Project import generated by Copybara.

GitOrigin-RevId: e4ef597edfd8a0ba5f12362932fc9b1dd01a0aef
This commit is contained in:
Default email 2021-10-11 18:52:03 +02:00
parent 2c9f1bfefe
commit 556d6f0562
167 changed files with 4349 additions and 2256 deletions

View file

@ -5144,6 +5144,12 @@
githubId = 117874;
name = "Jeroen de Haas";
};
jdreaver = {
email = "johndreaver@gmail.com";
github = "jdreaver";
githubId = 1253071;
name = "David Reaver";
};
jduan = {
name = "Jingjing Duan";
email = "duanjingjing@gmail.com";
@ -6488,6 +6494,12 @@
githubId = 791115;
name = "Linquize";
};
linsui = {
email = "linsui555@gmail.com";
github = "linsui";
githubId = 36977733;
name = "linsui";
};
linus = {
email = "linusarver@gmail.com";
github = "listx";

View file

@ -269,6 +269,14 @@
<link linkend="opt-services.postfixadmin.enable">postfixadmin</link>.
</para>
</listitem>
<listitem>
<para>
<link xlink:href="https://wiki.servarr.com/prowlarr">prowlarr</link>,
an indexer manager/proxy built on the popular arr .net/reactjs
base stack
<link linkend="opt-services.prowlarr.enable">services.prowlarr</link>.
</para>
</listitem>
<listitem>
<para>
<link xlink:href="https://sr.ht/~emersion/soju">soju</link>, a

View file

@ -6,7 +6,7 @@
# into DocBook files in the from_md folder.
DIR="$( cd "$( dirname "${BASH_SOURCE[0]}" )" >/dev/null 2>&1 && pwd )"
pushd $DIR
pushd "$DIR"
# NOTE: Keep in sync with Nixpkgs manual (/doc/Makefile).
# TODO: Remove raw-attribute when we can get rid of DocBook altogether.
@ -29,7 +29,7 @@ mapfile -t MD_FILES < <(find . -type f -regex '.*\.md$')
for mf in ${MD_FILES[*]}; do
if [ "${mf: -11}" == ".section.md" ]; then
mkdir -p $(dirname "$OUT/$mf")
mkdir -p "$(dirname "$OUT/$mf")"
OUTFILE="$OUT/${mf%".section.md"}.section.xml"
pandoc "$mf" "${pandoc_flags[@]}" \
-o "$OUTFILE"
@ -37,7 +37,7 @@ for mf in ${MD_FILES[*]}; do
fi
if [ "${mf: -11}" == ".chapter.md" ]; then
mkdir -p $(dirname "$OUT/$mf")
mkdir -p "$(dirname "$OUT/$mf")"
OUTFILE="$OUT/${mf%".chapter.md"}.chapter.xml"
pandoc "$mf" "${pandoc_flags[@]}" \
--top-level-division=chapter \

View file

@ -82,6 +82,8 @@ In addition to numerous new and upgraded packages, this release has the followin
- [postfixadmin](https://postfixadmin.sourceforge.io/), a web based virtual user administration interface for Postfix mail servers. Available as [postfixadmin](#opt-services.postfixadmin.enable).
- [prowlarr](https://wiki.servarr.com/prowlarr), an indexer manager/proxy built on the popular arr .net/reactjs base stack [services.prowlarr](#opt-services.prowlarr.enable).
- [soju](https://sr.ht/~emersion/soju), a user-friendly IRC bouncer. Available as [services.soju](options.html#opt-services.soju.enable).
- [nats](https://nats.io/), a high performance cloud and edge messaging system. Available as [services.nats](#opt-services.nats.enable).

View file

@ -144,7 +144,7 @@ in
dictd = 105;
couchdb = 106;
#searx = 107; # dynamically allocated as of 2020-10-27
kippo = 108;
#kippo = 108; # removed 2021-10-07, the kippo package was removed in 1b213f321cdbfcf868b96fd9959c24207ce1b66a during 2021-04
jenkins = 109;
systemd-journal-gateway = 110;
#notbit = 111; # unused
@ -462,7 +462,7 @@ in
dictd = 105;
couchdb = 106;
#searx = 107; # dynamically allocated as of 2020-10-27
kippo = 108;
#kippo = 108; # removed 2021-10-07, the kippo package was removed in 1b213f321cdbfcf868b96fd9959c24207ce1b66a during 2021-04
jenkins = 109;
systemd-journal-gateway = 110;
#notbit = 111; # unused

View file

@ -571,6 +571,7 @@
./services/misc/plex.nix
./services/misc/plikd.nix
./services/misc/podgrab.nix
./services/misc/prowlarr.nix
./services/misc/tautulli.nix
./services/misc/pinnwand.nix
./services/misc/pykms.nix
@ -759,7 +760,6 @@
./services/networking/kea.nix
./services/networking/keepalived/default.nix
./services/networking/keybase.nix
./services/networking/kippo.nix
./services/networking/knot.nix
./services/networking/kresd.nix
./services/networking/lambdabot.nix

View file

@ -31,15 +31,39 @@ in
section of git-config(1) for more information.
'';
};
lfs = {
enable = mkEnableOption "git-lfs";
package = mkOption {
type = types.package;
default = pkgs.git-lfs;
defaultText = literalExpression "pkgs.git-lfs";
description = "The git-lfs package to use";
};
};
};
};
config = mkIf cfg.enable {
environment.systemPackages = [ cfg.package ];
environment.etc.gitconfig = mkIf (cfg.config != {}) {
text = generators.toGitINI cfg.config;
};
};
config = mkMerge [
(mkIf cfg.enable {
environment.systemPackages = [ cfg.package ];
environment.etc.gitconfig = mkIf (cfg.config != {}) {
text = generators.toGitINI cfg.config;
};
})
(mkIf (cfg.enable && cfg.lfs.enable) {
environment.systemPackages = [ cfg.lfs.package ];
programs.git.config = {
filter.lfs = {
clean = "git-lfs clean -- %f";
smudge = "git-lfs smudge -- %f";
process = "git-lfs filter-process";
required = true;
};
};
})
];
meta.maintainers = with maintainers; [ figsoda ];
}

View file

@ -79,6 +79,9 @@ with lib;
The hidepid module was removed, since the underlying machinery
is broken when using cgroups-v2.
'')
(mkRemovedOptionModule ["services" "wakeonlan"] "This module was removed in favor of enabling it with networking.interfaces.<name>.wakeOnLan")
(mkRemovedOptionModule [ "services" "kippo" ] "The corresponding package was removed from nixpkgs.")
# Do NOT add any option renames here, see top of the file
];

View file

@ -0,0 +1,41 @@
{ config, pkgs, lib, ... }:
with lib;
let
cfg = config.services.prowlarr;
in
{
options = {
services.prowlarr = {
enable = mkEnableOption "Prowlarr";
openFirewall = mkOption {
type = types.bool;
default = false;
description = "Open ports in the firewall for the Prowlarr web interface.";
};
};
};
config = mkIf cfg.enable {
systemd.services.prowlarr = {
description = "Prowlarr";
after = [ "network.target" ];
wantedBy = [ "multi-user.target" ];
serviceConfig = {
Type = "simple";
DynamicUser = true;
StateDirectory = "prowlarr";
ExecStart = "${pkgs.prowlarr}/bin/Prowlarr -nobrowser -data=/var/lib/prowlarr";
Restart = "on-failure";
};
};
networking.firewall = mkIf cfg.openFirewall {
allowedTCPPorts = [ 9696 ];
};
};
}

View file

@ -1,117 +0,0 @@
# NixOS module for kippo honeypot ssh server
# See all the options for configuration details.
#
# Default port is 2222. Recommend using something like this for port redirection to default SSH port:
# networking.firewall.extraCommands = ''
# iptables -t nat -A PREROUTING -i IN_IFACE -p tcp --dport 22 -j REDIRECT --to-port 2222'';
#
# Lastly: use this service at your own risk. I am working on a way to run this inside a VM.
{ config, lib, pkgs, ... }:
with lib;
let
cfg = config.services.kippo;
in
{
options = {
services.kippo = {
enable = mkOption {
default = false;
type = types.bool;
description = "Enable the kippo honeypot ssh server.";
};
port = mkOption {
default = 2222;
type = types.int;
description = "TCP port number for kippo to bind to.";
};
hostname = mkOption {
default = "nas3";
type = types.str;
description = "Hostname for kippo to present to SSH login";
};
varPath = mkOption {
default = "/var/lib/kippo";
type = types.path;
description = "Path of read/write files needed for operation and configuration.";
};
logPath = mkOption {
default = "/var/log/kippo";
type = types.path;
description = "Path of log files needed for operation and configuration.";
};
pidPath = mkOption {
default = "/run/kippo";
type = types.path;
description = "Path of pid files needed for operation.";
};
extraConfig = mkOption {
default = "";
type = types.lines;
description = "Extra verbatim configuration added to the end of kippo.cfg.";
};
};
};
config = mkIf cfg.enable {
environment.systemPackages = with pkgs.pythonPackages; [
python pkgs.kippo.twisted pycrypto pyasn1 ];
environment.etc."kippo.cfg".text = ''
# Automatically generated by NixOS.
# See ${pkgs.kippo}/src/kippo.cfg for details.
[honeypot]
log_path = ${cfg.logPath}
download_path = ${cfg.logPath}/dl
filesystem_file = ${cfg.varPath}/honeyfs
filesystem_file = ${cfg.varPath}/fs.pickle
data_path = ${cfg.varPath}/data
txtcmds_path = ${cfg.varPath}/txtcmds
public_key = ${cfg.varPath}/keys/public.key
private_key = ${cfg.varPath}/keys/private.key
ssh_port = ${toString cfg.port}
hostname = ${cfg.hostname}
${cfg.extraConfig}
'';
users.users.kippo = {
description = "kippo web server privilege separation user";
uid = 108; # why does config.ids.uids.kippo give an error?
};
users.groups.kippo.gid = 108;
systemd.services.kippo = with pkgs; {
description = "Kippo Web Server";
after = [ "network.target" ];
wantedBy = [ "multi-user.target" ];
environment.PYTHONPATH = "${pkgs.kippo}/src/:${pkgs.pythonPackages.pycrypto}/lib/python2.7/site-packages/:${pkgs.pythonPackages.pyasn1}/lib/python2.7/site-packages/:${pkgs.pythonPackages.python}/lib/python2.7/site-packages/:${pkgs.kippo.twisted}/lib/python2.7/site-packages/:.";
preStart = ''
if [ ! -d ${cfg.varPath}/ ] ; then
mkdir -p ${cfg.logPath}/tty
mkdir -p ${cfg.logPath}/dl
mkdir -p ${cfg.varPath}/keys
cp ${pkgs.kippo}/src/honeyfs ${cfg.varPath} -r
cp ${pkgs.kippo}/src/fs.pickle ${cfg.varPath}/fs.pickle
cp ${pkgs.kippo}/src/data ${cfg.varPath} -r
cp ${pkgs.kippo}/src/txtcmds ${cfg.varPath} -r
chmod u+rw ${cfg.varPath} -R
chown kippo.kippo ${cfg.varPath} -R
chown kippo.kippo ${cfg.logPath} -R
chmod u+rw ${cfg.logPath} -R
fi
if [ ! -d ${cfg.pidPath}/ ] ; then
mkdir -p ${cfg.pidPath}
chmod u+rw ${cfg.pidPath}
chown kippo.kippo ${cfg.pidPath}
fi
'';
serviceConfig.ExecStart = "${pkgs.kippo.twisted}/bin/twistd -y ${pkgs.kippo}/src/kippo.tac --syslog --rundir=${cfg.varPath}/ --pidfile=${cfg.pidPath}/kippo.pid --prefix=kippo -n";
serviceConfig.PermissionsStartOnly = true;
serviceConfig.User = "kippo";
serviceConfig.Group = "kippo";
};
};
}

View file

@ -51,6 +51,12 @@ let
in {
imports = [
(mkRemovedOptionModule [ "services" "nextcloud" "config" "adminpass" ] ''
Please use `services.nextcloud.config.adminpassFile' instead!
'')
(mkRemovedOptionModule [ "services" "nextcloud" "config" "dbpass" ] ''
Please use `services.nextcloud.config.dbpassFile' instead!
'')
(mkRemovedOptionModule [ "services" "nextcloud" "nginx" "enable" ] ''
The nextcloud module supports `nginx` as reverse-proxy by default and doesn't
support other reverse-proxies officially.
@ -206,14 +212,6 @@ in {
default = "nextcloud";
description = "Database user.";
};
dbpass = mkOption {
type = types.nullOr types.str;
default = null;
description = ''
Database password. Use <literal>dbpassFile</literal> to avoid this
being world-readable in the <literal>/nix/store</literal>.
'';
};
dbpassFile = mkOption {
type = types.nullOr types.str;
default = null;
@ -246,17 +244,8 @@ in {
default = "root";
description = "Admin username.";
};
adminpass = mkOption {
type = types.nullOr types.str;
default = null;
description = ''
Admin password. Use <literal>adminpassFile</literal> to avoid this
being world-readable in the <literal>/nix/store</literal>.
'';
};
adminpassFile = mkOption {
type = types.nullOr types.str;
default = null;
type = types.str;
description = ''
The full path to a file that contains the admin's password. Must be
readable by user <literal>nextcloud</literal>.
@ -321,8 +310,8 @@ in {
This mounts a bucket on an Amazon S3 object storage or compatible
implementation into the virtual filesystem.
See nextcloud's documentation on "Object Storage as Primary
Storage" for more details.
Further details about this feature can be found in the
<link xlink:href="https://docs.nextcloud.com/server/22/admin_manual/configuration_files/primary_storage.html">upstream documentation</link>.
'';
bucket = mkOption {
type = types.str;
@ -389,9 +378,9 @@ in {
Required for some non-Amazon S3 implementations.
Ordinarily, requests will be made with
http://bucket.hostname.domain/, but with path style
<literal>http://bucket.hostname.domain/</literal>, but with path style
enabled requests are made with
http://hostname.domain/bucket instead.
<literal>http://hostname.domain/bucket</literal> instead.
'';
};
};
@ -399,11 +388,11 @@ in {
};
enableImagemagick = mkEnableOption ''
Whether to load the ImageMagick module into PHP.
the ImageMagick module for PHP.
This is used by the theming app and for generating previews of certain images (e.g. SVG and HEIF).
You may want to disable it for increased security. In that case, previews will still be available
for some images (e.g. JPEG and PNG).
See https://github.com/nextcloud/server/issues/13099
See <link xlink:href="https://github.com/nextcloud/server/issues/13099" />.
'' // {
default = true;
};
@ -464,13 +453,6 @@ in {
config = mkIf cfg.enable (mkMerge [
{ assertions = let acfg = cfg.config; in [
{ assertion = !(acfg.dbpass != null && acfg.dbpassFile != null);
message = "Please specify no more than one of dbpass or dbpassFile";
}
{ assertion = ((acfg.adminpass != null || acfg.adminpassFile != null)
&& !(acfg.adminpass != null && acfg.adminpassFile != null));
message = "Please specify exactly one of adminpass or adminpassFile";
}
{ assertion = versionOlder cfg.package.version "21" -> cfg.config.defaultPhoneRegion == null;
message = "The `defaultPhoneRegion'-setting is only supported for Nextcloud >=21!";
}
@ -613,7 +595,6 @@ in {
${optionalString (c.dbport != null) "'dbport' => '${toString c.dbport}',"}
${optionalString (c.dbuser != null) "'dbuser' => '${c.dbuser}',"}
${optionalString (c.dbtableprefix != null) "'dbtableprefix' => '${toString c.dbtableprefix}',"}
${optionalString (c.dbpass != null) "'dbpassword' => '${c.dbpass}',"}
${optionalString (c.dbpassFile != null) "'dbpassword' => nix_read_secret('${c.dbpassFile}'),"}
'dbtype' => '${c.dbtype}',
'trusted_domains' => ${writePhpArrary ([ cfg.hostName ] ++ c.extraTrustedDomains)},
@ -623,14 +604,17 @@ in {
];
'';
occInstallCmd = let
dbpass = if c.dbpassFile != null
then ''"$(<"${toString c.dbpassFile}")"''
else if c.dbpass != null
then ''"${toString c.dbpass}"''
else ''""'';
adminpass = if c.adminpassFile != null
then ''"$(<"${toString c.adminpassFile}")"''
else ''"${toString c.adminpass}"'';
mkExport = { arg, value }: "export ${arg}=${value}";
dbpass = {
arg = "DBPASS";
value = if c.dbpassFile != null
then ''"$(<"${toString c.dbpassFile}")"''
else ''""'';
};
adminpass = {
arg = "ADMINPASS";
value = ''"$(<"${toString c.adminpassFile}")"'';
};
installFlags = concatStringsSep " \\\n "
(mapAttrsToList (k: v: "${k} ${toString v}") {
"--database" = ''"${c.dbtype}"'';
@ -641,12 +625,14 @@ in {
${if c.dbhost != null then "--database-host" else null} = ''"${c.dbhost}"'';
${if c.dbport != null then "--database-port" else null} = ''"${toString c.dbport}"'';
${if c.dbuser != null then "--database-user" else null} = ''"${c.dbuser}"'';
"--database-pass" = dbpass;
"--database-pass" = "\$${dbpass.arg}";
"--admin-user" = ''"${c.adminuser}"'';
"--admin-pass" = adminpass;
"--admin-pass" = "\$${adminpass.arg}";
"--data-dir" = ''"${cfg.home}/data"'';
});
in ''
${mkExport dbpass}
${mkExport adminpass}
${occ}/bin/nextcloud-occ maintenance:install \
${installFlags}
'';
@ -673,16 +659,14 @@ in {
exit 1
fi
''}
${optionalString (c.adminpassFile != null) ''
if [ ! -r "${c.adminpassFile}" ]; then
echo "adminpassFile ${c.adminpassFile} is not readable by nextcloud:nextcloud! Aborting..."
exit 1
fi
if [ -z "$(<${c.adminpassFile})" ]; then
echo "adminpassFile ${c.adminpassFile} is empty!"
exit 1
fi
''}
if [ ! -r "${c.adminpassFile}" ]; then
echo "adminpassFile ${c.adminpassFile} is not readable by nextcloud:nextcloud! Aborting..."
exit 1
fi
if [ -z "$(<${c.adminpassFile})" ]; then
echo "adminpassFile ${c.adminpassFile} is empty!"
exit 1
fi
ln -sf ${cfg.package}/apps ${cfg.home}/

View file

@ -375,6 +375,7 @@ in
prosody = handleTest ./xmpp/prosody.nix {};
prosodyMysql = handleTest ./xmpp/prosody-mysql.nix {};
proxy = handleTest ./proxy.nix {};
prowlarr = handleTest ./prowlarr.nix {};
pt2-clone = handleTest ./pt2-clone.nix {};
qboot = handleTestOn ["x86_64-linux" "i686-linux"] ./qboot.nix {};
quorum = handleTest ./quorum.nix {};

View file

@ -38,7 +38,7 @@ in {
hostName = "nextcloud";
config = {
# Don't inherit adminuser since "root" is supposed to be the default
inherit adminpass;
adminpassFile = "${pkgs.writeText "adminpass" adminpass}"; # Don't try this at home!
dbtableprefix = "nixos_";
};
package = pkgs.${"nextcloud" + (toString nextcloudVersion)};

View file

@ -32,9 +32,9 @@ in {
dbuser = "nextcloud";
dbhost = "127.0.0.1";
dbport = 3306;
dbpass = "hunter2";
dbpassFile = "${pkgs.writeText "dbpass" "hunter2" }";
# Don't inherit adminuser since "root" is supposed to be the default
inherit adminpass;
adminpassFile = "${pkgs.writeText "adminpass" adminpass}"; # Don't try this at home!
};
};

View file

@ -0,0 +1,18 @@
import ./make-test-python.nix ({ lib, ... }:
with lib;
{
name = "prowlarr";
meta.maintainers = with maintainers; [ jdreaver ];
nodes.machine =
{ pkgs, ... }:
{ services.prowlarr.enable = true; };
testScript = ''
machine.wait_for_unit("prowlarr.service")
machine.wait_for_open_port("9696")
machine.succeed("curl --fail http://localhost:9696/")
'';
})

View file

@ -24,7 +24,7 @@
, lrdf
, lv2
, pkg-config
, python2
, python3
, sassc
, serd
, sord
@ -63,7 +63,7 @@ stdenv.mkDerivation rec {
hicolor-icon-theme
intltool
pkg-config
python2
python3
wafHook
wrapGAppsHook
];

View file

@ -1,29 +1,56 @@
{ lib, python3Packages, mopidy }:
{ lib
, fetchFromGitHub
, python3
, mopidy
}:
python3Packages.buildPythonApplication rec {
python3.pkgs.buildPythonApplication rec {
pname = "mopidy-youtube";
version = "3.4";
src = python3Packages.fetchPypi {
inherit version;
pname = "Mopidy-YouTube";
sha256 = "sha256-996MNByMcKq1woDGK6jsmAHS9TOoBrwSGgPmcShvTRw=";
disabled = python3.pythonOlder "3.7";
src = fetchFromGitHub {
owner = "natumbri";
repo = pname;
rev = "v${version}";
sha256 = "0lm6nn926qkrwzvj64yracdixfrnv5zk243msjskrnlzkhgk01rk";
};
postPatch = "sed s/bs4/beautifulsoup4/ -i setup.cfg";
propagatedBuildInputs = with python3Packages; [
propagatedBuildInputs = with python3.pkgs; [
beautifulsoup4
cachetools
pykka
requests
youtube-dl
ytmusicapi
] ++ [ mopidy ];
] ++ [
mopidy
];
doCheck = false;
checkInputs = with python3.pkgs; [
vcrpy
pytestCheckHook
];
disabledTests = [
# Test requires a YouTube API key
"test_get_default_config"
];
disabledTestPaths = [
# Fails with an import error
"tests/test_backend.py"
];
pythonImportsCheck = [
"mopidy_youtube"
];
meta = with lib; {
description = "Mopidy extension for playing music from YouTube";
homepage = "https://github.com/natumbri/mopidy-youtube";
license = licenses.asl20;
maintainers = [ maintainers.spwhitt ];
maintainers = with maintainers; [ spwhitt ];
};
}

View file

@ -15,13 +15,13 @@ in
stdenv.mkDerivation rec {
pname = "btcpayserver";
version = "1.2.3";
version = "1.2.4";
src = fetchFromGitHub {
owner = pname;
repo = pname;
rev = "v${version}";
sha256 = "sha256-6ktlnbYb+pOXwl52QmnqDsPlXaiF1ghjQg1yfznulqo=";
sha256 = "sha256-vjNJ08twsJ036TTFF6srOGshDpP7ZwWCGN0XjrtFT/g=";
};
nativeBuildInputs = [ dotnetSdk dotnetPackages.Nuget makeWrapper ];

View file

@ -7,13 +7,13 @@
with lib;
stdenv.mkDerivation rec {
name = "dogecoin" + (toString (optional (!withGui) "d")) + "-" + version;
version = "1.14.3";
version = "1.14.4";
src = fetchFromGitHub {
owner = "dogecoin";
repo = "dogecoin";
rev = "v${version}";
sha256 = "sha256-kozUnIislQDtgjeesYHKu4sB1j9juqaWvyax+Lb/0pc=";
sha256 = "sha256-uITX5DSyC/m0ynwCkkbGgUj8kMuNgnsNo8H8RQSGPEA=";
};
nativeBuildInputs = [ pkg-config autoreconfHook ];

View file

@ -15,13 +15,13 @@ in
stdenv.mkDerivation rec {
pname = "nbxplorer";
version = "2.2.5";
version = "2.2.11";
src = fetchFromGitHub {
owner = "dgarage";
repo = "NBXplorer";
rev = "v${version}";
sha256 = "sha256-EWT/1fQpqEyKBEDHvmguHV/8s30DxweYswy0QvMDzcQ=";
sha256 = "sha256-ZDqzkANGMdvv3e5gWCYcacUYKLJRquXRHLr8RAzT9hY=";
};
nativeBuildInputs = [ dotnetSdk dotnetPackages.Nuget makeWrapper ];

View file

@ -1,8 +1,8 @@
{ fetchNuGet }: [
(fetchNuGet {
name = "DBTrie";
version = "1.0.38";
sha256 = "09n9f2j0pha2np9cpbgjfs19jwvfmrglws89izarq71gl8jia6d9";
version = "1.0.39";
sha256 = "0kbvl3kf73hrh1w2n3d2wshlxpqsv1pwydhwv2wxigmvs70fn1xp";
})
(fetchNuGet {
name = "Microsoft.AspNetCore.JsonPatch";
@ -181,23 +181,18 @@
})
(fetchNuGet {
name = "NBitcoin.Altcoins";
version = "3.0.4";
sha256 = "03aia31sznw81jjr9k6dkwgvm9dc38fgp1z8y5i45vlkf5fp89pb";
version = "3.0.7";
sha256 = "0nrkdbsc4k9fd4588axnkfa9gmif9b59wxw8fnmpg0nf4x8scm4n";
})
(fetchNuGet {
name = "NBitcoin.TestFramework";
version = "3.0.3";
sha256 = "1j3ajj4jrwqzlhzhkg7vicwab0aq2y50x53rindd8cq09jxvzk62";
version = "3.0.5";
sha256 = "09cgjzbkxvsi65qzns0ignp0x89z630vqacsgwj3b1h30dycwqdr";
})
(fetchNuGet {
name = "NBitcoin";
version = "6.0.6";
sha256 = "1kf2rjrnh97zlh00affsv95f94bwgr2h7b00njqac4qgv9cac7sa";
})
(fetchNuGet {
name = "NBitcoin";
version = "6.0.8";
sha256 = "1f90zyrd35fzx0vgvd83jhd6hczd4037h2k198xiyxj04l4m3wm5";
version = "6.0.10";
sha256 = "00m0j74pqyjqal1wc28j6734rfd9zd7ajqb1p3fsdpqr16kfg56s";
})
(fetchNuGet {
name = "NETStandard.Library";

View file

@ -12,13 +12,13 @@
stdenv.mkDerivation rec {
pname = "geany";
version = "1.37.1";
version = "1.38";
outputs = [ "out" "dev" "doc" "man" ];
src = fetchurl {
url = "https://download.geany.org/${pname}-${version}.tar.bz2";
sha256 = "060sachn33xpx3a609f09y97qq5ky17gvv686zbvrn618ij7bi8q";
sha256 = "abff176e4d48bea35ee53037c49c82f90b6d4c23e69aed6e4a5ca8ccd3aad546";
};
nativeBuildInputs = [

View file

@ -22,16 +22,16 @@
}:
rustPlatform.buildRustPackage rec {
pname = "neovide";
version = "unstable-2021-08-08";
version = "unstable-2021-10-09";
src = fetchFromGitHub {
owner = "Kethku";
repo = "neovide";
rev = "725f12cafd4a26babd0d6bbcbca9a99c181991ac";
sha256 = "sha256-ThMobWKe3wHhR15TmmKrI6Gp1wvGVfJ52MzibK0ubkc=";
rev = "7f76ad4764197ba75bb9263d25b265d801563ccf";
sha256 = "sha256-kcP0WSk3quTaWCGQYN4zYlDQ9jhx/Vu6AamSLGFszwQ=";
};
cargoSha256 = "sha256-5lOGncnyA8DwetY5bU6k2KXNClFgp+xIBEeA0/iwGF0=";
cargoSha256 = "sha256-TQEhz9FtvIb/6Qtyz018dPle0+nub1oMZMFtKAqYcoI=";
SKIA_SOURCE_DIR =
let

View file

@ -2,11 +2,11 @@
stdenv.mkDerivation rec {
pname = "fetchmail";
version = "6.4.21";
version = "6.4.22";
src = fetchurl {
url = "mirror://sourceforge/fetchmail/fetchmail-${version}.tar.xz";
sha256 = "sha256-akWcHK/XodqlzRNxQNpgwYyEtWmc2OckmnnDM0LJnR0=";
sha256 = "sha256-zGgYvVlDVgIWn6KS1tFj1Wshx/UxEoKUcKOs6r5hLIQ=";
};
buildInputs = [ openssl ];

View file

@ -31,22 +31,22 @@
}
},
"dev": {
"version": "96.0.4655.0",
"sha256": "00gax7xqi1n4jiqwpff43c43mpqb5jakckwdfbgwhrp6h35xxdv1",
"sha256bin64": "1xyyz6p4qllzyd6wbdbhs6kp062dz40i03wrlsggb919bgp7ivnw",
"version": "96.0.4662.6",
"sha256": "14vr0nlp195h0hwfsd43fifl9r3qr875fw2da3gi9l5yi0pxns2q",
"sha256bin64": "1lq114rsgxqrdh18f2x3i0iwdn5ijxw3jb6nrxjxx0c3bvlzhsw8",
"deps": {
"gn": {
"version": "2021-09-13",
"version": "2021-09-24",
"url": "https://gn.googlesource.com/gn",
"rev": "de86ec4176235871a7cb335756987e41246dae4a",
"sha256": "0mlnsqcj06azz5cpwlafi5gg6pvf2s6x9qq02zl1sm2h288y152g"
"rev": "0153d369bbccc908f4da4993b1ba82728055926a",
"sha256": "0y4414h8jqsbz5af6pn91c0vkfp4s281s85g992xfyl785c5zbsi"
}
}
},
"ungoogled-chromium": {
"version": "94.0.4606.71",
"sha256": "0nywwcdjda1b1swfslks8i28qq6jx9gyw50bhl8c2plcc0pbmfya",
"sha256bin64": "1ffa9hqs7ibch0by574l01lwhi5a1mhcyy1qrlr81ssq4pyygrq4",
"version": "94.0.4606.81",
"sha256": "16755mfqxxmvslm9ix060safrnml91ckj5p85960jj5g5hmslwbh",
"sha256bin64": "1d3z5np6b6jax7afak7f0yh76kmmdggdjlrzwyhy8hgrv7c7rsdz",
"deps": {
"gn": {
"version": "2021-08-11",
@ -55,8 +55,8 @@
"sha256": "031znmkbm504iim5jvg3gmazj4qnkfc7zg8aymjsij18fhf7piz0"
},
"ungoogled-patches": {
"rev": "94.0.4606.71-1",
"sha256": "12p39ay8lmdni6gnmw3w67pg4w3nrphhgn6bmz3cr6cy7nx4kiv2"
"rev": "94.0.4606.81-1",
"sha256": "113abybh8kkw9a92lj6jww6dl6rc1sv5x7a7a1gjwsihzd2r0cik"
}
}
}

View file

@ -2,13 +2,13 @@
buildGoModule rec {
pname = "cloudflared";
version = "2021.9.1";
version = "2021.9.2";
src = fetchFromGitHub {
owner = "cloudflare";
repo = "cloudflared";
rev = version;
sha256 = "sha256-VekJq7d80hD8AybkpLq4+9yeeBkeLATr2iG5OFU/TFs=";
sha256 = "sha256-UAx3DY8d3I1g7DuNmBu4w+3NGUQqDdcScXdtq/VkpJ8=";
};
vendorSha256 = null;

View file

@ -2,25 +2,23 @@
buildGoModule rec {
pname = "cloudfoundry-cli";
version = "7.3.0";
version = "8.0.0";
src = fetchFromGitHub {
owner = "cloudfoundry";
repo = "cli";
rev = "v${version}";
sha256 = "sha256-I+4tFAMmmsmi5WH9WKXIja1vVWsPHNGkWbvjWGUCmkU=";
sha256 = "00cwnfylra0msbb423ad21if98s6smzccsyidqsl4r2mrlkhahwm";
};
# vendor directory stale
deleteVendor = true;
vendorSha256 = null;
vendorSha256 = "0fcgyyd11xfhn8i11bqnaw3h51bj1y8s37b4d8wzv31dr8zswqsc";
subPackages = [ "." ];
# upstream have helpfully moved the bash completion script to a separate
# repo which receives no releases or even tags
bashCompletionScript = fetchurl {
url = "https://raw.githubusercontent.com/cloudfoundry/cli-ci/6087781a0e195465a35c79c8e968ae708c6f6351/ci/installers/completion/cf7";
sha256 = "1vhg9jcgaxcvvb4pqnhkf27b3qivs4d3w232j0gbh9393m3qxrvy";
url = "https://raw.githubusercontent.com/cloudfoundry/cli-ci/5f4f0d5d01e89c6333673f0fa96056749e71b3cd/ci/installers/completion/cf8";
sha256 = "06w26kpnjd3f2wdjhb4pp0kaq2gb9kf87v7pjd9n2g7s7qhdqyhy";
};
nativeBuildInputs = [ installShellFiles ];

View file

@ -768,11 +768,13 @@
"version": "0.1.1"
},
"openstack": {
"owner": "terraform-providers",
"owner": "terraform-provider-openstack",
"provider-source-address": "registry.terraform.io/terraform-provider-openstack/openstack",
"repo": "terraform-provider-openstack",
"rev": "v1.28.0",
"sha256": "1g2nxv312ddvkgpph17m9sh4zmy5ddj8gqwnfb3frbfbbamrgar6",
"version": "1.28.0"
"rev": "v1.43.1",
"sha256": "0n6r88p3a6p8p0gjys2r1kcgkwq450jmyd741g45lxmaf3jz2ynb",
"vendorSha256": "0k4srszs8xgf8gz4fa7ysqyww52d7kvqy6zf22f1gkcjyiks9pl7",
"version": "1.43.1"
},
"opentelekomcloud": {
"owner": "terraform-providers",

View file

@ -44,11 +44,11 @@ in
stdenv.mkDerivation rec {
pname = "bluejeans";
version = "2.23.0.39";
version = "2.24.0.89";
src = fetchurl {
url = "https://swdl.bluejeans.com/desktop-app/linux/${getFirst 3 version}/BlueJeans_${version}.rpm";
sha256 = "sha256-LGg14KJ/hEnSaSrdTltY9YXv7Nekkfo66uLkxjMx8AI=";
sha256 = "sha256-rneX8ys/oKfVLavAZk5RJouOZkVsp+9BIAReSeYiKJc=";
};
nativeBuildInputs = [ rpmextract makeWrapper ];

View file

@ -61,7 +61,7 @@ let
in
mkDerivation rec {
pname = "telegram-desktop";
version = "3.1.8";
version = "3.1.9";
# Note: Update via pkgs/applications/networking/instant-messengers/telegram/tdesktop/update.py
# Telegram-Desktop with submodules
@ -70,7 +70,7 @@ mkDerivation rec {
repo = "tdesktop";
rev = "v${version}";
fetchSubmodules = true;
sha256 = "129x733a5h6d5xdf3zdz5j5lz8mv6gas5jcnyhwzyk79df138whq";
sha256 = "1nmakl9jxmw3k8gka56cyywbjwv06a5983dy6h9jhkkq950fn33s";
};
postPatch = ''

View file

@ -2,13 +2,13 @@
stdenv.mkDerivation rec {
pname = "hackrf";
version = "2018.01.1";
version = "2021.03.1";
src = fetchFromGitHub {
owner = "mossmann";
owner = "greatscottgadgets";
repo = "hackrf";
rev = "v${version}";
sha256 = "0idh983xh6gndk9kdgx5nzz76x3mxb42b02c5xvdqahadsfx3b9w";
sha256 = "sha256-2kEfTco95I9YLz/18nfjJSd7U/HE5sBCEioWL2t804k=";
};
nativeBuildInputs = [
@ -27,6 +27,11 @@ stdenv.mkDerivation rec {
cd host
'';
postPatch = ''
substituteInPlace host/cmake/modules/FindFFTW.cmake \
--replace "find_library (FFTW_LIBRARIES NAMES fftw3)" "find_library (FFTW_LIBRARIES NAMES fftw3f)"
'';
meta = with lib; {
description = "An open source SDR platform";
homepage = "https://greatscottgadgets.com/hackrf/";

View file

@ -1,4 +1,5 @@
{ stdenv, lib, runCommand, patchelf, makeWrapper, pkg-config, curl
, fetchpatch
, openssl, gmp, zlib, fetchFromGitHub, rustPlatform, libiconv }:
let
@ -7,16 +8,16 @@ in
rustPlatform.buildRustPackage rec {
pname = "elan";
version = "1.0.7";
version = "1.1.0";
src = fetchFromGitHub {
owner = "leanprover";
repo = "elan";
rev = "v${version}";
sha256 = "sha256-SFY9RbUHoaOXCaK+uIqhnKbzSkbtWiS6os/JvsggagI=";
sha256 = "0xmml81krr0i18b14dymfdq43szpzws7qj8k404qab51lkqxyxsb";
};
cargoSha256 = "sha256-6TFionZw76V4htYQrz8eLX7ioW7Fbgd63rtz53s0TLU=";
cargoSha256 = "sha256-xjJ39hoSDn0VUH0YcL+mQBXbzFcIvZ38dPjBxV/yVNc=";
nativeBuildInputs = [ pkg-config makeWrapper ];
@ -40,12 +41,17 @@ rustPlatform.buildRustPackage rec {
--subst-var dynamicLinker \
--subst-var libPath
'')
# fix build, will be included in 1.1.1
(fetchpatch {
url = "https://github.com/leanprover/elan/commit/8d1dec09d67b2ac1768b111d24f1a1cabdd563fa.patch";
sha256 = "sha256-yMdnXqycu4VF9EKavZ85EuspvAqvzDSIm5894SB+3+A=";
})
];
postInstall = ''
pushd $out/bin
mv elan-init elan
for link in lean leanpkg leanchecker leanc leanmake; do
for link in lean leanpkg leanchecker leanc leanmake lake; do
ln -s elan $link
done
popd

View file

@ -38,25 +38,25 @@ assert usbSupport -> !udevSupport; # libusb-compat-0_1 won't be used if udev is
assert gbmSupport || waylandSupport || x11Support;
let
kodiReleaseDate = "20210508";
kodiVersion = "19.1";
kodiReleaseDate = "20211006";
kodiVersion = "19.2";
rel = "Matrix";
kodi_src = fetchFromGitHub {
owner = "xbmc";
repo = "xbmc";
rev = "${kodiVersion}-${rel}";
sha256 = "0jh67vw3983lnfgqzqfislawwbpq0vxxk1ljsg7mar06mlwfxb7h";
sha256 = "0qc3rf6fv6k35iq5p0j86kpyghzl9djqxl6526fxknvrlw0xnh9j";
};
ffmpeg = stdenv.mkDerivation rec {
pname = "kodi-ffmpeg";
version = "4.3.1";
version = "4.3.2";
src = fetchFromGitHub {
owner = "xbmc";
repo = "FFmpeg";
rev = "${version}-${rel}-Beta1";
sha256 = "1c5rwlxn6xj501iw7masdv2p6wb9rkmd299lmlkx97sw1kvxvg2w";
rev = "${version}-${rel}-${kodiVersion}";
sha256 = "14s215sgc93ds1mrdbkgb7fvy94lpgv2ldricyxzis0gbzqfgs4f";
};
preConfigure = ''
cp ${kodi_src}/tools/depends/target/ffmpeg/{CMakeLists.txt,*.cmake} .

View file

@ -8,16 +8,16 @@
buildGoModule rec {
pname = "lima";
version = "0.6.4";
version = "0.7.1";
src = fetchFromGitHub {
owner = "lima-vm";
repo = pname;
rev = "v${version}";
sha256 = "sha256-u4XLWDJ35jEKKr98eEoUUsT3gawM/qNqXPXrhlQlugg=";
sha256 = "sha256-CBRBcRvMFE9Pdxac3O15z0brF/5D279/Hat0CSYGRyE=";
};
vendorSha256 = "sha256-ivKudP0SlArfD+wXHmqNRmW8UGu0o2SJqURrjPhK2hs=";
vendorSha256 = "sha256-xlFIO33OOyLnIvbsbyHVNdyxh0vlwQOATbbZA7rsz9E=";
nativeBuildInputs = [ makeWrapper installShellFiles ];
@ -34,7 +34,9 @@ buildGoModule rec {
wrapProgram $out/bin/limactl \
--prefix PATH : ${lib.makeBinPath [ qemu ]}
installShellCompletion --cmd limactl \
--bash <($out/bin/limactl completion bash)
--bash <($out/bin/limactl completion bash) \
--fish <($out/bin/limactl completion fish) \
--zsh <($out/bin/limactl completion zsh)
runHook postInstall
'';
@ -50,4 +52,3 @@ buildGoModule rec {
maintainers = with maintainers; [ anhduy ];
};
}

View file

@ -279,3 +279,17 @@ int system(const char *command)
rewriteSystemCall(command, newCommand);
return _system(newCommand);
}
int mkdir(const char *path, mode_t mode)
{
int (*mkdir_real) (const char *path, mode_t mode) = dlsym(RTLD_NEXT, "mkdir");
char buf[PATH_MAX];
return mkdir_real(rewrite(path, buf), mode);
}
int mkdirat(int dirfd, const char *path, mode_t mode)
{
int (*mkdirat_real) (int dirfd, const char *path, mode_t mode) = dlsym(RTLD_NEXT, "mkdirat");
char buf[PATH_MAX];
return mkdirat_real(dirfd, rewrite(path, buf), mode);
}

View file

@ -3,7 +3,7 @@
{ name ? "debian-build"
, diskImage
, src, stdenv, vmTools, checkinstall
, src, lib, stdenv, vmTools, checkinstall
, fsTranslation ? false
, # Features provided by this package.
debProvides ? []

View file

@ -1,4 +1,4 @@
#! /bin/sh
#!/usr/bin/env bash
# lists all available versions listed for a package in a site (http)

View file

@ -1,4 +1,4 @@
#! /bin/sh -x
#!/usr/bin/env bash
# lists all available tags from a git repository

View file

@ -188,7 +188,9 @@ tempHash=$(printf '%0*d' "$hashLength" 0)
if [[ -n "$sri" ]]; then
# SRI hashes only support base64
# SRI hashes need to declare the hash type as part of the hash
tempHash="$(nix to-sri --type "$oldHashAlgo" "$tempHash")"
tempHash="$(nix hash to-sri --type "$oldHashAlgo" "$tempHash" 2>/dev/null \
|| nix to-sri --type "$oldHashAlgo" "$tempHash" 2>/dev/null)" \
|| die "Failed to convert hash to SRI representation!"
fi
# Escape regex metacharacter that are allowed in hashes (+)
@ -232,7 +234,9 @@ if [[ -z "$newHash" ]]; then
if [[ -n "$sri" ]]; then
# nix-build preserves the hashing scheme so we can just convert the result to SRI using the old type
newHash="$(nix to-sri --type "$oldHashAlgo" "$newHash")"
newHash="$(nix hash to-sri --type "$oldHashAlgo" "$newHash" 2>/dev/null \
|| nix to-sri --type "$oldHashAlgo" "$newHash" 2>/dev/null)" \
|| die "Failed to convert hash to SRI representation!"
fi
fi

View file

@ -0,0 +1,22 @@
{ lib, fetchzip }:
let
version = "7.01";
in
fetchzip {
name = "i.ming-${version}";
url = "https://raw.githubusercontent.com/ichitenfont/I.Ming/${version}/${version}/I.Ming-${version}.ttf";
sha256 = "1b2dj7spkznpkad8a0blqigj9f6ism057r0wn9wdqg5g88yp32vd";
postFetch = ''
install -DT -m444 $downloadedFile $out/share/fonts/truetype/I.Ming/I.Ming.ttf
'';
meta = with lib; {
description = "An open source Pan-CJK serif typeface";
homepage = "https://github.com/ichitenfont/I.Ming";
license = licenses.ipa;
platforms = platforms.all;
maintainers = [ maintainers.linsui ];
};
}

View file

@ -9,13 +9,13 @@
stdenv.mkDerivation rec {
pname = "marwaita";
version = "10.3";
version = "11.1";
src = fetchFromGitHub {
owner = "darkomarko42";
repo = pname;
rev = version;
sha256 = "0v9sxjy4x03y3hcgbkn9lj010kd5csiyc019dwxzvx5kg8xh8qca";
sha256 = "0jzjrx21i9bny4117nlwkrvjc4cg2w6r42ra66hxzaazcs9hvny2";
};
buildInputs = [

View file

@ -2,13 +2,13 @@
stdenv.mkDerivation rec {
pname = "gnome-shell-extension-emoji-selector";
version = "19";
version = "20";
src = fetchFromGitHub {
owner = "maoschanz";
repo = "emoji-selector-for-gnome";
rev = version;
sha256 = "0x60pg5nl5d73av494dg29hyfml7fbf2d03wm053vx1q8a3pxbyb";
sha256 = "sha256-I5aEHDC5GaGkAoH+1l4eyhBmJ+lmyZZoDw2Fq2SSlmo=";
};
passthru = {

View file

@ -36,13 +36,13 @@ buildType = if stdenv.isDarwin then
edk2 = buildStdenv.mkDerivation {
pname = "edk2";
version = "202102";
version = "202108";
# submodules
src = fetchgit {
url = "https://github.com/tianocore/edk2";
rev = "edk2-stable${edk2.version}";
sha256 = "1292hfbqz4wyikdf6glqdy80n9zpy54gnfngqnyv05908hww6h82";
sha256 = "1ps244f7y43afxxw6z95xscy24f9mpp8g0mfn90rd4229f193ba2";
};
buildInputs = [ libuuid pythonEnv ];

View file

@ -1,6 +1,6 @@
import ./generic.nix {
major_version = "4";
minor_version = "13";
patch_version = "0";
sha256 = "sha256:1f7gnndzs6qcyy2gnzalnhm808pifxhvxg2qp5dnsziz6li7x303";
patch_version = "1";
sha256 = "sha256:1s7xwqidpjwfhnpfma4nb93gxfr7g9jfn03s1j03iyavmpgph7ck";
}

View file

@ -1,36 +1,35 @@
{ stdenv, lib, fetchFromRepoOrCz, perl, texinfo }:
with lib;
{ stdenv, lib, fetchFromRepoOrCz, perl, texinfo, which }:
stdenv.mkDerivation rec {
pname = "tcc";
version = "0.9.27";
upstreamVersion = "release_${concatStringsSep "_" (builtins.splitVersion version)}";
version = "unstable-2021-10-09";
src = fetchFromRepoOrCz {
repo = "tinycc";
rev = upstreamVersion;
sha256 = "12mm1lqywz0akr2yb2axjfbw8lwv57nh395vzsk534riz03ml977";
rev = "ca11849ebb88ef4ff87beda46bf5687e22949bd6";
sha256 = "sha256-xnUDyTYZxbxUCblACyX73boBhU073VRqSy1SWlWsvIw=";
};
nativeBuildInputs = [ perl texinfo ];
nativeBuildInputs = [ perl texinfo which ];
hardeningDisable = [ "fortify" ];
enableParallelBuilding = true;
postPatch = ''
substituteInPlace "texi2pod.pl" \
--replace "/usr/bin/perl" "${perl}/bin/perl"
patchShebangs texi2pod.pl
'';
configureFlags = [
"--cc=cc"
"--crtprefix=${lib.getLib stdenv.cc.libc}/lib"
"--sysincludepaths=${lib.getDev stdenv.cc.libc}/include:{B}/include"
"--libpaths=${lib.getLib stdenv.cc.libc}/lib"
# build cross compilers
"--enable-cross"
];
preConfigure = ''
echo ${version} > VERSION
configureFlagsArray+=("--cc=cc")
configureFlagsArray+=("--elfinterp=$(< $NIX_CC/nix-support/dynamic-linker)")
configureFlagsArray+=("--crtprefix=${getLib stdenv.cc.libc}/lib")
configureFlagsArray+=("--sysincludepaths=${getDev stdenv.cc.libc}/include:{B}/include")
configureFlagsArray+=("--libpaths=${getLib stdenv.cc.libc}/lib")
'';
postFixup = ''
@ -47,9 +46,8 @@ stdenv.mkDerivation rec {
doCheck = true;
checkTarget = "test";
meta = {
meta = with lib; {
description = "Small, fast, and embeddable C compiler and interpreter";
longDescription = ''
TinyCC (aka TCC) is a small but hyper fast C compiler. Unlike
other C compilers, it is meant to be self-sufficient: you do not
@ -73,11 +71,9 @@ stdenv.mkDerivation rec {
With libtcc, you can use TCC as a backend for dynamic code
generation.
'';
homepage = "http://www.tinycc.org/";
license = licenses.mit;
platforms = [ "x86_64-linux" ];
homepage = "https://repo.or.cz/tinycc.git";
license = licenses.lgpl21Only;
platforms = platforms.linux;
maintainers = [ maintainers.joachifm ];
};
}

View file

@ -19,13 +19,13 @@ assert genBytecode -> ((bqn-path != null) && (mbqn-source != null));
stdenv.mkDerivation rec {
pname = "cbqn" + lib.optionalString (!genBytecode) "-standalone";
version = "0.pre+unstable=2021-10-05";
version = "0.pre+unstable=2021-10-09";
src = fetchFromGitHub {
owner = "dzaima";
repo = "CBQN";
rev = "e23dab20daff9c0dacc2561c616174af72029a3e";
hash = "sha256-amVKKD9hD5A+LbqglXHLKEsYqFSSztdXs1FCoNJyCJ4=";
rev = "debc4e2afe313a3c54133df9f26969c2927dc8aa";
hash = "sha256-ixFDmtq6hd2enmPbBT0JCv1bmxt84zle4zPQzz+rMCI=";
};
dontConfigure = true;
@ -34,11 +34,12 @@ stdenv.mkDerivation rec {
sed -i '/SHELL =.*/ d' makefile
'';
preBuild = ''
# otherwise cbqn defaults to clang
makeFlagsArray+=("CC=$CC")
makeFlags = [
"CC=${stdenv.cc.targetPrefix}cc"
];
# inform make we are providing the runtime ourselves
preBuild = ''
# Purity: avoids git downloading bytecode files
touch src/gen/customRuntime
'' + (if genBytecode then ''
${bqn-path} genRuntime ${mbqn-source}

View file

@ -114,12 +114,12 @@ let
};
self = mkDerivation rec {
version = "6.2.0";
version = "6.3.0";
pname = "octave";
src = fetchurl {
url = "mirror://gnu/octave/${pname}-${version}.tar.gz";
sha256 = "sha256-RX0f2oY0qDni/Xz8VbmL1W82tq5z0xu530Pd4wEsqnw=";
sha256 = "sha256-IyBl86cvwwE/6fF/Qpo99p1nLB9rYHcCmjHI881Ypm4=";
};
buildInputs = [

View file

@ -13,12 +13,18 @@ stdenv.mkDerivation rec {
enableParallelBuilding = true;
makeFlags = [
"AR=${stdenv.cc.targetPrefix}ar"
"CC=${stdenv.cc.targetPrefix}cc"
"LD=${stdenv.cc.targetPrefix}cc"
"LDDLL=${stdenv.cc.targetPrefix}cc"
] ++ lib.optional stdenv.hostPlatform.isStatic "DLL=no";
installPhase = ''
runHook preInstall
install -D build/brssl $bin/brssl
install -D build/testcrypto $bin/testcrypto
install -Dm644 build/libbearssl.so $lib/lib/libbearssl.so
install -Dm644 build/libbearssl.a $lib/lib/libbearssl.a
install -Dm644 -t $lib/lib build/libbearssl.*
install -Dm644 -t $dev/include inc/*.h
touch $out
runHook postInstall

View file

@ -4,11 +4,11 @@
}:
stdenv.mkDerivation rec {
version = "3.17.0";
version = "3.26.4";
pname = "dxflib";
src = fetchurl {
url = "http://www.qcad.org/archives/dxflib/${pname}-${version}-src.tar.gz";
sha256 = "09yjgzh8677pzkkr7a59pql5d11451c22pxksk2my30mapxsri96";
url = "https://qcad.org/archives/dxflib/${pname}-${version}-src.tar.gz";
sha256 = "0pwic33mj6bp4axai5jiyn4xqf31y0xmb1i0pcf55b2h9fav8zah";
};
nativeBuildInputs = [
qmake
@ -38,6 +38,7 @@ stdenv.mkDerivation rec {
doCheck = true;
meta = {
homepage = "https://qcad.org/en/90-dxflib";
maintainers = with lib.maintainers; [raskin];
platforms = lib.platforms.linux;
description = "DXF file format library";

View file

@ -51,7 +51,7 @@ stdenv.mkDerivation rec {
"--with-mysql=${getDev libmysqlclient}/bin/mysql_config"
"--with-geotiff=${libgeotiff}"
"--with-sqlite3=${sqlite.dev}"
"--with-spatialite=${libspatialite}"
"--with-spatialite=${libspatialite.dev}"
"--with-python" # optional
"--with-proj=${proj.dev}" # optional
"--with-geos=${geos}/bin/geos-config" # optional

View file

@ -0,0 +1,36 @@
{ fetchFromGitLab, lib, stdenv
, autoreconfHook, pkg-config
, libusb1
}:
stdenv.mkDerivation rec {
pname = "libjaylink";
version = "0.2.0";
src = fetchFromGitLab {
domain = "gitlab.zapb.de";
owner = "libjaylink";
repo = "libjaylink";
rev = version;
sha256 = "0ndyfh51hiqyv2yscpj6qd091w7myxxjid3a6rx8f6k233vy826q";
};
nativeBuildInputs = [ autoreconfHook pkg-config ];
buildInputs = [ libusb1 ];
postPatch = ''
patchShebangs autogen.sh
'';
postInstall = ''
install -Dm644 contrib/99-libjaylink.rules $out/lib/udev/rules.d/libjaylink.rules
'';
meta = with lib; {
homepage = "https://gitlab.zapb.de/libjaylink/libjaylink";
description = "libjaylink is a shared library written in C to access SEGGER J-Link and compatible devices.";
license = licenses.gpl2Plus;
maintainers = with maintainers; [ felixsinger ];
platforms = platforms.linux;
};
}

View file

@ -1,6 +1,22 @@
{ lib, stdenv, fetchFromGitHub, darwin
, cmake, pkg-config
, asio, nettle, gnutls, msgpack, readline, libargon2
{ lib
, stdenv
, fetchFromGitHub
, Security
, cmake
, pkg-config
, asio
, nettle
, gnutls
, msgpack
, readline
, libargon2
, jsoncpp
, restinio
, http-parser
, openssl
, fmt
, enableProxyServerAndClient ? false
, enablePushNotifications ? false
}:
stdenv.mkDerivation rec {
@ -14,29 +30,42 @@ stdenv.mkDerivation rec {
sha256 = "sha256-Os5PRYTZMVekQrbwNODWsHANTx6RSC5vzGJ5JoYtvtE=";
};
nativeBuildInputs =
[ cmake
pkg-config
];
nativeBuildInputs = [
cmake
pkg-config
];
buildInputs =
[ asio
nettle
gnutls
msgpack
readline
libargon2
] ++ lib.optionals stdenv.isDarwin [
darwin.apple_sdk.frameworks.Security
];
buildInputs = [
asio
nettle
gnutls
msgpack
readline
libargon2
] ++ lib.optionals enableProxyServerAndClient [
jsoncpp
restinio
http-parser
openssl
fmt
] ++ lib.optionals stdenv.isDarwin [
Security
];
cmakeFlags = lib.optionals enableProxyServerAndClient [
"-DOPENDHT_PROXY_SERVER=ON"
"-DOPENDHT_PROXY_CLIENT=ON"
] ++ lib.optionals enablePushNotifications [
"-DOPENDHT_PUSH_NOTIFICATIONS=ON"
];
outputs = [ "out" "lib" "dev" "man" ];
meta = with lib; {
description = "A C++11 Kademlia distributed hash table implementation";
homepage = "https://github.com/savoirfairelinux/opendht";
license = licenses.gpl3Plus;
homepage = "https://github.com/savoirfairelinux/opendht";
license = licenses.gpl3Plus;
maintainers = with maintainers; [ taeer olynch thoughtpolice ];
platforms = platforms.unix;
platforms = platforms.unix;
};
}

View file

@ -15,13 +15,13 @@
stdenv.mkDerivation rec {
pname = "spdk";
version = "21.04";
version = "21.07";
src = fetchFromGitHub {
owner = "spdk";
repo = "spdk";
rev = "v${version}";
sha256 = "sha256-Xmmgojgtt1HwTqG/1ZOJVo1BcdAH0sheu40d73OJ68w=";
sha256 = "sha256-/hynuYVdzIfiHUUfuuOY8SBJ18DqJr2Fos2JjQQVvbg=";
};
nativeBuildInputs = [

View file

@ -12,13 +12,13 @@
stdenv.mkDerivation rec {
pname = "wxsqlite3";
version = "4.6.4";
version = "4.7.3";
src = fetchFromGitHub {
owner = "utelle";
repo = "wxsqlite3";
rev = "v${version}";
sha256 = "sha256-fIm8xbNP7pjzvfBn7NgYmUtbVVh2aiaXQVANJQnrWCs=";
sha256 = "sha256-t8y4oq4p7ZMDELAkRVmoNguYRNG8spcW7MHnpdINN8g=";
};
nativeBuildInputs = [ autoreconfHook ];

View file

@ -122512,7 +122512,7 @@ in
"vscode-lldb-build-deps-../../misc/vscode-extensions/vscode-lldb/build-deps" = nodeEnv.buildNodePackage {
name = "vscode-lldb";
packageName = "vscode-lldb";
version = "1.6.7";
version = "1.6.8";
src = ../../misc/vscode-extensions/vscode-lldb/build-deps;
dependencies = [
sources."@discoveryjs/json-ext-0.5.5"

View file

@ -0,0 +1,19 @@
{ buildPecl, lib, rabbitmq-c }:
buildPecl {
pname = "amqp";
version = "1.11.0beta";
sha256 = "sha256-HbVLN6fg2htYZgAFw+IhYHP+XN8j7cTLG6S0YHHOC14=";
buildInputs = [ rabbitmq-c ];
AMQP_DIR = rabbitmq-c;
meta = with lib; {
description = "PHP extension to communicate with any AMQP compliant server";
license = licenses.php301;
homepage = "https://github.com/php-amqp/php-amqp";
maintainers = teams.php.members;
};
}

View file

@ -1,14 +1,14 @@
{ mkDerivation, fetchurl, makeWrapper, unzip, lib, php }:
let
pname = "composer";
version = "2.1.8";
version = "2.1.9";
in
mkDerivation {
inherit pname version;
src = fetchurl {
url = "https://getcomposer.org/download/${version}/composer.phar";
sha256 = "141myfivdjnkx8myvkgl2sclhvx9z1c6a1my4xzscx0injhsrf3p";
sha256 = "1fj8sq21qdsdidj5zh8s3c12pmf9nkmj36igmmixc5vc2h7bf02d";
};
dontUnpack = true;

View file

@ -64,13 +64,13 @@
}:
let
version = "2.1.2";
version = "2.1.4";
airflow-src = fetchFromGitHub rec {
owner = "apache";
repo = "airflow";
rev = version;
sha256 = "sha256-Q0l2c1tuxcoE65zgdxnv/j1TIoQzaNoEFCYHvqN+Bzk=";
sha256 = "12nxjaz4afkq30s42x3rbsci8jiw2k5zjngsc8i190fasbacbnbs";
};
# airflow bundles a web interface, which is built using webpack by an undocumented shell script in airflow's source tree.
@ -193,7 +193,9 @@ buildPythonPackage rec {
--replace "sqlalchemy>=1.3.18, <1.4" "sqlalchemy" \
--replace "sqlalchemy_jsonfield~=1.0" "sqlalchemy-jsonfield" \
--replace "werkzeug~=1.0, >=1.0.1" "werkzeug" \
--replace "itsdangerous>=1.1.0, <2.0" "itsdangerous"
--replace "itsdangerous>=1.1.0, <2.0" "itsdangerous" \
--replace "python-slugify>=3.0.0,<5.0" "python-slugify" \
--replace "colorlog>=4.0.2, <6.0" "colorlog"
substituteInPlace tests/core/test_core.py \
--replace "/bin/bash" "${stdenv.shell}"

View file

@ -4,12 +4,12 @@
}:
buildPythonPackage rec {
version = "1.8.3";
version = "1.8.4";
pname = "bids-validator";
src = fetchPypi {
inherit pname version;
sha256 = "a2940b447fdbea084311de55d415a1538299ad40ee1cc6ae711319c0734dc401";
sha256 = "63e7a02c9ddb5505a345e178f4e436b82c35ec0a177d7047b67ea10ea3029a68";
};
# needs packages which are not available in nixpkgs

View file

@ -1,24 +1,29 @@
{ lib
, fetchPypi
, buildPythonPackage
, setuptools-scm
, click
, requests
, attrs
, intbitset
, saneyaml
, text-unidecode
, beautifulsoup4
, pytestCheckHook
, buildPythonPackage
, click
, fetchPypi
, intbitset
, pytest-xdist
, pytestCheckHook
, pythonOlder
, requests
, saneyaml
, setuptools-scm
, text-unidecode
, typing
}:
buildPythonPackage rec {
pname = "commoncode";
version = "21.8.31";
version = "30.0.0";
disabled = pythonOlder "3.6";
src = fetchPypi {
inherit pname version;
sha256 = "0e74c61226834393801e921ab125eae3b52361340278fb9a468c5c691d286c32";
sha256 = "sha256-6SeU4u6pfDuGCgCYAO5fdbWBxW9XN3WvM8j6DwUlFwM=";
};
dontConfigure = true;
@ -28,13 +33,15 @@ buildPythonPackage rec {
];
propagatedBuildInputs = [
click
requests
attrs
beautifulsoup4
click
intbitset
requests
saneyaml
text-unidecode
beautifulsoup4
] ++ lib.optionals (pythonOlder "3.7") [
typing
];
checkInputs = [

View file

@ -11,12 +11,12 @@
buildPythonPackage rec {
pname = "debian-inspector";
version = "21.5.25";
version = "30.0.0";
src = fetchPypi {
pname = "debian_inspector";
inherit version;
sha256 = "1d3xaqw00kav85nk29qm2yqb73bkyqf185fs1q0vgd7bnap9wqaw";
sha256 = "sha256-0PT5sT6adaqgYQtWjks12ys0z1C3n116aeJaEKR/Wxg=";
};
nativeBuildInputs = [

View file

@ -12,7 +12,7 @@
buildPythonPackage rec {
pname = "deezer-python";
version = "2.4.0";
version = "3.1.0";
format = "pyproject";
disabled = pythonOlder "3.6";
@ -21,7 +21,7 @@ buildPythonPackage rec {
owner = "browniebroke";
repo = pname;
rev = "v${version}";
sha256 = "sha256-4Jjkhlv3wK4j2uU8dT11WYuBttlFtg+/ZBrc57UVeao=";
sha256 = "1ln9hlix6rbyajgvwd2lk0i7nshvrbkvj9xx1i0q1z1caly9yl0g";
};
nativeBuildInputs = [

View file

@ -4,11 +4,11 @@
buildPythonPackage rec {
pname = "django-dynamic-preferences";
version = "1.10.1";
version = "1.11.0";
src = fetchPypi {
inherit pname version;
sha256 = "e4b2bb7b2563c5064ba56dd76441c77e06b850ff1466a386a1cd308909a6c7de";
sha256 = "f214c938b5872a17647e2b2ccfd9ad00a90a3c6c4aa83fa65d3c5c446e7a66c7";
};
propagatedBuildInputs = [ six django persisting-theory ];

View file

@ -9,6 +9,7 @@
, pytestCheckHook
, pytest-xdist
}:
buildPythonPackage rec {
pname = "extractcode";
version = "21.7.23";
@ -36,7 +37,7 @@ buildPythonPackage rec {
pytest-xdist
];
# cli test tests the cli which we can't do until after install
# CLI test tests the cli which we can't do until after install
disabledTestPaths = [
"tests/test_extractcode_cli.py"
];
@ -45,6 +46,7 @@ buildPythonPackage rec {
disabledTests = [
"test_uncompress_lz4_basic"
"test_extract_tarlz4_basic"
"test_extract_rar_with_trailing_data"
# tries to parse /boot/vmlinuz-*, which is not available in the nix sandbox
"test_can_extract_qcow2_vm_image_as_tarball"
"test_can_extract_qcow2_vm_image_not_as_tarball"
@ -56,7 +58,7 @@ buildPythonPackage rec {
];
meta = with lib; {
description = "A mostly universal archive extractor using z7zip, libarchve, other libraries and the Python standard library for reliable archive extraction";
description = "Universal archive extractor using z7zip, libarchve, other libraries and the Python standard library";
homepage = "https://github.com/nexB/extractcode";
license = licenses.asl20;
maintainers = teams.determinatesystems.members;

View file

@ -2,11 +2,11 @@
buildPythonPackage rec {
pname = "Flask-JWT-Extended";
version = "4.3.0";
version = "4.3.1";
src = fetchPypi {
inherit pname version;
sha256 = "6e2b40d548b9dfc6051740c4552c097ac38e514e500c16c682d9a533d17ca418";
sha256 = "ad6977b07c54e51c13b5981afc246868b9901a46715d9b9827898bfd916aae88";
};
propagatedBuildInputs = [ python-dateutil flask pyjwt werkzeug ];

View file

@ -8,13 +8,13 @@
buildPythonPackage rec {
pname = "furo";
version = "2021.9.22";
version = "2021.10.9";
format = "flit";
disable = pythonOlder "3.6";
src = fetchPypi {
inherit pname version;
sha256 = "sha256-749l6cXyGbIarXXJmiCU0DsWQwrvH1dobOGePyT5VK8=";
sha256 = "sha256-K6pCoi7ePm6Vxhgqs2S6wuwVt5vH+cp/sJ/ZrsSzVAw=";
};
propagatedBuildInputs = [

View file

@ -10,7 +10,7 @@
buildPythonPackage rec {
pname = "greeclimate";
version = "0.11.8";
version = "0.11.9";
disabled = pythonOlder "3.6";
@ -18,7 +18,7 @@ buildPythonPackage rec {
owner = "cmroche";
repo = "greeclimate";
rev = version;
sha256 = "1n46klbhl0gpd5x995mrcr1qfd77hrfm501qns1zhvv0zk8mdsf4";
sha256 = "sha256-fyIx/w+jKIscPGbK6LqjMtjy43qJtzzITwtUeNurE+o=";
};
propagatedBuildInputs = [

View file

@ -7,14 +7,14 @@
buildPythonPackage rec {
pname = "guppy3";
version = "3.1.1";
version = "3.1.2";
disabled = pythonOlder "3.6";
src = fetchFromGitHub {
owner = "zhuyifei1999";
repo = pname;
rev = "v${version}";
sha256 = "14iwah1i4dcn74zjj9sq3av1yh9q5nvgqwccnn71blp7gxcnxnvh";
sha256 = "sha256-f7YpaZ85PU/CSsDwSm2IJ/x2ZxzHoMOVbdbzT1i8y/w=";
};
propagatedBuildInputs = [ tkinter ];

View file

@ -11,14 +11,14 @@
buildPythonPackage rec {
pname = "homepluscontrol";
version = "0.0.61";
version = "0.1";
disabled = pythonOlder "3.6";
src = fetchFromGitHub {
owner = "chemaaa";
repo = pname;
rev = version;
sha256 = "1g61xj417dz1nz5g5ic8rs34fp424zvbgsymry1zldg3gskaqgvk";
sha256 = "sha256-COOGqfYiR4tueQHXuCvVxShrYS0XNltcW4mclbFWcfA=";
};
propagatedBuildInputs = [

View file

@ -7,12 +7,12 @@
}:
buildPythonPackage rec {
version = "4.0.7";
version = "4.0.8";
pname = "icalendar";
src = fetchPypi {
inherit pname version;
sha256 = "0fc18d87f66e0b5da84fa731389496cfe18e4c21304e8f6713556b2e8724a7a4";
sha256 = "7508a92b4e36049777640b0ae393e7219a16488d852841a0e57b44fe51d9f848";
};
buildInputs = [ setuptools ];

View file

@ -4,11 +4,11 @@
buildPythonPackage rec {
pname = "jaraco.itertools";
version = "6.0.1";
version = "6.0.3";
src = fetchPypi {
inherit pname version;
sha256 = "6939e47806a39330a9f9772bf9ea910da39abc159ff2579d454a763358553439";
sha256 = "1775bfcad5de275a540a36720c5ab34594ea1dbe7ffefa32099b0129c5604608";
};
pythonNamespaces = [ "jaraco" ];

View file

@ -65,11 +65,6 @@ buildPythonPackage rec {
pytest-dependency
];
disabledTests = [
"docker"
"sshmanager"
];
meta = with lib; {
description = "Embedded control & testing library";
homepage = "https://labgrid.org";

View file

@ -1,25 +1,45 @@
{ lib, buildPythonPackage, fetchFromGitHub
{ lib
, boolean-py
, buildPythonPackage
, fetchFromGitHub
, pytestCheckHook
, pythonOlder
, setuptools-scm
}:
buildPythonPackage rec {
pname = "license-expression";
version = "1.2";
version = "21.6.14";
disabled = pythonOlder "3.6";
src = fetchFromGitHub {
owner = "nexB";
repo = "license-expression";
rev = "v${version}";
sha256 = "0bbd7d90z58p9sd01b00g0vfd9bmwzksjb7pc8833s2jpja9mxz1";
sha256 = "sha256-hwfYKKalo8WYFwPCsRRXNz+/F8/42PXA8jxbIQjJH/g=";
};
postPatch = "patchShebangs ./configure";
propagatedBuildInputs = [ boolean-py ];
dontConfigure = true;
nativeBuildInputs = [
setuptools-scm
];
propagatedBuildInputs = [
boolean-py
];
checkInputs = [
pytestCheckHook
];
pythonImportsCheck = [ "license_expression" ];
meta = with lib; {
description = "Utility library to parse, normalize and compare License expressions for Python";
homepage = "https://github.com/nexB/license-expression";
description = "Utility library to parse, normalize and compare License expressions for Python using a boolean logic engine";
license = licenses.asl20;
maintainers = with maintainers; [ fab ];
};
}

View file

@ -0,0 +1,43 @@
{ lib
, buildPythonPackage
, fetchFromGitHub
, pythonOlder
, token-bucket
}:
buildPythonPackage rec {
pname = "limiter";
version = "0.1.2";
disabled = pythonOlder "3.7";
src = fetchFromGitHub {
owner = "alexdelorenzo";
repo = pname;
rev = "v${version}";
sha256 = "0cdqw08qw3cid1yjknlh4hqfl46xh4madkjrl7sxk2c1pbwils8r";
};
propagatedBuildInputs = [
token-bucket
];
postPatch = ''
substituteInPlace requirements.txt \
--replace "token-bucket==0.2.0" "token-bucket>=0.2.0"
'';
# Project has no tests
doCheck = false;
pythonImportsCheck = [
"limiter"
];
meta = with lib; {
description = "Python rate-limiting, thread-safe and asynchronous decorators and context managers";
homepage = "https://github.com/alexdelorenzo/limiter";
license = with licenses; [ agpl3Only ];
maintainers = with maintainers; [ fab ];
};
}

View file

@ -4,11 +4,11 @@
buildPythonPackage rec {
pname = "mautrix";
version = "0.10.9";
version = "0.10.10";
src = fetchPypi {
inherit pname version;
sha256 = "b774a2e1178a2f9812ce02119c6ee374b1ea08d34bad4c09a1ecc92d08d98f28";
sha256 = "78309702392fe1ced000a23cfacb9bae0511ba533963b82d1d040f4a39924c09";
};
propagatedBuildInputs = [

View file

@ -8,12 +8,12 @@
buildPythonPackage rec {
pname = "mypy-boto3-s3";
version = "1.18.57";
version = "1.18.58";
disabled = pythonOlder "3.6";
src = fetchPypi {
inherit pname version;
sha256 = "c157008c4111bb18be21428cd1e35a3265fffc58ebcda4a0019120a5e10add89";
sha256 = "3e96a40314cd8c61b833f2f198179fb1056935c5349c5b4369432788a30ed098";
};
propagatedBuildInputs = [

View file

@ -8,13 +8,13 @@
buildPythonPackage rec {
pname = "nunavut";
version = "1.4.2";
version = "1.5.0";
disabled = pythonOlder "3.5";
src = fetchPypi {
inherit pname version;
sha256 = "7238780e42a8d6b7fd3296273c76d35dbebb4520d6778472d556b68b77e2aade";
sha256 = "d0a7cfbb34dd93aff299a5a357f6f259a0a407c0e9136bab8e495a36e3f0846d";
};
propagatedBuildInputs = [

View file

@ -0,0 +1,33 @@
{ lib
, buildPythonPackage
, fetchPypi
, pytestCheckHook
, pythonOlder
}:
buildPythonPackage rec {
pname = "parameter-expansion-patched";
version = "0.2.1b4";
disabled = pythonOlder "3.6";
src = fetchPypi {
inherit pname version;
sha256 = "1vhshscjifi78qapzwn29gln6p8jhyc7cccszl8ai2jamhcph5zs";
};
checkInputs = [
pytestCheckHook
];
pythonImportsCheck = [
"parameter_expansion"
];
meta = with lib; {
description = "POSIX parameter expansion in Python";
homepage = "https://github.com/nexB/commoncode";
license = licenses.asl20;
maintainers = with maintainers; [ fab ];
};
}

View file

@ -8,12 +8,12 @@
buildPythonPackage rec {
pname = "pg8000";
version = "1.21.2";
version = "1.21.3";
disabled = pythonOlder "3.6";
src = fetchPypi {
inherit pname version;
sha256 = "36a3b517408334967c1fa0d29656da03608d63122a372ec92c85f49aed2d24e3";
sha256 = "f73f1d477cda12a7b784be73c8a0c06c71e4284ef90cae4883cbc7c524b95fbf";
};
propagatedBuildInputs = [

View file

@ -9,11 +9,11 @@
buildPythonPackage rec {
pname = "pglast";
version = "3.5";
version = "3.6";
src = fetchPypi {
inherit pname version;
sha256 = "3bb74df084b149e8bf969380d88b1980fbd1aeda7f7057f4dee6751d854d6ae6";
sha256 = "1594d536137b888556b7187d25355ba88b3a14ef0d8aacccef15bfed74cf0af9";
};
disabled = !isPy3k;

View file

@ -1,5 +1,6 @@
{ lib
, buildPythonPackage
, cmake
, fetchPypi
, isPy3k
, pytest
@ -11,19 +12,19 @@
, scipy
, pandas
, matplotlib
, ninja
, numba
, pybind11
}:
buildPythonPackage rec {
pname = "phik";
version = "0.12.0";
format = "wheel";
disabled = !isPy3k;
src = fetchPypi {
inherit pname version format;
python = "py3";
sha256 = "57db39d1c74c84a24d0270b63d1c629a5cb975462919895b96a8522ae0678408";
inherit pname version;
sha256 = "959fd40482246e3f643cdac5ea04135b2c11a487e917af7d4e75843f47183549";
};
checkInputs = [
@ -40,6 +41,15 @@ buildPythonPackage rec {
pandas
matplotlib
numba
pybind11
];
# uses setuptools to drive build process
dontUseCmakeConfigure = true;
nativeBuildInputs = [
cmake
ninja
];
postInstall = ''

View file

@ -24,12 +24,12 @@
buildPythonPackage rec {
pname = "pikepdf";
version = "3.1.1";
version = "3.2.0";
disabled = ! isPy3k;
src = fetchPypi {
inherit pname version;
sha256 = "sha256-klSUszWsIIz7o0/Ql8K4CWYujBH0mAbqyUcabpn1SkQ=";
sha256 = "a0582f00440668c07edb8403e82724961c7812c8e6c30655e34825b2645f15cd";
};
patches = [

View file

@ -2,11 +2,11 @@
buildPythonPackage rec {
pname = "pyTelegramBotAPI";
version = "4.1.0";
version = "4.1.1";
src = fetchPypi {
inherit pname version;
sha256 = "c84218af7e08e859e07cfe5645d9586ceaad51c24f0f4529a9ed0adafd5aa0bf";
sha256 = "cc8011ca05301653f2e5c2d02eadff0e882b611841a76f9e5b911994899df49e";
};
propagatedBuildInputs = [ requests ];

View file

@ -2,11 +2,11 @@
buildPythonPackage rec {
pname = "pyfuse3";
version = "3.2.0";
version = "3.2.1";
src = fetchPypi {
inherit pname version;
sha256 = "45f0053ad601b03a36e2c283a5271403674245a66a0daf50e3deaab0ea4fa82f";
sha256 = "22d146dac59a8429115e9a93317975ea54b35e0278044a94d3fac5b4ad5f7e33";
};
nativeBuildInputs = [ pkg-config ];

View file

@ -0,0 +1,42 @@
{ lib
, buildPythonPackage
, fetchFromGitHub
, pytestCheckHook
, setuptools-scm
, pythonOlder
}:
buildPythonPackage rec {
pname = "pygmars";
version = "0.7.0";
disabled = pythonOlder "3.6";
src = fetchFromGitHub {
owner = "nexB";
repo = pname;
rev = "v${version}";
sha256 = "0wghk4nzplpl26iwrgvm0n9x88nyxlcxz4ywss4nwdr4hfccl28l";
};
dontConfigure = true;
nativeBuildInputs = [
setuptools-scm
];
checkInputs = [
pytestCheckHook
];
pythonImportsCheck = [
"pygmars"
];
meta = with lib; {
description = "Python lexing and parsing library";
homepage = "https://github.com/nexB/pygmars";
license = with licenses; [ asl20 ];
maintainers = with maintainers; [ fab ];
};
}

View file

@ -12,7 +12,7 @@
buildPythonPackage rec {
pname = "pyhaversion";
version = "21.07.0";
version = "21.10.1";
# Only 3.8.0 and beyond are supported
disabled = pythonOlder "3.8";
@ -21,7 +21,7 @@ buildPythonPackage rec {
owner = "ludeeus";
repo = pname;
rev = version;
sha256 = "sha256-LcuMLYekeK9HR+SR8+R+EvuxxaN3RCh7KV969RngZjw=";
sha256 = "sha256-7J7zzJlevNQb7TpFYuGvsk3EWBgwhmV32xPNSLA/LS4=";
};
propagatedBuildInputs = [

View file

@ -2,11 +2,11 @@
buildPythonPackage rec {
pname = "pymavlink";
version = "2.4.16";
version = "2.4.17";
src = fetchPypi {
inherit pname version;
sha256 = "99b77fdc1389dea7c9dbbfb70143fed707238e00c961ada73b79bcf15b21ca19";
sha256 = "84e2af4d8099afd37c5d887261a168e7bde4ec2354f12f65c72dad1a4cd8f21d";
};
propagatedBuildInputs = [ future lxml ];

View file

@ -6,13 +6,13 @@
buildPythonPackage rec {
pname = "pyswitchbot";
version = "0.11.0";
version = "0.12.0";
src = fetchFromGitHub {
owner = "Danielhiversen";
repo = "pySwitchbot";
rev = version;
sha256 = "sha256-YqXR6zL8rM2p6YqK8BX82F9HZHgfpfEU4qBiVSud0hw=";
sha256 = "sha256-8u5KeWVaCOksag2CYE7GBl36crB4k9YdLZ5aHD9hlwU=";
};
propagatedBuildInputs = [ bluepy ];

View file

@ -2,13 +2,13 @@
buildPythonPackage rec {
pname = "pytest-rerunfailures";
version = "10.1";
version = "10.2";
disabled = pythonOlder "3.5";
src = fetchPypi {
inherit pname version;
sha256 = "7617c06de13ee6dd2df9add7e275bfb2bcebbaaf3e450f5937cd0200df824273";
sha256 = "9e1e1bad51e07642c5bbab809fc1d4ec8eebcb7de86f90f1a26e6ef9de446697";
};
buildInputs = [ pytest ];
@ -20,7 +20,7 @@ buildPythonPackage rec {
'';
meta = with lib; {
description = "pytest plugin to re-run tests to eliminate flaky failures";
description = "Pytest plugin to re-run tests to eliminate flaky failures";
homepage = "https://github.com/pytest-dev/pytest-rerunfailures";
license = licenses.mpl20;
maintainers = with maintainers; [ das-g ];

View file

@ -1,105 +1,141 @@
{ lib
, fetchPypi
, buildPythonPackage
, isPy3k
, markupsafe
, click
, typecode
, gemfileparser
, pefile
, fingerprints
, spdx-tools
, fasteners
, pycryptodome
, urlpy
, dparse
, jaraco_functools
, pkginfo
, debian-inspector
, extractcode
, ftfy
, pyahocorasick
, colorama
, jsonstreams
, packageurl-python
, pymaven-patch
, nltk
, pygments
, attrs
, beautifulsoup4
, bitarray
, jinja2
, javaproperties
, boolean-py
, license-expression
, buildPythonPackage
, chardet
, click
, colorama
, commoncode
, debian-inspector
, dparse
, extractcode
, extractcode-7z
, extractcode-libarchive
, typecode-libmagic
, fasteners
, fetchPypi
, fingerprints
, ftfy
, gemfileparser
, html5lib
, importlib-metadata
, intbitset
, jaraco_functools
, javaproperties
, jinja2
, jsonstreams
, license-expression
, lxml
, markupsafe
, packageurl-python
, packaging
, parameter-expansion-patched
, pefile
, pkginfo
, pluggy
, plugincode
, publicsuffix2
, pyahocorasick
, pycryptodome
, pygmars
, pygments
, pymaven-patch
, pytestCheckHook
, pythonOlder
, requests
, saneyaml
, spdx-tools
, text-unidecode
, toml
, typecode
, typecode-libmagic
, typing
, urlpy
, xmltodict
, zipp
}:
buildPythonPackage rec {
pname = "scancode-toolkit";
version = "21.8.4";
disabled = !isPy3k;
version = "30.1.0";
disabled = pythonOlder "3.6";
src = fetchPypi {
inherit pname version;
sha256 = "c18340067244274c67e166f701c60e747e1d0bccb17efc99f277a4bc0a5a13c6";
sha256 = "sha256-UYQf+cBi2FmyZxIbQJo7vLjPuoePIMC8FugvoG1Ebj0=";
};
dontConfigure = true;
# https://github.com/nexB/scancode-toolkit/issues/2501
# * dparse2 is a "Temp fork for Python 2 support", but pdfminer requires
# Python 3, so it's "fine" to leave dparse2 unpackaged and use the "normal"
# version
# * ftfy was pinned for similar reasons (to support Python 2), but rather than
# packaging an older version, I figured it would be better to remove the
# erroneous (at least for our usage) version bound
# * bitarray's version bound appears to be unnecessary for similar reasons
postPatch = ''
substituteInPlace setup.cfg \
--replace "dparse2" "dparse" \
--replace "ftfy < 5.0.0" "ftfy" \
--replace "bitarray >= 0.8.1, < 1.0.0" "bitarray"
'';
propagatedBuildInputs = [
markupsafe
click
typecode
gemfileparser
pefile
fingerprints
spdx-tools
fasteners
pycryptodome
urlpy
dparse
jaraco_functools
pkginfo
debian-inspector
extractcode
ftfy
pyahocorasick
colorama
jsonstreams
packageurl-python
pymaven-patch
nltk
pygments
attrs
beautifulsoup4
bitarray
jinja2
javaproperties
boolean-py
license-expression
chardet
click
colorama
commoncode
debian-inspector
dparse
extractcode
extractcode-7z
extractcode-libarchive
fasteners
fingerprints
ftfy
gemfileparser
html5lib
intbitset
jaraco_functools
javaproperties
jinja2
jsonstreams
license-expression
lxml
markupsafe
packageurl-python
packaging
parameter-expansion-patched
pefile
pkginfo
pluggy
plugincode
publicsuffix2
pyahocorasick
pycryptodome
pygmars
pygments
pymaven-patch
requests
saneyaml
spdx-tools
text-unidecode
toml
typecode
typecode-libmagic
urlpy
xmltodict
zipp
] ++ lib.optionals (pythonOlder "3.9") [
importlib-metadata
] ++ lib.optionals (pythonOlder "3.7") [
typing
];
checkInputs = [
pytestCheckHook
];
postPatch = ''
substituteInPlace setup.cfg \
--replace "pluggy >= 0.12.0, < 1.0" "pluggy" \
--replace "pygmars >= 0.7.0" "pygmars" \
--replace "license_expression >= 21.6.14" "license_expression"
'';
# Importing scancode needs a writeable home, and preCheck happens in between
# pythonImportsCheckPhase and pytestCheckPhase.
postInstall = ''
@ -114,7 +150,7 @@ buildPythonPackage rec {
dontStrip = true;
meta = with lib; {
description = "A tool to scan code for license, copyright, package and their documented dependencies and other interesting facts";
description = "Tool to scan code for license, copyright, package and their documented dependencies and other interesting facts";
homepage = "https://github.com/nexB/scancode-toolkit";
license = with licenses; [ asl20 cc-by-40 ];
maintainers = teams.determinatesystems.members;

View file

@ -0,0 +1,41 @@
{ lib
, buildPythonPackage
, fetchFromGitHub
, nose
, pythonOlder
}:
buildPythonPackage rec {
pname = "smbus2";
version = "0.4.1";
disabled = pythonOlder "3.6";
src = fetchFromGitHub {
owner = "kplindegaard";
repo = pname;
rev = version;
sha256 = "0xgqs7bzhr8y3irc9gq3dnw1l3f5gc1yv4r2v4qxj95i3vvzpg5s";
};
checkInputs = [
nose
];
checkPhase = ''
runHook preCheck
nosetests
runHook postCheck
'';
pythonImportsCheck = [
"smbus2"
];
meta = with lib; {
description = "Drop-in replacement for smbus-cffi/smbus-python";
homepage = "https://smbus2.readthedocs.io/";
license = licenses.mit;
maintainers = with maintainers; [ fab ];
};
}

View file

@ -1,39 +1,31 @@
{ lib
, buildPythonPackage
, click
, fetchPypi
, fetchpatch
, six
, pyyaml
, rdflib
, ply
, xmltodict
, pytestCheckHook
, pythonAtLeast
, pythonOlder
}:
buildPythonPackage rec {
pname = "spdx-tools";
version = "0.6.1";
version = "0.7.0a3";
disabled = pythonOlder "3.6";
src = fetchPypi {
inherit pname version;
sha256 = "9a1aaae051771e865705dd2fd374c3f73d0ad595c1056548466997551cbd7a81";
sha256 = "sha256-afV1W1n5ubHhqfLFpPO5fxaIy5TaZdw9eDy3JYOJ1oE=";
};
patches = lib.optionals (pythonAtLeast "3.9") [
# https://github.com/spdx/tools-python/pull/159
# fixes tests on Python 3.9
(fetchpatch {
name = "drop-encoding-argument.patch";
url = "https://github.com/spdx/tools-python/commit/6c8b9a852f8a787122c0e2492126ee8aa52acff0.patch";
sha256 = "RhvLhexsQRjqYqJg10SAM53RsOW+R93G+mns8C9g5E8=";
})
];
propagatedBuildInputs = [
six
click
ply
pyyaml
rdflib
ply
xmltodict
];

View file

@ -0,0 +1,50 @@
{ lib
, buildPythonPackage
, dataclasses-json
, fetchFromGitHub
, limiter
, pythonOlder
, requests
, responses
}:
buildPythonPackage rec {
pname = "spyse-python";
version = "2.2.3";
disabled = pythonOlder "3.8";
src = fetchFromGitHub {
owner = "spyse-com";
repo = pname;
rev = "v${version}";
sha256 = "041k0037anwaxp2mh7mdk8rdsw9hdr3arigyyqfxfn35x8j41c3k";
};
propagatedBuildInputs = [
requests
dataclasses-json
responses
limiter
];
# Tests requires an API token
doCheck = false;
postPatch = ''
substituteInPlace setup.py \
--replace "'dataclasses~=0.6'," "" \
--replace "responses~=0.13.3" "responses>=0.13.3"
'';
pythonImportsCheck = [
"spyse"
];
meta = with lib; {
description = "Python module for spyse.com API";
homepage = "https://github.com/spyse-com/spyse-python";
license = with licenses; [ mit ];
maintainers = with maintainers; [ fab ];
};
}

View file

@ -8,11 +8,11 @@ wsl_stub = writeShellScriptBin "wsl" "true";
in buildPythonPackage rec {
pname = "tasklib";
version = "2.4.0";
version = "2.4.3";
src = fetchPypi {
inherit pname version;
sha256 = "3645594147107c92780e19ac437f09eb8b8eac950209fb92d3f71869a721234e";
sha256 = "b523bc12893d26c8173a6b8d84b16259c9a9c5acaaf8932bc018117f907b3bc5";
};
propagatedBuildInputs = [

View file

@ -6,6 +6,7 @@
, buildPythonPackage
, fetchFromGitHub
, fetchpatch
, httpx
, poetry-core
, pytest-asyncio
, pytestCheckHook
@ -14,14 +15,14 @@
buildPythonPackage rec {
pname = "teslajsonpy";
version = "0.21.0";
version = "1.0.0";
format = "pyproject";
src = fetchFromGitHub {
owner = "zabuldon";
repo = pname;
rev = "v${version}";
sha256 = "1rwp3aag21hdkis2wx680ckja0203grm7naldaj8d2kpy4697m54";
sha256 = "1xkr0pmz458vh8b90ydykmgddhisay347vp48j50d1v0a55xvqsa";
};
nativeBuildInputs = [
@ -33,6 +34,7 @@ buildPythonPackage rec {
aiohttp
backoff
beautifulsoup4
httpx
wrapt
];

View file

@ -13,7 +13,7 @@
buildPythonPackage rec {
pname = "youless-api";
version = "0.13";
version = "0.14";
disabled = pythonOlder "3.7";
@ -21,7 +21,7 @@ buildPythonPackage rec {
owner = "jongsoftdev";
repo = "youless-python-bridge";
rev = version;
sha256 = "sha256-Vywzd8wZG4eI/U69fPYuLpF54zAeuCv3Q81z5UcMGjc=";
sha256 = "sha256-ZHDQ+4Urv0ZxKFASsgDG12mpfRiCN2DwU6Rgc9ye5qY=";
};
propagatedBuildInputs = [

View file

@ -0,0 +1,26 @@
{ lib, buildGoModule, fetchFromGitHub }:
buildGoModule rec {
pname = "ec2-metadata-mock";
version = "1.9.2";
src = fetchFromGitHub {
owner = "aws";
repo = "amazon-ec2-metadata-mock";
rev = "v${version}";
sha256 = "sha256-k4YzG4M+r6BHc4DdAMXoUvVDTJqmzr8vIL1J6kbJBeY=";
};
vendorSha256 = "sha256-uq0gcpFzAcz1HMwI1ZjHykWU93bV2U5kxC/G+J4ob7Q=";
postInstall = ''
mv $out/bin/{cmd,ec2-metadata-mock}
'';
meta = with lib; {
description = "Amazon EC2 Metadata Mock";
homepage = "https://github.com/aws/amazon-ec2-metadata-mock";
license = licenses.asl20;
maintainers = with maintainers; [ ymatsiuk ];
};
}

View file

@ -1,88 +1,33 @@
{ lib, stdenvNoCC, fetchurl, fetchgit,
gnumake, patch, zlib, git, bison,
flex, gnat11, curl, perl
{ callPackage, fetchgit, lib, stdenvNoCC
, bison, curl, git, perl
, flex, gnat11, zlib
}:
let
version_coreboot = "4.14";
version_gmp = "6.2.0";
version_mpfr = "4.1.0";
version_mpc = "1.2.0";
version_gcc = "8.3.0";
version_binutils = "2.35.1";
version_acpica = "20200925";
version_nasm = "2.15.05";
tar_name_gmp = "gmp-${version_gmp}.tar.xz";
tar_gmp = fetchurl {
url = "https://ftpmirror.gnu.org/gmp/${tar_name_gmp}";
sha256 = "09hmg8k63mbfrx1x3yy6y1yzbbq85kw5avbibhcgrg9z3ganr3i5";
};
tar_name_mpfr = "mpfr-${version_mpfr}.tar.xz";
tar_mpfr = fetchurl {
url = "https://ftpmirror.gnu.org/mpfr/${tar_name_mpfr}";
sha256 = "0zwaanakrqjf84lfr5hfsdr7hncwv9wj0mchlr7cmxigfgqs760c";
};
tar_name_mpc = "mpc-${version_mpc}.tar.gz";
tar_mpc = fetchurl {
url = "https://ftpmirror.gnu.org/mpc/${tar_name_mpc}";
sha256 = "19pxx3gwhwl588v496g3aylhcw91z1dk1d5x3a8ik71sancjs3z9";
};
tar_name_gcc = "gcc-${version_gcc}.tar.xz";
tar_gcc = fetchurl {
url = "https://ftpmirror.gnu.org/gcc/gcc-${version_gcc}/${tar_name_gcc}";
sha256 = "0b3xv411xhlnjmin2979nxcbnidgvzqdf4nbhix99x60dkzavfk4";
};
tar_name_binutils = "binutils-${version_binutils}.tar.xz";
tar_binutils = fetchurl {
url = "https://ftpmirror.gnu.org/binutils/${tar_name_binutils}";
sha256 = "01w6xvfy7sjpw8j08k111bnkl27j760bdsi0wjvq44ghkgdr3v9w";
};
tar_name_acpica = "acpica-unix2-${version_acpica}.tar.gz";
tar_acpica = fetchurl {
url = "https://acpica.org/sites/acpica/files/${tar_name_acpica}";
sha256 = "18n6129fkgj85piid7v4zxxksv3h0amqp4p977vcl9xg3bq0zd2w";
};
tar_name_nasm = "nasm-${version_nasm}.tar.bz2";
tar_nasm = fetchurl {
url = "https://www.nasm.us/pub/nasm/releasebuilds/${version_nasm}/${tar_name_nasm}";
sha256 = "1l1gxs5ncdbgz91lsl4y7w5aapask3w02q9inayb2m5bwlwq6jrw";
};
tar_coreboot_name = "coreboot-${version_coreboot}.tar.xz";
tar_coreboot = fetchurl {
url = "https://coreboot.org/releases/${tar_coreboot_name}";
sha256 = "0viw2x4ckjwiylb92w85k06b0g9pmamjy2yqs7fxfqbmfadkf1yr";
};
in stdenvNoCC.mkDerivation rec {
stdenvNoCC.mkDerivation rec {
pname = "coreboot-toolchain";
version = version_coreboot;
src = tar_coreboot;
version = "4.14";
nativeBuildInputs = [ perl curl gnumake git bison ];
src = fetchgit {
url = "https://review.coreboot.org/coreboot";
rev = version;
sha256 = "00xr74yc0kj9rrqa1a8b7bih865qlp9i4zs67ysavkfrjrwwssxm";
};
buildInputs = [ gnat11 flex zlib ];
nativeBuildInputs = [ bison curl git perl ];
buildInputs = [ flex gnat11 zlib ];
enableParallelBuilding = true;
dontConfigure = true;
dontInstall = true;
patchPhase = ''
mkdir util/crossgcc/tarballs
ln -s ${tar_gmp} util/crossgcc/tarballs/${tar_name_gmp}
ln -s ${tar_mpfr} util/crossgcc/tarballs/${tar_name_mpfr}
ln -s ${tar_mpc} util/crossgcc/tarballs/${tar_name_mpc}
ln -s ${tar_gcc} util/crossgcc/tarballs/${tar_name_gcc}
ln -s ${tar_binutils} util/crossgcc/tarballs/${tar_name_binutils}
ln -s ${tar_acpica} util/crossgcc/tarballs/${tar_name_acpica}
ln -s ${tar_nasm} util/crossgcc/tarballs/${tar_name_nasm}
postPatch = ''
mkdir -p util/crossgcc/tarballs
${lib.concatMapStringsSep "\n" (
file: "ln -s ${file.archive} util/crossgcc/tarballs/${file.name}"
) (callPackage ./stable.nix { })
}
patchShebangs util/genbuild_h/genbuild_h.sh util/crossgcc/buildgcc
'';

View file

@ -0,0 +1,51 @@
{ fetchurl }: [
{
name = "gmp-6.2.0.tar.xz";
archive = fetchurl {
sha256 = "09hmg8k63mbfrx1x3yy6y1yzbbq85kw5avbibhcgrg9z3ganr3i5";
url = "mirror://gnu/gmp/gmp-6.2.0.tar.xz";
};
}
{
name = "mpfr-4.1.0.tar.xz";
archive = fetchurl {
sha256 = "0zwaanakrqjf84lfr5hfsdr7hncwv9wj0mchlr7cmxigfgqs760c";
url = "mirror://gnu/mpfr/mpfr-4.1.0.tar.xz";
};
}
{
name = "mpc-1.2.0.tar.gz";
archive = fetchurl {
sha256 = "19pxx3gwhwl588v496g3aylhcw91z1dk1d5x3a8ik71sancjs3z9";
url = "mirror://gnu/mpc/mpc-1.2.0.tar.gz";
};
}
{
name = "gcc-8.3.0.tar.xz";
archive = fetchurl {
sha256 = "0b3xv411xhlnjmin2979nxcbnidgvzqdf4nbhix99x60dkzavfk4";
url = "mirror://gnu/gcc/gcc-8.3.0/gcc-8.3.0.tar.xz";
};
}
{
name = "binutils-2.35.1.tar.xz";
archive = fetchurl {
sha256 = "01w6xvfy7sjpw8j08k111bnkl27j760bdsi0wjvq44ghkgdr3v9w";
url = "mirror://gnu/binutils/binutils-2.35.1.tar.xz";
};
}
{
name = "acpica-unix2-20200925.tar.gz";
archive = fetchurl {
sha256 = "18n6129fkgj85piid7v4zxxksv3h0amqp4p977vcl9xg3bq0zd2w";
url = "https://acpica.org/sites/acpica/files/acpica-unix2-20200925.tar.gz";
};
}
{
name = "nasm-2.15.05.tar.bz2";
archive = fetchurl {
sha256 = "1l1gxs5ncdbgz91lsl4y7w5aapask3w02q9inayb2m5bwlwq6jrw";
url = "https://www.nasm.us/pub/nasm/releasebuilds/2.15.05/nasm-2.15.05.tar.bz2";
};
}
]

View file

@ -0,0 +1,31 @@
#!/usr/bin/env nix-shell
#!nix-shell --pure -i bash -p nix cacert git getopt
rootdir="../../../../../"
src="$(nix-build $rootdir --no-out-link -A coreboot-toolchain.src)"
urls=$($src/util/crossgcc/buildgcc -u)
tmp=$(mktemp)
echo '{ fetchurl }: [' > $tmp
for url in $urls; do
name="$(basename $url)"
hash="$(nix-prefetch-url "$url")"
cat << EOF >> $tmp
{
name = "$name";
archive = fetchurl {
sha256 = "$hash";
url = "$url";
};
}
EOF
done
echo ']' >> $tmp
sed -ie 's/https\:\/\/ftpmirror\.gnu\.org/mirror\:\/\/gnu/g' $tmp
mv $tmp sources.nix

Some files were not shown because too many files have changed in this diff Show more