Merge branch 'master' into kwm

This commit is contained in:
Michael Raskin 2017-01-24 17:59:56 +00:00 committed by GitHub
commit e08cae373b
61 changed files with 1236 additions and 792 deletions

View File

@ -290,6 +290,7 @@
mbbx6spp = "Susan Potter <me@susanpotter.net>"; mbbx6spp = "Susan Potter <me@susanpotter.net>";
mbe = "Brandon Edens <brandonedens@gmail.com>"; mbe = "Brandon Edens <brandonedens@gmail.com>";
mboes = "Mathieu Boespflug <mboes@tweag.net>"; mboes = "Mathieu Boespflug <mboes@tweag.net>";
mbrgm = "Marius Bergmann <marius@yeai.de>";
mcmtroffaes = "Matthias C. M. Troffaes <matthias.troffaes@gmail.com>"; mcmtroffaes = "Matthias C. M. Troffaes <matthias.troffaes@gmail.com>";
mdaiter = "Matthew S. Daiter <mdaiter8121@gmail.com>"; mdaiter = "Matthew S. Daiter <mdaiter8121@gmail.com>";
meditans = "Carlo Nucera <meditans@gmail.com>"; meditans = "Carlo Nucera <meditans@gmail.com>";

View File

@ -284,6 +284,7 @@
glance = 266; glance = 266;
couchpotato = 267; couchpotato = 267;
gogs = 268; gogs = 268;
pdns-recursor = 269;
# When adding a uid, make sure it doesn't match an existing gid. And don't use uids above 399! # When adding a uid, make sure it doesn't match an existing gid. And don't use uids above 399!

View File

@ -212,6 +212,7 @@
./services/logging/awstats.nix ./services/logging/awstats.nix
./services/logging/fluentd.nix ./services/logging/fluentd.nix
./services/logging/graylog.nix ./services/logging/graylog.nix
./services/logging/journalbeat.nix
./services/logging/klogd.nix ./services/logging/klogd.nix
./services/logging/logcheck.nix ./services/logging/logcheck.nix
./services/logging/logrotate.nix ./services/logging/logrotate.nix
@ -332,6 +333,7 @@
./services/monitoring/telegraf.nix ./services/monitoring/telegraf.nix
./services/monitoring/ups.nix ./services/monitoring/ups.nix
./services/monitoring/uptime.nix ./services/monitoring/uptime.nix
./services/monitoring/vnstat.nix
./services/monitoring/zabbix-agent.nix ./services/monitoring/zabbix-agent.nix
./services/monitoring/zabbix-server.nix ./services/monitoring/zabbix-server.nix
./services/network-filesystems/cachefilesd.nix ./services/network-filesystems/cachefilesd.nix
@ -427,6 +429,7 @@
./services/networking/pdnsd.nix ./services/networking/pdnsd.nix
./services/networking/polipo.nix ./services/networking/polipo.nix
./services/networking/powerdns.nix ./services/networking/powerdns.nix
./services/networking/pdns-recursor.nix
./services/networking/pptpd.nix ./services/networking/pptpd.nix
./services/networking/prayer.nix ./services/networking/prayer.nix
./services/networking/privoxy.nix ./services/networking/privoxy.nix

View File

@ -66,9 +66,8 @@ with lib;
boot.kernel.sysctl."vm.overcommit_memory" = "1"; boot.kernel.sysctl."vm.overcommit_memory" = "1";
# To speed up installation a little bit, include the complete # To speed up installation a little bit, include the complete
# stdenv in the Nix store on the CD. Archive::Cpio is needed for # stdenv in the Nix store on the CD.
# the initrd builder. system.extraDependencies = with pkgs; [ stdenv stdenvNoCC busybox ];
system.extraDependencies = [ pkgs.stdenv pkgs.busybox pkgs.perlPackages.ArchiveCpio ];
# Show all debug messages from the kernel but don't log refused packets # Show all debug messages from the kernel but don't log refused packets
# because we have the firewall enabled. This makes installs from the # because we have the firewall enabled. This makes installs from the

View File

@ -11,6 +11,7 @@ with lib;
default = true; default = true;
description = '' description = ''
Whether to enable manual pages and the <command>man</command> command. Whether to enable manual pages and the <command>man</command> command.
This also includes "man" outputs of all <literal>systemPackages</literal>.
''; '';
}; };

View File

@ -0,0 +1,76 @@
{ config, lib, pkgs, ... }:
with lib;
let
cfg = config.services.journalbeat;
journalbeatYml = pkgs.writeText "journalbeat.yml" ''
name: ${cfg.name}
tags: ${builtins.toJSON cfg.tags}
journalbeat.cursor_state_file: ${cfg.stateDir}/cursor-state
${cfg.extraConfig}
'';
in
{
options = {
services.journalbeat = {
enable = mkEnableOption "journalbeat";
name = mkOption {
type = types.str;
default = "journalbeat";
description = "Name of the beat";
};
tags = mkOption {
type = types.listOf types.str;
default = [];
description = "Tags to place on the shipped log messages";
};
stateDir = mkOption {
type = types.str;
default = "/var/lib/journalbeat";
description = "The state directory. Journalbeat's own logs and other data are stored here.";
};
extraConfig = mkOption {
type = types.lines;
default = ''
journalbeat:
seek_position: cursor
cursor_seek_fallback: tail
write_cursor_state: true
cursor_flush_period: 5s
clean_field_names: true
convert_to_numbers: false
move_metadata_to_field: journal
default_type: journal
'';
description = "Any other configuration options you want to add";
};
};
};
config = mkIf cfg.enable {
systemd.services.journalbeat = with pkgs; {
description = "Journalbeat log shipper";
wantedBy = [ "multi-user.target" ];
preStart = ''
mkdir -p ${cfg.stateDir}/data
mkdir -p ${cfg.stateDir}/logs
'';
serviceConfig = {
ExecStart = "${pkgs.journalbeat}/bin/journalbeat -c ${journalbeatYml} -path.data ${cfg.stateDir}/data -path.logs ${cfg.stateDir}/logs";
};
};
};
}

View File

@ -0,0 +1,43 @@
{ config, lib, pkgs, ... }:
with lib;
let
cfg = config.services.vnstat;
in {
options.services.vnstat = {
enable = mkOption {
type = types.bool;
default = false;
description = ''
Whether to enable update of network usage statistics via vnstatd.
'';
};
};
config = mkIf cfg.enable {
users.extraUsers.vnstatd = {
isSystemUser = true;
description = "vnstat daemon user";
home = "/var/lib/vnstat";
createHome = true;
};
systemd.services.vnstat = {
description = "vnStat network traffic monitor";
path = [ pkgs.coreutils ];
after = [ "network.target" ];
wantedBy = [ "multi-user.target" ];
unitConfig.documentation = "man:vnstatd(1) man:vnstat(1) man:vnstat.conf(5)";
preStart = "chmod 755 /var/lib/vnstat";
serviceConfig = {
ExecStart = "${pkgs.vnstat}/bin/vnstatd -n";
ExecReload = "kill -HUP $MAINPID";
ProtectHome = true;
PrivateDevices = true;
PrivateTmp = true;
User = "vnstatd";
};
};
};
}

View File

@ -343,7 +343,7 @@ in
preStart = '' preStart = ''
if [ \! -d ${nodedir} ]; then if [ \! -d ${nodedir} ]; then
mkdir -p /var/db/tahoe-lafs mkdir -p /var/db/tahoe-lafs
tahoe create-node ${nodedir} tahoe create-node --hostname=localhost ${nodedir}
fi fi
# Tahoe has created a predefined tahoe.cfg which we must now # Tahoe has created a predefined tahoe.cfg which we must now

View File

@ -0,0 +1,168 @@
{ config, lib, pkgs, ... }:
with lib;
let
dataDir = "/var/lib/pdns-recursor";
username = "pdns-recursor";
cfg = config.services.pdns-recursor;
zones = mapAttrsToList (zone: uri: "${zone}.=${uri}") cfg.forwardZones;
configFile = pkgs.writeText "recursor.conf" ''
local-address=${cfg.dns.address}
local-port=${toString cfg.dns.port}
allow-from=${concatStringsSep "," cfg.dns.allowFrom}
webserver-address=${cfg.api.address}
webserver-port=${toString cfg.api.port}
webserver-allow-from=${concatStringsSep "," cfg.api.allowFrom}
forward-zones=${concatStringsSep "," zones}
export-etc-hosts=${if cfg.exportHosts then "yes" else "no"}
dnssec=${cfg.dnssecValidation}
serve-rfc1918=${if cfg.serveRFC1918 then "yes" else "no"}
${cfg.extraConfig}
'';
in {
options.services.pdns-recursor = {
enable = mkEnableOption "PowerDNS Recursor, a recursive DNS server";
dns.address = mkOption {
type = types.str;
default = "0.0.0.0";
description = ''
IP address Recursor DNS server will bind to.
'';
};
dns.port = mkOption {
type = types.int;
default = 53;
description = ''
Port number Recursor DNS server will bind to.
'';
};
dns.allowFrom = mkOption {
type = types.listOf types.str;
default = [ "10.0.0.0/8" "172.16.0.0/12" "192.168.0.0/16" ];
example = [ "0.0.0.0/0" ];
description = ''
IP address ranges of clients allowed to make DNS queries.
'';
};
api.address = mkOption {
type = types.str;
default = "0.0.0.0";
description = ''
IP address Recursor REST API server will bind to.
'';
};
api.port = mkOption {
type = types.int;
default = 8082;
description = ''
Port number Recursor REST API server will bind to.
'';
};
api.allowFrom = mkOption {
type = types.listOf types.str;
default = [ "0.0.0.0/0" ];
description = ''
IP address ranges of clients allowed to make API requests.
'';
};
exportHosts = mkOption {
type = types.bool;
default = false;
description = ''
Whether to export names and IP addresses defined in /etc/hosts.
'';
};
forwardZones = mkOption {
type = types.attrs;
example = { eth = "127.0.0.1:5353"; };
default = {};
description = ''
DNS zones to be forwarded to other servers.
'';
};
dnssecValidation = mkOption {
type = types.enum ["off" "process-no-validate" "process" "log-fail" "validate"];
default = "validate";
description = ''
Controls the level of DNSSEC processing done by the PowerDNS Recursor.
See https://doc.powerdns.com/md/recursor/dnssec/ for a detailed explanation.
'';
};
serveRFC1918 = mkOption {
type = types.bool;
default = true;
description = ''
Whether to directly resolve the RFC1918 reverse-mapping domains:
<literal>10.in-addr.arpa</literal>,
<literal>168.192.in-addr.arpa</literal>,
<literal>16-31.172.in-addr.arpa</literal>
This saves load on the AS112 servers.
'';
};
extraConfig = mkOption {
type = types.lines;
default = "";
description = ''
Extra options to be appended to the configuration file.
'';
};
};
config = mkIf cfg.enable {
users.extraUsers."${username}" = {
home = dataDir;
createHome = true;
uid = config.ids.uids.pdns-recursor;
description = "PowerDNS Recursor daemon user";
};
systemd.services.pdns-recursor = {
unitConfig.Documentation = "man:pdns_recursor(1) man:rec_control(1)";
description = "PowerDNS recursive server";
wantedBy = [ "multi-user.target" ];
after = [ "network.target" ];
serviceConfig = {
User = username;
Restart ="on-failure";
RestartSec = "5";
PrivateTmp = true;
PrivateDevices = true;
AmbientCapabilities = "cap_net_bind_service";
ExecStart = ''${pkgs.pdns-recursor}/bin/pdns_recursor \
--config-dir=${dataDir} \
--socket-dir=${dataDir} \
--disable-syslog
'';
};
preStart = ''
# Link configuration file into recursor home directory
configPath=${dataDir}/recursor.conf
if [ "$(realpath $configPath)" != "${configFile}" ]; then
rm -f $configPath
ln -s ${configFile} $configPath
fi
'';
};
};
}

View File

@ -273,7 +273,7 @@ in
message = "services.smokeping: sendmail and Mailhost cannot both be enabled."; message = "services.smokeping: sendmail and Mailhost cannot both be enabled.";
} }
]; ];
security.setuidPrograms = [ "fping" ]; security.setuidPrograms = [ "fping" "fping6" ];
environment.systemPackages = [ pkgs.fping ]; environment.systemPackages = [ pkgs.fping ];
users.extraUsers = singleton { users.extraUsers = singleton {
name = cfg.user; name = cfg.user;

View File

@ -136,12 +136,12 @@ in
{ {
clion = buildClion rec { clion = buildClion rec {
name = "clion-${version}"; name = "clion-${version}";
version = "2016.3"; version = "2016.3.2";
description = "C/C++ IDE. New. Intelligent. Cross-platform"; description = "C/C++ IDE. New. Intelligent. Cross-platform";
license = stdenv.lib.licenses.unfree; license = stdenv.lib.licenses.unfree;
src = fetchurl { src = fetchurl {
url = "https://download.jetbrains.com/cpp/CLion-${version}.tar.gz"; url = "https://download.jetbrains.com/cpp/CLion-${version}.tar.gz";
sha256 = "16nszamr0bxg8aghyrg4wzxbp9158kjzhr957ljpbipz0rlixf31"; sha256 = "0ygnj3yszgd1si1qgx7m4n7smm583l5pww8xhx8n86mvz7ywdhbn";
}; };
wmClass = "jetbrains-clion"; wmClass = "jetbrains-clion";
}; };
@ -172,12 +172,12 @@ in
idea-community = buildIdea rec { idea-community = buildIdea rec {
name = "idea-community-${version}"; name = "idea-community-${version}";
version = "2016.3.2"; version = "2016.3.3";
description = "Integrated Development Environment (IDE) by Jetbrains, community edition"; description = "Integrated Development Environment (IDE) by Jetbrains, community edition";
license = stdenv.lib.licenses.asl20; license = stdenv.lib.licenses.asl20;
src = fetchurl { src = fetchurl {
url = "https://download.jetbrains.com/idea/ideaIC-${version}.tar.gz"; url = "https://download.jetbrains.com/idea/ideaIC-${version}.tar.gz";
sha256 = "0ngign34gq7i121ss2s9wfziy3vkv1jb79pw8nf1qp7rb15xn4vc"; sha256 = "1v9rzfj84fyz3m3b6bh45jns8wcil9n8f8mfha0x8m8534r6w368";
}; };
wmClass = "jetbrains-idea-ce"; wmClass = "jetbrains-idea-ce";
}; };
@ -208,24 +208,24 @@ in
idea-ultimate = buildIdea rec { idea-ultimate = buildIdea rec {
name = "idea-ultimate-${version}"; name = "idea-ultimate-${version}";
version = "2016.3.2"; version = "2016.3.3";
description = "Integrated Development Environment (IDE) by Jetbrains, requires paid license"; description = "Integrated Development Environment (IDE) by Jetbrains, requires paid license";
license = stdenv.lib.licenses.unfree; license = stdenv.lib.licenses.unfree;
src = fetchurl { src = fetchurl {
url = "https://download.jetbrains.com/idea/ideaIU-${version}.tar.gz"; url = "https://download.jetbrains.com/idea/ideaIU-${version}.tar.gz";
sha256 = "13pd95zad29c3i9qpwhjii601ixb4dgcld0kxk3liq4zmnv6wqxa"; sha256 = "1bwy86rm0mifizmhkm9wxwc4nrrizk2zp4zl5ycxh6zdiad1r1wm";
}; };
wmClass = "jetbrains-idea"; wmClass = "jetbrains-idea";
}; };
ruby-mine = buildRubyMine rec { ruby-mine = buildRubyMine rec {
name = "ruby-mine-${version}"; name = "ruby-mine-${version}";
version = "2016.2.5"; version = "2016.3.1";
description = "The Most Intelligent Ruby and Rails IDE"; description = "The Most Intelligent Ruby and Rails IDE";
license = stdenv.lib.licenses.unfree; license = stdenv.lib.licenses.unfree;
src = fetchurl { src = fetchurl {
url = "https://download.jetbrains.com/ruby/RubyMine-${version}.tar.gz"; url = "https://download.jetbrains.com/ruby/RubyMine-${version}.tar.gz";
sha256 = "1rncnm5dvhpfb7l5p2k0hs4yqzp8n1c4rvz9vldlf5k7mvwggp7p"; sha256 = "10d1ba6qpizhz4d7fz0ya565pdvkgcmsdgs7b8dv98s9hxfjsldy";
}; };
wmClass = "jetbrains-rubymine"; wmClass = "jetbrains-rubymine";
}; };
@ -256,36 +256,36 @@ in
pycharm-community = buildPycharm rec { pycharm-community = buildPycharm rec {
name = "pycharm-community-${version}"; name = "pycharm-community-${version}";
version = "2016.3"; version = "2016.3.2";
description = "PyCharm Community Edition"; description = "PyCharm Community Edition";
license = stdenv.lib.licenses.asl20; license = stdenv.lib.licenses.asl20;
src = fetchurl { src = fetchurl {
url = "https://download.jetbrains.com/python/${name}.tar.gz"; url = "https://download.jetbrains.com/python/${name}.tar.gz";
sha256 = "1pi822ihzy58jszdy7y2pyni6pki9ih8s9xdbwlbwg9vck1iqprs"; sha256 = "0fag5ng9n953mnf3gmxpac1icnb1qz6dybhqwjbr13qij8v2s2g1";
}; };
wmClass = "jetbrains-pycharm-ce"; wmClass = "jetbrains-pycharm-ce";
}; };
pycharm-professional = buildPycharm rec { pycharm-professional = buildPycharm rec {
name = "pycharm-professional-${version}"; name = "pycharm-professional-${version}";
version = "2016.3"; version = "2016.3.2";
description = "PyCharm Professional Edition"; description = "PyCharm Professional Edition";
license = stdenv.lib.licenses.unfree; license = stdenv.lib.licenses.unfree;
src = fetchurl { src = fetchurl {
url = "https://download.jetbrains.com/python/${name}.tar.gz"; url = "https://download.jetbrains.com/python/${name}.tar.gz";
sha256 = "1b4ib77wzg0y12si8zqrfwbhv4kvmy9nm5dsrdr3k7f89dqg3279"; sha256 = "1nylq0fyvix68l4dp9852dak58dbiamjphx2hin087cadaji6r63";
}; };
wmClass = "jetbrains-pycharm"; wmClass = "jetbrains-pycharm";
}; };
phpstorm = buildPhpStorm rec { phpstorm = buildPhpStorm rec {
name = "phpstorm-${version}"; name = "phpstorm-${version}";
version = "2016.3"; version = "2016.3.2";
description = "Professional IDE for Web and PHP developers"; description = "Professional IDE for Web and PHP developers";
license = stdenv.lib.licenses.unfree; license = stdenv.lib.licenses.unfree;
src = fetchurl { src = fetchurl {
url = "https://download.jetbrains.com/webide/PhpStorm-${version}.tar.gz"; url = "https://download.jetbrains.com/webide/PhpStorm-${version}.tar.gz";
sha256 = "0hzjhwij2x3b5fqwyd69h24ld13bpc2bf9wdcd1jy758waf0d91y"; sha256 = "05ylhpn1mijjphcmv6ay3123xp72yypw19430dgr8101zpsnifa5";
}; };
wmClass = "jetbrains-phpstorm"; wmClass = "jetbrains-phpstorm";
}; };
@ -304,12 +304,12 @@ in
webstorm = buildWebStorm rec { webstorm = buildWebStorm rec {
name = "webstorm-${version}"; name = "webstorm-${version}";
version = "2016.3.1"; version = "2016.3.2";
description = "Professional IDE for Web and JavaScript development"; description = "Professional IDE for Web and JavaScript development";
license = stdenv.lib.licenses.unfree; license = stdenv.lib.licenses.unfree;
src = fetchurl { src = fetchurl {
url = "https://download.jetbrains.com/webstorm/WebStorm-${version}.tar.gz"; url = "https://download.jetbrains.com/webstorm/WebStorm-${version}.tar.gz";
sha256 = "10za4d6w9yns7kclbviizslq2y7zas9rkmvs3xwrfw1rdw2b69af"; sha256 = "1h3kjvd10j48n9ch2ldqjsizq5n8gkm0vrrvznayc1bz2kjvhavn";
}; };
wmClass = "jetbrains-webstorm"; wmClass = "jetbrains-webstorm";
}; };

View File

@ -18,6 +18,6 @@ buildGoPackage rec {
homepage = http://exercism.io/cli; homepage = http://exercism.io/cli;
license = licenses.mit; license = licenses.mit;
maintainers = [ maintainers.rbasso ]; maintainers = [ maintainers.rbasso ];
platforms = platforms.linux; platforms = platforms.unix;
}; };
} }

View File

@ -1,10 +1,10 @@
{ stdenv, fetchurl, glib, gtk2, intltool, libfm, libX11, pango, pkgconfig }: { stdenv, fetchurl, glib, gtk2, intltool, libfm, libX11, pango, pkgconfig }:
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
name = "pcmanfm-1.2.4"; name = "pcmanfm-1.2.5";
src = fetchurl { src = fetchurl {
url = "mirror://sourceforge/pcmanfm/${name}.tar.xz"; url = "mirror://sourceforge/pcmanfm/${name}.tar.xz";
sha256 = "04z3vd9si24yi4c8calqncdpb9b6mbj4cs4f3fs86i6j05gvpk9q"; sha256 = "0rxdh0dfzc84l85c54blq42gczygq8adhr3l9hqzy1dp530cm1hc";
}; };
buildInputs = [ glib gtk2 intltool libfm libX11 pango pkgconfig ]; buildInputs = [ glib gtk2 intltool libfm libX11 pango pkgconfig ];

File diff suppressed because it is too large Load Diff

View File

@ -148,8 +148,8 @@ in {
firefox-unwrapped = common { firefox-unwrapped = common {
pname = "firefox"; pname = "firefox";
version = "50.1.0"; version = "51.0";
sha512 = "370d2e9b8c4b1b59c3394659c3a7f0f79e6a911ccd9f32095b50b3a22d087132b1f7cb87b734f7497c4381b1df6df80d120b4b87c13eecc425cc66f56acccba5"; sha512 = "4406f840a7a2b4e76a74e846d702b717618fb5b677f1c6df864c3428033dd22aad295d656f1fc57e581fd202d894c5483a16691a60b6ca7710315b157b812467";
updateScript = import ./update.nix { updateScript = import ./update.nix {
name = "firefox"; name = "firefox";
inherit writeScript xidel coreutils gnused gnugrep curl ed; inherit writeScript xidel coreutils gnused gnugrep curl ed;
@ -158,8 +158,8 @@ in {
firefox-esr-unwrapped = common { firefox-esr-unwrapped = common {
pname = "firefox-esr"; pname = "firefox-esr";
version = "45.6.0esr"; version = "45.7.0esr";
sha512 = "b96c71aeed8a1185a085512f33d454a1735237cd9ddf37c8caa9cc91892eafab0615fc0ca6035f282ca8101489fa84c0de1087d1963c05b64df32b0c86446610"; sha512 = "6424101b6958191ce654d0619950dfbf98d4aa6bdd979306a2df8d6d30d3fecf1ab44638061a2b4fb1af85fe972f5ff49400e8eeda30cdcb9087c4b110b97a7d";
updateScript = import ./update.nix { updateScript = import ./update.nix {
name = "firefox-esr"; name = "firefox-esr";
versionSuffix = "esr"; versionSuffix = "esr";

View File

@ -1,6 +1,7 @@
{ stdenv, lib, fetchFromGitHub, which, go, go-bindata, makeWrapper, rsync { stdenv, lib, fetchFromGitHub, which, go, go-bindata, makeWrapper, rsync
, iptables, coreutils , iptables, coreutils
, components ? [ , components ? [
"cmd/kubeadm"
"cmd/kubectl" "cmd/kubectl"
"cmd/kubelet" "cmd/kubelet"
"cmd/kube-apiserver" "cmd/kube-apiserver"

View File

@ -2,11 +2,11 @@
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
name = "roboto-${version}"; name = "roboto-${version}";
version = "2.135"; version = "2.136";
src = fetchurl { src = fetchurl {
url = "https://github.com/google/roboto/releases/download/v${version}/roboto-unhinted.zip"; url = "https://github.com/google/roboto/releases/download/v${version}/roboto-unhinted.zip";
sha256 = "1ndlh36bcx4mhi58sxfx6ywbib586brh6s5sk3jyji78h1i7j8zr"; sha256 = "0yx3q5wbbl1qkxfx1fglzy3rvms98jr8fcfj70vvvz3r3lppv201";
}; };
nativeBuildInputs = [ unzip ]; nativeBuildInputs = [ unzip ];

View File

@ -77,6 +77,29 @@ stdenv.mkDerivation rec {
# fails when running inside tmux # fails when running inside tmux
sed -i '/TestNohup/areturn' src/os/signal/signal_test.go sed -i '/TestNohup/areturn' src/os/signal/signal_test.go
# unix socket tests fail on darwin
sed -i '/TestConnAndListener/areturn' src/net/conn_test.go
sed -i '/TestPacketConn/areturn' src/net/conn_test.go
sed -i '/TestPacketConn/areturn' src/net/packetconn_test.go
sed -i '/TestConnAndPacketConn/areturn' src/net/packetconn_test.go
sed -i '/TestUnixListenerSpecificMethods/areturn' src/net/packetconn_test.go
sed -i '/TestUnixConnSpecificMethods/areturn' src/net/packetconn_test.go
sed -i '/TestUnixListenerSpecificMethods/areturn' src/net/protoconn_test.go
sed -i '/TestUnixConnSpecificMethods/areturn' src/net/protoconn_test.go
sed -i '/TestStreamConnServer/areturn' src/net/server_test.go
sed -i '/TestReadUnixgramWithUnnamedSocket/areturn' src/net/unix_test.go
sed -i '/TestReadUnixgramWithZeroBytesBuffer/areturn' src/net/unix_test.go
sed -i '/TestUnixgramWrite/areturn' src/net/unix_test.go
sed -i '/TestUnixConnLocalAndRemoteNames/areturn' src/net/unix_test.go
sed -i '/TestUnixgramConnLocalAndRemoteNames/areturn' src/net/unix_test.go
sed -i '/TestWithSimulated/areturn' src/log/syslog/syslog_test.go
sed -i '/TestFlap/areturn' src/log/syslog/syslog_test.go
sed -i '/TestNew/areturn' src/log/syslog/syslog_test.go
sed -i '/TestNewLogger/areturn' src/log/syslog/syslog_test.go
sed -i '/TestDial/areturn' src/log/syslog/syslog_test.go
sed -i '/TestWrite/areturn' src/log/syslog/syslog_test.go
sed -i '/TestConcurrentWrite/areturn' src/log/syslog/syslog_test.go
sed -i '/TestConcurrentReconnect/areturn' src/log/syslog/syslog_test.go
# remove IP resolving tests, on darwin they can find fe80::1%lo while expecting ::1 # remove IP resolving tests, on darwin they can find fe80::1%lo while expecting ::1
sed -i '/TestResolveIPAddr/areturn' src/net/ipraw_test.go sed -i '/TestResolveIPAddr/areturn' src/net/ipraw_test.go

View File

@ -89,7 +89,7 @@ stdenv.mkDerivation rec {
sed -i '/TestChdirAndGetwd/areturn' src/os/os_test.go sed -i '/TestChdirAndGetwd/areturn' src/os/os_test.go
sed -i '/TestRead0/areturn' src/os/os_test.go sed -i '/TestRead0/areturn' src/os/os_test.go
sed -i '/TestNohup/areturn' src/os/signal/signal_test.go sed -i '/TestNohup/areturn' src/os/signal/signal_test.go
sed -i '/TestSystemRoots/areturn' src/crypto/x509/root_darwin_test.go rm src/crypto/x509/root_darwin_test.go src/crypto/x509/verify_test.go
sed -i '/TestGoInstallRebuildsStalePackagesInOtherGOPATH/areturn' src/cmd/go/go_test.go sed -i '/TestGoInstallRebuildsStalePackagesInOtherGOPATH/areturn' src/cmd/go/go_test.go
sed -i '/TestBuildDashIInstallsDependencies/areturn' src/cmd/go/go_test.go sed -i '/TestBuildDashIInstallsDependencies/areturn' src/cmd/go/go_test.go

View File

@ -693,6 +693,9 @@ self: super: {
# https://github.com/nushio3/doctest-prop/issues/1 # https://github.com/nushio3/doctest-prop/issues/1
doctest-prop = dontCheck super.doctest-prop; doctest-prop = dontCheck super.doctest-prop;
# Depends on itself for testing
doctest-discover = addBuildTool super.doctest-discover (dontCheck super.doctest-discover);
# https://github.com/bos/aeson/issues/253 # https://github.com/bos/aeson/issues/253
aeson = dontCheck super.aeson; aeson = dontCheck super.aeson;

View File

@ -1,4 +1,4 @@
{ stdenv, fetchurl, glib, gtk2, intltool, menu-cache, pango, pkgconfig, vala_0_23 { stdenv, fetchurl, glib, gtk2, intltool, menu-cache, pango, pkgconfig, vala_0_34
, extraOnly ? false }: , extraOnly ? false }:
let let
inherit (stdenv.lib) optional; inherit (stdenv.lib) optional;
@ -7,14 +7,14 @@ stdenv.mkDerivation rec {
name = if extraOnly name = if extraOnly
then "libfm-extra-${version}" then "libfm-extra-${version}"
else "libfm-${version}"; else "libfm-${version}";
version = "1.2.4"; version = "1.2.5";
src = fetchurl { src = fetchurl {
url = "mirror://sourceforge/pcmanfm/libfm-${version}.tar.xz"; url = "mirror://sourceforge/pcmanfm/libfm-${version}.tar.xz";
sha256 = "0bsh4p7h2glhxf1cc1lvbxyb4qy0y1zsnl9izf7vrldkikrgc13q"; sha256 = "0nlvfwh09gbq8bkbvwnw6iqr918rrs9gc9ljb9pjspyg408bn1n7";
}; };
buildInputs = [ glib gtk2 intltool pango pkgconfig vala_0_23 ] buildInputs = [ glib gtk2 intltool pango pkgconfig vala_0_34 ]
++ optional (!extraOnly) menu-cache; ++ optional (!extraOnly) menu-cache;
configureFlags = optional extraOnly "--with-extra-only"; configureFlags = optional extraOnly "--with-extra-only";

View File

@ -1,29 +1,29 @@
diff -ru -x '*~' nss-3.27.1-orig/nss/cmd/shlibsign/shlibsign.c nss-3.27.1/nss/cmd/shlibsign/shlibsign.c diff -ru -x '*~' -x '*.orig' -x '*.rej' nss/cmd/shlibsign/shlibsign.c nss/cmd/shlibsign/shlibsign.c
--- nss-3.27.1-orig/nss/cmd/shlibsign/shlibsign.c 2016-10-03 16:55:58.000000000 +0200 --- nss/cmd/shlibsign/shlibsign.c 2017-01-04 15:24:24.000000000 +0100
+++ nss-3.27.1/nss/cmd/shlibsign/shlibsign.c 2016-11-15 16:28:07.308117900 +0100 +++ nss/cmd/shlibsign/shlibsign.c 2017-01-24 14:43:31.030420852 +0100
@@ -871,6 +871,8 @@ @@ -875,6 +875,8 @@
libname = PR_GetLibraryName(NULL, "softokn3"); goto cleanup;
assert(libname != NULL); }
lib = PR_LoadLibrary(libname); lib = PR_LoadLibrary(libname);
+ if (!lib) + if (!lib)
+ lib = PR_LoadLibrary(NIX_NSS_LIBDIR"libsoftokn3.so"); + lib = PR_LoadLibrary(NIX_NSS_LIBDIR"libsoftokn3.so");
assert(lib != NULL); assert(lib != NULL);
PR_FreeLibraryName(libname); if (!lib) {
PR_fprintf(PR_STDERR, "loading softokn3 failed");
diff -ru -x '*~' nss-3.27.1-orig/nss/coreconf/config.mk nss-3.27.1/nss/coreconf/config.mk diff -ru -x '*~' -x '*.orig' -x '*.rej' nss/coreconf/config.mk nss/coreconf/config.mk
--- nss-3.27.1-orig/nss/coreconf/config.mk 2016-10-03 16:55:58.000000000 +0200 --- nss/coreconf/config.mk 2017-01-04 15:24:24.000000000 +0100
+++ nss-3.27.1/nss/coreconf/config.mk 2016-11-15 16:28:07.308117900 +0100 +++ nss/coreconf/config.mk 2017-01-24 14:43:47.989432372 +0100
@@ -217,3 +217,6 @@ @@ -208,3 +208,6 @@
ifdef NSS_NO_PKCS11_BYPASS # exported symbols, which causes problem when NSS is built as part of Mozilla.
DEFINES += -DNO_PKCS11_BYPASS # So we add a NSS_SSL_ENABLE_ZLIB variable to allow Mozilla to turn this off.
endif NSS_SSL_ENABLE_ZLIB = 1
+ +
+# Nix specific stuff. +# Nix specific stuff.
+DEFINES += -DNIX_NSS_LIBDIR=\"$(out)/lib/\" +DEFINES += -DNIX_NSS_LIBDIR=\"$(out)/lib/\"
diff -ru -x '*~' nss-3.27.1-orig/nss/lib/pk11wrap/pk11load.c nss-3.27.1/nss/lib/pk11wrap/pk11load.c diff -ru -x '*~' -x '*.orig' -x '*.rej' nss/lib/pk11wrap/pk11load.c nss/lib/pk11wrap/pk11load.c
--- nss-3.27.1-orig/nss/lib/pk11wrap/pk11load.c 2016-10-03 16:55:58.000000000 +0200 --- nss/lib/pk11wrap/pk11load.c 2017-01-04 15:24:24.000000000 +0100
+++ nss-3.27.1/nss/lib/pk11wrap/pk11load.c 2016-11-15 16:28:07.308117900 +0100 +++ nss/lib/pk11wrap/pk11load.c 2017-01-24 14:45:06.883485652 +0100
@@ -429,6 +429,13 @@ @@ -440,6 +440,13 @@
* unload the library if anything goes wrong from here on out... * unload the library if anything goes wrong from here on out...
*/ */
library = PR_LoadLibrary(mod->dllName); library = PR_LoadLibrary(mod->dllName);
@ -37,9 +37,9 @@ diff -ru -x '*~' nss-3.27.1-orig/nss/lib/pk11wrap/pk11load.c nss-3.27.1/nss/lib/
mod->library = (void *)library; mod->library = (void *)library;
if (library == NULL) { if (library == NULL) {
diff -ru -x '*~' nss-3.27.1-orig/nss/lib/util/secload.c nss-3.27.1/nss/lib/util/secload.c diff -ru -x '*~' -x '*.orig' -x '*.rej' nss/lib/util/secload.c nss/lib/util/secload.c
--- nss-3.27.1-orig/nss/lib/util/secload.c 2016-10-03 16:55:58.000000000 +0200 --- nss/lib/util/secload.c 2017-01-04 15:24:24.000000000 +0100
+++ nss-3.27.1/nss/lib/util/secload.c 2016-11-15 16:29:50.482259746 +0100 +++ nss/lib/util/secload.c 2017-01-24 14:43:31.030420852 +0100
@@ -70,9 +70,14 @@ @@ -70,9 +70,14 @@
/* Remove the trailing filename from referencePath and add the new one */ /* Remove the trailing filename from referencePath and add the new one */

View File

@ -9,11 +9,11 @@ let
in stdenv.mkDerivation rec { in stdenv.mkDerivation rec {
name = "nss-${version}"; name = "nss-${version}";
version = "3.27.2"; version = "3.28.1";
src = fetchurl { src = fetchurl {
url = "mirror://mozilla/security/nss/releases/NSS_3_27_2_RTM/src/${name}.tar.gz"; url = "mirror://mozilla/security/nss/releases/NSS_3_28_1_RTM/src/${name}.tar.gz";
sha256 = "dc8ac8524469d0230274fd13a53fdcd74efe4aa67205dde1a4a92be87dc28524"; sha256 = "58cc0c05c0ed9523e6d820bea74f513538f48c87aac931876e3d3775de1a82ad";
}; };
buildInputs = [ nspr perl zlib sqlite ]; buildInputs = [ nspr perl zlib sqlite ];
@ -23,11 +23,17 @@ in stdenv.mkDerivation rec {
''; '';
patches = patches =
[ ./nss-3.21-gentoo-fixups.patch [ # FIXME: what is this patch for? Do we still need it?
(fetchurl {
url = "https://gitweb.gentoo.org/repo/gentoo.git/plain/dev-libs/nss/files/nss-3.28-gentoo-fixups.patch";
sha256 = "0z58axd1n7vq4kdp5mrb3dsg6di39a1g40s3shl6n2dzs14c1y2q";
})
# Based on http://patch-tracker.debian.org/patch/series/dl/nss/2:3.15.4-1/85_security_load.patch # Based on http://patch-tracker.debian.org/patch/series/dl/nss/2:3.15.4-1/85_security_load.patch
./85_security_load.patch ./85_security_load.patch
]; ];
patchFlags = "-p0";
postPatch = '' postPatch = ''
# Fix up the patch from Gentoo. # Fix up the patch from Gentoo.
sed -i \ sed -i \

View File

@ -1,243 +0,0 @@
diff -urN a/nss/config/Makefile b/nss/config/Makefile
--- a/nss/config/Makefile 1969-12-31 18:00:00.000000000 -0600
+++ b/nss/config/Makefile 2015-11-15 10:42:46.249578304 -0600
@@ -0,0 +1,40 @@
+CORE_DEPTH = ..
+DEPTH = ..
+
+include $(CORE_DEPTH)/coreconf/config.mk
+
+NSS_MAJOR_VERSION = `grep "NSS_VMAJOR" ../lib/nss/nss.h | awk '{print $$3}'`
+NSS_MINOR_VERSION = `grep "NSS_VMINOR" ../lib/nss/nss.h | awk '{print $$3}'`
+NSS_PATCH_VERSION = `grep "NSS_VPATCH" ../lib/nss/nss.h | awk '{print $$3}'`
+PREFIX = /usr
+
+all: export libs
+
+export:
+ # Create the nss.pc file
+ mkdir -p $(DIST)/lib/pkgconfig
+ sed -e "s,@prefix@,$(PREFIX)," \
+ -e "s,@exec_prefix@,\$${prefix}," \
+ -e "s,@libdir@,\$${prefix}/lib64," \
+ -e "s,@includedir@,\$${prefix}/include/nss," \
+ -e "s,@NSS_MAJOR_VERSION@,$(NSS_MAJOR_VERSION),g" \
+ -e "s,@NSS_MINOR_VERSION@,$(NSS_MINOR_VERSION)," \
+ -e "s,@NSS_PATCH_VERSION@,$(NSS_PATCH_VERSION)," \
+ nss.pc.in > nss.pc
+ chmod 0644 nss.pc
+ ln -sf ../../../../config/nss.pc $(DIST)/lib/pkgconfig
+
+ # Create the nss-config script
+ mkdir -p $(DIST)/bin
+ sed -e "s,@prefix@,$(PREFIX)," \
+ -e "s,@NSS_MAJOR_VERSION@,$(NSS_MAJOR_VERSION)," \
+ -e "s,@NSS_MINOR_VERSION@,$(NSS_MINOR_VERSION)," \
+ -e "s,@NSS_PATCH_VERSION@,$(NSS_PATCH_VERSION)," \
+ nss-config.in > nss-config
+ chmod 0755 nss-config
+ ln -sf ../../../config/nss-config $(DIST)/bin
+
+libs:
+
+dummy: all export libs
+
diff -urN a/nss/config/nss-config.in b/nss/config/nss-config.in
--- a/nss/config/nss-config.in 1969-12-31 18:00:00.000000000 -0600
+++ b/nss/config/nss-config.in 2015-11-15 10:42:46.250578304 -0600
@@ -0,0 +1,145 @@
+#!/bin/sh
+
+prefix=@prefix@
+
+major_version=@NSS_MAJOR_VERSION@
+minor_version=@NSS_MINOR_VERSION@
+patch_version=@NSS_PATCH_VERSION@
+
+usage()
+{
+ cat <<EOF
+Usage: nss-config [OPTIONS] [LIBRARIES]
+Options:
+ [--prefix[=DIR]]
+ [--exec-prefix[=DIR]]
+ [--includedir[=DIR]]
+ [--libdir[=DIR]]
+ [--version]
+ [--libs]
+ [--cflags]
+Dynamic Libraries:
+ nss
+ ssl
+ smime
+ nssutil
+EOF
+ exit $1
+}
+
+if test $# -eq 0; then
+ usage 1 1>&2
+fi
+
+lib_ssl=yes
+lib_smime=yes
+lib_nss=yes
+lib_nssutil=yes
+
+while test $# -gt 0; do
+ case "$1" in
+ -*=*) optarg=`echo "$1" | sed 's/[-_a-zA-Z0-9]*=//'` ;;
+ *) optarg= ;;
+ esac
+
+ case $1 in
+ --prefix=*)
+ prefix=$optarg
+ ;;
+ --prefix)
+ echo_prefix=yes
+ ;;
+ --exec-prefix=*)
+ exec_prefix=$optarg
+ ;;
+ --exec-prefix)
+ echo_exec_prefix=yes
+ ;;
+ --includedir=*)
+ includedir=$optarg
+ ;;
+ --includedir)
+ echo_includedir=yes
+ ;;
+ --libdir=*)
+ libdir=$optarg
+ ;;
+ --libdir)
+ echo_libdir=yes
+ ;;
+ --version)
+ echo ${major_version}.${minor_version}.${patch_version}
+ ;;
+ --cflags)
+ echo_cflags=yes
+ ;;
+ --libs)
+ echo_libs=yes
+ ;;
+ ssl)
+ lib_ssl=yes
+ ;;
+ smime)
+ lib_smime=yes
+ ;;
+ nss)
+ lib_nss=yes
+ ;;
+ nssutil)
+ lib_nssutil=yes
+ ;;
+ *)
+ usage 1 1>&2
+ ;;
+ esac
+ shift
+done
+
+# Set variables that may be dependent upon other variables
+if test -z "$exec_prefix"; then
+ exec_prefix=`pkg-config --variable=exec_prefix nss`
+fi
+if test -z "$includedir"; then
+ includedir=`pkg-config --variable=includedir nss`
+fi
+if test -z "$libdir"; then
+ libdir=`pkg-config --variable=libdir nss`
+fi
+
+if test "$echo_prefix" = "yes"; then
+ echo $prefix
+fi
+
+if test "$echo_exec_prefix" = "yes"; then
+ echo $exec_prefix
+fi
+
+if test "$echo_includedir" = "yes"; then
+ echo $includedir
+fi
+
+if test "$echo_libdir" = "yes"; then
+ echo $libdir
+fi
+
+if test "$echo_cflags" = "yes"; then
+ echo -I$includedir
+fi
+
+if test "$echo_libs" = "yes"; then
+ libdirs=""
+ if test -n "$lib_ssl"; then
+ libdirs="$libdirs -lssl${major_version}"
+ fi
+ if test -n "$lib_smime"; then
+ libdirs="$libdirs -lsmime${major_version}"
+ fi
+ if test -n "$lib_nss"; then
+ libdirs="$libdirs -lnss${major_version}"
+ fi
+ if test -n "$lib_nssutil"; then
+ libdirs="$libdirs -lnssutil${major_version}"
+ fi
+ echo $libdirs
+fi
+
diff -urN a/nss/config/nss.pc.in b/nss/config/nss.pc.in
--- a/nss/config/nss.pc.in 1969-12-31 18:00:00.000000000 -0600
+++ b/nss/config/nss.pc.in 2015-11-15 10:42:46.251578304 -0600
@@ -0,0 +1,12 @@
+prefix=@prefix@
+exec_prefix=@exec_prefix@
+libdir=@libdir@
+includedir=@includedir@
+
+Name: NSS
+Description: Network Security Services
+Version: @NSS_MAJOR_VERSION@.@NSS_MINOR_VERSION@.@NSS_PATCH_VERSION@
+Requires: nspr >= 4.8
+Libs: -lssl3 -lsmime3 -lnss3 -lnssutil3
+Cflags: -I${includedir}
+
diff -urN a/nss/Makefile b/nss/Makefile
--- a/nss/Makefile 2015-11-15 09:25:06.410786060 -0600
+++ b/nss/Makefile 2015-11-15 10:42:46.252578304 -0600
@@ -46,7 +46,7 @@
# (7) Execute "local" rules. (OPTIONAL). #
#######################################################################
-nss_build_all: build_nspr all
+nss_build_all: all
nss_clean_all: clobber_nspr clobber
@@ -115,12 +115,6 @@
--with-dist-prefix='$(NSPR_PREFIX)' \
--with-dist-includedir='$(NSPR_PREFIX)/include'
-build_nspr: $(NSPR_CONFIG_STATUS)
- $(MAKE) -C $(CORE_DEPTH)/../nspr/$(OBJDIR_NAME)
-
-clobber_nspr: $(NSPR_CONFIG_STATUS)
- $(MAKE) -C $(CORE_DEPTH)/../nspr/$(OBJDIR_NAME) clobber
-
build_docs:
$(MAKE) -C $(CORE_DEPTH)/doc
diff -urN a/nss/manifest.mn b/nss/manifest.mn
--- a/nss/manifest.mn 2015-11-15 09:25:06.411786060 -0600
+++ b/nss/manifest.mn 2015-11-15 10:43:15.633576994 -0600
@@ -10,4 +10,4 @@
RELEASE = nss
-DIRS = coreconf lib cmd external_tests
+DIRS = coreconf lib cmd config

View File

@ -59,22 +59,27 @@ stdenv.mkDerivation rec {
}); });
preConfigure = preConfigure =
let ippicvVersion = "20151201"; # By default ippicv gets downloaded by cmake each time opencv is build. See:
ippicvPlatform = if stdenv.system == "x86_64-linux" || stdenv.system == "i686-linux" then "linux" # https://github.com/opencv/opencv/blob/3.1.0/3rdparty/ippicv/downloader.cmake
# Fortunately cmake doesn't download ippicv if it's already there.
# So to prevent repeated downloads we store it in the nix store
# and create a symbolic link to it.
let version = "20151201";
md5 = "808b791a6eac9ed78d32a7666804320e";
sha256 = "1nph0w0pdcxwhdb5lxkb8whpwd9ylvwl97hn0k425amg80z86cs3";
rev = "81a676001ca8075ada498583e4166079e5744668";
platform = if stdenv.system == "x86_64-linux" || stdenv.system == "i686-linux" then "linux"
else throw "ICV is not available for this platform (or not yet supported by this package)"; else throw "ICV is not available for this platform (or not yet supported by this package)";
ippicvHash = if ippicvPlatform == "linux" then "1nph0w0pdcxwhdb5lxkb8whpwd9ylvwl97hn0k425amg80z86cs3" name = "ippicv_${platform}_${version}.tgz";
else throw "ippicvHash: impossible";
ippicvName = "ippicv_${ippicvPlatform}_${ippicvVersion}.tgz";
ippicvArchive = "3rdparty/ippicv/downloads/linux-${ippicvHash}/${ippicvName}";
ippicv = fetchurl { ippicv = fetchurl {
url = "https://github.com/Itseez/opencv_3rdparty/raw/ippicv/master_${ippicvVersion}/ippicv/${ippicvName}"; url = "https://raw.githubusercontent.com/opencv/opencv_3rdparty/${rev}/ippicv/${name}";
sha256 = ippicvHash; inherit sha256;
}; };
dir = "3rdparty/ippicv/downloads/${platform}-${md5}";
in lib.optionalString enableIpp in lib.optionalString enableIpp
'' ''
mkdir -p $(dirname ${ippicvArchive}) mkdir -p "${dir}"
ln -s ${ippicv} ${ippicvArchive} ln -s "${ippicv}" "${dir}/${name}"
''; '';
buildInputs = buildInputs =

View File

@ -3,11 +3,11 @@
assert interactive -> readline != null && ncurses != null; assert interactive -> readline != null && ncurses != null;
stdenv.mkDerivation { stdenv.mkDerivation {
name = "sqlite-3.15.2"; name = "sqlite-3.16.2";
src = fetchurl { src = fetchurl {
url = "http://sqlite.org/2016/sqlite-autoconf-3150200.tar.gz"; url = "http://sqlite.org/2017/sqlite-autoconf-3160200.tar.gz";
sha256 = "0j9i1zrwxc7dfd6xr3xagal3incrlalsrk96havnas1qp5im1cq7"; sha256 = "059n4s9qd35qpbd4g29y9ay99a6f68ad7k65g430rxb6jcz0rk35";
}; };
outputs = [ "bin" "dev" "out" ]; outputs = [ "bin" "dev" "out" ];

View File

@ -1,4 +1,4 @@
{pkgs, pkgs_i686, xcodeVersion ? "7.2", xcodeBaseDir ? "/Applications/Xcode.app", tiVersion ? "5.2.3.GA"}: {pkgs, pkgs_i686, xcodeVersion ? "7.2", xcodeBaseDir ? "/Applications/Xcode.app", tiVersion ? "6.0.2.GA"}:
rec { rec {
androidenv = pkgs.androidenv; androidenv = pkgs.androidenv;
@ -11,6 +11,7 @@ rec {
titaniumsdk = let titaniumsdk = let
titaniumSdkFile = if tiVersion == "5.1.2.GA" then ./titaniumsdk-5.1.nix titaniumSdkFile = if tiVersion == "5.1.2.GA" then ./titaniumsdk-5.1.nix
else if tiVersion == "5.2.3.GA" then ./titaniumsdk-5.2.nix else if tiVersion == "5.2.3.GA" then ./titaniumsdk-5.2.nix
else if tiVersion == "6.0.2.GA" then ./titaniumsdk-6.0.nix
else throw "Titanium version not supported: "+tiVersion; else throw "Titanium version not supported: "+tiVersion;
in in
import titaniumSdkFile { import titaniumSdkFile {
@ -19,7 +20,7 @@ rec {
buildApp = import ./build-app.nix { buildApp = import ./build-app.nix {
inherit (pkgs) stdenv python which jdk nodejs; inherit (pkgs) stdenv python which jdk nodejs;
inherit (pkgs.nodePackages) titanium alloy; inherit (pkgs.nodePackages_4_x) titanium alloy;
inherit (androidenv) androidsdk; inherit (androidenv) androidsdk;
inherit (xcodeenv) xcodewrapper; inherit (xcodeenv) xcodewrapper;
inherit titaniumsdk xcodeBaseDir; inherit titaniumsdk xcodeBaseDir;

View File

@ -2,7 +2,7 @@
, systems ? [ "x86_64-linux" "x86_64-darwin" ] , systems ? [ "x86_64-linux" "x86_64-darwin" ]
, xcodeVersion ? "7.2" , xcodeVersion ? "7.2"
, xcodeBaseDir ? "/Applications/Xcode.app" , xcodeBaseDir ? "/Applications/Xcode.app"
, tiVersion ? "5.1.2.GA" , tiVersion ? "6.0.2.GA"
, rename ? false , rename ? false
, newBundleId ? "com.example.kitchensink", iosMobileProvisioningProfile ? null, iosCertificate ? null, iosCertificateName ? "Example", iosCertificatePassword ? "", iosVersion ? "9.2" , newBundleId ? "com.example.kitchensink", iosMobileProvisioningProfile ? null, iosCertificate ? null, iosCertificateName ? "Example", iosCertificatePassword ? "", iosVersion ? "9.2"
, enableWirelessDistribution ? false, installURL ? null , enableWirelessDistribution ? false, installURL ? null

View File

@ -8,8 +8,8 @@ assert rename -> (stdenv != null && newBundleId != null && iosMobileProvisioning
let let
src = fetchgit { src = fetchgit {
url = https://github.com/appcelerator/KitchenSink.git; url = https://github.com/appcelerator/KitchenSink.git;
rev = "6e9f509069fafdebfa78e15b2d14f20a27a485cc"; rev = "ec9edebf35030f61368000a8a9071dd7a0773884";
sha256 = "049cf0d9y0ivhsi35slx621z0wry4lqf76hw0ksb315i2713v347"; sha256 = "1j41w4nhcbl40x550pjgabqrach80f9dybv7ya32771wnw2000iy";
}; };
# Rename the bundle id to something else # Rename the bundle id to something else

View File

@ -0,0 +1,39 @@
{stdenv, fetchurl, unzip, makeWrapper, python, jdk}:
stdenv.mkDerivation {
name = "mobilesdk-6.0.2.GA";
src = if (stdenv.system == "i686-linux" || stdenv.system == "x86_64-linux") then fetchurl {
url = http://builds.appcelerator.com/mobile/6_0_X/mobilesdk-6.0.2.v20170123140026-linux.zip;
sha256 = "1yjhr4fgjnxfxzwmgw71yynrfzhsjqj2cirjr5rd14zlp4q9751q";
}
else if stdenv.system == "x86_64-darwin" then fetchurl {
url = http://builds.appcelerator.com/mobile/6_0_X/mobilesdk-6.0.2.v20170123140026-osx.zip;
sha256 = "1ijd1wp56ygy238xpcffy112akim208wbv5zm901dvych83ibw1c";
}
else throw "Platform: ${stdenv.system} not supported!";
buildInputs = [ unzip makeWrapper ];
buildCommand = ''
mkdir -p $out
cd $out
(yes y | unzip $src) || true
# Rename ugly version number
cd mobilesdk/*
mv * 6.0.2.GA
cd *
# Patch some executables
${if stdenv.system == "i686-linux" then
''
patchelf --set-interpreter ${stdenv.cc.libc}/lib/ld-linux.so.2 android/titanium_prep.linux32
''
else if stdenv.system == "x86_64-linux" then
''
patchelf --set-interpreter ${stdenv.cc.libc}/lib/ld-linux-x86-64.so.2 android/titanium_prep.linux64
''
else ""}
'';
}

View File

@ -0,0 +1,24 @@
{ stdenv, fetchzip, perl, gmp, mpfr, ppl, ocaml, findlib, camlidl, mlgmpidl }:
stdenv.mkDerivation rec {
name = "ocaml${ocaml.version}-apron-${version}";
version = "20160125";
src = fetchzip {
url = "http://apron.gforge.inria.fr/apron-${version}.tar.gz";
sha256 = "1a7b7b9wsd0gdvm41lgg6ayb85wxc2a3ggcrghy4qiphs4b9v4m4";
};
buildInputs = [ perl gmp mpfr ppl ocaml findlib camlidl ];
propagatedBuildInputs = [ mlgmpidl ];
prefixKey = "-prefix ";
createFindlibDestdir = true;
meta = {
license = stdenv.lib.licenses.lgpl21;
homepage = http://apron.cri.ensmp.fr/library/;
maintainers = [ stdenv.lib.maintainers.vbgl ];
description = "Numerical abstract domain library";
inherit (ocaml.meta) platforms;
};
}

View File

@ -0,0 +1,36 @@
{ stdenv, fetchFromGitHub, ocaml, findlib, camlidl, gmp, mpfr }:
stdenv.mkDerivation rec {
name = "ocaml${ocaml.version}-mlgmpidl-${version}";
version = "1.2.4";
src = fetchFromGitHub {
owner = "nberth";
repo = "mlgmpidl";
rev = version;
sha256 = "09f9rk2bavhb7cdwjpibjf8bcjk59z85ac9dr8nvks1s842dp65s";
};
buildInputs = [ gmp mpfr ocaml findlib camlidl ];
configurePhase = ''
cp Makefile.config.model Makefile.config
sed -i Makefile.config \
-e 's|^MLGMPIDL_PREFIX.*$|MLGMPIDL_PREFIX = $out|' \
-e 's|^GMP_PREFIX.*$|GMP_PREFIX = ${gmp.dev}|' \
-e 's|^MPFR_PREFIX.*$|MPFR_PREFIX = ${mpfr.dev}|' \
-e 's|^CAMLIDL_DIR.*$|CAMLIDL_DIR = ${camlidl}/lib/ocaml/${ocaml.version}/site-lib/camlidl|'
echo HAS_NATIVE_PLUGINS = 1 >> Makefile.config
sed -i Makefile \
-e 's|^ /bin/rm | rm |'
'';
createFindlibDestdir = true;
meta = {
description = "OCaml interface to the GMP library";
homepage = https://www.inrialpes.fr/pop-art/people/bjeannet/mlxxxidl-forge/mlgmpidl/;
license = stdenv.lib.licenses.lgpl21;
inherit (ocaml.meta) platforms;
maintainers = [ stdenv.lib.maintainers.vbgl ];
};
}

View File

@ -1,6 +1,11 @@
{ stdenv, fetchurl, ncurses, ocamlPackages, graphviz { stdenv, fetchurl, makeWrapper, ncurses, ocamlPackages, graphviz
, ltl2ba, coq, alt-ergo, why3 }: , ltl2ba, coq, alt-ergo, why3 }:
let
mkocamlpath = p: "${p}/lib/ocaml/${ocamlPackages.ocaml.version}/site-lib";
ocamlpath = "${mkocamlpath ocamlPackages.apron}:${mkocamlpath ocamlPackages.mlgmpidl}";
in
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
name = "frama-c-${version}"; name = "frama-c-${version}";
version = "20160501"; version = "20160501";
@ -16,9 +21,11 @@ stdenv.mkDerivation rec {
sha256 = "1335bhq9v3h46m8aba2c5myi9ghm87q41in0m15xvdrwq5big1jg"; sha256 = "1335bhq9v3h46m8aba2c5myi9ghm87q41in0m15xvdrwq5big1jg";
}; };
nativeBuildInputs = [ makeWrapper ];
buildInputs = with ocamlPackages; [ buildInputs = with ocamlPackages; [
ncurses ocaml findlib alt-ergo ltl2ba ocamlgraph ncurses ocaml findlib alt-ergo ltl2ba ocamlgraph
lablgtk coq graphviz zarith why3 zarith lablgtk coq graphviz zarith why3 apron
]; ];
@ -38,11 +45,15 @@ stdenv.mkDerivation rec {
FRAMAC=$out/bin/frama-c ./configure --prefix=$out FRAMAC=$out/bin/frama-c ./configure --prefix=$out
make make
make install make install
for p in $out/bin/frama-c{,-gui};
do
wrapProgram $p --prefix OCAMLPATH ':' ${ocamlpath}
done
''; '';
# Enter frama-c directory before patching # Enter frama-c directory before patching
prePatch = ''cd frama*''; prePatch = ''cd frama*'';
patches = [ ./dynamic.diff ];
postPatch = '' postPatch = ''
# strip absolute paths to /usr/bin # strip absolute paths to /usr/bin
for file in ./configure ./share/Makefile.common ./src/*/configure; do for file in ./configure ./share/Makefile.common ./src/*/configure; do

View File

@ -0,0 +1,12 @@
--- a/src/kernel_services/plugin_entry_points/dynamic.ml 2016-05-30 16:15:22.000000000 +0200
+++ b/src/kernel_services/plugin_entry_points/dynamic.ml 2016-10-13 18:25:31.000000000 +0200
@@ -287,7 +287,8 @@
(List.fold_right (add_dir ~user:false) Config.plugin_dir []) ;
let pkgs = ref [] in
List.iter (scan_directory pkgs) !load_path ;
- let findlib_path = String.concat ":" !load_path in
+ let findlib_path = String.concat ":" (!load_path @
+ try [Sys.getenv "OCAMLPATH"] with Not_found -> []) in
Klog.debug ~dkey "setting findlib path to %s" findlib_path;
Findlib.init ~env_ocamlpath:findlib_path ();
load_packages (List.rev !pkgs) ;

View File

@ -1,16 +1,16 @@
{ lib, buildGoPackage, fetchFromGitLab, fetchurl, go-bindata }: { lib, buildGoPackage, fetchFromGitLab, fetchurl, go-bindata }:
let let
version = "1.9.0"; version = "1.10.0";
# Gitlab runner embeds some docker images these are prebuilt for arm and x86_64 # Gitlab runner embeds some docker images these are prebuilt for arm and x86_64
docker_x86_64 = fetchurl { docker_x86_64 = fetchurl {
url = "https://gitlab-ci-multi-runner-downloads.s3.amazonaws.com/v${version}/docker/prebuilt-x86_64.tar.xz"; url = "https://gitlab-ci-multi-runner-downloads.s3.amazonaws.com/v${version}/docker/prebuilt-x86_64.tar.xz";
sha256 = "12hcpvc0j6g200qhz12gfsslngbqx4sifrikr05vh2av17hba25s"; sha256 = "1fv4sv92ng4gx53pbpagb6kv2hdab04lf2chsflf10xgzqw5l521";
}; };
docker_arm = fetchurl { docker_arm = fetchurl {
url = "https://gitlab-ci-multi-runner-downloads.s3.amazonaws.com/v${version}/docker/prebuilt-arm.tar.xz"; url = "https://gitlab-ci-multi-runner-downloads.s3.amazonaws.com/v${version}/docker/prebuilt-arm.tar.xz";
sha256 = "1hqwhg94g514g0ad4h0h7wh7k5clm9i7whzr6c30i8yb00ga628s"; sha256 = "153dbgk6fvl73d5qhainqr9hzicsryc6ynlryi9si40ld82flrsr";
}; };
in in
buildGoPackage rec { buildGoPackage rec {
@ -29,7 +29,7 @@ buildGoPackage rec {
owner = "gitlab-org"; owner = "gitlab-org";
repo = "gitlab-ci-multi-runner"; repo = "gitlab-ci-multi-runner";
rev = "v${version}"; rev = "v${version}";
sha256 = "1b30daxnpn1psy3vds1m4mnbl2hmvr2bc0zrd3nn9xm3xacm3dqj"; sha256 = "0ma6b6624c8218cz4gg5pr077li7nbs0v3mpgr1hxq7v465spa7j";
}; };
buildInputs = [ go-bindata ]; buildInputs = [ go-bindata ];

View File

@ -9,12 +9,11 @@ stdenv.mkDerivation rec {
# Note: Glib support is optional, but it's quite useful (e.g., it's # Note: Glib support is optional, but it's quite useful (e.g., it's
# used by Guile-GNOME). # used by Guile-GNOME).
buildInputs = [ guile pkgconfig glib ] buildInputs = [ guile pkgconfig glib guile_lib ];
++ stdenv.lib.optional doCheck guile_lib;
propagatedBuildInputs = [ libffi ]; propagatedBuildInputs = [ libffi ];
doCheck = !stdenv.isFreeBSD; # XXX: 00-socket.test hangs doCheck = true;
meta = { meta = {
description = "G-Wrap, a wrapper generator for Guile"; description = "G-Wrap, a wrapper generator for Guile";

View File

@ -20,6 +20,7 @@ stdenv.mkDerivation rec {
substituteInPlace config/Makefile --replace BINDIR=/usr/local/bin BINDIR=$out substituteInPlace config/Makefile --replace BINDIR=/usr/local/bin BINDIR=$out
substituteInPlace config/Makefile --replace OCAMLLIB=/usr/local/lib/ocaml OCAMLLIB=$out/lib/ocaml/${ocaml.version}/site-lib/camlidl substituteInPlace config/Makefile --replace OCAMLLIB=/usr/local/lib/ocaml OCAMLLIB=$out/lib/ocaml/${ocaml.version}/site-lib/camlidl
substituteInPlace config/Makefile --replace CPP=/lib/cpp CPP=${stdenv.cc}/bin/cpp substituteInPlace config/Makefile --replace CPP=/lib/cpp CPP=${stdenv.cc}/bin/cpp
substituteInPlace config/Makefile --replace "OCAMLC=ocamlc -g" "OCAMLC=ocamlc -g -warn-error -31"
mkdir -p $out/lib/ocaml/${ocaml.version}/site-lib/camlidl/caml mkdir -p $out/lib/ocaml/${ocaml.version}/site-lib/camlidl/caml
''; '';

View File

@ -117,7 +117,8 @@ in stdenv.mkDerivation rec {
mkdir -p "$out" mkdir -p "$out"
cp -r opt "$out" cp -r opt "$out"
cp -r usr/bin "$out" cp -r usr/bin "$out"
wrapProgram "$out/bin/vagrant" --prefix LD_LIBRARY_PATH : "$out/opt/vagrant/embedded/lib" wrapProgram "$out/bin/vagrant" --prefix LD_LIBRARY_PATH : "${stdenv.lib.makeLibraryPath [ libxml2 libxslt ]}" \
--prefix LD_LIBRARY_PATH : "$out/opt/vagrant/embedded/lib"
''; '';
preFixup = '' preFixup = ''

View File

@ -0,0 +1,14 @@
{ runCommand, cctools }:
{ haskellPackages, src, deps ? p : [], name }: let
inherit (haskellPackages) ghc ghcWithPackages;
with-env = ghcWithPackages deps;
crossPrefix = if (ghc.cross or null) != null then "${ghc.cross.config}-" else "";
ghcName = "${crossPrefix}ghc";
in runCommand name { buildInputs = [ with-env cctools ]; } ''
mkdir -p $out/lib
mkdir -p $out/include
${ghcName} ${src} -staticlib -outputdir . -o $out/lib/${name}.a -stubdir $out/include
for file in ${ghc}/lib/${ghcName}-${ghc.version}/include/*; do
ln -sv $file $out/include
done
''

View File

@ -0,0 +1,42 @@
{ stdenv, fetchFromGitHub, Carbon, Cocoa }:
stdenv.mkDerivation rec {
name = "khd-${version}";
version = "1.1.4";
src = fetchFromGitHub {
owner = "koekeishiya";
repo = "khd";
rev = "v${version}";
sha256 = "1klia3fywl0c88zbp5wdn6kxhdwdry1jwmkj27vpv8vzvdfzwfmy";
};
buildInputs = [ Carbon Cocoa ];
prePatch = ''
substituteInPlace makefile \
--replace g++ clang++
'';
buildPhase = ''
make install
'';
installPhase = ''
mkdir -p $out/bin
cp bin/khd $out/bin/khd
mkdir -p $out/Library/LaunchDaemons
cp ${./org.nixos.khd.plist} $out/Library/LaunchDaemons/org.nixos.khd.plist
substituteInPlace $out/Library/LaunchDaemons/org.nixos.khd.plist --subst-var out
'';
meta = with stdenv.lib; {
description = "A simple modal hototkey daemon for OSX";
homepage = https://github.com/koekeishiya/khd;
downloadPage = https://github.com/koekeishiya/khd/releases;
platforms = platforms.darwin;
maintainers = with maintainers; [ lnl7 ];
license = licenses.mit;
};
}

View File

@ -0,0 +1,33 @@
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
<plist version="1.0">
<dict>
<key>Label</key>
<string>org.nixos.khd</string>
<key>ProgramArguments</key>
<array>
<string>@out@/bin/khd</string>
</array>
<key>KeepAlive</key>
<true/>
<key>ProcessType</key>
<string>Interactive</string>
<key>EnvironmentVariables</key>
<dict>
<key>PATH</key>
<string>@out@/bin:/usr/local/bin:/usr/local/sbin:/usr/bin:/bin:/usr/sbin:/sbin</string>
</dict>
<key>Sockets</key>
<dict>
<key>Listeners</key>
<dict>
<key>SockServiceName</key>
<string>3021</string>
<key>SockType</key>
<string>dgram</string>
<key>SockFamily</key>
<string>IPv4</string>
</dict>
</dict>
</dict>
</plist>

View File

@ -175,12 +175,12 @@ rec {
}; };
}; };
p9_caching_4_4 = rec p9_caching_4_9 = rec
{ name = "9p-caching.patch"; { name = "9p-caching.patch";
patch = fetchpatch { patch = fetchpatch {
inherit name; inherit name;
url = https://github.com/edolstra/linux/commit/d522582553368b9564e2d88a8d7b1d469bf98c65.patch; url = https://github.com/edolstra/linux/commit/7e20254412c780a2102761fee92cb1d32ceeaefd.patch;
sha256 = "01h7461pdgavd6ghd6w9wg136hkaca0mrmmzhy6s3phksksimbc2"; sha256 = "001kf1sdy6pirn8sqnfgbfahvwwkc7n7vr5i8fy2n74xph1kks5a";
}; };
}; };

View File

@ -1,5 +1,5 @@
{ stdenv, fetchurl, pkgconfig, docbook2x, docbook_xml_dtd_45 { stdenv, fetchurl, pkgconfig, docbook2x, docbook_xml_dtd_45
, flex, bison, libmnl, libnftnl, gmp, readline, iptables }: , flex, bison, libmnl, libnftnl, gmp, readline }:
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
name = "nftables-0.7"; name = "nftables-0.7";
@ -12,13 +12,12 @@ stdenv.mkDerivation rec {
configureFlags = [ configureFlags = [
"CONFIG_MAN=y" "CONFIG_MAN=y"
"DB2MAN=docbook2man" "DB2MAN=docbook2man"
"--with-xtables"
]; ];
XML_CATALOG_FILES = "${docbook_xml_dtd_45}/xml/dtd/docbook/catalog.xml"; XML_CATALOG_FILES = "${docbook_xml_dtd_45}/xml/dtd/docbook/catalog.xml";
nativeBuildInputs = [ pkgconfig docbook2x flex bison ]; nativeBuildInputs = [ pkgconfig docbook2x flex bison ];
buildInputs = [ libmnl libnftnl gmp readline iptables ]; buildInputs = [ libmnl libnftnl gmp readline ];
meta = with stdenv.lib; { meta = with stdenv.lib; {
description = "The project that aims to replace the existing {ip,ip6,arp,eb}tables framework"; description = "The project that aims to replace the existing {ip,ip6,arp,eb}tables framework";

View File

@ -0,0 +1,38 @@
{ stdenv, fetchurl, pkgconfig, boost
, openssl, systemd, lua, luajit, protobuf
, enableLua ? false
, enableProtoBuf ? false
}:
assert enableLua -> lua != null && luajit != null;
assert enableProtoBuf -> protobuf != null;
with stdenv.lib;
stdenv.mkDerivation rec {
name = "pdns-recursor-${version}";
version = "4.0.4";
src = fetchurl {
url = "https://downloads.powerdns.com/releases/pdns-recursor-${version}.tar.bz2";
sha256 = "0k8y9zxj2lz4rq782vgzr28yd43q0hwlnvszwq0k9l6c967pff13";
};
buildInputs = [
boost openssl pkgconfig systemd
] ++ optional enableLua [ lua luajit ]
++ optional enableProtoBuf protobuf;
configureFlags = [
"--enable-reproducible"
"--with-systemd"
];
meta = {
description = "A recursive DNS server";
homepage = http://www.powerdns.com/;
platforms = platforms.linux;
license = licenses.gpl2;
maintainers = with maintainers; [ rnhmjoj ];
};
}

View File

@ -1,12 +1,12 @@
{ stdenv, fetchurl, openssh }: { stdenv, fetchurl, openssh, openssl }:
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
name = "nagios-plugins-${version}"; name = "nagios-plugins-${version}";
version = "2.1.4"; version = "2.2.0";
src = fetchurl { src = fetchurl {
url = "http://nagios-plugins.org/download/${name}.tar.gz"; url = "http://nagios-plugins.org/download/${name}.tar.gz";
sha256 = "146hrpcwciz0niqsv4k5yvkhaggs9mr5v02xnnxp5yp0xpdbama3"; sha256 = "074yia04py5y07sbgkvri10dv8nf41kqq1x6kmwqcix5vvm9qyy3";
}; };
# !!! Awful hack. Grrr... this of course only works on NixOS. # !!! Awful hack. Grrr... this of course only works on NixOS.
@ -24,7 +24,7 @@ stdenv.mkDerivation rec {
postInstall = "ln -s libexec $out/bin"; postInstall = "ln -s libexec $out/bin";
# !!! make openssh a runtime dependency only # !!! make openssh a runtime dependency only
buildInputs = [ openssh ]; buildInputs = [ openssh openssl ];
meta = { meta = {
description = "Official plugins for Nagios"; description = "Official plugins for Nagios";

View File

@ -2,7 +2,7 @@
buildGoPackage rec { buildGoPackage rec {
name = "telegraf-${version}"; name = "telegraf-${version}";
version = "1.1.2"; version = "1.2.0";
goPackagePath = "github.com/influxdata/telegraf"; goPackagePath = "github.com/influxdata/telegraf";
@ -12,7 +12,7 @@ buildGoPackage rec {
owner = "influxdata"; owner = "influxdata";
repo = "telegraf"; repo = "telegraf";
rev = "${version}"; rev = "${version}";
sha256 = "0dgrbdyz261j28wcq636125ha4xmfgh4y9shlg8m1y6jqdqd2zf2"; sha256 = "0kijg3j2jnz7jfybycv2scvpsfmxg83jh8wl95p2bw322ypqlks1";
}; };
goDeps = ./. + builtins.toPath "/deps-${version}.nix"; goDeps = ./. + builtins.toPath "/deps-${version}.nix";

View File

@ -198,15 +198,6 @@
sha256 = "0wynarlr1y8sm9y9l29pm9dgflxriiialpwn01066snzjxnpmbyn"; sha256 = "0wynarlr1y8sm9y9l29pm9dgflxriiialpwn01066snzjxnpmbyn";
}; };
} }
{
goPackagePath = "github.com/gonuts/go-shellquote";
fetch = {
type = "git";
url = "https://github.com/gonuts/go-shellquote";
rev = "e842a11b24c6abfb3dd27af69a17f482e4b483c2";
sha256 = "19lbz7wl241bsyzsv2ai40b2vnj8c9nl107b6jf9gid3i6h0xydg";
};
}
{ {
goPackagePath = "github.com/gorilla/context"; goPackagePath = "github.com/gorilla/context";
fetch = { fetch = {
@ -306,6 +297,15 @@
sha256 = "1g10qisgywfqj135yyiq63pnbjgr201gz929ydlgyzqq6yk3bn3h"; sha256 = "1g10qisgywfqj135yyiq63pnbjgr201gz929ydlgyzqq6yk3bn3h";
}; };
} }
{
goPackagePath = "github.com/kballard/go-shellquote";
fetch = {
type = "git";
url = "https://github.com/kballard/go-shellquote";
rev = "d8ec1a69a250a17bb0e419c386eac1f3711dc142";
sha256 = "1a57hm0zwyi70am670s0pkglnkk1ilddnmfxz1ba7innpkf5z6s7";
};
}
{ {
goPackagePath = "github.com/klauspost/crc32"; goPackagePath = "github.com/klauspost/crc32";
fetch = { fetch = {
@ -446,8 +446,8 @@
fetch = { fetch = {
type = "git"; type = "git";
url = "https://github.com/shirou/gopsutil"; url = "https://github.com/shirou/gopsutil";
rev = "4d0c402af66c78735c5ccf820dc2ca7de5e4ff08"; rev = "1516eb9ddc5e61ba58874047a98f8b44b5e585e8";
sha256 = "1wkp7chzpz6brq2y0k2mvsf0iaknns279wfsjn5gm6gvih49lqni"; sha256 = "1pnl1g2l1y5vmnraq97rbm0nirprqvfzxsp6h4xacn1429jdl5bv";
}; };
} }
{ {
@ -491,8 +491,8 @@
fetch = { fetch = {
type = "git"; type = "git";
url = "https://github.com/wvanbergen/kafka"; url = "https://github.com/wvanbergen/kafka";
rev = "46f9a1cf3f670edec492029fadded9c2d9e18866"; rev = "bc265fedb9ff5b5c5d3c0fdcef4a819b3523d3ee";
sha256 = "1czmbilprffdbwnrq4wcllaqknbq91l6p0ni6b55fkaggnwck694"; sha256 = "0x86gnkpsr6gsc6mk2312ay8yqrzscvvdra2knhvwgaws6rzvj2l";
}; };
} }
{ {

View File

@ -7,40 +7,36 @@
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
name = "groonga-${version}"; name = "groonga-${version}";
version = "6.1.1"; version = "6.1.5";
src = fetchurl { src = fetchurl {
url = "http://packages.groonga.org/source/groonga/${name}.tar.gz"; url = "http://packages.groonga.org/source/groonga/${name}.tar.gz";
sha256 = "03h65gycy0j2q4n5h62x3sw76ibdywdvmiciys5a7ppxb2mncabz"; sha256 = "0phh4qp7ky5rw8xgxv3gjzw2cadkjl604xrdyxxbpd30i354sh5x";
}; };
buildInputs = with stdenv.lib; [ pkgconfig mecab kytea libedit ] ++ buildInputs = with stdenv.lib;
optional lz4Support lz4 ++ [ pkgconfig mecab kytea libedit ]
optional zlibSupport zlib ++ ++ optional lz4Support lz4
optional suggestSupport [ zeromq libevent libmsgpack ]; ++ optional zlibSupport zlib
++ optionals suggestSupport [ zeromq libevent libmsgpack ];
configureFlags = with stdenv.lib; '' configureFlags = with stdenv.lib;
${optionalString zlibSupport "--with-zlib"} optional zlibSupport "--with-zlib"
${optionalString lz4Support "--with-lz4"} ++ optional lz4Support "--with-lz4";
'';
doInstallCheck = true; doInstallCheck = true;
installCheckPhase = "$out/bin/groonga --version"; installCheckPhase = "$out/bin/groonga --version";
meta = with stdenv.lib; { meta = with stdenv.lib; {
homepage = http://groonga.org/; homepage = http://groonga.org/;
description = "An open-source fulltext search engine and column store"; description = "An open-source fulltext search engine and column store";
license = licenses.lgpl21;
maintainers = [ maintainers.ericsagnes ];
platforms = platforms.linux;
longDescription = '' longDescription = ''
Groonga is an open-source fulltext search engine and column store. Groonga is an open-source fulltext search engine and column store.
It lets you write high-performance applications that requires fulltext search. It lets you write high-performance applications that requires fulltext search.
''; '';
license = licenses.lgpl21;
maintainers = [ maintainers.ericsagnes ];
platforms = platforms.linux;
}; };
} }

View File

@ -2,12 +2,12 @@
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
name = "neofetch-${version}"; name = "neofetch-${version}";
version = "2.0.2"; version = "3.0";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "dylanaraps"; owner = "dylanaraps";
repo = "neofetch"; repo = "neofetch";
rev = version; rev = version;
sha256 = "15fpm6nflf6w0c758xizfifvvxrkmcc2hpzrnfw6fcngfqcvajmd"; sha256 = "0z8sqbspf6j7yqy7wbd8ba3pfn836b0y8kmgkcyvswgjkcyh8m68";
}; };
patchPhase = '' patchPhase = ''

View File

@ -5,13 +5,13 @@ let
inherit (pythonPackages) python nose pycrypto requests2 mock; inherit (pythonPackages) python nose pycrypto requests2 mock;
in stdenv.mkDerivation rec { in stdenv.mkDerivation rec {
name = "svtplay-dl-${version}"; name = "svtplay-dl-${version}";
version = "1.8"; version = "1.9";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "spaam"; owner = "spaam";
repo = "svtplay-dl"; repo = "svtplay-dl";
rev = version; rev = version;
sha256 = "1cn79kbz9fhhbajxg1fqd8xlab9jz4x1n9w7n42w0j8c627q0rlv"; sha256 = "0kqly2jzpn1l26is65nhaq0xdvsjylh7wm12fw9r1wz1558pqswf";
}; };
pythonPaths = [ pycrypto requests2 ]; pythonPaths = [ pycrypto requests2 ];

View File

@ -5,13 +5,13 @@
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
name = "aria2-${version}"; name = "aria2-${version}";
version = "1.29.0"; version = "1.31.0";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "aria2"; owner = "aria2";
repo = "aria2"; repo = "aria2";
rev = "release-${version}"; rev = "release-${version}";
sha256 = "1ivxz2ld4cl9z29kdicban9dir6s0si2jqn4g11gz587x7pagbim"; sha256 = "0d7z4bss1plkvlw5kfwzivxryrh13zi58ii3vf8q4csaz4yqhcjy";
}; };
nativeBuildInputs = [ pkgconfig autoreconfHook ]; nativeBuildInputs = [ pkgconfig autoreconfHook ];

View File

@ -25,8 +25,12 @@ stdenv.mkDerivation rec {
sha256 = "16rqhyzlpnivifin8n7l2fr9ihay9v2nw2drsniinb6bcykqaqfi"; sha256 = "16rqhyzlpnivifin8n7l2fr9ihay9v2nw2drsniinb6bcykqaqfi";
}; };
patches = [ ./issue-1174.patch ];
outputs = [ "bin" "dev" "out" "man" "devdoc" ]; outputs = [ "bin" "dev" "out" "man" "devdoc" ];
enableParallelBuilding = true;
nativeBuildInputs = [ pkgconfig perl ]; nativeBuildInputs = [ pkgconfig perl ];
# Zlib and OpenSSL must be propagated because `libcurl.la' contains # Zlib and OpenSSL must be propagated because `libcurl.la' contains

View File

@ -0,0 +1,34 @@
commit a7b38c9dc98481e4a5fc37e51a8690337c674dfb
Author: Daniel Stenberg <daniel@haxx.se>
Date: Mon Dec 26 00:06:33 2016 +0100
vtls: s/SSLEAY/OPENSSL
Fixed an old leftover use of the USE_SSLEAY define which would make a
socket get removed from the applications sockets to monitor when the
multi_socket API was used, leading to timeouts.
Bug: #1174
diff --git a/lib/vtls/vtls.c b/lib/vtls/vtls.c
index b808e1c..707f24b 100644
--- a/lib/vtls/vtls.c
+++ b/lib/vtls/vtls.c
@@ -484,7 +484,7 @@ void Curl_ssl_close_all(struct Curl_easy *data)
curlssl_close_all(data);
}
-#if defined(USE_SSLEAY) || defined(USE_GNUTLS) || defined(USE_SCHANNEL) || \
+#if defined(USE_OPENSSL) || defined(USE_GNUTLS) || defined(USE_SCHANNEL) || \
defined(USE_DARWINSSL) || defined(USE_NSS)
/* This function is for OpenSSL, GnuTLS, darwinssl, and schannel only. */
int Curl_ssl_getsock(struct connectdata *conn, curl_socket_t *socks,
@@ -518,7 +518,7 @@ int Curl_ssl_getsock(struct connectdata *conn,
(void)numsocks;
return GETSOCK_BLANK;
}
-/* USE_SSLEAY || USE_GNUTLS || USE_SCHANNEL || USE_DARWINSSL || USE_NSS */
+/* USE_OPENSSL || USE_GNUTLS || USE_SCHANNEL || USE_DARWINSSL || USE_NSS */
#endif
void Curl_ssl_close(struct connectdata *conn, int sockindex)

View File

@ -6,13 +6,13 @@
# some loss of functionality because of it. # some loss of functionality because of it.
pythonPackages.buildPythonApplication rec { pythonPackages.buildPythonApplication rec {
version = "1.11.0"; version = "1.12.1";
name = "tahoe-lafs-${version}"; name = "tahoe-lafs-${version}";
namePrefix = ""; namePrefix = "";
src = fetchurl { src = fetchurl {
url = "https://tahoe-lafs.org/downloads/tahoe-lafs-${version}.tar.bz2"; url = "https://tahoe-lafs.org/downloads/tahoe-lafs-${version}.tar.bz2";
sha256 = "0hrp87rarbmmpnrxk91s83h6irkykds3pl263dagcddbdl5inqdi"; sha256 = "0x9f1kjym1188fp6l5sqy0zz8mdb4xw861bni2ccv26q482ynbks";
}; };
patchPhase = '' patchPhase = ''
@ -36,7 +36,7 @@ pythonPackages.buildPythonApplication rec {
propagatedBuildInputs = with pythonPackages; [ propagatedBuildInputs = with pythonPackages; [
twisted foolscap nevow simplejson zfec pycryptopp darcsver twisted foolscap nevow simplejson zfec pycryptopp darcsver
setuptoolsTrial setuptoolsDarcs pycrypto pyasn1 zope_interface setuptoolsTrial setuptoolsDarcs pycrypto pyasn1 zope_interface
service-identity service-identity pyyaml
]; ];
postInstall = '' postInstall = ''

View File

@ -0,0 +1,34 @@
{ lib, pkgs, buildGoPackage, fetchFromGitHub, makeWrapper }:
let
libPath = lib.makeLibraryPath [ pkgs.systemd.lib ];
in buildGoPackage rec {
name = "journalbeat-${version}";
version = "5.1.2";
goPackagePath = "github.com/mheese/journalbeat";
buildInputs = [ makeWrapper pkgs.systemd ];
postInstall = ''
wrapProgram $bin/bin/journalbeat \
--prefix LD_LIBRARY_PATH : ${libPath}
'';
src = fetchFromGitHub {
owner = "mheese";
repo = "journalbeat";
rev = "v${version}";
sha256 = "179jayzvd5k4mwhn73yflbzl5md1fmv7a9hb8vz2ir76lvr33g3l";
};
meta = with lib; {
homepage = https://github.com/mheese/journalbeat;
description = "Journalbeat is a log shipper from systemd/journald to Logstash/Elasticsearch";
license = licenses.asl20;
maintainers = with maintainers; [ mbrgm ];
};
}

View File

@ -1,14 +1,14 @@
{ stdenv, fetchFromGitHub, autoreconfHook, zlib, pkgconfig, libuuid }: { stdenv, fetchFromGitHub, autoreconfHook, zlib, pkgconfig, libuuid }:
stdenv.mkDerivation rec{ stdenv.mkDerivation rec{
version = "1.4.0"; version = "1.5.0";
name = "netdata-${version}"; name = "netdata-${version}";
src = fetchFromGitHub { src = fetchFromGitHub {
rev = "v${version}"; rev = "v${version}";
owner = "firehol"; owner = "firehol";
repo = "netdata"; repo = "netdata";
sha256 = "1wknxci2baj6f7rl8z8j7haaz122jmbb74aw7i3xbj2y61cs58n8"; sha256 = "1nsv0s11ai1kvig9xr4cz2f2lalvilpbfjpd8fdfqk9fak690zhz";
}; };
buildInputs = [ autoreconfHook zlib pkgconfig libuuid ]; buildInputs = [ autoreconfHook zlib pkgconfig libuuid ];

View File

@ -4,13 +4,13 @@ stdenv.mkDerivation {
name = "tetex-3.0"; name = "tetex-3.0";
src = fetchurl { src = fetchurl {
url = ftp://cam.ctan.org/tex-archive/systems/unix/teTeX/current/distrib/tetex-src-3.0.tar.gz; url = http://mirrors.ctan.org/obsolete/systems/unix/teTeX/3.0/distrib/tetex-src-3.0.tar.gz;
md5 = "944a4641e79e61043fdaf8f38ecbb4b3"; sha256 = "16v44465ipd9yyqri9rgxp6rbgs194k4sh1kckvccvdsnnp7w3ww";
}; };
texmf = fetchurl { texmf = fetchurl {
url = ftp://cam.ctan.org/tex-archive/systems/unix/teTeX/current/distrib/tetex-texmf-3.0.tar.gz; url = http://mirrors.ctan.org/obsolete/systems/unix/teTeX/3.0/distrib/tetex-texmf-3.0.tar.gz;
md5 = "11aa15c8d3e28ee7815e0d5fcdf43fd4"; sha256 = "1hj06qvm02a2hx1a67igp45kxlbkczjlg20gr8lbp73l36k8yfvc";
}; };
buildInputs = [ flex bison zlib libpng ncurses ed ]; buildInputs = [ flex bison zlib libpng ncurses ed ];

View File

@ -526,6 +526,10 @@ in
kwm = callPackage ../os-specific/darwin/kwm { }; kwm = callPackage ../os-specific/darwin/kwm { };
khd = callPackage ../os-specific/darwin/khd {
inherit (darwin.apple_sdk.frameworks) Carbon Cocoa;
};
reattach-to-user-namespace = callPackage ../os-specific/darwin/reattach-to-user-namespace {}; reattach-to-user-namespace = callPackage ../os-specific/darwin/reattach-to-user-namespace {};
install_name_tool = callPackage ../os-specific/darwin/install_name_tool { }; install_name_tool = callPackage ../os-specific/darwin/install_name_tool { };
@ -2363,6 +2367,8 @@ in
gcc = gcc49; # doesn't build with gcc5 gcc = gcc49; # doesn't build with gcc5
}; };
journalbeat = callPackage ../tools/system/journalbeat { };
jp = callPackage ../development/tools/jp { }; jp = callPackage ../development/tools/jp { };
jp2a = callPackage ../applications/misc/jp2a { }; jp2a = callPackage ../applications/misc/jp2a { };
@ -11245,7 +11251,6 @@ in
kernelPatches = kernelPatches =
[ kernelPatches.bridge_stp_helper [ kernelPatches.bridge_stp_helper
kernelPatches.cpu-cgroup-v2."4.4" kernelPatches.cpu-cgroup-v2."4.4"
kernelPatches.p9_caching_4_4
] ]
++ lib.optionals ((platform.kernelArch or null) == "mips") ++ lib.optionals ((platform.kernelArch or null) == "mips")
[ kernelPatches.mips_fpureg_emu [ kernelPatches.mips_fpureg_emu
@ -11262,6 +11267,7 @@ in
# !!! 4.7 patch doesn't apply, 4.9 patch not up yet, will keep checking # !!! 4.7 patch doesn't apply, 4.9 patch not up yet, will keep checking
# kernelPatches.cpu-cgroup-v2."4.7" # kernelPatches.cpu-cgroup-v2."4.7"
kernelPatches.modinst_arg_list_too_long kernelPatches.modinst_arg_list_too_long
kernelPatches.p9_caching_4_9
] ]
++ lib.optionals ((platform.kernelArch or null) == "mips") ++ lib.optionals ((platform.kernelArch or null) == "mips")
[ kernelPatches.mips_fpureg_emu [ kernelPatches.mips_fpureg_emu
@ -11274,6 +11280,7 @@ in
kernelPatches = [ kernelPatches = [
kernelPatches.bridge_stp_helper kernelPatches.bridge_stp_helper
kernelPatches.modinst_arg_list_too_long kernelPatches.modinst_arg_list_too_long
kernelPatches.p9_caching_4_9
] ++ lib.optionals ((platform.kernelArch or null) == "mips") [ ] ++ lib.optionals ((platform.kernelArch or null) == "mips") [
kernelPatches.mips_fpureg_emu kernelPatches.mips_fpureg_emu
kernelPatches.mips_fpu_sigill kernelPatches.mips_fpu_sigill
@ -11674,6 +11681,8 @@ in
powerdns = callPackage ../servers/dns/powerdns { }; powerdns = callPackage ../servers/dns/powerdns { };
pdns-recursor = callPackage ../servers/dns/pdns-recursor { };
powertop = callPackage ../os-specific/linux/powertop { }; powertop = callPackage ../os-specific/linux/powertop { };
prayer = callPackage ../servers/prayer { }; prayer = callPackage ../servers/prayer { };
@ -18044,4 +18053,6 @@ in
simplenote = callPackage ../applications/misc/simplenote { }; simplenote = callPackage ../applications/misc/simplenote { };
hy = callPackage ../development/interpreters/hy {}; hy = callPackage ../development/interpreters/hy {};
ghc-standalone-archive = callPackage ../os-specific/darwin/ghc-standalone-archive { inherit (darwin) cctools; };
} }

View File

@ -20,6 +20,8 @@ let
ansiterminal = callPackage ../development/ocaml-modules/ansiterminal { }; ansiterminal = callPackage ../development/ocaml-modules/ansiterminal { };
apron = callPackage ../development/ocaml-modules/apron { };
asn1-combinators = callPackage ../development/ocaml-modules/asn1-combinators { }; asn1-combinators = callPackage ../development/ocaml-modules/asn1-combinators { };
astring = callPackage ../development/ocaml-modules/astring { }; astring = callPackage ../development/ocaml-modules/astring { };
@ -265,6 +267,8 @@ let
mlgmp = callPackage ../development/ocaml-modules/mlgmp { }; mlgmp = callPackage ../development/ocaml-modules/mlgmp { };
mlgmpidl = callPackage ../development/ocaml-modules/mlgmpidl { };
nocrypto = callPackage ../development/ocaml-modules/nocrypto { nocrypto = callPackage ../development/ocaml-modules/nocrypto {
lwt = ocaml_lwt; lwt = ocaml_lwt;
}; };

View File

@ -8599,17 +8599,16 @@ let self = _self // overrides; _self = with self; {
}; };
MooXTypesMooseLikeNumeric = buildPerlPackage rec { MooXTypesMooseLikeNumeric = buildPerlPackage rec {
name = "MooX-Types-MooseLike-Numeric-1.02"; name = "MooX-Types-MooseLike-Numeric-1.03";
src = fetchurl { src = fetchurl {
url = "mirror://cpan/authors/id/M/MA/MATEU/${name}.tar.gz"; url = "mirror://cpan/authors/id/M/MA/MATEU/${name}.tar.gz";
sha256 = "6186f75ab2747723fd979249ec6ee0c4550f5b47aa50c0d222cc7d3590182bb6"; sha256 = "16adeb617b963d010179922c2e4e8762df77c75232e17320b459868c4970c44b";
}; };
buildInputs = [ TestFatal ]; buildInputs = [ Moo TestFatal ];
propagatedBuildInputs = [ MooXTypesMooseLike ]; propagatedBuildInputs = [ MooXTypesMooseLike ];
meta = { meta = {
description = "Moo types for numbers"; description = "Moo types for numbers";
license = with stdenv.lib.licenses; [ artistic1 gpl1Plus ]; license = with stdenv.lib.licenses; [ artistic1 gpl1Plus ];
maintainers = [ maintainers.rycee ];
}; };
}; };
@ -9138,18 +9137,17 @@ let self = _self // overrides; _self = with self; {
}; };
MooseXTypesCommon = buildPerlPackage rec { MooseXTypesCommon = buildPerlPackage rec {
name = "MooseX-Types-Common-0.001013"; name = "MooseX-Types-Common-0.001014";
src = fetchurl { src = fetchurl {
url = "mirror://cpan/authors/id/E/ET/ETHER/${name}.tar.gz"; url = "mirror://cpan/authors/id/E/ET/ETHER/${name}.tar.gz";
sha256 = "ff0c963f5e8304acb5f64bdf9ba1f19284311148e1a8f0d1f81f123f9950f5f2"; sha256 = "ef93718b6d2f240d50b5c3acb1a74b4c2a191869651470001a82be1f35d0ef0f";
}; };
buildInputs = [ ModuleBuildTiny TestDeep TestWarnings perl ]; buildInputs = [ ModuleBuildTiny TestDeep TestWarnings perl ];
propagatedBuildInputs = [ MooseXTypes ]; propagatedBuildInputs = [ MooseXTypes self."if" ];
meta = { meta = {
homepage = https://github.com/moose/MooseX-Types-Common; homepage = https://github.com/moose/MooseX-Types-Common;
description = "A library of commonly used type constraints"; description = "A library of commonly used type constraints";
license = with stdenv.lib.licenses; [ artistic1 gpl1Plus ]; license = with stdenv.lib.licenses; [ artistic1 gpl1Plus ];
maintainers = with maintainers; [ rycee ];
}; };
}; };

View File

@ -11778,14 +11778,21 @@ in {
}); });
foolscap = buildPythonPackage (rec { foolscap = buildPythonPackage (rec {
name = "foolscap-0.10.1"; name = "foolscap-${version}";
version = "0.12.6";
src = pkgs.fetchurl { src = pkgs.fetchurl {
url = "http://foolscap.lothar.com/releases/${name}.tar.gz"; url = "mirror://pypi/f/foolscap/${name}.tar.gz";
sha256 = "1wrnbdq3y3lfxnhx30yj9xbr3iy9512jb60k8qi1da1phalnwz5x"; sha256 = "1bpmqq6485mmr5jza9q2c55l9m1bfsvsbd9drsip7p5qcsi22jrz";
}; };
propagatedBuildInputs = [ self.twisted self.pyopenssl self.service-identity ]; propagatedBuildInputs = with self; [ mock twisted pyopenssl service-identity ];
checkPhase = ''
# Either uncomment this, or remove this custom check phase entirely, if
# you wish to do battle with the foolscap tests. ~ C.
# trial foolscap
'';
meta = { meta = {
homepage = http://foolscap.lothar.com/; homepage = http://foolscap.lothar.com/;
@ -25264,9 +25271,11 @@ in {
''; '';
patchPhase = '' patchPhase = ''
substituteInPlace "scripts/syncthing-gtk" \
--replace "/usr/share" "$out/share"
substituteInPlace setup.py --replace "version = get_version()" "version = '${version}'" substituteInPlace setup.py --replace "version = get_version()" "version = '${version}'"
substituteInPlace scripts/syncthing-gtk --replace "/usr/share" "$out/share"
substituteInPlace syncthing_gtk/app.py --replace "/usr/share" "$out/share"
substituteInPlace syncthing_gtk/wizard.py --replace "/usr/share" "$out/share"
substituteInPlace syncthing-gtk.desktop --replace "/usr/bin/syncthing-gtk" "$out/bin/syncthing-gtk"
''; '';
meta = { meta = {
@ -26094,6 +26103,13 @@ in {
propagatedBuildInputs = with self; [ zope_interface ]; propagatedBuildInputs = with self; [ zope_interface ];
# Patch t.p._inotify to point to libc. Without this,
# twisted.python.runtime.platform.supportsINotify() == False
patchPhase = optionalString stdenv.isLinux ''
substituteInPlace twisted/python/_inotify.py --replace \
"ctypes.util.find_library('c')" "'${stdenv.glibc.out}/lib/libc.so.6'"
'';
# Generate Twisted's plug-in cache. Twisted users must do it as well. See # Generate Twisted's plug-in cache. Twisted users must do it as well. See
# http://twistedmatrix.com/documents/current/core/howto/plugin.html#auto3 # http://twistedmatrix.com/documents/current/core/howto/plugin.html#auto3
# and http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=477103 for # and http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=477103 for