = stdenv.lib.licenses.bsd3;
+ }) {};
+
"hsgnutls" = callPackage
({ mkDerivation, base, bytestring, gcrypt, gnutls, mtl, old-time }:
mkDerivation {
@@ -117581,6 +118002,8 @@ self: {
pname = "hsyslog";
version = "5.0.2";
sha256 = "1kkypn0dd92aqv8dr112bhkr9k9r9mchnyyvy41kvhj2zg447v1y";
+ revision = "1";
+ editedCabalFile = "0k1j46nk3z64zw4bqmvw5lgy16ih200m66rv4b6ygjqv7nglqq0b";
isLibrary = true;
isExecutable = true;
libraryHaskellDepends = [ base ];
@@ -117880,6 +118303,22 @@ self: {
hydraPlatforms = stdenv.lib.platforms.none;
}) {};
+ "html-entities_1_1_4_3" = callPackage
+ ({ mkDerivation, attoparsec, base, base-prelude, text
+ , unordered-containers
+ }:
+ mkDerivation {
+ pname = "html-entities";
+ version = "1.1.4.3";
+ sha256 = "0mjmmnh3mfi0ccl5wi5b65afi66wj5xdvva13qw22naa31ibbsnf";
+ libraryHaskellDepends = [
+ attoparsec base base-prelude text unordered-containers
+ ];
+ description = "A codec library for HTML-escaped text and HTML-entities";
+ license = stdenv.lib.licenses.mit;
+ hydraPlatforms = stdenv.lib.platforms.none;
+ }) {};
+
"html-entity" = callPackage
({ mkDerivation, attoparsec, base, Cabal, cabal-doctest, doctest
, text, unordered-containers
@@ -122511,6 +122950,8 @@ self: {
pname = "identicon-style-squares";
version = "0.1.0.1";
sha256 = "1x456v7fb211f7ciipp2bfn9fvh5w4i34bl5mjw7bkn7hgsaa3x6";
+ revision = "2";
+ editedCabalFile = "1bi5sn62z23j9n7bxlaz5qiwk52v7sfr70bk0by9vk6nlylli8r1";
libraryHaskellDepends = [
base identicon JuicyPixels polyvariadic
];
@@ -130120,8 +130561,8 @@ self: {
}:
mkDerivation {
pname = "kafka-device";
- version = "1.0.0.0";
- sha256 = "1bcd7fm42vly9hlfzv0cjzx2g4hrqp66nrypki75f2c8lqfzcr11";
+ version = "1.0.2.1";
+ sha256 = "1ig1qbb1yrizff4f807pw2lqqy0nvn5hy89xf4v20p02zvy0w673";
isLibrary = true;
isExecutable = true;
libraryHaskellDepends = [
@@ -130139,8 +130580,8 @@ self: {
({ mkDerivation, base, GLUT, kafka-device, OpenGL }:
mkDerivation {
pname = "kafka-device-glut";
- version = "1.0.0.0";
- sha256 = "0pkvar1rf0gv7h5a95h28jaifpwknfdvxvcv4s7f5vdrs0376j3k";
+ version = "1.0.2.1";
+ sha256 = "0rz2xlrvhpqafb7m3svfykr1aa2fwrz0qpwzdxjfhpnd85ccfmzi";
isLibrary = true;
isExecutable = true;
libraryHaskellDepends = [ base GLUT kafka-device OpenGL ];
@@ -130156,8 +130597,8 @@ self: {
}:
mkDerivation {
pname = "kafka-device-joystick";
- version = "1.0.0.0";
- sha256 = "0vm1a61brvhr5digsw480210cq7s6y2yp80j6907425y1r4165q4";
+ version = "1.0.2.1";
+ sha256 = "053whqf4yh3gjhamjfh383ijsw2brajid2q0wsyf0qbsd2y6pikl";
isLibrary = true;
isExecutable = true;
libraryHaskellDepends = [
@@ -130175,8 +130616,8 @@ self: {
({ mkDerivation, aeson, base, hleap, kafka-device, websockets }:
mkDerivation {
pname = "kafka-device-leap";
- version = "1.0.0.0";
- sha256 = "1xkkkq1plzjf20p6gfnk8nc809rp57ihffggvgzsgq8dwybzfssg";
+ version = "1.0.2.1";
+ sha256 = "1dm49kwk4nyvfzz6aj9h80pj510xnczfd15yamajfwwszalrj432";
isLibrary = true;
isExecutable = true;
libraryHaskellDepends = [
@@ -130196,8 +130637,8 @@ self: {
}:
mkDerivation {
pname = "kafka-device-spacenav";
- version = "1.0.0.0";
- sha256 = "0m382s7q3w21pl62fjh6pw9w4dwi6cmpc8s4xnzivwjj91hynryb";
+ version = "1.0.2.1";
+ sha256 = "0x8fwawlzzwip7v950d1m613h0p57lyy8qa2ps29alk4fj31rcik";
isLibrary = true;
isExecutable = true;
libraryHaskellDepends = [
@@ -130215,8 +130656,8 @@ self: {
({ mkDerivation, base, kafka-device, vrpn }:
mkDerivation {
pname = "kafka-device-vrpn";
- version = "1.0.0.0";
- sha256 = "13l32gfpz5l2xi42xvvyzj9g1kqsbd3jkx2498lacwx4kgvlm2rd";
+ version = "1.0.2.1";
+ sha256 = "1jy9qqhj4yq2ry42yab7c8d9ipczv9rd09l8ixzqx4yclswzgi0x";
isLibrary = true;
isExecutable = true;
libraryHaskellDepends = [ base kafka-device vrpn ];
@@ -135509,7 +135950,7 @@ self: {
description = "Haskell IDE written in Haskell";
license = "GPL";
hydraPlatforms = stdenv.lib.platforms.none;
- }) {gtk3 = pkgs.gtk3;};
+ }) {inherit (pkgs) gtk3;};
"leksah-server" = callPackage
({ mkDerivation, aeson, attoparsec, base, base-compat, binary
@@ -136307,8 +136748,8 @@ self: {
({ mkDerivation, base, bytestring, filepath, libarchive }:
mkDerivation {
pname = "libarchive";
- version = "0.2.1.1";
- sha256 = "03qyyqki2s55lvpc9iwyh96sv4yslxw9an89n87a138bvwrdyyma";
+ version = "0.2.1.2";
+ sha256 = "1fwiwfqknndfnq55psdbj2swf1y5cm971lah4dgayg8vn76n961x";
libraryHaskellDepends = [ base bytestring filepath ];
libraryPkgconfigDepends = [ libarchive ];
description = "Haskell interface to libarchive";
@@ -141131,7 +141572,7 @@ self: {
description = "Leksah tool kit";
license = "GPL";
hydraPlatforms = stdenv.lib.platforms.none;
- }) {gtk3 = pkgs.gtk3;};
+ }) {inherit (pkgs) gtk3;};
"ltl" = callPackage
({ mkDerivation, base, vcd }:
@@ -147485,6 +147926,36 @@ self: {
license = stdenv.lib.licenses.bsd3;
}) {};
+ "mmark_0_0_6_2" = callPackage
+ ({ mkDerivation, aeson, base, case-insensitive, containers
+ , criterion, deepseq, dlist, email-validate, foldl, hashable, hspec
+ , hspec-discover, hspec-megaparsec, html-entity-map, lucid
+ , megaparsec, microlens, microlens-th, modern-uri, mtl
+ , parser-combinators, QuickCheck, text, text-metrics
+ , unordered-containers, weigh, yaml
+ }:
+ mkDerivation {
+ pname = "mmark";
+ version = "0.0.6.2";
+ sha256 = "0j8n2rjfx590v0m3p9z8xhbfxgxbc1cxfkdg18vwyhayh55mn373";
+ enableSeparateDataOutput = true;
+ libraryHaskellDepends = [
+ aeson base case-insensitive containers deepseq dlist email-validate
+ foldl hashable html-entity-map lucid megaparsec microlens
+ microlens-th modern-uri mtl parser-combinators text text-metrics
+ unordered-containers yaml
+ ];
+ testHaskellDepends = [
+ aeson base foldl hspec hspec-megaparsec lucid megaparsec modern-uri
+ QuickCheck text
+ ];
+ testToolDepends = [ hspec-discover ];
+ benchmarkHaskellDepends = [ base criterion text weigh ];
+ description = "Strict markdown processor for writers";
+ license = stdenv.lib.licenses.bsd3;
+ hydraPlatforms = stdenv.lib.platforms.none;
+ }) {};
+
"mmark-cli" = callPackage
({ mkDerivation, aeson, base, bytestring, directory
, ghc-syntax-highlighter, gitrev, lucid, megaparsec, mmark
@@ -148473,6 +148944,26 @@ self: {
license = stdenv.lib.licenses.asl20;
}) {};
+ "monad-logger-prefix_0_1_11" = callPackage
+ ({ mkDerivation, base, criterion, doctest, exceptions, Glob, hspec
+ , monad-control, monad-logger, mtl, QuickCheck, resourcet, text
+ , transformers, transformers-base
+ }:
+ mkDerivation {
+ pname = "monad-logger-prefix";
+ version = "0.1.11";
+ sha256 = "0zw591nqgyqy37vj0vmyyd2m7v6cyx8bgwfm1xhf1ppbxhjx38nv";
+ libraryHaskellDepends = [
+ base exceptions monad-control monad-logger mtl resourcet text
+ transformers transformers-base
+ ];
+ testHaskellDepends = [ base doctest Glob hspec QuickCheck ];
+ benchmarkHaskellDepends = [ base criterion monad-logger ];
+ description = "Add prefixes to your monad-logger output";
+ license = stdenv.lib.licenses.asl20;
+ hydraPlatforms = stdenv.lib.platforms.none;
+ }) {};
+
"monad-logger-syslog" = callPackage
({ mkDerivation, base, bytestring, fast-logger, hsyslog
, monad-logger, text, transformers
@@ -149434,6 +149925,37 @@ self: {
license = stdenv.lib.licenses.asl20;
}) {};
+ "mongoDB_2_4_0_1" = callPackage
+ ({ mkDerivation, array, base, base16-bytestring, base64-bytestring
+ , binary, bson, bytestring, conduit, conduit-extra, containers
+ , criterion, cryptohash, data-default-class, hashtables, hspec
+ , lifted-base, monad-control, mtl, network, nonce, old-locale
+ , parsec, pureMD5, random, random-shuffle, resourcet, stm, tagged
+ , text, time, tls, transformers, transformers-base
+ }:
+ mkDerivation {
+ pname = "mongoDB";
+ version = "2.4.0.1";
+ sha256 = "0wadf91vymy1wzf1xq9k5ackj5fc7220fgg6h42y4qpmg1xzbpip";
+ libraryHaskellDepends = [
+ array base base16-bytestring base64-bytestring binary bson
+ bytestring conduit conduit-extra containers cryptohash
+ data-default-class hashtables lifted-base monad-control mtl network
+ nonce parsec pureMD5 random random-shuffle resourcet stm tagged
+ text time tls transformers transformers-base
+ ];
+ testHaskellDepends = [ base hspec mtl old-locale text time ];
+ benchmarkHaskellDepends = [
+ array base base16-bytestring base64-bytestring binary bson
+ bytestring containers criterion cryptohash data-default-class
+ hashtables lifted-base monad-control mtl network nonce parsec
+ random random-shuffle stm text transformers-base
+ ];
+ description = "Driver (client) for MongoDB, a free, scalable, fast, document DBMS";
+ license = stdenv.lib.licenses.asl20;
+ hydraPlatforms = stdenv.lib.platforms.none;
+ }) {};
+
"mongodb-queue" = callPackage
({ mkDerivation, base, data-default, hspec, lifted-base
, monad-control, mongoDB, network, text, transformers
@@ -154029,8 +154551,8 @@ self: {
}:
mkDerivation {
pname = "net-mqtt";
- version = "0.2.4.0";
- sha256 = "130dsj8qvf3yi29saz1l52dy15gsj2vr8hd118br137l1zf2g3g0";
+ version = "0.2.4.1";
+ sha256 = "0s0drakh05ygwkvlcd8z0f5168hvk8qmvdq3mg2bk1p2fjd2hfb2";
isLibrary = true;
isExecutable = true;
libraryHaskellDepends = [
@@ -161489,6 +162011,36 @@ self: {
license = stdenv.lib.licenses.mit;
}) {};
+ "pairing_0_2" = callPackage
+ ({ mkDerivation, arithmoi, base, bytestring, criterion, cryptonite
+ , memory, protolude, QuickCheck, quickcheck-instances, random
+ , tasty, tasty-discover, tasty-hunit, tasty-quickcheck
+ , wl-pprint-text
+ }:
+ mkDerivation {
+ pname = "pairing";
+ version = "0.2";
+ sha256 = "06w1vp9cqzxpqlg3hs68qxn8mjm46bkh7b5428ac6wh7f1zzxw88";
+ libraryHaskellDepends = [
+ arithmoi base bytestring cryptonite memory protolude QuickCheck
+ random wl-pprint-text
+ ];
+ testHaskellDepends = [
+ arithmoi base bytestring cryptonite memory protolude QuickCheck
+ quickcheck-instances random tasty tasty-discover tasty-hunit
+ tasty-quickcheck wl-pprint-text
+ ];
+ testToolDepends = [ tasty-discover ];
+ benchmarkHaskellDepends = [
+ arithmoi base bytestring criterion cryptonite memory protolude
+ QuickCheck quickcheck-instances random tasty tasty-hunit
+ tasty-quickcheck wl-pprint-text
+ ];
+ description = "Optimal ate pairing over Barreto-Naehrig curves";
+ license = stdenv.lib.licenses.mit;
+ hydraPlatforms = stdenv.lib.platforms.none;
+ }) {};
+
"palette" = callPackage
({ mkDerivation, array, base, colour, containers, MonadRandom }:
mkDerivation {
@@ -161605,7 +162157,7 @@ self: {
maintainers = with stdenv.lib.maintainers; [ peti ];
}) {};
- "pandoc_2_6" = callPackage
+ "pandoc_2_7" = callPackage
({ mkDerivation, aeson, aeson-pretty, base, base64-bytestring
, binary, blaze-html, blaze-markup, bytestring, case-insensitive
, cmark-gfm, containers, criterion, data-default, deepseq, Diff
@@ -161620,10 +162172,8 @@ self: {
}:
mkDerivation {
pname = "pandoc";
- version = "2.6";
- sha256 = "046vya7ivngv0hp5chnfxc1dm5n3krbgm0883ph45l31c7liyxma";
- revision = "1";
- editedCabalFile = "1m0xna696r38g2nk7whhyzh52lyyg0vsr236n8dafbwqj0k66652";
+ version = "2.7";
+ sha256 = "13y3sm2dc7wn5lvwvgddq5r6b3fy4dsl272mbja704qadf0af884";
configureFlags = [ "-fhttps" "-f-trypandoc" ];
isLibrary = true;
isExecutable = true;
@@ -161694,7 +162244,7 @@ self: {
hydraPlatforms = stdenv.lib.platforms.none;
}) {};
- "pandoc-citeproc_0_16_1" = callPackage
+ "pandoc-citeproc_0_16_1_1" = callPackage
({ mkDerivation, aeson, aeson-pretty, attoparsec, base, bytestring
, Cabal, containers, data-default, directory, filepath, hs-bibutils
, libyaml, mtl, network, old-locale, pandoc, pandoc-types, parsec
@@ -161703,8 +162253,8 @@ self: {
}:
mkDerivation {
pname = "pandoc-citeproc";
- version = "0.16.1";
- sha256 = "0vn3kydzyx7r9zhhk4bgp8ljyi8a65fjlik52d6d536wz3p2pwd3";
+ version = "0.16.1.1";
+ sha256 = "0fyc6b5545bpfp0mgbp8mgjgczwahp6l0l7wfzv9b6455awqcyc8";
isLibrary = true;
isExecutable = true;
enableSeparateDataOutput = true;
@@ -162160,7 +162710,7 @@ self: {
description = "Binding to the Pango text rendering engine";
license = stdenv.lib.licenses.lgpl21;
hydraPlatforms = stdenv.lib.platforms.none;
- }) {inherit (pkgs.gnome2) pango;};
+ }) {inherit (pkgs) pango;};
"pangraph" = callPackage
({ mkDerivation, algebraic-graphs, attoparsec, base, bytestring
@@ -167926,6 +168476,18 @@ self: {
license = stdenv.lib.licenses.bsd3;
}) {};
+ "pipes-ordered-zip" = callPackage
+ ({ mkDerivation, base, foldl, pipes }:
+ mkDerivation {
+ pname = "pipes-ordered-zip";
+ version = "1.0.0.1";
+ sha256 = "18qm08h5mq8pyn7cx1dabvmj63mhykm4cqsxhqsb7qf1kv70nqc8";
+ libraryHaskellDepends = [ base pipes ];
+ testHaskellDepends = [ base foldl pipes ];
+ description = "merge two ordered Producers into a new Producer";
+ license = stdenv.lib.licenses.bsd3;
+ }) {};
+
"pipes-p2p" = callPackage
({ mkDerivation, async, base, binary, bytestring, errors
, exceptions, mtl, network, network-simple-sockaddr, pipes
@@ -169772,8 +170334,8 @@ self: {
pname = "polyvariadic";
version = "0.3.0.3";
sha256 = "0zf7znslayjmcnajmsymc79f0lyyk7ph9zfczq78inirg0hv7hq1";
- revision = "3";
- editedCabalFile = "10lqcrp16v1h0lzr931haramkxkxz2bkfsyadxnc7ki73k39g11p";
+ revision = "5";
+ editedCabalFile = "1pzqc1hppzlj03wr2hrlm7liq9kcf650mpsrm4chr6msq491na9c";
libraryHaskellDepends = [ base containers ];
testHaskellDepends = [ base ];
description = "Creation and application of polyvariadic functions";
@@ -170060,8 +170622,8 @@ self: {
description = "Binding to the Poppler";
license = stdenv.lib.licenses.gpl2;
hydraPlatforms = stdenv.lib.platforms.none;
- }) {inherit (pkgs) gdk_pixbuf; gtk2 = pkgs.gnome2.gtk;
- inherit (pkgs.gnome2) pango; inherit (pkgs) poppler;};
+ }) {inherit (pkgs) gdk_pixbuf; inherit (pkgs) gtk2;
+ inherit (pkgs) pango; inherit (pkgs) poppler;};
"populate-setup-exe-cache" = callPackage
({ mkDerivation, base }:
@@ -170763,6 +171325,35 @@ self: {
license = stdenv.lib.licenses.bsd3;
}) {};
+ "postgresql-simple_0_6_1" = callPackage
+ ({ mkDerivation, aeson, attoparsec, base, base16-bytestring
+ , bytestring, bytestring-builder, case-insensitive, containers
+ , cryptohash-md5, filepath, hashable, HUnit, inspection-testing
+ , Only, postgresql-libpq, scientific, tasty, tasty-golden
+ , tasty-hunit, template-haskell, text, time, transformers
+ , uuid-types, vector
+ }:
+ mkDerivation {
+ pname = "postgresql-simple";
+ version = "0.6.1";
+ sha256 = "0hc3zarmykf0hvc5jr0rm66z4kar73zp737m4vg0y2nc2k5yp9m8";
+ libraryHaskellDepends = [
+ aeson attoparsec base bytestring bytestring-builder
+ case-insensitive containers hashable Only postgresql-libpq
+ scientific template-haskell text time transformers uuid-types
+ vector
+ ];
+ testHaskellDepends = [
+ aeson base base16-bytestring bytestring case-insensitive containers
+ cryptohash-md5 filepath HUnit inspection-testing postgresql-libpq
+ tasty tasty-golden tasty-hunit text time vector
+ ];
+ benchmarkHaskellDepends = [ base vector ];
+ description = "Mid-Level PostgreSQL client library";
+ license = stdenv.lib.licenses.bsd3;
+ hydraPlatforms = stdenv.lib.platforms.none;
+ }) {};
+
"postgresql-simple-bind" = callPackage
({ mkDerivation, attoparsec, base, bytestring, data-default
, exceptions, heredoc, hspec, postgresql-simple, template-haskell
@@ -171121,6 +171712,8 @@ self: {
pname = "postmaster";
version = "0.3.3";
sha256 = "05608xvaig1d67j3h8ykw7a11yr1mqkw98p0ii7gbp4mp3d9kncd";
+ revision = "1";
+ editedCabalFile = "00rp6mdds4kssvcyc9n6iz1asgkhv96050x50jwvg3wp3pp69fg2";
isLibrary = false;
isExecutable = true;
executableHaskellDepends = [
@@ -172919,8 +173512,8 @@ self: {
pname = "probable";
version = "0.1.3";
sha256 = "196m3v30818q034x7jdnqdwfqffx5pfj64yyw0q2blhwzkhc0f9n";
- revision = "2";
- editedCabalFile = "01cah34a5bzqlf76aqpc3038gxq7iy4krrzrj788c11ybawq0mgn";
+ revision = "3";
+ editedCabalFile = "0fvvf9l4vkmnv7qffvkxd0rajv7n64v0550nd7cpjazns41y4lz2";
libraryHaskellDepends = [
base mtl mwc-random primitive statistics transformers vector
];
@@ -176219,8 +176812,8 @@ self: {
"qr-imager" = callPackage
({ mkDerivation, base, binary, bytestring, cryptonite, directory
- , haskell-qrencode, hspec, jose-jwt, JuicyPixels, libqrencode
- , microlens, process, split, vector
+ , haskell-qrencode, hspec, jose-jwt, JuicyPixels, microlens
+ , process, qrencode, split, vector
}:
mkDerivation {
pname = "qr-imager";
@@ -176230,12 +176823,12 @@ self: {
base binary bytestring cryptonite directory haskell-qrencode
jose-jwt JuicyPixels microlens process split vector
];
- libraryPkgconfigDepends = [ libqrencode ];
+ libraryPkgconfigDepends = [ qrencode ];
testHaskellDepends = [ base hspec ];
description = "Library to generate images";
license = stdenv.lib.licenses.bsd3;
hydraPlatforms = stdenv.lib.platforms.none;
- }) {inherit (pkgs) libqrencode;};
+ }) {inherit (pkgs) qrencode;};
"qr-repa" = callPackage
({ mkDerivation, aeson, base, bytestring, cryptonite, directory
@@ -180011,6 +180604,26 @@ self: {
hydraPlatforms = stdenv.lib.platforms.none;
}) {};
+ "reanimate-svg" = callPackage
+ ({ mkDerivation, attoparsec, base, bytestring, containers, hspec
+ , JuicyPixels, lens, linear, mtl, scientific, svg-tree, text
+ , transformers, vector, xml
+ }:
+ mkDerivation {
+ pname = "reanimate-svg";
+ version = "0.8.1.0";
+ sha256 = "1pkmm0qjngp82vxpxq0zg3al6r6ay6k542w4m65jy0fciby5y5gp";
+ libraryHaskellDepends = [
+ attoparsec base bytestring containers JuicyPixels lens linear mtl
+ scientific text transformers vector xml
+ ];
+ testHaskellDepends = [
+ attoparsec base hspec linear scientific svg-tree
+ ];
+ description = "SVG file loader and serializer";
+ license = stdenv.lib.licenses.bsd3;
+ }) {};
+
"reasonable-lens" = callPackage
({ mkDerivation, base, mtl, split, template-haskell }:
mkDerivation {
@@ -180367,8 +180980,8 @@ self: {
}:
mkDerivation {
pname = "red-black-record";
- version = "2.0.2.1";
- sha256 = "0wnzzx7hvk1yhg7x7mzi6zkr6x7j7682i3d843qk6hhpa3agcb8j";
+ version = "2.0.2.2";
+ sha256 = "1afmqdgd0xhawjckjz318561zsr478a7jkpr20l7alic6zxnl4z9";
libraryHaskellDepends = [ base sop-core ];
testHaskellDepends = [
aeson base bytestring doctest profunctors sop-core tasty
@@ -184485,8 +185098,8 @@ self: {
}:
mkDerivation {
pname = "riak";
- version = "1.1.2.5";
- sha256 = "1ln7qm6rl8nr4fc1109pk0jmnqhw4dm3q2jfmvd4a34whplzwln7";
+ version = "1.1.2.6";
+ sha256 = "0dialr56k5406zav54hk4lx6dr9yisv8yq0hrjjga5my08ga5v4y";
libraryHaskellDepends = [
aeson async attoparsec base bifunctors binary blaze-builder
bytestring containers data-default-class deepseq
@@ -184512,8 +185125,8 @@ self: {
}:
mkDerivation {
pname = "riak-protobuf";
- version = "0.23.0.0";
- sha256 = "0cyarnp2yqlj98zdbd51krpz3ls75vcl8am6h4wf98b6vdmx1jsx";
+ version = "0.24.0.0";
+ sha256 = "175sww7s8r1brl3iz2m3vxx8ffk059ciyvzxqfn47cwf8yljw10s";
libraryHaskellDepends = [
array base parsec protocol-buffers protocol-buffers-descriptor
];
@@ -184528,8 +185141,8 @@ self: {
}:
mkDerivation {
pname = "riak-protobuf-lens";
- version = "0.23.0.0";
- sha256 = "0i01p6ix5304hd9alahq5bpmcf1rzc9k2qqy6n7c002fmnwsw2zw";
+ version = "0.24.0.0";
+ sha256 = "1qmpa4vg5mxkx804c2bl6dnsgwrvv9hj62a208ns2smps6fnbndh";
isLibrary = true;
isExecutable = true;
libraryHaskellDepends = [
@@ -190762,6 +191375,26 @@ self: {
license = stdenv.lib.licenses.bsd3;
}) {};
+ "sequence-formats" = callPackage
+ ({ mkDerivation, attoparsec, base, bytestring, containers
+ , data-memocombinators, errors, exceptions, foldl, hslogger
+ , lens-family, MissingH, pipes, pipes-attoparsec, pipes-bytestring
+ , pipes-safe, pipes-text, split, text, transformers, turtle, vector
+ }:
+ mkDerivation {
+ pname = "sequence-formats";
+ version = "1.1.4.1";
+ sha256 = "1zh2n1ksyvqzk2w35nsyj3sxdf7ni2iqv2ksrk8xs64n0j25c7ac";
+ libraryHaskellDepends = [
+ attoparsec base bytestring containers data-memocombinators errors
+ exceptions foldl hslogger lens-family MissingH pipes
+ pipes-attoparsec pipes-bytestring pipes-safe pipes-text split text
+ transformers turtle vector
+ ];
+ description = "A package with basic parsing utilities for several Bioinformatic data formats";
+ license = stdenv.lib.licenses.gpl3;
+ }) {};
+
"sequent-core" = callPackage
({ mkDerivation, base, bytestring, containers, ghc, transformers }:
mkDerivation {
@@ -191545,6 +192178,8 @@ self: {
pname = "servant-checked-exceptions";
version = "2.0.0.0";
sha256 = "127nav7z2zkgfgzpjjprqb6s55mbdj9z2p05knjx3mangs2q5wm7";
+ revision = "1";
+ editedCabalFile = "0h18x8gimmczgml4rj74kx3463pwrsyxl2vnd13ra5hj0q44d683";
isLibrary = true;
isExecutable = true;
libraryHaskellDepends = [
@@ -191571,6 +192206,8 @@ self: {
pname = "servant-checked-exceptions-core";
version = "2.0.0.0";
sha256 = "0j5j7ai1b7nnsvzal27jy6hamwx5i2pyc1f6mmmb06r40cs53lxa";
+ revision = "1";
+ editedCabalFile = "1q2y4cri4h33cfdpgz95dczhvhmyrqajm7k6ypl3b8rw953qlzy7";
isLibrary = true;
isExecutable = true;
libraryHaskellDepends = [
@@ -192189,8 +192826,8 @@ self: {
pname = "servant-iCalendar";
version = "0.1.0.1";
sha256 = "15gqlb60r8msn3k1j8wjxq89qg6d790lnb751wabg2lsxybmdzas";
- revision = "3";
- editedCabalFile = "0bcab5xk354glypz15lnlzvr157pbvh4mjfd5ln59hr3ip84bzi9";
+ revision = "6";
+ editedCabalFile = "0pqn5lxcicccy73xbxsaqkxlga0ljc2kr8ysmdffxyndjyph4237";
libraryHaskellDepends = [
base data-default http-media iCalendar servant
];
@@ -192268,6 +192905,32 @@ self: {
license = stdenv.lib.licenses.mit;
}) {};
+ "servant-kotlin_0_1_1_7" = callPackage
+ ({ mkDerivation, aeson, base, containers, directory, formatting
+ , hspec, http-api-data, lens, servant, servant-foreign, shelly
+ , text, time, wl-pprint-text
+ }:
+ mkDerivation {
+ pname = "servant-kotlin";
+ version = "0.1.1.7";
+ sha256 = "138xx3jn2ay38fradssi7biff5cc6g1g3wk003bid349irmgvid4";
+ libraryHaskellDepends = [
+ base containers directory formatting lens servant servant-foreign
+ text time wl-pprint-text
+ ];
+ testHaskellDepends = [
+ aeson base containers directory formatting hspec http-api-data lens
+ servant servant-foreign text time wl-pprint-text
+ ];
+ benchmarkHaskellDepends = [
+ aeson base containers directory formatting http-api-data lens
+ servant servant-foreign shelly text time wl-pprint-text
+ ];
+ description = "Automatically derive Kotlin class to query servant webservices";
+ license = stdenv.lib.licenses.mit;
+ hydraPlatforms = stdenv.lib.platforms.none;
+ }) {};
+
"servant-lucid" = callPackage
({ mkDerivation, base, http-media, lucid, servant, servant-server
, text, wai, warp
@@ -194165,17 +194828,18 @@ self: {
}) {inherit (pkgs) zlib;};
"sgd" = callPackage
- ({ mkDerivation, base, binary, bytestring, containers, deepseq
- , filepath, lazy-io, logfloat, monad-par, mtl, primitive, random
- , temporary, vector
+ ({ mkDerivation, base, binary, bytestring, containers, data-default
+ , deepseq, filepath, hmatrix, logfloat, monad-par, mtl, pipes
+ , primitive, random, temporary, vector
}:
mkDerivation {
pname = "sgd";
- version = "0.4.0.1";
- sha256 = "05ngij0zigjxplw76qaczpd4dmdmqj23h8bfls5cd5s5sbxv5irb";
+ version = "0.5.0.0";
+ sha256 = "0ajlg3790rjs9nnyg4iiviki3470c7j05nc9b88824jdqc6wczlk";
libraryHaskellDepends = [
- base binary bytestring containers deepseq filepath lazy-io logfloat
- monad-par mtl primitive random temporary vector
+ base binary bytestring containers data-default deepseq filepath
+ hmatrix logfloat monad-par mtl pipes primitive random temporary
+ vector
];
description = "Stochastic gradient descent";
license = stdenv.lib.licenses.bsd3;
@@ -195354,6 +196018,8 @@ self: {
pname = "shine";
version = "0.2.0.3";
sha256 = "16h5igycgas28qk22yg08qkfwsrar9g4bw7q8p94vmf993p4542k";
+ revision = "1";
+ editedCabalFile = "0af20y679gqd8dzsfjhiaag1dc25dlvgml2jdkqnp6mi28sbz3n1";
libraryHaskellDepends = [
base ghcjs-dom ghcjs-prim keycode mtl time transformers
];
@@ -195370,8 +196036,8 @@ self: {
pname = "shine-varying";
version = "0.1.0.0";
sha256 = "13mnzf8i9y7ifn73mvsrzv0dh01vc20cymqli29j384z1491sc40";
- revision = "3";
- editedCabalFile = "1icg7mcfw6zrdf884kh2g0ss2lki0zf0b3r0yqzmz4h2cwvxl910";
+ revision = "4";
+ editedCabalFile = "1q46j41fxi8y52vzx7g18izndwrckcny56xdzyzrj5455znhwrsy";
libraryHaskellDepends = [ base ghcjs-dom keycode shine varying ];
testHaskellDepends = [ base ghcjs-dom keycode shine varying ];
description = "FRP interface for shine using the varying package";
@@ -196262,8 +196928,8 @@ self: {
({ mkDerivation, base }:
mkDerivation {
pname = "simple-get-opt";
- version = "0.2.0";
- sha256 = "1xx751j2vszqr8x9nf4f56aj5b6v0j8qdf90pd1xdasrfc67af9c";
+ version = "0.3";
+ sha256 = "1kcngbcl8kv6v9762z1f6kp4x7kary8n4zqpky6d7kxpv5zqrnfy";
libraryHaskellDepends = [ base ];
description = "A simple library for processing command-line options";
license = stdenv.lib.licenses.bsd3;
@@ -197485,6 +198151,23 @@ self: {
hydraPlatforms = stdenv.lib.platforms.none;
}) {};
+ "skews_0_1_0_2" = callPackage
+ ({ mkDerivation, async, base, bytestring, deque, envy, hspec
+ , network, websockets
+ }:
+ mkDerivation {
+ pname = "skews";
+ version = "0.1.0.2";
+ sha256 = "0xw9zlv7f77048c47kc3kymwxv9whg286d270n9d1k52c0df8h0p";
+ libraryHaskellDepends = [ base bytestring deque websockets ];
+ testHaskellDepends = [
+ async base bytestring deque envy hspec network websockets
+ ];
+ description = "A very quick-and-dirty WebSocket server";
+ license = stdenv.lib.licenses.bsd3;
+ hydraPlatforms = stdenv.lib.platforms.none;
+ }) {};
+
"skip-list" = callPackage
({ mkDerivation, base, criterion, tasty, tasty-hunit }:
mkDerivation {
@@ -201670,7 +202353,7 @@ self: {
description = "Experimental web browser";
license = stdenv.lib.licenses.bsd3;
hydraPlatforms = stdenv.lib.platforms.none;
- }) {inherit (pkgs.gnome2) libsoup;};
+ }) {inherit (pkgs) libsoup;};
"spine" = callPackage
({ mkDerivation, base }:
@@ -201762,8 +202445,8 @@ self: {
}:
mkDerivation {
pname = "spline3";
- version = "0.0.2";
- sha256 = "112agbhn11wpy4dn0g3j9mrqcja5hhql55swmwh3lbm26hcvwjpq";
+ version = "1.0.0";
+ sha256 = "02sj4mqgjakmk24fv8swwr06rpl4idgmwwnjwqf257hzlns6lriw";
isLibrary = false;
isExecutable = true;
executableHaskellDepends = [
@@ -201775,7 +202458,7 @@ self: {
tasty tasty-hunit tasty-quickcheck vector
];
description = "A parallel implementation of the Sorokina/Zeilfelder spline scheme";
- license = stdenv.lib.licenses.gpl3;
+ license = stdenv.lib.licenses.agpl3;
hydraPlatforms = stdenv.lib.platforms.none;
}) {};
@@ -203229,6 +203912,8 @@ self: {
pname = "stack2nix";
version = "0.2.2";
sha256 = "0x5dsgq9mdibbbilc0wn86qqkdgjkm606y4ix57vwxpfgrgkd3wm";
+ revision = "1";
+ editedCabalFile = "1rxrdpzgql4pldx990hmhhjj39kirxvqphiqjmwr9gbhbkyv7hcg";
isLibrary = true;
isExecutable = true;
libraryHaskellDepends = [
@@ -205999,6 +206684,8 @@ self: {
pname = "streamproc";
version = "1.6.2";
sha256 = "1wl44n4nav4h203mzfdf1bd5nh4v23dib54lvxka1rl3zymgyvp7";
+ revision = "1";
+ editedCabalFile = "19c51gks028x8mnywkx1nz0s6bwn2mxs5ddmaj2q8n9l5pvfkcgs";
libraryHaskellDepends = [ base ];
description = "Stream Processer Arrow";
license = stdenv.lib.licenses.bsd3;
@@ -206192,8 +206879,8 @@ self: {
}:
mkDerivation {
pname = "strict-list";
- version = "0.1";
- sha256 = "1bwzcrpwhszn6ir458znb72dcwh1ih4d8ry61nb1q2fw7pamdq2v";
+ version = "0.1.0.1";
+ sha256 = "13s3bwg9zslh04i5djvlf7wfs3ckn3sscxvlawj9nsi3md4fsvdz";
libraryHaskellDepends = [ base semigroupoids ];
testHaskellDepends = [
QuickCheck quickcheck-instances rerebase tasty tasty-hunit
@@ -206779,8 +207466,8 @@ self: {
}:
mkDerivation {
pname = "strongswan-sql";
- version = "1.0.1.0";
- sha256 = "1f3yfbd7cl8k603jc1fy3b7h8nh94mvr15k3j01141zrfzzprimw";
+ version = "1.2.0.0";
+ sha256 = "1xc5y85fld0hl9hwdlswnpa0fsjkaim7dapawyvmnivrvfk3p5mk";
isLibrary = true;
isExecutable = true;
libraryHaskellDepends = [
@@ -208109,7 +208796,7 @@ self: {
description = "Binding to the libsvg-cairo library";
license = stdenv.lib.licenses.bsd3;
hydraPlatforms = stdenv.lib.platforms.none;
- }) {inherit (pkgs.gnome3) librsvg;};
+ }) {inherit (pkgs) librsvg;};
"svgutils" = callPackage
({ mkDerivation, base, filepath, xml }:
@@ -209924,7 +210611,7 @@ self: {
description = "A desktop bar similar to xmobar, but with more GUI";
license = stdenv.lib.licenses.bsd3;
hydraPlatforms = stdenv.lib.platforms.none;
- }) {gtk3 = pkgs.gtk3;};
+ }) {inherit (pkgs) gtk3;};
"tag-bits" = callPackage
({ mkDerivation, base, ghc-prim }:
@@ -212793,7 +213480,7 @@ self: {
description = "Terminal emulator configurable in Haskell";
license = stdenv.lib.licenses.bsd3;
hydraPlatforms = stdenv.lib.platforms.none;
- }) {gtk3 = pkgs.gtk3; vte_291 = pkgs.vte;};
+ }) {inherit (pkgs) gtk3; vte_291 = pkgs.vte;};
"termplot" = callPackage
({ mkDerivation, base, brick, data-default, optparse-applicative
@@ -213519,6 +214206,29 @@ self: {
license = stdenv.lib.licenses.gpl2;
}) {};
+ "texmath_0_11_2_1" = callPackage
+ ({ mkDerivation, base, bytestring, containers, directory, filepath
+ , mtl, pandoc-types, parsec, process, split, syb, temporary, text
+ , utf8-string, xml
+ }:
+ mkDerivation {
+ pname = "texmath";
+ version = "0.11.2.1";
+ sha256 = "0divah3mwyyzg2z3mnl28d2kvy0lz1n8qh22pi1z856b7g3wv8r2";
+ isLibrary = true;
+ isExecutable = true;
+ libraryHaskellDepends = [
+ base containers mtl pandoc-types parsec syb xml
+ ];
+ testHaskellDepends = [
+ base bytestring directory filepath process split temporary text
+ utf8-string xml
+ ];
+ description = "Conversion between formats used to represent mathematics";
+ license = stdenv.lib.licenses.gpl2;
+ hydraPlatforms = stdenv.lib.platforms.none;
+ }) {};
+
"texrunner" = callPackage
({ mkDerivation, attoparsec, base, bytestring, directory, filepath
, HUnit, io-streams, lens, mtl, process, semigroups, temporary
@@ -215236,6 +215946,33 @@ self: {
hydraPlatforms = stdenv.lib.platforms.none;
}) {};
+ "these_0_8" = callPackage
+ ({ mkDerivation, aeson, assoc, base, base-compat, bifunctors
+ , binary, containers, data-default-class, deepseq, hashable, keys
+ , lens, mtl, QuickCheck, quickcheck-instances, semigroupoids, tasty
+ , tasty-quickcheck, transformers, transformers-compat
+ , unordered-containers, vector, vector-instances
+ }:
+ mkDerivation {
+ pname = "these";
+ version = "0.8";
+ sha256 = "145m71z43rqgps0nh29hcfkr3cbs9l82y3dfycf7i5fjr2472rga";
+ libraryHaskellDepends = [
+ aeson assoc base base-compat bifunctors binary containers
+ data-default-class deepseq hashable keys lens mtl QuickCheck
+ semigroupoids transformers transformers-compat unordered-containers
+ vector vector-instances
+ ];
+ testHaskellDepends = [
+ aeson base base-compat bifunctors binary containers hashable lens
+ QuickCheck quickcheck-instances tasty tasty-quickcheck transformers
+ unordered-containers vector
+ ];
+ description = "An either-or-both data type & a generalized 'zip with padding' typeclass";
+ license = stdenv.lib.licenses.bsd3;
+ hydraPlatforms = stdenv.lib.platforms.none;
+ }) {};
+
"these-skinny" = callPackage
({ mkDerivation, base, deepseq }:
mkDerivation {
@@ -215768,7 +216505,7 @@ self: {
description = "A desktop bar based on WebKit";
license = stdenv.lib.licenses.mit;
hydraPlatforms = stdenv.lib.platforms.none;
- }) {gtk3 = pkgs.gtk3; inherit (pkgs) webkitgtk;};
+ }) {inherit (pkgs) gtk3; inherit (pkgs) webkitgtk;};
"tibetan-utils" = callPackage
({ mkDerivation, base, composition-prelude, either, hspec
@@ -215872,6 +216609,25 @@ self: {
license = stdenv.lib.licenses.gpl3;
}) {};
+ "tidal_1_0_8" = callPackage
+ ({ mkDerivation, base, bifunctors, colour, containers, hosc
+ , microspec, mwc-random, network, parsec, template-haskell, text
+ , transformers, vector
+ }:
+ mkDerivation {
+ pname = "tidal";
+ version = "1.0.8";
+ sha256 = "0mxwaalbc23rmk163r40vqw15f3kjg5bagpq7f6rn3nyks7095qz";
+ libraryHaskellDepends = [
+ base bifunctors colour containers hosc mwc-random network parsec
+ template-haskell text transformers vector
+ ];
+ testHaskellDepends = [ base containers microspec parsec ];
+ description = "Pattern language for improvised music";
+ license = stdenv.lib.licenses.gpl3;
+ hydraPlatforms = stdenv.lib.platforms.none;
+ }) {};
+
"tidal-midi" = callPackage
({ mkDerivation, base, containers, PortMidi, tidal, time
, transformers
@@ -217796,8 +218552,8 @@ self: {
}:
mkDerivation {
pname = "tonatona-google-server-api";
- version = "0.1.1.0";
- sha256 = "094la1rd8527a398607rsq9z2hiay59biy9fnfiw7qyigwf4zlr0";
+ version = "0.1.2.0";
+ sha256 = "1pmpmmyqs41anm0b2cmf0fj75lz31w5s1bidjqjyqymznpna0i0j";
libraryHaskellDepends = [
base google-server-api monad-logger persistent persistent-sqlite
resource-pool servant-client tonalude tonaparser tonatona
@@ -217871,8 +218627,8 @@ self: {
}:
mkDerivation {
pname = "tonatona-servant";
- version = "0.1.0.1";
- sha256 = "1202fxvjkmvj9sgy576y0ghpcqdca1bhagsxrrz3hcdkyvd2lr9s";
+ version = "0.1.0.2";
+ sha256 = "1r0xh69wzzj8h846vi7kp8gkd9i0xfyrcjj8ggliz5h7pvrfwvbl";
libraryHaskellDepends = [
base exceptions http-types monad-logger rio servant servant-server
tonaparser tonatona tonatona-logger wai wai-extra warp
@@ -224882,8 +225638,8 @@ self: {
pname = "urlencoded";
version = "0.4.2.0";
sha256 = "1i88qf5dq52ra7hl29ka1i0bhyfic3sg7ksm1n6bpb2hj38hr139";
- revision = "2";
- editedCabalFile = "1ylbxfd7p8kdlmsfbqsnisgdxk9livncin1bckp8m5a1mrw5ywk3";
+ revision = "4";
+ editedCabalFile = "0sq16qnc50hh4gyylm3vz1rdvx94ypmw08hsgjv30mcfzfsq6ch5";
libraryHaskellDepends = [ base mtl network network-uri split ];
testHaskellDepends = [ base network network-uri QuickCheck ];
description = "Generate or process x-www-urlencoded data";
@@ -225271,6 +226027,18 @@ self: {
license = stdenv.lib.licenses.bsd3;
}) {};
+ "util_0_1_12_0" = callPackage
+ ({ mkDerivation, base }:
+ mkDerivation {
+ pname = "util";
+ version = "0.1.12.0";
+ sha256 = "0qm7bm5dmcz7kn9p882fwpihj5azm2baxz68jnimmw1mp5w66fw2";
+ libraryHaskellDepends = [ base ];
+ description = "Utilities";
+ license = stdenv.lib.licenses.bsd3;
+ hydraPlatforms = stdenv.lib.platforms.none;
+ }) {};
+
"util-exception" = callPackage
({ mkDerivation, base, basic, control, lifted-base-tf, util }:
mkDerivation {
@@ -228110,7 +228878,7 @@ self: {
description = "Binding to the VTE library";
license = stdenv.lib.licenses.lgpl21;
hydraPlatforms = stdenv.lib.platforms.none;
- }) {inherit (pkgs.gnome2) vte;};
+ }) {inherit (pkgs) vte;};
"vtegtk3" = callPackage
({ mkDerivation, base, Cabal, glib, gtk2hs-buildtools, gtk3, pango
@@ -228128,7 +228896,7 @@ self: {
description = "Binding to the VTE library";
license = stdenv.lib.licenses.lgpl21;
hydraPlatforms = stdenv.lib.platforms.none;
- }) {inherit (pkgs.gnome2) vte;};
+ }) {inherit (pkgs) vte;};
"vty" = callPackage
({ mkDerivation, base, blaze-builder, bytestring, Cabal, containers
@@ -236057,6 +236825,8 @@ self: {
pname = "yabi";
version = "0.2.0.0";
sha256 = "1iihmhq87z5k9wzv8j8ydyy100m0401yqm576z27fk01i1a6fq3x";
+ revision = "1";
+ editedCabalFile = "0hbmp3hbr2f64vpnqf7hg2li4yasiv7fzmafqf50wypz3zixbgmp";
isLibrary = false;
isExecutable = true;
executableHaskellDepends = [ base word8 ];
@@ -236247,6 +237017,38 @@ self: {
hydraPlatforms = stdenv.lib.platforms.none;
}) {};
+ "yam_0_5_14" = callPackage
+ ({ mkDerivation, aeson, base, base16-bytestring, binary, bytestring
+ , data-default, fast-logger, hspec, http-client, http-types, lens
+ , menshen, monad-logger, mtl, mwc-random, QuickCheck, reflection
+ , salak, scientific, servant-client, servant-server
+ , servant-swagger, servant-swagger-ui, swagger2, text
+ , unliftio-core, unordered-containers, vault, vector, wai, warp
+ }:
+ mkDerivation {
+ pname = "yam";
+ version = "0.5.14";
+ sha256 = "1ynd1ak1zljmvfsviz1mkpngm56ifwklfinbsgwn7qqivc7kdhl7";
+ libraryHaskellDepends = [
+ aeson base base16-bytestring binary bytestring data-default
+ fast-logger http-client http-types lens menshen monad-logger mtl
+ mwc-random reflection salak scientific servant-client
+ servant-server servant-swagger servant-swagger-ui swagger2 text
+ unliftio-core unordered-containers vault vector wai warp
+ ];
+ testHaskellDepends = [
+ aeson base base16-bytestring binary bytestring data-default
+ fast-logger hspec http-client http-types lens menshen monad-logger
+ mtl mwc-random QuickCheck reflection salak scientific
+ servant-client servant-server servant-swagger servant-swagger-ui
+ swagger2 text unliftio-core unordered-containers vault vector wai
+ warp
+ ];
+ description = "Yam Web";
+ license = stdenv.lib.licenses.bsd3;
+ hydraPlatforms = stdenv.lib.platforms.none;
+ }) {};
+
"yam-app" = callPackage
({ mkDerivation, aeson, base, conduit, containers, ctrie
, data-default, directory, exceptions, fast-logger, monad-control
@@ -236302,6 +237104,22 @@ self: {
hydraPlatforms = stdenv.lib.platforms.none;
}) {};
+ "yam-datasource_0_5_14" = callPackage
+ ({ mkDerivation, base, conduit, persistent, resource-pool
+ , resourcet, unliftio-core, yam
+ }:
+ mkDerivation {
+ pname = "yam-datasource";
+ version = "0.5.14";
+ sha256 = "0yc1hrpqpvfvn5ldnnyrj7l49b9v20f24c5k8lcf70wh7bxmwx1i";
+ libraryHaskellDepends = [
+ base conduit persistent resource-pool resourcet unliftio-core yam
+ ];
+ description = "Yam DataSource Middleware";
+ license = stdenv.lib.licenses.bsd3;
+ hydraPlatforms = stdenv.lib.platforms.none;
+ }) {};
+
"yam-job" = callPackage
({ mkDerivation, base, cron, yam-app }:
mkDerivation {
@@ -240497,6 +241315,28 @@ self: {
hydraPlatforms = stdenv.lib.platforms.none;
}) {inherit (pkgs) zeromq;};
+ "zeromq4-haskell_0_8_0" = callPackage
+ ({ mkDerivation, async, base, bytestring, containers, exceptions
+ , monad-control, QuickCheck, semigroups, tasty, tasty-hunit
+ , tasty-quickcheck, transformers, transformers-base, zeromq
+ }:
+ mkDerivation {
+ pname = "zeromq4-haskell";
+ version = "0.8.0";
+ sha256 = "0sznvz842ycbd73y8q09s6hs4i3yj1b5qm00n06f69p1i5jrkgnk";
+ libraryHaskellDepends = [
+ async base bytestring containers exceptions monad-control
+ semigroups transformers transformers-base
+ ];
+ libraryPkgconfigDepends = [ zeromq ];
+ testHaskellDepends = [
+ async base bytestring QuickCheck tasty tasty-hunit tasty-quickcheck
+ ];
+ description = "Bindings to ZeroMQ 4.x";
+ license = stdenv.lib.licenses.mit;
+ hydraPlatforms = stdenv.lib.platforms.none;
+ }) {inherit (pkgs) zeromq;};
+
"zeromq4-patterns" = callPackage
({ mkDerivation, async, base, binary, bytestring, exceptions
, QuickCheck, stm, test-framework, test-framework-quickcheck2
diff --git a/pkgs/development/haskell-modules/stack-hook.sh b/pkgs/development/haskell-modules/stack-hook.sh
index d942662294c..44c184a5624 100644
--- a/pkgs/development/haskell-modules/stack-hook.sh
+++ b/pkgs/development/haskell-modules/stack-hook.sh
@@ -1,11 +1,11 @@
addStackArgs () {
- if [ -d "$1/lib" ] && [[ "$STACK_IN_NIX_EXTRA_ARGS" != *"--extra-lib-dirs=$1/lib"* ]]; then
+ if [ -n "$(echo $1/lib/lib*)" ]; then
STACK_IN_NIX_EXTRA_ARGS+=" --extra-lib-dirs=$1/lib"
fi
- if [ -d "$1/include" ] && [[ "$STACK_IN_NIX_EXTRA_ARGS" != *"--extra-include-dirs=$1/include"* ]]; then
+ if [ -d "$1/include" ]; then
STACK_IN_NIX_EXTRA_ARGS+=" --extra-include-dirs=$1/include"
fi
}
-addEnvHooks "$hostOffset" addStackArgs
+addEnvHooks "$targetOffset" addStackArgs
diff --git a/pkgs/development/interpreters/jruby/default.nix b/pkgs/development/interpreters/jruby/default.nix
index cfefa8c95dc..79e7410c008 100644
--- a/pkgs/development/interpreters/jruby/default.nix
+++ b/pkgs/development/interpreters/jruby/default.nix
@@ -6,11 +6,11 @@ rubyVersion = callPackage ../ruby/ruby-version.nix {} "2" "3" "3" "";
jruby = stdenv.mkDerivation rec {
name = "jruby-${version}";
- version = "9.2.5.0";
+ version = "9.2.6.0";
src = fetchurl {
url = "https://s3.amazonaws.com/jruby.org/downloads/${version}/jruby-bin-${version}.tar.gz";
- sha256 = "0jgkpp90x4v3izl58r53lg5ndf9pm6q6qgwqvxhkb9zcha00ibgl";
+ sha256 = "0g8fkv946icw82h7pmg5aqh5mrgiiz9izjcjx9ism2x92w7gz8bh";
};
buildInputs = [ makeWrapper ];
diff --git a/pkgs/development/interpreters/lua-5/build-lua-package.nix b/pkgs/development/interpreters/lua-5/build-lua-package.nix
index 0bed5efe4f7..6b356831b3b 100644
--- a/pkgs/development/interpreters/lua-5/build-lua-package.nix
+++ b/pkgs/development/interpreters/lua-5/build-lua-package.nix
@@ -3,8 +3,6 @@
, lua
, stdenv
, wrapLua
-, unzip
-, writeText
# Whether the derivation provides a lua module or not.
, toLuaModule
}:
@@ -117,14 +115,16 @@ builtins.removeAttrs attrs ["disabled" "checkInputs"] // {
cat > ${luarocks_config} <
+Date: Thu, 28 Feb 2019 16:25:49 +0100
+Subject: [PATCH] allow setting paths in makefile
+
+and install headers and libs
+---
+ Makefile | 12 ++++++------
+ 1 file changed, 6 insertions(+), 6 deletions(-)
+
+diff --git a/Makefile b/Makefile
+index b507e2b0..d21e5c56 100644
+--- a/Makefile
++++ b/Makefile
+@@ -19,13 +19,13 @@ BUILD_DIR = out
+ # http://www.gnu.org/prep/standards/html_node/Directory-Variables.html
+ PREFIX ?= /usr/local
+ EXEC_PREFIX = $(PREFIX)
+-BINDIR = $(EXEC_PREFIX)/bin
++BINDIR ?= $(EXEC_PREFIX)/bin
+ DATAROOTDIR = $(PREFIX)/share
+ DOCDIR = $(DATAROOTDIR)/doc/$(CPROG)
+ SYSCONFDIR = $(PREFIX)/etc
+ HTMLDIR = $(DOCDIR)
+-INCLUDEDIR = $(DESTDIR)$(PREFIX)/include
+-LIBDIR = $(DESTDIR)$(EXEC_PREFIX)/lib
++INCLUDEDIR ?= $(DESTDIR)$(PREFIX)/include
++LIBDIR ?= $(DESTDIR)$(EXEC_PREFIX)/lib
+
+ # build tools
+ MKDIR = mkdir -p
+@@ -270,17 +270,17 @@ build: $(CPROG) $(CXXPROG)
+ unit_test: $(UNIT_TEST_PROG)
+
+ ifeq ($(CAN_INSTALL),1)
+-install: $(HTMLDIR)/index.html $(SYSCONFDIR)/civetweb.conf
++install: install-headers install-slib $(HTMLDIR)/index.html $(SYSCONFDIR)/civetweb.conf
+ install -d -m 755 "$(DOCDIR)"
+ install -m 644 *.md "$(DOCDIR)"
+ install -d -m 755 "$(BINDIR)"
+ install -m 755 $(CPROG) "$(BINDIR)/"
+
+ install-headers:
+- install -m 644 $(HEADERS) "$(INCLUDEDIR)"
++ install -m 644 $(HEADERS) "$(INCLUDEDIR)/"
+
+ install-lib: lib$(CPROG).a
+- install -m 644 $< "$(LIBDIR)"
++ install -m 644 $< "$(LIBDIR)/"
+
+ install-slib: lib$(CPROG).so
+ $(eval version=$(shell grep -w "define CIVETWEB_VERSION" include/civetweb.h | sed 's|.*VERSION "\(.*\)"|\1|g'))
+--
+2.19.2
+
diff --git a/pkgs/development/libraries/civetweb/default.nix b/pkgs/development/libraries/civetweb/default.nix
new file mode 100644
index 00000000000..3f8de005ff8
--- /dev/null
+++ b/pkgs/development/libraries/civetweb/default.nix
@@ -0,0 +1,41 @@
+{ stdenv
+, fetchFromGitHub
+}:
+
+stdenv.mkDerivation rec {
+ pname = "civetweb";
+ version = "1.11";
+
+ src = fetchFromGitHub {
+ owner = pname;
+ repo = pname;
+ rev = "v${version}";
+ sha256 = "sha256:1drnid6gs97cp9zpvsxz42yfj8djmgx98fg9p2993x9mpi547vzv";
+ };
+
+ makeFlags = [
+ "WITH_CPP=1"
+ "PREFIX=${placeholder "out"}"
+ "LIBDIR=${placeholder "out"}/lib"
+ "INCLUDEDIR=${placeholder "dev"}/include"
+ ];
+
+ patches = [
+ ./0001-allow-setting-paths-in-makefile.patch
+ ];
+
+ strictDeps = true;
+
+ outputs = [ "out" "dev" ];
+
+ preInstall = ''
+ mkdir -p $dev/include
+ mkdir -p $out/lib
+ '';
+
+ meta = {
+ description = "Embedded C/C++ web server";
+ homepage = https://github.com/civetweb/civetweb;
+ license = [ stdenv.lib.licenses.mit ];
+ };
+}
diff --git a/pkgs/development/libraries/ffms/default.nix b/pkgs/development/libraries/ffms/default.nix
index 6b95d0f1692..8a5a9705cb2 100644
--- a/pkgs/development/libraries/ffms/default.nix
+++ b/pkgs/development/libraries/ffms/default.nix
@@ -2,13 +2,13 @@
stdenv.mkDerivation rec {
name = "ffms-${version}";
- version = "2.22";
+ version = "2.23";
src = fetchFromGitHub {
owner = "FFMS";
repo = "ffms2";
rev = version;
- sha256 = "1ywcx1f3q533qfrbck5qhik3l617qhm062l8zixv02gnla7w6rkm";
+ sha256 = "0dkz5b3gxq5p4xz0qqg6l2sigszrlsinz3skyf0ln4wf3zrvf8m5";
};
NIX_CFLAGS_COMPILE = "-fPIC";
diff --git a/pkgs/development/libraries/flatcc/default.nix b/pkgs/development/libraries/flatcc/default.nix
new file mode 100644
index 00000000000..f3d06f7a01a
--- /dev/null
+++ b/pkgs/development/libraries/flatcc/default.nix
@@ -0,0 +1,29 @@
+{ stdenv
+, fetchFromGitHub
+, cmake
+}:
+
+stdenv.mkDerivation rec {
+ pname = "flatcc";
+ version = "0.5.2";
+
+ src = fetchFromGitHub {
+ owner = "dvidelabs";
+ repo = "flatcc";
+ rev = "v${version}";
+ sha256 = "sha256:0cb6s9q1cbigss1q7dra0ix2a0iqlh2xxwncbrnmqv17h4lwvglr";
+ };
+
+ nativeBuildInputs = [ cmake ];
+
+ cmakeFlags = [
+ "-DFLATCC_INSTALL=on"
+ "-DCMAKE_BUILD_TYPE=Release"
+ ];
+
+ meta = {
+ description = "FlatBuffers Compiler and Library in C for C ";
+ homepage = https://github.com/dvidelabs/flatcc;
+ license = [ stdenv.lib.licenses.asl20 ];
+ };
+}
diff --git a/pkgs/development/libraries/gbenchmark/default.nix b/pkgs/development/libraries/gbenchmark/default.nix
index 5ce08cbe636..dc5c2024c02 100644
--- a/pkgs/development/libraries/gbenchmark/default.nix
+++ b/pkgs/development/libraries/gbenchmark/default.nix
@@ -1,17 +1,19 @@
-{ stdenv, fetchFromGitHub, cmake }:
+{ stdenv, fetchFromGitHub, cmake, gtest }:
stdenv.mkDerivation rec {
name = "gbenchmark-${version}";
- version = "1.3.0";
+ version = "1.4.1";
src = fetchFromGitHub {
owner = "google";
repo = "benchmark";
rev = "v${version}";
- sha256 = "1qx2dp7y0haj6wfbbfw8hx8sxb8ww0igdfrmmaaxfl0vhckylrxh";
+ sha256 = "0l1f6azka85fkb8kdmh4qmmpxhsv7lr7wvll6sld31mfz0cai1kd";
};
- buildInputs = [ cmake ];
+ nativeBuildInputs = [ cmake ];
+
+ buildInputs = [ gtest ];
enableParallelBuilding = true;
diff --git a/pkgs/development/libraries/gecode/default.nix b/pkgs/development/libraries/gecode/default.nix
index 2d5556b3502..22e159d821a 100644
--- a/pkgs/development/libraries/gecode/default.nix
+++ b/pkgs/development/libraries/gecode/default.nix
@@ -2,13 +2,13 @@
stdenv.mkDerivation rec {
name = "gecode-${version}";
- version = "6.1.0";
+ version = "6.1.1";
src = fetchFromGitHub {
owner = "Gecode";
repo = "gecode";
rev = "release-${version}";
- sha256 = "1ijjy8ppx7djnkrkawsd00rmlf24qh1z13aap0h1azailw1pbrg4";
+ sha256 = "07jyx17qsfx3wmd2zlcs0rxax8h3cs2g9aapxkdjdcsmfxsldqb7";
};
enableParallelBuilding = true;
diff --git a/pkgs/development/libraries/geoclue/add-option-for-installation-sysconfdir.patch b/pkgs/development/libraries/geoclue/add-option-for-installation-sysconfdir.patch
index 629ea102971..feb46021f8c 100644
--- a/pkgs/development/libraries/geoclue/add-option-for-installation-sysconfdir.patch
+++ b/pkgs/development/libraries/geoclue/add-option-for-installation-sysconfdir.patch
@@ -1,52 +1,69 @@
+diff --git a/data/meson.build b/data/meson.build
+index f826864..8b8a25e 100644
--- a/data/meson.build
+++ b/data/meson.build
-@@ -7,7 +7,7 @@
+@@ -7,7 +7,7 @@ if get_option('enable-backend')
conf.set('demo_agent', '')
endif
-- conf_dir = join_paths(get_option('sysconfdir'), 'geoclue')
+- conf_dir = join_paths(sysconfdir, 'geoclue')
+ conf_dir = join_paths(sysconfdir_install, 'geoclue')
configure_file(output: 'geoclue.conf',
input: 'geoclue.conf.in',
configuration: conf,
-@@ -26,7 +26,7 @@
+@@ -26,7 +26,7 @@ if get_option('enable-backend')
# DBus Service policy file
dbus_service_dir = get_option('dbus-sys-dir')
- if dbus_service_dir == ''
-- dbus_service_dir = join_paths(get_option('sysconfdir'), 'dbus-1', 'system.d')
+ if dbus_service_dir == ''
+- dbus_service_dir = join_paths(sysconfdir, 'dbus-1', 'system.d')
+ dbus_service_dir = join_paths(sysconfdir_install, 'dbus-1', 'system.d')
endif
configure_file(output: 'org.freedesktop.GeoClue2.conf',
input: 'org.freedesktop.GeoClue2.conf.in',
+diff --git a/demo/meson.build b/demo/meson.build
+index 99c094f..a29ca96 100644
--- a/demo/meson.build
+++ b/demo/meson.build
-@@ -56,8 +56,7 @@
+@@ -56,7 +56,7 @@ if get_option('demo-agent')
install_dir: desktop_dir)
# Also install in the autostart directory.
-- autostart_dir = join_paths(get_option('prefix'),
-- get_option('sysconfdir'),
-+ autostart_dir = join_paths(sysconfdir_install,
- 'xdg', 'autostart')
+- autostart_dir = join_paths(sysconfdir, 'xdg', 'autostart')
++ autostart_dir = join_paths(sysconfdir_install, 'xdg', 'autostart')
meson.add_install_script('install-file.py',
desktop_file.full_path(),
+ autostart_dir)
+diff --git a/meson.build b/meson.build
+index d738ef6..c794a1d 100644
--- a/meson.build
+++ b/meson.build
-@@ -22,6 +22,11 @@
+@@ -12,7 +12,11 @@ gclue_api_version='2.0'
datadir = join_paths(get_option('prefix'), get_option('datadir'))
- conf.set_quoted('LOCALEDIR', datadir + '/locale')
- conf.set_quoted('SYSCONFDIR', get_option('sysconfdir'))
+ includedir = join_paths(get_option('prefix'), get_option('includedir'))
+ libexecdir = join_paths(get_option('prefix'), get_option('libexecdir'))
+-sysconfdir = join_paths(get_option('prefix'), get_option('sysconfdir'))
+if get_option('sysconfdir_install') != ''
+ sysconfdir_install = join_paths(get_option('prefix'), get_option('sysconfdir_install'))
+else
+ sysconfdir_install = get_option('sysconfdir')
+endif
+ localedir = join_paths(datadir, 'locale')
- configure_file(output: 'config.h', configuration : conf)
- configinc = include_directories('.')
+ header_dir = 'libgeoclue-' + gclue_api_version
+@@ -29,7 +33,7 @@ conf.set_quoted('PACKAGE_URL', 'http://www.freedesktop.org/wiki/Software/GeoClue
+ conf.set_quoted('PACKAGE_BUGREPORT', 'http://bugs.freedesktop.org/enter_bug.cgi?product=GeoClue')
+ conf.set_quoted('TEST_SRCDIR', meson.source_root() + '/data/')
+ conf.set_quoted('LOCALEDIR', localedir)
+-conf.set_quoted('SYSCONFDIR', sysconfdir)
++conf.set_quoted('SYSCONFDIR', get_option('sysconfdir'))
+ conf.set10('GCLUE_USE_3G_SOURCE', get_option('3g-source'))
+ conf.set10('GCLUE_USE_CDMA_SOURCE', get_option('cdma-source'))
+ conf.set10('GCLUE_USE_MODEM_GPS_SOURCE', get_option('modem-gps-source'))
+diff --git a/meson_options.txt b/meson_options.txt
+index 83bc60e..b726329 100644
--- a/meson_options.txt
+++ b/meson_options.txt
-@@ -34,3 +34,6 @@
+@@ -34,3 +34,6 @@ option('systemd-system-unit-dir',
option('dbus-srv-user',
type: 'string', value: 'root',
description: 'The user (existing) as which the service will run')
diff --git a/pkgs/development/libraries/geoclue/default.nix b/pkgs/development/libraries/geoclue/default.nix
index 5e83ba71c1b..5b8951cb3e0 100644
--- a/pkgs/development/libraries/geoclue/default.nix
+++ b/pkgs/development/libraries/geoclue/default.nix
@@ -6,15 +6,15 @@
with stdenv.lib;
stdenv.mkDerivation rec {
- name = "geoclue-${version}";
- version = "2.5.1";
+ pname = "geoclue";
+ version = "2.5.2";
src = fetchFromGitLab {
domain = "gitlab.freedesktop.org";
- owner = "geoclue";
- repo = "geoclue";
+ owner = pname;
+ repo = pname;
rev = version;
- sha256 = "0vww6irijw5ss7vawkdi5z5wdpcgw4iqljn5vs3vbd4y3d0lzrbs";
+ sha256 = "1zk6n28q030a9v03whad928b9zwq16d30ch369qv2c0994axdr5p";
};
patches = [
diff --git a/pkgs/development/libraries/hpx/default.nix b/pkgs/development/libraries/hpx/default.nix
index db7dab1b6a7..c0028666482 100644
--- a/pkgs/development/libraries/hpx/default.nix
+++ b/pkgs/development/libraries/hpx/default.nix
@@ -2,13 +2,13 @@
stdenv.mkDerivation rec {
name = "hpx-${version}";
- version = "1.2.0";
+ version = "1.2.1";
src = fetchFromGitHub {
owner = "STEllAR-GROUP";
repo = "hpx";
rev = "${version}";
- sha256 = "1rliv42glns60bpmmvmgrglgmii42p8bmji349r6mr68f48iv4dx";
+ sha256 = "18dk9413qcgljdlw2jfkk21lwi4iwc57s41yqnc3jp8vdj96w32s";
};
buildInputs = [ boost hwloc gperftools ];
diff --git a/pkgs/development/libraries/java/swt/default.nix b/pkgs/development/libraries/java/swt/default.nix
index 0aa20f8b014..0dc9e8bd892 100644
--- a/pkgs/development/libraries/java/swt/default.nix
+++ b/pkgs/development/libraries/java/swt/default.nix
@@ -1,5 +1,5 @@
{ stdenv, lib, fetchurl, unzip, jdk, pkgconfig, gtk2
-, libXt, libXtst, libXi, libGLU_combined, webkit, libsoup, xorg
+, libXt, libXtst, libXi, libGLU_combined, webkitgtk, libsoup, xorg
, pango, gdk_pixbuf, glib
}:
@@ -36,7 +36,7 @@ in stdenv.mkDerivation rec {
sourceRoot = ".";
nativeBuildInputs = [ unzip pkgconfig ];
- buildInputs = [ jdk gtk2 libXt libXtst libXi libGLU_combined webkit libsoup ];
+ buildInputs = [ jdk gtk2 libXt libXtst libXi libGLU_combined webkitgtk libsoup ];
NIX_LFLAGS = (map (x: "-L${lib.getLib x}/lib") [ xorg.libX11 pango gdk_pixbuf glib ]) ++
[ "-lX11" "-lpango-1.0" "-lgdk_pixbuf-2.0" "-lglib-2.0" ];
diff --git a/pkgs/development/libraries/libchamplain/default.nix b/pkgs/development/libraries/libchamplain/default.nix
index b8d25f48b3b..1a0be52dbbe 100644
--- a/pkgs/development/libraries/libchamplain/default.nix
+++ b/pkgs/development/libraries/libchamplain/default.nix
@@ -1,23 +1,27 @@
-{ fetchurl, stdenv, pkgconfig, glib, gtk3, cairo, sqlite, gnome3
+{ fetchurl, stdenv, meson, ninja, vala, gtk-doc, docbook_xsl, docbook_xml_dtd_412, pkgconfig, glib, gtk3, cairo, sqlite, gnome3
, clutter-gtk, libsoup, gobject-introspection /*, libmemphis */ }:
-let
- pname = "libchamplain";
- version = "0.12.16";
-in
stdenv.mkDerivation rec {
- name = "${pname}-${version}";
+ pname = "libchamplain";
+ version = "0.12.19";
src = fetchurl {
- url = "mirror://gnome/sources/${pname}/${stdenv.lib.versions.majorMinor version}/${name}.tar.xz";
- sha256 = "13chvc2n074i0jw5jlb8i7cysda4yqx58ca6y3mrlrl9g37k2zja";
+ url = "mirror://gnome/sources/${pname}/${stdenv.lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
+ sha256 = "191aid1qsfkab5whbzj2r3g63dpdgrwp5141mfywvqyvdhr2x11n";
};
- outputs = [ "out" "dev" ];
+ outputs = [ "out" "dev" "devdoc" ];
- nativeBuildInputs = [ pkgconfig gobject-introspection ];
+ nativeBuildInputs = [ meson ninja pkgconfig gobject-introspection vala gtk-doc docbook_xsl docbook_xml_dtd_412 ];
- propagatedBuildInputs = [ glib gtk3 cairo clutter-gtk sqlite libsoup ];
+ buildInputs = [ sqlite libsoup ];
+
+ propagatedBuildInputs = [ glib gtk3 cairo clutter-gtk ];
+
+ mesonFlags = [
+ "-Dgtk_doc=true"
+ "-Dvapi=true"
+ ];
passthru = {
updateScript = gnome3.updateScript {
diff --git a/pkgs/development/libraries/libgeotiff/default.nix b/pkgs/development/libraries/libgeotiff/default.nix
index 48a1490caec..ed2711557e7 100644
--- a/pkgs/development/libraries/libgeotiff/default.nix
+++ b/pkgs/development/libraries/libgeotiff/default.nix
@@ -1,12 +1,12 @@
{ stdenv, fetchurl, libtiff, libjpeg, proj, zlib}:
stdenv.mkDerivation rec {
- version = "1.4.2";
+ version = "1.4.3";
name = "libgeotiff-${version}";
src = fetchurl {
url = "https://download.osgeo.org/geotiff/libgeotiff/${name}.tar.gz";
- sha256 = "0vjy3bwfhljjx66p9w999i4mdhsf7vjshx29yc3pn5livf5091xd";
+ sha256 = "0rbjqixi4c8yz19larlzq6jda0px2gpmpp9c52cyhplbjsdhsldq";
};
configureFlags = [
diff --git a/pkgs/development/libraries/libosinfo/default.nix b/pkgs/development/libraries/libosinfo/default.nix
index e0f3be23070..e947ec22bf8 100644
--- a/pkgs/development/libraries/libosinfo/default.nix
+++ b/pkgs/development/libraries/libosinfo/default.nix
@@ -3,11 +3,11 @@
}:
stdenv.mkDerivation rec {
- name = "libosinfo-1.2.0";
+ name = "libosinfo-1.4.0";
src = fetchurl {
url = "https://releases.pagure.org/libosinfo/${name}.tar.gz";
- sha256 = "0y2skfrcg38y212qqd26vs3sg566j3qnsgvvm23pfi4j7z7ly9gf";
+ sha256 = "0ra1p2rnnwkq0181ayn0l0rs1pvk4a0i8fa08nqjfmqs5fl637m2";
};
outputs = [ "out" "dev" "devdoc" ];
@@ -20,16 +20,6 @@ stdenv.mkDerivation rec {
patches = [
./osinfo-db-data-dir.patch
- # Fix bug causing tests to fail (and presumably the real scenarios they're representative of)
- # using upstream commits:
- (fetchpatch {
- url = "https://gitlab.com/libosinfo/libosinfo/commit/b9cb227842948b1b2289cdd3e9b8d925664c2ee7.patch";
- sha256 = "0nj0wmibq52j8qbzmxfzj76fpkqjs18kssbb9lmfhz16s30darbw";
- })
- (fetchpatch {
- url = "https://gitlab.com/libosinfo/libosinfo/commit/e6168463f4fc659b9827b5c8694dc1c6d7d5239a.patch";
- sha256 = "135yfhjm2wxip5dnng3r9k9igfhdi1083ys4a4f3ipjxfskcs9rv";
- })
];
postPatch = ''
diff --git a/pkgs/development/libraries/libplist/default.nix b/pkgs/development/libraries/libplist/default.nix
index 0d6e3b8db6e..904206ab79b 100644
--- a/pkgs/development/libraries/libplist/default.nix
+++ b/pkgs/development/libraries/libplist/default.nix
@@ -5,15 +5,15 @@ let
in
stdenv.mkDerivation rec {
pname = "libplist";
- version = "2018-07-25";
+ version = "2019-01-20";
name = "${pname}-${version}";
src = fetchFromGitHub {
owner = "libimobiledevice";
repo = pname;
- rev = "db68a9d1070b363eee93147f072f46526064acbc";
- sha256 = "0lxyb35jjg31m8dxhsv1jr2ccy5s19fsqzisy7lfjk46w7brs4h5";
+ rev = "bec850fe399639f3b8582a39386216970dea15ed";
+ sha256 = "197yw8xz8x2xld8b6975scgnl30j4ibm9llmzljyqngs0zsdwnin";
};
outputs = ["bin" "dev" "out" "py"];
diff --git a/pkgs/development/libraries/libpqxx/default.nix b/pkgs/development/libraries/libpqxx/default.nix
index f88543744da..ff7b7a1af1f 100644
--- a/pkgs/development/libraries/libpqxx/default.nix
+++ b/pkgs/development/libraries/libpqxx/default.nix
@@ -2,13 +2,13 @@
stdenv.mkDerivation rec {
pname = "libpqxx";
- version = "6.3.1";
+ version = "6.3.3";
src = fetchFromGitHub {
owner = "jtv";
repo = pname;
rev = version;
- sha256 = "15na6iq4mspfa5vgayqzs0wqkqq9nk23d05qwn6xc3gpna2kyqsv";
+ sha256 = "1gfi4ghnhzlkdza2ifvg6b2rk5qn0swq7ykphwmwalb166vj2wlx";
};
nativeBuildInputs = [ gnused python2 ];
diff --git a/pkgs/development/libraries/libr3/default.nix b/pkgs/development/libraries/libr3/default.nix
new file mode 100644
index 00000000000..cf848d02a04
--- /dev/null
+++ b/pkgs/development/libraries/libr3/default.nix
@@ -0,0 +1,33 @@
+{ stdenv
+, fetchFromGitHub
+, pcre
+, pkgconfig
+, check
+, autoreconfHook
+}:
+
+stdenv.mkDerivation rec {
+ pname = "r3";
+ version = "1.3.4";
+
+ src = fetchFromGitHub {
+ owner = "c9s";
+ repo = "r3";
+ rev = version;
+ sha256 = "09cixbms817p6nb77wz3rxp0znnac8ybycvsrrzgwlbfn58a3zwl";
+ };
+
+ nativeBuildInputs = [ autoreconfHook pkgconfig ];
+
+ buildInputs = [ check ];
+ propagatedBuildInputs = [ pcre ];
+
+ strictDeps = true;
+
+ meta = {
+ description = "A high-performance path dispatching library";
+ homepage = https://github.com/c9s/r3;
+ license = [ stdenv.lib.licenses.mit ];
+ };
+
+}
diff --git a/pkgs/development/libraries/libsecret/default.nix b/pkgs/development/libraries/libsecret/default.nix
index a369778111f..d3b07dfb049 100644
--- a/pkgs/development/libraries/libsecret/default.nix
+++ b/pkgs/development/libraries/libsecret/default.nix
@@ -3,11 +3,11 @@
stdenv.mkDerivation rec {
pname = "libsecret";
- version = "0.18.7";
+ version = "0.18.8";
src = fetchurl {
url = "mirror://gnome/sources/${pname}/${stdenv.lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
- sha256 = "11ylmcfx6ff7xd1gpi58i2nbma83lz2xg0g2dq23w6snqhgzwrhd";
+ sha256 = "058x64689k55wxfkdp4svhnwvv8jmqm7z5mrynybl38f4sfqiyiv";
};
postPatch = ''
diff --git a/pkgs/development/libraries/libusbmuxd/default.nix b/pkgs/development/libraries/libusbmuxd/default.nix
index 08aeba1254e..4192e3c14d3 100644
--- a/pkgs/development/libraries/libusbmuxd/default.nix
+++ b/pkgs/development/libraries/libusbmuxd/default.nix
@@ -2,15 +2,15 @@
stdenv.mkDerivation rec {
pname = "libusbmuxd";
- version = "2018-07-23";
+ version = "2019-01-18";
name = "${pname}-${version}";
src = fetchFromGitHub {
owner = "libimobiledevice";
repo = pname;
- rev = "78df9be5fc8222ed53846cb553de9b5d24c85c6c";
- sha256 = "05hbn0mbmv5ln9hfsvnf7i1mnp6ncbyfnl5w331kg4fi12wjshc5";
+ rev = "c75605d862cd1c312494f6c715246febc26b2e05";
+ sha256 = "0467a045k4znmaz61i7a2s7yywj67q830ja6zn7z39k5pqcl2z4p";
};
nativeBuildInputs = [ autoreconfHook pkgconfig ];
diff --git a/pkgs/development/libraries/libwhereami/default.nix b/pkgs/development/libraries/libwhereami/default.nix
index 880ebcc1e46..2af550c7d99 100644
--- a/pkgs/development/libraries/libwhereami/default.nix
+++ b/pkgs/development/libraries/libwhereami/default.nix
@@ -2,10 +2,10 @@
stdenv.mkDerivation rec {
name = "libwhereami-${version}";
- version = "0.2.0";
+ version = "0.2.2";
src = fetchFromGitHub {
- sha256 = "10phq4a11m8ly6b4dc2yg3dnjzg8ad5wnjv0ilvwylnw32800pxr";
+ sha256 = "084n153jaq8fmhjififk0xlx1d1i3lclnw2j3ly8bixvc392vzly";
rev = version;
repo = "libwhereami";
owner = "puppetlabs";
@@ -26,6 +26,7 @@ stdenv.mkDerivation rec {
license = licenses.asl20;
maintainers = [ maintainers.womfoo ];
platforms = platforms.linux;
+ badPlatforms = platforms.arm;
};
}
diff --git a/pkgs/development/libraries/mapnik/default.nix b/pkgs/development/libraries/mapnik/default.nix
index 0c88cff7773..4df40a964d3 100644
--- a/pkgs/development/libraries/mapnik/default.nix
+++ b/pkgs/development/libraries/mapnik/default.nix
@@ -31,6 +31,10 @@ stdenv.mkDerivation rec {
prefixKey = "PREFIX=";
+ preConfigure = ''
+ patchShebangs ./configure
+ '';
+
configureFlags = [
"BOOST_INCLUDES=${boost.dev}/include"
"BOOST_LIBS=${boost.out}/lib"
diff --git a/pkgs/development/libraries/multipart-parser-c/default.nix b/pkgs/development/libraries/multipart-parser-c/default.nix
new file mode 100644
index 00000000000..8808ccefeaf
--- /dev/null
+++ b/pkgs/development/libraries/multipart-parser-c/default.nix
@@ -0,0 +1,34 @@
+{ stdenv
+, fetchFromGitHub
+}:
+
+stdenv.mkDerivation rec {
+ pname = "multipart-parser-c";
+ version = "unstable-2015-12-14";
+
+ src = fetchFromGitHub {
+ owner = "iafonov";
+ repo = pname;
+ rev = "772639cf10db6d9f5a655ee9b7eb20b815fab396";
+ sha256 = "sha256:056r63vj8f1rwf3wk7jmwhm8ba25l6h1gs6jnkh0schbwcvi56xl";
+ };
+
+ buildPhase = ''
+ make solib
+ '';
+
+ installPhase = ''
+ mkdir -p $out/lib
+ mv lib*${stdenv.targetPlatform.extensions.sharedLibrary} $out/lib/
+
+ mkdir -p $out/include
+ mv *.h $out/include/
+ '';
+
+ meta = {
+ description = "Http multipart parser implemented in C ";
+ homepage = https://github.com/iafonov/multipart-parser-c;
+ license = [ stdenv.lib.licenses.mit ];
+ };
+
+}
diff --git a/pkgs/development/libraries/nsss/default.nix b/pkgs/development/libraries/nsss/default.nix
index 6c4a23ccaf2..f503799e6b1 100644
--- a/pkgs/development/libraries/nsss/default.nix
+++ b/pkgs/development/libraries/nsss/default.nix
@@ -4,8 +4,8 @@ with skawarePackages;
buildPackage {
pname = "nsss";
- version = "0.0.1.0";
- sha256 = "0f285bvpvhk40cqjpkc1jb36il0fkzzzjmc89gbbq3awl3w4r1i0";
+ version = "0.0.1.1";
+ sha256 = "14y1vl7n8vd5fh9bwiwwxxslisli8pz3a2f1sfv12l0p8ngpgm57";
description = "An implementation of a subset of the pwd.h, group.h and shadow.h family of functions.";
diff --git a/pkgs/development/libraries/physics/rivet/default.nix b/pkgs/development/libraries/physics/rivet/default.nix
index 01214878cd8..54bf1cc442b 100644
--- a/pkgs/development/libraries/physics/rivet/default.nix
+++ b/pkgs/development/libraries/physics/rivet/default.nix
@@ -6,7 +6,7 @@ stdenv.mkDerivation rec {
src = fetchurl {
url = "https://www.hepforge.org/archive/rivet/Rivet-${version}.tar.bz2";
- sha256 = "12mlj2j1glidjhiaxlr25qz2vfb865wip1vwwg8vlyd3yzisf533";
+ sha256 = "1bxcb99a3l5d2gl93zgfzgw6v95kx1ss5045mkz3ciyw8w5nmb9l";
};
patches = [
diff --git a/pkgs/development/libraries/physics/yoda/default.nix b/pkgs/development/libraries/physics/yoda/default.nix
index 6e4ffb9745d..7a89d61753d 100644
--- a/pkgs/development/libraries/physics/yoda/default.nix
+++ b/pkgs/development/libraries/physics/yoda/default.nix
@@ -6,7 +6,7 @@ stdenv.mkDerivation rec {
src = fetchurl {
url = "https://www.hepforge.org/archive/yoda/YODA-${version}.tar.bz2";
- sha256 = "0fl9y1mh48xkjmqc76rfhvr3vs4v4lzybh06bwxyflzy82ylwi71";
+ sha256 = "0w9s3qv87hrmpq4dkrxcrl2hn2vcsbvy8ml99w85404wksw1dwrx";
};
pythonPath = []; # python wrapper support
diff --git a/pkgs/development/libraries/prometheus-cpp/default.nix b/pkgs/development/libraries/prometheus-cpp/default.nix
new file mode 100644
index 00000000000..23c8257ac8f
--- /dev/null
+++ b/pkgs/development/libraries/prometheus-cpp/default.nix
@@ -0,0 +1,41 @@
+{ stdenv
+, fetchFromGitHub
+, cmake
+, gbenchmark
+, gtest
+, civetweb
+, zlib
+, curl
+}:
+
+stdenv.mkDerivation rec {
+ pname = "prometheus-cpp";
+ version = "0.6.0";
+
+ src = fetchFromGitHub {
+ owner = "jupp0r";
+ repo = pname;
+ rev = "v${version}";
+ sha256 = "sha256:1a0gpfmk0z9wgsbzvx823aqbs7w836l0j0rnsxl9ifwgdxnxbl6m";
+ };
+
+ nativeBuildInputs = [ cmake ];
+ buildInputs = [ gbenchmark civetweb gtest zlib curl ];
+
+ strictDeps = true;
+
+ cmakeFlags = [
+ "-DUSE_THIRDPARTY_LIBRARIES=OFF"
+ "-DCIVETWEB_INCLUDE_DIR=${civetweb.dev}/include"
+ "-DCIVETWEB_CXX_LIBRARY=${civetweb}/lib/libcivetweb${stdenv.targetPlatform.extensions.sharedLibrary}"
+ ];
+
+ NIX_LDFLAGS = [ "-ldl" ];
+
+ meta = {
+ description = "Prometheus Client Library for Modern C++";
+ homepage = https://github.com/jupp0r/prometheus-cpp;
+ license = [ stdenv.lib.licenses.mit ];
+ };
+
+}
diff --git a/pkgs/development/libraries/pyotherside/default.nix b/pkgs/development/libraries/pyotherside/default.nix
index 0c2d4fa2b28..94347a546fc 100644
--- a/pkgs/development/libraries/pyotherside/default.nix
+++ b/pkgs/development/libraries/pyotherside/default.nix
@@ -3,13 +3,13 @@
stdenv.mkDerivation rec {
pname = "pyotherside";
- version = "1.5.3";
+ version = "1.5.4";
src = fetchFromGitHub {
owner = "thp";
repo = "pyotherside";
rev = version;
- sha256 = "1xaw1aarj8gpgpm4z3lk8klbssadrsf3xdyzqx10zcwy16amka7k";
+ sha256 = "1cmmsmzmis4a463p2fjlzbkpw8r53wfvq3mldyfgmi14dkxr3ln3";
};
nativeBuildInputs = [ qmake ];
diff --git a/pkgs/development/libraries/qt-5/5.11/default.nix b/pkgs/development/libraries/qt-5/5.11/default.nix
index 257e9215246..32245929ce6 100644
--- a/pkgs/development/libraries/qt-5/5.11/default.nix
+++ b/pkgs/development/libraries/qt-5/5.11/default.nix
@@ -65,7 +65,11 @@ let
qtwebengine = [ ./qtwebengine-no-build-skip.patch ]
++ optional stdenv.cc.isClang ./qtwebengine-clang-fix.patch
++ optional stdenv.isDarwin ./qtwebengine-darwin-sdk-10.10.patch;
- qtwebkit = [ ./qtwebkit.patch ];
+ qtwebkit = [ ./qtwebkit.patch ]
+ ++ optionals stdenv.isDarwin [
+ ./qtwebkit-darwin-no-readline.patch
+ ./qtwebkit-darwin-no-qos-classes.patch
+ ];
};
mkDerivation =
diff --git a/pkgs/development/libraries/qt-5/5.11/qtwebkit-darwin-no-qos-classes.patch b/pkgs/development/libraries/qt-5/5.11/qtwebkit-darwin-no-qos-classes.patch
new file mode 100644
index 00000000000..a7087f51762
--- /dev/null
+++ b/pkgs/development/libraries/qt-5/5.11/qtwebkit-darwin-no-qos-classes.patch
@@ -0,0 +1,11 @@
+diff --git a/Source/cmake/OptionsQt.cmake b/Source/cmake/OptionsQt.cmake
+--- a/Source/cmake/OptionsQt.cmake
++++ b/Source/cmake/OptionsQt.cmake
+@@ -683,7 +683,6 @@ if (WIN32 AND COMPILER_IS_GCC_OR_CLANG)
+ endif ()
+
+ if (APPLE)
+- SET_AND_EXPOSE_TO_BUILD(HAVE_QOS_CLASSES 1)
+ endif ()
+
+ if (ENABLE_MATHML)
diff --git a/pkgs/development/libraries/qt-5/5.11/qtwebkit-darwin-no-readline.patch b/pkgs/development/libraries/qt-5/5.11/qtwebkit-darwin-no-readline.patch
new file mode 100644
index 00000000000..26d189d8601
--- /dev/null
+++ b/pkgs/development/libraries/qt-5/5.11/qtwebkit-darwin-no-readline.patch
@@ -0,0 +1,45 @@
+diff --git a/Source/JavaScriptCore/shell/CMakeLists.txt b/Source/JavaScriptCore/shell/CMakeLists.txt
+--- a/Source/JavaScriptCore/shell/CMakeLists.txt
++++ b/Source/JavaScriptCore/shell/CMakeLists.txt
+@@ -9,7 +9,6 @@ set(JSC_LIBRARIES
+ )
+
+ if (WTF_OS_MAC_OS_X)
+- list(APPEND JSC_LIBRARIES edit)
+ endif ()
+
+ if ("${JavaScriptCore_LIBRARY_TYPE}" MATCHES "STATIC")
+diff --git a/Source/WTF/wtf/Platform.h b/Source/WTF/wtf/Platform.h
+--- a/Source/WTF/wtf/Platform.h
++++ b/Source/WTF/wtf/Platform.h
+@@ -563,7 +563,6 @@
+ #if PLATFORM(IOS)
+
+ #define HAVE_NETWORK_EXTENSION 1
+-#define HAVE_READLINE 1
+ #if USE(APPLE_INTERNAL_SDK)
+ #define USE_CFNETWORK 1
+ #endif
+@@ -650,7 +649,6 @@
+ #define HAVE_MADV_DONTNEED 1
+ #define HAVE_MERGESORT 1
+ #define HAVE_PTHREAD_SETNAME_NP 1
+-#define HAVE_READLINE 1
+ #define HAVE_SYS_TIMEB_H 1
+
+ #if !PLATFORM(GTK) && !PLATFORM(QT)
+diff --git a/Source/WTF/wtf/PlatformMac.cmake b/Source/WTF/wtf/PlatformMac.cmake
+--- a/Source/WTF/wtf/PlatformMac.cmake
++++ b/Source/WTF/wtf/PlatformMac.cmake
+@@ -2,11 +2,9 @@ set(WTF_LIBRARY_TYPE SHARED)
+
+ find_library(COCOA_LIBRARY Cocoa)
+ find_library(COREFOUNDATION_LIBRARY CoreFoundation)
+-find_library(READLINE_LIBRARY Readline)
+ list(APPEND WTF_LIBRARIES
+ ${COREFOUNDATION_LIBRARY}
+ ${COCOA_LIBRARY}
+- ${READLINE_LIBRARY}
+ libicucore.dylib
+ )
+
diff --git a/pkgs/development/libraries/qt-5/5.12/default.nix b/pkgs/development/libraries/qt-5/5.12/default.nix
index e6af24cd8f6..c7773baad0c 100644
--- a/pkgs/development/libraries/qt-5/5.12/default.nix
+++ b/pkgs/development/libraries/qt-5/5.12/default.nix
@@ -61,7 +61,11 @@ let
qtscript = [ ./qtscript.patch ];
qtserialport = [ ./qtserialport.patch ];
qtwebengine = [ ./qtwebengine-no-build-skip.patch ];
- qtwebkit = [ ./qtwebkit.patch ];
+ qtwebkit = [ ./qtwebkit.patch ]
+ ++ optionals stdenv.isDarwin [
+ ./qtwebkit-darwin-no-readline.patch
+ ./qtwebkit-darwin-no-qos-classes.patch
+ ];
};
mkDerivation =
diff --git a/pkgs/development/libraries/qt-5/5.12/qtwebkit-darwin-no-qos-classes.patch b/pkgs/development/libraries/qt-5/5.12/qtwebkit-darwin-no-qos-classes.patch
new file mode 100644
index 00000000000..a7087f51762
--- /dev/null
+++ b/pkgs/development/libraries/qt-5/5.12/qtwebkit-darwin-no-qos-classes.patch
@@ -0,0 +1,11 @@
+diff --git a/Source/cmake/OptionsQt.cmake b/Source/cmake/OptionsQt.cmake
+--- a/Source/cmake/OptionsQt.cmake
++++ b/Source/cmake/OptionsQt.cmake
+@@ -683,7 +683,6 @@ if (WIN32 AND COMPILER_IS_GCC_OR_CLANG)
+ endif ()
+
+ if (APPLE)
+- SET_AND_EXPOSE_TO_BUILD(HAVE_QOS_CLASSES 1)
+ endif ()
+
+ if (ENABLE_MATHML)
diff --git a/pkgs/development/libraries/qt-5/5.12/qtwebkit-darwin-no-readline.patch b/pkgs/development/libraries/qt-5/5.12/qtwebkit-darwin-no-readline.patch
new file mode 100644
index 00000000000..26d189d8601
--- /dev/null
+++ b/pkgs/development/libraries/qt-5/5.12/qtwebkit-darwin-no-readline.patch
@@ -0,0 +1,45 @@
+diff --git a/Source/JavaScriptCore/shell/CMakeLists.txt b/Source/JavaScriptCore/shell/CMakeLists.txt
+--- a/Source/JavaScriptCore/shell/CMakeLists.txt
++++ b/Source/JavaScriptCore/shell/CMakeLists.txt
+@@ -9,7 +9,6 @@ set(JSC_LIBRARIES
+ )
+
+ if (WTF_OS_MAC_OS_X)
+- list(APPEND JSC_LIBRARIES edit)
+ endif ()
+
+ if ("${JavaScriptCore_LIBRARY_TYPE}" MATCHES "STATIC")
+diff --git a/Source/WTF/wtf/Platform.h b/Source/WTF/wtf/Platform.h
+--- a/Source/WTF/wtf/Platform.h
++++ b/Source/WTF/wtf/Platform.h
+@@ -563,7 +563,6 @@
+ #if PLATFORM(IOS)
+
+ #define HAVE_NETWORK_EXTENSION 1
+-#define HAVE_READLINE 1
+ #if USE(APPLE_INTERNAL_SDK)
+ #define USE_CFNETWORK 1
+ #endif
+@@ -650,7 +649,6 @@
+ #define HAVE_MADV_DONTNEED 1
+ #define HAVE_MERGESORT 1
+ #define HAVE_PTHREAD_SETNAME_NP 1
+-#define HAVE_READLINE 1
+ #define HAVE_SYS_TIMEB_H 1
+
+ #if !PLATFORM(GTK) && !PLATFORM(QT)
+diff --git a/Source/WTF/wtf/PlatformMac.cmake b/Source/WTF/wtf/PlatformMac.cmake
+--- a/Source/WTF/wtf/PlatformMac.cmake
++++ b/Source/WTF/wtf/PlatformMac.cmake
+@@ -2,11 +2,9 @@ set(WTF_LIBRARY_TYPE SHARED)
+
+ find_library(COCOA_LIBRARY Cocoa)
+ find_library(COREFOUNDATION_LIBRARY CoreFoundation)
+-find_library(READLINE_LIBRARY Readline)
+ list(APPEND WTF_LIBRARIES
+ ${COREFOUNDATION_LIBRARY}
+ ${COCOA_LIBRARY}
+- ${READLINE_LIBRARY}
+ libicucore.dylib
+ )
+
diff --git a/pkgs/development/libraries/qt-5/5.9/qtwebkit.patch b/pkgs/development/libraries/qt-5/5.9/qtwebkit.patch
index c78cb58f564..718bda36194 100644
--- a/pkgs/development/libraries/qt-5/5.9/qtwebkit.patch
+++ b/pkgs/development/libraries/qt-5/5.9/qtwebkit.patch
@@ -1,16 +1,3 @@
-diff --git a/Source/WTF/WTF.pri b/Source/WTF/WTF.pri
-index 69e4cd1f3..3f729a75e 100644
---- a/Source/WTF/WTF.pri
-+++ b/Source/WTF/WTF.pri
-@@ -12,7 +12,7 @@ mac {
- # Mac OS does ship libicu but not the associated header files.
- # Therefore WebKit provides adequate header files.
- INCLUDEPATH = $${ROOT_WEBKIT_DIR}/Source/WTF/icu $$INCLUDEPATH
-- LIBS += -licucore
-+ LIBS += /usr/lib/libicucore.dylib
- } else:!use?(wchar_unicode): {
- win32 {
- CONFIG(static, static|shared) {
diff --git a/Source/WebCore/plugins/qt/PluginPackageQt.cpp b/Source/WebCore/plugins/qt/PluginPackageQt.cpp
index a923d49aa..46772a4bb 100644
--- a/Source/WebCore/plugins/qt/PluginPackageQt.cpp
diff --git a/pkgs/development/libraries/qt-5/modules/qtwebkit.nix b/pkgs/development/libraries/qt-5/modules/qtwebkit.nix
index 526fc2b8b2d..6b43f6ed25c 100644
--- a/pkgs/development/libraries/qt-5/modules/qtwebkit.nix
+++ b/pkgs/development/libraries/qt-5/modules/qtwebkit.nix
@@ -8,7 +8,7 @@
}:
let
- inherit (lib) optional optionals getLib;
+ inherit (lib) optional optionals getDev getLib;
hyphen = stdenv.mkDerivation rec {
name = "hyphen-2.8.8";
src = fetchurl {
@@ -20,28 +20,30 @@ let
'';
buildInputs = [ perl ];
};
+ usingAnnulenWebkitFork = lib.versionAtLeast qtbase.version "5.11.0";
in
qtModule {
name = "qtwebkit";
qtInputs = [ qtbase qtdeclarative qtlocation qtsensors ]
++ optional (stdenv.isDarwin && lib.versionAtLeast qtbase.version "5.9.0") qtmultimedia
- ++ optional (lib.versionAtLeast qtbase.version "5.11.0") qtwebchannel;
+ ++ optional usingAnnulenWebkitFork qtwebchannel;
buildInputs = [ fontconfig libwebp libxml2 libxslt sqlite glib gst_all_1.gstreamer gst_all_1.gst-plugins-base ]
- ++ optionals (stdenv.isDarwin) (with darwin; with apple_sdk.frameworks; [ cf-private OpenGL ])
- ++ optionals (lib.versionAtLeast qtbase.version "5.11.0") [ hyphen ];
+ ++ optionals (stdenv.isDarwin) (with darwin; with apple_sdk.frameworks; [ cf-private ICU OpenGL ])
+ ++ optional usingAnnulenWebkitFork hyphen;
nativeBuildInputs = [
bison2 flex gdb gperf perl pkgconfig python2 ruby
- ] ++ optionals (lib.versionAtLeast qtbase.version "5.11.0") [ cmake ];
+ ] ++ optional usingAnnulenWebkitFork cmake;
- cmakeFlags = optionals (lib.versionAtLeast qtbase.version "5.11.0") [ "-DPORT=Qt" ];
-
- __impureHostDeps = optionals (stdenv.isDarwin) [
- "/usr/lib/libicucore.dylib"
- ];
+ cmakeFlags = optionals usingAnnulenWebkitFork ([ "-DPORT=Qt" ]
+ ++ optionals stdenv.isDarwin [
+ "-DQt5Multimedia_DIR=${getDev qtmultimedia}/lib/cmake/Qt5Multimedia"
+ "-DQt5MultimediaWidgets_DIR=${getDev qtmultimedia}/lib/cmake/Qt5MultimediaWidgets"
+ "-DMACOS_FORCE_SYSTEM_XML_LIBRARIES=OFF"
+ ]);
# QtWebKit overrides qmake's default_pre and default_post features,
# so its custom qmake files must be found first at the front of QMAKEPATH.
- preConfigure = ''
+ preConfigure = stdenv.lib.optionalString (!usingAnnulenWebkitFork) ''
QMAKEPATH="$PWD/Tools/qmake''${QMAKEPATH:+:}$QMAKEPATH"
fixQtBuiltinPaths . '*.pr?'
# Fix hydra's "Log limit exceeded"
diff --git a/pkgs/development/libraries/qtwebkit-plugins/default.nix b/pkgs/development/libraries/qtwebkit-plugins/default.nix
index e1155c4a3bc..07209be0dce 100644
--- a/pkgs/development/libraries/qtwebkit-plugins/default.nix
+++ b/pkgs/development/libraries/qtwebkit-plugins/default.nix
@@ -15,7 +15,7 @@ stdenv.mkDerivation {
buildInputs = [ qtwebkit hunspell ];
postPatch = ''
- sed -i "s,-lhunspell,-lhunspell-1.6," src/spellcheck/spellcheck.pri
+ sed -i "s,-lhunspell,-lhunspell-${stdenv.lib.versions.majorMinor hunspell.version}," src/spellcheck/spellcheck.pri
sed -i "s,\$\$\[QT_INSTALL_PLUGINS\],$out/$qtPluginPrefix," src/src.pro
'';
diff --git a/pkgs/development/libraries/science/math/ipopt/default.nix b/pkgs/development/libraries/science/math/ipopt/default.nix
index 7e58a4c7c98..1ae46bad257 100644
--- a/pkgs/development/libraries/science/math/ipopt/default.nix
+++ b/pkgs/development/libraries/science/math/ipopt/default.nix
@@ -2,11 +2,11 @@
stdenv.mkDerivation rec {
name = "ipopt-${version}";
- version = "3.12.11";
+ version = "3.12.12";
src = fetchurl {
url = "https://www.coin-or.org/download/source/Ipopt/Ipopt-${version}.zip";
- sha256 = "1qihlwwqsqpbwpp6zqfa7nrmb55dndppzmdy98897aiknaa2650h";
+ sha256 = "1kh680ilw1c304hdh9i267gqhp0xg58jy8dk4svjvjc86sp1i23q";
};
CXXDEFS = [ "-DHAVE_RAND" "-DHAVE_CSTRING" "-DHAVE_CSTDIO" ];
diff --git a/pkgs/development/libraries/shapelib/default.nix b/pkgs/development/libraries/shapelib/default.nix
index 09d3efa64b2..9da54a37042 100644
--- a/pkgs/development/libraries/shapelib/default.nix
+++ b/pkgs/development/libraries/shapelib/default.nix
@@ -1,15 +1,13 @@
-{ stdenv, fetchurl, proj }:
+{ stdenv, fetchurl }:
stdenv.mkDerivation rec {
- name = "shapelib-1.4.1";
+ name = "shapelib-1.5.0";
src = fetchurl {
url = "https://download.osgeo.org/shapelib/${name}.tar.gz";
- sha256 = "1cr3b5jfglwisbyzj7fnxp9xysqad0fcmcqvqaja6qap6qblijd4";
+ sha256 = "1qfsgb8b3yiqwvr6h9m81g6k9fjhfys70c22p7kzkbick20a9h0z";
};
- buildInputs = [ proj ];
-
meta = with stdenv.lib; {
description = "C Library for reading, writing and updating ESRI Shapefiles";
homepage = http://shapelib.maptools.org/;
diff --git a/pkgs/development/libraries/skalibs/default.nix b/pkgs/development/libraries/skalibs/default.nix
index 0667e1265b3..e56d677e8a4 100644
--- a/pkgs/development/libraries/skalibs/default.nix
+++ b/pkgs/development/libraries/skalibs/default.nix
@@ -4,8 +4,8 @@ with skawarePackages;
buildPackage {
pname = "skalibs";
- version = "2.7.0.0";
- sha256 = "0mnprdf4w4ami0db22rwd111m037cdmn2p8xa4i8cbwxcrv4sjcn";
+ version = "2.8.0.0";
+ sha256 = "06hyiq68jh32qwr2mydw3dbnm4zzpynnnmprd5g4iqavsycyvh53";
description = "A set of general-purpose C programming libraries";
diff --git a/pkgs/development/libraries/tbb/default.nix b/pkgs/development/libraries/tbb/default.nix
index a7b7f5243fb..d8a74bdf591 100644
--- a/pkgs/development/libraries/tbb/default.nix
+++ b/pkgs/development/libraries/tbb/default.nix
@@ -41,6 +41,6 @@ with stdenv.lib; stdenv.mkDerivation rec {
details and threading mechanisms for scalability and performance.
'';
platforms = with platforms; linux ++ darwin;
- maintainers = with maintainers; [ peti thoughtpolice dizfer ];
+ maintainers = with maintainers; [ thoughtpolice dizfer ];
};
}
diff --git a/pkgs/development/libraries/ticpp/default.nix b/pkgs/development/libraries/ticpp/default.nix
new file mode 100644
index 00000000000..e46bf2418bc
--- /dev/null
+++ b/pkgs/development/libraries/ticpp/default.nix
@@ -0,0 +1,35 @@
+{ stdenv
+, fetchFromGitHub
+, cmake
+}:
+
+stdenv.mkDerivation {
+ pname = "ticpp";
+ version = "unstable-2019-01-09";
+
+ src = fetchFromGitHub {
+ owner = "wxFormBuilder";
+ repo = "ticpp";
+ rev = "eb79120ea16b847ce9f483a298a394050f463d6b";
+ sha256 = "sha256:0xk4cy0xbkr6326cqd1vd6b2x0rfsx4iz2sq8f5jz3yl3slxgjm2";
+ };
+
+ nativeBuildInputs = [ cmake ];
+
+ cmakeFlags = [ "-DBUILD_TICPP_DLL=1" ];
+
+ installPhase = ''
+ cd ..
+ mkdir -p $out/lib
+ install build/*.{a,so} $out/lib
+ mkdir -p $out/include
+ install *.h $out/include
+ '';
+
+ meta = {
+ description = "Interface to TinyXML";
+ license = stdenv.lib.licenses.mit;
+ homepage = https://github.com/wxFormBuilder/ticpp;
+ };
+
+}
diff --git a/pkgs/development/libraries/utmps/default.nix b/pkgs/development/libraries/utmps/default.nix
index 881e58ae61e..81562659c0d 100644
--- a/pkgs/development/libraries/utmps/default.nix
+++ b/pkgs/development/libraries/utmps/default.nix
@@ -4,8 +4,8 @@ with skawarePackages;
buildPackage {
pname = "utmps";
- version = "0.0.2.0";
- sha256 = "0fzq3qm88sm5ibl9k9k6ns6jd7iw72vh9k10bsfl5dxd2yi6iqyr";
+ version = "0.0.2.1";
+ sha256 = "1q90mcn50irhhrzl3h9bvhsn7hac0zgg67b6hfhmc5yvh4c8wnr4";
description = "A secure utmpx and wtmp implementation";
diff --git a/pkgs/development/libraries/xapian/default.nix b/pkgs/development/libraries/xapian/default.nix
index 76c345c6b7e..c10dfdaa961 100644
--- a/pkgs/development/libraries/xapian/default.nix
+++ b/pkgs/development/libraries/xapian/default.nix
@@ -38,5 +38,5 @@ let
in {
# xapian-ruby needs 1.2.22 as of 2017-05-06
xapian_1_2_22 = generic "1.2.22" "0zsji22n0s7cdnbgj0kpil05a6bgm5cfv0mvx12d8ydg7z58g6r6";
- xapian_1_4 = generic "1.4.10" "1f4vf1w1yvsn9mn462q6snc8wkmfpifp8wrlzs4aqi45w0kr6rk8";
+ xapian_1_4 = generic "1.4.11" "01xwqljnp5afjf9097lyfbqc6x5bcqszfdkn9l1j86imwbrv45lz";
}
diff --git a/pkgs/development/libraries/xdg-desktop-portal/default.nix b/pkgs/development/libraries/xdg-desktop-portal/default.nix
index 0fdcb684b2d..3f02946c770 100644
--- a/pkgs/development/libraries/xdg-desktop-portal/default.nix
+++ b/pkgs/development/libraries/xdg-desktop-portal/default.nix
@@ -1,4 +1,4 @@
-{ stdenv, fetchFromGitHub, substituteAll, autoreconfHook, pkgconfig, libxml2, glib, pipewire, fontconfig, flatpak, gsettings-desktop-schemas, acl, dbus, fuse, wrapGAppsHook }:
+{ stdenv, fetchFromGitHub, substituteAll, autoreconfHook, pkgconfig, libxml2, glib, pipewire, fontconfig, flatpak, gsettings-desktop-schemas, acl, dbus, fuse, geoclue2, wrapGAppsHook }:
stdenv.mkDerivation rec {
pname = "xdg-desktop-portal";
@@ -22,13 +22,12 @@ stdenv.mkDerivation rec {
];
nativeBuildInputs = [ autoreconfHook pkgconfig libxml2 wrapGAppsHook ];
- buildInputs = [ glib pipewire fontconfig flatpak acl dbus fuse gsettings-desktop-schemas ];
+ buildInputs = [ glib pipewire fontconfig flatpak acl dbus geoclue2 fuse gsettings-desktop-schemas ];
doCheck = true; # XXX: investigate!
configureFlags = [
"--enable-installed-tests"
- "--disable-geoclue" # Requires 2.5.2, not released yet
];
makeFlags = [
diff --git a/pkgs/development/lisp-modules/quicklisp-to-nix-output/lfarm-client.nix b/pkgs/development/lisp-modules/quicklisp-to-nix-output/lfarm-client.nix
new file mode 100644
index 00000000000..10977c16f83
--- /dev/null
+++ b/pkgs/development/lisp-modules/quicklisp-to-nix-output/lfarm-client.nix
@@ -0,0 +1,41 @@
+args @ { fetchurl, ... }:
+rec {
+ baseName = ''lfarm-client'';
+ version = ''lfarm-20150608-git'';
+
+ description = ''Client component of lfarm, a library for distributing work across machines.'';
+
+ deps = [ args."alexandria" args."bordeaux-threads" args."cl-store" args."flexi-streams" args."lfarm-common" args."lparallel" args."split-sequence" args."trivial-gray-streams" args."usocket" ];
+
+ src = fetchurl {
+ url = ''http://beta.quicklisp.org/archive/lfarm/2015-06-08/lfarm-20150608-git.tgz'';
+ sha256 = ''1rkjcfam4601yczs13pi2qgi5jql0c150dxja53hkcnqhkyqgl66'';
+ };
+
+ packageName = "lfarm-client";
+
+ asdFilesToKeep = ["lfarm-client.asd"];
+ overrides = x: x;
+}
+/* (SYSTEM lfarm-client DESCRIPTION
+ Client component of lfarm, a library for distributing work across machines.
+ SHA256 1rkjcfam4601yczs13pi2qgi5jql0c150dxja53hkcnqhkyqgl66 URL
+ http://beta.quicklisp.org/archive/lfarm/2015-06-08/lfarm-20150608-git.tgz
+ MD5 4cc91df44a932b3175a1eabf73d6e42d NAME lfarm-client FILENAME
+ lfarm-client DEPS
+ ((NAME alexandria FILENAME alexandria)
+ (NAME bordeaux-threads FILENAME bordeaux-threads)
+ (NAME cl-store FILENAME cl-store)
+ (NAME flexi-streams FILENAME flexi-streams)
+ (NAME lfarm-common FILENAME lfarm-common)
+ (NAME lparallel FILENAME lparallel)
+ (NAME split-sequence FILENAME split-sequence)
+ (NAME trivial-gray-streams FILENAME trivial-gray-streams)
+ (NAME usocket FILENAME usocket))
+ DEPENDENCIES
+ (alexandria bordeaux-threads cl-store flexi-streams lfarm-common lparallel
+ split-sequence trivial-gray-streams usocket)
+ VERSION lfarm-20150608-git SIBLINGS
+ (lfarm-admin lfarm-common lfarm-gss lfarm-launcher lfarm-server lfarm-ssl
+ lfarm-test)
+ PARASITES NIL) */
diff --git a/pkgs/development/lisp-modules/quicklisp-to-nix-output/lfarm-common.nix b/pkgs/development/lisp-modules/quicklisp-to-nix-output/lfarm-common.nix
new file mode 100644
index 00000000000..4a5fe87982a
--- /dev/null
+++ b/pkgs/development/lisp-modules/quicklisp-to-nix-output/lfarm-common.nix
@@ -0,0 +1,41 @@
+args @ { fetchurl, ... }:
+rec {
+ baseName = ''lfarm-common'';
+ version = ''lfarm-20150608-git'';
+
+ description = ''(private) Common components of lfarm, a library for distributing
+work across machines.'';
+
+ deps = [ args."alexandria" args."bordeaux-threads" args."cl-store" args."flexi-streams" args."split-sequence" args."trivial-gray-streams" args."usocket" ];
+
+ src = fetchurl {
+ url = ''http://beta.quicklisp.org/archive/lfarm/2015-06-08/lfarm-20150608-git.tgz'';
+ sha256 = ''1rkjcfam4601yczs13pi2qgi5jql0c150dxja53hkcnqhkyqgl66'';
+ };
+
+ packageName = "lfarm-common";
+
+ asdFilesToKeep = ["lfarm-common.asd"];
+ overrides = x: x;
+}
+/* (SYSTEM lfarm-common DESCRIPTION
+ (private) Common components of lfarm, a library for distributing
+work across machines.
+ SHA256 1rkjcfam4601yczs13pi2qgi5jql0c150dxja53hkcnqhkyqgl66 URL
+ http://beta.quicklisp.org/archive/lfarm/2015-06-08/lfarm-20150608-git.tgz
+ MD5 4cc91df44a932b3175a1eabf73d6e42d NAME lfarm-common FILENAME
+ lfarm-common DEPS
+ ((NAME alexandria FILENAME alexandria)
+ (NAME bordeaux-threads FILENAME bordeaux-threads)
+ (NAME cl-store FILENAME cl-store)
+ (NAME flexi-streams FILENAME flexi-streams)
+ (NAME split-sequence FILENAME split-sequence)
+ (NAME trivial-gray-streams FILENAME trivial-gray-streams)
+ (NAME usocket FILENAME usocket))
+ DEPENDENCIES
+ (alexandria bordeaux-threads cl-store flexi-streams split-sequence
+ trivial-gray-streams usocket)
+ VERSION lfarm-20150608-git SIBLINGS
+ (lfarm-admin lfarm-client lfarm-gss lfarm-launcher lfarm-server lfarm-ssl
+ lfarm-test)
+ PARASITES NIL) */
diff --git a/pkgs/development/lisp-modules/quicklisp-to-nix-output/lfarm-server.nix b/pkgs/development/lisp-modules/quicklisp-to-nix-output/lfarm-server.nix
new file mode 100644
index 00000000000..354d6c31507
--- /dev/null
+++ b/pkgs/development/lisp-modules/quicklisp-to-nix-output/lfarm-server.nix
@@ -0,0 +1,40 @@
+args @ { fetchurl, ... }:
+rec {
+ baseName = ''lfarm-server'';
+ version = ''lfarm-20150608-git'';
+
+ description = ''Server component of lfarm, a library for distributing work across machines.'';
+
+ deps = [ args."alexandria" args."bordeaux-threads" args."cl-store" args."flexi-streams" args."lfarm-common" args."split-sequence" args."trivial-gray-streams" args."usocket" ];
+
+ src = fetchurl {
+ url = ''http://beta.quicklisp.org/archive/lfarm/2015-06-08/lfarm-20150608-git.tgz'';
+ sha256 = ''1rkjcfam4601yczs13pi2qgi5jql0c150dxja53hkcnqhkyqgl66'';
+ };
+
+ packageName = "lfarm-server";
+
+ asdFilesToKeep = ["lfarm-server.asd"];
+ overrides = x: x;
+}
+/* (SYSTEM lfarm-server DESCRIPTION
+ Server component of lfarm, a library for distributing work across machines.
+ SHA256 1rkjcfam4601yczs13pi2qgi5jql0c150dxja53hkcnqhkyqgl66 URL
+ http://beta.quicklisp.org/archive/lfarm/2015-06-08/lfarm-20150608-git.tgz
+ MD5 4cc91df44a932b3175a1eabf73d6e42d NAME lfarm-server FILENAME
+ lfarm-server DEPS
+ ((NAME alexandria FILENAME alexandria)
+ (NAME bordeaux-threads FILENAME bordeaux-threads)
+ (NAME cl-store FILENAME cl-store)
+ (NAME flexi-streams FILENAME flexi-streams)
+ (NAME lfarm-common FILENAME lfarm-common)
+ (NAME split-sequence FILENAME split-sequence)
+ (NAME trivial-gray-streams FILENAME trivial-gray-streams)
+ (NAME usocket FILENAME usocket))
+ DEPENDENCIES
+ (alexandria bordeaux-threads cl-store flexi-streams lfarm-common
+ split-sequence trivial-gray-streams usocket)
+ VERSION lfarm-20150608-git SIBLINGS
+ (lfarm-admin lfarm-client lfarm-common lfarm-gss lfarm-launcher lfarm-ssl
+ lfarm-test)
+ PARASITES NIL) */
diff --git a/pkgs/development/lisp-modules/quicklisp-to-nix-output/lfarm-ssl.nix b/pkgs/development/lisp-modules/quicklisp-to-nix-output/lfarm-ssl.nix
new file mode 100644
index 00000000000..348c71fe966
--- /dev/null
+++ b/pkgs/development/lisp-modules/quicklisp-to-nix-output/lfarm-ssl.nix
@@ -0,0 +1,42 @@
+args @ { fetchurl, ... }:
+rec {
+ baseName = ''lfarm-ssl'';
+ version = ''lfarm-20150608-git'';
+
+ description = ''SSL support for lfarm'';
+
+ deps = [ args."alexandria" args."babel" args."bordeaux-threads" args."cffi" args."cl_plus_ssl" args."cl-store" args."flexi-streams" args."lfarm-common" args."split-sequence" args."trivial-features" args."trivial-garbage" args."trivial-gray-streams" args."usocket" ];
+
+ src = fetchurl {
+ url = ''http://beta.quicklisp.org/archive/lfarm/2015-06-08/lfarm-20150608-git.tgz'';
+ sha256 = ''1rkjcfam4601yczs13pi2qgi5jql0c150dxja53hkcnqhkyqgl66'';
+ };
+
+ packageName = "lfarm-ssl";
+
+ asdFilesToKeep = ["lfarm-ssl.asd"];
+ overrides = x: x;
+}
+/* (SYSTEM lfarm-ssl DESCRIPTION SSL support for lfarm SHA256
+ 1rkjcfam4601yczs13pi2qgi5jql0c150dxja53hkcnqhkyqgl66 URL
+ http://beta.quicklisp.org/archive/lfarm/2015-06-08/lfarm-20150608-git.tgz
+ MD5 4cc91df44a932b3175a1eabf73d6e42d NAME lfarm-ssl FILENAME lfarm-ssl DEPS
+ ((NAME alexandria FILENAME alexandria) (NAME babel FILENAME babel)
+ (NAME bordeaux-threads FILENAME bordeaux-threads)
+ (NAME cffi FILENAME cffi) (NAME cl+ssl FILENAME cl_plus_ssl)
+ (NAME cl-store FILENAME cl-store)
+ (NAME flexi-streams FILENAME flexi-streams)
+ (NAME lfarm-common FILENAME lfarm-common)
+ (NAME split-sequence FILENAME split-sequence)
+ (NAME trivial-features FILENAME trivial-features)
+ (NAME trivial-garbage FILENAME trivial-garbage)
+ (NAME trivial-gray-streams FILENAME trivial-gray-streams)
+ (NAME usocket FILENAME usocket))
+ DEPENDENCIES
+ (alexandria babel bordeaux-threads cffi cl+ssl cl-store flexi-streams
+ lfarm-common split-sequence trivial-features trivial-garbage
+ trivial-gray-streams usocket)
+ VERSION lfarm-20150608-git SIBLINGS
+ (lfarm-admin lfarm-client lfarm-common lfarm-gss lfarm-launcher
+ lfarm-server lfarm-test)
+ PARASITES NIL) */
diff --git a/pkgs/development/lisp-modules/quicklisp-to-nix-systems.txt b/pkgs/development/lisp-modules/quicklisp-to-nix-systems.txt
index 0987d83ea64..5c56ddfa2a2 100644
--- a/pkgs/development/lisp-modules/quicklisp-to-nix-systems.txt
+++ b/pkgs/development/lisp-modules/quicklisp-to-nix-systems.txt
@@ -95,6 +95,9 @@ let-plus
lev
lisp-namespace
local-time
+lfarm-client
+lfarm-server
+lfarm-ssl
lparallel
lquery
marshal
diff --git a/pkgs/development/lisp-modules/quicklisp-to-nix.nix b/pkgs/development/lisp-modules/quicklisp-to-nix.nix
index 4e8cb6ebe03..0de50a17ad6 100644
--- a/pkgs/development/lisp-modules/quicklisp-to-nix.nix
+++ b/pkgs/development/lisp-modules/quicklisp-to-nix.nix
@@ -20,6 +20,21 @@ let quicklisp-to-nix-packages = rec {
}));
+ "lfarm-common" = buildLispPackage
+ ((f: x: (x // (f x)))
+ (qlOverrides."lfarm-common" or (x: {}))
+ (import ./quicklisp-to-nix-output/lfarm-common.nix {
+ inherit fetchurl;
+ "alexandria" = quicklisp-to-nix-packages."alexandria";
+ "bordeaux-threads" = quicklisp-to-nix-packages."bordeaux-threads";
+ "cl-store" = quicklisp-to-nix-packages."cl-store";
+ "flexi-streams" = quicklisp-to-nix-packages."flexi-streams";
+ "split-sequence" = quicklisp-to-nix-packages."split-sequence";
+ "trivial-gray-streams" = quicklisp-to-nix-packages."trivial-gray-streams";
+ "usocket" = quicklisp-to-nix-packages."usocket";
+ }));
+
+
"stefil" = buildLispPackage
((f: x: (x // (f x)))
(qlOverrides."stefil" or (x: {}))
@@ -1234,6 +1249,60 @@ let quicklisp-to-nix-packages = rec {
}));
+ "lfarm-ssl" = buildLispPackage
+ ((f: x: (x // (f x)))
+ (qlOverrides."lfarm-ssl" or (x: {}))
+ (import ./quicklisp-to-nix-output/lfarm-ssl.nix {
+ inherit fetchurl;
+ "alexandria" = quicklisp-to-nix-packages."alexandria";
+ "babel" = quicklisp-to-nix-packages."babel";
+ "bordeaux-threads" = quicklisp-to-nix-packages."bordeaux-threads";
+ "cffi" = quicklisp-to-nix-packages."cffi";
+ "cl_plus_ssl" = quicklisp-to-nix-packages."cl_plus_ssl";
+ "cl-store" = quicklisp-to-nix-packages."cl-store";
+ "flexi-streams" = quicklisp-to-nix-packages."flexi-streams";
+ "lfarm-common" = quicklisp-to-nix-packages."lfarm-common";
+ "split-sequence" = quicklisp-to-nix-packages."split-sequence";
+ "trivial-features" = quicklisp-to-nix-packages."trivial-features";
+ "trivial-garbage" = quicklisp-to-nix-packages."trivial-garbage";
+ "trivial-gray-streams" = quicklisp-to-nix-packages."trivial-gray-streams";
+ "usocket" = quicklisp-to-nix-packages."usocket";
+ }));
+
+
+ "lfarm-server" = buildLispPackage
+ ((f: x: (x // (f x)))
+ (qlOverrides."lfarm-server" or (x: {}))
+ (import ./quicklisp-to-nix-output/lfarm-server.nix {
+ inherit fetchurl;
+ "alexandria" = quicklisp-to-nix-packages."alexandria";
+ "bordeaux-threads" = quicklisp-to-nix-packages."bordeaux-threads";
+ "cl-store" = quicklisp-to-nix-packages."cl-store";
+ "flexi-streams" = quicklisp-to-nix-packages."flexi-streams";
+ "lfarm-common" = quicklisp-to-nix-packages."lfarm-common";
+ "split-sequence" = quicklisp-to-nix-packages."split-sequence";
+ "trivial-gray-streams" = quicklisp-to-nix-packages."trivial-gray-streams";
+ "usocket" = quicklisp-to-nix-packages."usocket";
+ }));
+
+
+ "lfarm-client" = buildLispPackage
+ ((f: x: (x // (f x)))
+ (qlOverrides."lfarm-client" or (x: {}))
+ (import ./quicklisp-to-nix-output/lfarm-client.nix {
+ inherit fetchurl;
+ "alexandria" = quicklisp-to-nix-packages."alexandria";
+ "bordeaux-threads" = quicklisp-to-nix-packages."bordeaux-threads";
+ "cl-store" = quicklisp-to-nix-packages."cl-store";
+ "flexi-streams" = quicklisp-to-nix-packages."flexi-streams";
+ "lfarm-common" = quicklisp-to-nix-packages."lfarm-common";
+ "lparallel" = quicklisp-to-nix-packages."lparallel";
+ "split-sequence" = quicklisp-to-nix-packages."split-sequence";
+ "trivial-gray-streams" = quicklisp-to-nix-packages."trivial-gray-streams";
+ "usocket" = quicklisp-to-nix-packages."usocket";
+ }));
+
+
"local-time" = buildLispPackage
((f: x: (x // (f x)))
(qlOverrides."local-time" or (x: {}))
diff --git a/pkgs/development/lua-modules/generated-packages.nix b/pkgs/development/lua-modules/generated-packages.nix
index 8a9618e1f1e..b36eb02e655 100644
--- a/pkgs/development/lua-modules/generated-packages.nix
+++ b/pkgs/development/lua-modules/generated-packages.nix
@@ -70,26 +70,6 @@ basexx = buildLuarocksPackage {
};
};
};
-cqueues = buildLuarocksPackage {
- pname = "cqueues";
- version = "20171014.52-0";
-
- src = fetchurl {
- url = https://luarocks.org/cqueues-20171014.52-0.src.rock;
- sha256 = "0q3iy1ja20nq2sn2n6badzhjq5kni86pfc09n5g2c46q9ja3vfzx";
- };
- disabled = ( lua.luaversion != "5.2");
- propagatedBuildInputs = [lua ];
- buildType="make";
-
- meta = {
- homepage = "http://25thandclement.com/~william/projects/cqueues.html";
- description="Continuation Queues: Embeddable asynchronous networking, threading, and notification framework for Lua on Unix.";
- license = {
- fullName = "MIT/X11";
- };
- };
-};
dkjson = buildLuarocksPackage {
pname = "dkjson";
version = "2.5-2";
diff --git a/pkgs/development/lua-modules/overrides.nix b/pkgs/development/lua-modules/overrides.nix
index b78f7f9c007..a0ea365c7a5 100644
--- a/pkgs/development/lua-modules/overrides.nix
+++ b/pkgs/development/lua-modules/overrides.nix
@@ -5,19 +5,6 @@ with super;
##########################################3
#### manual fixes for generated packages
##########################################3
- cqueues = super.cqueues.override({
- nativeBuildInputs = [ pkgs.gnum4 ];
- buildInputs = [ pkgs.openssl ];
- extraConfig = with pkgs; ''
- variables={
- CRYPTO_INCDIR="${openssl.dev}/include";
- CRYPTO_LIBDIR="${openssl.out}/lib";
- OPENSSL_INCDIR="${openssl.dev}/include";
- OPENSSL_LIBDIR="${openssl.out}/lib";
- }
- '';
- });
-
lgi = super.lgi.overrideAttrs(oa: {
nativeBuildInputs = [ pkgs.pkgconfig ];
buildInputs = with pkgs; oa.buildInputs ++ [ glib gobjectIntrospection];
@@ -68,4 +55,17 @@ with super;
install -D completions/zsh/_busted $out/share/zsh/site-functions/_busted
'';
});
+
+ luuid = super.luuid.override({
+ buildInputs = [ pkgs.libuuid ];
+ extraConfig = ''
+ variables = {
+ LIBUUID_INCDIR="${pkgs.lib.getDev pkgs.libuuid}/include";
+ LIBUUID_LIBDIR="${pkgs.lib.getLib pkgs.libuuid}/lib";
+ }
+ '';
+ meta = {
+ platforms = pkgs.lib.platforms.linux;
+ };
+ });
}
diff --git a/pkgs/development/ocaml-modules/lablgtk3/default.nix b/pkgs/development/ocaml-modules/lablgtk3/default.nix
index 8da00b76393..26131d0a98c 100644
--- a/pkgs/development/ocaml-modules/lablgtk3/default.nix
+++ b/pkgs/development/ocaml-modules/lablgtk3/default.nix
@@ -10,7 +10,7 @@ let __dune = dune; in
let dune = __dune.override { ocamlPackages = { inherit ocaml findlib; }; }; in
stdenv.mkDerivation rec {
- version = "3.0.beta4";
+ version = "3.0.beta5";
pname = "lablgtk3";
name = "ocaml${ocaml.version}-${pname}-${version}";
@@ -18,7 +18,7 @@ stdenv.mkDerivation rec {
owner = "garrigue";
repo = "lablgtk";
rev = version;
- sha256 = "1lppb7k4xb1a35i7klm9mz98hw8l2f8s7rivgzysi1sviqy1ds5d";
+ sha256 = "05n3pjy4496gbgxwbypfm2462njv6dgmvkcv26az53ianpwa4vzz";
};
nativeBuildInputs = [ pkgconfig ];
diff --git a/pkgs/development/ocaml-modules/stdlib-shims/default.nix b/pkgs/development/ocaml-modules/stdlib-shims/default.nix
new file mode 100644
index 00000000000..d76ec29e63a
--- /dev/null
+++ b/pkgs/development/ocaml-modules/stdlib-shims/default.nix
@@ -0,0 +1,18 @@
+{ buildDunePackage, lib, fetchurl, ocaml }:
+
+buildDunePackage rec {
+ pname = "stdlib-shims";
+ version = "0.1.0";
+ src = fetchurl {
+ url = "https://github.com/ocaml/${pname}/releases/download/${version}/${pname}-${version}.tbz";
+ sha256 = "1jv6yb47f66239m7hsz7zzw3i48mjpbvfgpszws48apqx63wjwsk";
+ };
+ minimumOCamlVersion = "4.02";
+ doCheck = true;
+ meta = {
+ description = "Shims for forward-compatibility between versions of the OCaml standard library";
+ homepage = "https://github.com/ocaml/stdlib-shims";
+ inherit (ocaml.meta) license;
+ maintainers = [ lib.maintainers.vbgl ];
+ };
+}
diff --git a/pkgs/development/python-modules/awkward/default.nix b/pkgs/development/python-modules/awkward/default.nix
index 28e1d60113f..cf619e6021e 100644
--- a/pkgs/development/python-modules/awkward/default.nix
+++ b/pkgs/development/python-modules/awkward/default.nix
@@ -16,12 +16,16 @@ buildPythonPackage rec {
sha256 = "7016dc02d15b8797b59a461ccc8d218f37c335b97fa6b376638c0edd4ffc9de2";
};
- buildInputs = [ pytestrunner h5py ];
- checkInputs = [ pytest ];
+ nativeBuildInputs = [ pytestrunner ];
+ checkInputs = [ pytest h5py ];
propagatedBuildInputs = [ numpy ];
+ checkPhase = ''
+ py.test
+ '';
+
meta = with lib; {
- description = "Manipulate jagged, chunky, and/or bitmasked arrays as easily as Numpy.";
+ description = "Manipulate jagged, chunky, and/or bitmasked arrays as easily as Numpy";
homepage = https://github.com/scikit-hep/awkward-array;
license = licenses.bsd3;
maintainers = [ maintainers.costrouc ];
diff --git a/pkgs/development/python-modules/bpython/default.nix b/pkgs/development/python-modules/bpython/default.nix
index ad80e5647a4..c1d9a1a8f82 100644
--- a/pkgs/development/python-modules/bpython/default.nix
+++ b/pkgs/development/python-modules/bpython/default.nix
@@ -11,6 +11,11 @@ buildPythonPackage rec {
propagatedBuildInputs = [ curtsies greenlet pygments requests urwid ];
+ postInstall = ''
+ substituteInPlace "$out/share/applications/bpython.desktop" \
+ --replace "Exec=/usr/bin/bpython" "Exec=$out/bin/bpython"
+ '';
+
checkInputs = [ mock ];
# tests fail: https://github.com/bpython/bpython/issues/712
diff --git a/pkgs/development/python-modules/django/1_11.nix b/pkgs/development/python-modules/django/1_11.nix
index 6e2bbd9fd5d..90fd82f28f4 100644
--- a/pkgs/development/python-modules/django/1_11.nix
+++ b/pkgs/development/python-modules/django/1_11.nix
@@ -6,11 +6,11 @@
buildPythonPackage rec {
pname = "Django";
- version = "1.11.18";
+ version = "1.11.20";
src = fetchurl {
url = "https://www.djangoproject.com/m/releases/1.11/${pname}-${version}.tar.gz";
- sha256 = "19b6f020als9hr4q1im5282yn2b1hzf586n9kjrlkrslq7da3k3k";
+ sha256 = "0h90kdq8r4y8wa73hdxmyy5psnwlg61dcq3qsa098cpfiyh9vaa3";
};
patches = stdenv.lib.optionals withGdal [
diff --git a/pkgs/development/python-modules/flickrapi/default.nix b/pkgs/development/python-modules/flickrapi/default.nix
new file mode 100644
index 00000000000..88dfff3aa8f
--- /dev/null
+++ b/pkgs/development/python-modules/flickrapi/default.nix
@@ -0,0 +1,35 @@
+{ lib
+, buildPythonPackage
+, fetchPypi
+, requests
+, requests_toolbelt
+, requests_oauthlib
+, pytest
+, pytestrunner
+, pytestcov
+, responses
+}:
+
+buildPythonPackage rec {
+ pname = "flickrapi";
+ version = "2.4.0";
+
+ src = fetchPypi {
+ inherit pname version;
+ sha256 = "03g2z21k6nhxgwysjrgnxj9m1yg25mnnkr10gpyfhfkd9w77pcpz";
+ };
+
+ propagatedBuildInputs = [ requests requests_toolbelt requests_oauthlib ];
+
+ checkInputs = [ pytest pytestrunner pytestcov responses ];
+ doCheck = false; # Otherwise:
+ # ========================= no tests ran in 0.01 seconds =========================
+ # builder for '/nix/store/c8a58v6aa18zci08q2l53s12ywn8jqhq-python3.6-flickrapi-2.4.0.drv' failed with exit code 5
+
+ meta = {
+ description = "A Python interface to the Flickr API";
+ homepage = https://stuvel.eu/flickrapi;
+ license = lib.licenses.psfl;
+ maintainers = with lib.maintainers; [ obadz ];
+ };
+}
diff --git a/pkgs/development/python-modules/libarcus/default.nix b/pkgs/development/python-modules/libarcus/default.nix
index 8d0bf2b7b17..004fedf79b4 100644
--- a/pkgs/development/python-modules/libarcus/default.nix
+++ b/pkgs/development/python-modules/libarcus/default.nix
@@ -15,8 +15,9 @@ buildPythonPackage rec {
disabled = pythonOlder "3.4.0";
- propagatedBuildInputs = [ sip protobuf ];
+ propagatedBuildInputs = [ sip ];
nativeBuildInputs = [ cmake ];
+ buildInputs = [ protobuf ];
postPatch = ''
# To workaround buggy SIP detection which overrides PYTHONPATH
diff --git a/pkgs/development/python-modules/lzstring/default.nix b/pkgs/development/python-modules/lzstring/default.nix
new file mode 100644
index 00000000000..cfd30082c1c
--- /dev/null
+++ b/pkgs/development/python-modules/lzstring/default.nix
@@ -0,0 +1,24 @@
+{ lib
+, buildPythonPackage
+, fetchPypi
+, future
+}:
+
+buildPythonPackage rec {
+ pname = "lzstring";
+ version = "1.0.4";
+
+ src = fetchPypi {
+ inherit pname version;
+ sha256 = "18ly9pppy2yspxzw7k1b23wk77k7m44rz2g0271bqgqrk3jn3yhs";
+ };
+
+ propagatedBuildInputs = [ future ];
+
+ meta = {
+ description = "lz-string for python";
+ homepage = https://github.com/gkovacs/lz-string-python;
+ license = lib.licenses.mit;
+ maintainers = with lib.maintainers; [ obadz ];
+ };
+}
diff --git a/pkgs/development/python-modules/m2crypto/default.nix b/pkgs/development/python-modules/m2crypto/default.nix
index 4cab8f47250..c0e91542d38 100644
--- a/pkgs/development/python-modules/m2crypto/default.nix
+++ b/pkgs/development/python-modules/m2crypto/default.nix
@@ -25,6 +25,7 @@ buildPythonPackage rec {
];
patchFlags = "-p0";
+ nativeBuildInputs = [ swig2 ];
buildInputs = [ swig2 openssl ];
propagatedBuildInputs = [ typing ];
diff --git a/pkgs/development/python-modules/marisa/default.nix b/pkgs/development/python-modules/marisa/default.nix
index 1117ba958fa..006e3a9051b 100644
--- a/pkgs/development/python-modules/marisa/default.nix
+++ b/pkgs/development/python-modules/marisa/default.nix
@@ -1,18 +1,22 @@
-{ stdenv, buildPythonPackage, fetchFromGitHub, marisa, swig }:
+{ stdenv, buildPythonPackage, fetchFromGitHub, marisa, swig
+, isPy3k
+}:
buildPythonPackage rec {
pname = "marisa";
version = "1.3.40";
+ disabled = isPy3k;
+
src = fetchFromGitHub {
owner = "s-yata";
repo = "marisa-trie";
- rev = "59e410597981475bae94d9d9eb252c1d9790dc2f";
- sha256 = "0z4bf55np08q3cbi6gvj3cpw3zp8kf2d0jq6k74pjk066m7rapbb";
+ rev = "8dba9850b89d7828ebf33b8ab84df2b54d31260b";
+ sha256 = "0pkp9fggk53lxlicfwrskgx33qplc4v6njbavlnz4x4z63zd4933";
};
nativeBuildInputs = [ swig marisa ];
- buildinputs = [ marisa ];
+ buildInputs = [ marisa ];
sourceRoot = "${src.name}/bindings/python";
diff --git a/pkgs/development/python-modules/matplotlib/default.nix b/pkgs/development/python-modules/matplotlib/default.nix
index d4c8e970c50..e795181e2ff 100644
--- a/pkgs/development/python-modules/matplotlib/default.nix
+++ b/pkgs/development/python-modules/matplotlib/default.nix
@@ -21,14 +21,14 @@ assert enableTk -> (tcl != null)
assert enableQt -> pyqt4 != null;
buildPythonPackage rec {
- version = "3.0.2";
+ version = "3.0.3";
pname = "matplotlib";
disabled = !isPy3k;
src = fetchPypi {
inherit pname version;
- sha256 = "c94b792af431f6adb6859eb218137acd9a35f4f7442cea57e4a59c54751c36af";
+ sha256 = "1dzpgpj34i6lv9wgacqdshai2d237m3vymqrgl52sj1gwf4kblz1";
};
NIX_CFLAGS_COMPILE = stdenv.lib.optionalString stdenv.isDarwin "-I${libcxx}/include/c++/v1";
diff --git a/pkgs/development/python-modules/moinmoin/default.nix b/pkgs/development/python-modules/moinmoin/default.nix
index db0a5bcca2b..8090ac199da 100644
--- a/pkgs/development/python-modules/moinmoin/default.nix
+++ b/pkgs/development/python-modules/moinmoin/default.nix
@@ -4,25 +4,25 @@
buildPythonPackage rec {
pname = "moinmoin";
- version = "1.9.9";
+ version = "1.9.10";
# SyntaxError in setup.py
disabled = isPy3k;
src = fetchurl {
url = "http://static.moinmo.in/files/moin-${version}.tar.gz";
- sha256 = "197ga41qghykmir80ik17f9hjpmixslv3zjgj7bj9qvs1dvdg5s3";
+ sha256 = "0g05lnl1s8v61phi3z1g3b6lfj4g98grj9kw8nyjl246x0c489ja";
};
patches = [
# Recommended to install on their download page.
- (fetchpatch {
- url = "https://bitbucket.org/thomaswaldmann/moin-1.9/commits/561b7a9c2bd91b61d26cd8a5f39aa36bf5c6159e/raw";
- sha256 = "1nscnl9nspnrwyf3n95ig0ihzndryinq9kkghliph6h55cncfc65";
- })
./fix_tests.patch
];
+ prePatch = ''
+ sed -i "s/\xfc/ü/" setup.cfg
+ '';
+
checkInputs = [ pytest werkzeug pygments ];
meta = with lib; {
diff --git a/pkgs/development/python-modules/mxnet/default.nix b/pkgs/development/python-modules/mxnet/default.nix
index 317f79ebe08..2c8ea30345f 100644
--- a/pkgs/development/python-modules/mxnet/default.nix
+++ b/pkgs/development/python-modules/mxnet/default.nix
@@ -20,9 +20,9 @@ buildPythonPackage rec {
postPatch = ''
substituteInPlace python/setup.py \
- --replace "graphviz<0.9.0" "graphviz<0.10.0" \
- --replace "numpy<=1.15.0" "numpy<1.16.0" \
- --replace "requests<2.19.0" "requests<2.20.0"
+ --replace "graphviz<0.9.0," "graphviz" \
+ --replace "numpy<=1.15.0," "numpy" \
+ --replace "requests<2.19.0," "requests"
'';
preConfigure = ''
diff --git a/pkgs/development/python-modules/pex/default.nix b/pkgs/development/python-modules/pex/default.nix
index 8bac0c1c537..f0ac35feefd 100644
--- a/pkgs/development/python-modules/pex/default.nix
+++ b/pkgs/development/python-modules/pex/default.nix
@@ -24,6 +24,7 @@ buildPythonPackage rec {
homepage = "https://github.com/pantsbuild/pex";
license = licenses.asl20;
maintainers = with maintainers; [ copumpkin ];
+ broken = true;
};
}
diff --git a/pkgs/development/python-modules/pg8000/1_12.nix b/pkgs/development/python-modules/pg8000/1_12.nix
new file mode 100644
index 00000000000..26b9cf4f6a9
--- /dev/null
+++ b/pkgs/development/python-modules/pg8000/1_12.nix
@@ -0,0 +1,27 @@
+{ stdenv
+, buildPythonPackage
+, fetchPypi
+, pytz
+, six
+}:
+
+buildPythonPackage rec {
+ pname = "pg8000";
+ version = "1.12.5";
+
+ src = fetchPypi {
+ inherit pname version;
+ sha256 = "1yc3knh28cx3rjb2ifg5kmqqa78yyyw2gzzslbm9fj0mzh5aq1sx";
+ };
+
+ propagatedBuildInputs = [ pytz six ];
+
+ meta = with stdenv.lib; {
+ homepage = https://github.com/tlocke/pg8000;
+ description = "PostgreSQL interface library, for asyncio";
+ maintainers = with maintainers; [ garbas domenkozar ];
+ platforms = platforms.unix;
+ };
+
+}
+
diff --git a/pkgs/development/python-modules/pg8000/default.nix b/pkgs/development/python-modules/pg8000/default.nix
index 5cf8341ffa3..d8e04f56146 100644
--- a/pkgs/development/python-modules/pg8000/default.nix
+++ b/pkgs/development/python-modules/pg8000/default.nix
@@ -17,7 +17,7 @@ buildPythonPackage rec {
propagatedBuildInputs = [ pytz six ];
meta = with stdenv.lib; {
- homepage = https://github.com/mfenniak/pg8000;
+ homepage = https://github.com/tlocke/pg8000;
description = "PostgreSQL interface library, for asyncio";
maintainers = with maintainers; [ garbas domenkozar ];
platforms = platforms.unix;
diff --git a/pkgs/development/python-modules/ppft/default.nix b/pkgs/development/python-modules/ppft/default.nix
index 0cac4cb1b1e..770b3a5a73e 100644
--- a/pkgs/development/python-modules/ppft/default.nix
+++ b/pkgs/development/python-modules/ppft/default.nix
@@ -13,6 +13,10 @@ buildPythonPackage rec {
sha256 = "5537b00afb7b247da0f59cc57ee5680178be61c8b2e21b5a0672b70a3d247791";
};
+ checkPhase = ''
+ python -m ppft.tests
+ '';
+
propagatedBuildInputs = [ six ];
meta = with stdenv.lib; {
diff --git a/pkgs/development/python-modules/pyext/default.nix b/pkgs/development/python-modules/pyext/default.nix
index 55aaa59d6b2..31a188ed172 100644
--- a/pkgs/development/python-modules/pyext/default.nix
+++ b/pkgs/development/python-modules/pyext/default.nix
@@ -1,17 +1,22 @@
-{ stdenv, buildPythonPackage, fetchPypi }:
+{ stdenv, buildPythonPackage, fetchFromGitHub }:
buildPythonPackage rec {
- name = pname + "-" + version;
pname = "pyext";
- version = "0.6";
+ version = "0.8";
- src = fetchPypi {
- inherit pname version;
- sha256 = "6c406cf71b991e1fc5a7f963d3a289525bce5e7ad1c43b697d9f5223185fcaef";
+ # Latest release not on Pypi or tagged since 2015
+ src = fetchFromGitHub {
+ owner = "kirbyfan64";
+ repo = "PyExt";
+ rev = "1e018b12752ceb279f11aee123ed773d63dcec7e";
+ sha256 = "16km897ng6lgjs39hv83xragdxh0mhyw6ds0qkm21cyci1k5m1vm";
};
+ # Has no test suite
+ doCheck = false;
+
meta = with stdenv.lib; {
- description = "Simple Python extensions.";
+ description = "Simple Python extensions";
homepage = https://github.com/kirbyfan64/PyExt;
license = licenses.mit;
maintainers = with maintainers; [ edwtjo ];
diff --git a/pkgs/development/python-modules/pygame_sdl2/default.nix b/pkgs/development/python-modules/pygame_sdl2/default.nix
index 916bf7f692d..18eced7e806 100644
--- a/pkgs/development/python-modules/pygame_sdl2/default.nix
+++ b/pkgs/development/python-modules/pygame_sdl2/default.nix
@@ -4,12 +4,12 @@
buildPythonPackage rec {
pname = "pygame_sdl2";
version = "2.1.0";
- renpy_version = "6.99.14";
+ renpy_version = "7.2.0";
name = "${pname}-${version}-${renpy_version}";
src = fetchurl {
url = "https://www.renpy.org/dl/${renpy_version}/pygame_sdl2-${version}-for-renpy-${renpy_version}.tar.gz";
- sha256 = "1zsnb2bivbwysgxmfg9iv12arhpf3gqkmqinhciz955hlqv016b9";
+ sha256 = "1amgsb6mm8ssf7vdcs5dr8rlxrgyhh29m4i573z1cw61ynd7vgcw";
};
# force rebuild of headers needed for install
@@ -17,17 +17,13 @@ buildPythonPackage rec {
rm -rf gen gen3
'';
- patches = [
- # fix for recent sdl2
- (fetchpatch {
- url = "https://github.com/apoleon/pygame_sdl2/commit/ced6051f4a4559a725804cc58c079e1efea0a573.patch";
- sha256 = "08rqjzvdlmmdf8kyd8ws5lzjy1mrwnds4fdy38inkyw7saydcxyr";
- })
+ nativeBuildInputs = [
+ SDL2.dev cython
];
buildInputs = [
SDL2 SDL2_image SDL2_ttf SDL2_mixer
- cython libjpeg libpng
+ libjpeg libpng
];
diff --git a/pkgs/development/python-modules/pykerberos/default.nix b/pkgs/development/python-modules/pykerberos/default.nix
index 994ba059f9e..07db7e7002b 100644
--- a/pkgs/development/python-modules/pykerberos/default.nix
+++ b/pkgs/development/python-modules/pykerberos/default.nix
@@ -9,7 +9,9 @@ buildPythonPackage rec {
sha256 = "0v47p840myqgc7hr4lir72xshcfpa0w8j9n077h3njpqyn6wlbag";
};
- nativeBuildInputs = [ krb5 ];
+ nativeBuildInputs = [ krb5 ]; # for krb5-config
+
+ buildInputs = [ krb5 ];
# there are no tests
doCheck = false;
diff --git a/pkgs/development/python-modules/pymediainfo/default.nix b/pkgs/development/python-modules/pymediainfo/default.nix
index a7908171d69..61acce347ef 100644
--- a/pkgs/development/python-modules/pymediainfo/default.nix
+++ b/pkgs/development/python-modules/pymediainfo/default.nix
@@ -14,19 +14,12 @@ buildPythonPackage rec {
postPatch = ''
substituteInPlace pymediainfo/__init__.py \
- --replace 'CDLL(library_file)' \
- 'CDLL("${libmediainfo}/lib/libmediainfo${stdenv.hostPlatform.extensions.sharedLibrary}")' \
- --replace 'CDLL("libmediainfo.0.dylib")' \
- 'CDLL("${libmediainfo}/lib/libmediainfo.0${stdenv.hostPlatform.extensions.sharedLibrary}")' \
- --replace 'CDLL("libmediainfo.dylib")' \
- 'CDLL("${libmediainfo}/lib/libmediainfo${stdenv.hostPlatform.extensions.sharedLibrary}")' \
- --replace 'CDLL("libmediainfo.so.0")' \
- 'CDLL("${libmediainfo}/lib/libmediainfo${stdenv.hostPlatform.extensions.sharedLibrary}.0")'
-
- # Fix test, remove after version 2.3.0
- substituteInPlace tests/test_pymediainfo.py \
- --replace 'codec, "AVC"' 'format, "AVC"' \
- --replace 'codec, "AAC LC"' 'format, "AAC"'
+ --replace "libmediainfo.0.dylib" \
+ "${libmediainfo}/lib/libmediainfo.0${stdenv.hostPlatform.extensions.sharedLibrary}" \
+ --replace "libmediainfo.dylib" \
+ "${libmediainfo}/lib/libmediainfo${stdenv.hostPlatform.extensions.sharedLibrary}" \
+ --replace "libmediainfo.so.0" \
+ "${libmediainfo}/lib/libmediainfo${stdenv.hostPlatform.extensions.sharedLibrary}.0"
'';
nativeBuildInputs = [ setuptools_scm ];
diff --git a/pkgs/development/python-modules/pyside/default.nix b/pkgs/development/python-modules/pyside/default.nix
index 1d61854cb67..37ffd8e76e3 100644
--- a/pkgs/development/python-modules/pyside/default.nix
+++ b/pkgs/development/python-modules/pyside/default.nix
@@ -1,4 +1,4 @@
-{ lib, fetchurl, cmake, buildPythonPackage, pysideGeneratorrunner, pysideShiboken, qt4 }:
+{ lib, fetchurl, cmake, buildPythonPackage, pysideGeneratorrunner, pysideShiboken, qt4, mesa }:
# This derivation provides a Python module and should therefore be called via `python-packages.nix`.
buildPythonPackage rec {
@@ -15,12 +15,13 @@ buildPythonPackage rec {
nativeBuildInputs = [ cmake pysideGeneratorrunner pysideShiboken qt4 ];
+ buildInputs = [ mesa ];
+
makeFlags = "QT_PLUGIN_PATH=" + pysideShiboken + "/lib/generatorrunner";
meta = {
description = "LGPL-licensed Python bindings for the Qt cross-platform application and UI framework";
license = lib.licenses.lgpl21;
homepage = http://www.pyside.org;
- broken = true;
};
}
diff --git a/pkgs/development/python-modules/pytorch/default.nix b/pkgs/development/python-modules/pytorch/default.nix
index 8b9ba07ce95..7c45659220c 100644
--- a/pkgs/development/python-modules/pytorch/default.nix
+++ b/pkgs/development/python-modules/pytorch/default.nix
@@ -77,11 +77,14 @@ in buildPythonPackage rec {
# https://github.com/intel/mkl-dnn/commit/8134d346cdb7fe1695a2aa55771071d455fae0bc
NIX_CFLAGS_COMPILE = lib.optionals (numpy.blasImplementation == "mkl") [ "-Wno-error=array-bounds" ];
- buildInputs = [
+ nativeBuildInputs = [
cmake
- numpy.blas
utillinux
which
+ ];
+
+ buildInputs = [
+ numpy.blas
] ++ lib.optionals cudaSupport [ cudatoolkit_joined cudnn ]
++ lib.optionals stdenv.isLinux [ numactl ];
diff --git a/pkgs/development/python-modules/qscintilla/default.nix b/pkgs/development/python-modules/qscintilla/default.nix
index c4ea8ff2e73..91c2009744f 100644
--- a/pkgs/development/python-modules/qscintilla/default.nix
+++ b/pkgs/development/python-modules/qscintilla/default.nix
@@ -17,7 +17,9 @@ disabledIf (isPy3k || isPyPy)
src = pkgs.qscintilla.src;
- buildInputs = [ pkgs.xorg.lndir pyqt4.qt pyqt4 ];
+ nativeBuildInputs = [ pkgs.xorg.lndir ];
+
+ buildInputs = [ pyqt4.qt pyqt4 ];
preConfigure = ''
mkdir -p $out
diff --git a/pkgs/development/python-modules/rawkit/default.nix b/pkgs/development/python-modules/rawkit/default.nix
index e8be12b2669..6bee2bf1b0a 100644
--- a/pkgs/development/python-modules/rawkit/default.nix
+++ b/pkgs/development/python-modules/rawkit/default.nix
@@ -1,4 +1,4 @@
-{ stdenv, fetchPypi, buildPythonPackage
+{ stdenv, fetchPypi, buildPythonPackage, fetchpatch
, libraw
, pytest, mock }:
@@ -11,6 +11,14 @@ buildPythonPackage rec {
sha256 = "0vrhrpr70i61y5q5ysk341x1539ff1q1k82g59zq69lv16s0f76s";
};
+ patches = [
+ # Python 3.7 compatibility
+ (fetchpatch {
+ url = https://github.com/photoshell/rawkit/commit/663e90afa835d398aedd782c87b8cd0bff64bc9f.patch;
+ sha256 = "1cdw0x9bgk0b5jnpjnmd8jpbaryarr3cjqizq44366qh3l0jycxy";
+ })
+ ];
+
buildInputs = [ libraw ];
checkInputs = [ pytest mock ];
diff --git a/pkgs/development/python-modules/resampy/default.nix b/pkgs/development/python-modules/resampy/default.nix
index 4f9c4410765..e9e51756d9f 100644
--- a/pkgs/development/python-modules/resampy/default.nix
+++ b/pkgs/development/python-modules/resampy/default.nix
@@ -1,11 +1,12 @@
{ stdenv
, buildPythonPackage
-, fetchPypi
+, fetchFromGitHub
, pytest
, pytestcov
, numpy
, scipy
, cython
+, numba
, six
}:
@@ -13,16 +14,20 @@ buildPythonPackage rec {
pname = "resampy";
version = "0.2.1";
- src = fetchPypi {
- inherit pname version;
- sha256 = "7f6912ca2b746eb9bcdc05c52fcef088f0b7ba1ca6ee0b2d0a359d18fc57f8f8";
+ # No tests in PyPi Archive
+ src = fetchFromGitHub {
+ owner = "bmcfee";
+ repo = pname;
+ rev = version;
+ sha256 = "0a2bxj042y62dimm2i4vglbhpwbybam07mcl67cb6pmfsw9fbqhj";
};
checkInputs = [ pytest pytestcov ];
- propagatedBuildInputs = [ numpy scipy cython six ];
+ propagatedBuildInputs = [ numpy scipy cython numba six ];
- # No tests included
- doCheck = false;
+ checkPhase = ''
+ pytest tests
+ '';
meta = with stdenv.lib; {
homepage = https://github.com/bmcfee/resampy;
diff --git a/pkgs/development/python-modules/rfc3986/default.nix b/pkgs/development/python-modules/rfc3986/default.nix
index b2675d04d5b..4ffb182626c 100644
--- a/pkgs/development/python-modules/rfc3986/default.nix
+++ b/pkgs/development/python-modules/rfc3986/default.nix
@@ -10,9 +10,9 @@ buildPythonPackage rec {
sha256 = "1qf4dyxvjs7mxrxc0gr7gzyn4iflb2wgq01r5pzrxac8rnvy8fmw";
};
- buildInputs = [ pytest ];
+ checkInputs = [ pytest ];
checkPhase = ''
- py.test
+ pytest
'';
meta = with stdenv.lib; {
diff --git a/pkgs/development/python-modules/rpy2/default.nix b/pkgs/development/python-modules/rpy2/default.nix
index 7ff5b0343ea..1b4ab4d40db 100644
--- a/pkgs/development/python-modules/rpy2/default.nix
+++ b/pkgs/development/python-modules/rpy2/default.nix
@@ -58,6 +58,10 @@ buildPythonPackage rec {
tidyr
]) ++ extraRPackages ++ rWrapper.recommendedPackages;
+ nativeBuildInputs = [
+ R # needed at setup time to detect R_HOME (alternatively set R_HOME explicitly)
+ ];
+
patches = [
# R_LIBS_SITE is used by the nix r package to point to the installed R libraries.
# This patch sets R_LIBS_SITE when rpy2 is imported.
diff --git a/pkgs/development/python-modules/semver/default.nix b/pkgs/development/python-modules/semver/default.nix
index f92362ff8af..4072268609d 100644
--- a/pkgs/development/python-modules/semver/default.nix
+++ b/pkgs/development/python-modules/semver/default.nix
@@ -2,17 +2,19 @@
buildPythonPackage rec {
pname = "semver";
- version = "2.7.9";
+ version = "2.8.1";
src = fetchFromGitHub {
owner = "k-bx";
repo = "python-semver";
- rev = "2001c62d1a0361c44acc7076d8ce91e1d1c66141"; # not tagged in repository
- sha256 = "01c05sv97dyr672sa0nr3fnh2aqbmvkfw19d6rkaj16h2sdsyg0i";
+ rev = "41775dd5f143dfa6ca94885056c9ef5b3ed4e6e1"; # not tagged in repository
+ sha256 = "1rqaakha4sw06k9h0h4g1wmk66zkmhpq92y2rw0kyfpp6xk1zbk2";
};
checkInputs = [ pytest ];
- checkPhase = "pytest -v tests.py";
+ checkPhase = ''
+ py.test
+ '';
meta = with stdenv.lib; {
description = "Python package to work with Semantic Versioning (http://semver.org/)";
diff --git a/pkgs/development/python-modules/supervise_api/default.nix b/pkgs/development/python-modules/supervise_api/default.nix
index e647696c02b..47cdc8a28b1 100644
--- a/pkgs/development/python-modules/supervise_api/default.nix
+++ b/pkgs/development/python-modules/supervise_api/default.nix
@@ -1,6 +1,7 @@
{ lib
, buildPythonPackage
, fetchPypi
+, substituteAll
, supervise
, isPy3k
, whichcraft
@@ -16,11 +17,18 @@ buildPythonPackage rec {
sha256 = "1230f42294910e83421b7d3b08a968d27d510a4a709e966507ed70db5da1b9de";
};
- propagatedBuildInputs = [
- supervise
- ] ++ lib.optionals ( !isPy3k ) [
- whichcraft
+ patches = [
+ (substituteAll {
+ src = ./supervise-path.patch;
+ inherit supervise;
+ })
];
+
+ # In the git repo, supervise_api lives inside a python subdir
+ patchFlags = [ "-p2" ];
+
+ propagatedBuildInputs = lib.optional (!isPy3k) whichcraft;
+
checkInputs = [ utillinux ];
meta = {
diff --git a/pkgs/development/python-modules/supervise_api/supervise-path.patch b/pkgs/development/python-modules/supervise_api/supervise-path.patch
new file mode 100644
index 00000000000..c5538ddc26e
--- /dev/null
+++ b/pkgs/development/python-modules/supervise_api/supervise-path.patch
@@ -0,0 +1,15 @@
+diff --git a/python/supervise_api/supervise.py b/python/supervise_api/supervise.py
+index 497d3ea..be57e35 100644
+--- a/python/supervise_api/supervise.py
++++ b/python/supervise_api/supervise.py
+@@ -41,9 +41,7 @@ try:
+ except:
+ from whichcraft import which
+
+-supervise_utility_location = which("supervise")
+-if not supervise_utility_location:
+- raise FileNotFoundError(errno.ENOENT, "Executable not found in PATH", "supervise")
++supervise_utility_location = '@supervise@/bin/supervise'
+
+
+ def ignore_sigchld():
diff --git a/pkgs/development/python-modules/tensorflow-tensorboard/default.nix b/pkgs/development/python-modules/tensorflow-tensorboard/default.nix
index b196fc8edce..7840e6de009 100644
--- a/pkgs/development/python-modules/tensorflow-tensorboard/default.nix
+++ b/pkgs/development/python-modules/tensorflow-tensorboard/default.nix
@@ -26,12 +26,16 @@ buildPythonPackage rec {
sha256 = "19ixs811ndx8qh72dif0ywjss3rv7pf1khsgg6rvfjb9nw8wgjc2";
} else {
python = "py2";
- sha256 = "1mkyb5gn952i4s7fmc9ay4yh74ysrqbiqna6dl1qmahjpbaavbf5";
+ sha256 = "0qpv6jsf6jjvdl95qvarn006kfj5a99mq925d73xg4af50ssvkrf";
}));
- propagatedBuildInputs = [ numpy werkzeug protobuf
- markdown
- grpcio absl-py ]; # ++ lib.optional (!isPy3k) futures;
+ propagatedBuildInputs = [
+ numpy
+ werkzeug
+ protobuf
+ markdown
+ grpcio absl-py
+ ] ++ lib.optional (!isPy3k) futures;
meta = with stdenv.lib; {
description = "TensorFlow's Visualization Toolkit";
diff --git a/pkgs/development/python-modules/tensorflow/bin.nix b/pkgs/development/python-modules/tensorflow/bin.nix
index e1c25d9eca7..03f1e66bf50 100644
--- a/pkgs/development/python-modules/tensorflow/bin.nix
+++ b/pkgs/development/python-modules/tensorflow/bin.nix
@@ -55,7 +55,8 @@ in buildPythonPackage rec {
in fetchurl dls.${key};
propagatedBuildInputs = [ protobuf numpy termcolor grpcio six astor absl-py gast tensorflow-estimator tensorflow-tensorboard keras-applications keras-preprocessing ]
- ++ lib.optional (!isPy3k) mock;
+ ++ lib.optional (!isPy3k) mock
+ ++ lib.optionals (pythonOlder "3.4") [ backports_weakref ];
# Upstream has a pip hack that results in bin/tensorboard being in both tensorflow
# and the propageted input tensorflow-tensorboard which causes environment collisions.
diff --git a/pkgs/development/python-modules/tvdb_api/default.nix b/pkgs/development/python-modules/tvdb_api/default.nix
index 245556d91f6..6c298dce7c7 100644
--- a/pkgs/development/python-modules/tvdb_api/default.nix
+++ b/pkgs/development/python-modules/tvdb_api/default.nix
@@ -2,6 +2,7 @@
, buildPythonPackage
, fetchPypi
, requests-cache
+, pytest
}:
buildPythonPackage rec {
@@ -15,8 +16,13 @@ buildPythonPackage rec {
propagatedBuildInputs = [ requests-cache ];
+ checkInputs = [ pytest ];
+
+ # requires network access
+ doCheck = false;
+
meta = with stdenv.lib; {
- description = "Simple to use TVDB (thetvdb.com) API in Python.";
+ description = "Simple to use TVDB (thetvdb.com) API in Python";
homepage = "https://github.com/dbr/tvdb_api";
license = licenses.unlicense;
maintainers = with maintainers; [ peterhoeg ];
diff --git a/pkgs/development/python-modules/uproot/default.nix b/pkgs/development/python-modules/uproot/default.nix
index 8718e9b3029..fdb465202be 100644
--- a/pkgs/development/python-modules/uproot/default.nix
+++ b/pkgs/development/python-modules/uproot/default.nix
@@ -10,6 +10,8 @@
, pytest
, pkgconfig
, lz4
+, mock
+, requests
, backports_lzma
}:
@@ -22,8 +24,8 @@ buildPythonPackage rec {
sha256 = "1fafe476c26252e4dbd399456323778e76d23dc2f43cf6581a707d1647978610";
};
- buildInputs = [ pytestrunner ];
- checkInputs = [ pytest pkgconfig lz4 ]
+ nativeBuildInputs = [ pytestrunner ];
+ checkInputs = [ pytest pkgconfig lz4 mock requests ]
++ lib.optionals (pythonOlder "3.3") [ backports_lzma ];
propagatedBuildInputs = [ numpy cachetools uproot-methods awkward ];
diff --git a/pkgs/development/python-modules/willow/default.nix b/pkgs/development/python-modules/willow/default.nix
index de7639695d7..fb9182ab179 100644
--- a/pkgs/development/python-modules/willow/default.nix
+++ b/pkgs/development/python-modules/willow/default.nix
@@ -12,7 +12,8 @@ buildPythonPackage rec {
disabled = pythonOlder "2.7";
src = fetchPypi {
- inherit pname version;
+ pname = "Willow";
+ inherit version;
sha256 = "818ee11803c90a0a6d49c94b0453d6266be1ef83ae00de72731c45fae4d3e78c";
};
diff --git a/pkgs/development/python-modules/wrf-python/default.nix b/pkgs/development/python-modules/wrf-python/default.nix
index 8e9358dd473..3adbaa942dd 100644
--- a/pkgs/development/python-modules/wrf-python/default.nix
+++ b/pkgs/development/python-modules/wrf-python/default.nix
@@ -16,13 +16,14 @@ buildPythonPackage rec {
numpy
xarray
];
- buildInputs = [
+
+ nativeBuildInputs = [
gfortran
- ] ++ lib.optional (pythonOlder "3.3") mock;
-
+ ];
+
checkInputs = [
netcdf4
- ];
+ ] ++ lib.optional (pythonOlder "3.3") mock;
doCheck = true;
checkPhase = ''
diff --git a/pkgs/development/r-modules/default.nix b/pkgs/development/r-modules/default.nix
index fea9d8935dc..27ee02e5d06 100644
--- a/pkgs/development/r-modules/default.nix
+++ b/pkgs/development/r-modules/default.nix
@@ -290,6 +290,7 @@ let
pbdPROF = [ pkgs.openmpi ];
pbdZMQ = lib.optionals stdenv.isDarwin [ pkgs.which ];
pdftools = [ pkgs.poppler.dev ];
+ phytools = [ pkgs.which ];
PKI = [ pkgs.openssl.dev ];
png = [ pkgs.libpng.dev ];
PopGenome = [ pkgs.zlib.dev ];
diff --git a/pkgs/development/tools/analysis/flow/default.nix b/pkgs/development/tools/analysis/flow/default.nix
index 84b74cfe1f3..e2b1b6d2fe6 100644
--- a/pkgs/development/tools/analysis/flow/default.nix
+++ b/pkgs/development/tools/analysis/flow/default.nix
@@ -1,14 +1,14 @@
{ stdenv, fetchFromGitHub, ocamlPackages, cf-private, CoreServices }:
stdenv.mkDerivation rec {
- version = "0.92.0";
+ version = "0.94.0";
name = "flow-${version}";
src = fetchFromGitHub {
owner = "facebook";
repo = "flow";
rev = "refs/tags/v${version}";
- sha256 = "1v83hkkbls5x2062ry3gwrnn9al8rhsmargv2mvanxlpf0a63wx3";
+ sha256 = "1bdxbyy2gchqffsk2qi0sbdlyaxp7fgmikrk7nsn5vdfzqswa6gq";
};
installPhase = ''
diff --git a/pkgs/development/tools/build-managers/bazel/buildtools/default.nix b/pkgs/development/tools/build-managers/bazel/buildtools/default.nix
index d7bed13ec9d..2e8f806d53a 100644
--- a/pkgs/development/tools/build-managers/bazel/buildtools/default.nix
+++ b/pkgs/development/tools/build-managers/bazel/buildtools/default.nix
@@ -1,16 +1,16 @@
{ stdenv, buildGoPackage, fetchFromGitHub }:
buildGoPackage rec {
- name = "bazel-buildtools-unstable-${version}";
- version = "2018-10-11";
+ name = "bazel-buildtools-${version}";
+ version = "0.22.0";
goPackagePath = "github.com/bazelbuild/buildtools";
src = fetchFromGitHub {
owner = "bazelbuild";
repo = "buildtools";
- rev = "86b40b7fee59cc67d3371d20f10702fe8c6dd808";
- sha256 = "10fzqbafwzv0bvx8aag78gh731k5j9nwlbcflhc5xm5zwhla9cyf";
+ rev = "55b64c3d2ddfb57f06477c1d94ef477419c96bd6";
+ sha256 = "0n6q8pkgy3vvmwyrxvkmjfbcxc31i31czg2bjdzq7awwrr4fdbwy";
};
goDeps = ./deps.nix;
@@ -19,7 +19,7 @@ buildGoPackage rec {
description = "Tools for working with Google's bazel buildtool. Includes buildifier, buildozer, and unused_deps.";
homepage = https://github.com/bazelbuild/buildtools;
license = licenses.asl20;
- maintainers = with maintainers; [ uri-canva ];
+ maintainers = with maintainers; [ elasticdog uri-canva ];
platforms = platforms.all;
};
}
diff --git a/pkgs/development/tools/build-managers/bazel/buildtools/deps.nix b/pkgs/development/tools/build-managers/bazel/buildtools/deps.nix
index d53c744d04a..d7cd02c12b8 100644
--- a/pkgs/development/tools/build-managers/bazel/buildtools/deps.nix
+++ b/pkgs/development/tools/build-managers/bazel/buildtools/deps.nix
@@ -1,20 +1,12 @@
+# This file was generated by https://github.com/kamilchm/go2nix v1.3.0
[
- {
- goPackagePath = "github.com/bazelbuild/buildtools";
- fetch = {
- type = "git";
- url = "https://github.com/bazelbuild/buildtools";
- rev = "588d90030bc8054b550967aa45a8a8d170deba0b";
- sha256 = "18q1z138545kh4s5k0jcqwhpzc1w7il4x00l7yzv9wq8bg1vn1rv";
- };
- }
{
goPackagePath = "github.com/golang/protobuf";
fetch = {
type = "git";
url = "https://github.com/golang/protobuf";
- rev = "3a3da3a4e26776cc22a79ef46d5d58477532dede";
- sha256 = "05l0kjgk6ss98qii7vpjj2bqszyd16h448w47sv4422mp2xbni40";
+ rev = "b5d812f8a3706043e23a9cd5babf2e5423744d30";
+ sha256 = "15am4s4646qy6iv0g3kkqq52rzykqjhm4bf08dk0fy2r58knpsyl";
};
}
{
@@ -22,8 +14,8 @@
fetch = {
type = "git";
url = "https://github.com/google/skylark";
- rev = "572cea2bd78e2f1de8f3e136db9413cf02f097eb";
- sha256 = "0hc7gwvqsw421if06nlfdl86h6jl8wgjx1j2x2mzpnzdh1r03w92";
+ rev = "a5f7082aabed29c0e429c722292c66ec8ecf9591";
+ sha256 = "16vsa6ngsby27n6indj441r1glcdfgipjcwcb0rs6zl2dqlqr286";
};
}
]
diff --git a/pkgs/development/tools/buildah/default.nix b/pkgs/development/tools/buildah/default.nix
index 8d2b1d17b2d..c4e8c446e83 100644
--- a/pkgs/development/tools/buildah/default.nix
+++ b/pkgs/development/tools/buildah/default.nix
@@ -3,13 +3,13 @@
, go-md2man }:
let
- version = "1.4";
+ version = "1.7.1";
src = fetchFromGitHub {
rev = "v${version}";
owner = "containers";
repo = "buildah";
- sha256 = "0b9pfi22qcqyp0im8vp02ibrwd49ghgi64d5l98z01cj52n2j2dz";
+ sha256 = "083s0bcajks2qnxq6cn9lax5aiyvicf60rf3ifgqksl9skr748qb";
};
goPackagePath = "github.com/containers/buildah";
diff --git a/pkgs/development/tools/cachix/cachix-api.nix b/pkgs/development/tools/cachix/cachix-api.nix
new file mode 100644
index 00000000000..de8184308b2
--- /dev/null
+++ b/pkgs/development/tools/cachix/cachix-api.nix
@@ -0,0 +1,33 @@
+{ mkDerivation, aeson, base, base16-bytestring, bytestring, conduit
+, cookie, cryptonite, deepseq, exceptions, hspec, hspec-discover
+, http-api-data, http-media, lens, memory, protolude, resourcet
+, servant, servant-auth, servant-auth-server, servant-auth-swagger
+, servant-client, servant-swagger, servant-swagger-ui-core, stdenv
+, string-conv, swagger2, text, transformers
+}:
+mkDerivation {
+ pname = "cachix-api";
+ version = "0.2.0";
+ sha256 = "73f27484d3748fe02ce834549dd3a04c92110390f7d9adb4c391bad2ececbef2";
+ isLibrary = true;
+ isExecutable = true;
+ libraryHaskellDepends = [
+ aeson base base16-bytestring bytestring conduit cookie cryptonite
+ deepseq exceptions http-api-data http-media lens memory resourcet
+ servant servant-auth servant-auth-server servant-auth-swagger
+ servant-client servant-swagger string-conv swagger2 text
+ transformers
+ ];
+ executableHaskellDepends = [ aeson base ];
+ testHaskellDepends = [
+ aeson base base16-bytestring bytestring conduit cookie cryptonite
+ hspec http-api-data http-media lens memory protolude servant
+ servant-auth servant-auth-server servant-auth-swagger
+ servant-swagger servant-swagger-ui-core string-conv swagger2 text
+ transformers
+ ];
+ testToolDepends = [ hspec-discover ];
+ homepage = "https://github.com/cachix/cachix#readme";
+ description = "Servant HTTP API specification for https://cachix.org";
+ license = stdenv.lib.licenses.asl20;
+}
diff --git a/pkgs/development/tools/cachix/cachix.nix b/pkgs/development/tools/cachix/cachix.nix
new file mode 100644
index 00000000000..0f5a354ec94
--- /dev/null
+++ b/pkgs/development/tools/cachix/cachix.nix
@@ -0,0 +1,39 @@
+{ mkDerivation, async, base, base16-bytestring, base64-bytestring
+, bytestring, cachix-api, conduit, conduit-extra, cookie
+, cryptonite, data-default, dhall, directory, ed25519, filepath
+, fsnotify, here, hspec, hspec-discover, http-client
+, http-client-tls, http-conduit, http-types, lzma-conduit
+, megaparsec, memory, mmorph, netrc, optparse-applicative, process
+, protolude, retry, safe-exceptions, servant, servant-auth
+, servant-auth-client, servant-client, servant-client-core
+, servant-conduit, stdenv, temporary, text, unix, uri-bytestring
+, versions
+}:
+mkDerivation {
+ pname = "cachix";
+ version = "0.2.0";
+ sha256 = "16ba70af7f2ba4bc147ba84c34c9884bee589237a1d935f932c5e0b68157665a";
+ revision = "1";
+ editedCabalFile = "103ypqp0kclc1814q2ci5fi2jpfbxwmjqfsnkvwf3c1vr8cqplmh";
+ isLibrary = true;
+ isExecutable = true;
+ enableSeparateDataOutput = true;
+ libraryHaskellDepends = [
+ async base base16-bytestring base64-bytestring bytestring
+ cachix-api conduit conduit-extra cookie cryptonite data-default
+ dhall directory ed25519 filepath fsnotify here http-client
+ http-client-tls http-conduit http-types lzma-conduit megaparsec
+ memory mmorph netrc optparse-applicative process protolude retry
+ safe-exceptions servant servant-auth servant-auth-client
+ servant-client servant-client-core servant-conduit text unix
+ uri-bytestring versions
+ ];
+ executableHaskellDepends = [ base cachix-api ];
+ executableToolDepends = [ hspec-discover ];
+ testHaskellDepends = [
+ base cachix-api directory here hspec protolude temporary
+ ];
+ homepage = "https://github.com/cachix/cachix#readme";
+ description = "Command line client for Nix binary cache hosting https://cachix.org";
+ license = stdenv.lib.licenses.asl20;
+}
diff --git a/pkgs/development/tools/cachix/default.nix b/pkgs/development/tools/cachix/default.nix
new file mode 100644
index 00000000000..94527c8a4b5
--- /dev/null
+++ b/pkgs/development/tools/cachix/default.nix
@@ -0,0 +1,8 @@
+{ haskellPackages, haskell }:
+
+(haskellPackages.override {
+ overrides = self: super: {
+ cachix = haskell.lib.justStaticExecutables (super.callPackage ./cachix.nix {});
+ cachix-api = super.callPackage ./cachix-api.nix {};
+ };
+}).cachix
diff --git a/pkgs/development/tools/delve/default.nix b/pkgs/development/tools/delve/default.nix
index 6ddc778c95c..a0bd4e12063 100644
--- a/pkgs/development/tools/delve/default.nix
+++ b/pkgs/development/tools/delve/default.nix
@@ -2,16 +2,16 @@
buildGoPackage rec {
name = "delve-${version}";
- version = "1.1.0";
+ version = "1.2.0";
- goPackagePath = "github.com/derekparker/delve";
+ goPackagePath = "github.com/go-delve/delve";
excludedPackages = "\\(_fixtures\\|scripts\\|service/test\\)";
src = fetchFromGitHub {
- owner = "derekparker";
+ owner = "go-delve";
repo = "delve";
rev = "v${version}";
- sha256 = "0gpsd9hb7r65rn4ml9jzsmy72b8j0id6wik2l48ghzkwjm72rsdz";
+ sha256 = "1xz1xm0lb1arwm3w2ydq5y5xglq60fc0q46x9xndr3i9j0rm8bxh";
};
meta = with stdenv.lib; {
diff --git a/pkgs/development/tools/electron/3.x.nix b/pkgs/development/tools/electron/3.x.nix
index 90a7c53be02..23620a12530 100644
--- a/pkgs/development/tools/electron/3.x.nix
+++ b/pkgs/development/tools/electron/3.x.nix
@@ -1,7 +1,7 @@
{ stdenv, libXScrnSaver, makeWrapper, fetchurl, unzip, atomEnv, gtk2, at-spi2-atk }:
let
- version = "3.1.0";
+ version = "3.1.4";
name = "electron-${version}";
throwSystem = throw "Unsupported system: ${stdenv.hostPlatform.system}";
@@ -19,19 +19,19 @@ let
src = {
i686-linux = fetchurl {
url = "https://github.com/electron/electron/releases/download/v${version}/electron-v${version}-linux-ia32.zip";
- sha256 = "09llladfj8l1vnk8fl8ad66qq4czr755fhrp5ciivpbh38zi6d3d";
+ sha256 = "1llwpd10cz5nfwqimib7xkc3xxj3z4y19l97wxma3bciizmmgq3k";
};
x86_64-linux = fetchurl {
url = "https://github.com/electron/electron/releases/download/v${version}/electron-v${version}-linux-x64.zip";
- sha256 = "0g0af1z598f8k2i5sbkzpbga49hbgzl98qgk1n4iagk08iivyfwy";
+ sha256 = "0mb7q82r9ndvz181lnkplmvwkijzc2msrpfwpghrhsc4j3zbh0bf";
};
armv7l-linux = fetchurl {
url = "https://github.com/electron/electron/releases/download/v${version}/electron-v${version}-linux-armv7l.zip";
- sha256 = "04yj58v1sqnw64csazpfcchv2498ppxs2izadpnirawk09azl3bl";
+ sha256 = "0cf4jqq3n66dm11cy96q3nj1jxajv49yamhvn5g8a85nq4s5cx6f";
};
aarch64-linux = fetchurl {
url = "https://github.com/electron/electron/releases/download/v${version}/electron-v${version}-linux-arm64.zip";
- sha256 = "0cjf4i24qpgkmzb4nm89kgl07bwrncpz66xs5jjvi94pmr6wx6jm";
+ sha256 = "0lxp7fpccwk6qdw79dgjlm9hywfwl3aj932qg2aff18vs077skrg";
};
}.${stdenv.hostPlatform.system} or throwSystem;
@@ -59,7 +59,7 @@ let
src = fetchurl {
url = "https://github.com/electron/electron/releases/download/v${version}/electron-v${version}-darwin-x64.zip";
- sha256 = "1cd1ashrcbdjlrr6yijyh2ppk8x8jdw5cm9qnx4lzk7sj9lwjbgb";
+ sha256 = "1indim895a58ds09z91c8jfqmdp7ba85rx6bhq6dabgnvkykwmz0";
};
buildInputs = [ unzip ];
diff --git a/pkgs/development/tools/electron/default.nix b/pkgs/development/tools/electron/default.nix
index 5a00a883f51..8c6dce0114e 100644
--- a/pkgs/development/tools/electron/default.nix
+++ b/pkgs/development/tools/electron/default.nix
@@ -1,7 +1,7 @@
{ stdenv, libXScrnSaver, makeWrapper, fetchurl, unzip, atomEnv, libuuid, at-spi2-atk }:
let
- version = "4.0.0";
+ version = "4.0.6";
name = "electron-${version}";
throwSystem = throw "Unsupported system: ${stdenv.hostPlatform.system}";
@@ -20,19 +20,19 @@ let
src = {
i686-linux = fetchurl {
url = "https://github.com/electron/electron/releases/download/v${version}/electron-v${version}-linux-ia32.zip";
- sha256 = "0yv2f7yf6ingjysswpnpnvqsjkdkp2rd4laawhziifzbfjda4yws";
+ sha256 = "1ffv4wlj827wyq7y2hfaz2d0fapqr2r9likb90ayzh91vmkc8c2y";
};
x86_64-linux = fetchurl {
url = "https://github.com/electron/electron/releases/download/v${version}/electron-v${version}-linux-x64.zip";
- sha256 = "1kh2jds7jra9f1vcn2z1193cxcyvfxkldim4b9ij7chj9xzxwgln";
+ sha256 = "01b063jabx7fglh63dk7nh21xxadwxrrvavcwznpw6jhid48g2yz";
};
armv7l-linux = fetchurl {
url = "https://github.com/electron/electron/releases/download/v${version}/electron-v${version}-linux-armv7l.zip";
- sha256 = "1v492qfdgnj3fks2hrfc9lmsx5a5xk957rvismlpc2mjkjrwx2dq";
+ sha256 = "18dsb3pyj9gfn8xyzhblx7nidgp39pfqs1ml07nxfkf1bjdh4c4w";
};
aarch64-linux = fetchurl {
url = "https://github.com/electron/electron/releases/download/v${version}/electron-v${version}-linux-arm64.zip";
- sha256 = "18vpqif5grvhrkx6h64yzw1pf9013811gzq2qxaj8pzr6lck3irf";
+ sha256 = "0dx6bzj0laygqkyl8ngbh0yfzyc5mxr3fxlqb867cza9sz5hh95l";
};
}.${stdenv.hostPlatform.system} or throwSystem;
@@ -60,7 +60,7 @@ let
src = fetchurl {
url = "https://github.com/electron/electron/releases/download/v${version}/electron-v${version}-darwin-x64.zip";
- sha256 = "08n3xzgncb2hf645zn8b0rb1izq9pqh3726hf2g4nvrgfllivlg1";
+ sha256 = "0r1yn5lz808xdwp29g4kmlm5v0i1fsdxd4ph537gyz3sfn30dgq9";
};
buildInputs = [ unzip ];
diff --git a/pkgs/development/tools/go-outline/default.nix b/pkgs/development/tools/go-outline/default.nix
index 5e1cd03e0af..4df506f908f 100644
--- a/pkgs/development/tools/go-outline/default.nix
+++ b/pkgs/development/tools/go-outline/default.nix
@@ -2,8 +2,8 @@
buildGoPackage rec {
name = "go-outline-${version}";
- version = "unstable-2017-08-04";
- rev = "9e9d089bb61a5ce4f8e0c8d8dc5b4e41b0e02a48";
+ version = "unstable-2018-11-22";
+ rev = "7182a932836a71948db4a81991a494751eccfe77";
goPackagePath = "github.com/ramya-rao-a/go-outline";
goDeps = ./deps.nix;
@@ -12,7 +12,7 @@ buildGoPackage rec {
inherit rev;
owner = "ramya-rao-a";
repo = "go-outline";
- sha256 = "0kbkv4d6q9w0d41m00sqdm10l0sg56mv8y6rmidqs152mm2w13x0";
+ sha256 = "0p381yvwvff0i4i7mf5v1k2q1lb0rs2xkjgv67n1cw2573c613r1";
};
meta = {
diff --git a/pkgs/development/tools/go-symbols/default.nix b/pkgs/development/tools/go-symbols/default.nix
index 07cd267b0e9..dfeb6d52e72 100644
--- a/pkgs/development/tools/go-symbols/default.nix
+++ b/pkgs/development/tools/go-symbols/default.nix
@@ -2,17 +2,16 @@
buildGoPackage rec {
name = "go-symbols-${version}";
- version = "unstable-2018-05-23";
- rev = "953befd75e223f514580fcb698aead0dd6ad3421";
+ version = "0.1.1";
goPackagePath = "github.com/acroca/go-symbols";
goDeps = ./deps.nix;
src = fetchFromGitHub {
- inherit rev;
owner = "acroca";
repo = "go-symbols";
- sha256 = "0dwf7w3zypv5brk68n7siakz222jwnhrhkzvwk1iwdffk79gqp3x";
+ rev = "v${version}";
+ sha256 = "0yyzw6clndb2r5j9isyd727njs98zzp057v314vfvknsm8g7hqrz";
};
meta = {
diff --git a/pkgs/development/tools/jazzy/Gemfile.lock b/pkgs/development/tools/jazzy/Gemfile.lock
index b8fc28a740e..a4e12cb6fe5 100644
--- a/pkgs/development/tools/jazzy/Gemfile.lock
+++ b/pkgs/development/tools/jazzy/Gemfile.lock
@@ -1,94 +1,96 @@
GEM
remote: https://rubygems.org/
specs:
- CFPropertyList (2.3.5)
- activesupport (4.2.10)
+ CFPropertyList (3.0.0)
+ activesupport (4.2.11)
i18n (~> 0.7)
minitest (~> 5.1)
thread_safe (~> 0.3, >= 0.3.4)
tzinfo (~> 1.1)
+ atomos (0.1.3)
claide (1.0.2)
- cocoapods (1.3.1)
+ cocoapods (1.5.3)
activesupport (>= 4.0.2, < 5)
claide (>= 1.0.2, < 2.0)
- cocoapods-core (= 1.3.1)
- cocoapods-deintegrate (>= 1.0.1, < 2.0)
- cocoapods-downloader (>= 1.1.3, < 2.0)
+ cocoapods-core (= 1.5.3)
+ cocoapods-deintegrate (>= 1.0.2, < 2.0)
+ cocoapods-downloader (>= 1.2.0, < 2.0)
cocoapods-plugins (>= 1.0.0, < 2.0)
cocoapods-search (>= 1.0.0, < 2.0)
cocoapods-stats (>= 1.0.0, < 2.0)
- cocoapods-trunk (>= 1.2.0, < 2.0)
+ cocoapods-trunk (>= 1.3.0, < 2.0)
cocoapods-try (>= 1.1.0, < 2.0)
colored2 (~> 3.1)
escape (~> 0.0.4)
fourflusher (~> 2.0.1)
gh_inspector (~> 1.0)
- molinillo (~> 0.5.7)
+ molinillo (~> 0.6.5)
nap (~> 1.0)
ruby-macho (~> 1.1)
- xcodeproj (>= 1.5.1, < 2.0)
- cocoapods-core (1.3.1)
+ xcodeproj (>= 1.5.7, < 2.0)
+ cocoapods-core (1.5.3)
activesupport (>= 4.0.2, < 6)
fuzzy_match (~> 2.0.4)
nap (~> 1.0)
- cocoapods-deintegrate (1.0.1)
- cocoapods-downloader (1.1.3)
+ cocoapods-deintegrate (1.0.3)
+ cocoapods-downloader (1.2.2)
cocoapods-plugins (1.0.0)
nap
cocoapods-search (1.0.0)
- cocoapods-stats (1.0.0)
- cocoapods-trunk (1.3.0)
+ cocoapods-stats (1.1.0)
+ cocoapods-trunk (1.3.1)
nap (>= 0.8, < 2.0)
netrc (~> 0.11)
cocoapods-try (1.1.0)
colored2 (3.1.2)
- concurrent-ruby (1.0.5)
+ concurrent-ruby (1.1.4)
escape (0.0.4)
- ffi (1.9.18)
+ ffi (1.10.0)
fourflusher (2.0.1)
fuzzy_match (2.0.4)
- gh_inspector (1.0.3)
- i18n (0.9.0)
+ gh_inspector (1.1.3)
+ i18n (0.9.5)
concurrent-ruby (~> 1.0)
- jazzy (0.9.0)
- cocoapods (~> 1.0)
- mustache (~> 0.99)
+ jazzy (0.9.5)
+ cocoapods (~> 1.5.3)
+ mustache (~> 1.1.0)
open4
- redcarpet (~> 3.2)
- rouge (~> 1.5)
- sass (~> 3.4)
- sqlite3 (~> 1.3)
+ redcarpet (~> 3.4.0)
+ rouge (>= 2.0.6, < 4.0)
+ sass (~> 3.6.0)
+ sqlite3 (~> 1.3.13)
xcinvoke (~> 0.3.0)
liferaft (0.0.6)
- minitest (5.10.3)
- molinillo (0.5.7)
- mustache (0.99.8)
- nanaimo (0.2.3)
+ minitest (5.11.3)
+ molinillo (0.6.6)
+ mustache (1.1.0)
+ nanaimo (0.2.6)
nap (1.1.0)
netrc (0.11.0)
open4 (1.3.4)
- rb-fsevent (0.10.2)
- rb-inotify (0.9.10)
- ffi (>= 0.5.0, < 2)
+ rb-fsevent (0.10.3)
+ rb-inotify (0.10.0)
+ ffi (~> 1.0)
redcarpet (3.4.0)
- rouge (1.11.1)
- ruby-macho (1.1.0)
- sass (3.5.3)
+ rouge (3.3.0)
+ ruby-macho (1.4.0)
+ sass (3.6.0)
sass-listen (~> 4.0.0)
sass-listen (4.0.0)
rb-fsevent (~> 0.9, >= 0.9.4)
rb-inotify (~> 0.9, >= 0.9.7)
sqlite3 (1.3.13)
thread_safe (0.3.6)
- tzinfo (1.2.4)
+ tzinfo (1.2.5)
thread_safe (~> 0.1)
xcinvoke (0.3.0)
liferaft (~> 0.0.6)
- xcodeproj (1.5.3)
- CFPropertyList (~> 2.3.3)
+ xcodeproj (1.8.1)
+ CFPropertyList (>= 2.3.3, < 4.0)
+ atomos (~> 0.1.3)
claide (>= 1.0.2, < 2.0)
colored2 (~> 3.1)
- nanaimo (~> 0.2.3)
+ nanaimo (~> 0.2.6)
PLATFORMS
ruby
@@ -97,4 +99,4 @@ DEPENDENCIES
jazzy
BUNDLED WITH
- 1.14.6
+ 1.17.2
diff --git a/pkgs/development/tools/jazzy/default.nix b/pkgs/development/tools/jazzy/default.nix
index 7d96e2c07d2..15a74f3c595 100644
--- a/pkgs/development/tools/jazzy/default.nix
+++ b/pkgs/development/tools/jazzy/default.nix
@@ -12,6 +12,7 @@ bundlerEnv rec {
platforms = platforms.darwin;
maintainers = with maintainers; [
peterromfeldhk
+ lilyball
];
};
}
diff --git a/pkgs/development/tools/jazzy/gemset.nix b/pkgs/development/tools/jazzy/gemset.nix
index a88724a3de3..5f4e9335463 100644
--- a/pkgs/development/tools/jazzy/gemset.nix
+++ b/pkgs/development/tools/jazzy/gemset.nix
@@ -1,20 +1,34 @@
{
activesupport = {
dependencies = ["i18n" "minitest" "thread_safe" "tzinfo"];
+ groups = ["default"];
+ platforms = [];
source = {
remotes = ["https://rubygems.org"];
- sha256 = "0s12j8vl8vrxfngkdlz9g8bpz9akq1z42d57mx5r537b2pji8nr7";
+ sha256 = "0pqr25wmhvvlg8av7bi5p5c7r5464clhhhhv45j63bh7xw4ad6n4";
type = "gem";
};
- version = "4.2.10";
+ version = "4.2.11";
+ };
+ atomos = {
+ groups = ["default"];
+ platforms = [];
+ source = {
+ remotes = ["https://rubygems.org"];
+ sha256 = "17vq6sjyswr5jfzwdccw748kgph6bdw30bakwnn6p8sl4hpv4hvx";
+ type = "gem";
+ };
+ version = "0.1.3";
};
CFPropertyList = {
+ groups = ["default"];
+ platforms = [];
source = {
remotes = ["https://rubygems.org"];
- sha256 = "06dddgcai6nay552h8wmnb2m93xx5hni48s16vkbf9vbym4nfw5x";
+ sha256 = "0ykjag3k5msz3sf1j91rb55da2xh596y06m3a4yl79fiy2id0w9z";
type = "gem";
};
- version = "2.3.5";
+ version = "3.0.0";
};
claide = {
source = {
@@ -26,37 +40,45 @@
};
cocoapods = {
dependencies = ["activesupport" "claide" "cocoapods-core" "cocoapods-deintegrate" "cocoapods-downloader" "cocoapods-plugins" "cocoapods-search" "cocoapods-stats" "cocoapods-trunk" "cocoapods-try" "colored2" "escape" "fourflusher" "gh_inspector" "molinillo" "nap" "ruby-macho" "xcodeproj"];
+ groups = ["default"];
+ platforms = [];
source = {
remotes = ["https://rubygems.org"];
- sha256 = "050b7795jc6802wcpcgi702qkgy8vjidgq6c6mbx2alrq7l0n8q7";
+ sha256 = "0x5cz19p0j9k1hvn35lxnv3dn8i65n4qvi5nzjaf53pdgh52401h";
type = "gem";
};
- version = "1.3.1";
+ version = "1.5.3";
};
cocoapods-core = {
dependencies = ["activesupport" "fuzzy_match" "nap"];
+ groups = ["default"];
+ platforms = [];
source = {
remotes = ["https://rubygems.org"];
- sha256 = "0pr42lpqs6q51gnnfxmgmbx7sw0dwyawylssj588izj8av18rhpy";
+ sha256 = "0xnxcd2xnvf60f8w27glq5jcn9wdhzch9nkdb24ihhmpxfgj3f39";
type = "gem";
};
- version = "1.3.1";
+ version = "1.5.3";
};
cocoapods-deintegrate = {
+ groups = ["default"];
+ platforms = [];
source = {
remotes = ["https://rubygems.org"];
- sha256 = "1x4hxlip6zkrs1vcmw7sh45ayn5pxvsg782iifnmgjwn2pyskj7l";
+ sha256 = "0m3hi4va9cr7anxkjf44as14j1hsrvw00bzvz7c906hyb8qcm4fp";
type = "gem";
};
- version = "1.0.1";
+ version = "1.0.3";
};
cocoapods-downloader = {
+ groups = ["default"];
+ platforms = [];
source = {
remotes = ["https://rubygems.org"];
- sha256 = "1664qg1wml70slcfklpnyq5ixp145f6iyn3c6pcqkqc64i1bsg87";
+ sha256 = "09fd4zaqkz8vz3djplacngcs4n0j6j956wgq43s1y6bwl0zyjmd3";
type = "gem";
};
- version = "1.1.3";
+ version = "1.2.2";
};
cocoapods-plugins = {
dependencies = ["nap"];
@@ -76,21 +98,25 @@
version = "1.0.0";
};
cocoapods-stats = {
+ groups = ["default"];
+ platforms = [];
source = {
remotes = ["https://rubygems.org"];
- sha256 = "0sfcwq2vq6cadj1811jdjys3d28pmk2r2a83px6w94rz6i19axid";
+ sha256 = "1xhdh5v94p6l612rwrk290nd2hdfx8lbaqfbkmj34md218kilqww";
type = "gem";
};
- version = "1.0.0";
+ version = "1.1.0";
};
cocoapods-trunk = {
dependencies = ["nap" "netrc"];
+ groups = ["default"];
+ platforms = [];
source = {
remotes = ["https://rubygems.org"];
- sha256 = "0shxr64j7f50yglp5l90vr1ba5p9pkk0a3b8apkbci2lmq5kq60b";
+ sha256 = "1plssgabdv6hcaq1c3gf43kf1d2prx883q8lzdr6chi5byzzs3yl";
type = "gem";
};
- version = "1.3.0";
+ version = "1.3.1";
};
cocoapods-try = {
source = {
@@ -109,12 +135,14 @@
version = "3.1.2";
};
concurrent-ruby = {
+ groups = ["default"];
+ platforms = [];
source = {
remotes = ["https://rubygems.org"];
- sha256 = "183lszf5gx84kcpb779v6a2y0mx9sssy8dgppng1z9a505nj1qcf";
+ sha256 = "1ixcx9pfissxrga53jbdpza85qd5f6b5nq1sfqa9rnfq82qnlbp1";
type = "gem";
};
- version = "1.0.5";
+ version = "1.1.4";
};
escape = {
source = {
@@ -125,12 +153,14 @@
version = "0.0.4";
};
ffi = {
+ groups = ["default"];
+ platforms = [];
source = {
remotes = ["https://rubygems.org"];
- sha256 = "034f52xf7zcqgbvwbl20jwdyjwznvqnwpbaps9nk18v9lgb1dpx0";
+ sha256 = "0j8pzj8raxbir5w5k6s7a042sb5k02pg0f8s4na1r5lan901j00p";
type = "gem";
};
- version = "1.9.18";
+ version = "1.10.0";
};
fourflusher = {
source = {
@@ -149,30 +179,36 @@
version = "2.0.4";
};
gh_inspector = {
+ groups = ["default"];
+ platforms = [];
source = {
remotes = ["https://rubygems.org"];
- sha256 = "1lxvp8xpjd2cazzcp90phy567spp4v41bnk9awgx8absndv70k1x";
+ sha256 = "0f8r9byajj3bi2c7c5sqrc7m0zrv3nblfcd4782lw5l73cbsgk04";
type = "gem";
};
- version = "1.0.3";
+ version = "1.1.3";
};
i18n = {
dependencies = ["concurrent-ruby"];
+ groups = ["default"];
+ platforms = [];
source = {
remotes = ["https://rubygems.org"];
- sha256 = "0h5wygnbpxas8kwhqkwk6n4s334dxyxvlxykc6mxfndb0m56166r";
+ sha256 = "038qvz7kd3cfxk8bvagqhakx68pfbnmghpdkx7573wbf0maqp9a3";
type = "gem";
};
- version = "0.9.0";
+ version = "0.9.5";
};
jazzy = {
dependencies = ["cocoapods" "mustache" "open4" "redcarpet" "rouge" "sass" "sqlite3" "xcinvoke"];
+ groups = ["default"];
+ platforms = [];
source = {
remotes = ["https://rubygems.org"];
- sha256 = "0vvyszmpnzm0my5fp50z5bnqij6zq3cig2p46vgl683hsm48ldsq";
+ sha256 = "13gn4zihfnf3k5ilki3jx7gzin5wdiqvca5q01qq9x7m87j924j6";
type = "gem";
};
- version = "0.9.0";
+ version = "0.9.5";
};
liferaft = {
source = {
@@ -183,36 +219,44 @@
version = "0.0.6";
};
minitest = {
+ groups = ["default"];
+ platforms = [];
source = {
remotes = ["https://rubygems.org"];
- sha256 = "05521clw19lrksqgvg2kmm025pvdhdaniix52vmbychrn2jm7kz2";
+ sha256 = "0icglrhghgwdlnzzp4jf76b0mbc71s80njn5afyfjn4wqji8mqbq";
type = "gem";
};
- version = "5.10.3";
+ version = "5.11.3";
};
molinillo = {
+ groups = ["default"];
+ platforms = [];
source = {
remotes = ["https://rubygems.org"];
- sha256 = "19h1nks0x2ljwyijs2rd1f9sh05j8xqvjaqk1rslp5nyy6h4a758";
+ sha256 = "1hh40z1adl4lw16dj4hxgabx4rr28mgqycih1y1d91bwww0jjdg6";
type = "gem";
};
- version = "0.5.7";
+ version = "0.6.6";
};
mustache = {
+ groups = ["default"];
+ platforms = [];
source = {
remotes = ["https://rubygems.org"];
- sha256 = "1g5hplm0k06vwxwqzwn1mq5bd02yp0h3rym4zwzw26aqi7drcsl2";
+ sha256 = "1698xpwxmfvj39ii5vv8a4aka54p3fpk5i4rf8z9lfxrh4948rbk";
type = "gem";
};
- version = "0.99.8";
+ version = "1.1.0";
};
nanaimo = {
+ groups = ["default"];
+ platforms = [];
source = {
remotes = ["https://rubygems.org"];
- sha256 = "0z6rbji02x75vm5jw4hbpp75khp4z5yfgbaz1h9l8aa00hqf0fxd";
+ sha256 = "0ajfyaqjw3dzykk612yw8sm21savfqy292hgps8h8l4lvxww1lz6";
type = "gem";
};
- version = "0.2.3";
+ version = "0.2.6";
};
nap = {
source = {
@@ -239,21 +283,25 @@
version = "1.3.4";
};
rb-fsevent = {
+ groups = ["default"];
+ platforms = [];
source = {
remotes = ["https://rubygems.org"];
- sha256 = "1fbpmjypwxkb8r7y1kmhmyp6gawa4byw0yb3jc3dn9ly4ld9lizf";
+ sha256 = "1lm1k7wpz69jx7jrc92w3ggczkjyjbfziq5mg62vjnxmzs383xx8";
type = "gem";
};
- version = "0.10.2";
+ version = "0.10.3";
};
rb-inotify = {
dependencies = ["ffi"];
+ groups = ["default"];
+ platforms = [];
source = {
remotes = ["https://rubygems.org"];
- sha256 = "0yfsgw5n7pkpyky6a9wkf1g9jafxb0ja7gz0qw0y14fd2jnzfh71";
+ sha256 = "1fs7hxm9g6ywv2yih83b879klhc4fs8i0p9166z795qmd77dk0a4";
type = "gem";
};
- version = "0.9.10";
+ version = "0.10.0";
};
redcarpet = {
source = {
@@ -264,29 +312,35 @@
version = "3.4.0";
};
rouge = {
+ groups = ["default"];
+ platforms = [];
source = {
remotes = ["https://rubygems.org"];
- sha256 = "13amckbdknnc5491ag28y8pqbyfpbzx5n4rlmadxhd3wkrhp92c8";
+ sha256 = "1digsi2s8wyzx8vsqcxasw205lg6s7izx8jypl8rrpjwshmv83ql";
type = "gem";
};
- version = "1.11.1";
+ version = "3.3.0";
};
ruby-macho = {
+ groups = ["default"];
+ platforms = [];
source = {
remotes = ["https://rubygems.org"];
- sha256 = "1i9vkz3ki3yvps4z1hca2q2axniq95x4yypnc22p9pcfjdfrbrq6";
+ sha256 = "0lhdjn91jkifsy2hzq2hgcm0pp8pbik87m58zmw1ifh6hkp9adjb";
type = "gem";
};
- version = "1.1.0";
+ version = "1.4.0";
};
sass = {
dependencies = ["sass-listen"];
+ groups = ["default"];
+ platforms = [];
source = {
remotes = ["https://rubygems.org"];
- sha256 = "1167camc4ccqf9lcjlpyf96ji00f0041i7xanj2nm41fkx7kr7kr";
+ sha256 = "18c6prbw9wl8bqhb2435pd9s0lzarl3g7xf8pmyla28zblvwxmyh";
type = "gem";
};
- version = "3.5.3";
+ version = "3.6.0";
};
sass-listen = {
dependencies = ["rb-fsevent" "rb-inotify"];
@@ -315,12 +369,14 @@
};
tzinfo = {
dependencies = ["thread_safe"];
+ groups = ["default"];
+ platforms = [];
source = {
remotes = ["https://rubygems.org"];
- sha256 = "09dpbrih054mn42flbbcdpzk2727mzfvjrgqb12zdafhx7p9rrzp";
+ sha256 = "1fjx9j327xpkkdlxwmkl3a8wqj7i4l4jwlrv3z13mg95z9wl253z";
type = "gem";
};
- version = "1.2.4";
+ version = "1.2.5";
};
xcinvoke = {
dependencies = ["liferaft"];
@@ -332,12 +388,14 @@
version = "0.3.0";
};
xcodeproj = {
- dependencies = ["CFPropertyList" "claide" "colored2" "nanaimo"];
+ dependencies = ["CFPropertyList" "atomos" "claide" "colored2" "nanaimo"];
+ groups = ["default"];
+ platforms = [];
source = {
remotes = ["https://rubygems.org"];
- sha256 = "1gvnd5ixa4wbn1cpc6jp6i9z0dxhcwlxny47irzbr6zr8wpj3ww7";
+ sha256 = "13z3109lwq632vhazndqjlccpwadljg58sflbyl0m57j9d4blv2y";
type = "gem";
};
- version = "1.5.3";
+ version = "1.8.1";
};
}
\ No newline at end of file
diff --git a/pkgs/development/tools/jazzy/update b/pkgs/development/tools/jazzy/update
index 58a7bd4a453..ff0e1686836 100755
--- a/pkgs/development/tools/jazzy/update
+++ b/pkgs/development/tools/jazzy/update
@@ -1,10 +1,8 @@
#!/usr/bin/env nix-shell
-#! nix-shell -i bash -p bash ruby bundler bundix
+#! nix-shell -i bash -p bash bundler bundix
-rm Gemfile.lock
-bundler install
+set -e
+
+rm -f Gemfile.lock
+bundler lock
bundix
-
-if [ "clean" == "$1" ]; then
- rm -rf ~/.gem
-fi
diff --git a/pkgs/development/tools/kustomize/default.nix b/pkgs/development/tools/kustomize/default.nix
index 2b2930a61b4..49cea5e8ac8 100644
--- a/pkgs/development/tools/kustomize/default.nix
+++ b/pkgs/development/tools/kustomize/default.nix
@@ -2,9 +2,9 @@
buildGoPackage rec {
name = "kustomize-${version}";
- version = "2.0.1";
- # rev is the 2.0.1 commit, mainly for kustomize version command output
- rev = "ce7e5ee2c30cc5856fea01fe423cf167f2a2d0c3";
+ version = "2.0.3";
+ # rev is the 2.0.3 commit, mainly for kustomize version command output
+ rev = "a6f65144121d1955266b0cd836ce954c04122dc8";
goPackagePath = "sigs.k8s.io/kustomize";
@@ -16,7 +16,7 @@ buildGoPackage rec {
'';
src = fetchFromGitHub {
- sha256 = "1ljllx2gd329lnq6mdsgh8zzr517ji80b0j21pgr23y0xmd43ijf";
+ sha256 = "1dfkpx9rllj1bzm5f52bx404kdds3zx1h38yqri9ha3p3pcb1bbb";
rev = "v${version}";
repo = "kustomize";
owner = "kubernetes-sigs";
diff --git a/pkgs/development/tools/misc/ccls/default.nix b/pkgs/development/tools/misc/ccls/default.nix
index c8ab6b0fd96..7f0bc9ff4ff 100644
--- a/pkgs/development/tools/misc/ccls/default.nix
+++ b/pkgs/development/tools/misc/ccls/default.nix
@@ -15,7 +15,11 @@ stdenv.mkDerivation rec {
nativeBuildInputs = [ cmake makeWrapper ];
buildInputs = with llvmPackages; [ clang-unwrapped llvm rapidjson ];
- cmakeFlags = [ "-DSYSTEM_CLANG=ON" ];
+ cmakeFlags = [
+ "-DSYSTEM_CLANG=ON"
+ "-DCMAKE_OSX_DEPLOYMENT_TARGET=10.12"
+ "-DCMAKE_CXX_FLAGS=-fvisibility=hidden"
+ ];
shell = runtimeShell;
postFixup = ''
@@ -37,7 +41,7 @@ stdenv.mkDerivation rec {
description = "A c/c++ language server powered by clang";
homepage = https://github.com/MaskRay/ccls;
license = licenses.asl20;
- platforms = platforms.linux;
+ platforms = platforms.linux ++ platforms.darwin;
maintainers = [ maintainers.mic92 ];
};
}
diff --git a/pkgs/development/tools/misc/luarocks/darwin.patch b/pkgs/development/tools/misc/luarocks/darwin.patch
index ec7f924987a..a5e4ac461b4 100644
--- a/pkgs/development/tools/misc/luarocks/darwin.patch
+++ b/pkgs/development/tools/misc/luarocks/darwin.patch
@@ -1,27 +1,27 @@
-diff --git a/src/luarocks/cfg.lua b/src/luarocks/cfg.lua
-index 55cd4c9..060a6f1 100644
---- a/src/luarocks/cfg.lua
-+++ b/src/luarocks/cfg.lua
-@@ -587,9 +587,9 @@ if cfg.platforms.macosx then
- defaults.external_lib_extension = "dylib"
- defaults.arch = "macosx-"..cfg.target_cpu
- defaults.variables.LIBFLAG = "-bundle -undefined dynamic_lookup -all_load"
-- defaults.variables.STAT = "/usr/bin/stat"
-+ defaults.variables.STAT = "stat"
- defaults.variables.STATFLAG = "-f '%A'"
-- local version = io.popen("sw_vers -productVersion"):read("*l")
-+ local version = "10.10"
- version = tonumber(version and version:match("^[^.]+%.([^.]+)")) or 3
- if version >= 10 then
- version = 8
-@@ -598,8 +598,8 @@ if cfg.platforms.macosx then
- else
- defaults.gcc_rpath = false
+diff --git a/src/luarocks/core/cfg.lua b/src/luarocks/core/cfg.lua
+index f93e67a..2eb2db9 100644
+--- a/src/luarocks/core/cfg.lua
++++ b/src/luarocks/core/cfg.lua
+@@ -425,9 +425,9 @@ local function make_defaults(lua_version, target_cpu, platforms, home)
+ defaults.external_lib_extension = "dylib"
+ defaults.arch = "macosx-"..target_cpu
+ defaults.variables.LIBFLAG = "-bundle -undefined dynamic_lookup -all_load"
+- defaults.variables.STAT = "/usr/bin/stat"
++ defaults.variables.STAT = "stat"
+ defaults.variables.STATFLAG = "-f '%A'"
+- local version = util.popen_read("sw_vers -productVersion")
++ local version = "10.10"
+ version = tonumber(version and version:match("^[^.]+%.([^.]+)")) or 3
+ if version >= 10 then
+ version = 8
+@@ -436,8 +436,8 @@ local function make_defaults(lua_version, target_cpu, platforms, home)
+ else
+ defaults.gcc_rpath = false
+ end
+- defaults.variables.CC = "env MACOSX_DEPLOYMENT_TARGET=10."..version.." gcc"
+- defaults.variables.LD = "env MACOSX_DEPLOYMENT_TARGET=10."..version.." gcc"
++ defaults.variables.CC = "env MACOSX_DEPLOYMENT_TARGET=10."..version.." clang"
++ defaults.variables.LD = "env MACOSX_DEPLOYMENT_TARGET=10."..version.." clang"
+ defaults.web_browser = "open"
end
-- defaults.variables.CC = "env MACOSX_DEPLOYMENT_TARGET=10."..version.." gcc"
-- defaults.variables.LD = "env MACOSX_DEPLOYMENT_TARGET=10."..version.." gcc"
-+ defaults.variables.CC = "env MACOSX_DEPLOYMENT_TARGET=10."..version.." clang"
-+ defaults.variables.LD = "env MACOSX_DEPLOYMENT_TARGET=10."..version.." clang"
- defaults.web_browser = "open"
- end
diff --git a/pkgs/development/tools/misc/luarocks/default.nix b/pkgs/development/tools/misc/luarocks/default.nix
index ad50e7e8e6d..7edcb79388a 100644
--- a/pkgs/development/tools/misc/luarocks/default.nix
+++ b/pkgs/development/tools/misc/luarocks/default.nix
@@ -7,27 +7,15 @@
, cmake
}:
-let
- s = # Generated upstream information
- rec {
- baseName="luarocks";
- version="2.4.4";
- name="${baseName}-${version}";
- hash="0d7rl60dwh52qh5pfsphgx5ypp7k190h9ri6qpr2yx9kvqrxyf1r";
- url="http://luarocks.org/releases/luarocks-2.4.4.tar.gz";
- sha256="0d7rl60dwh52qh5pfsphgx5ypp7k190h9ri6qpr2yx9kvqrxyf1r";
- };
- buildInputs = [
- lua curl makeWrapper which unzip
- ];
-in
+stdenv.mkDerivation rec {
+ pname = "luarocks";
+ version = "3.0.4";
-stdenv.mkDerivation {
- inherit (s) name version;
- inherit buildInputs;
src = fetchurl {
- inherit (s) url sha256;
+ url="http://luarocks.org/releases/luarocks-${version}.tar.gz";
+ sha256="1pqfzwvjy8dzqg4fqjq2cgqcr00fgrdd7nwzxm7nqmawr83s6dhj";
};
+
patches = [ ./darwin.patch ];
preConfigure = ''
lua -e "" || {
@@ -41,6 +29,11 @@ stdenv.mkDerivation {
configureFlags="$configureFlags --with-lua-include=$lua_inc"
fi
'';
+
+ buildInputs = [
+ lua curl makeWrapper which
+ ];
+
postInstall = ''
sed -e "1s@.*@#! ${lua}/bin/lua$LUA_SUFFIX@" -i "$out"/bin/*
for i in "$out"/bin/*; do
@@ -68,10 +61,12 @@ stdenv.mkDerivation {
'';
meta = with stdenv.lib; {
- inherit (s) version;
+ inherit version;
description = ''A package manager for Lua'';
license = licenses.mit ;
maintainers = with maintainers; [raskin teto];
platforms = platforms.linux ++ platforms.darwin;
+ downloadPage = "http://luarocks.org/releases/";
+ updateWalker = true;
};
}
diff --git a/pkgs/development/tools/misc/luarocks/luarocks-nix.nix b/pkgs/development/tools/misc/luarocks/luarocks-nix.nix
index a918cb0c647..7dc0809c887 100644
--- a/pkgs/development/tools/misc/luarocks/luarocks-nix.nix
+++ b/pkgs/development/tools/misc/luarocks/luarocks-nix.nix
@@ -1,9 +1,10 @@
{ luarocks, fetchFromGitHub }:
luarocks.overrideAttrs(old: {
+ pname = "luarocks-nix";
src = fetchFromGitHub {
owner = "teto";
repo = "luarocks";
- rev = "f9dc7892214bff6bce822d94aca3331048e61df0";
- sha256 = "117qqbiv87p2qw0zwapl7b0p4wgnn9f8k0qpppkj3653a1bwli05";
+ rev = "8fb03a9bc8f4fa079d26c0f02804139bb2578848";
+ sha256 = "09iwjvs9sbk6vwhrh7sijmfpji6wvg5bbdraw7l5lpnr9jj5wy91";
};
})
diff --git a/pkgs/development/tools/ocaml/obelisk/default.nix b/pkgs/development/tools/ocaml/obelisk/default.nix
index 0f072c5dd93..87d592bd112 100644
--- a/pkgs/development/tools/ocaml/obelisk/default.nix
+++ b/pkgs/development/tools/ocaml/obelisk/default.nix
@@ -2,12 +2,12 @@
stdenv.mkDerivation rec {
name = "obelisk-${version}";
- version = "0.3.0";
+ version = "0.4.0";
src = fetchFromGitHub {
owner = "lelio-brun";
repo = "obelisk";
rev = "v${version}";
- sha256 = "12gldzi1mp15vwkk6llz2ignpc8ndqlycm88njb4k7r9hpv59m97";
+ sha256 = "0rw85knbwqj2rys1hh5qy8sfdqb4mb1wsriy38n7zcpbwim47vb8";
};
buildInputs = with ocamlPackages; [ ocaml findlib ocamlbuild menhir ];
diff --git a/pkgs/development/tools/ocaml/ocamlbuild/default.nix b/pkgs/development/tools/ocaml/ocamlbuild/default.nix
index 3f42e71e778..ec9ff6f4ba9 100644
--- a/pkgs/development/tools/ocaml/ocamlbuild/default.nix
+++ b/pkgs/development/tools/ocaml/ocamlbuild/default.nix
@@ -1,6 +1,6 @@
{ stdenv, fetchFromGitHub, ocaml, findlib }:
let
- version = "0.12.0";
+ version = "0.14.0";
in
stdenv.mkDerivation {
name = "ocamlbuild-${version}";
@@ -10,7 +10,7 @@ stdenv.mkDerivation {
owner = "ocaml";
repo = "ocamlbuild";
rev = version;
- sha256 = "1shyim50ms0816fphc4mk0kldcx3pnba2i6m10q0cbm18m9d7chq";
+ sha256 = "1hb5mcdz4wv7sh1pj7dq9q4fgz5h3zg7frpiya6s8zd3ypwzq0kh";
};
createFindlibDestdir = true;
diff --git a/pkgs/development/tools/pipenv/default.nix b/pkgs/development/tools/pipenv/default.nix
index 30d8992bb98..3deb7b9643c 100644
--- a/pkgs/development/tools/pipenv/default.nix
+++ b/pkgs/development/tools/pipenv/default.nix
@@ -1,24 +1,35 @@
{ stdenv, python3Packages, pew }:
-with python3Packages; buildPythonApplication rec {
- name = "${pname}-${version}";
- pname = "pipenv";
- version = "2018.11.26";
+with python3Packages;
+buildPythonApplication rec {
+ pname = "pipenv";
+ version = "2018.11.26";
- src = fetchPypi {
- inherit pname version;
- sha256 = "0ip8zsrwmhrankrix0shig9g8q2knmr7b63sh7lqa8a5x03fcwx6";
- };
+ src = fetchPypi {
+ inherit pname version;
+ sha256 = "0ip8zsrwmhrankrix0shig9g8q2knmr7b63sh7lqa8a5x03fcwx6";
+ };
- LC_ALL = "en_US.UTF-8";
+ LC_ALL = "en_US.UTF-8";
- propagatedBuildInputs = [ pew pip requests flake8 parver invoke ];
+ propagatedBuildInputs = [
+ flake8
+ invoke
+ parver
+ pew
+ pip
+ requests
+ ];
- doCheck = false;
+ doCheck = false;
- meta = with stdenv.lib; {
- description = "Python Development Workflow for Humans";
- license = licenses.mit;
- platforms = platforms.all;
- maintainers = with maintainers; [ berdario ];
- };
- }
+ makeWrapperArgs = [
+ "--set PYTHONPATH \"$PYTHONPATH\""
+ ];
+
+ meta = with stdenv.lib; {
+ description = "Python Development Workflow for Humans";
+ license = licenses.mit;
+ platforms = platforms.all;
+ maintainers = with maintainers; [ berdario ];
+ };
+}
diff --git a/pkgs/development/tools/react-native-debugger/default.nix b/pkgs/development/tools/react-native-debugger/default.nix
index 9416b9e4f3e..9a421129955 100644
--- a/pkgs/development/tools/react-native-debugger/default.nix
+++ b/pkgs/development/tools/react-native-debugger/default.nix
@@ -38,11 +38,11 @@ let
];
in stdenv.mkDerivation rec {
name = "react-native-debugger-${version}";
- version = "0.8.2";
+ version = "0.9.7";
src = fetchurl {
url = "https://github.com/jhen0409/react-native-debugger/releases/download/v${version}/rn-debugger-linux-x64.zip";
- sha256 = "0ljhpqanl9rjk9n69if1vrfvac0s73f8by0k6sa4ngvgqzgvq3kb";
+ sha256 = "0f1wvk1550z4imcs60sv229zllcxpykx4b60bw658idr1xc3c0ix";
};
buildInputs = [ unzip ];
diff --git a/pkgs/development/tools/rust/rustup/default.nix b/pkgs/development/tools/rust/rustup/default.nix
index 1da9a10f234..1177423869c 100644
--- a/pkgs/development/tools/rust/rustup/default.nix
+++ b/pkgs/development/tools/rust/rustup/default.nix
@@ -4,16 +4,16 @@
rustPlatform.buildRustPackage rec {
name = "rustup-${version}";
- version = "1.16.0";
+ version = "1.17.0";
src = fetchFromGitHub {
owner = "rust-lang";
repo = "rustup.rs";
rev = version;
- sha256 = "1z9358y01jlpx7xlj56ba1d05dxb98j1wd2agrlhwmidmwp8qbz5";
+ sha256 = "1mf92z89wqqaj3cg2cqf6basvcz47krldmy8ianfkzp323fimqmn";
};
- cargoSha256 = "0syp53s285ixshp6yswly0mwkcl0y2ddj5hc110irqsrvwgss32r";
+ cargoSha256 = "0y7kbihdrpd35dw24qqqzmccvjdy6arka10p5rnv38d420f1bpzd";
nativeBuildInputs = [ pkgconfig ];
@@ -37,7 +37,11 @@ rustPlatform.buildRustPackage rec {
postInstall = ''
pushd $out/bin
mv rustup-init rustup
- for link in cargo rustc rustdoc rust-gdb rust-lldb rls rustfmt cargo-fmt cargo-clippy; do
+ binlinks=(
+ cargo rustc rustdoc rust-gdb rust-lldb rls rustfmt cargo-fmt
+ cargo-clippy clippy-driver cargo-miri
+ )
+ for link in ''${binlinks[@]}; do
ln -s rustup $link
done
popd
diff --git a/pkgs/development/tools/skaffold/default.nix b/pkgs/development/tools/skaffold/default.nix
index 2e9093bfae6..b7f8da65764 100644
--- a/pkgs/development/tools/skaffold/default.nix
+++ b/pkgs/development/tools/skaffold/default.nix
@@ -2,9 +2,9 @@
buildGoPackage rec {
name = "skaffold-${version}";
- version = "0.21.1";
- # rev is the 0.21.1 commit, mainly for skaffold version command output
- rev = "a73671cb547a80d3437f78d046bc500269673ea3";
+ version = "0.24.0";
+ # rev is the 0.24.0 commit, mainly for skaffold version command output
+ rev = "6a829c4b29e3a102b0b14c4584cd174f780402e9";
goPackagePath = "github.com/GoogleContainerTools/skaffold";
subPackages = ["cmd/skaffold"];
@@ -20,7 +20,7 @@ buildGoPackage rec {
owner = "GoogleContainerTools";
repo = "skaffold";
rev = "v${version}";
- sha256 = "0n4gqri4rmah1brckj9d4vidm6faabvwfy5smhpl3f6flyv3slsy";
+ sha256 = "0i1gafyi8wlnfpmkivxarvh2kiickz105cdmpjkxya54rhl4c7i7";
};
meta = {
diff --git a/pkgs/development/tools/skopeo/default.nix b/pkgs/development/tools/skopeo/default.nix
index d44b3d4ec4f..90a4ee317ee 100644
--- a/pkgs/development/tools/skopeo/default.nix
+++ b/pkgs/development/tools/skopeo/default.nix
@@ -5,13 +5,13 @@
with stdenv.lib;
let
- version = "0.1.34";
+ version = "0.1.35";
src = fetchFromGitHub {
rev = "v${version}";
owner = "containers";
repo = "skopeo";
- sha256 = "1drbbjqih69nvgynjcz0js0vi6sgsax8565zbrmf8fkbk609c7r3";
+ sha256 = "0lp1w8w0jr6x1gnx8lcrc7cqkv3xirrfvan51b7mrzckr9bc45bf";
};
defaultPolicyFile = runCommand "skopeo-default-policy.json" {} "cp ${src}/default-policy.json $out";
diff --git a/pkgs/development/tools/vagrant/default.nix b/pkgs/development/tools/vagrant/default.nix
index 8f68471f1e3..2d4bae560bd 100644
--- a/pkgs/development/tools/vagrant/default.nix
+++ b/pkgs/development/tools/vagrant/default.nix
@@ -37,6 +37,7 @@ in buildRubyGem rec {
src = fetchurl { inherit url sha256; };
patches = [
+ ./unofficial-installation-nowarn.patch
./use-system-bundler-version.patch
./0004-Support-system-installed-plugins.patch
];
diff --git a/pkgs/development/tools/vim-vint/default.nix b/pkgs/development/tools/vim-vint/default.nix
index ab90bb27bd5..8f3df66ec37 100644
--- a/pkgs/development/tools/vim-vint/default.nix
+++ b/pkgs/development/tools/vim-vint/default.nix
@@ -17,10 +17,10 @@ buildPythonApplication rec {
disabled = ! pythonAtLeast "3.5";
# Prevent setup.py from adding dependencies in run-time and insisting on specific package versions
- patchPhase = ''
+ postPatch = ''
substituteInPlace setup.py --replace "return requires" "return []"
- '';
- buildInputs = [ coverage pytest pytestcov ];
+ '';
+ checkInputs = [ pytest ];
propagatedBuildInputs = [ ansicolor chardet pyyaml ] ;
# The acceptance tests check for stdout and location of binary files, which fails in nix-build.
diff --git a/pkgs/games/arx-libertatis/default.nix b/pkgs/games/arx-libertatis/default.nix
index 1ac5ce5007d..a8e9063a35f 100644
--- a/pkgs/games/arx-libertatis/default.nix
+++ b/pkgs/games/arx-libertatis/default.nix
@@ -1,24 +1,36 @@
-{ stdenv, fetchFromGitHub, cmake, zlib, boost,
- openal, glm, freetype, libGLU_combined, glew, SDL2,
- dejavu_fonts, inkscape, optipng, imagemagick }:
+{ stdenv, fetchFromGitHub, cmake, zlib, boost
+, openal, glm, freetype, libGLU, SDL2, epoxy
+, dejavu_fonts, inkscape, optipng, imagemagick
+, withCrashReporter ? !stdenv.isDarwin
+, qt5 ? null
+, curl ? null
+, gdb ? null
+}:
+
+with stdenv.lib;
stdenv.mkDerivation rec {
name = "arx-libertatis-${version}";
- version = "2018-08-26";
+ version = "2019-02-16";
src = fetchFromGitHub {
owner = "arx";
repo = "ArxLibertatis";
- rev = "7b551739cc22fa25dae83bcc1a2b784ddecc729c";
- sha256 = "1ybv3p74rywn0ajdbw7pyk7pd7py1db9h6x2pav2d28ndkkj4z8n";
+ rev = "fbce6ccbc7f58583f33f29b838c38ef527edc267";
+ sha256 = "0qrygp09dqhpb5q6a1zl6l03qh9bi7xcahd8hy9177z1cix3k0kz";
};
- buildInputs = [
- cmake zlib boost openal glm
- freetype libGLU_combined glew SDL2 inkscape
- optipng imagemagick
+
+ nativeBuildInputs = [
+ cmake inkscape imagemagick optipng
];
+ buildInputs = [
+ zlib boost openal glm
+ freetype libGLU SDL2 epoxy
+ ] ++ optionals withCrashReporter [ qt5.qtbase curl ]
+ ++ optionals stdenv.isLinux [ gdb ];
+
cmakeFlags = [
"-DDATA_DIR_PREFIXES=$out/share"
"-DImageMagick_convert_EXECUTABLE=${imagemagick.out}/bin/convert"
@@ -33,7 +45,7 @@ stdenv.mkDerivation rec {
$out/share/games/arx/misc/dejavusansmono.ttf
'';
- meta = with stdenv.lib; {
+ meta = {
description = ''
A cross-platform, open source port of Arx Fatalis, a 2002
first-person role-playing game / dungeon crawler
diff --git a/pkgs/games/factorio/default.nix b/pkgs/games/factorio/default.nix
index 0cafddefa99..847a605d47e 100644
--- a/pkgs/games/factorio/default.nix
+++ b/pkgs/games/factorio/default.nix
@@ -53,11 +53,11 @@ let
x86_64-linux = let bdist = bdistForArch { inUrl = "linux64"; inTar = "x64"; }; in {
alpha = {
stable = bdist { sha256 = "0b4hbpdcrh5hgip9q5dkmw22p66lcdhnr0kmb0w5dw6yi7fnxxh0"; version = "0.16.51"; withAuth = true; };
- experimental = bdist { sha256 = "0s8fhf790wwmckhi8wdbc036gg5vs1mrj3gd38ln4ynx9s3jb1z8"; version = "0.17.2"; withAuth = true; };
+ experimental = bdist { sha256 = "1a3h24y2s9h8j4vcwzsgzgsgp6xaa522qzrmckfslbjxwqka2sqx"; version = "0.17.6"; withAuth = true; };
};
headless = {
stable = bdist { sha256 = "0zrnpg2js0ysvx9y50h3gajldk16mv02dvrwnkazh5kzr1d9zc3c"; version = "0.16.51"; };
- experimental = bdist { sha256 = "0gp3csf2dckvv0nf5k3cwylda4zpijlz3g18s10jgfxj03a6aly6"; version = "0.17.2"; };
+ experimental = bdist { sha256 = "0bw12njp2smy2x99s7mrlbafvd8jnmw3a1zm6lkpiy20kn4mmqbc"; version = "0.17.6"; };
};
demo = {
stable = bdist { sha256 = "0zf61z8937yd8pyrjrqdjgd0rjl7snwrm3xw86vv7s7p835san6a"; version = "0.16.51"; };
diff --git a/pkgs/games/gcompris/default.nix b/pkgs/games/gcompris/default.nix
index 52d0bf778f9..8425933928d 100644
--- a/pkgs/games/gcompris/default.nix
+++ b/pkgs/games/gcompris/default.nix
@@ -1,4 +1,4 @@
-{stdenv, cmake, qtbase, fetchurl, qtdeclarative, qtmultimedia, qttools, qtsensors, qmlbox2d, gettext, qtquickcontrols, qtgraphicaleffects, makeWrapper,
+{stdenv, cmake, qtbase, fetchurl, qtdeclarative, qtmultimedia, qttools, qtsensors, qmlbox2d, gettext, qtquickcontrols, qtgraphicaleffects, qtxmlpatterns, makeWrapper,
gst_all_1, ninja
}:
stdenv.mkDerivation rec {
@@ -13,7 +13,7 @@ stdenv.mkDerivation rec {
cmakeFlags = "-DQML_BOX2D_LIBRARY=${qmlbox2d}/${qtbase.qtQmlPrefix}/Box2D.2.0";
nativeBuildInputs = [ cmake ninja makeWrapper ];
- buildInputs = [ qtbase qtdeclarative qttools qtsensors qmlbox2d gettext qtquickcontrols qtmultimedia qtgraphicaleffects] ++ soundPlugins;
+ buildInputs = [ qtbase qtdeclarative qttools qtsensors qmlbox2d gettext qtquickcontrols qtmultimedia qtgraphicaleffects qtxmlpatterns] ++ soundPlugins;
soundPlugins = with gst_all_1; [gst-plugins-good gstreamer gst-plugins-base gst-plugins-bad];
postInstall = ''
diff --git a/pkgs/games/instead/default.nix b/pkgs/games/instead/default.nix
index d22e65b1c02..b0acd789afe 100644
--- a/pkgs/games/instead/default.nix
+++ b/pkgs/games/instead/default.nix
@@ -1,7 +1,7 @@
{ stdenv, fetchurl, SDL, SDL_ttf, SDL_image, SDL_mixer, pkgconfig, lua, zlib, unzip }:
let
- version = "3.2.2";
+ version = "3.3.0";
# I took several games at random from http://instead.syscall.ru/games/
games = [
@@ -33,7 +33,7 @@ stdenv.mkDerivation rec {
src = fetchurl {
url = "mirror://sourceforge/project/instead/instead/${version}/instead_${version}.tar.gz";
- sha256 = "07zgbp8jyxkap3jccgv1ifmrgh6q7xsf18kyla2swdlaahp76gpx";
+ sha256 = "0kskwrq2gy1gpp97134sjrw08ip1h6i5dc64zrbl9yv7jaz4by69";
};
NIX_LDFLAGS = "-llua -lgcc_s";
diff --git a/pkgs/games/minetest/default.nix b/pkgs/games/minetest/default.nix
index 110403af2ac..6824653a6fb 100644
--- a/pkgs/games/minetest/default.nix
+++ b/pkgs/games/minetest/default.nix
@@ -72,11 +72,9 @@ let
};
v5 = {
- version = "git-5.0.0-dev-2019-01-08";
- rev = "95d4ff6d1b62945decc85003a99588bb0539c45b";
- sha256 = "1qn42d2lfgwadb26mix6c7j457zsl8cqqjfwhaa8y34hii1q44bw";
- dataRev = "a2c9523bce5bcefdc930ff6f14d6d94f57473be9";
- dataSha256 = "1p26zvnmq99cqlrby4294mp2fmp8iqdcjld0ph39x41ifc50lfdf";
+ version = "5.0.0";
+ sha256 = "1b8n8nzlvmld1hl3zgs1xg4jbc1nsf1m2bn7fi794vdr06s6n911";
+ dataSha256 = "186i1pna2f3fwa2001y8mw5131h0sndhfdxzfqq2gnr1m83sjm0w";
};
in {
diff --git a/pkgs/games/steam/steam.nix b/pkgs/games/steam/steam.nix
index 95493498f5e..3e29ceb5b01 100644
--- a/pkgs/games/steam/steam.nix
+++ b/pkgs/games/steam/steam.nix
@@ -2,14 +2,14 @@
let
traceLog = "/tmp/steam-trace-dependencies.log";
- version = "1.0.0.56";
+ version = "1.0.0.59";
in stdenv.mkDerivation rec {
name = "steam-original-${version}";
src = fetchurl {
url = "http://repo.steampowered.com/steam/pool/steam/s/steam/steam_${version}.tar.gz";
- sha256 = "01jgp909biqf4rr56kb08jkl7g5xql6r2g4ch6lc71njgcsbn5fs";
+ sha256 = "17yrziy2bmzcppp5v3ycdjll250k4idak4rjakmw8gvr96whs255";
};
makeFlags = [ "DESTDIR=$(out)" "PREFIX=" ];
diff --git a/pkgs/games/stepmania/default.nix b/pkgs/games/stepmania/default.nix
index 4f9406abd83..75d28d46776 100644
--- a/pkgs/games/stepmania/default.nix
+++ b/pkgs/games/stepmania/default.nix
@@ -1,9 +1,9 @@
-{ stdenv, lib, fetchFromGitHub, cmake, nasm
+{ clangStdenv, lib, fetchFromGitHub, cmake, nasm
, gtk2, glib, ffmpeg, alsaLib, libmad, libogg, libvorbis
, glew, libpulseaudio, udev
}:
-stdenv.mkDerivation rec {
+clangStdenv.mkDerivation rec {
name = "stepmania-${version}";
version = "5.0.12";
diff --git a/pkgs/games/super-tux-kart/default.nix b/pkgs/games/super-tux-kart/default.nix
index a7b82b8913f..a81d7f33d43 100644
--- a/pkgs/games/super-tux-kart/default.nix
+++ b/pkgs/games/super-tux-kart/default.nix
@@ -1,4 +1,4 @@
-{ stdenv, fetchFromGitHub, fetchsvn, cmake, pkgconfig
+{ stdenv, fetchFromGitHub, fetchsvn, fetchpatch, cmake, pkgconfig
, openal, freealut, libGLU_combined, libvorbis, libogg, gettext, curl, freetype
, fribidi, libtool, bluez, libjpeg, libpng, zlib, libX11, libXrandr }:
@@ -34,6 +34,14 @@ in stdenv.mkDerivation rec {
curl fribidi bluez libjpeg libpng
];
+ # https://github.com/supertuxkart/stk-code/issues/3557#issuecomment-440794379
+ patches = [
+ (fetchpatch {
+ url = "https://github.com/supertuxkart/stk-code/commit/3a3953f38c3555e87f3608d0291dbfccf34e9775.patch";
+ sha256 = "13mr5pwf45g7frpxzlxiyiq39qi3z9spd7l6gi8i3dr3li9wrb1k";
+ })
+ ];
+
enableParallelBuilding = true;
cmakeFlags = [
diff --git a/pkgs/games/trigger/default.nix b/pkgs/games/trigger/default.nix
index ae16510fdc5..0050ef19cea 100644
--- a/pkgs/games/trigger/default.nix
+++ b/pkgs/games/trigger/default.nix
@@ -2,11 +2,11 @@
, SDL2, freealut, SDL2_image, openal, physfs, zlib, libGLU_combined, glew }:
stdenv.mkDerivation rec {
- name = "trigger-rally-0.6.5";
+ name = "trigger-rally-0.6.6";
src = fetchurl {
url = "mirror://sourceforge/trigger-rally/${name}.tar.gz";
- sha256 = "095s4sx0s1ijlarkh84rvzlv4nxh9llrsal1lb3m3pf0v228gnzj";
+ sha256 = "08qa2f2s8zyn42ff6jb1gsi64d916020ixkzvl16kbb88rabqra8";
};
buildInputs = [ SDL2 freealut SDL2_image openal physfs zlib libGLU_combined glew ];
diff --git a/pkgs/games/xpilot/default.nix b/pkgs/games/xpilot/default.nix
index 86412c0fa76..2ae25e957bb 100644
--- a/pkgs/games/xpilot/default.nix
+++ b/pkgs/games/xpilot/default.nix
@@ -1,23 +1,20 @@
-{stdenv, fetchurl, libX11, libSM, SDL, libGLU_combined, expat, SDL_ttf, SDL_image, zlib}:
-let
- buildInputs = [
- libX11 libSM SDL SDL_ttf SDL_image libGLU_combined expat zlib
- ];
-in
+{ stdenv, fetchurl, libX11, libSM, SDL, libGLU_combined, expat, SDL_ttf
+, SDL_image, zlib, libXxf86misc }:
stdenv.mkDerivation rec {
- version = "4.7.3";
name = "xpilot-ng-${version}";
- inherit buildInputs;
+ version = "4.7.3";
src = fetchurl {
url = "mirror://sourceforge/xpilot/xpilot_ng/${name}/${name}.tar.gz";
sha256 = "02a7pnp88kh88fzda5q8mzlckk6y9r5fw47j00h26wbsfly0k1zj";
};
- meta = {
- inherit version;
- description = ''A multiplayer X11 space combat game'';
+ buildInputs = [
+ libX11 libSM SDL SDL_ttf SDL_image libGLU_combined expat zlib libXxf86misc
+ ];
+ meta = with stdenv.lib; {
+ description = "A multiplayer X11 space combat game";
homepage = http://xpilot.sf.net/;
- license = stdenv.lib.licenses.gpl2Plus ;
- maintainers = [stdenv.lib.maintainers.raskin];
- platforms = stdenv.lib.platforms.linux;
+ license = licenses.gpl2Plus;
+ maintainers = [ maintainers.raskin ];
+ platforms = platforms.linux;
};
}
diff --git a/pkgs/misc/vim-plugins/overrides.nix b/pkgs/misc/vim-plugins/overrides.nix
index 8b7789cf622..9fcbf123c5c 100644
--- a/pkgs/misc/vim-plugins/overrides.nix
+++ b/pkgs/misc/vim-plugins/overrides.nix
@@ -1,5 +1,5 @@
{ lib, stdenv
-, python, cmake, vim, ruby
+, python, cmake, meson, vim, ruby
, which, fetchgit, fetchurl
, llvmPackages, rustPlatform
, xkb-switch, fzf, skim
@@ -160,6 +160,12 @@ self: super: {
dependencies = with super; [ webapi-vim ];
});
+ meson = buildVimPluginFrom2Nix {
+ inherit (meson) pname version src;
+ preInstall = "cd data/syntax-highlighting/vim";
+ meta.maintainers = with stdenv.lib.maintainers; [ vcunat ];
+ };
+
ncm2 = super.ncm2.overrideAttrs(old: {
dependencies = with super; [ nvim-yarp ];
});
diff --git a/pkgs/misc/vim-plugins/update.py b/pkgs/misc/vim-plugins/update.py
index d3412822fdf..8a8e20da8d7 100755
--- a/pkgs/misc/vim-plugins/update.py
+++ b/pkgs/misc/vim-plugins/update.py
@@ -111,16 +111,20 @@ class Plugin:
return copy
-GET_PLUGINS = """(with import {};
+GET_PLUGINS = f"""(with import {{}};
let
+ inherit (vimUtils.override {{inherit vim;}}) buildVimPluginFrom2Nix;
+ generated = callPackage {ROOT}/generated.nix {{
+ inherit buildVimPluginFrom2Nix;
+ }};
hasChecksum = value: lib.isAttrs value && lib.hasAttrByPath ["src" "outputHash"] value;
getChecksum = name: value:
- if hasChecksum value then {
+ if hasChecksum value then {{
submodules = value.src.fetchSubmodules or false;
sha256 = value.src.outputHash;
rev = value.src.rev;
- } else null;
- checksums = lib.mapAttrs getChecksum vimPlugins;
+ }} else null;
+ checksums = lib.mapAttrs getChecksum generated;
in lib.filterAttrs (n: v: v != null) checksums)"""
diff --git a/pkgs/misc/vscode-extensions/wakatime/default.nix b/pkgs/misc/vscode-extensions/wakatime/default.nix
index 77284e4dfa8..df69cb7065b 100644
--- a/pkgs/misc/vscode-extensions/wakatime/default.nix
+++ b/pkgs/misc/vscode-extensions/wakatime/default.nix
@@ -1,4 +1,5 @@
-{ stdenv, wakatime, vscode-utils }:
+{ stdenv
+, wakatime, vscode-utils }:
let
inherit (vscode-utils) buildVscodeMarketplaceExtension;
@@ -12,9 +13,8 @@ in
};
postPatch = ''
- mkdir -p out/wakatime-master
-
- cp -rt out/wakatime-master --no-preserve=all ${wakatime}/lib/python*/site-packages/wakatime
+ mkdir -p dist/wakatime-master
+ cp -rt dist/wakatime-master --no-preserve=all ${wakatime}/lib/python*/site-packages/wakatime
'';
meta = with stdenv.lib; {
diff --git a/pkgs/os-specific/darwin/xcode/sdk-pkgs.nix b/pkgs/os-specific/darwin/xcode/sdk-pkgs.nix
index b848265736e..bb9dc0a03b5 100644
--- a/pkgs/os-specific/darwin/xcode/sdk-pkgs.nix
+++ b/pkgs/os-specific/darwin/xcode/sdk-pkgs.nix
@@ -43,6 +43,7 @@ rec {
cc = clang-unwrapped;
bintools = binutils;
libc = targetIosSdkPkgs.libraries;
+ extraPackages = [ "${sdk}/System" ];
extraBuildCommands = ''
tr '\n' ' ' < $out/nix-support/cc-cflags > cc-cflags.tmp
mv cc-cflags.tmp $out/nix-support/cc-cflags
diff --git a/pkgs/os-specific/linux/bcc/default.nix b/pkgs/os-specific/linux/bcc/default.nix
index d66c5dad771..885de8163be 100644
--- a/pkgs/os-specific/linux/bcc/default.nix
+++ b/pkgs/os-specific/linux/bcc/default.nix
@@ -19,7 +19,7 @@ python.pkgs.buildPythonApplication rec {
buildInputs = [
llvmPackages.llvm llvmPackages.clang-unwrapped kernel
elfutils luajit netperf iperf
- systemtap.stapBuild
+ systemtap.stapBuild flex
];
patches = [
diff --git a/pkgs/os-specific/linux/cryptsetup/default.nix b/pkgs/os-specific/linux/cryptsetup/default.nix
index f4c83a58823..fac62597013 100644
--- a/pkgs/os-specific/linux/cryptsetup/default.nix
+++ b/pkgs/os-specific/linux/cryptsetup/default.nix
@@ -5,13 +5,13 @@
assert enablePython -> python2 != null;
stdenv.mkDerivation rec {
- name = "cryptsetup-2.0.6";
+ name = "cryptsetup-2.1.0";
outputs = [ "out" "dev" "man" ];
src = fetchurl {
- url = "mirror://kernel/linux/utils/cryptsetup/v2.0/${name}.tar.xz";
- sha256 = "0c1x125s7p4ps13spsqrcsd9dclz01vsrchmypq9msp7y3hgllbw";
+ url = "mirror://kernel/linux/utils/cryptsetup/v2.1/${name}.tar.xz";
+ sha256 = "15y8n547garz0x5kqv09gscdsrz0c0y1y6c5cp8pccwg3xsb5vm3";
};
# Disable 4 test cases that fail in a sandbox
diff --git a/pkgs/os-specific/linux/forkstat/default.nix b/pkgs/os-specific/linux/forkstat/default.nix
index bde2cbbafa6..5d304d8ac03 100644
--- a/pkgs/os-specific/linux/forkstat/default.nix
+++ b/pkgs/os-specific/linux/forkstat/default.nix
@@ -2,10 +2,10 @@
stdenv.mkDerivation rec {
name = "forkstat-${version}";
- version = "0.02.03";
+ version = "0.02.09";
src = fetchurl {
- url = "http://kernel.ubuntu.com/~cking/tarballs/forkstat/forkstat-${version}.tar.gz";
- sha256 = "1dl95ijs9bs9s9i629bi88qmvxjl25ym742gc063bysbp8drban1";
+ url = "http://kernel.ubuntu.com/~cking/tarballs/forkstat/forkstat-${version}.tar.xz";
+ sha256 = "1h5ha9w6rawh9kx39swjxs029202qxi0j9w38y7ilwq5pj447bxw";
};
installFlags = [ "DESTDIR=$(out)" ];
postInstall = ''
diff --git a/pkgs/os-specific/linux/fuse/default.nix b/pkgs/os-specific/linux/fuse/default.nix
index e8d272622ce..0c4df18afb3 100644
--- a/pkgs/os-specific/linux/fuse/default.nix
+++ b/pkgs/os-specific/linux/fuse/default.nix
@@ -11,7 +11,7 @@ in {
};
fuse_3 = mkFuse {
- version = "3.4.1";
- sha256Hash = "1aihvklhqx7abqiy5n9gns7gryqgjldhzghigwrqwnwvf9z0ggyx";
+ version = "3.4.2";
+ sha256Hash = "1w39fkasq9314qx141xb8v5qqcfvqbpr3higc4vv8y4b4i58fapi";
};
}
diff --git a/pkgs/os-specific/linux/kernel/linux-4.14.nix b/pkgs/os-specific/linux/kernel/linux-4.14.nix
index df5f34ed7db..85719c52b7f 100644
--- a/pkgs/os-specific/linux/kernel/linux-4.14.nix
+++ b/pkgs/os-specific/linux/kernel/linux-4.14.nix
@@ -3,7 +3,7 @@
with stdenv.lib;
buildLinux (args // rec {
- version = "4.14.104";
+ version = "4.14.105";
# modDirVersion needs to be x.y.z, will automatically add .0 if needed
modDirVersion = if (modDirVersionArg == null) then concatStrings (intersperse "." (take 3 (splitString "." "${version}.0"))) else modDirVersionArg;
@@ -13,6 +13,6 @@ buildLinux (args // rec {
src = fetchurl {
url = "mirror://kernel/linux/kernel/v4.x/linux-${version}.tar.xz";
- sha256 = "0rz0gg5dhgga58ywaylmvkwz4wlw38z3bxszkdwsb38kclz0whyx";
+ sha256 = "1sgnccr9aadaaivjnlfzmy6yylc47w7m7yplc07avl74njcdp2rr";
};
} // (args.argsOverride or {}))
diff --git a/pkgs/os-specific/linux/kernel/linux-4.19.nix b/pkgs/os-specific/linux/kernel/linux-4.19.nix
index 60890ce6ed7..e920cafa082 100644
--- a/pkgs/os-specific/linux/kernel/linux-4.19.nix
+++ b/pkgs/os-specific/linux/kernel/linux-4.19.nix
@@ -3,7 +3,7 @@
with stdenv.lib;
buildLinux (args // rec {
- version = "4.19.26";
+ version = "4.19.27";
# modDirVersion needs to be x.y.z, will automatically add .0 if needed
modDirVersion = if (modDirVersionArg == null) then concatStrings (intersperse "." (take 3 (splitString "." "${version}.0"))) else modDirVersionArg;
@@ -13,6 +13,6 @@ buildLinux (args // rec {
src = fetchurl {
url = "mirror://kernel/linux/kernel/v4.x/linux-${version}.tar.xz";
- sha256 = "1z27nxyi3asj1fbkgdb3rw3x9jx2wyfyhddw5dpmjfa7r5k5zi5y";
+ sha256 = "0ibjd1cq5hp22hk4hj546jf8j6d2pxhxx9440p73lc26gksppd81";
};
} // (args.argsOverride or {}))
diff --git a/pkgs/os-specific/linux/kernel/linux-4.20.nix b/pkgs/os-specific/linux/kernel/linux-4.20.nix
index 0ccffd91832..ed11ea2f80d 100644
--- a/pkgs/os-specific/linux/kernel/linux-4.20.nix
+++ b/pkgs/os-specific/linux/kernel/linux-4.20.nix
@@ -3,7 +3,7 @@
with stdenv.lib;
buildLinux (args // rec {
- version = "4.20.13";
+ version = "4.20.14";
# modDirVersion needs to be x.y.z, will automatically add .0 if needed
modDirVersion = if (modDirVersionArg == null) then concatStrings (intersperse "." (take 3 (splitString "." "${version}.0"))) else modDirVersionArg;
@@ -13,6 +13,6 @@ buildLinux (args // rec {
src = fetchurl {
url = "mirror://kernel/linux/kernel/v4.x/linux-${version}.tar.xz";
- sha256 = "1h8axf8wg3g87kjaan2241zq83n5p5769anmc3i8mrm4y2saswqf";
+ sha256 = "108svypw40qhk338v4d0ahgswmdl5c3yj9765lyy23z3m78fc20f";
};
} // (args.argsOverride or {}))
diff --git a/pkgs/os-specific/linux/kernel/linux-4.9.nix b/pkgs/os-specific/linux/kernel/linux-4.9.nix
index 5e7aaa4cbc0..9ff3a06c404 100644
--- a/pkgs/os-specific/linux/kernel/linux-4.9.nix
+++ b/pkgs/os-specific/linux/kernel/linux-4.9.nix
@@ -1,11 +1,11 @@
{ stdenv, buildPackages, fetchurl, perl, buildLinux, ... } @ args:
buildLinux (args // rec {
- version = "4.9.161";
+ version = "4.9.162";
extraMeta.branch = "4.9";
src = fetchurl {
url = "mirror://kernel/linux/kernel/v4.x/linux-${version}.tar.xz";
- sha256 = "19i8igx0pchzd9wgx595alcji8jxl4bpcg5zd33ymyamgq5q67p1";
+ sha256 = "1mdc1l89kbdzmaxn61hvndanamclykc7vq8wyp6b3qf4vi7g8imr";
};
} // (args.argsOverride or {}))
diff --git a/pkgs/os-specific/linux/kernel/linux-5.0.nix b/pkgs/os-specific/linux/kernel/linux-5.0.nix
new file mode 100644
index 00000000000..70ad2ab0072
--- /dev/null
+++ b/pkgs/os-specific/linux/kernel/linux-5.0.nix
@@ -0,0 +1,18 @@
+{ stdenv, buildPackages, fetchurl, perl, buildLinux, modDirVersionArg ? null, ... } @ args:
+
+with stdenv.lib;
+
+buildLinux (args // rec {
+ version = "5.0";
+
+ # modDirVersion needs to be x.y.z, will automatically add .0 if needed
+ modDirVersion = if (modDirVersionArg == null) then concatStrings (intersperse "." (take 3 (splitString "." "${version}.0"))) else modDirVersionArg;
+
+ # branchVersion needs to be x.y
+ extraMeta.branch = concatStrings (intersperse "." (take 2 (splitString "." version)));
+
+ src = fetchurl {
+ url = "mirror://kernel/linux/kernel/v5.x/linux-${version}.tar.xz";
+ sha256 = "0hrf3b1mk1sf8vbl9knccblghmg05d5ypmc2f9d9y5crchd18ys3";
+ };
+} // (args.argsOverride or {}))
diff --git a/pkgs/os-specific/linux/nvidia-x11/builder.sh b/pkgs/os-specific/linux/nvidia-x11/builder.sh
index c0ebb768eea..56012aafea9 100755
--- a/pkgs/os-specific/linux/nvidia-x11/builder.sh
+++ b/pkgs/os-specific/linux/nvidia-x11/builder.sh
@@ -74,7 +74,9 @@ installPhase() {
if [ -n "$bin" ]; then
# Install the X drivers.
mkdir -p $bin/lib/xorg/modules
- cp -p libnvidia-wfb.* $bin/lib/xorg/modules/
+ if [ -f libnvidia-wfb.so ]; then
+ cp -p libnvidia-wfb.* $bin/lib/xorg/modules/
+ fi
mkdir -p $bin/lib/xorg/modules/drivers
cp -p nvidia_drv.so $bin/lib/xorg/modules/drivers
mkdir -p $bin/lib/xorg/modules/extensions
diff --git a/pkgs/os-specific/linux/nvidia-x11/default.nix b/pkgs/os-specific/linux/nvidia-x11/default.nix
index d76a1452455..c729a35925f 100644
--- a/pkgs/os-specific/linux/nvidia-x11/default.nix
+++ b/pkgs/os-specific/linux/nvidia-x11/default.nix
@@ -16,25 +16,25 @@ let
in
rec {
# Policy: use the highest stable version as the default (on our master).
- stable = if stdenv.hostPlatform.system == "x86_64-linux" then stable_415 else legacy_390;
+ stable = if stdenv.hostPlatform.system == "x86_64-linux" then stable_418 else legacy_390;
# No active beta right now
beta = stable;
- stable_415 = generic {
- version = "415.27";
- sha256_64bit = "12ylf1h1wpgkd0g7r30c33hhhialn315k5sbxyzks0rm42k7cay8";
- settingsSha256 = "0m8hfxb6fhanqlkkk4ayn1blgdsvnn0ipxdl19ifdl200ln6j053";
- persistencedSha256 = "0i6ik6xv6rnwcd6vg5xrxcd9g7nzca3vkiy2srbv0simw86nwgdz";
+ stable_418 = generic {
+ version = "418.43";
+ sha256_64bit = "0zrjd8wfc8cknfwiyy3llsnn1mympfxxszz7gzakncp3vs1jrghq";
+ settingsSha256 = "1rzxxn7nrhwndl2lgjakxi0rblfkqjyl1n70fl7rcs6g75mi1qsq";
+ persistencedSha256 = "14m4x5r0yc23sg4xx523ccfpxsr6dgm2n3xy9zdibl1cpzz50ikc";
};
# Last one supporting x86
legacy_390 = generic {
- version = "390.87";
- sha256_32bit = "0rlr1f4lnpb8c4qz4w5r8xw5gdy9bzz26qww45qyl1qav3wwaaaw";
- sha256_64bit = "07k1kq8lkgbvjyr2dnbxcz6nppcwpq17wf925w8kfq78345hla9q";
- settingsSha256 = "0xlaiy7jr95z0v2c6cwll89nxnb142pybw7m08jg44r7n13ffv3r";
- persistencedSha256 = "0mhwk321garyl6m12261cj03ycv0qz1sbrlbq6cqwjpq4f1s7h58";
+ version = "390.116";
+ sha256_32bit = "0aavzi99ps7r6nrchf4h9gw3fkvm2z6wppkqkz5fwcy7x03ky4qk";
+ sha256_64bit = "106qc62a7m9imchqfq8rfn8fwyrjxg383354q7z2wr8112fyhyg1";
+ settingsSha256 = "0inmzjhnlal5ih2iyv2x4y3jx7c4lz9xln8sy9j20yj9azp51qz0";
+ persistencedSha256 = "04ycijijlcbib2afcxjsyyzza1i3adh17sddrz3sah7rj38mrlgx";
patches = lib.optional (kernel.meta.branch == "4.19") ./drm_mode_connector.patch;
};
diff --git a/pkgs/os-specific/linux/s6-linux-utils/default.nix b/pkgs/os-specific/linux/s6-linux-utils/default.nix
index 0d208a6eb55..bd6b84ea73c 100644
--- a/pkgs/os-specific/linux/s6-linux-utils/default.nix
+++ b/pkgs/os-specific/linux/s6-linux-utils/default.nix
@@ -4,8 +4,8 @@ with skawarePackages;
buildPackage {
pname = "s6-linux-utils";
- version = "2.5.0.0";
- sha256 = "04q2z71dkzahd2ppga2zikclz2qk014c23gm7rigqxjc8rs1amvq";
+ version = "2.5.0.1";
+ sha256 = "0bpcaah3rbz4i013bkarr7wxmfvisjyxg0z78xg5zfbgajpgjxx1";
description = "A set of minimalistic Linux-specific system utilities";
platforms = stdenv.lib.platforms.linux;
diff --git a/pkgs/os-specific/linux/smemstat/default.nix b/pkgs/os-specific/linux/smemstat/default.nix
index c4d699c395e..6abbd2d1ec5 100644
--- a/pkgs/os-specific/linux/smemstat/default.nix
+++ b/pkgs/os-specific/linux/smemstat/default.nix
@@ -2,10 +2,10 @@
stdenv.mkDerivation rec {
name = "smemstat-${version}";
- version = "0.02.00";
+ version = "0.02.03";
src = fetchurl {
- url = "http://kernel.ubuntu.com/~cking/tarballs/smemstat/smemstat-${version}.tar.gz";
- sha256 = "16in8bzsrrcz7mc5qvyvjkxgpzz4bnq8zvkb7vsv6qfgyd3xr1dp";
+ url = "http://kernel.ubuntu.com/~cking/tarballs/smemstat/smemstat-${version}.tar.xz";
+ sha256 = "04q06wb37n4g1dlsjl8j2bwzd7qis4wanm0f4xg8y29br6skljx1";
};
buildInputs = [ ncurses ];
installFlags = [ "DESTDIR=$(out)" ];
diff --git a/pkgs/os-specific/linux/spl/default.nix b/pkgs/os-specific/linux/spl/default.nix
index d8714d9c172..bf435cc862c 100644
--- a/pkgs/os-specific/linux/spl/default.nix
+++ b/pkgs/os-specific/linux/spl/default.nix
@@ -1,5 +1,5 @@
{ fetchFromGitHub, stdenv, autoreconfHook, coreutils, gawk
-
+, fetchpatch
# Kernel dependencies
, kernel
}:
@@ -10,13 +10,13 @@ assert kernel != null;
stdenv.mkDerivation rec {
name = "spl-${version}-${kernel.version}";
- version = "0.7.12";
+ version = "0.7.13";
src = fetchFromGitHub {
owner = "zfsonlinux";
repo = "spl";
rev = "spl-${version}";
- sha256 = "13zqh1g132g63zv54l3bsg5kras9mllkx9wvlnfs13chfr7vpp4p";
+ sha256 = "1rzqgiszy8ad2gx20577azp1y5jgad0907slfzl5y2zb05jgaipa";
};
patches = [ ./install_prefix.patch ];
diff --git a/pkgs/os-specific/linux/spl/install_prefix.patch b/pkgs/os-specific/linux/spl/install_prefix.patch
index 114ca123147..566aab828ef 100644
--- a/pkgs/os-specific/linux/spl/install_prefix.patch
+++ b/pkgs/os-specific/linux/spl/install_prefix.patch
@@ -136,14 +136,12 @@ index 7faab0a..8148b3d 100644
+kerneldir = @prefix@/libexec/spl/include/vm
kernel_HEADERS = $(KERNEL_H)
endif
-diff --git a/module/Makefile.in b/module/Makefile.in
-index d4e62e1..73fa01c 100644
--- a/module/Makefile.in
+++ b/module/Makefile.in
-@@ -21,15 +21,15 @@ clean:
+@@ -21,22 +21,22 @@
modules_install:
@# Install the kernel modules
- $(MAKE) -C @LINUX_OBJ@ SUBDIRS=`pwd` $@ \
+ $(MAKE) -C @LINUX_OBJ@ M=`pwd` $@ \
- INSTALL_MOD_PATH=$(DESTDIR)$(INSTALL_MOD_PATH) \
+ INSTALL_MOD_PATH=@prefix@/$(INSTALL_MOD_PATH) \
INSTALL_MOD_DIR=$(INSTALL_MOD_DIR) \
@@ -160,3 +158,11 @@ index d4e62e1..73fa01c 100644
if [ -f $$sysmap ]; then \
depmod -ae -F $$sysmap @LINUX_VERSION@; \
fi
+
+ modules_uninstall:
+ @# Uninstall the kernel modules
+- kmoddir=$(DESTDIR)$(INSTALL_MOD_PATH)/lib/modules/@LINUX_VERSION@
++ kmoddir=@prefix@/$(INSTALL_MOD_PATH)/lib/modules/@LINUX_VERSION@
+ list='$(subdir-m)'; for subdir in $$list; do \
+ $(RM) -R $$kmoddir/$(INSTALL_MOD_DIR)/$$subdir; \
+ done
diff --git a/pkgs/os-specific/linux/sysvinit/default.nix b/pkgs/os-specific/linux/sysvinit/default.nix
index 0927934b0ba..8549e7ccd54 100644
--- a/pkgs/os-specific/linux/sysvinit/default.nix
+++ b/pkgs/os-specific/linux/sysvinit/default.nix
@@ -1,13 +1,13 @@
{ stdenv, fetchurl, withoutInitTools ? false }:
-let version = "2.93"; in
+let version = "2.94"; in
stdenv.mkDerivation {
name = (if withoutInitTools then "sysvtools" else "sysvinit") + "-" + version;
src = fetchurl {
url = "mirror://savannah/sysvinit/sysvinit-${version}.tar.xz";
- sha256 = "1zx84vrzv615na661dd6mg4wh999m0jp25lsa241961x4c74cba7";
+ sha256 = "05wshfgrijp3pi9rpfsa0yx4w3bf5v6hlwjqw79nlhz53xjca2by";
};
prePatch = ''
diff --git a/pkgs/os-specific/linux/wireless-tools/default.nix b/pkgs/os-specific/linux/wireless-tools/default.nix
index f883bf0d226..687bb7647cf 100644
--- a/pkgs/os-specific/linux/wireless-tools/default.nix
+++ b/pkgs/os-specific/linux/wireless-tools/default.nix
@@ -1,17 +1,21 @@
{stdenv, fetchurl}:
stdenv.mkDerivation rec {
- name = "wireless-tools-${version}";
- version = "30.pre2";
+ pname = "wireless-tools";
+ version = "30.pre9";
src = fetchurl {
url = "http://www.hpl.hp.com/personal/Jean_Tourrilhes/Linux/wireless_tools.${version}.tar.gz";
- sha256 = "01lgf592nk8fnk7l5afqvar4szkngwpgcv4xh58qsg9wkkjlhnls";
+ sha256 = "0qscyd44jmhs4k32ggp107hlym1pcyjzihiai48xs7xzib4wbndb";
};
- preBuild = "
- makeFlagsArray=(PREFIX=$out CC=$CC LDCONFIG=: AR=$AR RANLIB=$RANLIB)
- ";
+ makeFlags = [
+ "PREFIX=${placeholder "out"}"
+ "CC:=$(CC)"
+ "AR:=$(AR)"
+ "RANLIB:=$(RANLIB)"
+ "LDCONFIG=:"
+ ];
meta = {
platforms = stdenv.lib.platforms.linux;
diff --git a/pkgs/os-specific/linux/zfs/default.nix b/pkgs/os-specific/linux/zfs/default.nix
index 73be13e17af..28a4836bf00 100644
--- a/pkgs/os-specific/linux/zfs/default.nix
+++ b/pkgs/os-specific/linux/zfs/default.nix
@@ -159,17 +159,18 @@ in {
# to be adapted
zfsStable = common {
# comment/uncomment if breaking kernel versions are known
- incompatibleKernelVersion = "4.20";
+ # incompatibleKernelVersion = "4.20";
# this package should point to the latest release.
- version = "0.7.12";
+ version = "0.7.13";
- sha256 = "1j432nb3a86isghdysir9xi6l5djmb5fbc5s9zr0rwg4ziisskbh";
+ sha256 = "1l77bq7pvc54vl15pnrjd0njgpf00qjzy0x85dpfh5jxng84x1fb";
extraPatches = [
+ # in case this gets out of date, just send Mic92 a pull request!
(fetchpatch {
- url = "https://github.com/Mic92/zfs/compare/zfs-0.7.0-rc3...nixos-zfs-0.7.0-rc3.patch";
- sha256 = "1vlw98v8xvi8qapzl1jwm69qmfslwnbg3ry1lmacndaxnyckkvhh";
+ url = "https://github.com/Mic92/zfs/commit/cf23c1d38bfc698a8a729fc0c5f9ca41591f4d95.patch";
+ sha256 = "14v3x9ipvg2qd1vyf70nv909jd5zdxlsw5y8k60pfyvwm7g80wr5";
})
];
@@ -187,6 +188,7 @@ in {
isUnstable = true;
extraPatches = [
+ # in case this gets out of date, just send Mic92 a pull request!
(fetchpatch {
url = "https://github.com/Mic92/zfs/commit/bc29b5783da0af2c80c85126a1831ce1d52bfb69.patch";
sha256 = "1sdcr1w2jp3djpwlf1f91hrxxmc34q0jl388smdkxh5n5bpw5gzw";
diff --git a/pkgs/servers/amqp/rabbitmq-server/default.nix b/pkgs/servers/amqp/rabbitmq-server/default.nix
index 5f8358a45d6..b34a44715a5 100644
--- a/pkgs/servers/amqp/rabbitmq-server/default.nix
+++ b/pkgs/servers/amqp/rabbitmq-server/default.nix
@@ -6,11 +6,11 @@
stdenv.mkDerivation rec {
name = "rabbitmq-server-${version}";
- version = "3.7.11";
+ version = "3.7.12";
src = fetchurl {
url = "https://github.com/rabbitmq/rabbitmq-server/releases/download/v${version}/${name}.tar.xz";
- sha256 = "04m9ikm7ywx63y68lf3rxds97nr9czdzg82c1m1f823m89kmpgi0";
+ sha256 = "14w7czxqdxgmsqxrvphzpyha1nq3yfhka4vy8wyzwixindgj493q";
};
buildInputs =
diff --git a/pkgs/servers/bird/default.nix b/pkgs/servers/bird/default.nix
index 7e0bf298b02..7fdbfb6472c 100644
--- a/pkgs/servers/bird/default.nix
+++ b/pkgs/servers/bird/default.nix
@@ -46,18 +46,18 @@ in
{
bird = generic {
- version = "1.6.3";
- sha256 = "0z3yrxqb0p7f8b7r2gk4mvrwfzk45zx7yr9aifbvba1vgksiri9r";
+ version = "1.6.6";
+ sha256 = "0w1dmwx89g3qdy92wkjl3p52rn521izm2m8yq74hs7myxxx3nnwp";
};
bird6 = generic {
- version = "1.6.3";
- sha256 = "0z3yrxqb0p7f8b7r2gk4mvrwfzk45zx7yr9aifbvba1vgksiri9r";
+ version = "1.6.6";
+ sha256 = "0w1dmwx89g3qdy92wkjl3p52rn521izm2m8yq74hs7myxxx3nnwp";
enableIPv6 = true;
};
bird2 = generic {
- version = "2.0.2";
- sha256 = "03s8hcl761y3489j1krarm3r3iy5qid26508i91yvy38ypb92pq3";
+ version = "2.0.4";
+ sha256 = "1phl8ycasbzgla83d9zbzzy1ymjz30k1qh1pmywmjhbxa6vi0q37";
};
}
diff --git a/pkgs/servers/bird/dont-create-sysconfdir-1.patch b/pkgs/servers/bird/dont-create-sysconfdir-1.patch
index 0a11c8a2a8d..8f62670aee9 100644
--- a/pkgs/servers/bird/dont-create-sysconfdir-1.patch
+++ b/pkgs/servers/bird/dont-create-sysconfdir-1.patch
@@ -1,13 +1,6 @@
-diff --git a/tools/Makefile.in b/tools/Makefile.in
-index 062ba91..4fd7453 100644
--- a/tools/Makefile.in
+++ b/tools/Makefile.in
-@@ -68,7 +68,7 @@ tags:
- cd $(srcdir) ; etags -lc `find $(static-dirs) $(addprefix $(objdir)/,$(dynamic-dirs)) $(client-dirs) -name *.[chY]`
-
+@@ -68,2 +68,2 @@
install: all
-- $(INSTALL) -d $(DESTDIR)/$(sbindir) $(DESTDIR)/$(sysconfdir) $(DESTDIR)/@runtimedir@
+- $(INSTALL) -d $(DESTDIR)/$(sbindir) $(DESTDIR)/$(sysconfdir) $(DESTDIR)/$(runstatedir)
+ $(INSTALL) -d $(DESTDIR)/$(sbindir) $(DESTDIR)/$(sysconfdir)
- $(INSTALL_PROGRAM) $(exedir)/bird $(DESTDIR)/$(sbindir)/bird@SUFFIX@
- $(INSTALL_PROGRAM) $(exedir)/birdcl $(DESTDIR)/$(sbindir)/birdcl@SUFFIX@
- if test -n "@CLIENT@" ; then \
diff --git a/pkgs/servers/bird/dont-create-sysconfdir-2.patch b/pkgs/servers/bird/dont-create-sysconfdir-2.patch
index fd86da8a129..24716446118 100644
--- a/pkgs/servers/bird/dont-create-sysconfdir-2.patch
+++ b/pkgs/servers/bird/dont-create-sysconfdir-2.patch
@@ -1,13 +1,6 @@
-diff --git a/Makefile.in b/Makefile.in
-index fdd5e6c..45f81a1 100644
--- a/Makefile.in
+++ b/Makefile.in
-@@ -165,7 +165,7 @@ tags:
- # Install
-
+@@ -165,2 +165,2 @@
install: all
-- $(INSTALL) -d $(DESTDIR)/$(sbindir) $(DESTDIR)/$(sysconfdir) $(DESTDIR)/@runtimedir@
+- $(INSTALL) -d $(DESTDIR)/$(sbindir) $(DESTDIR)/$(sysconfdir) $(DESTDIR)/$(runstatedir)
+ $(INSTALL) -d $(DESTDIR)/$(sbindir) $(DESTDIR)/$(sysconfdir)
- $(INSTALL_PROGRAM) $(exedir)/bird $(DESTDIR)/$(sbindir)/bird
- $(INSTALL_PROGRAM) $(exedir)/birdcl $(DESTDIR)/$(sbindir)/birdcl
- if test -n "@CLIENT@" ; then \
diff --git a/pkgs/servers/consul/default.nix b/pkgs/servers/consul/default.nix
index 38d79eb2ba4..7fc2f8779f6 100644
--- a/pkgs/servers/consul/default.nix
+++ b/pkgs/servers/consul/default.nix
@@ -2,7 +2,7 @@
buildGoPackage rec {
name = "consul-${version}";
- version = "1.4.1";
+ version = "1.4.2";
rev = "v${version}";
goPackagePath = "github.com/hashicorp/consul";
@@ -19,7 +19,7 @@ buildGoPackage rec {
owner = "hashicorp";
repo = "consul";
inherit rev;
- sha256 = "1xd2chx69jdbq2r82d4cgyc8pf1cmmxqvbfz29bf3nvvi6bgq7d5";
+ sha256 = "1nprl9kcb98ikcmk7safji3hl4kfacx0gnh05k8m4ysfz6mr7zri";
};
preBuild = ''
diff --git a/pkgs/servers/dns/bind/default.nix b/pkgs/servers/dns/bind/default.nix
index 550a8fa13cc..0183d745990 100644
--- a/pkgs/servers/dns/bind/default.nix
+++ b/pkgs/servers/dns/bind/default.nix
@@ -8,14 +8,14 @@
assert enableSeccomp -> libseccomp != null;
assert enablePython -> python3 != null;
-let version = "9.12.3-P1"; in
+let version = "9.12.3-P4"; in
stdenv.mkDerivation rec {
name = "bind-${version}";
src = fetchurl {
url = "https://ftp.isc.org/isc/bind9/${version}/${name}.tar.gz";
- sha256 = "0wzdbn6ig851354cjdys5q3gvqcvl2gmmih1gzr8ldl7sy4r7dvc";
+ sha256 = "01pj47z5582rd538dmbzf1msw4jc8j4zr0zx4ciy88r6qr9l80fi";
};
outputs = [ "out" "lib" "dev" "man" "dnsutils" "host" ];
diff --git a/pkgs/servers/dns/knot-dns/default.nix b/pkgs/servers/dns/knot-dns/default.nix
index 659f8d5dea4..fd5e79b6efb 100644
--- a/pkgs/servers/dns/knot-dns/default.nix
+++ b/pkgs/servers/dns/knot-dns/default.nix
@@ -7,11 +7,11 @@ let inherit (stdenv.lib) optional optionals; in
# Note: ATM only the libraries have been tested in nixpkgs.
stdenv.mkDerivation rec {
name = "knot-dns-${version}";
- version = "2.7.6";
+ version = "2.8.0";
src = fetchurl {
url = "https://secure.nic.cz/files/knot-dns/knot-${version}.tar.xz";
- sha256 = "a1cb1877f04f7c2549c977c2658cfafd07c7e0e924f8e8aa8d4ae4b707f697a2";
+ sha256 = "494ad926705018bd754d96711dc2129f3173f326a0b57d33978090ba4eef87ef";
};
outputs = [ "bin" "out" "dev" ];
diff --git a/pkgs/servers/dns/knot-resolver/default.nix b/pkgs/servers/dns/knot-resolver/default.nix
index 04d0a0cf8d0..3882db1124a 100644
--- a/pkgs/servers/dns/knot-resolver/default.nix
+++ b/pkgs/servers/dns/knot-resolver/default.nix
@@ -1,4 +1,4 @@
-{ stdenv, fetchurl, runCommand, pkgconfig, hexdump, which
+{ stdenv, fetchurl, fetchpatch, runCommand, pkgconfig, hexdump, which
, knot-dns, luajit, libuv, lmdb, gnutls, nettle
, cmocka, systemd, dns-root-data, makeWrapper
, extraFeatures ? false /* catch-all if defaults aren't enough */
@@ -19,6 +19,14 @@ unwrapped = stdenv.mkDerivation rec {
sha256 = "d1396888ec3a63f19dccdf2b7dbcb0d16a5d8642766824b47f4c21be90ce362b";
};
+ patches = [
+ (fetchpatch {
+ name = "support-libzscanner-2.8.diff";
+ url = "https://gitlab.labs.nic.cz/knot/knot-resolver/commit/186f263.diff";
+ sha256 = "19zqigvc7m2a4j6bk9whx7gj0v009568rz5qwk052z7pzfikr8mk";
+ })
+ ];
+
# Short-lived cross fix, as upstream is migrating to meson anyway.
postPatch = ''
substituteInPlace platform.mk --replace "objdump" "$OBJDUMP"
diff --git a/pkgs/servers/http/apache-modules/mod_fastcgi/default.nix b/pkgs/servers/http/apache-modules/mod_fastcgi/default.nix
index 64758962102..ff767d9ad43 100644
--- a/pkgs/servers/http/apache-modules/mod_fastcgi/default.nix
+++ b/pkgs/servers/http/apache-modules/mod_fastcgi/default.nix
@@ -1,20 +1,23 @@
{ stdenv, fetchurl, apacheHttpd }:
-stdenv.mkDerivation rec {
- name = "mod_fastcgi-2.4.6";
+let
+ version = "2.4.7.1";
+
+ apache-24-patch = fetchurl {
+ name = "compile-against-apache24.diff";
+ url = "https://projects.archlinux.org/svntogit/packages.git/plain/trunk/compile-against-apache24.diff?h=packages/mod_fastcgi&id=81c7cb99d15682df3bdb1edcaeea5259e9e43a42";
+ sha256 = "000qvrf5jb979i37rimrdivcgjijcffgrpkx38c0rn62z9jz61g4";
+ };
+in
+stdenv.mkDerivation {
+ name = "mod_fastcgi-${version}";
src = fetchurl {
- url = "http://www.fastcgi.com/dist/${name}.tar.gz";
+ url = "https://github.com/FastCGI-Archives/mod_fastcgi/archive/${version}.tar.gz";
sha256 = "12g6vcfl9jl8rqf8lzrkdxg2ngca310d3d6an563xqcgrkp8ga55";
};
- patches =
- [ (fetchurl {
- name = "compile-against-apache24.diff";
- url = "https://projects.archlinux.org/svntogit/packages.git/plain/trunk/compile-against-apache24.diff?h=packages/mod_fastcgi&id=81c7cb99d15682df3bdb1edcaeea5259e9e43a42";
- sha256 = "000qvrf5jb979i37rimrdivcgjijcffgrpkx38c0rn62z9jz61g4";
- })
- ];
+ patches = [ apache-24-patch ];
buildInputs = [ apacheHttpd ];
@@ -24,7 +27,7 @@ stdenv.mkDerivation rec {
'';
meta = {
- homepage = http://www.fastcgi.com/;
+ homepage = https://github.com/FastCGI-Archives/mod_fastcgi;
description = "Provide support for the FastCGI protocol";
longDescription = ''
diff --git a/pkgs/servers/jackett/default.nix b/pkgs/servers/jackett/default.nix
index 0b9e43f4c31..a4940850cc5 100644
--- a/pkgs/servers/jackett/default.nix
+++ b/pkgs/servers/jackett/default.nix
@@ -2,11 +2,11 @@
stdenv.mkDerivation rec {
name = "jackett-${version}";
- version = "0.10.707";
+ version = "0.10.846";
src = fetchurl {
url = "https://github.com/Jackett/Jackett/releases/download/v${version}/Jackett.Binaries.Mono.tar.gz";
- sha256 = "0ks5jsfdwhkr8mr5q73yhv4q6bpab15my4iq1163ad5lcb1981r1";
+ sha256 = "1y1hqa7w04zs6lhyg8624b5iv8l0ni4v887mckaqqp312xmhniq7";
};
buildInputs = [ makeWrapper ];
diff --git a/pkgs/servers/mail/spamassassin/default.nix b/pkgs/servers/mail/spamassassin/default.nix
index 431e66e38fb..094b782abf9 100644
--- a/pkgs/servers/mail/spamassassin/default.nix
+++ b/pkgs/servers/mail/spamassassin/default.nix
@@ -1,11 +1,11 @@
{ stdenv, fetchurl, perlPackages, makeWrapper, gnupg1 }:
perlPackages.buildPerlPackage rec {
- name = "SpamAssassin-3.4.1";
+ name = "SpamAssassin-3.4.2";
src = fetchurl {
url = "mirror://apache/spamassassin/source/Mail-${name}.tar.bz2";
- sha256 = "0la6s5ilamf9129kyjckcma8cr6fpb6b5f2fb64v7106iy0ckhd0";
+ sha256 = "1np8h293bzg33i0xn9gj9krwgr7k6xbyf1yhxr2j2xci95d080yg";
};
# https://bz.apache.org/SpamAssassin/show_bug.cgi?id=7434
diff --git a/pkgs/servers/monitoring/cadvisor/default.nix b/pkgs/servers/monitoring/cadvisor/default.nix
index ff0c926de59..58ef9fa32b9 100644
--- a/pkgs/servers/monitoring/cadvisor/default.nix
+++ b/pkgs/servers/monitoring/cadvisor/default.nix
@@ -13,6 +13,8 @@ stdenv.mkDerivation rec {
nativeBuildInputs = [ go ];
+ GOCACHE="$TMPDIR/go-cache";
+
buildPhase = ''
mkdir -p Godeps/_workspace/src/github.com/google/
ln -s $(pwd) Godeps/_workspace/src/github.com/google/cadvisor
diff --git a/pkgs/servers/monitoring/grafana/default.nix b/pkgs/servers/monitoring/grafana/default.nix
index 721f4a04302..bda717b2afb 100644
--- a/pkgs/servers/monitoring/grafana/default.nix
+++ b/pkgs/servers/monitoring/grafana/default.nix
@@ -1,7 +1,7 @@
{ lib, buildGoPackage, fetchurl, fetchFromGitHub, phantomjs2 }:
buildGoPackage rec {
- version = "6.0.0";
+ version = "6.0.1";
name = "grafana-${version}";
goPackagePath = "github.com/grafana/grafana";
@@ -11,12 +11,12 @@ buildGoPackage rec {
rev = "v${version}";
owner = "grafana";
repo = "grafana";
- sha256 = "1dacji3b8iqfx92cb6psrhvg2hym8xl1lzfn7yvyss4vjj7pmbbc";
+ sha256 = "0dh4yjcg0spv8g0xqxaljwix6yh98lnkd2fwv6rgw5w84j95h9br";
};
srcStatic = fetchurl {
url = "https://s3-us-west-2.amazonaws.com/grafana-releases/release/grafana-${version}.linux-amd64.tar.gz";
- sha256 = "02c7klma5zl1mcis7gnbfi56i59ps7i757yyy8v9gnp5ynnb55v4";
+ sha256 = "0kfi9v0w43nwci575xph3lxa96w8li50jsa1n9pjvz31cjs7hyy2";
};
postPatch = ''
diff --git a/pkgs/servers/monitoring/prometheus/pushgateway.nix b/pkgs/servers/monitoring/prometheus/pushgateway.nix
index 6509f55d46e..4c6cc694243 100644
--- a/pkgs/servers/monitoring/prometheus/pushgateway.nix
+++ b/pkgs/servers/monitoring/prometheus/pushgateway.nix
@@ -1,8 +1,8 @@
-{ stdenv, go, buildGoPackage, go-bindata, fetchFromGitHub }:
+{ stdenv, go, buildGoPackage, fetchFromGitHub }:
buildGoPackage rec {
name = "pushgateway-${version}";
- version = "0.4.0";
+ version = "0.7.0";
rev = "v${version}";
goPackagePath = "github.com/prometheus/pushgateway";
@@ -11,33 +11,39 @@ buildGoPackage rec {
inherit rev;
owner = "prometheus";
repo = "pushgateway";
- sha256 = "19hsv42addcx4dsjdbh64y7ggjvaaay9gag0342gz7gyl9sr719f";
+ sha256 = "1sczg6vrpxv0jlqhkif8443v7mhbp3lp40g71ndqkf1s669m1pl4";
};
- buildInputs = [ go-bindata ];
-
- preBuild = ''
- (
- cd "go/src/$goPackagePath"
- go-bindata ./resources/
- )
- '';
+ buildUser = "nix@nixpkgs";
+ buildDate = "19700101-00:00:00";
buildFlagsArray = ''
-ldflags=
- -X main.buildVersion=${version}
- -X main.buildRev=${rev}
- -X main.buildBranch=${rev}
- -X main.buildUser=nix@nixpkgs
- -X main.buildDate=19700101-00:00:00
+ -X github.com/prometheus/pushgateway/vendor/github.com/prometheus/common/version.Version=${version}
+ -X github.com/prometheus/pushgateway/vendor/github.com/prometheus/common/version.Revision=${rev}
+ -X github.com/prometheus/pushgateway/vendor/github.com/prometheus/common/version.Branch=${rev}
+ -X github.com/prometheus/pushgateway/vendor/github.com/prometheus/common/version.BuildUser=${buildUser}
+ -X github.com/prometheus/pushgateway/vendor/github.com/prometheus/common/version.BuildDate=${buildDate}
-X main.goVersion=${stdenv.lib.getVersion go}
'';
+ doInstallCheck = true;
+ installCheckPhase = ''
+ export PATH=$PATH:$bin/bin
+
+ pushgateway --help
+
+ # Make sure our -X options were included in the build
+ for s in ${version} ${rev} ${buildUser} ${buildDate}; do
+ pushgateway --version 2>&1 | fgrep -q -- "$s" || { echo "pushgateway --version output missing $s"; exit 1; }
+ done
+ '';
+
meta = with stdenv.lib; {
description = "Allows ephemeral and batch jobs to expose metrics to Prometheus";
homepage = https://github.com/prometheus/pushgateway;
license = licenses.asl20;
- maintainers = with maintainers; [ benley fpletz ];
+ maintainers = with maintainers; [ benley fpletz ivan ];
platforms = platforms.unix;
};
}
diff --git a/pkgs/servers/mqtt/mosquitto/default.nix b/pkgs/servers/mqtt/mosquitto/default.nix
index a8203ce1b16..75a0498dd3f 100644
--- a/pkgs/servers/mqtt/mosquitto/default.nix
+++ b/pkgs/servers/mqtt/mosquitto/default.nix
@@ -1,23 +1,29 @@
-{ stdenv, fetchFromGitHub, fetchpatch, cmake, docbook_xsl, libxslt
-, openssl, libuuid, libwebsockets, c-ares, libuv }:
+{ stdenv, lib, fetchFromGitHub, fetchpatch, cmake, docbook_xsl, libxslt
+, openssl, libuuid, libwebsockets, c-ares, libuv
+, systemd ? null }:
-stdenv.mkDerivation rec {
+let
+ withSystemd = stdenv.isLinux;
+
+in stdenv.mkDerivation rec {
name = "mosquitto-${version}";
- version = "1.5.5";
+ version = "1.5.8";
src = fetchFromGitHub {
owner = "eclipse";
repo = "mosquitto";
rev = "v${version}";
- sha256 = "1sfwmvrglfy5gqfk004kvbjldqr36dqz6xmppbgfhr47j5zs66xc";
+ sha256 = "1rf8g6fq7g1mhwsajsgvvlynasybgc51v0qg5j6ynsxfh8yi7s6r";
};
postPatch = ''
- substituteInPlace man/manpage.xsl \
- --replace /usr/share/xml/docbook/stylesheet/ ${docbook_xsl}/share/xml/
+ for f in html manpage ; do
+ substituteInPlace man/$f.xsl \
+ --replace http://docbook.sourceforge.net/release/xsl/current ${docbook_xsl}/share/xml/docbook-xsl
+ done
for f in {lib,lib/cpp,src}/CMakeLists.txt ; do
- substituteInPlace $f --replace /sbin/ldconfig ldconfig
+ substituteInPlace $f --replace /sbin/ldconfig true
done
# the manpages are not generated when using cmake
@@ -26,7 +32,9 @@ stdenv.mkDerivation rec {
popd
'';
- buildInputs = [ openssl libuuid libwebsockets c-ares libuv ];
+ buildInputs = [
+ openssl libuuid libwebsockets c-ares libuv
+ ] ++ lib.optional withSystemd systemd;
nativeBuildInputs = [ cmake docbook_xsl libxslt ];
@@ -35,7 +43,7 @@ stdenv.mkDerivation rec {
cmakeFlags = [
"-DWITH_THREADING=ON"
"-DWITH_WEBSOCKETS=ON"
- ];
+ ] ++ lib.optional withSystemd "-DWITH_SYSTEMD=ON";
meta = with stdenv.lib; {
description = "An open source MQTT v3.1/3.1.1 broker";
diff --git a/pkgs/servers/openafs/1.6/module.nix b/pkgs/servers/openafs/1.6/module.nix
index c133161cf57..6f771e2bf33 100644
--- a/pkgs/servers/openafs/1.6/module.nix
+++ b/pkgs/servers/openafs/1.6/module.nix
@@ -1,4 +1,4 @@
-{ stdenv, fetchurl, which, autoconf, automake, flex, bison
+{ stdenv, fetchurl, fetchpatch, which, autoconf, automake, flex, bison
, kernel, glibc, perl }:
with (import ./srcs.nix { inherit fetchurl; });
@@ -11,6 +11,25 @@ in stdenv.mkDerivation rec {
name = "openafs-${version}-${kernel.modDirVersion}";
inherit version src;
+ patches = [
+ # Linux 4.20
+ (fetchpatch {
+ name = "openafs_1_6-current_kernel_time.patch";
+ url = "http://git.openafs.org/?p=openafs.git;a=patch;h=b9936e944a2b4f5773d66864cbb297993b050e65";
+ sha256 = "16fl9kp0l95dqm166jx3x4ijbzhf2bc9ilnipn3k1j00mfy4lnia";
+ })
+ (fetchpatch {
+ name = "openafs_1_6-do_settimeofday.patch";
+ url = "http://git.openafs.org/?p=openafs.git;a=patch;h=fe6fb38b3d4095351955b9872d0fd6cba64f8784";
+ sha256 = "0k6kgk1ybhm9xx2l0wbcyv7jimkr9mfs2ywvxy8hpyhcm7rbwjkp";
+ })
+ # Linux 5.0
+ (fetchpatch {
+ name = "openafs_1_6-super_block.patch";
+ url = "http://git.openafs.org/?p=openafs.git;a=patch;h=61db15f1badabd83e289efd622e274c47f0aefda";
+ sha256 = "0cdd76s1h1bhxj0hl7r6mcha1jcy5vhlvc5dc8m2i83a6281yjsa";
+ })
+ ];
nativeBuildInputs = [ autoconf automake flex perl bison which ] ++ kernel.moduleBuildDependencies;
hardeningDisable = [ "pic" ];
@@ -51,7 +70,7 @@ in stdenv.mkDerivation rec {
license = licenses.ipl10;
platforms = platforms.linux;
maintainers = [ maintainers.z77z maintainers.spacefrogg ];
- broken = versionOlder kernel.version "3.18"
+ broken = versionOlder kernel.version "3.18" || builtins.compareVersions kernel.version "5.0" >= 0
|| stdenv.targetPlatform.isAarch64;
};
diff --git a/pkgs/servers/openafs/1.8/linux-4.20.patch b/pkgs/servers/openafs/1.8/linux-4.20.patch
deleted file mode 100644
index bb896d82b69..00000000000
--- a/pkgs/servers/openafs/1.8/linux-4.20.patch
+++ /dev/null
@@ -1,62 +0,0 @@
---- a/src/afs/LINUX/osi_machdep.h
-+++ b/src/afs/LINUX/osi_machdep.h
-@@ -75,7 +75,14 @@
- #if defined(HAVE_LINUX_CRED_H)
- #include "h/cred.h"
- #endif
--#if defined(HAVE_LINUX_CURRENT_KERNEL_TIME)
-+
-+#if defined(HAVE_LINUX_KTIME_GET_COARSE_REAL_TS64)
-+static inline time_t osi_Time(void) {
-+ struct timespec64 xtime;
-+ ktime_get_coarse_real_ts64(&xtime);
-+ return xtime.tv_sec;
-+}
-+#elif defined(HAVE_LINUX_CURRENT_KERNEL_TIME)
- static inline time_t osi_Time(void) {
- struct timespec xtime;
- xtime = current_kernel_time();
---- a/src/cf/linux-kernel-func.m4
-+++ b/src/cf/linux-kernel-func.m4
-@@ -72,6 +72,10 @@ AC_CHECK_LINUX_FUNC([iter_file_splice_write],
- AC_CHECK_LINUX_FUNC([kernel_setsockopt],
- [#include ],
- [kernel_setsockopt(NULL, 0, 0, NULL, 0);])
-+AC_CHECK_LINUX_FUNC([ktime_get_coarse_real_ts64],
-+ [#include ],
-+ [struct timespec64 *s;
-+ ktime_get_coarse_real_ts64(s);])
- AC_CHECK_LINUX_FUNC([locks_lock_file_wait],
- [#include ],
- [locks_lock_file_wait(NULL, NULL);])
---- a/src/afs/LINUX/osi_misc.c
-+++ b/src/afs/LINUX/osi_misc.c
-@@ -28,18 +28,6 @@
- int afs_osicred_initialized = 0;
- afs_ucred_t afs_osi_cred;
-
--void
--afs_osi_SetTime(osi_timeval_t * tvp)
--{
-- struct timespec tv;
-- tv.tv_sec = tvp->tv_sec;
-- tv.tv_nsec = tvp->tv_usec * NSEC_PER_USEC;
--
-- AFS_STATCNT(osi_SetTime);
--
-- do_settimeofday(&tv);
--}
--
- void
- osi_linux_mask(void)
- {
---- a/src/afs/LINUX/osi_prototypes.h
-+++ b/src/afs/LINUX/osi_prototypes.h
-@@ -45,7 +45,6 @@ extern void osi_ioctl_init(void);
- extern void osi_ioctl_clean(void);
-
- /* osi_misc.c */
--extern void afs_osi_SetTime(osi_timeval_t * tvp);
- extern int osi_lookupname_internal(char *aname, int followlink,
- struct vfsmount **mnt, struct dentry **dpp);
- extern int osi_lookupname(char *aname, uio_seg_t seg, int followlink,
diff --git a/pkgs/servers/openafs/1.8/module.nix b/pkgs/servers/openafs/1.8/module.nix
index 36a73bf5878..38305a11bcc 100644
--- a/pkgs/servers/openafs/1.8/module.nix
+++ b/pkgs/servers/openafs/1.8/module.nix
@@ -1,4 +1,4 @@
-{ stdenv, fetchurl, which, autoconf, automake, flex, yacc
+{ stdenv, fetchurl, fetchpatch, which, autoconf, automake, flex, yacc
, kernel, glibc, perl, libtool_2, kerberos }:
with (import ./srcs.nix { inherit fetchurl; });
@@ -11,7 +11,35 @@ in stdenv.mkDerivation rec {
name = "openafs-${version}-${kernel.modDirVersion}";
inherit version src;
- patches = [ ./linux-4.20.patch ];
+ patches = [
+ # Linux 4.20
+ (fetchpatch {
+ name = "openafs_1_8-do_settimeofday.patch";
+ url = "http://git.openafs.org/?p=openafs.git;a=patch;h=aa80f892ec39e2984818090a6bb2047430836ee2";
+ sha256 = "11zw676zqi9sj3vhp7n7ndxcxhp17cq9g2g41n030mcd3ap4g53h";
+ })
+ (fetchpatch {
+ name = "openafs_1_8-current_kernel_time.patch";
+ url = "http://git.openafs.org/?p=openafs.git;a=patch;h=3c454b39d04f4886536267c211171dae30dc0344";
+ sha256 = "16fl9kp0l95dqm166jx3x4ijbzhf2bc9ilnipn3k1j00mfy4lnia";
+ })
+ # Linux 5.0
+ (fetchpatch {
+ name = "openafs_1_8-ktime_get_coarse_real_ts64.patch";
+ url = "http://git.openafs.org/?p=openafs.git;a=patch;h=21ad6a0c826c150c4227ece50554101641ab4626";
+ sha256 = "0cd2bzfn4gkb68qf27wpgcg9kvaky7kll22b8p2vmw5x4xkckq2y";
+ })
+ (fetchpatch {
+ name = "openafs_1_8-ktime_get_real_ts64.patch";
+ url = "http://git.openafs.org/?p=openafs.git;a=patch;h=b892fb127815bdf72103ae41ee70aadd87931b0c";
+ sha256 = "1xmf2l4g5nb9rhca7zn0swynvq8f9pd0k9drsx9bpnwp662y9l8m";
+ })
+ (fetchpatch {
+ name = "openafs_1_8-super_block.patch";
+ url = "http://git.openafs.org/?p=openafs.git;a=patch;h=3969bbca6017eb0ce6e1c3099b135f210403f661";
+ sha256 = "0cdd76s1h1bhxj0hl7r6mcha1jcy5vhlvc5dc8m2i83a6281yjsa";
+ })
+ ];
nativeBuildInputs = [ autoconf automake flex libtool_2 perl which yacc ]
++ kernel.moduleBuildDependencies;
diff --git a/pkgs/servers/plexpy/default.nix b/pkgs/servers/plexpy/default.nix
deleted file mode 100644
index 2875ecc5240..00000000000
--- a/pkgs/servers/plexpy/default.nix
+++ /dev/null
@@ -1,41 +0,0 @@
-{stdenv, fetchFromGitHub, python}:
-
-stdenv.mkDerivation rec {
- version = "1.4.25";
- pname = "plexpy";
- name = "${pname}-${version}";
-
- src = fetchFromGitHub {
- owner = "JonnyWong16";
- repo = pname;
- rev = "v${version}";
- sha256 = "0a4ynrfamlwkgqil4n61v47p21czxpjdzg0mias4kdjam2nnwnjx";
- };
-
- buildPhase = ":";
-
- installPhase = ''
- mkdir -p $out
- cp -R * $out/
-
- # Remove superfluous Python checks from main script;
- # prepend shebang
- echo "#!${python.interpreter}" > $out/PlexPy.py
- tail -n +7 PlexPy.py >> $out/PlexPy.py
-
- mkdir $out/bin
- # Can't just symlink to the main script, since it uses __file__ to
- # import bundled packages and manage the service
- echo "#!/bin/bash" > $out/bin/plexpy
- echo "$out/PlexPy.py \$*" >> $out/bin/plexpy
- chmod +x $out/bin/plexpy
- '';
-
- meta = with stdenv.lib; {
- description = "A Python based monitoring and tracking tool for Plex Media Server.";
- homepage = http://jonnywong16.github.io/plexpy/;
- license = licenses.gpl3;
- platforms = platforms.linux;
- maintainers = with stdenv.lib.maintainers; [ csingley ];
- };
-}
diff --git a/pkgs/servers/search/groonga/default.nix b/pkgs/servers/search/groonga/default.nix
index b86077a53f5..3e76cd163c8 100644
--- a/pkgs/servers/search/groonga/default.nix
+++ b/pkgs/servers/search/groonga/default.nix
@@ -7,11 +7,11 @@
stdenv.mkDerivation rec {
name = "groonga-${version}";
- version = "8.1.0";
+ version = "8.1.1";
src = fetchurl {
url = "https://packages.groonga.org/source/groonga/${name}.tar.gz";
- sha256 = "1qwrzw0rvzkkmpgbk0rd5slj6h7jj53f0g685f5gwhg2dpxk52br";
+ sha256 = "0laijnx05xc90jjmza4kq2h8pxn3lgsmn2fgn3zl66fy4fxm1fy4";
};
buildInputs = with stdenv.lib;
diff --git a/pkgs/servers/tautulli/default.nix b/pkgs/servers/tautulli/default.nix
new file mode 100644
index 00000000000..5dcd958b799
--- /dev/null
+++ b/pkgs/servers/tautulli/default.nix
@@ -0,0 +1,55 @@
+{stdenv, fetchFromGitHub, python }:
+
+stdenv.mkDerivation rec {
+ version = "2.1.26";
+ pname = "Tautulli";
+ name = "${pname}-${version}";
+
+ pythonPath = [ python.pkgs.setuptools ];
+ buildInputs = [ python.pkgs.setuptools ];
+ nativeBuildInputs = [ python.pkgs.wrapPython ];
+
+ src = fetchFromGitHub {
+ owner = "Tautulli";
+ repo = pname;
+ rev = "v${version}";
+ sha256 = "1gq13dazbqbzdb0wfw87maprr9nva357zdj8x0lfrbasi3h5522q";
+ };
+
+ buildPhase = ":";
+
+ installPhase = ''
+ mkdir -p $out
+ cp -R * $out/
+
+ # Remove the PlexPy.py compatibility file as it won't work after wrapping.
+ # We still have the plexpy executable in bin for compatibility.
+ rm $out/PlexPy.py
+
+ # Remove superfluous Python checks from main script;
+ # prepend shebang
+ echo "#!${python.interpreter}" > $out/Tautulli.py
+ tail -n +7 Tautulli.py >> $out/Tautulli.py
+
+
+ mkdir $out/bin
+ # Can't just symlink to the main script, since it uses __file__ to
+ # import bundled packages and manage the service
+ echo "#!/bin/bash" > $out/bin/tautulli
+ echo "$out/Tautulli.py \$*" >> $out/bin/tautulli
+ chmod +x $out/bin/tautulli
+
+ # Creat backwards compatibility symlink to bin/plexpy
+ ln -s $out/bin/tautulli $out/bin/plexpy
+
+ wrapPythonProgramsIn "$out" "$out $pythonPath"
+ '';
+
+ meta = with stdenv.lib; {
+ description = "A Python based monitoring and tracking tool for Plex Media Server.";
+ homepage = https://tautulli.com/;
+ license = licenses.gpl3;
+ platforms = platforms.linux;
+ maintainers = with stdenv.lib.maintainers; [ csingley ];
+ };
+}
diff --git a/pkgs/servers/traefik/default.nix b/pkgs/servers/traefik/default.nix
index 6342be5fe49..1d523351d1e 100644
--- a/pkgs/servers/traefik/default.nix
+++ b/pkgs/servers/traefik/default.nix
@@ -2,7 +2,7 @@
buildGoPackage rec {
name = "traefik-${version}";
- version = "1.7.8";
+ version = "1.7.9";
goPackagePath = "github.com/containous/traefik";
@@ -10,7 +10,7 @@ buildGoPackage rec {
owner = "containous";
repo = "traefik";
rev = "v${version}";
- sha256 = "19x2shx5a6ccnc1r0jl51b9qrypzl38npdcy07352lm6jdffi8i4";
+ sha256 = "0lncygkqws5jvbhpx2qlr18y8b325y9a6690ll9azlphxydrv44m";
};
buildInputs = [ go-bindata bash ];
diff --git a/pkgs/servers/ttyd/default.nix b/pkgs/servers/ttyd/default.nix
new file mode 100644
index 00000000000..bae43412e78
--- /dev/null
+++ b/pkgs/servers/ttyd/default.nix
@@ -0,0 +1,37 @@
+{ stdenv, fetchFromGitHub
+, pkgconfig, cmake, xxd
+, openssl, libwebsockets, json_c, libuv
+}:
+
+with builtins;
+
+let
+ # ttyd hasn't seen a release in quite a while. remove all this
+ # junk when a new one happens (eventually)
+ revCount = 174;
+ src = fetchFromGitHub {
+ owner = "tsl0922";
+ repo = "ttyd";
+ rev = "6df6ac3e03b705ddd46109c2ac43a1cba439c0df";
+ sha256 = "0g5jlfa7k6qd59ysdagczlhwgjfjspb3sfbd8b790hcil933qrxm";
+ };
+
+in stdenv.mkDerivation rec {
+ name = "ttyd-${version}";
+ version = "1.4.2_pre${toString revCount}_${substring 0 8 src.rev}";
+ inherit src;
+
+ nativeBuildInputs = [ pkgconfig cmake xxd ];
+ buildInputs = [ openssl libwebsockets json_c libuv ];
+ enableParallelBuilding = true;
+
+ outputs = [ "out" "man" ];
+
+ meta = {
+ description = "Share your terminal over the web";
+ homepage = https://github.com/tsl0922/ttyd;
+ license = stdenv.lib.licenses.mit;
+ maintainers = [ stdenv.lib.maintainers.thoughtpolice ];
+ platforms = stdenv.lib.platforms.linux;
+ };
+}
diff --git a/pkgs/servers/unifi/default.nix b/pkgs/servers/unifi/default.nix
index efdf5914e18..1e9ce4a232b 100644
--- a/pkgs/servers/unifi/default.nix
+++ b/pkgs/servers/unifi/default.nix
@@ -49,8 +49,8 @@ in rec {
};
unifiStable = generic {
- version = "5.10.17";
- sha256 = "0mkbyz14c0i435afj4wyhnp45hbhvmhvcg02yxd2xs3zmcr8sjgz";
+ version = "5.10.19";
+ sha256 = "01ylf11z4f86qrw9x0fn1mnxkb8iw0p2kslp7vgxgjp0i3mg3f2q";
};
unifiTesting = unifiStable;
diff --git a/pkgs/servers/uwsgi/default.nix b/pkgs/servers/uwsgi/default.nix
index 99eac2760dd..1deba4e12af 100644
--- a/pkgs/servers/uwsgi/default.nix
+++ b/pkgs/servers/uwsgi/default.nix
@@ -49,11 +49,11 @@ in
stdenv.mkDerivation rec {
name = "uwsgi-${version}";
- version = "2.0.17.1";
+ version = "2.0.18";
src = fetchurl {
url = "https://projects.unbit.it/downloads/${name}.tar.gz";
- sha256 = "0xxjb9dyivq5531birvxq2gnyxf2x5q7gz54440acra6qwsq4cfj";
+ sha256 = "10zmk4npknigmbqcq1wmhd461dk93159px172112vyq0i19sqwj9";
};
nativeBuildInputs = [ python3 pkgconfig ];
diff --git a/pkgs/servers/x11/xorg/default.nix b/pkgs/servers/x11/xorg/default.nix
index 64aa3ae1ada..d51b4eeb427 100644
--- a/pkgs/servers/x11/xorg/default.nix
+++ b/pkgs/servers/x11/xorg/default.nix
@@ -1612,16 +1612,16 @@ lib.makeScope newScope (self: with self; {
meta.platforms = stdenv.lib.platforms.unix;
}) {};
- xdm = callPackage ({ stdenv, pkgconfig, fetchurl, libX11, libXau, libXaw, libXdmcp, libXext, libXft, libXinerama, libXmu, libXpm, libXt }: stdenv.mkDerivation {
- name = "xdm-1.1.11";
+ xdm = callPackage ({ stdenv, pkgconfig, fetchurl, libX11, libXau, libXaw, libXdmcp, libXext, libXft, libXinerama, libXmu, libXpm, xorgproto, libXrender, libXt }: stdenv.mkDerivation {
+ name = "xdm-1.1.12";
builder = ./builder.sh;
src = fetchurl {
- url = mirror://xorg/individual/app/xdm-1.1.11.tar.bz2;
- sha256 = "0iqw11977lpr9nk1is4fca84d531vck0mq7jldwl44m0vrnl5nnl";
+ url = mirror://xorg/individual/app/xdm-1.1.12.tar.bz2;
+ sha256 = "1x17hdymf6rd8jmh4n1sd4g5a8ayr5w94nwjw84qs2fs5pvq7lhd";
};
hardeningDisable = [ "bindnow" "relro" ];
nativeBuildInputs = [ pkgconfig ];
- buildInputs = [ libX11 libXau libXaw libXdmcp libXext libXft libXinerama libXmu libXpm libXt ];
+ buildInputs = [ libX11 libXau libXaw libXdmcp libXext libXft libXinerama libXmu libXpm xorgproto libXrender libXt ];
meta.platforms = stdenv.lib.platforms.unix;
}) {};
@@ -2432,11 +2432,11 @@ lib.makeScope newScope (self: with self; {
}) {};
xinit = callPackage ({ stdenv, pkgconfig, fetchurl, libX11, xorgproto }: stdenv.mkDerivation {
- name = "xinit-1.4.0";
+ name = "xinit-1.4.1";
builder = ./builder.sh;
src = fetchurl {
- url = mirror://xorg/individual/app/xinit-1.4.0.tar.bz2;
- sha256 = "1vw2wlg74ig52naw0cha3pgzcwwk25l834j42cg8m5zmybp3a213";
+ url = mirror://xorg/individual/app/xinit-1.4.1.tar.bz2;
+ sha256 = "1fdbakx59vyh474skjydj1bbglpby3y03nl7mxn0z9v8gdhqz6yy";
};
hardeningDisable = [ "bindnow" "relro" ];
nativeBuildInputs = [ pkgconfig ];
diff --git a/pkgs/servers/x11/xorg/overrides.nix b/pkgs/servers/x11/xorg/overrides.nix
index d62d61b429e..886de897db8 100644
--- a/pkgs/servers/x11/xorg/overrides.nix
+++ b/pkgs/servers/x11/xorg/overrides.nix
@@ -42,6 +42,10 @@ self: super:
buildInputs = attrs.buildInputs ++ [ self.mkfontscale ];
});
+ editres = super.editres.overrideAttrs (attrs: {
+ hardeningDisable = [ "format" ];
+ });
+
fontbhttf = super.fontbhttf.overrideAttrs (attrs: {
meta = attrs.meta // { license = lib.licenses.unfreeRedistributable; };
});
@@ -285,6 +289,10 @@ self: super:
meta = attrs.meta // { platforms = stdenv.lib.platforms.linux; };
});
+ oclock = super.oclock.overrideAttrs (attrs: {
+ buildInputs = attrs.buildInputs ++ [ self.libxkbfile ];
+ });
+
setxkbmap = super.setxkbmap.overrideAttrs (attrs: {
postInstall =
''
diff --git a/pkgs/servers/x11/xorg/tarballs.list b/pkgs/servers/x11/xorg/tarballs.list
index 57c85e0bc2f..854063dd307 100644
--- a/pkgs/servers/x11/xorg/tarballs.list
+++ b/pkgs/servers/x11/xorg/tarballs.list
@@ -35,7 +35,7 @@ mirror://xorg/individual/app/xcmsdb-1.0.5.tar.bz2
mirror://xorg/individual/app/xcompmgr-1.1.7.tar.bz2
mirror://xorg/individual/app/xconsole-1.0.7.tar.bz2
mirror://xorg/individual/app/xcursorgen-1.0.7.tar.bz2
-mirror://xorg/individual/app/xdm-1.1.11.tar.bz2
+mirror://xorg/individual/app/xdm-1.1.12.tar.bz2
mirror://xorg/individual/app/xdpyinfo-1.3.2.tar.bz2
mirror://xorg/individual/app/xdriinfo-1.0.6.tar.bz2
mirror://xorg/individual/app/xev-1.2.3.tar.bz2
@@ -46,7 +46,7 @@ mirror://xorg/individual/app/xfsinfo-1.0.6.tar.bz2
mirror://xorg/individual/app/xgamma-1.0.6.tar.bz2
mirror://xorg/individual/app/xgc-1.0.5.tar.bz2
mirror://xorg/individual/app/xhost-1.0.8.tar.bz2
-mirror://xorg/individual/app/xinit-1.4.0.tar.bz2
+mirror://xorg/individual/app/xinit-1.4.1.tar.bz2
mirror://xorg/individual/app/xinput-1.6.2.tar.bz2
mirror://xorg/individual/app/xkbcomp-1.4.2.tar.bz2
mirror://xorg/individual/app/xkbevd-1.1.4.tar.bz2
diff --git a/pkgs/shells/zsh/zsh-git-prompt/default.nix b/pkgs/shells/zsh/zsh-git-prompt/default.nix
index 761ad071da9..6ec5e816bb6 100644
--- a/pkgs/shells/zsh/zsh-git-prompt/default.nix
+++ b/pkgs/shells/zsh/zsh-git-prompt/default.nix
@@ -24,7 +24,7 @@
# More details are in share/doc/zsh-git-prompt/README.md, once
# installed.
#
-{ fetchgit
+{ fetchFromGitHub
, haskell
, python
, git
@@ -36,11 +36,12 @@ haskellPackages.callPackage
({ mkDerivation, base, HUnit, parsec, process, QuickCheck, stdenv }:
mkDerivation rec {
pname = "zsh-git-prompt";
- version = "0.5";
- src = fetchgit {
- url = "https://github.com/olivierverdier/zsh-git-prompt.git";
- rev = "0a6c8b610e799040b612db8888945f502a2ddd9d";
- sha256 = "19x1gf1r6l7r6i7vhhsgzcbdlnr648jx8j84nk2zv1b8igh205hw";
+ version = "0.4z"; # While we await a real 0.5 release.
+ src = fetchFromGitHub {
+ owner = "starcraftman";
+ repo = "zsh-git-prompt";
+ rev = "11b83ba3b85d14c66cf2ab79faefab6d838da28e";
+ sha256 = "04aylsjfb03ckw219plkzpyiq4j9g66bjxa5pa56h1p7df6pjssb";
};
prePatch = ''
substituteInPlace zshrc.sh \
diff --git a/pkgs/tools/admin/analog/default.nix b/pkgs/tools/admin/analog/default.nix
index a8b992db2b7..0d8bdad2c65 100644
--- a/pkgs/tools/admin/analog/default.nix
+++ b/pkgs/tools/admin/analog/default.nix
@@ -1,14 +1,14 @@
-{ stdenv, fetchurl }:
+{ stdenv, fetchurl, unzip }:
-let
- name = "analog-6.0";
-in
-stdenv.mkDerivation {
- inherit name;
+stdenv.mkDerivation rec {
+
+ name = "analog-6.0.13";
+
+ buildInputs = [ unzip ];
src = fetchurl {
- url = "http://www.analog.cx/${name}.tar.gz";
- sha256 = "31c0e2bedd0968f9d4657db233b20427d8c497be98194daf19d6f859d7f6fcca";
+ url = "http://www.c-amie.co.uk/static/analog/6013/analog-src-6013ce.zip";
+ sha256 = "1njfsclmxk8sn1i07k3qfk8fmsnz7qw9kmydk3bil7qjf4ngmzc6";
};
configurePhase = ''
@@ -28,7 +28,7 @@ stdenv.mkDerivation {
'';
meta = {
- homepage = http://www.analog.cx/;
+ homepage = http://www.c-amie.co.uk/software/analog/;
license = stdenv.lib.licenses.gpl2;
description = "Powerful tool to generate web server statistics";
maintainers = [ stdenv.lib.maintainers.peti ];
diff --git a/pkgs/tools/admin/oxidized/Gemfile b/pkgs/tools/admin/oxidized/Gemfile
index dd41b89ad43..4ff04d4829c 100644
--- a/pkgs/tools/admin/oxidized/Gemfile
+++ b/pkgs/tools/admin/oxidized/Gemfile
@@ -1,5 +1,5 @@
source 'https://rubygems.org'
-gem 'oxidized', '0.25.0'
-gem 'oxidized-web', '0.12.0'
+gem 'oxidized', '0.26.2'
+gem 'oxidized-web', '0.13.1'
gem 'oxidized-script', '0.6.0'
diff --git a/pkgs/tools/admin/oxidized/Gemfile.lock b/pkgs/tools/admin/oxidized/Gemfile.lock
index d0c808fd2cd..9946b35057d 100644
--- a/pkgs/tools/admin/oxidized/Gemfile.lock
+++ b/pkgs/tools/admin/oxidized/Gemfile.lock
@@ -2,35 +2,35 @@ GEM
remote: https://rubygems.org/
specs:
asetus (0.3.0)
- backports (3.11.4)
+ backports (3.12.0)
charlock_holmes (0.7.6)
emk-sinatra-url-for (0.2.1)
sinatra (>= 0.9.1.1)
- ffi (1.9.25)
+ ffi (1.10.0)
haml (5.0.4)
temple (>= 0.8.0)
tilt
htmlentities (4.3.4)
- json (2.1.0)
+ json (2.2.0)
multi_json (1.13.1)
- net-ssh (4.1.0)
+ net-ssh (5.1.0)
net-telnet (0.1.1)
- oxidized (0.25.0)
+ oxidized (0.26.2)
asetus (~> 0.1)
- net-ssh (~> 4.1.0)
+ net-ssh (~> 5)
net-telnet (~> 0.1.1)
rugged (~> 0.21, >= 0.21.4)
slop (~> 3.5)
oxidized-script (0.6.0)
oxidized (~> 0.25)
slop (~> 3.5)
- oxidized-web (0.12.0)
+ oxidized-web (0.13.1)
charlock_holmes (~> 0.7.5)
emk-sinatra-url-for (~> 0.2)
haml (~> 5.0)
htmlentities (~> 4.3)
json (>= 1.7.0)
- oxidized (~> 0.25)
+ oxidized (~> 0.26)
puma (~> 3.11.4)
rack-test (~> 0.7.0)
sass (~> 3.3)
@@ -45,8 +45,8 @@ GEM
rb-fsevent (0.10.3)
rb-inotify (0.10.0)
ffi (~> 1.0)
- rugged (0.27.7)
- sass (3.7.2)
+ rugged (0.28.0)
+ sass (3.7.3)
sass-listen (~> 4.0.0)
sass-listen (4.0.0)
rb-fsevent (~> 0.9, >= 0.9.4)
@@ -63,16 +63,16 @@ GEM
sinatra (~> 1.4.0)
tilt (>= 1.3, < 3)
slop (3.6.0)
- temple (0.8.0)
+ temple (0.8.1)
tilt (2.0.9)
PLATFORMS
ruby
DEPENDENCIES
- oxidized (= 0.25.0)
+ oxidized (= 0.26.2)
oxidized-script (= 0.6.0)
- oxidized-web (= 0.12.0)
+ oxidized-web (= 0.13.1)
BUNDLED WITH
- 1.17.1
+ 1.17.2
diff --git a/pkgs/tools/admin/oxidized/gemset.nix b/pkgs/tools/admin/oxidized/gemset.nix
index e965e40530b..ba1a21c4a38 100644
--- a/pkgs/tools/admin/oxidized/gemset.nix
+++ b/pkgs/tools/admin/oxidized/gemset.nix
@@ -14,10 +14,10 @@
platforms = [];
source = {
remotes = ["https://rubygems.org"];
- sha256 = "1hshjxww2h7s0dk57njrygq4zpp0nlqrjfya7zwm27iq3rhc3y8g";
+ sha256 = "0ba6n9l4kki56s2cszarps14zp2wlhw7nfawb8qwsxy3a57v4mw4";
type = "gem";
};
- version = "3.11.4";
+ version = "3.12.0";
};
charlock_holmes = {
groups = ["default"];
@@ -45,10 +45,10 @@
platforms = [];
source = {
remotes = ["https://rubygems.org"];
- sha256 = "0jpm2dis1j7zvvy3lg7axz9jml316zrn7s0j59vyq3qr127z0m7q";
+ sha256 = "0j8pzj8raxbir5w5k6s7a042sb5k02pg0f8s4na1r5lan901j00p";
type = "gem";
};
- version = "1.9.25";
+ version = "1.10.0";
};
haml = {
dependencies = ["temple" "tilt"];
@@ -76,10 +76,10 @@
platforms = [];
source = {
remotes = ["https://rubygems.org"];
- sha256 = "01v6jjpvh3gnq6sgllpfqahlgxzj50ailwhj9b3cd20hi2dx0vxp";
+ sha256 = "0sx97bm9by389rbzv8r1f43h06xcz8vwi3h5jv074gvparql7lcx";
type = "gem";
};
- version = "2.1.0";
+ version = "2.2.0";
};
multi_json = {
groups = ["default"];
@@ -96,10 +96,10 @@
platforms = [];
source = {
remotes = ["https://rubygems.org"];
- sha256 = "013p5jb4wy0cq7x7036piw2a3s1i9p752ki1srx2m289mpz4ml3q";
+ sha256 = "0jglf8rxvlw6is5019r6kwsdhw38zm3z39jbghdbj449r6h7h77n";
type = "gem";
};
- version = "4.1.0";
+ version = "5.1.0";
};
net-telnet = {
groups = ["default"];
@@ -117,10 +117,10 @@
platforms = [];
source = {
remotes = ["https://rubygems.org"];
- sha256 = "0i8lbzjay60jpk6g86rpk59j4r0kyd1nnm79qdh64qvx6hy02ylq";
+ sha256 = "130h99wijfvv443wgdllxvlq880m0m31rxvrszq5wdii7ad977s5";
type = "gem";
};
- version = "0.25.0";
+ version = "0.26.2";
};
oxidized-script = {
dependencies = ["oxidized" "slop"];
@@ -139,10 +139,10 @@
platforms = [];
source = {
remotes = ["https://rubygems.org"];
- sha256 = "12ib7380sh9ca7qirw1yhs8di2vv38l09imqaamibdzgmk0rvs1r";
+ sha256 = "07qmal83h1h5dqapgirq5yrnclbm3xhcjqkj80lla3dq18jmjhqs";
type = "gem";
};
- version = "0.12.0";
+ version = "0.13.1";
};
puma = {
groups = ["default"];
@@ -212,10 +212,10 @@
platforms = [];
source = {
remotes = ["https://rubygems.org"];
- sha256 = "0znb9n1grdsqf22jqzwin58kyq7x7ml57h6pf48j219f8by21sj6";
+ sha256 = "0crasx5dmbr9ws89137n53l8nap7rdncp8yg5alw1jb99lqslhmi";
type = "gem";
};
- version = "0.27.7";
+ version = "0.28.0";
};
sass = {
dependencies = ["sass-listen"];
@@ -223,10 +223,10 @@
platforms = [];
source = {
remotes = ["https://rubygems.org"];
- sha256 = "1phs6hnd8b95m7n5wbh5bsclmwaajd1sqlgw9fmj72bfqldbmcqa";
+ sha256 = "0vll3bm1dllhqjxxj639nj3afsp12hlppgpysxrgcg24jb2xl2qn";
type = "gem";
};
- version = "3.7.2";
+ version = "3.7.3";
};
sass-listen = {
dependencies = ["rb-fsevent" "rb-inotify"];
@@ -276,10 +276,10 @@
platforms = [];
source = {
remotes = ["https://rubygems.org"];
- sha256 = "00nxf610nzi4n1i2lkby43nrnarvl89fcl6lg19406msr0k3ycmq";
+ sha256 = "158d7ygbwcifqnvrph219p7m78yjdjazhykv5darbkms7bxm5y09";
type = "gem";
};
- version = "0.8.0";
+ version = "0.8.1";
};
tilt = {
groups = ["default"];
diff --git a/pkgs/tools/admin/sewer/default.nix b/pkgs/tools/admin/sewer/default.nix
index 5410d0c833d..59edaff5f94 100644
--- a/pkgs/tools/admin/sewer/default.nix
+++ b/pkgs/tools/admin/sewer/default.nix
@@ -2,20 +2,15 @@
python3Packages.buildPythonApplication rec {
pname = "sewer";
- version = "0.6.0";
+ version = "0.7.0";
src = python3Packages.fetchPypi {
inherit pname version;
- sha256 = "180slmc2zk4mvjqp25ks0j8kd63ai4y77ds5icm7qd7av865rryp";
+ sha256 = "16j4npqj3fdj3g2z7nqb0cvvxd85xk20g9c43f3q8a1k5psf1fmq";
};
propagatedBuildInputs = with python3Packages; [ pyopenssl requests tldextract ];
- postPatch = ''
- # The README has non-ascii characters which makes setup.py crash.
- sed -i 's/[\d128-\d255]//g' README.md
- '';
-
meta = with stdenv.lib; {
homepage = https://github.com/komuw/sewer;
description = "ACME client";
diff --git a/pkgs/tools/archivers/cabextract/default.nix b/pkgs/tools/archivers/cabextract/default.nix
index edc70e6c601..d8a874d0b2e 100644
--- a/pkgs/tools/archivers/cabextract/default.nix
+++ b/pkgs/tools/archivers/cabextract/default.nix
@@ -1,11 +1,11 @@
{ stdenv, fetchurl }:
stdenv.mkDerivation rec {
- name = "cabextract-1.9";
+ name = "cabextract-1.9.1";
src = fetchurl {
url = "https://www.cabextract.org.uk/${name}.tar.gz";
- sha256 = "1hf4zhjxfdgq9x172r5zfdnafma9q0zf7372syn8hcn7hcypkg0v";
+ sha256 = "19qwhl2r8ip95q4vxzxg2kp4p125hjmc9762sns1dwwf7ikm7hmg";
};
meta = with stdenv.lib; {
diff --git a/pkgs/tools/archivers/unrar/default.nix b/pkgs/tools/archivers/unrar/default.nix
index 15c0837154e..73c73c564fd 100644
--- a/pkgs/tools/archivers/unrar/default.nix
+++ b/pkgs/tools/archivers/unrar/default.nix
@@ -2,11 +2,11 @@
stdenv.mkDerivation rec {
name = "unrar-${version}";
- version = "5.5.8";
+ version = "5.7.3";
src = fetchurl {
url = "https://www.rarlab.com/rar/unrarsrc-${version}.tar.gz";
- sha256 = "1x7wnb6zgs09v2bf5xaqz14daba8k7zikadj1qabqi4r78sy8rlv";
+ sha256 = "0i5442sh18v9s47k1j8q04m3ki98z012rw7ml7c5iwklhfvmds20";
};
postPatch = ''
diff --git a/pkgs/tools/filesystems/davfs2/default.nix b/pkgs/tools/filesystems/davfs2/default.nix
index 2b6d0f6e669..512b5ce8567 100644
--- a/pkgs/tools/filesystems/davfs2/default.nix
+++ b/pkgs/tools/filesystems/davfs2/default.nix
@@ -1,11 +1,11 @@
{ stdenv, fetchurl, neon, zlib }:
stdenv.mkDerivation rec {
- name = "davfs2-1.5.4";
+ name = "davfs2-1.5.5";
src = fetchurl {
url = "mirror://savannah/davfs2/${name}.tar.gz";
- sha256 = "1q4ngkzbkq0rfxikvkwg7ccpzi1nkkmlf8bb46326y1aj7qf1i69";
+ sha256 = "0bxd62268pix7w1lg7f9y94v34f4l45fdf6clyarj43qmljnlz2q";
};
buildInputs = [ neon zlib ];
@@ -30,6 +30,5 @@ stdenv.mkDerivation rec {
'';
platforms = stdenv.lib.platforms.linux;
- maintainers = [ stdenv.lib.maintainers.peti ];
};
}
diff --git a/pkgs/tools/filesystems/mhddfs/default.nix b/pkgs/tools/filesystems/mhddfs/default.nix
index 697256982bb..15bb390e364 100644
--- a/pkgs/tools/filesystems/mhddfs/default.nix
+++ b/pkgs/tools/filesystems/mhddfs/default.nix
@@ -16,6 +16,11 @@ stdenv.mkDerivation rec {
./fix-format-security-error.patch
];
+ postPatch = ''
+ substituteInPlace src/main.c --replace "attr/xattr.h" "sys/xattr.h"
+ substituteInPlace src/tools.c --replace "attr/xattr.h" "sys/xattr.h"
+ '';
+
installPhase = ''
mkdir -p $out/bin
cp mhddfs $out/bin/
diff --git a/pkgs/tools/filesystems/smbnetfs/default.nix b/pkgs/tools/filesystems/smbnetfs/default.nix
index 8a9af4ba13c..26cef4ac90f 100644
--- a/pkgs/tools/filesystems/smbnetfs/default.nix
+++ b/pkgs/tools/filesystems/smbnetfs/default.nix
@@ -11,6 +11,10 @@ stdenv.mkDerivation rec {
nativeBuildInputs = [ pkgconfig autoconf ];
buildInputs = [ fuse samba glib attr libsecret ];
+ postPatch = ''
+ substituteInPlace src/function.c --replace "attr/xattr.h" "sys/xattr.h"
+ '';
+
meta = with stdenv.lib; {
description = "A FUSE FS for mounting Samba shares";
maintainers = with maintainers; [ raskin ];
diff --git a/pkgs/tools/inputmethods/ibus/default.nix b/pkgs/tools/inputmethods/ibus/default.nix
index b561fb626e0..e1cd8ad09fb 100644
--- a/pkgs/tools/inputmethods/ibus/default.nix
+++ b/pkgs/tools/inputmethods/ibus/default.nix
@@ -1,4 +1,4 @@
-{ stdenv, fetchurl, fetchFromGitHub, autoreconfHook, gconf, intltool, makeWrapper, pkgconfig
+{ stdenv, fetchurl, runCommand, fetchFromGitHub, autoreconfHook, gconf, intltool, makeWrapper, pkgconfig
, vala, wrapGAppsHook, dbus, dconf ? null, glib, gdk_pixbuf, gobject-introspection, gtk2
, gtk3, gtk-doc, isocodes, python3, json-glib, libnotify ? null, enablePythonLibrary ? true
, enableUI ? true, withWayland ? false, libxkbcommon ? null, wayland ? null
@@ -59,6 +59,13 @@ let
makeWrapper ${glib.dev}/bin/glib-mkenums $out/bin/glib-mkenums --unset PYTHONPATH
'';
};
+
+ # stop gconf from leaking into environment
+ # can be removed in ibus 1.6 which will not use gconf anymore
+ gsettings-schema-convert = runCommand "name" {} ''
+ mkdir -p $out/bin
+ ln -s ${gconf}/bin/gsettings-schema-convert $out/bin
+ '';
in
stdenv.mkDerivation rec {
@@ -97,7 +104,7 @@ stdenv.mkDerivation rec {
nativeBuildInputs = [
autoreconfHook
- gconf
+ gsettings-schema-convert
gtk-doc
intltool
makeWrapper
diff --git a/pkgs/tools/misc/birdfont/default.nix b/pkgs/tools/misc/birdfont/default.nix
index 9dd84471922..2de6715db8f 100644
--- a/pkgs/tools/misc/birdfont/default.nix
+++ b/pkgs/tools/misc/birdfont/default.nix
@@ -4,11 +4,11 @@ gobject-introspection, gsettings-desktop-schemas, wrapGAppsHook }:
stdenv.mkDerivation rec {
pname = "birdfont";
- version = "2.25.0";
+ version = "2.26.0";
src = fetchurl {
url = "https://birdfont.org/releases/${pname}-${version}.tar.xz";
- sha256 = "0fi86km9iaxs9b8lqz81079vppzp346kqiqk44vk45dclr5r6x22";
+ sha256 = "0lcbwmwfb18dpr5kpnrl2zx59jhvj7k7vzjld51zv0zhcvl9fg3j";
};
nativeBuildInputs = [ python3 pkgconfig vala gobject-introspection wrapGAppsHook ];
diff --git a/pkgs/tools/misc/capture/0001-eval-fix.patch b/pkgs/tools/misc/capture/0001-eval-fix.patch
deleted file mode 100644
index 4b5bdc6a0bc..00000000000
--- a/pkgs/tools/misc/capture/0001-eval-fix.patch
+++ /dev/null
@@ -1,10 +0,0 @@
-diff --git a/src/capture.sh b/src/capture.sh
-index a32b018..82d1f15 100755
---- a/src/capture.sh
-+++ b/src/capture.sh
-@@ -103,4 +103,4 @@ capture () {
-
-
- # remove this line if you want to source this file instead
--eval " ${0##*/}" "$@"
-+capture "$@"
diff --git a/pkgs/tools/misc/capture/0002-sane-defaults.patch b/pkgs/tools/misc/capture/0002-sane-defaults.patch
deleted file mode 100644
index 1bd49ae41e3..00000000000
--- a/pkgs/tools/misc/capture/0002-sane-defaults.patch
+++ /dev/null
@@ -1,22 +0,0 @@
-diff --git a/src/capture.sh b/src/capture.sh
-index a32b018..42f3936 100755
---- a/src/capture.sh
-+++ b/src/capture.sh
-@@ -9,7 +9,7 @@ set -e
- #
-
- scale="-1:-1"
--fps="15"
-+fps="30"
- raw_video="-vf fps=$fps -c:v utvideo -f nut"
- raw_video_container=".nut"
-
-@@ -18,7 +18,7 @@ raw_video_container=".nut"
- # https://stackoverflow.com/questions/41372045/vp9-encoding-limited-to-4-threads
- webm_video="-pix_fmt yuv420p -c:v libvpx-vp9 -crf 25 -b:v 0 -f webm -tile-columns 6 -frame-parallel 1 -threads 8"
-
--tmpdir="/var/tmp"
-+tmpdir="/tmp"
-
-
- # capture_raw ./foo.nut
diff --git a/pkgs/tools/misc/capture/default.nix b/pkgs/tools/misc/capture/default.nix
index 49c238b0bd0..b78f1d7136d 100644
--- a/pkgs/tools/misc/capture/default.nix
+++ b/pkgs/tools/misc/capture/default.nix
@@ -1,20 +1,18 @@
{ stdenv, pkgs, slop, ffmpeg, fetchFromGitHub, makeWrapper}:
stdenv.mkDerivation rec {
- name = "capture-${version}";
- version = "1.0";
+ name = "capture-unstable-${version}";
+ version = "2019-03-10";
src = fetchFromGitHub {
owner = "buhman";
repo = "capture";
- rev = "4be986f17462b8d520559429c74da6bf3a436259";
- sha256 = "172y06vs993x5v78zwl81xma1gkvjq1ad9rvmf3a217fyxsz4nhh";
+ rev = "80dd9e7195aad5c132badef610f19509f3935b24";
+ sha256 = "0zyyg4mvrny7cc2xgvfip97b6yc75ka5ni39rwls93971jbk83d6";
};
buildInputs = [ makeWrapper ];
- patches = [ ./0001-eval-fix.patch ./0002-sane-defaults.patch ];
-
installPhase = ''
install -Dm755 src/capture.sh $out/bin/capture
@@ -27,5 +25,6 @@ stdenv.mkDerivation rec {
description = "A no bullshit screen capture tool";
homepage = "https://github.com/buhman/capture";
maintainers = [ maintainers.ar1a ];
+ license = licenses.gpl3Plus;
};
}
diff --git a/pkgs/tools/misc/catimg/default.nix b/pkgs/tools/misc/catimg/default.nix
new file mode 100644
index 00000000000..1d85fdfd292
--- /dev/null
+++ b/pkgs/tools/misc/catimg/default.nix
@@ -0,0 +1,26 @@
+{ stdenv, fetchFromGitHub, cmake } :
+
+with stdenv.lib;
+
+stdenv.mkDerivation rec {
+ pname = "catimg";
+ version = "2.5.0";
+
+ src = fetchFromGitHub {
+ owner = "posva";
+ repo = pname;
+ rev = version;
+ sha256 = "0n74iczzgxrcq3zpa7ndycb9rinm829yvf81c747q4ngv5q6pzcm";
+ };
+
+ nativeBuildInputs = [ cmake ];
+
+ meta = {
+ license = licenses.mit;
+ homepage = "https://github.com/posva/catimg";
+ description = "Insanely fast image printing in your terminal";
+ maintainers = with maintainers; [ ryantm ];
+ platforms = platforms.unix;
+ };
+
+}
diff --git a/pkgs/tools/misc/execline/default.nix b/pkgs/tools/misc/execline/default.nix
index 770f4ae67f4..553a68abf0b 100644
--- a/pkgs/tools/misc/execline/default.nix
+++ b/pkgs/tools/misc/execline/default.nix
@@ -4,8 +4,8 @@ with skawarePackages;
buildPackage {
pname = "execline";
- version = "2.5.0.1";
- sha256 = "0j8hwdw8wn0rv8njdza8fbgmvyjg7hqp3qlbw00i7fwskr7d21wd";
+ version = "2.5.1.0";
+ sha256 = "0xr6yb50wm6amj1wc7jmxyv7hvlx2ypbnww1vc288j275625d9xi";
description = "A small scripting language, to be used in place of a shell in non-interactive scripts";
diff --git a/pkgs/tools/misc/lf/default.nix b/pkgs/tools/misc/lf/default.nix
index 86826f79b9a..cd2b1b795f7 100644
--- a/pkgs/tools/misc/lf/default.nix
+++ b/pkgs/tools/misc/lf/default.nix
@@ -2,13 +2,13 @@
buildGoPackage rec {
name = "lf-${version}";
- version = "10";
+ version = "11";
src = fetchFromGitHub {
owner = "gokcehan";
repo = "lf";
rev = "r${version}";
- sha256 = "14wddjm6g5smb0s549nd7l2r3fcdd6k5p2cqq94j02n2jhlv0k6h";
+ sha256 = "13622sx6xmbm8gf38dn8y8mkfnlbpamg4hmzsy9jnzg4h8qbjm6b";
};
goPackagePath = "github.com/gokcehan/lf";
diff --git a/pkgs/tools/misc/osinfo-db-tools/default.nix b/pkgs/tools/misc/osinfo-db-tools/default.nix
index 10aa5d1ae99..bd7b036a65a 100644
--- a/pkgs/tools/misc/osinfo-db-tools/default.nix
+++ b/pkgs/tools/misc/osinfo-db-tools/default.nix
@@ -1,17 +1,18 @@
{ stdenv, fetchurl, pkgconfig, intltool, glib, libxml2
-, libxslt, libarchive, bzip2, lzma
+, libxslt, libarchive, bzip2, lzma, json-glib
}:
stdenv.mkDerivation rec {
- name = "osinfo-db-tools-1.2.0";
+ pname = "osinfo-db-tools";
+ version = "1.4.0";
src = fetchurl {
- url = "https://releases.pagure.org/libosinfo/${name}.tar.gz";
- sha256 = "07zqbwsmdgnzqah2smm4zri04c0qm82z1jn8kzz1bnsqbfg84l1v";
+ url = "https://releases.pagure.org/libosinfo/${pname}-${version}.tar.gz";
+ sha256 = "08zpjq1g27n6wmmqwxws95w045warhg9bxcv1phvkdcrddf15q3y";
};
nativeBuildInputs = [ pkgconfig intltool ];
- buildInputs = [ glib libxml2 libxslt libarchive bzip2 lzma ];
+ buildInputs = [ glib json-glib libxml2 libxslt libarchive bzip2 lzma ];
meta = with stdenv.lib; {
description = "Tools for managing the osinfo database";
diff --git a/pkgs/tools/misc/pb_cli/0001-eval-fix.patch b/pkgs/tools/misc/pb_cli/0001-eval-fix.patch
deleted file mode 100644
index 7188cf37297..00000000000
--- a/pkgs/tools/misc/pb_cli/0001-eval-fix.patch
+++ /dev/null
@@ -1,10 +0,0 @@
-diff --git a/src/pb.sh b/src/pb.sh
-index be1e472..eb9e6f9 100755
---- a/src/pb.sh
-+++ b/src/pb.sh
-@@ -61,4 +61,4 @@ pb () {
- esac
- }
-
--eval " ${0##*/}" "$@"
-+pb "$@"
diff --git a/pkgs/tools/misc/pb_cli/default.nix b/pkgs/tools/misc/pb_cli/default.nix
index 6fab44891c5..10fe3169bfb 100644
--- a/pkgs/tools/misc/pb_cli/default.nix
+++ b/pkgs/tools/misc/pb_cli/default.nix
@@ -6,18 +6,16 @@ assert video -> capture != null;
assert clipboard -> xclip != null;
stdenv.mkDerivation rec {
- name = "pb_cli-${version}";
- version = "1.0";
+ name = "pb_cli-unstable-${version}";
+ version = "2019-03-10";
src = fetchFromGitHub {
owner = "ptpb";
repo = "pb_cli";
- rev = "5242382b3d6b5c0ddaf6e4843a69746b40866e57";
- sha256 = "0543x3377apinhxnsfq82zlp5sm8g1bf6hmsvvcwra5rsshv2ybk";
+ rev = "6b9ce1ee45fe651d06d7c479a20026a173dd328b";
+ sha256 = "0w6a789zffvz4ixsb92q45n5s4xyx7s2l2f07972i3dajaaai8z7";
};
- patches = [ ./0001-eval-fix.patch ];
-
buildInputs = [ makeWrapper ];
liveDeps = [ jq curl ] ++ stdenv.lib.optional screenshots maim
@@ -33,8 +31,9 @@ stdenv.mkDerivation rec {
'';
meta = with stdenv.lib; {
- description = "A no bullshit ptpb client";
+ description = "A no bullshit 0x0.st client";
homepage = "https://github.com/ptpb/pb_cli";
maintainers = [ maintainers.ar1a ];
+ license = licenses.gpl3Plus;
};
}
diff --git a/pkgs/tools/misc/s6-portable-utils/default.nix b/pkgs/tools/misc/s6-portable-utils/default.nix
index ae4385a0048..97548cab8db 100644
--- a/pkgs/tools/misc/s6-portable-utils/default.nix
+++ b/pkgs/tools/misc/s6-portable-utils/default.nix
@@ -7,8 +7,8 @@ let
in buildPackage {
pname = pname;
- version = "2.2.1.2";
- sha256 = "0if77z07rfygd1yk9d2abxkdbx3dg52vcjhb20isb8kvqxhkg8ih";
+ version = "2.2.1.3";
+ sha256 = "1ibjns1slyg1p7jl9irzlrjz8b01f506iw87g3s7db5arhf17vv2";
description = "A set of tiny general Unix utilities optimized for simplicity and small size";
diff --git a/pkgs/tools/misc/scfbuild/default.nix b/pkgs/tools/misc/scfbuild/default.nix
index a310135727d..1b7afdfbe9d 100644
--- a/pkgs/tools/misc/scfbuild/default.nix
+++ b/pkgs/tools/misc/scfbuild/default.nix
@@ -7,8 +7,8 @@ buildPythonApplication rec {
src = fetchFromGitHub {
owner = "eosrei";
repo = "scfbuild";
- rev = "c179c8d279b7cc0a9a3536a713ac880ac6010318";
- sha256 = "1bsi7k4kkj914pycp1g92050hjxscyvc9qflqb3cv5yz3c93cs46";
+ rev = "9acc7fc5fedbf48683d8932dd5bd7583bf922bae";
+ sha256 = "1zlqsxkpg7zvmhdjgbqwwc9qgac2b8amzq8c5kwyh5cv95zcp6qn";
};
phases = [ "unpackPhase" "installPhase" "fixupPhase" ];
diff --git a/pkgs/tools/misc/toybox/default.nix b/pkgs/tools/misc/toybox/default.nix
index 5a979be249e..98fa06bccfd 100644
--- a/pkgs/tools/misc/toybox/default.nix
+++ b/pkgs/tools/misc/toybox/default.nix
@@ -1,5 +1,5 @@
{
- stdenv, lib, fetchFromGitHub, buildPackages,
+ stdenv, lib, fetchFromGitHub, which,
enableStatic ? false,
enableMinimal ? false,
extraConfig ? ""
@@ -19,7 +19,7 @@ stdenv.mkDerivation rec {
buildInputs = lib.optionals enableStatic [ stdenv.cc.libc stdenv.cc.libc.static ];
- postPatch = "patchShebangs scripts";
+ postPatch = "patchShebangs .";
inherit extraConfig;
passAsFile = [ "extraConfig" ];
@@ -43,12 +43,15 @@ stdenv.mkDerivation rec {
make oldconfig
'';
- makeFlags = [ "PREFIX=$(out)" ] ++ lib.optional enableStatic "LDFLAGS=--static";
+ makeFlags = [ "PREFIX=$(out)/bin" ] ++ lib.optional enableStatic "LDFLAGS=--static";
+
+ installTargets = "install_flat";
# tests currently (as of 0.8.0) get stuck in an infinite loop...
# ...this is fixed in latest git, so doCheck can likely be enabled for next release
# see https://github.com/landley/toybox/commit/b928ec480cd73fd83511c0f5ca786d1b9f3167c3
#doCheck = true;
+ checkInputs = [ which ]; # used for tests with checkFlags = [ "DEBUG=true" ];
checkTarget = "tests";
meta = with stdenv.lib; {
diff --git a/pkgs/tools/misc/trash-cli/default.nix b/pkgs/tools/misc/trash-cli/default.nix
index 7ae871afc78..1f5a6c4ea4c 100644
--- a/pkgs/tools/misc/trash-cli/default.nix
+++ b/pkgs/tools/misc/trash-cli/default.nix
@@ -28,8 +28,10 @@ python3Packages.buildPythonApplication rec {
})
];
- buildInputs = with python3Packages; [ nose mock ];
-
+ checkInputs = with python3Packages; [
+ nose
+ mock
+ ];
checkPhase = "nosetests";
meta = with stdenv.lib; {
diff --git a/pkgs/tools/networking/dd-agent/6.nix b/pkgs/tools/networking/dd-agent/6.nix
index 944ba604ece..0c0c4212b6a 100644
--- a/pkgs/tools/networking/dd-agent/6.nix
+++ b/pkgs/tools/networking/dd-agent/6.nix
@@ -6,22 +6,22 @@ let
in buildGoPackage rec {
name = "datadog-agent-${version}";
- version = "6.10.0";
+ version = "6.10.1";
owner = "DataDog";
repo = "datadog-agent";
src = fetchFromGitHub {
inherit owner repo;
rev = "${version}";
- sha256 = "076ww3swlqi7gfmqmnllhif8f6skv0jwc2gq3mi855p4mm6qyiia";
+ sha256 = "1yxwlf0kwjhadq6f1p9z100d363x1s1xzni3rw42m08mzx9fr469";
};
subPackages = [
"cmd/agent"
+ "cmd/cluster-agent"
"cmd/dogstatsd"
"cmd/py-launcher"
- # Does not compile: go/src/github.com/DataDog/datadog-agent/cmd/cluster-agent/main.go:31:12: undefined: app.ClusterAgentCmd
- #"cmd/cluster-agent"
+ "cmd/trace-agent"
];
goDeps = ./deps.nix;
goPackagePath = "github.com/${owner}/${repo}";
diff --git a/pkgs/tools/networking/dd-agent/datadog-process-agent-deps.nix b/pkgs/tools/networking/dd-agent/datadog-process-agent-deps.nix
index 863402854ae..ca6b3dcee42 100644
--- a/pkgs/tools/networking/dd-agent/datadog-process-agent-deps.nix
+++ b/pkgs/tools/networking/dd-agent/datadog-process-agent-deps.nix
@@ -3,9 +3,9 @@
{
goPackagePath = "bitbucket.org/ww/goautoneg";
fetch = {
- type = "hg";
- url = "https://bitbucket.org/ww/goautoneg";
- rev = "75cd24fc2f2c2a2088577d12123ddee5f54e0675";
+ type = "git";
+ url = "https://github.com/adjust/goautoneg";
+ rev = "d788f35a0315672bc90f50a6145d1252a230ee0d";
sha256 = "19khhn5xhqv1yp7d6k987gh5w5rhrjnp4p0c6fyrd8z6lzz5h9qi";
};
}
@@ -23,8 +23,8 @@
fetch = {
type = "git";
url = "https://github.com/DataDog/datadog-agent";
- rev = "f2d7ce69202c8212cae1ebf476d038b28f3a895e";
- sha256 = "0by3qvj6468r3532x1q6ingf6hlgv4dk8g1aa0hmh9gm25dbfsg5";
+ rev = "4aa90bd394b62b0d3e3f15703c6e459c1c477fbc";
+ sha256 = "13zvg8ykakq97bw0kd2gj4s9gfjpx23d3c51w1jpa1raqwhgqi8z";
};
}
{
@@ -41,17 +41,17 @@
fetch = {
type = "git";
url = "https://github.com/DataDog/gopsutil";
- rev = "771928d86fa878b9d62f073a7a6f91ee0a358105";
- sha256 = "0dr5a67jy2zh42dcndx981ca1wv0phc16zlimahjlr00qxam90xi";
+ rev = "c8f74f1344dd41bc49ec4d3c2377c526aaedfd20";
+ sha256 = "0r8al83apxrq1v6s2mq0p8h3c4z4n5g7ax8vcvs70pq0czy2fvgp";
};
}
{
- goPackagePath = "github.com/DataDog/tcptracer-bpf";
+ goPackagePath = "github.com/DataDog/viper";
fetch = {
type = "git";
- url = "https://github.com/DataDog/tcptracer-bpf";
- rev = "636ee01a99a4bd352329de98f40fb9fdf611d1c9";
- sha256 = "13373wg1x90jydzgbblxpq2gg9b7ppk6nkjzhw8d27mxd047i74m";
+ url = "https://github.com/DataDog/viper";
+ rev = "23ced3bc6b3751855704445e48da2c53075ade86";
+ sha256 = "1zzf4mqpmk47p3395k2v8q6wi7lnqxr0l55vv4zk9gpqqyifbm9m";
};
}
{
@@ -59,8 +59,8 @@
fetch = {
type = "git";
url = "https://github.com/DataDog/zstd";
- rev = "2bf71ec4836011b92dc78df3b9ace6b40e65f7df";
- sha256 = "0j0qmnzjxx86kavrb3qcashp2irzjbvip15df97k87pcfvl1gsig";
+ rev = "2b373cbe6ac0c8e6960bbd18026ceb269eef89f5";
+ sha256 = "157kh7w173igxbypknmr8hc8934ykmnb02pkb76k1jwq4sphn8qj";
};
}
{
@@ -77,8 +77,8 @@
fetch = {
type = "git";
url = "https://github.com/StackExchange/wmi";
- rev = "b12b22c5341f0c26d88c4d66176330500e84db68";
- sha256 = "0kzkb4zllhrdiq0m9m5ka9i393r1hnx75lnd3hz5rg2fs0n3ym16";
+ rev = "5d049714c4a64225c3c79a7cf7d02f7fb5b96338";
+ sha256 = "1slw6v1fl8i0hz4db9lph55pbhnrxhqyndq6vm27dgvpj22k29fk";
};
}
{
@@ -302,8 +302,8 @@
fetch = {
type = "git";
url = "https://github.com/iovisor/gobpf";
- rev = "3b07770c6d5e2bd37e582ecd49460e6ef094f257";
- sha256 = "0inv9vwjd8r365rdpf6z4kzs8b36890vrfkifw228mjlxxx8rg7f";
+ rev = "98ebf56442afb10e1b43145127de3c1777ed7e95";
+ sha256 = "0m2aah77b1k2yf31za975mcix5n0jijqkqmhgakip00klihx383k";
};
}
{
@@ -324,13 +324,22 @@
sha256 = "0siqfghsm2lkdwinvg8x5gls3p76rq3cdm59c1r4x0b2mdfhnvcd";
};
}
+ {
+ goPackagePath = "github.com/kardianos/osext";
+ fetch = {
+ type = "git";
+ url = "https://github.com/kardianos/osext";
+ rev = "ae77be60afb1dcacde03767a8c37337fad28ac14";
+ sha256 = "056dkgxrqjj5r18bnc3knlpgdz5p3yvp12y4y978hnsfhwaqvbjz";
+ };
+ }
{
goPackagePath = "github.com/kubernetes-incubator/custom-metrics-apiserver";
fetch = {
type = "git";
url = "https://github.com/kubernetes-incubator/custom-metrics-apiserver";
- rev = "e61f72fec56ab519d74ebd396cd3fcf31b084558";
- sha256 = "1cgbn0yzvrqrxq4kwwz2d6vddi9py2z18dx33yjd8w85j9ghhg6g";
+ rev = "bb8bae16c5550f2aeef3151259a1b36078a0e544";
+ sha256 = "1f1n4dh9w2qfs704yw8nhbv50n6f9fxy8ndir96l37lnwd2dvj8p";
};
}
{
@@ -473,8 +482,8 @@
fetch = {
type = "git";
url = "https://github.com/shirou/gopsutil";
- rev = "8048a2e9c5773235122027dd585cf821b2af1249";
- sha256 = "17ri1ijhvg6gxscaw4sy0r5pkcyiqdsf6nn2d4q36hd0nrswvk29";
+ rev = "071446942108a03a13cf0717275ad3bdbcb691b4";
+ sha256 = "0ai246kqsfm3xlnp4pp4d197djh6jrbjja832f355zhg3l9fqwfp";
};
}
{
@@ -522,15 +531,6 @@
sha256 = "0nr4mdpfhhk94hq4ymn5b2sxc47b29p1akxd8b0hx4dvdybmipb5";
};
}
- {
- goPackagePath = "github.com/spf13/viper";
- fetch = {
- type = "git";
- url = "https://github.com/spf13/viper";
- rev = "b5e8006cbee93ec955a89ab31e0e3ce3204f3736";
- sha256 = "0y3r6ysi5vn0yq5c7pbl62yg2i64fkv54xgj2jf1hn3v6zzyimis";
- };
- }
{
goPackagePath = "github.com/stretchr/testify";
fetch = {
@@ -572,8 +572,8 @@
fetch = {
type = "git";
url = "https://go.googlesource.com/sys";
- rev = "95c6576299259db960f6c5b9b69ea52422860fce";
- sha256 = "1fhq8bianb9a1iccpr92mi2hix9zvm10n0f7syx6vfbxdw32i316";
+ rev = "a9d3bda3a223baa6bba6ef412cb273f0fd163c05";
+ sha256 = "1w45zc13xrjzl19s1sx74r5mg3lf2z2nm13wygcdq5r5pyjlhdz9";
};
}
{
@@ -617,8 +617,8 @@
fetch = {
type = "git";
url = "https://github.com/zorkian/go-datadog-api";
- rev = "6c08e2322af96e867e5715aedd6ea194c42cf44f";
- sha256 = "16ha3azq9981hwpn18sd50ai6d1h85fsawbdxp352c4gi8bhj8zw";
+ rev = "d7b8b10db6a7eb1c1c2424b10a795a1662e80c9a";
+ sha256 = "069psfvgal6pkwc1s09gdy4mjn4ki4d1zvqnnzn7y15i5llb97kk";
};
}
{
diff --git a/pkgs/tools/networking/dd-agent/datadog-process-agent.nix b/pkgs/tools/networking/dd-agent/datadog-process-agent.nix
index 7541eee0a20..b5010c28cb5 100644
--- a/pkgs/tools/networking/dd-agent/datadog-process-agent.nix
+++ b/pkgs/tools/networking/dd-agent/datadog-process-agent.nix
@@ -2,15 +2,14 @@
buildGoPackage rec {
name = "datadog-process-agent-${version}";
- # NOTE: this is 6.5.0 + https://github.com/DataDog/datadog-process-agent/pull/185
- version = "6.5.0";
+ version = "6.10.0";
owner = "DataDog";
repo = "datadog-process-agent";
src = fetchFromGitHub {
inherit owner repo;
- rev = "bd96c99c97e8639fd3ea72e61a492c0a74686abe";
- sha256 = "0afdf344256jivzhdv3k9n9i4aik1yr805dnrc2i3d4di9w8vg8c";
+ rev = "${version}";
+ sha256 = "16lr1gp6n0aph8zikk5kmaib9i5b1jbndxlxfi84bd9f8lhvmkhk";
};
goDeps = ./datadog-process-agent-deps.nix;
diff --git a/pkgs/tools/networking/dd-agent/datadog-trace-agent-deps.nix b/pkgs/tools/networking/dd-agent/datadog-trace-agent-deps.nix
deleted file mode 100644
index a51cf183993..00000000000
--- a/pkgs/tools/networking/dd-agent/datadog-trace-agent-deps.nix
+++ /dev/null
@@ -1,156 +0,0 @@
-# file generated from Gopkg.lock using dep2nix (https://github.com/nixcloud/dep2nix)
-[
- {
- goPackagePath = "github.com/DataDog/datadog-agent";
- fetch = {
- type = "git";
- url = "https://github.com/DataDog/datadog-agent";
- rev = "92733ff01547103d5286afc9e272d501cb18f761";
- sha256 = "1mmb7gyin6c4l6pj0nw3kpmj8wvjm7c8n4h5frv26bhg84m15xhd";
- };
- }
- {
- goPackagePath = "github.com/DataDog/datadog-go";
- fetch = {
- type = "git";
- url = "https://github.com/DataDog/datadog-go";
- rev = "a9c7a9896c1847c9cc2b068a2ae68e9d74540a5d";
- sha256 = "1m1vpi2s22dqcq0fqhfp3skzkmsbmhzyiw2kh2dw6ii7qimy8zki";
- };
- }
- {
- goPackagePath = "github.com/StackExchange/wmi";
- fetch = {
- type = "git";
- url = "https://github.com/StackExchange/wmi";
- rev = "ea383cf3ba6ec950874b8486cd72356d007c768f";
- sha256 = "1x3a3rdxccrzrnkld67p9ilm086v4w195rdhyw0bq39x1v1vzbln";
- };
- }
- {
- goPackagePath = "github.com/cihub/seelog";
- fetch = {
- type = "git";
- url = "https://github.com/cihub/seelog";
- rev = "d2c6e5aa9fbfdd1c624e140287063c7730654115";
- sha256 = "0ab9kyrh51x1x71z37pwjsla0qv11a1qv697xafyc4r5nq5hds6p";
- };
- }
- {
- goPackagePath = "github.com/davecgh/go-spew";
- fetch = {
- type = "git";
- url = "https://github.com/davecgh/go-spew";
- rev = "346938d642f2ec3594ed81d874461961cd0faa76";
- sha256 = "0d4jfmak5p6lb7n2r6yvf5p1zcw0l8j74kn55ghvr7zr7b7axm6c";
- };
- }
- {
- goPackagePath = "github.com/go-ini/ini";
- fetch = {
- type = "git";
- url = "https://github.com/go-ini/ini";
- rev = "74bdc99692c3408cb103221e38675ce8fda0a718";
- sha256 = "0ad93rznilmd1hw20nlkr7ywi3sbd299mynf4db20k5yl34r3498";
- };
- }
- {
- goPackagePath = "github.com/go-ole/go-ole";
- fetch = {
- type = "git";
- url = "https://github.com/go-ole/go-ole";
- rev = "de8695c8edbf8236f30d6e1376e20b198a028d42";
- sha256 = "084caxl71v8lgg475whj2pz9mij3wk3gpbh3pfyf2dm66b6xrq2k";
- };
- }
- {
- goPackagePath = "github.com/gogo/protobuf";
- fetch = {
- type = "git";
- url = "https://github.com/gogo/protobuf";
- rev = "d76fbc1373015ced59b43ac267f28d546b955683";
- sha256 = "051a3imx2m7gpns8cjm1gckif9z6i4ik0svc1i8j7h86800c5rg0";
- };
- }
- {
- goPackagePath = "github.com/golang/protobuf";
- fetch = {
- type = "git";
- url = "https://github.com/golang/protobuf";
- rev = "1e59b77b52bf8e4b449a57e6f79f21226d571845";
- sha256 = "19bkh81wnp6njg3931wky6hsnnl2d1ig20vfjxpv450sd3k6yys8";
- };
- }
- {
- goPackagePath = "github.com/philhofer/fwd";
- fetch = {
- type = "git";
- url = "https://github.com/philhofer/fwd";
- rev = "bb6d471dc95d4fe11e432687f8b70ff496cf3136";
- sha256 = "1pg84khadh79v42y8sjsdgfb54vw2kzv7hpapxkifgj0yvcp30g2";
- };
- }
- {
- goPackagePath = "github.com/pmezard/go-difflib";
- fetch = {
- type = "git";
- url = "https://github.com/pmezard/go-difflib";
- rev = "792786c7400a136282c1664665ae0a8db921c6c2";
- sha256 = "0c1cn55m4rypmscgf0rrb88pn58j3ysvc2d0432dp3c6fqg6cnzw";
- };
- }
- {
- goPackagePath = "github.com/shirou/gopsutil";
- fetch = {
- type = "git";
- url = "https://github.com/shirou/gopsutil";
- rev = "70a1b78fe69202d93d6718fc9e3a4d6f81edfd58";
- sha256 = "04qbzj7r7ahq6s407lh9rb3xagbnaj5wp79siq49qkiz3101kfdb";
- };
- }
- {
- goPackagePath = "github.com/shirou/w32";
- fetch = {
- type = "git";
- url = "https://github.com/shirou/w32";
- rev = "bb4de0191aa41b5507caa14b0650cdbddcd9280b";
- sha256 = "0xh5vqblhr2c3mlaswawx6nipi4rc2x73rbdvlkakmgi0nnl50m4";
- };
- }
- {
- goPackagePath = "github.com/stretchr/testify";
- fetch = {
- type = "git";
- url = "https://github.com/stretchr/testify";
- rev = "12b6f73e6084dad08a7c6e575284b177ecafbc71";
- sha256 = "01f80s0q64pw5drfgqwwk1wfwwkvd2lhbs56lhhkff4ni83k73fd";
- };
- }
- {
- goPackagePath = "github.com/tinylib/msgp";
- fetch = {
- type = "git";
- url = "https://github.com/tinylib/msgp";
- rev = "362bfb3384d53ae4d5dd745983a4d70b6d23628c";
- sha256 = "0b39cp417ndznkfwdqcbh89f9x3ml4rn7kf4l4als7vqrrwk7vrz";
- };
- }
- {
- goPackagePath = "golang.org/x/sys";
- fetch = {
- type = "git";
- url = "https://go.googlesource.com/sys";
- rev = "8f0908ab3b2457e2e15403d3697c9ef5cb4b57a9";
- sha256 = "04va4pqygfzr89fx873k44bmivk7nybqalybi6q96lnn45h2scbr";
- };
- }
- {
- goPackagePath = "gopkg.in/yaml.v2";
- fetch = {
- type = "git";
- url = "https://github.com/go-yaml/yaml";
- rev = "cd8b52f8269e0feb286dfeef29f8fe4d5b397e0b";
- sha256 = "1hj2ag9knxflpjibck0n90jrhsrqz7qvad4qnif7jddyapi9bqzl";
- };
- }
-]
\ No newline at end of file
diff --git a/pkgs/tools/networking/dd-agent/datadog-trace-agent.nix b/pkgs/tools/networking/dd-agent/datadog-trace-agent.nix
deleted file mode 100644
index bdd3491ed18..00000000000
--- a/pkgs/tools/networking/dd-agent/datadog-trace-agent.nix
+++ /dev/null
@@ -1,25 +0,0 @@
-{ stdenv, fetchFromGitHub, buildGoPackage }:
-
-buildGoPackage rec {
- name = "datadog-trace-agent-${version}";
- version = "6.5.0";
- owner = "DataDog";
- repo = "datadog-trace-agent";
-
- src = fetchFromGitHub {
- inherit owner repo;
- rev = "6.5.0";
- sha256 = "0xhhcdridilhdwpmr9h3cqg5w4fh87l1jhvzg34k30gdh0g81afw";
- };
-
- goDeps = ./datadog-trace-agent-deps.nix;
- goPackagePath = "github.com/${owner}/${repo}";
-
- meta = with stdenv.lib; {
- description = "Live trace collector for the DataDog Agent v6";
- homepage = https://www.datadoghq.com;
- license = licenses.bsd3;
- platforms = platforms.all;
- maintainers = with maintainers; [ rob ];
- };
-}
diff --git a/pkgs/tools/networking/dd-agent/deps.nix b/pkgs/tools/networking/dd-agent/deps.nix
index cd26e3c6873..5da6741c640 100644
--- a/pkgs/tools/networking/dd-agent/deps.nix
+++ b/pkgs/tools/networking/dd-agent/deps.nix
@@ -3,9 +3,9 @@
{
goPackagePath = "bitbucket.org/ww/goautoneg";
fetch = {
- type = "hg";
- url = "https://bitbucket.org/ww/goautoneg";
- rev = "75cd24fc2f2c2a2088577d12123ddee5f54e0675";
+ type = "git";
+ url = "https://github.com/adjust/goautoneg";
+ rev = "d788f35a0315672bc90f50a6145d1252a230ee0d";
sha256 = "19khhn5xhqv1yp7d6k987gh5w5rhrjnp4p0c6fyrd8z6lzz5h9qi";
};
}
@@ -18,13 +18,22 @@
sha256 = "0wva55yz5gs5gw23icz1z23hwhjw5vmijx4aa3fp3bq6pi63s873";
};
}
+ {
+ goPackagePath = "github.com/DataDog/datadog-go";
+ fetch = {
+ type = "git";
+ url = "https://github.com/DataDog/datadog-go";
+ rev = "e67964b4021ad3a334e748e8811eb3cd6becbc6e";
+ sha256 = "1b2dzyk9c9icdwcyfiwh3djzh8gb5z4hmhp796ns7hh72cdnnys1";
+ };
+ }
{
goPackagePath = "github.com/DataDog/gohai";
fetch = {
type = "git";
url = "https://github.com/DataDog/gohai";
- rev = "508b4f7bfc834501c944ab00e99b6f0e760f5ea7";
- sha256 = "0qnhckvj3sk9rwc3dxz48zhx5p8ajg71azhi3y1l7ac6ayzpsc7f";
+ rev = "bc98f936c76570e79c1c7e739425ff22ab2ee4a3";
+ sha256 = "1r59b6qpjnv399hm6pqfklm47hapkjwy9cp92frb3mhfz0wf9djl";
};
}
{
@@ -36,6 +45,15 @@
sha256 = "09jgzxi08pkxllxk3f5qwipz96jxrw5v035fj2bkid1d4akn8y0b";
};
}
+ {
+ goPackagePath = "github.com/DataDog/viper";
+ fetch = {
+ type = "git";
+ url = "https://github.com/DataDog/viper";
+ rev = "23ced3bc6b3751855704445e48da2c53075ade86";
+ sha256 = "1zzf4mqpmk47p3395k2v8q6wi7lnqxr0l55vv4zk9gpqqyifbm9m";
+ };
+ }
{
goPackagePath = "github.com/DataDog/zstd";
fetch = {
@@ -54,6 +72,15 @@
sha256 = "1m3ajjwpdmbzhn5iclhzgyknfncw06fnd5n91yxlf75qsq235rz3";
};
}
+ {
+ goPackagePath = "github.com/Microsoft/hcsshim";
+ fetch = {
+ type = "git";
+ url = "https://github.com/Microsoft/hcsshim";
+ rev = "0acf63599bff447edf6bbfb8bbb38cb5fb33aa1e";
+ sha256 = "009jx133302pj0jf1bxsj4r5zy7j0lxmr7l53czi7930516b0rh3";
+ };
+ }
{
goPackagePath = "github.com/NYTimes/gziphandler";
fetch = {
@@ -144,6 +171,60 @@
sha256 = "1cb7kib79xrzr8n91p6kskmn30ayqrhbqql2ppyf879967wbm8qy";
};
}
+ {
+ goPackagePath = "github.com/containerd/cgroups";
+ fetch = {
+ type = "git";
+ url = "https://github.com/containerd/cgroups";
+ rev = "3024bc7cc0c88af4b32d38a14444f38e65ab169f";
+ sha256 = "09jmzwl0zjzwhyd77pp8x3xwihcjxlxa9wamkx22rvd1pqlgszw7";
+ };
+ }
+ {
+ goPackagePath = "github.com/containerd/containerd";
+ fetch = {
+ type = "git";
+ url = "https://github.com/containerd/containerd";
+ rev = "9754871865f7fe2f4e74d43e2fc7ccd237edcbce";
+ sha256 = "065snv0s3v3z0ghadlii4w78qnhchcbx2kfdrvm8fk8gb4pkx1ya";
+ };
+ }
+ {
+ goPackagePath = "github.com/containerd/continuity";
+ fetch = {
+ type = "git";
+ url = "https://github.com/containerd/continuity";
+ rev = "c7c5070e6f6e090ab93b0a61eb921f2196fc3383";
+ sha256 = "0xyf9w4xn501jspl4r6ml84am90bfgljnjlbd4i1pxkm372qzvzf";
+ };
+ }
+ {
+ goPackagePath = "github.com/containerd/cri";
+ fetch = {
+ type = "git";
+ url = "https://github.com/containerd/cri";
+ rev = "f3687c59470b76ee57c90d4b3dd92888dec58c2b";
+ sha256 = "00lasx5yylmgsj1f9znl3xyxm2bngj4xfj69vcwb4qzdy0vclc7w";
+ };
+ }
+ {
+ goPackagePath = "github.com/containerd/fifo";
+ fetch = {
+ type = "git";
+ url = "https://github.com/containerd/fifo";
+ rev = "3d5202aec260678c48179c56f40e6f38a095738c";
+ sha256 = "11jp12vgfj0xg9m2w5cfay72fwrxb6w8za7rkcqw8yy8hypiqqxq";
+ };
+ }
+ {
+ goPackagePath = "github.com/containerd/typeurl";
+ fetch = {
+ type = "git";
+ url = "https://github.com/containerd/typeurl";
+ rev = "a93fcdb778cd272c6e9b3028b2f42d813e785d40";
+ sha256 = "0aqnf5rzc5pldln0czhxlr0fqaf5553ab7wzsq85p90lg1ryqnd6";
+ };
+ }
{
goPackagePath = "github.com/coreos/etcd";
fetch = {
@@ -194,8 +275,8 @@
fetch = {
type = "git";
url = "https://github.com/docker/distribution";
- rev = "48294d928ced5dd9b378f7fd7c6f5da3ff3f2c89";
- sha256 = "0nj4xd72mik4pj8g065cqb0yjmgpj5ppsqf2k5ibz9f68c39c00b";
+ rev = "83389a148052d74ac602f5f1d62f86ff2f3c4aa5";
+ sha256 = "0ypps7340k1g1njcdbn83c9233hrki0mxyj66av1i55ji378ayyn";
};
}
{
@@ -216,6 +297,15 @@
sha256 = "0v1pkr8apwmhyzbjfriwdrs1ihlk6pw7izm57r24mf9jdmg3fyb0";
};
}
+ {
+ goPackagePath = "github.com/docker/go-events";
+ fetch = {
+ type = "git";
+ url = "https://github.com/docker/go-events";
+ rev = "9461782956ad83b30282bf90e31fa6a70c255ba9";
+ sha256 = "0vn0kd0w253jwdk86gv1h6s8p6bzxiyif74xdzlb39zr6fdrr145";
+ };
+ }
{
goPackagePath = "github.com/docker/go-units";
fetch = {
@@ -225,6 +315,15 @@
sha256 = "0npxsb3pp89slwf4a73fxm20hykad8xggij6i6hcd5jy19bjrd93";
};
}
+ {
+ goPackagePath = "github.com/docker/spdystream";
+ fetch = {
+ type = "git";
+ url = "https://github.com/docker/spdystream";
+ rev = "bc6354cbbc295e925e4c611ffe90c1f287ee54db";
+ sha256 = "08746a15snvmax6cnzn2qy7cvsspxbsx97vdbjpdadir3pypjxya";
+ };
+ }
{
goPackagePath = "github.com/dsnet/compress";
fetch = {
@@ -369,6 +468,24 @@
sha256 = "0hkbrq4jq9s4nrz7xpx03z1zljss1zdylm3zb76hhjpp0s7hz418";
};
}
+ {
+ goPackagePath = "github.com/godbus/dbus";
+ fetch = {
+ type = "git";
+ url = "https://github.com/godbus/dbus";
+ rev = "a389bdde4dd695d414e47b755e95e72b7826432c";
+ sha256 = "1ckvg15zdsgmbn4mi36cazkb407ixc9mmyf7vwj8b8wi3d00rgn9";
+ };
+ }
+ {
+ goPackagePath = "github.com/gogo/googleapis";
+ fetch = {
+ type = "git";
+ url = "https://github.com/gogo/googleapis";
+ rev = "08a7655d27152912db7aaf4f983275eaf8d128ef";
+ sha256 = "0mzjclx31hkdgad0xjdihz23qphrsljkvzx5gnwn96m7agx6vkvr";
+ };
+ }
{
goPackagePath = "github.com/gogo/protobuf";
fetch = {
@@ -414,6 +531,15 @@
sha256 = "05w6mpc4qcy0pv8a2bzng8nf4s5rf5phfang4jwy9rgf808q0nxf";
};
}
+ {
+ goPackagePath = "github.com/google/btree";
+ fetch = {
+ type = "git";
+ url = "https://github.com/google/btree";
+ rev = "4030bb1f1f0c35b30ca7009e9ebd06849dd45306";
+ sha256 = "0ba430m9fbnagacp57krgidsyrgp3ycw5r7dj71brgp5r52g82p6";
+ };
+ }
{
goPackagePath = "github.com/google/gofuzz";
fetch = {
@@ -450,6 +576,15 @@
sha256 = "0pvzm23hklxysspnz52mih6h1q74vfrdhjfm1l3sa9r8hhqmmld2";
};
}
+ {
+ goPackagePath = "github.com/gregjones/httpcache";
+ fetch = {
+ type = "git";
+ url = "https://github.com/gregjones/httpcache";
+ rev = "9cad4c3443a7200dd6400aef47183728de563a38";
+ sha256 = "0wjdwcwqqcx2d5y68qvhg6qyj977il5ijmnn9h9cd6wjbdy0ay6s";
+ };
+ }
{
goPackagePath = "github.com/hashicorp/consul";
fetch = {
@@ -513,15 +648,6 @@
sha256 = "17crpqmn51fqcz0j1vi4grwwiaqpvc3zhl102hn5sy7s2lmdf630";
};
}
- {
- goPackagePath = "github.com/howeyc/gopass";
- fetch = {
- type = "git";
- url = "https://github.com/howeyc/gopass";
- rev = "bf9dde6d0d2c004a008c27aaee91170c786f6db8";
- sha256 = "1jxzyfnqi0h1fzlsvlkn10bncic803bfhslyijcxk55mgh297g45";
- };
- }
{
goPackagePath = "github.com/imdario/mergo";
fetch = {
@@ -554,8 +680,8 @@
fetch = {
type = "git";
url = "https://github.com/json-iterator/go";
- rev = "f2b4162afba35581b6d4a50d3b8f34e33c144682";
- sha256 = "0siqfghsm2lkdwinvg8x5gls3p76rq3cdm59c1r4x0b2mdfhnvcd";
+ rev = "1624edc4454b8682399def8740d46db5e4362ba4";
+ sha256 = "11wn4hpmrs8bmpvd93wqk49jfbbgylakhi35f9k5qd7jd479ci4s";
};
}
{
@@ -581,8 +707,8 @@
fetch = {
type = "git";
url = "https://github.com/kubernetes-incubator/custom-metrics-apiserver";
- rev = "e61f72fec56ab519d74ebd396cd3fcf31b084558";
- sha256 = "1cgbn0yzvrqrxq4kwwz2d6vddi9py2z18dx33yjd8w85j9ghhg6g";
+ rev = "85ebc283a57287a8fcb3ad4b488d633cd63ef7d8";
+ sha256 = "06m3xa9j46035bagv9r2ghsmdx6pr0r3lcj4hz1cx943dllj0n6v";
};
}
{
@@ -711,6 +837,42 @@
sha256 = "1aj7l8ii7hxnn3q4wzxlx3f92b1aspck6ncyqgb4h2g228phcibw";
};
}
+ {
+ goPackagePath = "github.com/opencontainers/go-digest";
+ fetch = {
+ type = "git";
+ url = "https://github.com/opencontainers/go-digest";
+ rev = "279bed98673dd5bef374d3b6e4b09e2af76183bf";
+ sha256 = "01gc7fpn8ax429024p2fcx3yb18axwz5bjf2hqxlii1jbsgw4bh9";
+ };
+ }
+ {
+ goPackagePath = "github.com/opencontainers/image-spec";
+ fetch = {
+ type = "git";
+ url = "https://github.com/opencontainers/image-spec";
+ rev = "d60099175f88c47cd379c4738d158884749ed235";
+ sha256 = "03dvbj3dln8c55v9gp79mgmz2yi2ws3r08iyz2fk41y3i22iaw1q";
+ };
+ }
+ {
+ goPackagePath = "github.com/opencontainers/runc";
+ fetch = {
+ type = "git";
+ url = "https://github.com/opencontainers/runc";
+ rev = "baf6536d6259209c3edfa2b22237af82942d3dfa";
+ sha256 = "09fm7f1k4lvx8v3crqb0cli1x2brlz8ka7f7qa8d2sb6ln58h7w7";
+ };
+ }
+ {
+ goPackagePath = "github.com/opencontainers/runtime-spec";
+ fetch = {
+ type = "git";
+ url = "https://github.com/opencontainers/runtime-spec";
+ rev = "d810dbc60d8c5aeeb3d054bd1132fab2121968ce";
+ sha256 = "0yqya0wslhv87nlidsmrw2720y3r3jpvqc2sh28y79ciyypxbk38";
+ };
+ }
{
goPackagePath = "github.com/openshift/api";
fetch = {
@@ -747,6 +909,33 @@
sha256 = "1fjzpcjng60mc3a4b2ql5a00d5gah84wj740dabv9kq67mpg8fxy";
};
}
+ {
+ goPackagePath = "github.com/petar/GoLLRB";
+ fetch = {
+ type = "git";
+ url = "https://github.com/petar/GoLLRB";
+ rev = "53be0d36a84c2a886ca057d34b6aa4468df9ccb4";
+ sha256 = "01xp3lcamqkvl91jg6ly202gdsgf64j39rkrcqxi6v4pbrcv7hz0";
+ };
+ }
+ {
+ goPackagePath = "github.com/peterbourgon/diskv";
+ fetch = {
+ type = "git";
+ url = "https://github.com/peterbourgon/diskv";
+ rev = "5f041e8faa004a95c88a202771f4cc3e991971e6";
+ sha256 = "1mxpa5aad08x30qcbffzk80g9540wvbca4blc1r2qyzl65b8929b";
+ };
+ }
+ {
+ goPackagePath = "github.com/philhofer/fwd";
+ fetch = {
+ type = "git";
+ url = "https://github.com/philhofer/fwd";
+ rev = "bb6d471dc95d4fe11e432687f8b70ff496cf3136";
+ sha256 = "1pg84khadh79v42y8sjsdgfb54vw2kzv7hpapxkifgj0yvcp30g2";
+ };
+ }
{
goPackagePath = "github.com/pierrec/lz4";
fetch = {
@@ -797,8 +986,8 @@
fetch = {
type = "git";
url = "https://github.com/prometheus/common";
- rev = "7600349dcfe1abd18d72d3a1770870d9800a7801";
- sha256 = "0lsp94dqpj35dny4m4x15kg4wgwawlm3in7cnpajkkacgyxagk5f";
+ rev = "89d80287644767070914e30199b4d959e491bd3d";
+ sha256 = "0nvbjr8nhkyakgjariskl3bvyb18723dzjmmxph6ppf4khi50j0w";
};
}
{
@@ -833,8 +1022,8 @@
fetch = {
type = "git";
url = "https://github.com/shirou/gopsutil";
- rev = "eeb1d38d69593f121e060d24d17f7b1f0936b203";
- sha256 = "01qsznk599225gf4pld7p2m30p61y77mvzhrs6raxpk6wf7icp4w";
+ rev = "ccc1c1016bc5d10e803189ee43417c50cdde7f1b";
+ sha256 = "0dk7644fc86n0974a00m2w5nbhzcgs1jjnillic90044w7rycg66";
};
}
{
@@ -846,6 +1035,15 @@
sha256 = "0xh5vqblhr2c3mlaswawx6nipi4rc2x73rbdvlkakmgi0nnl50m4";
};
}
+ {
+ goPackagePath = "github.com/sirupsen/logrus";
+ fetch = {
+ type = "git";
+ url = "https://github.com/sirupsen/logrus";
+ rev = "3e01752db0189b9157070a0e1668a620f9a85da2";
+ sha256 = "029irw2lsbqi944gdrbkwdw0m2794sqni4g21gsnmz142hbzds8c";
+ };
+ }
{
goPackagePath = "github.com/spf13/afero";
fetch = {
@@ -891,15 +1089,6 @@
sha256 = "0nr4mdpfhhk94hq4ymn5b2sxc47b29p1akxd8b0hx4dvdybmipb5";
};
}
- {
- goPackagePath = "github.com/DataDog/viper";
- fetch = {
- type = "git";
- url = "https://github.com/DataDog/viper";
- rev = "23ced3bc6b3751855704445e48da2c53075ade86";
- sha256 = "1zzf4mqpmk47p3395k2v8q6wi7lnqxr0l55vv4zk9gpqqyifbm9m";
- };
- }
{
goPackagePath = "github.com/stretchr/objx";
fetch = {
@@ -918,6 +1107,24 @@
sha256 = "0dlszlshlxbmmfxj5hlwgv3r22x0y1af45gn1vd198nvvs3pnvfs";
};
}
+ {
+ goPackagePath = "github.com/syndtr/gocapability";
+ fetch = {
+ type = "git";
+ url = "https://github.com/syndtr/gocapability";
+ rev = "33e07d32887e1e06b7c025f27ce52f62c7990bc0";
+ sha256 = "1x88c0b320b13w7samicf19dqx9rr4dnrh3yglk3cba21nwsp57i";
+ };
+ }
+ {
+ goPackagePath = "github.com/tinylib/msgp";
+ fetch = {
+ type = "git";
+ url = "https://github.com/tinylib/msgp";
+ rev = "af6442a0fcf6e2a1b824f70dd0c734f01e817751";
+ sha256 = "08ha23sn14071ywrgxlyj7r523vzdwx1i83dcp1mqa830glgqaff";
+ };
+ }
{
goPackagePath = "github.com/ugorji/go";
fetch = {
@@ -954,6 +1161,15 @@
sha256 = "020q1laxjx5kcmnqy4wmdb63zhb0lyq6wpy40axhswzg2nd21s44";
};
}
+ {
+ goPackagePath = "golang.org/x/mobile";
+ fetch = {
+ type = "git";
+ url = "https://go.googlesource.com/mobile";
+ rev = "bceb7ef27cc623473a5b664d2a3450576dddff0f";
+ sha256 = "0xky2417wm61j2p5ki3k4237fxyz8f5ds19nak0lm741s3xs2rqx";
+ };
+ }
{
goPackagePath = "golang.org/x/net";
fetch = {
@@ -963,6 +1179,15 @@
sha256 = "1738bi8l50f0iq0il6h4qy1cgy39yh3q4gh1lwp5y5j7jyy33ccd";
};
}
+ {
+ goPackagePath = "golang.org/x/sync";
+ fetch = {
+ type = "git";
+ url = "https://go.googlesource.com/sync";
+ rev = "1d60e4601c6fd243af51cc01ddf169918a5407ca";
+ sha256 = "046jlanz2lkxq1r57x9bl6s4cvfqaic6p2xybsj8mq1120jv4rs6";
+ };
+ }
{
goPackagePath = "golang.org/x/sys";
fetch = {
@@ -1035,6 +1260,15 @@
sha256 = "1l3vlv72b7rfkpy1164kwd3qzrqmmjnb67akzxqp2mlvc66k6p3d";
};
}
+ {
+ goPackagePath = "gopkg.in/square/go-jose.v2";
+ fetch = {
+ type = "git";
+ url = "https://github.com/square/go-jose";
+ rev = "ef984e69dd356202fd4e4910d4d9c24468bdf0b8";
+ sha256 = "0pxyrygc9mh6yn169rm6i3shax7zmmzps22px6mq3kl87zkk9b8h";
+ };
+ }
{
goPackagePath = "gopkg.in/yaml.v2";
fetch = {
@@ -1049,8 +1283,8 @@
fetch = {
type = "git";
url = "https://github.com/zorkian/go-datadog-api";
- rev = "6c08e2322af96e867e5715aedd6ea194c42cf44f";
- sha256 = "16ha3azq9981hwpn18sd50ai6d1h85fsawbdxp352c4gi8bhj8zw";
+ rev = "d7b8b10db6a7eb1c1c2424b10a795a1662e80c9a";
+ sha256 = "069psfvgal6pkwc1s09gdy4mjn4ki4d1zvqnnzn7y15i5llb97kk";
};
}
{
@@ -1058,8 +1292,17 @@
fetch = {
type = "git";
url = "https://github.com/kubernetes/api";
- rev = "9e5ffd1f1320950b238cfce291b926411f0af722";
- sha256 = "03992x9n9b8w9rlf70wizn7iqk8cbyksxg0sdc1mm5jyzyvgksgf";
+ rev = "4e7be11eab3ffcfc1876898b8272df53785a9504";
+ sha256 = "0klwmkvsnim66y8mvcmkqql12fbr5cja4qgjzp36197i6i335b62";
+ };
+ }
+ {
+ goPackagePath = "k8s.io/apiextensions-apiserver";
+ fetch = {
+ type = "git";
+ url = "https://github.com/kubernetes/apiextensions-apiserver";
+ rev = "b499623aa7a31f7c85b37017e068b21206a68e25";
+ sha256 = "1c0z71f0wqkwkc5x730l9gmzibkqk6af4mg5l6ks9lk69cbpxk0a";
};
}
{
@@ -1067,8 +1310,8 @@
fetch = {
type = "git";
url = "https://github.com/kubernetes/apimachinery";
- rev = "e386b2658ed20923da8cc9250e552f082899a1ee";
- sha256 = "0lgwpsvx0gpnrdnkqc9m96xwkifdq50l7cj9rvh03njws4rbd8jz";
+ rev = "def12e63c512da17043b4f0293f52d1006603d9f";
+ sha256 = "0dghch5avwcy3zx5k005hi71i9bl3603pk927xdjr5jlajzwm9xd";
};
}
{
@@ -1076,8 +1319,8 @@
fetch = {
type = "git";
url = "https://github.com/kubernetes/apiserver";
- rev = "2cf66d2375dce045e1e02e1d7b74a0d1e34fedb3";
- sha256 = "0x0am99n25njpbd1x20bhyadpv9w6qqjmspp1ahzpmdwjzrnsagg";
+ rev = "d296c96c12b7d15d7fb5fea7a05fb165f8fd4014";
+ sha256 = "0a413zpkm8afhh0jab8zrwvd61kvackll85kcdb6gyinw7f6qv7x";
};
}
{
@@ -1085,8 +1328,8 @@
fetch = {
type = "git";
url = "https://github.com/kubernetes/client-go";
- rev = "23781f4d6632d88e869066eaebb743857aa1ef9b";
- sha256 = "0cazbcv7j7fgjs00arx3a8f0z0ikybmv16ccy0yg0wp0nbc05r6v";
+ rev = "f2f85107cac6fe04c30435ca0ac0c3318fd1b94c";
+ sha256 = "153a3q172kmpbp6cq5005dgasdw0x36pg9xz1mfgv966k8rwws74";
};
}
{
@@ -1098,13 +1341,31 @@
sha256 = "13ik6dri0f9fzs8p6987h6n3y2aqjz5cj957826xwkpv4fj2zgq8";
};
}
+ {
+ goPackagePath = "k8s.io/kubernetes";
+ fetch = {
+ type = "git";
+ url = "https://github.com/kubernetes/kubernetes";
+ rev = "bb9ffb1654d4a729bb4cec18ff088eacc153c239";
+ sha256 = "0c5xpxg7ns5irrr0ydk8n394yp3922i0m61l26qyc183phr32wxi";
+ };
+ }
{
goPackagePath = "k8s.io/metrics";
fetch = {
type = "git";
url = "https://github.com/kubernetes/metrics";
- rev = "0d9ea2ac660031c8f2726a735dda29441f396f99";
- sha256 = "0bcsb7s4wlmrja35zvz4s10cf3w7dfn2ckjv6apxd1ykdjxnsk71";
+ rev = "972ef826b8401c180b89cefc7457daa2d116daa9";
+ sha256 = "0ba9mfy253d4pcqdvialh2shs4d43l0q84pn3569wiib8cisbc68";
+ };
+ }
+ {
+ goPackagePath = "k8s.io/utils";
+ fetch = {
+ type = "git";
+ url = "https://github.com/kubernetes/utils";
+ rev = "cd34563cd63c2bd7c6fe88a73c4dcf34ed8a67cb";
+ sha256 = "1wpqijsvf8s4iqjrrzgbxi3gay6vaglscyq14vxma4iacg8fx1jk";
};
}
]
diff --git a/pkgs/tools/networking/dd-agent/integrations-core.nix b/pkgs/tools/networking/dd-agent/integrations-core.nix
index e466be816e4..edf7a8faaf8 100644
--- a/pkgs/tools/networking/dd-agent/integrations-core.nix
+++ b/pkgs/tools/networking/dd-agent/integrations-core.nix
@@ -75,7 +75,7 @@ let
mongo = (ps: [ ps.pymongo ]);
network = (ps: [ ps.psutil ]);
nginx = (ps: []);
- postgres = (ps: with ps; [ pg8000 psycopg2 ]);
+ postgres = (ps: with ps; [ pg8000_1_12 psycopg2 ]);
};
# All integrations (default + extra):
diff --git a/pkgs/tools/networking/gandi-cli/default.nix b/pkgs/tools/networking/gandi-cli/default.nix
index 99db0ab2507..84250c1f209 100644
--- a/pkgs/tools/networking/gandi-cli/default.nix
+++ b/pkgs/tools/networking/gandi-cli/default.nix
@@ -4,13 +4,13 @@ with python3Packages;
buildPythonApplication rec {
pname = "gandi-cli";
- version = "1.3";
+ version = "1.4";
src = fetchFromGitHub {
owner = "Gandi";
repo = "gandi.cli";
rev = version;
- sha256 = "07i1y88j5awsw7qadk7gnmax8mi7vgh1nflnc8j54z53fjyamlcs";
+ sha256 = "06dc59iwxfncz61hs3lcq08c5zrp7x4n4ibk5lpqqx6rk0izzz9b";
};
propagatedBuildInputs = [ click ipy pyyaml requests ];
diff --git a/pkgs/tools/networking/haproxy/default.nix b/pkgs/tools/networking/haproxy/default.nix
index 7ae42cbdf57..6efbec8a08f 100644
--- a/pkgs/tools/networking/haproxy/default.nix
+++ b/pkgs/tools/networking/haproxy/default.nix
@@ -9,12 +9,12 @@ assert usePcre -> pcre != null;
stdenv.mkDerivation rec {
pname = "haproxy";
- version = "1.9.1";
+ version = "1.9.3";
name = "${pname}-${version}";
src = fetchurl {
url = "https://www.haproxy.org/download/${stdenv.lib.versions.majorMinor version}/src/${name}.tar.gz";
- sha256 = "1qf8q49njx9n3b1g10zz3kcqmhji8lqcklh7723671z3l4pk2imd";
+ sha256 = "1d0d0zdr3908wbmwqllq0l968iawykxyf6fd8vdf545pb0bc2b6j";
};
buildInputs = [ openssl zlib ]
diff --git a/pkgs/tools/networking/ntp/default.nix b/pkgs/tools/networking/ntp/default.nix
index de2fb1472aa..a990cb1ee92 100644
--- a/pkgs/tools/networking/ntp/default.nix
+++ b/pkgs/tools/networking/ntp/default.nix
@@ -8,11 +8,11 @@ let
in
stdenv.mkDerivation rec {
- name = "ntp-4.2.8p12";
+ name = "ntp-4.2.8p13";
src = fetchurl {
url = "https://www.eecis.udel.edu/~ntp/ntp_spool/ntp4/ntp-4.2/${name}.tar.gz";
- sha256 = "0m04ndn0674kcf9x0aggjya07a3hlig2nlzzpwk7vmqka0mj56vh";
+ sha256 = "0f1a4fya7v5s0426nim8ydvvlcashb8hicgs9xlm76ndrz7751r8";
};
# The hardcoded list of allowed system calls for seccomp is
diff --git a/pkgs/tools/networking/s6-dns/default.nix b/pkgs/tools/networking/s6-dns/default.nix
index f422dabaff6..af68440ede8 100644
--- a/pkgs/tools/networking/s6-dns/default.nix
+++ b/pkgs/tools/networking/s6-dns/default.nix
@@ -4,8 +4,8 @@ with skawarePackages;
buildPackage {
pname = "s6-dns";
- version = "2.3.0.1";
- sha256 = "16ymalc4yxbwc0kapwmissxlw2bdk4sx3b33zp1gwx3n6hkcgh8c";
+ version = "2.3.0.2";
+ sha256 = "1y9bhvx8bqsb2xq5lmlfnc1hw2b3jyqg11i9r4lj0n6vvaqwh1j8";
description = "A suite of DNS client programs and libraries for Unix systems";
diff --git a/pkgs/tools/networking/s6-networking/default.nix b/pkgs/tools/networking/s6-networking/default.nix
index 3f0e83ad9ce..b42b3ff5b73 100644
--- a/pkgs/tools/networking/s6-networking/default.nix
+++ b/pkgs/tools/networking/s6-networking/default.nix
@@ -20,8 +20,8 @@ assert sslSupportEnabled -> sslLibs ? ${sslSupport};
buildPackage {
pname = "s6-networking";
- version = "2.3.0.3";
- sha256 = "1kfjl7da6wkmyq1mvq9irkbzk2wbi0axjfbcw5cym5y11mqswsjs";
+ version = "2.3.0.4";
+ sha256 = "00kqp0mcp8c7f0z5s4399rd1haxasxkqgd6ds0j0607hvi56mqqa";
description = "A suite of small networking utilities for Unix systems";
diff --git a/pkgs/tools/networking/strongswan/default.nix b/pkgs/tools/networking/strongswan/default.nix
index 9ee5a0cf849..ff276c0d18a 100644
--- a/pkgs/tools/networking/strongswan/default.nix
+++ b/pkgs/tools/networking/strongswan/default.nix
@@ -8,6 +8,7 @@
, enableTNC ? false, trousers, sqlite, libxml2
, enableNetworkManager ? false, networkmanager
, libpcap
+, darwin
}:
# Note on curl support: If curl is built with gnutls as its backend, the
@@ -18,20 +19,21 @@ with stdenv.lib;
stdenv.mkDerivation rec {
name = "strongswan-${version}";
- version = "5.7.1";
+ version = "5.7.2";
src = fetchurl {
url = "https://download.strongswan.org/${name}.tar.bz2";
- sha256 = "1v2b8lnqrkbc9hx3p2rw36xvphdy5ayy3dblm3kz98p24s8rqvq0";
+ sha256 = "0w6cks42lvvyj5ivyhqyqxya48x93yzfpz281q3xmqicdskkp3ih";
};
dontPatchELF = true;
nativeBuildInputs = [ pkgconfig autoreconfHook ];
buildInputs =
- [ curl gmp python iptables ldns unbound openssl pcsclite ]
+ [ curl gmp python ldns unbound openssl pcsclite ]
++ optionals enableTNC [ trousers sqlite libxml2 ]
- ++ optionals stdenv.isLinux [ systemd.dev pam ]
+ ++ optionals stdenv.isLinux [ systemd.dev pam iptables ]
+ ++ optionals stdenv.isDarwin (with darwin.apple_sdk.frameworks; [ SystemConfiguration ])
++ optionals enableNetworkManager [ networkmanager ]
# ad-hoc fix for https://github.com/NixOS/nixpkgs/pull/51787
# Remove when the above PR lands in master
@@ -41,23 +43,17 @@ stdenv.mkDerivation rec {
./ext_auth-path.patch
./firewall_defaults.patch
./updown-path.patch
- (substituteAll {
+ (optional stdenv.isLinux (substituteAll {
src = ./modprobe-path.patch;
inherit kmod;
- })
+ }))
];
- postPatch = ''
- substituteInPlace src/libcharon/plugins/resolve/resolve_handler.c --replace "/sbin/resolvconf" "${openresolv}/sbin/resolvconf"
-
- # swanctl can be configured by files in SWANCTLDIR which defaults to
- # $out/etc/swanctl. Since that directory is in the nix store users can't
- # modify it. Ideally swanctl accepts a command line option for specifying
- # the configuration files. In the absence of that we patch swanctl to look
- # for configuration files in /etc/swanctl.
- substituteInPlace src/swanctl/swanctl.h --replace "SWANCTLDIR" "\"/etc/swanctl\""
+ postPatch = optionalString stdenv.isLinux ''
# glibc-2.26 reorganized internal includes
sed '1i#include ' -i src/libstrongswan/utils/utils/memory.h
+
+ substituteInPlace src/libcharon/plugins/resolve/resolve_handler.c --replace "/sbin/resolvconf" "${openresolv}/sbin/resolvconf"
'';
preConfigure = ''
@@ -65,17 +61,24 @@ stdenv.mkDerivation rec {
'';
configureFlags =
- [ "--enable-swanctl" "--enable-cmd" "--enable-systemd"
- "--enable-farp" "--enable-dhcp"
+ [ "--enable-swanctl"
+ "--enable-cmd"
"--enable-openssl"
"--enable-eap-sim" "--enable-eap-sim-file" "--enable-eap-simaka-pseudonym"
"--enable-eap-simaka-reauth" "--enable-eap-identity" "--enable-eap-md5"
"--enable-eap-gtc" "--enable-eap-aka" "--enable-eap-aka-3gpp2"
"--enable-eap-mschapv2" "--enable-eap-radius" "--enable-xauth-eap" "--enable-ext-auth"
- "--enable-forecast" "--enable-connmark" "--enable-acert"
+ "--enable-acert"
"--enable-pkcs11" "--enable-eap-sim-pcsc" "--enable-dnscert" "--enable-unbound"
- "--enable-af-alg" "--enable-xauth-pam" "--enable-chapoly"
+ "--enable-chapoly"
"--enable-curl" ]
+ ++ optionals stdenv.isLinux [
+ "--enable-farp" "--enable-dhcp"
+ "--enable-systemd"
+ "--enable-xauth-pam"
+ "--enable-forecast"
+ "--enable-connmark"
+ "--enable-af-alg" ]
++ optionals stdenv.isx86_64 [ "--enable-aesni" "--enable-rdrand" ]
++ optional (stdenv.hostPlatform.system == "i686-linux") "--enable-padlock"
++ optionals enableTNC [
@@ -89,7 +92,17 @@ stdenv.mkDerivation rec {
"--enable-sqlite" ]
++ optionals enableNetworkManager [
"--enable-nm"
- "--with-nm-ca-dir=/etc/ssl/certs"
+ "--with-nm-ca-dir=/etc/ssl/certs" ]
+ # Taken from: https://wiki.strongswan.org/projects/strongswan/wiki/MacOSX
+ ++ optionals stdenv.isDarwin [
+ "--disable-systemd"
+ "--disable-xauth-pam"
+ "--disable-kernel-netlink"
+ "--enable-kernel-pfkey"
+ "--enable-kernel-pfroute"
+ "--enable-kernel-libipsec"
+ "--enable-osx-attr"
+ "--disable-scripts"
];
postInstall = ''
@@ -97,7 +110,7 @@ stdenv.mkDerivation rec {
echo "include /etc/ipsec.secrets" >> $out/etc/ipsec.secrets
'';
- NIX_LDFLAGS = "-lgcc_s" ;
+ NIX_LDFLAGS = optionalString stdenv.cc.isGNU "-lgcc_s" ;
meta = {
description = "OpenSource IPsec-based VPN Solution";
diff --git a/pkgs/tools/networking/wireguard-go/default.nix b/pkgs/tools/networking/wireguard-go/default.nix
index a6a32ccf12a..6f168908585 100644
--- a/pkgs/tools/networking/wireguard-go/default.nix
+++ b/pkgs/tools/networking/wireguard-go/default.nix
@@ -2,13 +2,13 @@
buildGoPackage rec {
name = "wireguard-go-${version}";
- version = "0.0.20181001";
+ version = "0.0.20181222";
goPackagePath = "git.zx2c4.com/wireguard-go";
src = fetchzip {
url = "https://git.zx2c4.com/wireguard-go/snapshot/wireguard-go-${version}.tar.xz";
- sha256 = "0yh9f58xn8kcq3wgx2s8j19k2h1vbmg70fn5gvw9k98f5mzynls3";
+ sha256 = "00m1r97qrr4l21s5jk5m3xfpiybqbzgxp9failsy1nmx27wrdiky";
};
goDeps = ./deps.nix;
@@ -17,7 +17,7 @@ buildGoPackage rec {
description = "Userspace Go implementation of WireGuard";
homepage = https://git.zx2c4.com/wireguard-go/about/;
license = licenses.gpl2;
- maintainers = with maintainers; [ kirelagin yegortimoshenko zx2c4 ];
+ maintainers = with maintainers; [ elseym kirelagin yegortimoshenko zx2c4 ];
platforms = platforms.darwin;
};
}
diff --git a/pkgs/tools/networking/wireguard-go/deps.nix b/pkgs/tools/networking/wireguard-go/deps.nix
index 87e3d73018b..32f8cd2ebc2 100644
--- a/pkgs/tools/networking/wireguard-go/deps.nix
+++ b/pkgs/tools/networking/wireguard-go/deps.nix
@@ -1,30 +1,30 @@
-# file generated from Gopkg.lock using dep2nix (https://github.com/nixcloud/dep2nix)
+# file generated from go.mod using vgo2nix (https://github.com/adisbladis/vgo2nix)
[
{
- goPackagePath = "golang.org/x/crypto";
+ goPackagePath = "golang.org/x/crypto";
fetch = {
type = "git";
url = "https://go.googlesource.com/crypto";
- rev = "8ac0e0d97ce45cd83d1d7243c060cb8461dda5e9";
- sha256 = "0vg0dfpv1wgj5imlakpma763yfd67aqbiy0fcklq3cw46qmfbzf1";
+ rev = "505ab145d0a9";
+ sha256 = "1vbsvcvmjz6c00p5vf8ls533p52fx2y3gy6v4k5qrdlzl4wf0i5s";
};
}
{
- goPackagePath = "golang.org/x/net";
+ goPackagePath = "golang.org/x/net";
fetch = {
type = "git";
url = "https://go.googlesource.com/net";
- rev = "1e491301e022f8f977054da4c2d852decd59571f";
- sha256 = "1wc18flnz99bip2j1gpnvr3qdp1y7wgyvawlvvc8rmd6ggf5f2yq";
+ rev = "610586996380";
+ sha256 = "1sqwmvf70rq1j65lv5jzyiy7gd53l37dxlnjf2xj6p2i4fcwkk4z";
};
}
{
- goPackagePath = "golang.org/x/sys";
+ goPackagePath = "golang.org/x/sys";
fetch = {
type = "git";
url = "https://go.googlesource.com/sys";
- rev = "9527bec2660bd847c050fda93a0f0c6dee0800bb";
- sha256 = "02kd2lnw7dnyqs0vvcpzwkv5brpgkwagqly2xs7dwmsi1vvf400p";
+ rev = "2a47403f2ae5";
+ sha256 = "0ww1iz1zcw995957h32289yascl37pkvfj3qcvyghvnzf7xg9v6z";
};
}
-]
\ No newline at end of file
+]
diff --git a/pkgs/tools/package-management/nixops/azure-mgmt-compute/default.nix b/pkgs/tools/package-management/nixops/azure-mgmt-compute/default.nix
new file mode 100644
index 00000000000..462c9e615a1
--- /dev/null
+++ b/pkgs/tools/package-management/nixops/azure-mgmt-compute/default.nix
@@ -0,0 +1,37 @@
+{ pkgs
+, buildPythonPackage
+, fetchPypi
+, python
+, azure-mgmt-common
+}:
+
+buildPythonPackage rec {
+ version = "0.20.1";
+ pname = "azure-mgmt-compute";
+
+ src = fetchPypi {
+ inherit pname version;
+ extension = "zip";
+ sha256 = "97298fc7f133f1d50a974ed6299151eda494a574b0f7fdf8192a388015c2215a";
+ };
+
+ preConfigure = ''
+ # Patch to make this package work on requests >= 2.11.x
+ # CAN BE REMOVED ON NEXT PACKAGE UPDATE
+ sed -i 's|len(request_content)|str(len(request_content))|' azure/mgmt/compute/computemanagement.py
+ '';
+
+ postInstall = ''
+ echo "__import__('pkg_resources').declare_namespace(__name__)" >> "$out/lib/${python.libPrefix}"/site-packages/azure/__init__.py
+ echo "__import__('pkg_resources').declare_namespace(__name__)" >> "$out/lib/${python.libPrefix}"/site-packages/azure/mgmt/__init__.py
+ '';
+
+ propagatedBuildInputs = [ azure-mgmt-common ];
+
+ meta = with pkgs.lib; {
+ description = "Microsoft Azure SDK for Python";
+ homepage = "https://azure.microsoft.com/en-us/develop/python/";
+ license = licenses.asl20;
+ maintainers = with maintainers; [ olcai ];
+ };
+}
diff --git a/pkgs/tools/package-management/nixops/azure-mgmt-network/default.nix b/pkgs/tools/package-management/nixops/azure-mgmt-network/default.nix
new file mode 100644
index 00000000000..fd47f8895fd
--- /dev/null
+++ b/pkgs/tools/package-management/nixops/azure-mgmt-network/default.nix
@@ -0,0 +1,37 @@
+{ pkgs
+, buildPythonPackage
+, fetchPypi
+, azure-mgmt-common
+, python
+}:
+
+buildPythonPackage rec {
+ version = "0.20.1";
+ pname = "azure-mgmt-network";
+
+ src = fetchPypi {
+ inherit pname version;
+ extension = "zip";
+ sha256 = "10vj22h6nxpw0qpvib5x2g6qs5j8z31142icvh4qk8k40fcrs9hx";
+ };
+
+ preConfigure = ''
+ # Patch to make this package work on requests >= 2.11.x
+ # CAN BE REMOVED ON NEXT PACKAGE UPDATE
+ sed -i 's|len(request_content)|str(len(request_content))|' azure/mgmt/network/networkresourceprovider.py
+ '';
+
+ postInstall = ''
+ echo "__import__('pkg_resources').declare_namespace(__name__)" >> "$out/lib/${python.libPrefix}"/site-packages/azure/__init__.py
+ echo "__import__('pkg_resources').declare_namespace(__name__)" >> "$out/lib/${python.libPrefix}"/site-packages/azure/mgmt/__init__.py
+ '';
+
+ propagatedBuildInputs = [ azure-mgmt-common ];
+
+ meta = with pkgs.lib; {
+ description = "Microsoft Azure SDK for Python";
+ homepage = "https://azure.microsoft.com/en-us/develop/python/";
+ license = licenses.asl20;
+ maintainers = with maintainers; [ olcai ];
+ };
+}
diff --git a/pkgs/tools/package-management/nixops/azure-mgmt-nspkg/default.nix b/pkgs/tools/package-management/nixops/azure-mgmt-nspkg/default.nix
new file mode 100644
index 00000000000..aa037b48b4f
--- /dev/null
+++ b/pkgs/tools/package-management/nixops/azure-mgmt-nspkg/default.nix
@@ -0,0 +1,25 @@
+{ pkgs
+, buildPythonPackage
+, fetchPypi
+, azure-nspkg
+}:
+
+buildPythonPackage rec {
+ version = "1.0.0";
+ pname = "azure-mgmt-nspkg";
+
+ src = fetchPypi {
+ inherit pname version;
+ extension = "zip";
+ sha256 = "1rq92fj3kvnqkk18596dybw0kvhgscvc6cd8hp1dhy3wrkqnhwmq";
+ };
+
+ propagatedBuildInputs = [ azure-nspkg ];
+
+ meta = with pkgs.lib; {
+ description = "Microsoft Azure SDK for Python";
+ homepage = "https://azure.microsoft.com/en-us/develop/python/";
+ license = licenses.asl20;
+ maintainers = with maintainers; [ olcai ];
+ };
+}
diff --git a/pkgs/tools/package-management/nixops/azure-mgmt-resource/default.nix b/pkgs/tools/package-management/nixops/azure-mgmt-resource/default.nix
new file mode 100644
index 00000000000..b60e3aee340
--- /dev/null
+++ b/pkgs/tools/package-management/nixops/azure-mgmt-resource/default.nix
@@ -0,0 +1,38 @@
+{ pkgs
+, buildPythonPackage
+, fetchPypi
+, python
+, azure-mgmt-common
+}:
+
+
+buildPythonPackage rec {
+ version = "0.20.1";
+ pname = "azure-mgmt-resource";
+
+ src = fetchPypi {
+ inherit pname version;
+ extension = "zip";
+ sha256 = "0slh9qfm5nfacrdm3lid0sr8kwqzgxvrwf27laf9v38kylkfqvml";
+ };
+
+ preConfigure = ''
+ # Patch to make this package work on requests >= 2.11.x
+ # CAN BE REMOVED ON NEXT PACKAGE UPDATE
+ sed -i 's|len(request_content)|str(len(request_content))|' azure/mgmt/resource/resourcemanagement.py
+ '';
+
+ postInstall = ''
+ echo "__import__('pkg_resources').declare_namespace(__name__)" >> "$out/lib/${python.libPrefix}"/site-packages/azure/__init__.py
+ echo "__import__('pkg_resources').declare_namespace(__name__)" >> "$out/lib/${python.libPrefix}"/site-packages/azure/mgmt/__init__.py
+ '';
+
+ propagatedBuildInputs = [ azure-mgmt-common ];
+
+ meta = with pkgs.lib; {
+ description = "Microsoft Azure SDK for Python";
+ homepage = "https://azure.microsoft.com/en-us/develop/python/";
+ license = licenses.asl20;
+ maintainers = with maintainers; [ olcai ];
+ };
+}
diff --git a/pkgs/tools/package-management/nixops/azure-mgmt-storage/default.nix b/pkgs/tools/package-management/nixops/azure-mgmt-storage/default.nix
new file mode 100644
index 00000000000..2e0523bb25c
--- /dev/null
+++ b/pkgs/tools/package-management/nixops/azure-mgmt-storage/default.nix
@@ -0,0 +1,37 @@
+{ pkgs
+, buildPythonPackage
+, fetchPypi
+, python
+, azure-mgmt-common
+}:
+
+buildPythonPackage rec {
+ version = "0.20.0";
+ pname = "azure-mgmt-storage";
+
+ src = fetchPypi {
+ inherit pname version;
+ extension = "zip";
+ sha256 = "16iw7hqhq97vlzfwixarfnirc60l5mz951p57brpcwyylphl3yim";
+ };
+
+ preConfigure = ''
+ # Patch to make this package work on requests >= 2.11.x
+ # CAN BE REMOVED ON NEXT PACKAGE UPDATE
+ sed -i 's|len(request_content)|str(len(request_content))|' azure/mgmt/storage/storagemanagement.py
+ '';
+
+ postInstall = ''
+ echo "__import__('pkg_resources').declare_namespace(__name__)" >> "$out/lib/${python.libPrefix}"/site-packages/azure/__init__.py
+ echo "__import__('pkg_resources').declare_namespace(__name__)" >> "$out/lib/${python.libPrefix}"/site-packages/azure/mgmt/__init__.py
+ '';
+
+ propagatedBuildInputs = [ azure-mgmt-common ];
+
+ meta = with pkgs.lib; {
+ description = "Microsoft Azure SDK for Python";
+ homepage = "https://azure.microsoft.com/en-us/develop/python/";
+ license = licenses.asl20;
+ maintainers = with maintainers; [ olcai ];
+ };
+}
diff --git a/pkgs/tools/package-management/nixops/default.nix b/pkgs/tools/package-management/nixops/default.nix
index 56e0a31a97e..73e8c90d4e4 100644
--- a/pkgs/tools/package-management/nixops/default.nix
+++ b/pkgs/tools/package-management/nixops/default.nix
@@ -1,4 +1,4 @@
-{ callPackage, fetchurl }:
+{ callPackage, newScope, pkgs, fetchurl }:
callPackage ./generic.nix (rec {
version = "1.6.1";
@@ -6,4 +6,19 @@ callPackage ./generic.nix (rec {
url = "http://nixos.org/releases/nixops/nixops-${version}/nixops-${version}.tar.bz2";
sha256 = "0lfx5fhyg3z6725ydsk0ibg5qqzp5s0x9nbdww02k8s307axiah3";
};
+# nixops is incompatible with the most recent versions of listed
+# azure-mgmt-* packages, therefore we are pinning them to
+# package-private versions, so that they don't get trampled by
+# updates.
+# see
+# https://github.com/NixOS/nixops/issues/1065
+ python2Packages = pkgs.python2Packages.override {
+ overrides = (self: super: let callPackage = newScope self; in {
+ azure-mgmt-compute = callPackage ./azure-mgmt-compute { };
+ azure-mgmt-network = callPackage ./azure-mgmt-network { };
+ azure-mgmt-nspkg = callPackage ./azure-mgmt-nspkg { };
+ azure-mgmt-resource = callPackage ./azure-mgmt-resource { };
+ azure-mgmt-storage = callPackage ./azure-mgmt-storage { };
+ });
+ };
})
diff --git a/pkgs/tools/package-management/nixops/generic.nix b/pkgs/tools/package-management/nixops/generic.nix
index 2ce7f9858a5..813ae64bef5 100644
--- a/pkgs/tools/package-management/nixops/generic.nix
+++ b/pkgs/tools/package-management/nixops/generic.nix
@@ -1,6 +1,7 @@
{ lib, python2Packages, libxslt, docbook_xsl_ns, openssh, cacert
# version args
, src, version
+, meta ? {}
}:
python2Packages.buildPythonApplication {
@@ -55,5 +56,5 @@ python2Packages.buildPythonApplication {
maintainers = with lib.maintainers; [ eelco rob domenkozar ];
platforms = lib.platforms.unix;
license = lib.licenses.lgpl3;
- };
+ } // meta;
}
diff --git a/pkgs/tools/package-management/nixops/unstable.nix b/pkgs/tools/package-management/nixops/unstable.nix
index dc71914f087..88d9d0c94be 100644
--- a/pkgs/tools/package-management/nixops/unstable.nix
+++ b/pkgs/tools/package-management/nixops/unstable.nix
@@ -10,4 +10,21 @@ callPackage ./generic.nix (rec {
url = "https://hydra.nixos.org/build/88329589/download/2/nixops-${version}.tar.bz2";
sha256 = "1ppnhqmsbiijm6r77h86abv3fjny5iq35yvj207s520kjwzaj7kc";
};
+ # # Marking unstable as broken, instead of using the pinned version,
+ # # like stable does You might be able to use the following code (as
+ # # in stable), to run unstable against the pinned packages
+ # python2Packages = pkgs.python2Packages.override {
+ # overrides = (self: super: let callPackage = newScope self; in {
+ # azure-mgmt-compute = callPackage ./azure-mgmt-compute { };
+ # azure-mgmt-network = callPackage ./azure-mgmt-network { };
+ # azure-mgmt-nspkg = callPackage ./azure-mgmt-nspkg { };
+ # azure-mgmt-resource = callPackage ./azure-mgmt-resource { };
+ # azure-mgmt-storage = callPackage ./azure-mgmt-storage { };
+ # });
+ # };
+ # # otherwise
+ # # see https://github.com/NixOS/nixpkgs/pull/52550
+ # # see https://github.com/NixOS/nixops/issues/1065
+ # # see https://github.com/NixOS/nixpkgs/issues/52547
+ meta.broken = true;
})
diff --git a/pkgs/tools/security/aide/default.nix b/pkgs/tools/security/aide/default.nix
index 40cfcaf28fe..6fbc411bf75 100644
--- a/pkgs/tools/security/aide/default.nix
+++ b/pkgs/tools/security/aide/default.nix
@@ -2,11 +2,11 @@
stdenv.mkDerivation rec {
name = "aide-${version}";
- version = "0.16";
+ version = "0.16.1";
src = fetchurl {
- url = "mirror://sourceforge/aide/${version}/aide-${version}.tar.gz";
- sha256 = "0ibkv4z2gk14fn014kq13rp2ysiq6nn2cflv2q5i7zf466hm6758";
+ url = "https://github.com/aide/aide/releases/download/v${version}/${name}.tar.gz";
+ sha256 = "1dqhc0c24wa4zid06pfy61k357yvzh28ij86bk9jf6hcqzn7qaqg";
};
buildInputs = [ flex bison libmhash zlib acl attr libselinux pcre ];
diff --git a/pkgs/tools/security/sshuttle/default.nix b/pkgs/tools/security/sshuttle/default.nix
index c701b9dba73..6a9bd05d820 100644
--- a/pkgs/tools/security/sshuttle/default.nix
+++ b/pkgs/tools/security/sshuttle/default.nix
@@ -1,23 +1,23 @@
-{ stdenv, python3Packages, fetchurl, makeWrapper, pandoc
+{ stdenv, python3Packages, fetchurl, makeWrapper
, coreutils, iptables, nettools, openssh, procps, fetchpatch }:
python3Packages.buildPythonApplication rec {
name = "sshuttle-${version}";
- version = "0.78.4";
+ version = "0.78.5";
src = fetchurl {
- sha256 = "0pqk43kd7crqhg6qgnl8kapncwgw1xgaf02zarzypcw64kvdih9h";
+ sha256 = "0vp13xwrhx4m6zgsyzvai84lkq9mzkaw47j58dk0ll95kaymk2x8";
url = "mirror://pypi/s/sshuttle/${name}.tar.gz";
};
patches = [ ./sudo.patch ];
- nativeBuildInputs = [ makeWrapper python3Packages.setuptools_scm ] ++ stdenv.lib.optional (stdenv.hostPlatform.system != "i686-linux") pandoc;
+ nativeBuildInputs = [ makeWrapper python3Packages.setuptools_scm ];
buildInputs =
[ coreutils openssh procps nettools ]
++ stdenv.lib.optionals stdenv.isLinux [ iptables ];
- checkInputs = with python3Packages; [ mock pytest pytestrunner ];
+ checkInputs = with python3Packages; [ mock pytest pytestcov pytestrunner flake8 ];
postInstall = let
mapPath = f: x: stdenv.lib.concatStringsSep ":" (map f x);
@@ -31,11 +31,11 @@ python3Packages.buildPythonApplication rec {
description = "Transparent proxy server that works as a poor man's VPN";
longDescription = ''
Forward connections over SSH, without requiring administrator access to the
- target network (though it does require Python 2 at both ends).
+ target network (though it does require Python 2.7, Python 3.5 or later at both ends).
Works with Linux and Mac OS and supports DNS tunneling.
'';
license = licenses.gpl2;
- maintainers = with maintainers; [ domenkozar ];
+ maintainers = with maintainers; [ domenkozar carlosdagos ];
platforms = platforms.unix;
};
}
diff --git a/pkgs/tools/security/sshuttle/sudo.patch b/pkgs/tools/security/sshuttle/sudo.patch
index 761bfaef852..6e8634bd4a1 100644
--- a/pkgs/tools/security/sshuttle/sudo.patch
+++ b/pkgs/tools/security/sshuttle/sudo.patch
@@ -1,9 +1,9 @@
diff --git a/sshuttle/client.py b/sshuttle/client.py
-index 7a7b6d7..8dde615 100644
+index cab5b1c..e89f8a6 100644
--- a/sshuttle/client.py
+++ b/sshuttle/client.py
-@@ -158,7 +158,7 @@ class FirewallClient:
- def __init__(self, method_name):
+@@ -192,7 +192,7 @@ class FirewallClient:
+
self.auto_nets = []
python_path = os.path.dirname(os.path.dirname(__file__))
- argvbase = ([sys.executable, sys.argv[0]] +
diff --git a/pkgs/tools/security/vault/default.nix b/pkgs/tools/security/vault/default.nix
index 35b39196b33..92c757df22c 100644
--- a/pkgs/tools/security/vault/default.nix
+++ b/pkgs/tools/security/vault/default.nix
@@ -13,6 +13,8 @@ stdenv.mkDerivation rec {
nativeBuildInputs = [ go gox removeReferencesTo ];
+ GOCACHE="$TMPDIR/go-cache";
+
preBuild = ''
patchShebangs ./
substituteInPlace scripts/build.sh --replace 'git rev-parse HEAD' 'echo ${src.rev}'
diff --git a/pkgs/tools/security/vulnix/default.nix b/pkgs/tools/security/vulnix/default.nix
index 1c5466db363..c1fd40f24c6 100644
--- a/pkgs/tools/security/vulnix/default.nix
+++ b/pkgs/tools/security/vulnix/default.nix
@@ -2,13 +2,14 @@
pythonPackages.buildPythonApplication rec {
pname = "vulnix";
- version = "1.7.1";
+ version = "1.8.0";
src = pythonPackages.fetchPypi {
inherit pname version;
- sha256 = "15c32976sgb5clixngi6z1fk5h02v1kn1a89h8rkbkvyhfnjgg8m";
+ sha256 = "15j8zz7qmf6c6vhim08yn1knn0qhwypmc7bxw608zg5nf50vghyb";
};
+ outputs = [ "out" "doc" "man" ];
nativeBuildInputs = [ ronn ];
checkInputs = with pythonPackages; [
@@ -30,17 +31,15 @@ pythonPackages.buildPythonApplication rec {
zodb
]);
- outputs = [ "out" "doc" ];
-
postBuild = "make -C doc";
checkPhase = "py.test src/vulnix";
postInstall = ''
- install -D -t $out/share/man/man1 doc/vulnix.1
- install -D -t $out/share/man/man5 doc/vulnix-whitelist.5
install -D -t $doc/share/doc/vulnix README.rst CHANGES.rst
gzip $doc/share/doc/vulnix/*.rst
+ install -D -t $man/share/man/man1 doc/vulnix.1
+ install -D -t $man/share/man/man5 doc/vulnix-whitelist.5
'';
dontStrip = true;
diff --git a/pkgs/tools/system/facter/default.nix b/pkgs/tools/system/facter/default.nix
index c180ef4070c..d775df98aac 100644
--- a/pkgs/tools/system/facter/default.nix
+++ b/pkgs/tools/system/facter/default.nix
@@ -2,10 +2,10 @@
stdenv.mkDerivation rec {
name = "facter-${version}";
- version = "3.12.3";
+ version = "3.13.0";
src = fetchFromGitHub {
- sha256 = "0b9ci3r42dvqvvh3vflba75iv52n0viwddw9qpjsprb35ff9vzp7";
+ sha256 = "1sqj8777vwb2izm86y74sivbpyxcx95sflgjn0pbqni311ck972v";
rev = version;
repo = "facter";
owner = "puppetlabs";
diff --git a/pkgs/tools/system/fio/default.nix b/pkgs/tools/system/fio/default.nix
index 8e9fb6da540..b83c32e94d0 100644
--- a/pkgs/tools/system/fio/default.nix
+++ b/pkgs/tools/system/fio/default.nix
@@ -4,13 +4,13 @@
stdenv.mkDerivation rec {
name = "fio-${version}";
- version = "3.12";
+ version = "3.13";
src = fetchFromGitHub {
owner = "axboe";
repo = "fio";
rev = "fio-${version}";
- sha256 = "18awz03mdzdbja1n9nm6jyvv7ic2dabh6c7ip5vwpam8c6mj4yjq";
+ sha256 = "0v5r97s3m67czq6ymqb5w3avf6mcnl2agzzwyd78g8gqvlyijlih";
};
buildInputs = [ python zlib ]
diff --git a/pkgs/tools/system/s6-rc/default.nix b/pkgs/tools/system/s6-rc/default.nix
index 2712186ec5d..4f6fdd16dca 100644
--- a/pkgs/tools/system/s6-rc/default.nix
+++ b/pkgs/tools/system/s6-rc/default.nix
@@ -4,8 +4,8 @@ with skawarePackages;
buildPackage {
pname = "s6-rc";
- version = "0.4.1.0";
- sha256 = "1xl37xi509pcm5chcvn8l7gb952sr5mkpxhpkbsxhsllj791bfa2";
+ version = "0.5.0.0";
+ sha256 = "0p97p49i8m44lfiffycgn7xi08yzxkrs5dyb03svdhd6clwh6zyb";
description = "A service manager for s6-based systems";
platforms = stdenv.lib.platforms.linux;
diff --git a/pkgs/tools/system/s6/default.nix b/pkgs/tools/system/s6/default.nix
index 4389755bc4c..ff233e6ad94 100644
--- a/pkgs/tools/system/s6/default.nix
+++ b/pkgs/tools/system/s6/default.nix
@@ -4,8 +4,8 @@ with skawarePackages;
buildPackage {
pname = "s6";
- version = "2.7.2.2";
- sha256 = "0psjmfidjdciswakw9agzzniqfmhrr21765m0q77kwxg7iisgpsq";
+ version = "2.8.0.0";
+ sha256 = "01milx5shixvniaxxmanfzz54vcymjfi86433w62rk5ypvc94ir8";
description = "skarnet.org's small & secure supervision software suite";
diff --git a/pkgs/tools/system/stress-ng/default.nix b/pkgs/tools/system/stress-ng/default.nix
index 0c5a088daf9..8237a4928a0 100644
--- a/pkgs/tools/system/stress-ng/default.nix
+++ b/pkgs/tools/system/stress-ng/default.nix
@@ -4,11 +4,11 @@
stdenv.mkDerivation rec {
name = "stress-ng-${version}";
- version = "0.09.49";
+ version = "0.09.54";
src = fetchurl {
url = "https://kernel.ubuntu.com/~cking/tarballs/stress-ng/${name}.tar.xz";
- sha256 = "1ll2i7vgnwpfhvq963m2aqwffkrmjggnscpmwn8qbdh0a82lmq2x";
+ sha256 = "0qbgabrxm8aj4a6bgf55mi7rv9sqcgl3kkm7j3qhkqjfn9rqzslb";
};
# All platforms inputs then Linux-only ones
diff --git a/pkgs/tools/system/thinkfan/default.nix b/pkgs/tools/system/thinkfan/default.nix
index b9467902c1f..dc63b97056a 100644
--- a/pkgs/tools/system/thinkfan/default.nix
+++ b/pkgs/tools/system/thinkfan/default.nix
@@ -1,4 +1,5 @@
-{ stdenv, fetchurl, cmake }:
+{ stdenv, fetchurl, cmake
+, smartSupport ? false, libatasmart }:
stdenv.mkDerivation rec {
name = "thinkfan-${version}";
@@ -11,6 +12,10 @@ stdenv.mkDerivation rec {
nativeBuildInputs = [ cmake ];
+ buildInputs = stdenv.lib.optional smartSupport libatasmart;
+
+ cmakeFlags = stdenv.lib.optional smartSupport "-DUSE_ATASMART=ON";
+
installPhase = ''
install -Dm755 {.,$out/bin}/thinkfan
diff --git a/pkgs/tools/typesetting/asciidoc/default.nix b/pkgs/tools/typesetting/asciidoc/default.nix
index efa1471f068..d18a5e2c744 100644
--- a/pkgs/tools/typesetting/asciidoc/default.nix
+++ b/pkgs/tools/typesetting/asciidoc/default.nix
@@ -5,7 +5,7 @@
, highlight ? null
, pygments ? null
, graphviz ? null
-, tetex ? null
+, texlive ? null
, dblatexFull ? null
, libxslt ? null
, w3m ? null
@@ -47,7 +47,7 @@ assert enableStandardFeatures ->
highlight != null &&
pygments != null &&
graphviz != null &&
- tetex != null &&
+ texlive != null &&
dblatexFull != null &&
libxslt != null &&
w3m != null &&
@@ -220,8 +220,8 @@ stdenv.mkDerivation rec {
-e "s|fdp|${graphviz}/bin/fdp|g" \
-i "filters/graphviz/graphviz2png.py"
- sed -e "s|run('latex|run('${tetex}/bin/latex|g" \
- -e "s|cmd = 'dvipng'|cmd = '${tetex}/bin/dvipng'|g" \
+ sed -e "s|run('latex|run('${texlive}/bin/latex|g" \
+ -e "s|cmd = 'dvipng'|cmd = '${texlive}/bin/dvipng'|g" \
-i "filters/latex/latex2png.py"
sed -e "s|run('abc2ly|run('${lilypond}/bin/abc2ly|g" \
@@ -238,7 +238,8 @@ stdenv.mkDerivation rec {
# use it to work around an impurity in the tetex package; tetex tools
# cannot find their neighbours (e.g. pdflatex doesn't find mktextfm).
# We can remove PATH= when those impurities are fixed.
- sed -e "s|^ENV =.*|ENV = dict(XML_CATALOG_FILES='${docbook_xml_dtd_45}/xml/dtd/docbook/catalog.xml ${docbook_xsl_ns}/xml/xsl/docbook/catalog.xml ${docbook_xsl}/xml/xsl/docbook/catalog.xml', PATH='${stdenv.lib.makeBinPath [ tetex coreutils gnused ]}')|" \
+ # TODO: Is this still necessary when using texlive?
+ sed -e "s|^ENV =.*|ENV = dict(XML_CATALOG_FILES='${docbook_xml_dtd_45}/xml/dtd/docbook/catalog.xml ${docbook_xsl_ns}/xml/xsl/docbook/catalog.xml ${docbook_xsl}/xml/xsl/docbook/catalog.xml', PATH='${stdenv.lib.makeBinPath [ texlive coreutils gnused ]}')|" \
-e "s|^ASCIIDOC =.*|ASCIIDOC = '$out/bin/asciidoc'|" \
-e "s|^XSLTPROC =.*|XSLTPROC = '${libxslt.bin}/bin/xsltproc'|" \
-e "s|^DBLATEX =.*|DBLATEX = '${dblatexFull}/bin/dblatex'|" \
diff --git a/pkgs/tools/typesetting/rubber/default.nix b/pkgs/tools/typesetting/rubber/default.nix
index 92c1cc52695..21d83dd1dd0 100644
--- a/pkgs/tools/typesetting/rubber/default.nix
+++ b/pkgs/tools/typesetting/rubber/default.nix
@@ -9,7 +9,7 @@ python3Packages.buildPythonApplication rec {
sha256 = "178dmrp0mza5gqjiqgk6dqs0c10s0c517pk6k9pjbam86vf47a1p";
};
- propagatedBuildInputs = [ texinfo ];
+ nativeBuildInputs = [ texinfo ];
# I couldn't figure out how to pass the proper parameter to disable pdf generation, so we
# use sed to change the default
diff --git a/pkgs/tools/typesetting/scdoc/default.nix b/pkgs/tools/typesetting/scdoc/default.nix
index 43d880fdf9a..17c153cd9f0 100644
--- a/pkgs/tools/typesetting/scdoc/default.nix
+++ b/pkgs/tools/typesetting/scdoc/default.nix
@@ -2,11 +2,11 @@
stdenv.mkDerivation rec {
name = "scdoc-${version}";
- version = "1.9.3";
+ version = "1.9.4";
src = fetchurl {
url = "https://git.sr.ht/~sircmpwn/scdoc/archive/${version}.tar.gz";
- sha256 = "1av933421a7g2c984l77gh1fwrhyqblglxr3px5qbng2sh7i33f6";
+ sha256 = "00zc3rzj97gscby31djlqyczvqpyhrl66i44czwzmmn7rc5j03m1";
};
postPatch = ''
diff --git a/pkgs/tools/typesetting/sile/default.nix b/pkgs/tools/typesetting/sile/default.nix
index d12d39016ff..c507db3cf1f 100644
--- a/pkgs/tools/typesetting/sile/default.nix
+++ b/pkgs/tools/typesetting/sile/default.nix
@@ -1,6 +1,7 @@
{ stdenv, darwin, fetchurl, makeWrapper, pkgconfig
, harfbuzz, icu, lpeg, luaexpat, luazlib, luafilesystem, luasocket, luasec
, fontconfig, lua, libiconv
+, makeFontsConf, gentium, gentium-book-basic, dejavu_fonts
}:
with stdenv.lib;
@@ -40,15 +41,37 @@ stdenv.mkDerivation rec {
LUA_PATH = luaPath;
LUA_CPATH = luaCPath;
+ FONTCONFIG_FILE = makeFontsConf {
+ fontDirectories = [
+ gentium
+ gentium-book-basic
+ dejavu_fonts
+ ];
+ };
+
+ doCheck = stdenv.targetPlatform == stdenv.hostPlatform
+ && ! stdenv.isAarch64 # random seg. faults
+ && ! stdenv.isDarwin; # dy lib not found
+
+ enableParallelBuilding = true;
+
+ checkPhase = ''
+ make documentation/developers.pdf documentation/sile.pdf
+ '';
+
postInstall = ''
wrapProgram $out/bin/sile \
--set LUA_PATH "${luaPath};" \
--set LUA_CPATH "${luaCPath};" \
+
+ install -D -t $out/share/doc/sile documentation/*.pdf
'';
# Hack to avoid TMPDIR in RPATHs.
preFixup = ''rm -rf "$(pwd)" && mkdir "$(pwd)" '';
+ outputs = [ "out" "doc" ];
+
meta = {
description = "A typesetting system";
longDescription = ''
diff --git a/pkgs/tools/typesetting/tikzit/default.nix b/pkgs/tools/typesetting/tikzit/default.nix
index 69e3995bf62..c040677118e 100644
--- a/pkgs/tools/typesetting/tikzit/default.nix
+++ b/pkgs/tools/typesetting/tikzit/default.nix
@@ -2,18 +2,13 @@
stdenv.mkDerivation rec {
name = "tikzit-${version}";
- version = "2.1";
+ version = "2.1.4";
src = fetchFromGitHub {
owner = "tikzit";
repo = "tikzit";
- # We don't reference the revision by the appropriate tag (v2.1) here,
- # as the version of that tag still has the old version number in the
- # relevant header file. This would cause a bad user experience, as
- # "Help > About" would still display the old version number even though
- # we indeed ship the new version 2.1.
- rev = "97c2a2a7ecae12bf376558997805c24c3b6e3e07";
- sha256 = "0sbgijbln18gac9989x484r62jlxyagkq0ap0fvzislrkac4z3y9";
+ rev = "v2.1.4";
+ sha256 = "121pgl2cdkksw48mjg6hzk7324ax6iw6fq7q3v1kdgwm8rwxm1fl";
};
nativeBuildInputs = [ qmake qttools flex bison ];
diff --git a/pkgs/tools/virtualization/udocker/default.nix b/pkgs/tools/virtualization/udocker/default.nix
index 446cfff37ff..98046a8e043 100644
--- a/pkgs/tools/virtualization/udocker/default.nix
+++ b/pkgs/tools/virtualization/udocker/default.nix
@@ -12,7 +12,7 @@ buildPythonApplication rec {
sha256 = "134xk7rfj0xki9znryk5qf1nsfa318ahrrsi1k6ia7kipp7i3hb4";
};
- buildInputs = [ proot patchelf fakechroot runc simplejson pycurl coreutils nose mock ];
+ buildInputs = [ proot patchelf fakechroot runc simplejson pycurl coreutils ];
postPatch = ''
substituteInPlace udocker.py --replace /usr/sbin:/sbin:/usr/bin:/bin $PATH
@@ -22,6 +22,11 @@ buildPythonApplication rec {
substituteInPlace udocker.py --replace "autoinstall = True" "autoinstall = False"
'';
+ checkInputs = [
+ nose
+ mock
+ ];
+
checkPhase = ''
NOSE_EXCLUDE=test_03_create_repo,test_04_is_repo,test_02__get_group_from_host nosetests -v tests/unit_tests.py
'';
diff --git a/pkgs/top-level/aliases.nix b/pkgs/top-level/aliases.nix
index 252a87266e7..96396acb9e6 100644
--- a/pkgs/top-level/aliases.nix
+++ b/pkgs/top-level/aliases.nix
@@ -234,6 +234,7 @@ mapAliases ({
pidginwindowmerge = pidgin-window-merge; # added 2018-01-08
piwik = matomo; # added 2018-01-16
pltScheme = racket; # just to be sure
+ plexpy = tautulli; # plexpy got renamed to tautulli, added 2019-02-22
pmtools = acpica-tools; # added 2018-11-01
poppler_qt5 = libsForQt5.poppler; # added 2015-12-19
postgresql94 = postgresql_9_4;
@@ -342,6 +343,7 @@ mapAliases ({
vimprobable2Wrapper = vimprobable2; # added 2015-01
virtviewer = virt-viewer; # added 2015-12-24
vorbisTools = vorbis-tools; # added 2016-01-26
+ webkit = webkitgtk; # added 2019-03-05
weechat-xmpp = weechatScripts.weechat-xmpp; # added 2018-09-06
weechat-matrix-bridge = weechatScripts.weechat-matrix-bridge; # added 2018-09-06
wineStaging = wine-staging; # added 2018-01-08
diff --git a/pkgs/top-level/all-packages.nix b/pkgs/top-level/all-packages.nix
index c0e5d4b3a90..bd8e8a3ca6c 100644
--- a/pkgs/top-level/all-packages.nix
+++ b/pkgs/top-level/all-packages.nix
@@ -5,7 +5,7 @@
* to merges. Please use the full-text search of your editor. ;)
* Hint: ### starts category names.
*/
-{ lib, noSysDirs, config}:
+{ lib, noSysDirs, config, overlays }:
res: pkgs: super:
with pkgs;
@@ -61,7 +61,7 @@ in
### Helper functions.
- inherit lib config;
+ inherit lib config overlays;
inherit (lib) lowPrio hiPrio appendToName makeOverridable;
@@ -1745,11 +1745,13 @@ in
asciidoc-full = appendToName "full" (asciidoc.override {
inherit (python2Packages) pygments;
+ texlive = texlive.combine { inherit (texlive) scheme-minimal dvipng; };
enableStandardFeatures = true;
});
asciidoc-full-with-plugins = appendToName "full-with-plugins" (asciidoc.override {
inherit (python2Packages) pygments;
+ texlive = texlive.combine { inherit (texlive) scheme-minimal dvipng; };
enableStandardFeatures = true;
enableExtraPlugins = true;
});
@@ -2091,6 +2093,8 @@ in
checkbashisms = callPackage ../development/tools/misc/checkbashisms { };
+ civetweb = callPackage ../development/libraries/civetweb { };
+
ckb-next = libsForQt5.callPackage ../tools/misc/ckb-next { };
clamav = callPackage ../tools/security/clamav { };
@@ -2674,6 +2678,8 @@ in
fileschanged = callPackage ../tools/misc/fileschanged { };
+ filet = callPackage ../applications/misc/filet { };
+
findutils = callPackage ../tools/misc/findutils { };
finger_bsd = callPackage ../tools/networking/bsd-finger { };
@@ -3173,9 +3179,7 @@ in
gsmartcontrol = callPackage ../tools/misc/gsmartcontrol { };
- gssdp = callPackage ../development/libraries/gssdp {
- inherit (gnome2) libsoup;
- };
+ gssdp = callPackage ../development/libraries/gssdp { };
gt5 = callPackage ../tools/system/gt5 { };
@@ -3202,9 +3206,7 @@ in
gup = callPackage ../development/tools/build-managers/gup {};
- gupnp = callPackage ../development/libraries/gupnp {
- inherit (gnome2) libsoup;
- };
+ gupnp = callPackage ../development/libraries/gupnp { };
gupnp-av = callPackage ../development/libraries/gupnp-av {};
@@ -3995,6 +3997,8 @@ in
liboauth = callPackage ../development/libraries/liboauth { };
+ libr3 = callPackage ../development/libraries/libr3 { };
+
libsidplayfp = callPackage ../development/libraries/libsidplayfp { };
libsrs2 = callPackage ../development/libraries/libsrs2 { };
@@ -4911,7 +4915,11 @@ in
pk2cmd = callPackage ../tools/misc/pk2cmd { };
- plantuml = callPackage ../tools/misc/plantuml { };
+ plantuml = callPackage ../tools/misc/plantuml {
+ # Graphviz 2.39 and 2.40 are discouraged by the PlantUML project, see
+ # http://plantuml.com/faq (heading: "Which version of Graphviz should I use ?")
+ graphviz = graphviz_2_32;
+ };
plan9port = callPackage ../tools/system/plan9port { };
@@ -4924,7 +4932,7 @@ in
plex = callPackage ../servers/plex { };
- plexpy = callPackage ../servers/plexpy { python = python2; };
+ tautulli = callPackage ../servers/tautulli { python = python2; };
ploticus = callPackage ../tools/graphics/ploticus {
libpng = libpng12;
@@ -7071,7 +7079,7 @@ in
haskell = callPackage ./haskell-packages.nix { };
- haskellPackages = dontRecurseIntoAttrs (haskell.packages.ghc863.override {
+ haskellPackages = dontRecurseIntoAttrs (haskell.packages.ghc864.override {
overrides = config.haskellPackageOverrides or haskell.packageOverrides;
});
@@ -7085,7 +7093,8 @@ in
all-cabal-hashes = callPackage ../data/misc/hackage { };
- purescript = haskell.lib.justStaticExecutables haskellPackages.purescript;
+ # Build with ghc 8.4 due to https://github.com/NixOS/nixpkgs/issues/53597
+ purescript = haskell.lib.justStaticExecutables haskell.packages.ghc844.purescript;
psc-package = haskell.lib.justStaticExecutables
(haskellPackages.callPackage ../development/compilers/purescript/psc-package { });
@@ -7140,7 +7149,11 @@ in
inherit (darwin.apple_sdk.frameworks) Security Foundation;
};
- go = go_1_11;
+ go_1_12 = callPackage ../development/compilers/go/1.12.nix {
+ inherit (darwin.apple_sdk.frameworks) Security Foundation;
+ };
+
+ go = go_1_12;
go-repo-root = callPackage ../development/tools/go-repo-root { };
@@ -7268,13 +7281,6 @@ in
jikes = callPackage ../development/compilers/jikes { };
- julia_06 = callPackage ../development/compilers/julia {
- gmp = gmp6;
- openblas = openblasCompat;
- inherit (darwin.apple_sdk.frameworks) CoreServices ApplicationServices;
- llvm = llvm_39;
- };
-
julia_07 = callPackage ../development/compilers/julia/0.7.nix {
gmp = gmp6;
openblas = openblasCompat;
@@ -7398,7 +7404,15 @@ in
stdenv = overrideCC stdenv buildPackages.gcc6; # with gcc-7: undefined reference to `__divmoddi4'
});
- llvmPackages_latest = llvmPackages_7;
+ llvmPackages_8 = callPackage ../development/compilers/llvm/8 ({
+ inherit (stdenvAdapters) overrideCC;
+ buildLlvmTools = buildPackages.llvmPackages_8.tools;
+ targetLlvmLibraries = targetPackages.llvmPackages_8.libraries;
+ } // stdenv.lib.optionalAttrs (buildPackages.stdenv.cc.isGNU && stdenv.hostPlatform.isi686) {
+ stdenv = overrideCC stdenv buildPackages.gcc6; # with gcc-7: undefined reference to `__divmoddi4'
+ });
+
+ llvmPackages_latest = llvmPackages_8;
manticore = callPackage ../development/compilers/manticore { };
@@ -7503,7 +7517,7 @@ in
};
ponyc = callPackage ../development/compilers/ponyc {
- llvm = llvm_39;
+ llvm = llvm_7;
};
pony-stable = callPackage ../development/compilers/ponyc/pony-stable.nix { };
@@ -8566,6 +8580,7 @@ in
ccls = callPackage ../development/tools/misc/ccls {
llvmPackages = llvmPackages_latest;
+ stdenv = llvmPackages_latest.stdenv;
};
credstash = with python3Packages; toPythonApplication credstash;
@@ -9229,6 +9244,8 @@ in
trellis = callPackage ../development/tools/trellis { };
+ ttyd = callPackage ../servers/ttyd { };
+
tweak = callPackage ../applications/editors/tweak { };
tychus = callPackage ../development/tools/tychus {
@@ -9493,7 +9510,7 @@ in
c-blosc = callPackage ../development/libraries/c-blosc { };
- cachix = (haskell.lib.justStaticExecutables haskellPackages.cachix).overrideAttrs (drv: {
+ cachix = (callPackage ../development/tools/cachix { }).overrideAttrs (drv: {
meta = drv.meta // {
hydraPlatforms = stdenv.lib.platforms.unix;
};
@@ -9825,6 +9842,8 @@ in
flann = callPackage ../development/libraries/flann { };
+ flatcc = callPackage ../development/libraries/flatcc { };
+
flint = callPackage ../development/libraries/flint { };
flite = callPackage ../development/libraries/flite { };
@@ -10980,9 +10999,7 @@ in
libgudev = callPackage ../development/libraries/libgudev { };
libguestfs-appliance = callPackage ../development/libraries/libguestfs/appliance.nix {};
- libguestfs = callPackage ../development/libraries/libguestfs {
- appliance = libguestfs-appliance;
- };
+ libguestfs = callPackage ../development/libraries/libguestfs { };
libhangul = callPackage ../development/libraries/libhangul { };
@@ -13019,8 +13036,6 @@ in
wayland-protocols = callPackage ../development/libraries/wayland/protocols.nix { };
- webkit = webkitgtk;
-
wcslib = callPackage ../development/libraries/wcslib { };
webkitgtk = callPackage ../development/libraries/webkitgtk {
@@ -13742,12 +13757,14 @@ in
# We don't use `with` statement here on purpose!
# See https://github.com/NixOS/nixpkgs/pull/10474/files#r42369334
modules = [ nginxModules.rtmp nginxModules.dav nginxModules.moreheaders ];
+ openssl = openssl_1_1;
};
nginxMainline = callPackage ../servers/http/nginx/mainline.nix {
# We don't use `with` statement here on purpose!
# See https://github.com/NixOS/nixpkgs/pull/10474/files#r42369334
modules = [ nginxModules.dav nginxModules.moreheaders ];
+ openssl = openssl_1_1;
};
nginxModules = callPackage ../servers/http/nginx/modules.nix { };
@@ -14012,6 +14029,8 @@ in
prometheus-varnish-exporter = callPackage ../servers/monitoring/prometheus/varnish-exporter.nix { };
prometheus-jmx-httpserver = callPackage ../servers/monitoring/prometheus/jmx-httpserver.nix { };
+ prometheus-cpp = callPackage ../development/libraries/prometheus-cpp { };
+
psqlodbc = callPackage ../development/libraries/psqlodbc { };
pure-ftpd = callPackage ../servers/ftp/pure-ftpd { };
@@ -14662,6 +14681,13 @@ in
];
};
+ linux_5_0 = callPackage ../os-specific/linux/kernel/linux-5.0.nix {
+ kernelPatches =
+ [ kernelPatches.bridge_stp_helper
+ kernelPatches.modinst_arg_list_too_long
+ ];
+ };
+
linux_testing = callPackage ../os-specific/linux/kernel/linux-testing.nix {
kernelPatches = [
kernelPatches.bridge_stp_helper
@@ -14843,7 +14869,7 @@ in
linux = linuxPackages.kernel;
# Update this when adding the newest kernel major version!
- linuxPackages_latest = linuxPackages_4_20;
+ linuxPackages_latest = linuxPackages_5_0;
linux_latest = linuxPackages_latest.kernel;
# Build the kernel modules for the some of the kernels.
@@ -14854,6 +14880,7 @@ in
linuxPackages_4_14 = recurseIntoAttrs (linuxPackagesFor pkgs.linux_4_14);
linuxPackages_4_19 = recurseIntoAttrs (linuxPackagesFor pkgs.linux_4_19);
linuxPackages_4_20 = recurseIntoAttrs (linuxPackagesFor pkgs.linux_4_20);
+ linuxPackages_5_0 = recurseIntoAttrs (linuxPackagesFor pkgs.linux_5_0);
# When adding to this list:
# - Update linuxPackages_latest to the latest version
# - Update the rev in ../os-specific/linux/kernel/linux-libre.nix to the latest one.
@@ -15012,6 +15039,8 @@ in
inherit modules;
};
+ multipart-parser-c = callPackage ../development/libraries/multipart-parser-c { };
+
multipath-tools = callPackage ../os-specific/linux/multipath-tools { };
musl = callPackage ../os-specific/linux/musl { };
@@ -16137,6 +16166,8 @@ in
apache-directory-studio = callPackage ../applications/networking/apache-directory-studio {};
+ appeditor = callPackage ../applications/misc/appeditor { };
+
aqemu = libsForQt5.callPackage ../applications/virtualization/aqemu { };
ardour = callPackage ../applications/audio/ardour {
@@ -16393,6 +16424,8 @@ in
catfish = callPackage ../applications/search/catfish { };
+ catimg = callPackage ../tools/misc/catimg { };
+
cava = callPackage ../applications/audio/cava { };
cb2bib = libsForQt5.callPackage ../applications/office/cb2bib { };
@@ -16457,7 +16490,7 @@ in
cligh = python3Packages.callPackage ../development/tools/github/cligh {};
- clipgrab = callPackage ../applications/video/clipgrab { };
+ clipgrab = qt5.callPackage ../applications/video/clipgrab { };
clipmenu = callPackage ../applications/misc/clipmenu { };
@@ -16578,7 +16611,6 @@ in
pythonPackages = datadog-integrations-core {};
};
datadog-process-agent = callPackage ../tools/networking/dd-agent/datadog-process-agent.nix { };
- datadog-trace-agent = callPackage ../tools/networking/dd-agent/datadog-trace-agent.nix { };
datadog-integrations-core = extras: callPackage ../tools/networking/dd-agent/integrations-core.nix {
python = python27;
extraIntegrations = extras;
@@ -17564,9 +17596,7 @@ in
gspell = callPackage ../development/libraries/gspell { };
- gtk2fontsel = callPackage ../applications/misc/gtk2fontsel {
- inherit (gnome2) gtk;
- };
+ gtk2fontsel = callPackage ../applications/misc/gtk2fontsel { };
guake = callPackage ../applications/misc/guake { };
@@ -17665,7 +17695,10 @@ in
slack-term = callPackage ../applications/networking/instant-messengers/slack-term { };
- singularity = callPackage ../applications/virtualization/singularity { };
+ singularity = callPackage ../applications/virtualization/singularity {
+ # XXX: the build is finding references to Go when compiled with go v1.12
+ go = go_1_11;
+ };
spectmorph = callPackage ../applications/audio/spectmorph { };
@@ -19234,7 +19267,7 @@ in
udevil = callPackage ../applications/misc/udevil {};
- udiskie = python3Packages.callPackage ../applications/misc/udiskie { };
+ udiskie = callPackage ../applications/misc/udiskie { };
sakura = callPackage ../applications/misc/sakura { };
@@ -19657,6 +19690,8 @@ in
inherit (pkgs.gnome2) libgnome libgnomeui;
};
+ ticpp = callPackage ../development/libraries/ticpp { };
+
tig = gitAndTools.tig;
tilda = callPackage ../applications/misc/tilda {
@@ -19713,6 +19748,8 @@ in
inherit (pythonPackages) wrapPython wxPython;
};
+ torrential = callPackage ../applications/networking/p2p/torrential { };
+
tortoisehg = callPackage ../applications/version-management/tortoisehg { };
toot = callPackage ../applications/misc/toot { };
@@ -19785,7 +19822,7 @@ in
uwimap = callPackage ../tools/networking/uwimap { };
uzbl = callPackage ../applications/networking/browsers/uzbl {
- webkit = webkitgtk24x-gtk2;
+ webkitgtk = webkitgtk24x-gtk2;
};
utox = callPackage ../applications/networking/instant-messengers/utox { };
@@ -20303,6 +20340,8 @@ in
inherit (gnome2) libgnomeprint libgnomeprintui libgnomecanvas;
};
+ xournalpp = callPackage ../applications/graphics/xournalpp { };
+
apvlv = callPackage ../applications/misc/apvlv { };
xpdf = libsForQt5.callPackage ../applications/misc/xpdf { };
@@ -20836,7 +20875,7 @@ in
minetestclient_4 minetestserver_4
minetestclient_5 minetestserver_5;
- minetest = minetestclient_4;
+ minetest = minetestclient_5;
mnemosyne = callPackage ../games/mnemosyne {
python = python3;
@@ -21289,7 +21328,7 @@ in
clearlooks-phenix = callPackage ../misc/themes/clearlooks-phenix { };
deepin = recurseIntoAttrs (import ../desktops/deepin {
- inherit pkgs libsForQt5;
+ inherit pkgs libsForQt5 go_1_11;
inherit (lib) makeScope;
});
@@ -21297,20 +21336,7 @@ in
callPackage = newScope pkgs.enlightenment;
});
- gnome2 = recurseIntoAttrs (callPackage ../desktops/gnome-2 {
- callPackage = pkgs.newScope pkgs.gnome2;
- self = pkgs.gnome2;
- } // {
- inherit (pkgs)
- # GTK Libs
- glib glibmm atk atkmm cairo pango pangomm gdk_pixbuf gtkmm2 libcanberra-gtk2
-
- # Included for backwards compatibility
- libsoup libwnck gtk-doc gnome-doc-utils;
-
- gtk = res.gtk2;
- gtkmm = res.gtkmm2;
- });
+ gnome2 = recurseIntoAttrs (callPackage ../desktops/gnome-2 { });
gnome3 = recurseIntoAttrs (callPackage ../desktops/gnome-3 { });
@@ -21328,10 +21354,12 @@ in
nohotcorner = callPackage ../desktops/gnome-3/extensions/nohotcorner { };
no-title-bar = callPackage ../desktops/gnome-3/extensions/no-title-bar { };
remove-dropdown-arrows = callPackage ../desktops/gnome-3/extensions/remove-dropdown-arrows { };
+ sound-output-device-chooser = callPackage ../desktops/gnome-3/extensions/sound-output-device-chooser { };
system-monitor = callPackage ../desktops/gnome-3/extensions/system-monitor { };
taskwhisperer = callPackage ../desktops/gnome-3/extensions/taskwhisperer { };
timepp = callPackage ../desktops/gnome-3/extensions/timepp { };
topicons-plus = callPackage ../desktops/gnome-3/extensions/topicons-plus { };
+ window-corner-preview = callPackage ../desktops/gnome-3/extensions/window-corner-preview { };
};
hsetroot = callPackage ../tools/X11/hsetroot { };
@@ -22054,6 +22082,12 @@ in
ecl-fasl = true;
sbcl = null;
};
+ # old version temporarily kept for sage
+ maxima-ecl-5_41 = callPackage ../applications/science/math/maxima/5.41.nix {
+ ecl = ecl_16_1_2;
+ ecl-fasl = true;
+ sbcl = null;
+ };
mxnet = callPackage ../applications/science/math/mxnet {
inherit (linuxPackages) nvidia_x11;
@@ -22335,7 +22369,7 @@ in
dpkg = callPackage ../tools/package-management/dpkg { };
- ekiga = newScope pkgs.gnome2 ../applications/networking/instant-messengers/ekiga { };
+ ekiga = callPackage ../applications/networking/instant-messengers/ekiga { };
emulationstation = callPackage ../misc/emulators/emulationstation {
stdenv = overrideCC stdenv gcc5;
@@ -22902,6 +22936,8 @@ in
sqsh = callPackage ../development/tools/sqsh { };
+ jx = callPackage ../applications/networking/cluster/jx {};
+
inherit (callPackage ../applications/networking/cluster/terraform {})
terraform_0_11
terraform_0_11-full
@@ -22990,7 +23026,7 @@ in
});
vimprobable2-unwrapped = callPackage ../applications/networking/browsers/vimprobable2 {
- webkit = webkitgtk24x-gtk2;
+ webkitgtk = webkitgtk24x-gtk2;
};
vimprobable2 = wrapFirefox vimprobable2-unwrapped { };
@@ -23106,6 +23142,8 @@ in
SDL = SDL_sixel;
};
+ xteddy = callPackage ../applications/misc/xteddy { };
+
xwiimote = callPackage ../misc/drivers/xwiimote {
bluez = pkgs.bluez5.override {
enableWiimote = true;
diff --git a/pkgs/top-level/config.nix b/pkgs/top-level/config.nix
new file mode 100644
index 00000000000..17ded76a064
--- /dev/null
+++ b/pkgs/top-level/config.nix
@@ -0,0 +1,51 @@
+# This file defines the structure of the `config` nixpkgs option.
+
+{ lib, config, ... }:
+
+with lib;
+
+let
+
+ mkMeta = args: mkOption (builtins.removeAttrs args [ "feature" ] // {
+ type = args.type or (types.uniq types.bool);
+ default = args.default or false;
+ description = args.description or ''
+ Whether to ${args.feature} while evaluating nixpkgs.
+ '' + ''
+ Changing the default will not cause any rebuilds.
+ '';
+ });
+
+ mkMassRebuild = args: mkOption (builtins.removeAttrs args [ "feature" ] // {
+ type = args.type or (types.uniq types.bool);
+ default = args.default or false;
+ description = (args.description or ''
+ Whether to ${args.feature} while building nixpkgs packages.
+ '') + ''
+ Changing the default may cause a mass rebuild.
+ '';
+ });
+
+ options = {
+
+ /* Internal stuff */
+
+ warnings = mkOption {
+ type = types.listOf types.str;
+ default = [];
+ internal = true;
+ };
+
+ /* Config options */
+
+ doCheckByDefault = mkMassRebuild {
+ feature = "run checkPhase by default";
+ };
+
+ };
+
+in {
+
+ inherit options;
+
+}
diff --git a/pkgs/top-level/default.nix b/pkgs/top-level/default.nix
index f2de6d6f81d..b6de076a570 100644
--- a/pkgs/top-level/default.nix
+++ b/pkgs/top-level/default.nix
@@ -41,7 +41,7 @@
} @ args:
let # Rename the function arguments
- configExpr = config;
+ config0 = config;
crossSystem0 = crossSystem;
in let
@@ -50,22 +50,37 @@ in let
# Allow both:
# { /* the config */ } and
# { pkgs, ... } : { /* the config */ }
- config =
- if lib.isFunction configExpr
- then configExpr { inherit pkgs; }
- else configExpr;
+ config1 =
+ if lib.isFunction config0
+ then config0 { inherit pkgs; }
+ else config0;
# From a minimum of `system` or `config` (actually a target triple, *not*
# nixpkgs configuration), infer the other one and platform as needed.
localSystem = lib.systems.elaborate (
# Allow setting the platform in the config file. This take precedence over
# the inferred platform, but not over an explicitly passed-in one.
- builtins.intersectAttrs { platform = null; } config
+ builtins.intersectAttrs { platform = null; } config1
// args.localSystem);
crossSystem = if crossSystem0 == null then localSystem
else lib.systems.elaborate crossSystem0;
+ configEval = lib.evalModules {
+ modules = [
+ ./config.nix
+ ({ options, ... }: {
+ _file = "nixpkgs.config";
+ # filter-out known options, FIXME: remove this eventually
+ config = builtins.intersectAttrs options config1;
+ })
+ ];
+ };
+
+ # take all the rest as-is
+ config = lib.showWarnings configEval.config.warnings
+ (config1 // builtins.removeAttrs configEval.config [ "_module" ]);
+
# A few packages make a new package set to draw their dependencies from.
# (Currently to get a cross tool chain, or forced-i686 package.) Rather than
# give `all-packages.nix` all the arguments to this function, even ones that
@@ -83,6 +98,14 @@ in let
# compiling toolchains and 32-bit packages on x86_64). In both those cases we
# want the provided non-native `localSystem` argument to affect the stdenv
# chosen.
+ #
+ # NB!!! This thing gets its `config` argument from `args`, i.e. it's actually
+ # `config0`. It is important to keep it to `config0` format (as opposed to the
+ # result of `evalModules`, i.e. the `config` variable above) throughout all
+ # nixpkgs evaluations since the above function `config0 -> config` implemented
+ # via `evalModules` is not idempotent. In other words, if you add `config` to
+ # `newArgs`, expect strange very hard to debug errors! (Yes, I'm speaking from
+ # experience here.)
nixpkgsFun = newArgs: import ./. (args // newArgs);
# Partially apply some arguments for building bootstraping stage pkgs
diff --git a/pkgs/top-level/haskell-packages.nix b/pkgs/top-level/haskell-packages.nix
index a2f392fb109..aeb3b471a14 100644
--- a/pkgs/top-level/haskell-packages.nix
+++ b/pkgs/top-level/haskell-packages.nix
@@ -59,24 +59,18 @@ in {
buildLlvmPackages = buildPackages.llvmPackages_5;
llvmPackages = pkgs.llvmPackages_5;
};
- ghc861 = callPackage ../development/compilers/ghc/8.6.1.nix {
- bootPkgs = packages.ghc822Binary;
- inherit (buildPackages.python3Packages) sphinx;
- buildLlvmPackages = buildPackages.llvmPackages_6;
- llvmPackages = pkgs.llvmPackages_6;
- };
- ghc862 = callPackage ../development/compilers/ghc/8.6.2.nix {
- bootPkgs = packages.ghc822Binary;
- inherit (buildPackages.python3Packages) sphinx;
- buildLlvmPackages = buildPackages.llvmPackages_6;
- llvmPackages = pkgs.llvmPackages_6;
- };
ghc863 = callPackage ../development/compilers/ghc/8.6.3.nix {
bootPkgs = packages.ghc822Binary;
inherit (buildPackages.python3Packages) sphinx;
buildLlvmPackages = buildPackages.llvmPackages_6;
llvmPackages = pkgs.llvmPackages_6;
};
+ ghc864 = callPackage ../development/compilers/ghc/8.6.4.nix {
+ bootPkgs = packages.ghc822Binary;
+ inherit (buildPackages.python3Packages) sphinx;
+ buildLlvmPackages = buildPackages.llvmPackages_6;
+ llvmPackages = pkgs.llvmPackages_6;
+ };
ghcHEAD = callPackage ../development/compilers/ghc/head.nix {
bootPkgs = packages.ghc863Binary;
inherit (buildPackages.python3Packages) sphinx;
@@ -136,21 +130,16 @@ in {
ghc = bh.compiler.ghc844;
compilerConfig = callPackage ../development/haskell-modules/configuration-ghc-8.4.x.nix { };
};
- ghc861 = callPackage ../development/haskell-modules {
- buildHaskellPackages = bh.packages.ghc861;
- ghc = bh.compiler.ghc861;
- compilerConfig = callPackage ../development/haskell-modules/configuration-ghc-8.6.x.nix { };
- };
- ghc862 = callPackage ../development/haskell-modules {
- buildHaskellPackages = bh.packages.ghc862;
- ghc = bh.compiler.ghc862;
- compilerConfig = callPackage ../development/haskell-modules/configuration-ghc-8.6.x.nix { };
- };
ghc863 = callPackage ../development/haskell-modules {
buildHaskellPackages = bh.packages.ghc863;
ghc = bh.compiler.ghc863;
compilerConfig = callPackage ../development/haskell-modules/configuration-ghc-8.6.x.nix { };
};
+ ghc864 = callPackage ../development/haskell-modules {
+ buildHaskellPackages = bh.packages.ghc864;
+ ghc = bh.compiler.ghc864;
+ compilerConfig = callPackage ../development/haskell-modules/configuration-ghc-8.6.x.nix { };
+ };
ghcHEAD = callPackage ../development/haskell-modules {
buildHaskellPackages = bh.packages.ghcHEAD;
ghc = bh.compiler.ghcHEAD;
diff --git a/pkgs/top-level/lua-packages.nix b/pkgs/top-level/lua-packages.nix
index ed0b919fd69..9d0a607dfc0 100644
--- a/pkgs/top-level/lua-packages.nix
+++ b/pkgs/top-level/lua-packages.nix
@@ -12,7 +12,6 @@
, fetchFromGitHub, libmpack, which, fetchpatch, writeText
, pkgs
, fetchgit
-, overrides ? (self: super: {})
, lib
}:
@@ -60,7 +59,7 @@ let
buildLuarocksPackage = with pkgs.lib; makeOverridable( callPackage ../development/interpreters/lua-5/build-lua-package.nix {
inherit toLuaModule;
- inherit lua writeText;
+ inherit lua;
});
in
with self; {
@@ -87,7 +86,7 @@ with self; {
inherit toLuaModule lua-setup-hook;
inherit buildLuarocksPackage buildLuaApplication;
inherit requiredLuaModules luaOlder luaAtLeast
- isLua51 isLua52 isLuaJIT lua callPackage;
+ isLua51 isLua52 isLua53 isLuaJIT lua callPackage;
# wraps programs in $out/bin with valid LUA_PATH/LUA_CPATH
wrapLua = callPackage ../development/interpreters/lua-5/wrap-lua.nix {
@@ -167,6 +166,29 @@ with self; {
};
};
+ cqueues = buildLuaPackage rec {
+ name = "cqueues-${version}";
+ version = "20171014";
+
+ src = fetchurl {
+ url = "https://www.25thandclement.com/~william/projects/releases/${name}.tgz";
+ sha256 = "1dabhpn6r0hlln8vx9hxm34pfcm46qzgpb2apmziwg5z51fi4ksb";
+ };
+
+ preConfigure = ''export prefix=$out'';
+
+ nativeBuildInputs = [ gnum4 ];
+ buildInputs = [ openssl ];
+
+ meta = with stdenv.lib; {
+ description = "A type of event loop for Lua";
+ homepage = "https://www.25thandclement.com/~william/projects/cqueues.html";
+ license = licenses.mit;
+ maintainers = with maintainers; [ vcunat ];
+ platforms = platforms.unix;
+ };
+ };
+
http = buildLuaPackage rec {
version = "0.2";
name = "http-${version}";
@@ -844,4 +866,4 @@ with self; {
});
});
-in (lib.extends overrides packages)
+in packages
diff --git a/pkgs/top-level/ocaml-packages.nix b/pkgs/top-level/ocaml-packages.nix
index 1541bb12ee1..76de3197b1d 100644
--- a/pkgs/top-level/ocaml-packages.nix
+++ b/pkgs/top-level/ocaml-packages.nix
@@ -709,6 +709,8 @@ let
ssl = callPackage ../development/ocaml-modules/ssl { };
+ stdlib-shims = callPackage ../development/ocaml-modules/stdlib-shims { };
+
stog = callPackage ../applications/misc/stog { };
stringext = callPackage ../development/ocaml-modules/stringext { };
diff --git a/pkgs/top-level/python-packages.nix b/pkgs/top-level/python-packages.nix
index 5acc12fe4ba..d3ec3961f7e 100644
--- a/pkgs/top-level/python-packages.nix
+++ b/pkgs/top-level/python-packages.nix
@@ -2996,7 +2996,7 @@ in {
fs-s3fs = callPackage ../development/python-modules/fs-s3fs { };
- libarcus = callPackage ../development/python-modules/libarcus { };
+ libarcus = callPackage ../development/python-modules/libarcus { inherit (pkgs) protobuf; };
libcloud = callPackage ../development/python-modules/libcloud { };
@@ -3548,6 +3548,7 @@ in {
periodictable = callPackage ../development/python-modules/periodictable { };
pg8000 = callPackage ../development/python-modules/pg8000 { };
+ pg8000_1_12 = callPackage ../development/python-modules/pg8000/1_12.nix { };
pgsanity = callPackage ../development/python-modules/pgsanity { };
@@ -5393,6 +5394,9 @@ in {
casttube = callPackage ../development/python-modules/casttube { };
+ lzstring = callPackage ../development/python-modules/lzstring { };
+
+ flickrapi = callPackage ../development/python-modules/flickrapi { };
});
in fix' (extends overrides packages)
diff --git a/pkgs/top-level/release-small.nix b/pkgs/top-level/release-small.nix
index 01cbc004b8f..17239c6d879 100644
--- a/pkgs/top-level/release-small.nix
+++ b/pkgs/top-level/release-small.nix
@@ -162,7 +162,7 @@ with import ./release-lib.nix { inherit supportedSystems; };
utillinux = linux;
utillinuxMinimal = linux;
w3m = all;
- webkit = linux;
+ webkitgtk = linux;
wget = all;
which = all;
wicd = linux;
diff --git a/pkgs/top-level/stage.nix b/pkgs/top-level/stage.nix
index 2aa07517fdf..0ee5c25b010 100644
--- a/pkgs/top-level/stage.nix
+++ b/pkgs/top-level/stage.nix
@@ -91,7 +91,7 @@ let
allPackages = self: super:
let res = import ./all-packages.nix
- { inherit lib noSysDirs config; }
+ { inherit lib noSysDirs config overlays; }
res self super;
in res;
@@ -135,7 +135,6 @@ let
# default GNU libc on Linux systems. Non-Linux systems are not
# supported.
pkgsMusl = if stdenv.hostPlatform.isLinux then nixpkgsFun {
- inherit overlays config;
${if stdenv.hostPlatform == stdenv.buildPlatform
then "localSystem" else "crossSystem"} = {
parsed = stdenv.hostPlatform.parsed // {
@@ -152,7 +151,6 @@ let
# All packages built for i686 Linux.
# Used by wine, firefox with debugging version of Flash, ...
pkgsi686Linux = if stdenv.hostPlatform.isLinux && stdenv.hostPlatform.isx86 then nixpkgsFun {
- inherit overlays config;
${if stdenv.hostPlatform == stdenv.buildPlatform
then "localSystem" else "crossSystem"} = {
parsed = stdenv.hostPlatform.parsed // {