diff --git a/third_party/nixpkgs/.editorconfig b/third_party/nixpkgs/.editorconfig
index d8a320e495..6625cbf698 100644
--- a/third_party/nixpkgs/.editorconfig
+++ b/third_party/nixpkgs/.editorconfig
@@ -76,10 +76,12 @@ trim_trailing_whitespace = unset
[pkgs/build-support/dotnetenv/Wrapper/**]
end_of_line = unset
+indent_style = unset
insert_final_newline = unset
trim_trailing_whitespace = unset
[pkgs/build-support/upstream-updater/**]
+indent_style = unset
trim_trailing_whitespace = unset
[pkgs/development/compilers/elm/registry.dat]
@@ -96,6 +98,9 @@ trim_trailing_whitespace = unset
[pkgs/development/node-packages/composition.nix]
insert_final_newline = unset
+[pkgs/development/{perl-modules,ocaml-modules,tools/ocaml}/**]
+indent_style = unset
+
[pkgs/servers/dict/wordnet_structures.py]
trim_trailing_whitespace = unset
diff --git a/third_party/nixpkgs/.github/workflows/editorconfig.yml b/third_party/nixpkgs/.github/workflows/editorconfig.yml
index d61882c504..be7a4ba02b 100644
--- a/third_party/nixpkgs/.github/workflows/editorconfig.yml
+++ b/third_party/nixpkgs/.github/workflows/editorconfig.yml
@@ -2,6 +2,8 @@ name: "Checking EditorConfig"
on:
pull_request:
+ branches-ignore:
+ - 'release-**'
jobs:
tests:
@@ -23,5 +25,5 @@ jobs:
- name: Checking EditorConfig
if: env.GIT_DIFF
run: |
- ./bin/editorconfig-checker -disable-indentation \
+ ./bin/editorconfig-checker -disable-indent-size \
${{ env.GIT_DIFF }}
diff --git a/third_party/nixpkgs/doc/contributing/reviewing-contributions.xml b/third_party/nixpkgs/doc/contributing/reviewing-contributions.xml
index fe79d8d992..4fe51677f1 100644
--- a/third_party/nixpkgs/doc/contributing/reviewing-contributions.xml
+++ b/third_party/nixpkgs/doc/contributing/reviewing-contributions.xml
@@ -7,8 +7,8 @@
The following section is a draft, and the policy for reviewing is still being discussed in issues such as #11166 and #20836 .
+ xlink:href="https://github.com/NixOS/nixpkgs/issues/11166">#11166 and #20836 .
diff --git a/third_party/nixpkgs/doc/languages-frameworks/dotnet.section.md b/third_party/nixpkgs/doc/languages-frameworks/dotnet.section.md
index c56f4728be..88fd74db82 100644
--- a/third_party/nixpkgs/doc/languages-frameworks/dotnet.section.md
+++ b/third_party/nixpkgs/doc/languages-frameworks/dotnet.section.md
@@ -64,9 +64,9 @@ $ dotnet --info
The `dotnetCorePackages.sdk_X_Y` is preferred over the old dotnet-sdk as both major and minor version are very important for a dotnet environment. If a given minor version isn't present (or was changed), then this will likely break your ability to build a project.
-## dotnetCorePackages.sdk vs dotnetCorePackages.netcore vs dotnetCorePackages.aspnetcore
+## dotnetCorePackages.sdk vs vs dotnetCorePackages.net vs dotnetCorePackages.netcore vs dotnetCorePackages.aspnetcore
-The `dotnetCorePackages.sdk` contains both a runtime and the full sdk of a given version. The `netcore` and `aspnetcore` packages are meant to serve as minimal runtimes to deploy alongside already built applications.
+The `dotnetCorePackages.sdk` contains both a runtime and the full sdk of a given version. The `net`, `netcore` and `aspnetcore` packages are meant to serve as minimal runtimes to deploy alongside already built applications. For runtime versions >= .NET 5 `net` is used while `netcore` is used for older .NET Core runtime version.
## Packaging a Dotnet Application
diff --git a/third_party/nixpkgs/doc/stdenv/meta.xml b/third_party/nixpkgs/doc/stdenv/meta.xml
index 9cef936000..c9d1b13621 100644
--- a/third_party/nixpkgs/doc/stdenv/meta.xml
+++ b/third_party/nixpkgs/doc/stdenv/meta.xml
@@ -189,8 +189,7 @@ hello-2.3 A program that produces a familiar, friendly greeting
- A list of names and e-mail addresses of the maintainers of this Nix expression. If you would like to be a maintainer of a package, you may want to add yourself to nixpkgs/maintainers/maintainer-list.nix and write something like [ stdenv.lib.maintainers.alice stdenv.lib.maintainers.bob ] .
+ A list of the maintainers of this Nix expression. Maintainers are defined in nixpkgs/maintainers/maintainer-list.nix . There is no restriction to becoming a maintainer, just add yourself to that list in a separate commit titled 'maintainers: add alice', and reference maintainers with maintainers = with lib.maintainers; [ alice bob ] .
diff --git a/third_party/nixpkgs/lib/strings.nix b/third_party/nixpkgs/lib/strings.nix
index f62ff6679e..fbb48dec92 100644
--- a/third_party/nixpkgs/lib/strings.nix
+++ b/third_party/nixpkgs/lib/strings.nix
@@ -561,7 +561,9 @@ rec {
enableFeature false "shared"
=> "--disable-shared"
*/
- enableFeature = enable: feat: "--${if enable then "enable" else "disable"}-${feat}";
+ enableFeature = enable: feat:
+ assert isString feat; # e.g. passing openssl instead of "openssl"
+ "--${if enable then "enable" else "disable"}-${feat}";
/* Create an --{enable-=,disable-} string that can be passed to
standard GNU Autoconf scripts.
@@ -583,7 +585,9 @@ rec {
withFeature false "shared"
=> "--without-shared"
*/
- withFeature = with_: feat: "--${if with_ then "with" else "without"}-${feat}";
+ withFeature = with_: feat:
+ assert isString feat; # e.g. passing openssl instead of "openssl"
+ "--${if with_ then "with" else "without"}-${feat}";
/* Create an --{with-=,without-} string that can be passed to
standard GNU Autoconf scripts.
diff --git a/third_party/nixpkgs/maintainers/maintainer-list.nix b/third_party/nixpkgs/maintainers/maintainer-list.nix
index 48f847b3d1..611bb18912 100644
--- a/third_party/nixpkgs/maintainers/maintainer-list.nix
+++ b/third_party/nixpkgs/maintainers/maintainer-list.nix
@@ -1272,6 +1272,12 @@
githubId = 7214361;
name = "Roman Gerasimenko";
};
+ bburdette = {
+ email = "bburdette@protonmail.com";
+ github = "bburdette";
+ githubId = 157330;
+ name = "Ben Burdette";
+ };
bzizou = {
email = "Bruno@bzizou.net";
github = "bzizou";
@@ -2833,6 +2839,12 @@
fingerprint = "50B7 11F4 3DFD 2018 DCE6 E8D0 8A52 A140 BEBF 7D2C";
}];
};
+ fabianhjr = {
+ email = "fabianhjr@protonmail.com";
+ github = "fabianhjr";
+ githubId = 303897;
+ name = "Fabián Heredia Montiel";
+ };
fadenb = {
email = "tristan.helmich+nixos@gmail.com";
github = "fadenb";
@@ -3871,6 +3883,8 @@
};
jcumming = {
email = "jack@mudshark.org";
+ github = "jcumming";
+ githubId = 1982341;
name = "Jack Cummings";
};
jD91mZM2 = {
@@ -9958,4 +9972,10 @@
githubId = 19290397;
name = "Tunc Uzlu";
};
+ pulsation = {
+ name = "Philippe Sam-Long";
+ email = "1838397+pulsation@users.noreply.github.com";
+ github = "pulsation";
+ githubId = 1838397;
+ };
}
diff --git a/third_party/nixpkgs/nixos/doc/manual/configuration/gpu-accel.xml b/third_party/nixpkgs/nixos/doc/manual/configuration/gpu-accel.xml
index 95ee13f479..3695a5ff44 100644
--- a/third_party/nixpkgs/nixos/doc/manual/configuration/gpu-accel.xml
+++ b/third_party/nixpkgs/nixos/doc/manual/configuration/gpu-accel.xml
@@ -65,16 +65,16 @@ Platform Vendor Advanced Micro Devices, Inc.
AMD
- Modern AMD Graphics
- Core Next (GCN) GPUs are supported through the
- rocm-opencl-icd package. Adding this package to
- enables OpenCL
- support:
+ Modern AMD Graphics
+ Core Next (GCN) GPUs are supported through the
+ rocm-opencl-icd package. Adding this package to
+ enables OpenCL
+ support:
- = [
- rocm-opencl-icd
-];
+ = [
+ rocm-opencl-icd
+ ];
@@ -100,9 +100,9 @@ Platform Vendor Advanced Micro Devices, Inc.
support. For example, for Gen8 and later GPUs, the following
configuration can be used:
- = [
- intel-compute-runtime
-];
+ = [
+ intel-compute-runtime
+ ];
@@ -173,31 +173,31 @@ GPU1:
AMD
- Modern AMD Graphics
- Core Next (GCN) GPUs are supported through either radv, which is
- part of mesa , or the amdvlk package.
- Adding the amdvlk package to
- makes both drivers
- available for applications and lets them choose. A specific driver can
- be forced as follows:
+ Modern AMD Graphics
+ Core Next (GCN) GPUs are supported through either radv, which is
+ part of mesa , or the amdvlk package.
+ Adding the amdvlk package to
+ makes both drivers
+ available for applications and lets them choose. A specific driver can
+ be forced as follows:
- = [
- pkgs.amdvlk
-];
+ = [
+ pkgs.amdvlk
+ ];
-# To enable Vulkan support for 32-bit applications, also add:
- = [
- pkgs.driversi686Linux.amdvlk
-];
+ # To enable Vulkan support for 32-bit applications, also add:
+ = [
+ pkgs.driversi686Linux.amdvlk
+ ];
-# For amdvlk
- .VK_ICD_FILENAMES =
- "/run/opengl-driver/share/vulkan/icd.d/amd_icd64.json";
-# For radv
- .VK_ICD_FILENAMES =
- "/run/opengl-driver/share/vulkan/icd.d/radeon_icd.x86_64.json";
-
+ # For amdvlk
+ .VK_ICD_FILENAMES =
+ "/run/opengl-driver/share/vulkan/icd.d/amd_icd64.json";
+ # For radv
+ .VK_ICD_FILENAMES =
+ "/run/opengl-driver/share/vulkan/icd.d/radeon_icd.x86_64.json";
+
diff --git a/third_party/nixpkgs/nixos/doc/manual/contributing-to-this-manual.xml b/third_party/nixpkgs/nixos/doc/manual/contributing-to-this-manual.xml
index 9820e75fc3..935dd66bc1 100644
--- a/third_party/nixpkgs/nixos/doc/manual/contributing-to-this-manual.xml
+++ b/third_party/nixpkgs/nixos/doc/manual/contributing-to-this-manual.xml
@@ -12,7 +12,7 @@ xlink:href="https://github.com/NixOS/nixpkgs">Nixpkgs repository.
You can quickly check your edits with the following:
-$ cd /path/to/nixpkgs/nixos/doc/manual
+$ cd /path/to/nixpkgs
$ nix-build nixos/release.nix -A manual.x86_64-linux
diff --git a/third_party/nixpkgs/nixos/doc/manual/release-notes/rl-2009.xml b/third_party/nixpkgs/nixos/doc/manual/release-notes/rl-2009.xml
index 75c8adbf45..881a95a782 100644
--- a/third_party/nixpkgs/nixos/doc/manual/release-notes/rl-2009.xml
+++ b/third_party/nixpkgs/nixos/doc/manual/release-notes/rl-2009.xml
@@ -1593,30 +1593,30 @@ services.transmission.settings.rpc-bind-address = "0.0.0.0";
Agda has been heavily reworked.
-
-
- agda.mkDerivation has been heavily changed and
- is now located at agdaPackages.mkDerivation .
-
-
-
-
- New top-level packages agda and
- agda.withPackages have been added, the second
- of which sets up agda with access to chosen libraries.
-
-
-
-
- All agda libraries now live under
- agdaPackages .
-
-
-
-
- Many broken libraries have been removed.
-
-
+
+
+ agda.mkDerivation has been heavily changed and
+ is now located at agdaPackages.mkDerivation .
+
+
+
+
+ New top-level packages agda and
+ agda.withPackages have been added, the second
+ of which sets up agda with access to chosen libraries.
+
+
+
+
+ All agda libraries now live under
+ agdaPackages .
+
+
+
+
+ Many broken libraries have been removed.
+
+
See the new
diff --git a/third_party/nixpkgs/nixos/doc/manual/release-notes/rl-2103.xml b/third_party/nixpkgs/nixos/doc/manual/release-notes/rl-2103.xml
index 8c804ce047..62dcbd6184 100644
--- a/third_party/nixpkgs/nixos/doc/manual/release-notes/rl-2103.xml
+++ b/third_party/nixpkgs/nixos/doc/manual/release-notes/rl-2103.xml
@@ -23,6 +23,9 @@
Support is planned until the end of October 2021, handing over to 21.09.
+
+ GNOME desktop environment was upgraded to 3.38, see its release notes.
+
@@ -143,6 +146,20 @@
release notes for Mutt 2.0.
+
+
+ vim switched to Python 3, dropping all Python 2 support.
+
+
+
+
+ boot.zfs.forceImportAll
+ previously did nothing, but has been fixed. However its default has been
+ changed to false to preserve the existing default
+ behaviour. If you have this explicitly set to true ,
+ please note that your non-root pools will now be forcibly imported.
+
+
diff --git a/third_party/nixpkgs/nixos/doc/varlistentry-fixer.rb b/third_party/nixpkgs/nixos/doc/varlistentry-fixer.rb
index 6c7cc1e643..02168016b5 100755
--- a/third_party/nixpkgs/nixos/doc/varlistentry-fixer.rb
+++ b/third_party/nixpkgs/nixos/doc/varlistentry-fixer.rb
@@ -15,8 +15,8 @@ require "rexml/document"
include REXML
if ARGV.length < 1 then
- $stderr.puts "Needs a filename."
- exit 1
+ $stderr.puts "Needs a filename."
+ exit 1
end
filename = ARGV.shift
@@ -51,17 +51,17 @@ $touched = false
# Generates: --optionnamevalue
# ^^ ^^
doc.elements.each("//varlistentry/term") do |term|
- ["varname", "function", "option", "replaceable"].each do |prev_name|
- term.elements.each(prev_name) do |el|
- if el.next_element and
- el.next_element.name == "replaceable" and
- el.next_sibling_node.class == Element
- then
- $touched = true
- term.insert_after(el, Text.new(" "))
- end
- end
- end
+ ["varname", "function", "option", "replaceable"].each do |prev_name|
+ term.elements.each(prev_name) do |el|
+ if el.next_element and
+ el.next_element.name == "replaceable" and
+ el.next_sibling_node.class == Element
+ then
+ $touched = true
+ term.insert_after(el, Text.new(" "))
+ end
+ end
+ end
end
@@ -75,17 +75,17 @@ end
# Generates: -Ipath
# ^^
doc.elements.each("//cmdsynopsis/arg") do |term|
- ["option", "replaceable"].each do |prev_name|
- term.elements.each(prev_name) do |el|
- if el.next_element and
- el.next_element.name == "replaceable" and
- el.next_sibling_node.class == Element
- then
- $touched = true
- term.insert_after(el, Text.new(" "))
- end
- end
- end
+ ["option", "replaceable"].each do |prev_name|
+ term.elements.each(prev_name) do |el|
+ if el.next_element and
+ el.next_element.name == "replaceable" and
+ el.next_sibling_node.class == Element
+ then
+ $touched = true
+ term.insert_after(el, Text.new(" "))
+ end
+ end
+ end
end
#
@@ -104,21 +104,21 @@ end
# Generates: [{--profile-name | -p }name]
# ^^^^
doc.elements.each("//cmdsynopsis/arg") do |term|
- ["group"].each do |prev_name|
- term.elements.each(prev_name) do |el|
- if el.next_element and
- el.next_element.name == "replaceable" and
- el.next_sibling_node.class == Element
- then
- $touched = true
- term.insert_after(el, Text.new(" "))
- end
- end
- end
+ ["group"].each do |prev_name|
+ term.elements.each(prev_name) do |el|
+ if el.next_element and
+ el.next_element.name == "replaceable" and
+ el.next_sibling_node.class == Element
+ then
+ $touched = true
+ term.insert_after(el, Text.new(" "))
+ end
+ end
+ end
end
if $touched then
- doc.context[:attribute_quote] = :quote
- doc.write(output: File.open(filename, "w"))
+ doc.context[:attribute_quote] = :quote
+ doc.write(output: File.open(filename, "w"))
end
diff --git a/third_party/nixpkgs/nixos/modules/config/pulseaudio.nix b/third_party/nixpkgs/nixos/modules/config/pulseaudio.nix
index 408d0a9c33..a77524d75d 100644
--- a/third_party/nixpkgs/nixos/modules/config/pulseaudio.nix
+++ b/third_party/nixpkgs/nixos/modules/config/pulseaudio.nix
@@ -36,6 +36,8 @@ let
${addModuleIf cfg.zeroconf.discovery.enable "module-zeroconf-discover"}
${addModuleIf cfg.tcp.enable (concatStringsSep " "
([ "module-native-protocol-tcp" ] ++ allAnon ++ ipAnon))}
+ ${addModuleIf config.services.jack.jackd.enable "module-jack-sink"}
+ ${addModuleIf config.services.jack.jackd.enable "module-jack-source"}
${cfg.extraConfig}
'';
};
@@ -144,7 +146,9 @@ in {
package = mkOption {
type = types.package;
- default = pkgs.pulseaudio;
+ default = if config.services.jack.jackd.enable
+ then pkgs.pulseaudioFull
+ else pkgs.pulseaudio;
defaultText = "pkgs.pulseaudio";
example = literalExample "pkgs.pulseaudioFull";
description = ''
@@ -259,7 +263,7 @@ in {
(drv: drv.override { pulseaudio = overriddenPackage; })
cfg.extraModules;
modulePaths = builtins.map
- (drv: "${drv}/lib/pulse-${overriddenPackage.version}/modules")
+ (drv: "${drv}/${overriddenPackage.pulseDir}/modules")
# User-provided extra modules take precedence
(overriddenModules ++ [ overriddenPackage ]);
in lib.concatStringsSep ":" modulePaths;
@@ -284,6 +288,8 @@ in {
RestartSec = "500ms";
PassEnvironment = "DISPLAY";
};
+ } // optionalAttrs config.services.jack.jackd.enable {
+ environment.JACK_PROMISCUOUS_SERVER = "jackaudio";
};
sockets.pulseaudio = {
wantedBy = [ "sockets.target" ];
diff --git a/third_party/nixpkgs/nixos/modules/hardware/acpilight.nix b/third_party/nixpkgs/nixos/modules/hardware/acpilight.nix
index 34e8a22209..2de448a265 100644
--- a/third_party/nixpkgs/nixos/modules/hardware/acpilight.nix
+++ b/third_party/nixpkgs/nixos/modules/hardware/acpilight.nix
@@ -19,6 +19,7 @@ in
};
config = mkIf cfg.enable {
+ environment.systemPackages = with pkgs; [ acpilight ];
services.udev.packages = with pkgs; [ acpilight ];
};
}
diff --git a/third_party/nixpkgs/nixos/modules/module-list.nix b/third_party/nixpkgs/nixos/modules/module-list.nix
index 6ac12e4e13..0a38fa3173 100644
--- a/third_party/nixpkgs/nixos/modules/module-list.nix
+++ b/third_party/nixpkgs/nixos/modules/module-list.nix
@@ -542,6 +542,7 @@
./services/monitoring/kapacitor.nix
./services/monitoring/loki.nix
./services/monitoring/longview.nix
+ ./services/monitoring/mackerel-agent.nix
./services/monitoring/monit.nix
./services/monitoring/munin.nix
./services/monitoring/nagios.nix
diff --git a/third_party/nixpkgs/nixos/modules/programs/ssmtp.nix b/third_party/nixpkgs/nixos/modules/programs/ssmtp.nix
index 98ff21bd37..1f49ddc91b 100644
--- a/third_party/nixpkgs/nixos/modules/programs/ssmtp.nix
+++ b/third_party/nixpkgs/nixos/modules/programs/ssmtp.nix
@@ -142,6 +142,13 @@ in
config = mkIf cfg.enable {
+ assertions = [
+ {
+ assertion = cfg.useSTARTTLS -> cfg.useTLS;
+ message = "services.ssmtp.useSTARTTLS has no effect without services.ssmtp.useTLS";
+ }
+ ];
+
services.ssmtp.settings = mkMerge [
({
MailHub = cfg.hostName;
diff --git a/third_party/nixpkgs/nixos/modules/services/audio/jack.nix b/third_party/nixpkgs/nixos/modules/services/audio/jack.nix
index ceff366d0b..bee97dbfc6 100644
--- a/third_party/nixpkgs/nixos/modules/services/audio/jack.nix
+++ b/third_party/nixpkgs/nixos/modules/services/audio/jack.nix
@@ -246,6 +246,9 @@ in {
description = "JACK Audio Connection Kit";
serviceConfig = {
User = "jackaudio";
+ SupplementaryGroups = lib.optional
+ (config.hardware.pulseaudio.enable
+ && !config.hardware.pulseaudio.systemWide) "users";
ExecStart = "${cfg.jackd.package}/bin/jackd ${lib.escapeShellArgs cfg.jackd.extraOptions}";
LimitRTPRIO = 99;
LimitMEMLOCK = "infinity";
diff --git a/third_party/nixpkgs/nixos/modules/services/desktops/telepathy.nix b/third_party/nixpkgs/nixos/modules/services/desktops/telepathy.nix
index 34596bf781..8c50d860e5 100644
--- a/third_party/nixpkgs/nixos/modules/services/desktops/telepathy.nix
+++ b/third_party/nixpkgs/nixos/modules/services/desktops/telepathy.nix
@@ -38,6 +38,11 @@ with lib;
services.dbus.packages = [ pkgs.telepathy-mission-control ];
+ # Enable runtime optional telepathy in gnome-shell
+ services.xserver.desktopManager.gnome3.sessionPath = with pkgs; [
+ telepathy-glib
+ telepathy-logger
+ ];
};
}
diff --git a/third_party/nixpkgs/nixos/modules/services/hardware/bluetooth.nix b/third_party/nixpkgs/nixos/modules/services/hardware/bluetooth.nix
index 230492c6b0..6f5a6d3bf2 100644
--- a/third_party/nixpkgs/nixos/modules/services/hardware/bluetooth.nix
+++ b/third_party/nixpkgs/nixos/modules/services/hardware/bluetooth.nix
@@ -15,6 +15,8 @@ in {
hardware.bluetooth = {
enable = mkEnableOption "support for Bluetooth";
+ hsphfpd.enable = mkEnableOption "support for hsphfpd[-prototype] implementation";
+
powerOnBoot = mkOption {
type = types.bool;
default = true;
@@ -72,7 +74,8 @@ in {
};
};
- environment.systemPackages = [ bluez-bluetooth ];
+ environment.systemPackages = [ bluez-bluetooth ]
+ ++ optionals cfg.hsphfpd.enable [ pkgs.hsphfpd ];
environment.etc."bluetooth/main.conf"= {
source = pkgs.writeText "main.conf"
@@ -80,7 +83,8 @@ in {
};
services.udev.packages = [ bluez-bluetooth ];
- services.dbus.packages = [ bluez-bluetooth ];
+ services.dbus.packages = [ bluez-bluetooth ]
+ ++ optionals cfg.hsphfpd.enable [ pkgs.hsphfpd ];
systemd.packages = [ bluez-bluetooth ];
systemd.services = {
@@ -90,11 +94,31 @@ in {
# restarting can leave people without a mouse/keyboard
unitConfig.X-RestartIfChanged = false;
};
- };
+ }
+ // (optionalAttrs cfg.hsphfpd.enable {
+ hsphfpd = {
+ after = [ "bluetooth.service" ];
+ requires = [ "bluetooth.service" ];
+ wantedBy = [ "multi-user.target" ];
+
+ description = "A prototype implementation used for connecting HSP/HFP Bluetooth devices";
+ serviceConfig.ExecStart = "${pkgs.hsphfpd}/bin/hsphfpd.pl";
+ };
+ })
+ ;
systemd.user.services = {
obex.aliases = [ "dbus-org.bluez.obex.service" ];
- };
+ }
+ // (optionalAttrs cfg.hsphfpd.enable {
+ telephony_client = {
+ wantedBy = [ "default.target"];
+
+ description = "telephony_client for hsphfpd";
+ serviceConfig.ExecStart = "${pkgs.hsphfpd}/bin/telephony_client.pl";
+ };
+ })
+ ;
};
diff --git a/third_party/nixpkgs/nixos/modules/services/hardware/fwupd.nix b/third_party/nixpkgs/nixos/modules/services/hardware/fwupd.nix
index 222ac8e487..51eca19dca 100644
--- a/third_party/nixpkgs/nixos/modules/services/hardware/fwupd.nix
+++ b/third_party/nixpkgs/nixos/modules/services/hardware/fwupd.nix
@@ -11,8 +11,8 @@ let
"fwupd/daemon.conf" = {
source = pkgs.writeText "daemon.conf" ''
[fwupd]
- BlacklistDevices=${lib.concatStringsSep ";" cfg.blacklistDevices}
- BlacklistPlugins=${lib.concatStringsSep ";" cfg.blacklistPlugins}
+ DisabledDevices=${lib.concatStringsSep ";" cfg.disabledDevices}
+ DisabledPlugins=${lib.concatStringsSep ";" cfg.disabledPlugins}
'';
};
"fwupd/uefi.conf" = {
@@ -59,21 +59,21 @@ in {
'';
};
- blacklistDevices = mkOption {
+ disabledDevices = mkOption {
type = types.listOf types.str;
default = [];
example = [ "2082b5e0-7a64-478a-b1b2-e3404fab6dad" ];
description = ''
- Allow blacklisting specific devices by their GUID
+ Allow disabling specific devices by their GUID
'';
};
- blacklistPlugins = mkOption {
+ disabledPlugins = mkOption {
type = types.listOf types.str;
default = [];
example = [ "udev" ];
description = ''
- Allow blacklisting specific plugins
+ Allow disabling specific plugins
'';
};
@@ -105,11 +105,15 @@ in {
};
};
+ imports = [
+ (mkRenamedOptionModule [ "services" "fwupd" "blacklistDevices"] [ "services" "fwupd" "disabledDevices" ])
+ (mkRenamedOptionModule [ "services" "fwupd" "blacklistPlugins"] [ "services" "fwupd" "disabledPlugins" ])
+ ];
###### implementation
config = mkIf cfg.enable {
# Disable test related plug-ins implicitly so that users do not have to care about them.
- services.fwupd.blacklistPlugins = cfg.package.defaultBlacklistedPlugins;
+ services.fwupd.disabledPlugins = cfg.package.defaultDisabledPlugins;
environment.systemPackages = [ cfg.package ];
diff --git a/third_party/nixpkgs/nixos/modules/services/logging/promtail.nix b/third_party/nixpkgs/nixos/modules/services/logging/promtail.nix
index 834bb99bb1..19b12daa41 100644
--- a/third_party/nixpkgs/nixos/modules/services/logging/promtail.nix
+++ b/third_party/nixpkgs/nixos/modules/services/logging/promtail.nix
@@ -6,25 +6,14 @@ let
echo '${builtins.toJSON conf}' | ${pkgs.buildPackages.jq}/bin/jq 'del(._module)' > $out
'';
+ allowSystemdJournal = cfg.configuration ? scrape_configs && lib.any (v: v ? journal) cfg.configuration.scrape_configs;
in {
options.services.promtail = with types; {
enable = mkEnableOption "the Promtail ingresser";
+
configuration = mkOption {
- type = with lib.types; let
- valueType = nullOr (oneOf [
- bool
- int
- float
- str
- (lazyAttrsOf valueType)
- (listOf valueType)
- ]) // {
- description = "JSON value";
- emptyValue.value = {};
- deprecationMessage = null;
- };
- in valueType;
+ type = (pkgs.formats.json {}).type;
description = ''
Specify the configuration for Promtail in Nix.
'';
@@ -80,6 +69,8 @@ in {
RestrictRealtime = true;
MemoryDenyWriteExecute = true;
PrivateUsers = true;
+
+ SupplementaryGroups = lib.optional (allowSystemdJournal) "systemd-journal";
} // (optionalAttrs (!pkgs.stdenv.isAarch64) { # FIXME: figure out why this breaks on aarch64
SystemCallFilter = "@system-service";
});
diff --git a/third_party/nixpkgs/nixos/modules/services/misc/cfdyndns.nix b/third_party/nixpkgs/nixos/modules/services/misc/cfdyndns.nix
index dcf4160227..15af1f50da 100644
--- a/third_party/nixpkgs/nixos/modules/services/misc/cfdyndns.nix
+++ b/third_party/nixpkgs/nixos/modules/services/misc/cfdyndns.nix
@@ -6,6 +6,12 @@ let
cfg = config.services.cfdyndns;
in
{
+ imports = [
+ (mkRemovedOptionModule
+ [ "services" "cfdyndns" "apikey" ]
+ "Use services.cfdyndns.apikeyFile instead.")
+ ];
+
options = {
services.cfdyndns = {
enable = mkEnableOption "Cloudflare Dynamic DNS Client";
@@ -17,10 +23,12 @@ in
'';
};
- apikey = mkOption {
- type = types.str;
+ apikeyFile = mkOption {
+ default = null;
+ type = types.nullOr types.str;
description = ''
- The API Key to use to authenticate to CloudFlare.
+ The path to a file containing the API Key
+ used to authenticate with CloudFlare.
'';
};
@@ -45,13 +53,17 @@ in
Type = "simple";
User = config.ids.uids.cfdyndns;
Group = config.ids.gids.cfdyndns;
- ExecStart = "/bin/sh -c '${pkgs.cfdyndns}/bin/cfdyndns'";
};
environment = {
CLOUDFLARE_EMAIL="${cfg.email}";
- CLOUDFLARE_APIKEY="${cfg.apikey}";
CLOUDFLARE_RECORDS="${concatStringsSep "," cfg.records}";
};
+ script = ''
+ ${optionalString (cfg.apikeyFile != null) ''
+ export CLOUDFLARE_APIKEY="$(cat ${escapeShellArg cfg.apikeyFile})"
+ ''}
+ ${pkgs.cfdyndns}/bin/cfdyndns
+ '';
};
users.users = {
diff --git a/third_party/nixpkgs/nixos/modules/services/monitoring/loki.nix b/third_party/nixpkgs/nixos/modules/services/monitoring/loki.nix
index f4eec7e0d2..51cabaa274 100644
--- a/third_party/nixpkgs/nixos/modules/services/monitoring/loki.nix
+++ b/third_party/nixpkgs/nixos/modules/services/monitoring/loki.nix
@@ -39,7 +39,7 @@ in {
};
configuration = mkOption {
- type = types.attrs;
+ type = (pkgs.formats.json {}).type;
default = {};
description = ''
Specify the configuration for Loki in Nix.
@@ -78,6 +78,8 @@ in {
'';
}];
+ environment.systemPackages = [ pkgs.grafana-loki ]; # logcli
+
users.groups.${cfg.group} = { };
users.users.${cfg.user} = {
description = "Loki Service User";
diff --git a/third_party/nixpkgs/nixos/modules/services/monitoring/mackerel-agent.nix b/third_party/nixpkgs/nixos/modules/services/monitoring/mackerel-agent.nix
new file mode 100644
index 0000000000..7046de9d40
--- /dev/null
+++ b/third_party/nixpkgs/nixos/modules/services/monitoring/mackerel-agent.nix
@@ -0,0 +1,111 @@
+{ config, lib, pkgs, ... }:
+
+with lib;
+
+let
+ cfg = config.services.mackerel-agent;
+ settingsFmt = pkgs.formats.toml {};
+in {
+ options.services.mackerel-agent = {
+ enable = mkEnableOption "mackerel.io agent";
+
+ # the upstream package runs as root, but doesn't seem to be strictly
+ # necessary for basic functionality
+ runAsRoot = mkEnableOption "Whether to run as root.";
+
+ autoRetirement = mkEnableOption ''
+ Whether to automatically retire the host upon OS shutdown.
+ '';
+
+ apiKeyFile = mkOption {
+ type = types.path;
+ default = "";
+ example = "/run/keys/mackerel-api-key";
+ description = ''
+ Path to file containing the Mackerel API key. The file should contain a
+ single line of the following form:
+
+ apikey = "EXAMPLE_API_KEY"
+ '';
+ };
+
+ settings = mkOption {
+ description = ''
+ Options for mackerel-agent.conf.
+
+ Documentation:
+
+ '';
+
+ default = {};
+ example = {
+ verbose = false;
+ silent = false;
+ };
+
+ type = types.submodule {
+ freeformType = settingsFmt.type;
+
+ options.host_status = {
+ on_start = mkOption {
+ type = types.enum [ "working" "standby" "maintenance" "poweroff" ];
+ description = "Host status after agent startup.";
+ default = "working";
+ };
+ on_stop = mkOption {
+ type = types.enum [ "working" "standby" "maintenance" "poweroff" ];
+ description = "Host status after agent shutdown.";
+ default = "poweroff";
+ };
+ };
+
+ options.diagnostic =
+ mkEnableOption "Collect memory usage for the agent itself";
+ };
+ };
+ };
+
+ config = mkIf cfg.enable {
+ environment.systemPackages = with pkgs; [ mackerel-agent ];
+
+ environment.etc = {
+ "mackerel-agent/mackerel-agent.conf".source =
+ settingsFmt.generate "mackerel-agent.conf" cfg.settings;
+ "mackerel-agent/conf.d/api-key.conf".source = cfg.apiKeyFile;
+ };
+
+ services.mackerel-agent.settings = {
+ root = mkDefault "/var/lib/mackerel-agent";
+ pidfile = mkDefault "/run/mackerel-agent/mackerel-agent.pid";
+
+ # conf.d stores the symlink to cfg.apiKeyFile
+ include = mkDefault "/etc/mackerel-agent/conf.d/*.conf";
+ };
+
+ # upstream service file in https://git.io/JUt4Q
+ systemd.services.mackerel-agent = {
+ description = "mackerel.io agent";
+ after = [ "network-online.target" "nss-lookup.target" ];
+ wantedBy = [ "multi-user.target" ];
+ environment = {
+ MACKEREL_PLUGIN_WORKDIR = mkDefault "%C/mackerel-agent";
+ };
+ serviceConfig = {
+ DynamicUser = !cfg.runAsRoot;
+ PrivateTmp = mkDefault true;
+ CacheDirectory = "mackerel-agent";
+ ConfigurationDirectory = "mackerel-agent";
+ RuntimeDirectory = "mackerel-agent";
+ StateDirectory = "mackerel-agent";
+ ExecStart = "${pkgs.mackerel-agent}/bin/mackerel-agent supervise";
+ ExecStopPost = mkIf cfg.autoRetirement "${pkg.mackerel-agent}/bin/mackerel-agent retire -force";
+ ExecReload = "${pkgs.coreutils}/bin/kill -HUP $MAINPID";
+ LimitNOFILE = mkDefault 65536;
+ LimitNPROC = mkDefault 65536;
+ };
+ restartTriggers = [
+ config.environment.etc."mackerel-agent/mackerel-agent.conf".source
+ ];
+ };
+ };
+}
diff --git a/third_party/nixpkgs/nixos/modules/services/x11/desktop-managers/gnome3.nix b/third_party/nixpkgs/nixos/modules/services/x11/desktop-managers/gnome3.nix
index 9dfac56c7f..68a65d77d6 100644
--- a/third_party/nixpkgs/nixos/modules/services/x11/desktop-managers/gnome3.nix
+++ b/third_party/nixpkgs/nixos/modules/services/x11/desktop-managers/gnome3.nix
@@ -73,6 +73,7 @@ in
core-os-services.enable = mkEnableOption "essential services for GNOME3";
core-shell.enable = mkEnableOption "GNOME Shell services";
core-utilities.enable = mkEnableOption "GNOME core utilities";
+ core-developer-tools.enable = mkEnableOption "GNOME core developer tools";
games.enable = mkEnableOption "GNOME games";
experimental-features = {
@@ -322,6 +323,12 @@ in
gnome-shell
];
+ services.udev.packages = with pkgs.gnome3; [
+ # Force enable KMS modifiers for devices that require them.
+ # https://gitlab.gnome.org/GNOME/mutter/-/merge_requests/1443
+ mutter
+ ];
+
services.avahi.enable = mkDefault true;
xdg.portal.extraPortals = [
@@ -351,7 +358,7 @@ in
source-sans-pro
];
- # Adapt from https://gitlab.gnome.org/GNOME/gnome-build-meta/blob/gnome-3-36/elements/core/meta-gnome-core-shell.bst
+ # Adapt from https://gitlab.gnome.org/GNOME/gnome-build-meta/blob/gnome-3-38/elements/core/meta-gnome-core-shell.bst
environment.systemPackages = with pkgs.gnome3; [
adwaita-icon-theme
gnome-backgrounds
@@ -396,7 +403,7 @@ in
};
})
- # Adapt from https://gitlab.gnome.org/GNOME/gnome-build-meta/blob/gnome-3-36/elements/core/meta-gnome-core-utilities.bst
+ # Adapt from https://gitlab.gnome.org/GNOME/gnome-build-meta/blob/gnome-3-38/elements/core/meta-gnome-core-utilities.bst
(mkIf serviceCfg.core-utilities.enable {
environment.systemPackages = (with pkgs.gnome3; removePackagesByName [
baobab
@@ -415,16 +422,15 @@ in
gnome-logs
gnome-maps
gnome-music
- gnome-photos
+ pkgs.gnome-photos
gnome-screenshot
gnome-system-monitor
gnome-weather
nautilus
+ pkgs.gnome-connections
simple-scan
totem
yelp
- # Unsure if sensible for NixOS
- /* gnome-boxes */
] config.environment.gnome3.excludePackages);
# Enable default program modules
@@ -453,12 +459,43 @@ in
(mkIf serviceCfg.games.enable {
environment.systemPackages = (with pkgs.gnome3; removePackagesByName [
- aisleriot atomix five-or-more four-in-a-row gnome-chess gnome-klotski
- gnome-mahjongg gnome-mines gnome-nibbles gnome-robots gnome-sudoku
- gnome-taquin gnome-tetravex hitori iagno lightsoff quadrapassel
- swell-foop tali
+ aisleriot
+ atomix
+ five-or-more
+ four-in-a-row
+ gnome-chess
+ gnome-klotski
+ gnome-mahjongg
+ gnome-mines
+ gnome-nibbles
+ gnome-robots
+ gnome-sudoku
+ gnome-taquin
+ gnome-tetravex
+ hitori
+ iagno
+ lightsoff
+ quadrapassel
+ swell-foop
+ tali
] config.environment.gnome3.excludePackages);
})
+
+ # Adapt from https://gitlab.gnome.org/GNOME/gnome-build-meta/-/blob/3.38.0/elements/core/meta-gnome-core-developer-tools.bst
+ (mkIf serviceCfg.core-developer-tools.enable {
+ environment.systemPackages = (with pkgs.gnome3; removePackagesByName [
+ dconf-editor
+ devhelp
+ pkgs.gnome-builder
+ # boxes would make sense in this option, however
+ # it doesn't function well enough to be included
+ # in default configurations.
+ # https://github.com/NixOS/nixpkgs/issues/60908
+ /* gnome-boxes */
+ ] config.environment.gnome3.excludePackages);
+
+ services.sysprof.enable = true;
+ })
];
}
diff --git a/third_party/nixpkgs/nixos/modules/services/x11/desktop-managers/plasma5.nix b/third_party/nixpkgs/nixos/modules/services/x11/desktop-managers/plasma5.nix
index b4f45a24ef..8cc579af2c 100644
--- a/third_party/nixpkgs/nixos/modules/services/x11/desktop-managers/plasma5.nix
+++ b/third_party/nixpkgs/nixos/modules/services/x11/desktop-managers/plasma5.nix
@@ -367,7 +367,7 @@ in
security.pam.services.sddm.enableKwallet = true;
xdg.portal.enable = true;
- xdg.portal.extraPortals = [ pkgs.xdg-desktop-portal-kde ];
+ xdg.portal.extraPortals = [ plasma5.xdg-desktop-portal-kde ];
# Update the start menu for each user that is currently logged in
system.userActivationScripts.plasmaSetup = activationScript;
diff --git a/third_party/nixpkgs/nixos/modules/services/x11/display-managers/gdm.nix b/third_party/nixpkgs/nixos/modules/services/x11/display-managers/gdm.nix
index 25b424e485..e3c5adb973 100644
--- a/third_party/nixpkgs/nixos/modules/services/x11/display-managers/gdm.nix
+++ b/third_party/nixpkgs/nixos/modules/services/x11/display-managers/gdm.nix
@@ -160,7 +160,7 @@ in
];
# Otherwise GDM will not be able to start correctly and display Wayland sessions
- systemd.packages = with pkgs.gnome3; [ gnome-session gnome-shell ];
+ systemd.packages = with pkgs.gnome3; [ gdm gnome-session gnome-shell ];
environment.systemPackages = [ pkgs.gnome3.adwaita-icon-theme ];
systemd.services.display-manager.wants = [
diff --git a/third_party/nixpkgs/nixos/modules/system/activation/activation-script.nix b/third_party/nixpkgs/nixos/modules/system/activation/activation-script.nix
index ddfd1af4a3..18c77948cb 100644
--- a/third_party/nixpkgs/nixos/modules/system/activation/activation-script.nix
+++ b/third_party/nixpkgs/nixos/modules/system/activation/activation-script.nix
@@ -28,6 +28,20 @@ let
utillinux # needed for mount and mountpoint
];
+ scriptType = with types;
+ let scriptOptions =
+ { deps = mkOption
+ { type = types.listOf types.str;
+ default = [ ];
+ description = "List of dependencies. The script will run after these.";
+ };
+ text = mkOption
+ { type = types.lines;
+ description = "The content of the script.";
+ };
+ };
+ in either str (submodule { options = scriptOptions; });
+
in
{
@@ -40,16 +54,14 @@ in
default = {};
example = literalExample ''
- { stdio = {
- text = '''
- # Needed by some programs.
- ln -sfn /proc/self/fd /dev/fd
- ln -sfn /proc/self/fd/0 /dev/stdin
- ln -sfn /proc/self/fd/1 /dev/stdout
- ln -sfn /proc/self/fd/2 /dev/stderr
- ''';
- deps = [];
- };
+ { stdio.text =
+ '''
+ # Needed by some programs.
+ ln -sfn /proc/self/fd /dev/fd
+ ln -sfn /proc/self/fd/0 /dev/stdin
+ ln -sfn /proc/self/fd/1 /dev/stdout
+ ln -sfn /proc/self/fd/2 /dev/stderr
+ ''';
}
'';
@@ -62,7 +74,7 @@ in
idempotent and fast.
'';
- type = types.attrsOf types.unspecified; # FIXME
+ type = types.attrsOf scriptType;
apply = set: {
script =
@@ -125,7 +137,7 @@ in
idempotent and fast.
'';
- type = types.attrsOf types.unspecified;
+ type = with types; attrsOf scriptType;
apply = set: {
script = ''
diff --git a/third_party/nixpkgs/nixos/modules/system/boot/plymouth.nix b/third_party/nixpkgs/nixos/modules/system/boot/plymouth.nix
index 55e5b07ed6..ddf5ef8a0a 100644
--- a/third_party/nixpkgs/nixos/modules/system/boot/plymouth.nix
+++ b/third_party/nixpkgs/nixos/modules/system/boot/plymouth.nix
@@ -9,7 +9,7 @@ let
cfg = config.boot.plymouth;
- nixosBreezePlymouth = pkgs.breeze-plymouth.override {
+ nixosBreezePlymouth = pkgs.plasma5.breeze-plymouth.override {
logoFile = cfg.logo;
logoName = "nixos";
osName = "NixOS";
diff --git a/third_party/nixpkgs/nixos/modules/tasks/filesystems/zfs.nix b/third_party/nixpkgs/nixos/modules/tasks/filesystems/zfs.nix
index 9ca7c6fb34..7b6c227774 100644
--- a/third_party/nixpkgs/nixos/modules/tasks/filesystems/zfs.nix
+++ b/third_party/nixpkgs/nixos/modules/tasks/filesystems/zfs.nix
@@ -175,14 +175,10 @@ in
forceImportAll = mkOption {
type = types.bool;
- default = true;
+ default = false;
description = ''
Forcibly import all ZFS pool(s).
- This is enabled by default for backwards compatibility purposes, but it is highly
- recommended to disable this option, as it bypasses some of the safeguards ZFS uses
- to protect your ZFS pools.
-
If you set this option to false and NixOS subsequently fails to
import your non-root ZFS pool(s), you should manually import each pool with
"zpool import -f <pool-name>", and then reboot. You should only need to do
@@ -507,6 +503,7 @@ in
Type = "oneshot";
RemainAfterExit = true;
};
+ environment.ZFS_FORCE = optionalString cfgZfs.forceImportAll "-f";
script = (importLib {
# See comments at importLib definition.
zpoolCmd="${packages.zfsUser}/sbin/zpool";
diff --git a/third_party/nixpkgs/nixos/modules/virtualisation/qemu-vm.nix b/third_party/nixpkgs/nixos/modules/virtualisation/qemu-vm.nix
index 191d7c758c..33da920e94 100644
--- a/third_party/nixpkgs/nixos/modules/virtualisation/qemu-vm.nix
+++ b/third_party/nixpkgs/nixos/modules/virtualisation/qemu-vm.nix
@@ -744,16 +744,19 @@ in
(isEnabled "VIRTIO_PCI")
(isEnabled "VIRTIO_NET")
(isEnabled "EXT4_FS")
+ (isEnabled "NET_9P_VIRTIO")
+ (isEnabled "9P_FS")
(isYes "BLK_DEV")
(isYes "PCI")
- (isYes "EXPERIMENTAL")
(isYes "NETDEVICES")
(isYes "NET_CORE")
(isYes "INET")
(isYes "NETWORK_FILESYSTEMS")
- ] ++ optional (!cfg.graphics) [
+ ] ++ optionals (!cfg.graphics) [
(isYes "SERIAL_8250_CONSOLE")
(isYes "SERIAL_8250")
+ ] ++ optionals (cfg.writableStore) [
+ (isEnabled "OVERLAY_FS")
];
};
diff --git a/third_party/nixpkgs/nixos/tests/all-tests.nix b/third_party/nixpkgs/nixos/tests/all-tests.nix
index f71afdca58..868f15a1da 100644
--- a/third_party/nixpkgs/nixos/tests/all-tests.nix
+++ b/third_party/nixpkgs/nixos/tests/all-tests.nix
@@ -315,6 +315,7 @@ in
samba = handleTest ./samba.nix {};
sanoid = handleTest ./sanoid.nix {};
sbt = handleTest ./sbt.nix {};
+ sbt-extras = handleTest ./sbt-extras.nix {};
scala = handleTest ./scala.nix {};
sddm = handleTest ./sddm.nix {};
service-runner = handleTest ./service-runner.nix {};
@@ -347,6 +348,7 @@ in
systemd-binfmt = handleTestOn ["x86_64-linux"] ./systemd-binfmt.nix {};
systemd-boot = handleTest ./systemd-boot.nix {};
systemd-confinement = handleTest ./systemd-confinement.nix {};
+ systemd-journal = handleTest ./systemd-journal.nix {};
systemd-timesyncd = handleTest ./systemd-timesyncd.nix {};
systemd-networkd-vrf = handleTest ./systemd-networkd-vrf.nix {};
systemd-networkd = handleTest ./systemd-networkd.nix {};
diff --git a/third_party/nixpkgs/nixos/tests/installed-tests/default.nix b/third_party/nixpkgs/nixos/tests/installed-tests/default.nix
index 50ca8ad2b5..e5d7009bb7 100644
--- a/third_party/nixpkgs/nixos/tests/installed-tests/default.nix
+++ b/third_party/nixpkgs/nixos/tests/installed-tests/default.nix
@@ -94,6 +94,7 @@ in
glib-networking = callInstalledTest ./glib-networking.nix {};
gnome-photos = callInstalledTest ./gnome-photos.nix {};
graphene = callInstalledTest ./graphene.nix {};
+ gsconnect = callInstalledTest ./gsconnect.nix {};
ibus = callInstalledTest ./ibus.nix {};
libgdata = callInstalledTest ./libgdata.nix {};
glib-testing = callInstalledTest ./glib-testing.nix {};
diff --git a/third_party/nixpkgs/nixos/tests/installed-tests/fwupd.nix b/third_party/nixpkgs/nixos/tests/installed-tests/fwupd.nix
index 6a0ceb57dd..a8a683a1af 100644
--- a/third_party/nixpkgs/nixos/tests/installed-tests/fwupd.nix
+++ b/third_party/nixpkgs/nixos/tests/installed-tests/fwupd.nix
@@ -5,7 +5,7 @@ makeInstalledTest {
testConfig = {
services.fwupd.enable = true;
- services.fwupd.blacklistPlugins = lib.mkForce []; # don't blacklist test plugin
+ services.fwupd.disabledPlugins = lib.mkForce []; # don't disable test plugin
services.fwupd.enableTestRemote = true;
virtualisation.memorySize = 768;
};
diff --git a/third_party/nixpkgs/nixos/tests/installed-tests/gsconnect.nix b/third_party/nixpkgs/nixos/tests/installed-tests/gsconnect.nix
new file mode 100644
index 0000000000..ac39f74357
--- /dev/null
+++ b/third_party/nixpkgs/nixos/tests/installed-tests/gsconnect.nix
@@ -0,0 +1,7 @@
+{ pkgs, makeInstalledTest, ... }:
+
+makeInstalledTest {
+ tested = pkgs.gnomeExtensions.gsconnect;
+
+ withX11 = true;
+}
diff --git a/third_party/nixpkgs/nixos/tests/loki.nix b/third_party/nixpkgs/nixos/tests/loki.nix
index eaee717cf8..bede775b7d 100644
--- a/third_party/nixpkgs/nixos/tests/loki.nix
+++ b/third_party/nixpkgs/nixos/tests/loki.nix
@@ -45,6 +45,8 @@ import ./make-test-python.nix ({ lib, pkgs, ... }:
machine.wait_for_open_port(3100)
machine.wait_for_open_port(9080)
machine.succeed("echo 'Loki Ingestion Test' > /var/log/testlog")
+ # should not have access to journal unless specified
+ machine.fail("systemctl show --property=SupplementaryGroups promtail | grep -q systemd-journal")
machine.wait_until_succeeds(
"${pkgs.grafana-loki}/bin/logcli --addr='http://localhost:3100' query --no-labels '{job=\"varlogs\",filename=\"/var/log/testlog\"}' | grep -q 'Loki Ingestion Test'"
)
diff --git a/third_party/nixpkgs/nixos/tests/sbt-extras.nix b/third_party/nixpkgs/nixos/tests/sbt-extras.nix
new file mode 100644
index 0000000000..d63113f943
--- /dev/null
+++ b/third_party/nixpkgs/nixos/tests/sbt-extras.nix
@@ -0,0 +1,16 @@
+import ./make-test-python.nix ({ pkgs, ...} : {
+ name = "sbt-extras";
+ meta = with pkgs.stdenv.lib.maintainers; {
+ maintainers = [ nequissimus ];
+ };
+
+ machine = { pkgs, ... }:
+ {
+ environment.systemPackages = [ pkgs.sbt-extras ];
+ };
+
+ testScript =
+ ''
+ machine.succeed("(sbt -h)")
+ '';
+})
diff --git a/third_party/nixpkgs/nixos/tests/systemd-journal.nix b/third_party/nixpkgs/nixos/tests/systemd-journal.nix
new file mode 100644
index 0000000000..c50c151ae1
--- /dev/null
+++ b/third_party/nixpkgs/nixos/tests/systemd-journal.nix
@@ -0,0 +1,20 @@
+import ./make-test-python.nix ({ pkgs, ... }:
+
+{
+ name = "systemd-journal";
+ meta = with pkgs.stdenv.lib.maintainers; {
+ maintainers = [ lewo ];
+ };
+
+ machine = { pkgs, lib, ... }: {
+ services.journald.enableHttpGateway = true;
+ };
+
+ testScript = ''
+ machine.wait_for_unit("multi-user.target")
+
+ machine.succeed(
+ "${pkgs.curl}/bin/curl -s localhost:19531/machine | ${pkgs.jq}/bin/jq -e '.hostname == \"machine\"'"
+ )
+ '';
+})
diff --git a/third_party/nixpkgs/nixos/tests/zfs.nix b/third_party/nixpkgs/nixos/tests/zfs.nix
index 87e6c900c9..e05cd54022 100644
--- a/third_party/nixpkgs/nixos/tests/zfs.nix
+++ b/third_party/nixpkgs/nixos/tests/zfs.nix
@@ -18,7 +18,7 @@ let
maintainers = [ adisbladis ];
};
- machine = { pkgs, ... }: {
+ machine = { pkgs, lib, ... }: {
virtualisation.emptyDiskImages = [ 4096 ];
networking.hostId = "deadbeef";
boot.kernelPackages = kernelPackage;
@@ -26,6 +26,24 @@ let
boot.zfs.enableUnstable = enableUnstable;
environment.systemPackages = [ pkgs.parted ];
+
+ # Setup regular fileSystems machinery to ensure forceImportAll can be
+ # tested via the regular service units.
+ fileSystems = lib.mkVMOverride {
+ "/forcepool" = {
+ device = "forcepool";
+ fsType = "zfs";
+ options = [ "noauto" ];
+ };
+ };
+
+ # forcepool doesn't exist at first boot, and we need to manually test
+ # the import after tweaking the hostId.
+ systemd.services.zfs-import-forcepool.wantedBy = lib.mkVMOverride [];
+ systemd.targets.zfs.wantedBy = lib.mkVMOverride [];
+ boot.zfs.forceImportAll = true;
+ # /dev/disk/by-id doesn't get populated in the NixOS test framework
+ boot.zfs.devNodes = "/dev/disk/by-uuid";
};
testScript = ''
@@ -57,6 +75,21 @@ let
"zpool destroy rpool",
"udevadm settle",
)
+
+ with subtest("boot.zfs.forceImportAll works"):
+ machine.succeed(
+ "rm /etc/hostid",
+ "zgenhostid deadcafe",
+ "zpool create forcepool /dev/vdb1 -O mountpoint=legacy",
+ )
+ machine.shutdown()
+ machine.start()
+ machine.succeed("udevadm settle")
+ machine.fail("zpool import forcepool")
+ machine.succeed(
+ "systemctl start zfs-import-forcepool.service",
+ "mount -t zfs forcepool /tmp/mnt",
+ )
'' + extraTest;
};
diff --git a/third_party/nixpkgs/pkgs/applications/accessibility/contrast/default.nix b/third_party/nixpkgs/pkgs/applications/accessibility/contrast/default.nix
index 192bf041c6..8f70f632cd 100644
--- a/third_party/nixpkgs/pkgs/applications/accessibility/contrast/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/accessibility/contrast/default.nix
@@ -6,7 +6,7 @@
, gettext
, glib
, gtk3
-, libhandy
+, libhandy_0
, meson
, ninja
, pango
@@ -48,7 +48,7 @@ rustPlatform.buildRustPackage rec {
dbus
glib
gtk3
- libhandy
+ libhandy_0
pango
];
diff --git a/third_party/nixpkgs/pkgs/applications/audio/ft2-clone/default.nix b/third_party/nixpkgs/pkgs/applications/audio/ft2-clone/default.nix
index 20618e3c5d..5ee7a4d9c7 100644
--- a/third_party/nixpkgs/pkgs/applications/audio/ft2-clone/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/audio/ft2-clone/default.nix
@@ -9,13 +9,13 @@
stdenv.mkDerivation rec {
pname = "ft2-clone";
- version = "1.37";
+ version = "1.39";
src = fetchFromGitHub {
owner = "8bitbubsy";
repo = "ft2-clone";
rev = "v${version}";
- sha256 = "1lhpzd46mpr3bq13qhd0bq724db5fhc8jplfb684c2q7sc4v92nk";
+ sha256 = "0vc7gni24q649b53flz7rlgnc5xl2dqdklgwc2brj380a5s7g6m7";
};
nativeBuildInputs = [ cmake ];
diff --git a/third_party/nixpkgs/pkgs/applications/audio/gnome-podcasts/default.nix b/third_party/nixpkgs/pkgs/applications/audio/gnome-podcasts/default.nix
index c7df55118c..cf3a8ae419 100644
--- a/third_party/nixpkgs/pkgs/applications/audio/gnome-podcasts/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/audio/gnome-podcasts/default.nix
@@ -10,7 +10,7 @@
, python3
, pkgconfig
, glib
-, libhandy
+, libhandy_0
, gtk3
, dbus
, openssl
@@ -48,7 +48,7 @@ rustPlatform.buildRustPackage rec {
buildInputs = [
glib
gtk3
- libhandy
+ libhandy_0
dbus
openssl
sqlite
diff --git a/third_party/nixpkgs/pkgs/applications/audio/lollypop/default.nix b/third_party/nixpkgs/pkgs/applications/audio/lollypop/default.nix
index f325185920..14ab2aaf2d 100644
--- a/third_party/nixpkgs/pkgs/applications/audio/lollypop/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/audio/lollypop/default.nix
@@ -7,6 +7,7 @@
, python3
, gtk3
, gst_all_1
+, libhandy
, libsecret
, libsoup
, appstream-glib
@@ -24,7 +25,7 @@
python3.pkgs.buildPythonApplication rec {
pname = "lollypop";
- version = "1.3.2";
+ version = "1.4.5";
format = "other";
doCheck = false;
@@ -33,7 +34,7 @@ python3.pkgs.buildPythonApplication rec {
url = "https://gitlab.gnome.org/World/lollypop";
rev = "refs/tags/${version}";
fetchSubmodules = true;
- sha256 = "14854j1dhq67s1vzs0lqy345vbl6f5w8nb36n4i33fmpva2flsk3";
+ sha256 = "1i5qcpp3fpkda08g6nkiiff8lsjmv5xsvpa0512kigq5z0lsagrx";
};
nativeBuildInputs = [
@@ -57,6 +58,7 @@ python3.pkgs.buildPythonApplication rec {
gst-plugins-ugly
gstreamer
gtk3
+ libhandy
libsoup
pango
totem-pl-parser
diff --git a/third_party/nixpkgs/pkgs/applications/audio/musikcube/default.nix b/third_party/nixpkgs/pkgs/applications/audio/musikcube/default.nix
index 8fc0616ff7..5f0eb61a5b 100644
--- a/third_party/nixpkgs/pkgs/applications/audio/musikcube/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/audio/musikcube/default.nix
@@ -17,13 +17,13 @@
stdenv.mkDerivation rec {
pname = "musikcube";
- version = "0.93.1";
+ version = "0.94.0";
src = fetchFromGitHub {
owner = "clangen";
repo = pname;
rev = version;
- sha256 = "05qsxyr7x8l0vlmn4yjg4gglxvcw9raf6vfzvblsl2ngsdsrnizy";
+ sha256 = "0hifyawsr38vsx12aqw38nms4kzbaghihib1r80x56f1jjsdhww0";
};
nativeBuildInputs = [
diff --git a/third_party/nixpkgs/pkgs/applications/audio/pulseaudio-modules-bt/default.nix b/third_party/nixpkgs/pkgs/applications/audio/pulseaudio-modules-bt/default.nix
index 556dd5f106..42e780af09 100644
--- a/third_party/nixpkgs/pkgs/applications/audio/pulseaudio-modules-bt/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/audio/pulseaudio-modules-bt/default.nix
@@ -18,8 +18,12 @@
let
pulseSources = runCommand "pulseaudio-sources" {} ''
mkdir $out
- tar -xf ${pulseaudio.src}
- mv pulseaudio*/* $out/
+ if [ -d ${pulseaudio.src} ]; then
+ ln -s ${pulseaudio.src}/* $out/
+ else
+ tar -xf ${pulseaudio.src}
+ mv pulseaudio*/* $out/
+ fi
'';
in stdenv.mkDerivation rec {
@@ -61,7 +65,7 @@ in stdenv.mkDerivation rec {
# Pulseaudio version is detected with a -rebootstrapped suffix which build system assumptions
substituteInPlace config.h.in --replace PulseAudio_VERSION ${pulseaudio.version}
- substituteInPlace CMakeLists.txt --replace '${"\${PulseAudio_VERSION}"}' ${pulseaudio.version}
+ substituteInPlace CMakeLists.txt --replace '${"\${PULSE_DIR}"}' ${pulseaudio.pulseDir}
# Fraunhofer recommends to enable afterburner but upstream has it set to false by default
substituteInPlace src/modules/bluetooth/a2dp/a2dp_aac.c \
@@ -72,7 +76,7 @@ in stdenv.mkDerivation rec {
for so in $out/lib/pulse-${pulseaudio.version}/modules/*.so; do
orig_rpath=$(patchelf --print-rpath "$so")
patchelf \
- --set-rpath "${ldacbt}/lib:${lib.getLib ffmpeg}/lib:$out/lib/pulse-${pulseaudio.version}/modules:$orig_rpath" \
+ --set-rpath "${ldacbt}/lib:${lib.getLib ffmpeg}/lib:$out/${pulseaudio.pulseDir}/modules:$orig_rpath" \
"$so"
done
'';
diff --git a/third_party/nixpkgs/pkgs/applications/audio/pulseaudio-modules-bt/fix-install-path.patch b/third_party/nixpkgs/pkgs/applications/audio/pulseaudio-modules-bt/fix-install-path.patch
index 3c498fe8af..7cdb7de4dd 100644
--- a/third_party/nixpkgs/pkgs/applications/audio/pulseaudio-modules-bt/fix-install-path.patch
+++ b/third_party/nixpkgs/pkgs/applications/audio/pulseaudio-modules-bt/fix-install-path.patch
@@ -8,4 +8,4 @@ index 8d20dbf..63fe7ba 100644
module-bluetooth-policy
- LIBRARY DESTINATION ${PulseAudio_modlibexecdir})
-
-+ LIBRARY DESTINATION ${CMAKE_INSTALL_PREFIX}/lib/pulse-${PulseAudio_VERSION}/modules/)
++ LIBRARY DESTINATION ${CMAKE_INSTALL_PREFIX}/${PULSE_DIR}/modules/)
diff --git a/third_party/nixpkgs/pkgs/applications/audio/qmmp/default.nix b/third_party/nixpkgs/pkgs/applications/audio/qmmp/default.nix
index 84ff9f787d..e6f41711fd 100644
--- a/third_party/nixpkgs/pkgs/applications/audio/qmmp/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/audio/qmmp/default.nix
@@ -29,11 +29,11 @@
# handle that.
mkDerivation rec {
- name = "qmmp-1.4.1";
+ name = "qmmp-1.4.2";
src = fetchurl {
url = "http://qmmp.ylsoftware.com/files/${name}.tar.bz2";
- sha256 = "0p18r2ri75vbyjzfa7bcl1dm372m6jvn9zj2p5ia2rh1g77fbm9a";
+ sha256 = "1kvzw0n90crg3dgy8834qrjv0zb3ia5cny7virax9ax73y653jfa";
};
nativeBuildInputs = [ cmake pkgconfig ];
diff --git a/third_party/nixpkgs/pkgs/applications/audio/qtractor/default.nix b/third_party/nixpkgs/pkgs/applications/audio/qtractor/default.nix
index 2975e6464e..961314088d 100644
--- a/third_party/nixpkgs/pkgs/applications/audio/qtractor/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/audio/qtractor/default.nix
@@ -5,11 +5,11 @@
stdenv.mkDerivation rec {
pname = "qtractor";
- version = "0.9.15";
+ version = "0.9.18";
src = fetchurl {
url = "mirror://sourceforge/${pname}/${pname}-${version}.tar.gz";
- sha256 = "0k7a6llwrzs07flr9mvzvay9ygc2x64syg8npyabsw5a4d85fwsx";
+ sha256 = "121vmygdzp37p6f93f8dbbg2m2r55j7amyiapzkqgypgn4vfdbwr";
};
nativeBuildInputs = [
diff --git a/third_party/nixpkgs/pkgs/applications/audio/shortwave/default.nix b/third_party/nixpkgs/pkgs/applications/audio/shortwave/default.nix
index 055694fb40..3572bbf88a 100644
--- a/third_party/nixpkgs/pkgs/applications/audio/shortwave/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/audio/shortwave/default.nix
@@ -8,7 +8,7 @@
, glib
, gst_all_1
, gtk3
-, libhandy
+, libhandy_0
, meson
, ninja
, openssl
@@ -53,7 +53,7 @@ rustPlatform.buildRustPackage rec {
gdk-pixbuf
glib
gtk3
- libhandy
+ libhandy_0
openssl
sqlite
] ++ (with gst_all_1; [
diff --git a/third_party/nixpkgs/pkgs/applications/backup/deja-dup/default.nix b/third_party/nixpkgs/pkgs/applications/backup/deja-dup/default.nix
index ad4fc9728b..c65d5bbc09 100644
--- a/third_party/nixpkgs/pkgs/applications/backup/deja-dup/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/backup/deja-dup/default.nix
@@ -12,7 +12,7 @@
, coreutils
, libsoup
, libsecret
-, libhandy
+, libhandy_0
, wrapGAppsHook
, libgpgerror
, json-glib
@@ -53,7 +53,7 @@ stdenv.mkDerivation rec {
glib
gtk3
libsecret
- libhandy
+ libhandy_0
libgpgerror
json-glib
];
diff --git a/third_party/nixpkgs/pkgs/applications/blockchains/ergo/default.nix b/third_party/nixpkgs/pkgs/applications/blockchains/ergo/default.nix
index 706acebba5..6b686d0b2d 100644
--- a/third_party/nixpkgs/pkgs/applications/blockchains/ergo/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/blockchains/ergo/default.nix
@@ -2,11 +2,11 @@
stdenv.mkDerivation rec {
pname = "ergo";
- version = "3.3.5";
+ version = "3.3.6";
src = fetchurl {
url = "https://github.com/ergoplatform/ergo/releases/download/v${version}/ergo-${version}.jar";
- sha256 = "0bxzpwwb42bppqli3zggx3lah7g6kwmy6k6k6dinypj6x0bafqcg";
+ sha256 = "1zi559ixjxxsrpvvjbxa1d0g96px3h9amjvy149sfhp7b8w5hhk3";
};
nativeBuildInputs = [ makeWrapper ];
diff --git a/third_party/nixpkgs/pkgs/applications/blockchains/freicoin.nix b/third_party/nixpkgs/pkgs/applications/blockchains/freicoin.nix
deleted file mode 100644
index cc28fff96c..0000000000
--- a/third_party/nixpkgs/pkgs/applications/blockchains/freicoin.nix
+++ /dev/null
@@ -1,41 +0,0 @@
-{ fetchFromGitHub, stdenv, db, boost, gmp, mpfr, qt4, qmake4Hook }:
-
-stdenv.mkDerivation rec {
- version = "0.8.6-2";
- pname = "freicoin";
-
- src = fetchFromGitHub {
- owner = "freicoin";
- repo = "freicoin";
- rev = "v${version}";
- sha256 = "1v1qwv4x5agjba82s1vknmdgq67y26wzdwbmwwqavv7f7y3y860h";
- };
-
- enableParallelBuilding = false;
-
- qmakeFlags = ["USE_UPNP=-"];
-
- # I think that openssl and zlib are required, but come through other
- # packages
-
- preBuild = "unset AR";
-
- installPhase = ''
- mkdir -p $out/bin
- cp freicoin-qt $out/bin
- '';
-
- nativeBuildInputs = [ qmake4Hook ];
- buildInputs = [ db boost gmp mpfr qt4 ];
-
- meta = with stdenv.lib; {
- description = "Peer-to-peer currency with demurrage fee";
- homepage = "http://freicoi.in/";
- license = licenses.mit;
- maintainers = [ maintainers.viric ];
- platforms = platforms.linux;
-
- # upstream doesn't support newer openssl versions, use 1.0.1 for testing
- broken = true;
- };
-}
diff --git a/third_party/nixpkgs/pkgs/applications/blockchains/openethereum/default.nix b/third_party/nixpkgs/pkgs/applications/blockchains/openethereum/default.nix
index 7d5acc6205..563b2378f8 100644
--- a/third_party/nixpkgs/pkgs/applications/blockchains/openethereum/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/blockchains/openethereum/default.nix
@@ -5,23 +5,23 @@
, llvmPackages
, openssl
, pkg-config
+, stdenv
, systemd
+, darwin
}:
rustPlatform.buildRustPackage rec {
pname = "openethereum";
- version = "3.0.1";
+ version = "3.1.0";
src = fetchFromGitHub {
owner = "openethereum";
repo = "openethereum";
rev = "v${version}";
- sha256 = "08dkcrga1x18csh6pw6f54x5xwijppyjhg46cf4p452xc1l3a6ir";
+ sha256 = "cs84Zz0nhagGDu5sDFTaFZF3SPEgJU8F4vGX7KLihOM=";
};
- cargoSha256 = "1xliragihwjfc5qmfm0ng519bw8a28m1w1yqcl9mpk8zywiybaah";
-
- cargoPatches = [ ./lock.patch ];
+ cargoSha256 = "6suNkHw1BbISb0MkYkUaD+mpUal+kn3y1SFVqzJFqJc=";
LIBCLANG_PATH = "${llvmPackages.libclang}/lib";
nativeBuildInputs = [
@@ -31,7 +31,9 @@ rustPlatform.buildRustPackage rec {
pkg-config
];
- buildInputs = [ openssl systemd ];
+ buildInputs = [ openssl ]
+ ++ stdenv.lib.optionals stdenv.isLinux [ systemd ]
+ ++ stdenv.lib.optionals stdenv.isDarwin [ darwin.Security ];
cargoBuildFlags = [ "--features final" ];
@@ -43,6 +45,6 @@ rustPlatform.buildRustPackage rec {
homepage = "http://parity.io/ethereum";
license = licenses.gpl3;
maintainers = with maintainers; [ akru xrelkd ];
- platforms = platforms.linux;
+ platforms = stdenv.lib.platforms.unix;
};
}
diff --git a/third_party/nixpkgs/pkgs/applications/blockchains/openethereum/lock.patch b/third_party/nixpkgs/pkgs/applications/blockchains/openethereum/lock.patch
deleted file mode 100644
index 66709480bb..0000000000
--- a/third_party/nixpkgs/pkgs/applications/blockchains/openethereum/lock.patch
+++ /dev/null
@@ -1,20 +0,0 @@
---- /nix/store/hv764a65zmfzw5scjhz5839agv10da6x-source/Cargo.lock 1969-12-31 16:00:01.000000000 -0800
-+++ ./Cargo.lock 2020-07-31 21:30:31.146750066 -0700
-@@ -3113,7 +3113,7 @@
-
- [[package]]
- name = "openethereum"
--version = "3.0.0"
-+version = "3.0.1"
- dependencies = [
- "ansi_term",
- "atty",
-@@ -3562,7 +3562,7 @@
-
- [[package]]
- name = "parity-version"
--version = "3.0.0"
-+version = "3.0.1"
- dependencies = [
- "parity-bytes",
- "rlp",
diff --git a/third_party/nixpkgs/pkgs/applications/blockchains/pivx.nix b/third_party/nixpkgs/pkgs/applications/blockchains/pivx.nix
index 16ea2dc43e..5a59bb4b7d 100644
--- a/third_party/nixpkgs/pkgs/applications/blockchains/pivx.nix
+++ b/third_party/nixpkgs/pkgs/applications/blockchains/pivx.nix
@@ -52,7 +52,7 @@ stdenv.mkDerivation rec {
Zero Knowledge cryptography proofs for industry-leading transaction anonymity.
'';
license = licenses.mit;
- homepage = "https://www.dash.org";
+ homepage = "https://pivx.org";
maintainers = with maintainers; [ wucke13 ];
platforms = platforms.unix;
};
diff --git a/third_party/nixpkgs/pkgs/applications/blockchains/polkadot/default.nix b/third_party/nixpkgs/pkgs/applications/blockchains/polkadot/default.nix
index 1938254455..866adeea27 100644
--- a/third_party/nixpkgs/pkgs/applications/blockchains/polkadot/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/blockchains/polkadot/default.nix
@@ -7,16 +7,16 @@
}:
rustPlatform.buildRustPackage rec {
pname = "polkadot";
- version = "0.8.26";
+ version = "0.8.26-1";
src = fetchFromGitHub {
owner = "paritytech";
repo = "polkadot";
rev = "v${version}";
- sha256 = "1bvma6k3gsjqh8w76k4kf52sjg8wxn1b7a409kmnmmvmd9j6z5ia";
+ sha256 = "17ji1gjrx3gzw4msaz9kgvm132y14wgh8z183l3mfw1cj44a6kqk";
};
- cargoSha256 = "0pacmmvvjgzmaxgg47qbfhqwl02jxj3i6vnmkjbj9npzqfmqf72d";
+ cargoSha256 = "07zwlwx02xw1y20br2c4grwv7bprhynqy7gav4qh3vw117ijpiqk";
nativeBuildInputs = [ clang ];
diff --git a/third_party/nixpkgs/pkgs/applications/blockchains/turbo-geth.nix b/third_party/nixpkgs/pkgs/applications/blockchains/turbo-geth.nix
new file mode 100644
index 0000000000..163d87ee88
--- /dev/null
+++ b/third_party/nixpkgs/pkgs/applications/blockchains/turbo-geth.nix
@@ -0,0 +1,29 @@
+{ stdenv, buildGoModule, fetchFromGitHub }:
+
+buildGoModule rec {
+ pname = "turbo-geth";
+ version = "2020.11.01";
+
+ src = fetchFromGitHub {
+ owner = "ledgerwatch";
+ repo = pname;
+ rev = "v${version}";
+ sha256 = "0hm8kqd0w231mlclsmsghf15r8pbrs5g064mkpx59qpqzk37lgss";
+ };
+
+ vendorSha256 = "0b7ldrnwkz3r1d4fw95hvvpi3bz56d9v8p2mjzdvlpk5zhl2a37p";
+ runVend = true;
+
+ subPackages = [
+ "cmd/tg"
+ "cmd/restapi"
+ "cmd/rpcdaemon"
+ ];
+
+ meta = with stdenv.lib; {
+ homepage = "https://github.com/ledgerwatch/turbo-geth/";
+ description = "Ethereum node and geth fork focused on scalability and modularity";
+ license = with licenses; [ lgpl3 gpl3 ];
+ maintainers = with maintainers; [ xwvvvvwx ];
+ };
+}
diff --git a/third_party/nixpkgs/pkgs/applications/editors/android-studio/default.nix b/third_party/nixpkgs/pkgs/applications/editors/android-studio/default.nix
index cca7b0b2f4..51c7ebcc90 100644
--- a/third_party/nixpkgs/pkgs/applications/editors/android-studio/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/editors/android-studio/default.nix
@@ -9,9 +9,9 @@ let
inherit buildFHSUserEnv;
};
stableVersion = {
- version = "4.1.0.19"; # "Android Studio 4.1.0"
- build = "201.6858069";
- sha256Hash = "sha256-S5Uh/EpjE61l/z4UsPP7UEJ9Rk/hQidVVWX0bg/60gI=";
+ version = "4.1.1.0"; # "Android Studio 4.1.1"
+ build = "201.6953283";
+ sha256Hash = "sha256-aAMhhJWcVFdvEZt8fI3tF12Eg3TzlU+kUFMNeCYN1os=";
};
betaVersion = {
version = "4.1.0.18"; # "Android Studio 4.1 RC 3"
diff --git a/third_party/nixpkgs/pkgs/applications/editors/gnome-builder/default.nix b/third_party/nixpkgs/pkgs/applications/editors/gnome-builder/default.nix
index a94ab58a78..6704702837 100644
--- a/third_party/nixpkgs/pkgs/applications/editors/gnome-builder/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/editors/gnome-builder/default.nix
@@ -40,11 +40,11 @@
stdenv.mkDerivation rec {
pname = "gnome-builder";
- version = "3.36.1";
+ version = "3.38.1";
src = fetchurl {
url = "mirror://gnome/sources/${pname}/${stdenv.lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
- sha256 = "17pvmd5jypar8dkr6w56hvf7jnq4l1wih2wwgkrv7sblr7rkkar2";
+ sha256 = "06wcyfrwcjyj2vcqyw0z3sy1r4qxpcdpwqq1qmpsaphpz8acycjn";
};
nativeBuildInputs = [
diff --git a/third_party/nixpkgs/pkgs/applications/editors/gnome-latex/default.nix b/third_party/nixpkgs/pkgs/applications/editors/gnome-latex/default.nix
index 695a13eeca..ffdeb21de7 100644
--- a/third_party/nixpkgs/pkgs/applications/editors/gnome-latex/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/editors/gnome-latex/default.nix
@@ -1,14 +1,14 @@
{ stdenv, fetchurl, wrapGAppsHook, gsettings-desktop-schemas, gspell, gtksourceview4, libgee
, tepl, amtk, gnome3, glib, pkgconfig, intltool, itstool, libxml2 }:
let
- version = "3.36.0";
+ version = "3.38.0";
pname = "gnome-latex";
in stdenv.mkDerivation {
name = "${pname}-${version}";
src = fetchurl {
url = "mirror://gnome/sources/${pname}/${stdenv.lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
- sha256 = "1869kr1zhcp04mzbi67lwgk497w840dbbc7427i9yh9b9s7j6mqn";
+ sha256 = "0xqd49pgi82dygqnxj08i1v22b0vwwhx3zvdinhrx4jny339yam8";
};
NIX_CFLAGS_COMPILE = "-I${glib.dev}/include/gio-unix-2.0";
diff --git a/third_party/nixpkgs/pkgs/applications/editors/vim/configurable.nix b/third_party/nixpkgs/pkgs/applications/editors/vim/configurable.nix
index 77d7ca983c..aa8120470d 100644
--- a/third_party/nixpkgs/pkgs/applications/editors/vim/configurable.nix
+++ b/third_party/nixpkgs/pkgs/applications/editors/vim/configurable.nix
@@ -1,5 +1,5 @@
{ source ? "default", callPackage, stdenv, ncurses, pkgconfig, gettext
-, writeText, config, glib, gtk2-x11, gtk3-x11, lua, python, perl, tcl, ruby
+, writeText, config, glib, gtk2-x11, gtk3-x11, lua, python3, perl, tcl, ruby
, libX11, libXext, libSM, libXpm, libXt, libXaw, libXau, libXmu
, libICE
, vimPlugins
@@ -62,8 +62,6 @@ let
common = callPackage ./common.nix {};
- isPython3 = python.isPy3 or false;
-
in stdenv.mkDerivation rec {
pname = "vim_configurable";
@@ -106,9 +104,10 @@ in stdenv.mkDerivation rec {
"--with-luajit"
]
++ stdenv.lib.optionals pythonSupport [
- "--enable-python${if isPython3 then "3" else ""}interp=yes"
- "--with-python${if isPython3 then "3" else ""}-config-dir=${python}/lib"
- "--disable-python${if (!isPython3) then "3" else ""}interp"
+ "--enable-python3interp=yes"
+ "--with-python3-config-dir=${python3}/lib"
+ # Disables Python 2
+ "--disable-pythoninterp"
]
++ stdenv.lib.optional nlsSupport "--enable-nls"
++ stdenv.lib.optional perlSupport "--enable-perlinterp"
@@ -134,7 +133,7 @@ in stdenv.mkDerivation rec {
++ stdenv.lib.optional (guiSupport == "gtk3") gtk3-x11
++ stdenv.lib.optionals darwinSupport [ CoreServices CoreData Cocoa Foundation libobjc ]
++ stdenv.lib.optional luaSupport lua
- ++ stdenv.lib.optional pythonSupport python
+ ++ stdenv.lib.optional pythonSupport python3
++ stdenv.lib.optional tclSupport tcl
++ stdenv.lib.optional rubySupport ruby;
@@ -163,7 +162,7 @@ in stdenv.mkDerivation rec {
ln -sfn '${nixosRuntimepath}' "$out"/share/vim/vimrc
'' + stdenv.lib.optionalString wrapPythonDrv ''
- wrapProgram "$out/bin/vim" --prefix PATH : "${python}/bin"
+ wrapProgram "$out/bin/vim" --prefix PATH : "${python3}/bin"
'' + stdenv.lib.optionalString (guiSupport == "gtk3") ''
rewrap () {
diff --git a/third_party/nixpkgs/pkgs/applications/graphics/gimp/default.nix b/third_party/nixpkgs/pkgs/applications/graphics/gimp/default.nix
index 025f97b54e..4ba7cb8eb0 100644
--- a/third_party/nixpkgs/pkgs/applications/graphics/gimp/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/graphics/gimp/default.nix
@@ -163,8 +163,10 @@ in stdenv.mkDerivation rec {
# The declarations for `gimp-with-plugins` wrapper,
# used for determining plug-in installation paths
majorVersion = "${lib.versions.major version}.0";
- targetPluginDir = "lib/gimp/${majorVersion}/plug-ins";
- targetScriptDir = "share/gimp/${majorVersion}/scripts";
+ targetLibDir = "lib/gimp/${majorVersion}";
+ targetDataDir = "share/gimp/${majorVersion}";
+ targetPluginDir = "${targetLibDir}/plug-ins";
+ targetScriptDir = "${targetDataDir}/scripts";
# probably its a good idea to use the same gtk in plugins ?
gtk = gtk2;
diff --git a/third_party/nixpkgs/pkgs/applications/graphics/gimp/plugins/default.nix b/third_party/nixpkgs/pkgs/applications/graphics/gimp/plugins/default.nix
index 97c0429a99..84f5abfce0 100644
--- a/third_party/nixpkgs/pkgs/applications/graphics/gimp/plugins/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/graphics/gimp/plugins/default.nix
@@ -1,33 +1,51 @@
-# install these packages into your profile. Then add
-# ~/.nix-profile/gimp-version-plugins to your plugin list you can find at
-# preferences -> Folders -> Plug-ins
-# same applies for the scripts
+# Use `gimp-with-plugins` package for GIMP with all plug-ins.
+# If you just want a subset of plug-ins, you can specify them explicitly:
+# `gimp-with-plugins.override { plugins = with gimpPlugins; [ gap ]; }`.
+
+{ config, lib, pkgs }:
-{ config, pkgs, gimp }:
let
- inherit (pkgs) stdenv fetchurl pkgconfig intltool glib fetchFromGitHub;
- inherit (gimp) targetPluginDir targetScriptDir;
+ inherit (pkgs) stdenv fetchurl pkg-config intltool glib fetchFromGitHub;
+in
- pluginDerivation = a: let
- name = a.name or "${a.pname}-${a.version}";
+lib.makeScope pkgs.newScope (self:
+
+let
+ # Use GIMP from the scope.
+ inherit (self) gimp;
+
+ pluginDerivation = attrs: let
+ name = attrs.name or "${attrs.pname}-${attrs.version}";
in stdenv.mkDerivation ({
prePhases = "extraLib";
extraLib = ''
installScripts(){
- mkdir -p $out/${targetScriptDir}/${name};
- for p in "$@"; do cp "$p" -r $out/${targetScriptDir}/${name}; done
+ mkdir -p $out/${gimp.targetScriptDir}/${name};
+ for p in "$@"; do cp "$p" -r $out/${gimp.targetScriptDir}/${name}; done
}
installPlugins(){
- mkdir -p $out/${targetPluginDir}/${name};
- for p in "$@"; do cp "$p" -r $out/${targetPluginDir}/${name}; done
+ mkdir -p $out/${gimp.targetPluginDir}/${name};
+ for p in "$@"; do cp "$p" -r $out/${gimp.targetPluginDir}/${name}; done
}
'';
+
+ # Override installation paths.
+ PKG_CONFIG_GIMP_2_0_GIMPLIBDIR = "${placeholder "out"}/${gimp.targetLibDir}";
+ PKG_CONFIG_GIMP_2_0_GIMPDATADIR = "${placeholder "out"}/${gimp.targetDataDir}";
}
- // a
+ // attrs
// {
name = "gimp-plugin-${name}";
- buildInputs = [ gimp gimp.gtk glib ] ++ (a.buildInputs or []);
- nativeBuildInputs = [ pkgconfig intltool ] ++ (a.nativeBuildInputs or []);
+ buildInputs = [
+ gimp
+ gimp.gtk
+ glib
+ ] ++ (attrs.buildInputs or []);
+
+ nativeBuildInputs = [
+ pkg-config
+ intltool
+ ] ++ (attrs.nativeBuildInputs or []);
}
);
@@ -35,10 +53,11 @@ let
phases = [ "extraLib" "installPhase" ];
installPhase = "installScripts ${src}";
} // attrs);
-
in
+{
+ # Allow overriding GIMP package in the scope.
+ inherit (pkgs) gimp;
-stdenv.lib.makeScope pkgs.newScope (self: with self; {
gap = pluginDerivation {
/* menu:
Video
@@ -49,10 +68,6 @@ stdenv.lib.makeScope pkgs.newScope (self: with self; {
sha256 = "1jic7ixcmsn4kx2cn32nc5087rk6g8xsrz022xy11yfmgvhzb0ql";
};
NIX_LDFLAGS = "-lm";
- patchPhase = ''
- sed -e 's,^\(GIMP_PLUGIN_DIR=\).*,\1'"$out/${gimp.name}-plugins", \
- -e 's,^\(GIMP_DATA_DIR=\).*,\1'"$out/share/${gimp.name}", -i configure
- '';
hardeningDisable = [ "format" ];
meta = with stdenv.lib; {
description = "The GIMP Animation Package";
@@ -99,7 +114,7 @@ stdenv.lib.makeScope pkgs.newScope (self: with self; {
version = "2.0.3";
buildInputs = with pkgs; [ fftw ];
nativeBuildInputs = with pkgs; [ autoreconfHook ];
- makeFlags = [ "GIMP_LIBDIR=${placeholder "out"}/lib/gimp/2.0" ];
+ makeFlags = [ "GIMP_LIBDIR=${placeholder "out"}/${gimp.targetLibDir}" ];
src = fetchFromGitHub {
owner = "bootchk";
repo = "resynthesizer";
@@ -127,24 +142,25 @@ stdenv.lib.makeScope pkgs.newScope (self: with self; {
name = "wavelet-sharpen-0.1.2";
NIX_LDFLAGS = "-lm";
src = fetchurl {
- url = "http://registry.gimp.org/files/wavelet-sharpen-0.1.2.tar.gz";
+ url = "https://github.com/pixlsus/registry.gimp.org_static/raw/master/registry.gimp.org/files/wavelet-sharpen-0.1.2.tar.gz";
sha256 = "0vql1k67i21g5ivaa1jh56rg427m0icrkpryrhg75nscpirfxxqw";
};
installPhase = "installPlugins src/wavelet-sharpen"; # TODO translations are not copied .. How to do this on nix?
};
- lqrPlugin = pluginDerivation {
+ lqrPlugin = pluginDerivation rec {
/* menu:
Layer/Liquid Rescale
*/
- name = "lqr-plugin-0.6.1";
+ pname = "lqr-plugin";
+ version = "0.7.2";
buildInputs = with pkgs; [ liblqr1 ];
- src = fetchurl {
- url = "http://registry.gimp.org/files/gimp-lqr-plugin-0.6.1.tar.bz2";
- sha256 = "00hklkpcimcbpjly4rjhfipaw096cpy768g9wixglwrsyqhil7l9";
+ src = fetchFromGitHub {
+ owner = "carlobaldassi";
+ repo = "gimp-lqr-plugin";
+ rev = "v${version}";
+ sha256 = "81ajdZ2zQi/THxnBlSeT36tVTEzrS1YqLGpHMhFTKAo=";
};
- #postInstall = ''mkdir -p $out/nix-support; echo "${liblqr1}" > "$out/nix-support/propagated-user-env-packages"'';
- installPhase = "installPlugins src/gimp-lqr-plugin";
};
gmic = pkgs.gmic-qt.override {
@@ -196,37 +212,8 @@ stdenv.lib.makeScope pkgs.newScope (self: with self; {
lightning = scriptDerivation {
name = "Lightning";
src = fetchurl {
- url = "http://registry.gimp.org/files/Lightning.scm";
+ url = "https://github.com/pixlsus/registry.gimp.org_static/raw/master/registry.gimp.org/files/Lightning.scm";
sha256 = "c14a8f4f709695ede3f77348728a25b3f3ded420da60f3f8de3944b7eae98a49";
};
};
-
- /* space in name trouble ?
-
- rainbowPlasma = scriptDerivation {
- # http://registry.gimp.org/node/164
- name = "rainbow-plasma";
- src = fetchurl {
- url = "http://registry.gimp.org/files/Rainbow Plasma.scm";
- sha256 = "34308d4c9441f9e7bafa118af7ec9540f10ea0df75e812e2f3aa3fd7b5344c23";
- name = "Rainbow-Plasma.scm"; # nix doesn't like spaces, does it?
- };
- };
- */
-
- /* doesn't seem to be working :-(
- lightningGate = scriptDerivation {
- # http://registry.gimp.org/node/153
- name = "lightning-gate";
- src = fetchurl {
- url = "http://registry.gimp.org/files/LightningGate.scm";
- sha256 = "181w1zi9a99kn2mfxjp43wkwcgw5vbb6iqjas7a9mhm8p04csys2";
- };
- };
- */
-
-} // stdenv.lib.optionalAttrs (config.allowAliases or true) {
-
- resynthesizer2 = resynthesizer;
-
})
diff --git a/third_party/nixpkgs/pkgs/applications/graphics/gimp/wrapper.nix b/third_party/nixpkgs/pkgs/applications/graphics/gimp/wrapper.nix
index 841728d3a2..7e8ce913f0 100644
--- a/third_party/nixpkgs/pkgs/applications/graphics/gimp/wrapper.nix
+++ b/third_party/nixpkgs/pkgs/applications/graphics/gimp/wrapper.nix
@@ -2,7 +2,7 @@
let
allPlugins = lib.filter (pkg: lib.isDerivation pkg && !pkg.meta.broken or false) (lib.attrValues gimpPlugins);
-selectedPlugins = if plugins == null then allPlugins else plugins;
+selectedPlugins = lib.filter (pkg: pkg != gimpPlugins.gimp) (if plugins == null then allPlugins else plugins);
extraArgs = map (x: x.wrapArgs or "") selectedPlugins;
versionBranch = stdenv.lib.versions.majorMinor gimp.version;
diff --git a/third_party/nixpkgs/pkgs/applications/graphics/gnome-photos/default.nix b/third_party/nixpkgs/pkgs/applications/graphics/gnome-photos/default.nix
index 337b8f4cba..0d4b06c8c6 100644
--- a/third_party/nixpkgs/pkgs/applications/graphics/gnome-photos/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/graphics/gnome-photos/default.nix
@@ -1,5 +1,6 @@
{ stdenv
, fetchurl
+, fetchpatch
, at-spi2-core
, babl
, dbus
@@ -35,17 +36,32 @@
stdenv.mkDerivation rec {
pname = "gnome-photos";
- version = "3.34.2";
+ version = "3.38.0";
outputs = [ "out" "installedTests" ];
src = fetchurl {
url = "mirror://gnome/sources/${pname}/${stdenv.lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
- sha256 = "06ml5sf8xhpan410msqz085hmfc7082d368pb82yq646y9pcfn9w";
+ sha256 = "1i64w69kk3sdf9vn7npnwrhy8qjwn0vizq200x3pgmbrfm3kjzv6";
};
patches = [
./installed-tests-path.patch
+
+ # Port to Tracker 3
+ # https://gitlab.gnome.org/GNOME/gnome-photos/-/merge_requests/135
+ (fetchpatch {
+ url = "https://gitlab.gnome.org/GNOME/gnome-photos/commit/f39a85bb1a82093f4ba615494ff7e95609674fc2.patch";
+ sha256 = "M5r5WuB1JpUBVN3KxNvpMiPWj0pIpT+ImQMOiGtUgT4=";
+ })
+ (fetchpatch {
+ url = "https://gitlab.gnome.org/GNOME/gnome-photos/commit/3d847ff80d429cadf0bc59aa50caa37bf27c0201.patch";
+ sha256 = "zGjSL1qpWVJ/5Ifgh2CbhFSBR/WDAra8F+YUOemyxyU=";
+ })
+ (fetchpatch {
+ url = "https://gitlab.gnome.org/GNOME/gnome-photos/commit/2eb923726147b05c936dee64b205d833525db1df.patch";
+ sha256 = "vCA6NXHzmNf2GoLqzWwIyziC6puJgJ0QTLeKWsAEFAE=";
+ })
];
nativeBuildInputs = [
diff --git a/third_party/nixpkgs/pkgs/applications/graphics/graphicsmagick/default.nix b/third_party/nixpkgs/pkgs/applications/graphics/graphicsmagick/default.nix
index b7a1a8c4a6..b8b21e71c9 100644
--- a/third_party/nixpkgs/pkgs/applications/graphics/graphicsmagick/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/graphics/graphicsmagick/default.nix
@@ -24,10 +24,10 @@ stdenv.mkDerivation rec {
buildInputs =
[ bzip2 freetype ghostscript graphviz libjpeg libpng libtiff libX11 libxml2
zlib libtool libwebp
- ]
- ++ stdenv.lib.optional stdenv.isDarwin fixDarwinDylibNames;
+ ];
- nativeBuildInputs = [ xz ];
+ nativeBuildInputs = [ xz ]
+ ++ stdenv.lib.optional stdenv.hostPlatform.isDarwin fixDarwinDylibNames;
postInstall = ''
sed -i 's/-ltiff.*'\'/\'/ $out/bin/*
diff --git a/third_party/nixpkgs/pkgs/applications/graphics/lightburn/default.nix b/third_party/nixpkgs/pkgs/applications/graphics/lightburn/default.nix
index da5caeff3a..6d5e9d9b94 100644
--- a/third_party/nixpkgs/pkgs/applications/graphics/lightburn/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/graphics/lightburn/default.nix
@@ -6,7 +6,7 @@
stdenv.mkDerivation rec {
pname = "lightburn";
- version = "0.9.16";
+ version = "0.9.18";
nativeBuildInputs = [
p7zip
@@ -16,7 +16,7 @@ stdenv.mkDerivation rec {
src = fetchurl {
url = "https://github.com/LightBurnSoftware/deployment/releases/download/${version}/LightBurn-Linux64-v${version}.7z";
- sha256 = "0xmpglfzff3jpxbr304czsa24fbp497b69yd8kjkjdp2cd0l70qc";
+ sha256 = "0inl6zmc1726gmj85jbvq3ra4zphd2ikhrnqphgy2b0c72yh4pf7";
};
buildInputs = [
diff --git a/third_party/nixpkgs/pkgs/applications/graphics/pdfcpu/default.nix b/third_party/nixpkgs/pkgs/applications/graphics/pdfcpu/default.nix
index 2c3e9fa865..3f91fae0be 100644
--- a/third_party/nixpkgs/pkgs/applications/graphics/pdfcpu/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/graphics/pdfcpu/default.nix
@@ -2,16 +2,16 @@
buildGoModule rec {
pname = "pdfcpu";
- version = "0.3.6";
+ version = "0.3.7";
src = fetchFromGitHub {
owner = "pdfcpu";
repo = pname;
rev = "v${version}";
- sha256 = "0cbbbf93gxx768fs6pldy25xk46k7mc8k94r3f7cd83f1qd3s5zn";
+ sha256 = "13b1ncpx189ca0h70j5cdp0jwlj95kasysryz1l6g13cwn9n6mii";
};
- vendorSha256 = "1i0w4284icbl40yrjny9qd5iqrq18x63lrs7p1gz58nybc606azx";
+ vendorSha256 = "11w9i1829hk1qb9w24dyxv1bi49358a274g60x11fp5x5cw7bqa7";
# No tests
doCheck = false;
diff --git a/third_party/nixpkgs/pkgs/applications/graphics/qview/default.nix b/third_party/nixpkgs/pkgs/applications/graphics/qview/default.nix
index b6f2579566..001616ab41 100644
--- a/third_party/nixpkgs/pkgs/applications/graphics/qview/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/graphics/qview/default.nix
@@ -2,13 +2,13 @@
mkDerivation rec {
pname = "qview";
- version = "3.0";
+ version = "4.0";
src = fetchFromGitHub {
owner = "jurplel";
repo = "qView";
rev = version;
- sha256 = "15a91bs3wcqhgf76wzigbn10hayg628j84pq4j2vaxar94ak0vk7";
+ sha256 = "15n9cq7w3ckinnx38hvncxrbkv4qm4k51sal41q4y0pkvhmafhnr";
};
nativeBuildInputs = [ qmake ];
diff --git a/third_party/nixpkgs/pkgs/applications/logging/humioctl/default.nix b/third_party/nixpkgs/pkgs/applications/logging/humioctl/default.nix
index 14e1f64ebe..bcaf4a3627 100644
--- a/third_party/nixpkgs/pkgs/applications/logging/humioctl/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/logging/humioctl/default.nix
@@ -1,8 +1,8 @@
{ buildGoModule, fetchFromGitHub, installShellFiles, stdenv }:
let
- humioCtlVersion = "0.27.0";
- sha256 = "1h65g10dxcaw4wk0gyyyqj9f94xlphj30lp9w6rsfrk4pi3irzr4";
+ humioCtlVersion = "0.28.1";
+ sha256 = "0vy07nzafqhc14i179sfrzb795yh4pcyjj3py9fwq0nwnmxndby4";
vendorSha256 = "0anvah2rpqvxgmdrdj73k3vbf8073nmsl3aykgvb1nraf3gz3bpk";
in buildGoModule {
name = "humioctl-${humioCtlVersion}";
diff --git a/third_party/nixpkgs/pkgs/applications/misc/cheat/default.nix b/third_party/nixpkgs/pkgs/applications/misc/cheat/default.nix
index 77717ff50a..472eee6551 100644
--- a/third_party/nixpkgs/pkgs/applications/misc/cheat/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/misc/cheat/default.nix
@@ -3,13 +3,13 @@
buildGoModule rec {
pname = "cheat";
- version = "4.1.0";
+ version = "4.1.1";
src = fetchFromGitHub {
owner = "cheat";
repo = "cheat";
rev = version;
- sha256 = "0x6msbbqkwxs6msqacpqw4wlw7c9ilf8n6jqmx297ij6isswgksh";
+ sha256 = "0mraraby0s213ay2ahqsdvnyg76awbqllrkkx17mrx9z3ykba62d";
};
subPackages = [ "cmd/cheat" ];
diff --git a/third_party/nixpkgs/pkgs/applications/misc/dstask/default.nix b/third_party/nixpkgs/pkgs/applications/misc/dstask/default.nix
index 0eeb0d9cab..0c2f25b265 100644
--- a/third_party/nixpkgs/pkgs/applications/misc/dstask/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/misc/dstask/default.nix
@@ -2,13 +2,13 @@
buildGoModule rec {
pname = "dstask";
- version = "0.23";
+ version = "0.23.1";
src = fetchFromGitHub {
owner = "naggie";
repo = pname;
rev = "v${version}";
- sha256 = "15hr0ivwvm2lzpi8l5y5a3hya3i7r85pxna961m24gd4f8gs4cjl";
+ sha256 = "0rfz8jim0xqcwdb5n28942v9r3hbvhjrwdgzvbwc9f9psqg2s8d2";
};
# Set vendorSha256 to null because dstask vendors its dependencies (meaning
diff --git a/third_party/nixpkgs/pkgs/applications/misc/electrum/default.nix b/third_party/nixpkgs/pkgs/applications/misc/electrum/default.nix
index ad26a912e7..f2d779c8a6 100644
--- a/third_party/nixpkgs/pkgs/applications/misc/electrum/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/misc/electrum/default.nix
@@ -19,7 +19,7 @@
}:
let
- version = "4.0.3";
+ version = "4.0.4";
# electrum is not compatible with dnspython 2.0.0 yet
# use the latest 1.x release instead
@@ -43,7 +43,7 @@ let
owner = "spesmilo";
repo = "electrum";
rev = version;
- sha256 = "1r40i0v7nm35m3pzbd0l5z4qphl13s31l9v5njmyvpfjirdmhjbv";
+ sha256 = "0bzvyfqnd0r0l8syf95hr3nsh8rmmmcs74bvc7v04v0nm5m0fmf1";
extraPostFetch = ''
mv $out ./all
@@ -58,7 +58,7 @@ py.pkgs.buildPythonApplication {
src = fetchurl {
url = "https://download.electrum.org/${version}/Electrum-${version}.tar.gz";
- sha256 = "0q891fgzxvyzjxfczynx92hvclfs8i3nr5nr9sgbvz13hsg4s6lg";
+ sha256 = "03dc5jwgp18sism5v4lbqfyn2zljchng8j2yi07yf8i01ivy2mmv";
};
postUnpack = ''
diff --git a/third_party/nixpkgs/pkgs/applications/misc/gnome-usage/default.nix b/third_party/nixpkgs/pkgs/applications/misc/gnome-usage/default.nix
index 17aa7e9aa0..44d4727edb 100644
--- a/third_party/nixpkgs/pkgs/applications/misc/gnome-usage/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/misc/gnome-usage/default.nix
@@ -14,15 +14,16 @@
, libdazzle
, gnome3
, tracker
+, libhandy
}:
stdenv.mkDerivation rec {
pname = "gnome-usage";
- version = "3.33.2";
+ version = "3.38.0";
src = fetchurl {
url = "mirror://gnome/sources/${pname}/${stdenv.lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
- sha256 = "0w3ppfaf15il8mad64qyc9hj1rmlvzs5dyzrxhq7r50k4kyiwmk4";
+ sha256 = "0mqs39yi2cqwkzlmmgzrszsva5hbdpws6zk4lbi4w2cjzl185mcl";
};
nativeBuildInputs = [
@@ -43,6 +44,7 @@ stdenv.mkDerivation rec {
libdazzle
libgtop
tracker
+ libhandy
];
postPatch = ''
diff --git a/third_party/nixpkgs/pkgs/applications/misc/gramps/default.nix b/third_party/nixpkgs/pkgs/applications/misc/gramps/default.nix
index 09717cd642..1ef00efaf7 100644
--- a/third_party/nixpkgs/pkgs/applications/misc/gramps/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/misc/gramps/default.nix
@@ -1,4 +1,4 @@
-{ stdenv, fetchFromGitHub, gtk3, pythonPackages, intltool, gnome3,
+{ stdenv, fetchFromGitHub, gtk3, pythonPackages, intltool, gexiv2,
pango, gobject-introspection, wrapGAppsHook, gettext,
# Optional packages:
enableOSM ? true, osm-gps-map,
@@ -9,11 +9,11 @@
let
inherit (pythonPackages) python buildPythonApplication;
in buildPythonApplication rec {
- version = "5.0.1";
+ version = "5.1.3";
pname = "gramps";
nativeBuildInputs = [ wrapGAppsHook gettext ];
- buildInputs = [ intltool gtk3 gobject-introspection pango gnome3.gexiv2 ]
+ buildInputs = [ intltool gtk3 gobject-introspection pango gexiv2 ]
# Map support
++ stdenv.lib.optional enableOSM osm-gps-map
# Graphviz support
@@ -26,7 +26,7 @@ in buildPythonApplication rec {
owner = "gramps-project";
repo = "gramps";
rev = "v${version}";
- sha256 = "1jz1fbjj6byndvir7qxzhd2ryirrd5h2kwndxpp53xdc05z1i8g7";
+ sha256 = "109dwkswz2h2328xkqk2zj736d117s9pp7rz5cc1qg2vxn1lpm93";
};
pythonPath = with pythonPackages; [ bsddb3 PyICU pygobject3 pycairo ];
diff --git a/third_party/nixpkgs/pkgs/applications/misc/hugo/default.nix b/third_party/nixpkgs/pkgs/applications/misc/hugo/default.nix
index 58f0bc8978..0882b09744 100644
--- a/third_party/nixpkgs/pkgs/applications/misc/hugo/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/misc/hugo/default.nix
@@ -2,16 +2,16 @@
buildGoModule rec {
pname = "hugo";
- version = "0.78.0";
+ version = "0.78.1";
src = fetchFromGitHub {
owner = "gohugoio";
repo = pname;
rev = "v${version}";
- sha256 = "0la1c6yj9dq9rqxk6m8n8l4cabgzlk0r3was8mvgd80g3x3zn55v";
+ sha256 = "1rzv6az7fb1xvjxxq31rs42waqpwvks4h03lzjxv0kj8i43z116k";
};
- vendorSha256 = "09fvvs85rvvh0z4px2bj5908xf1mrcslkzsz09p0gy5i3zaqfnp9";
+ vendorSha256 = "06cw3qj57nhrxrbbxcyrqn53j6g11rd2q7bxw89fdn901mc26s03";
doCheck = false;
diff --git a/third_party/nixpkgs/pkgs/applications/misc/k2pdfopt/default.nix b/third_party/nixpkgs/pkgs/applications/misc/k2pdfopt/default.nix
index 75e467d4cd..be61a76190 100644
--- a/third_party/nixpkgs/pkgs/applications/misc/k2pdfopt/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/misc/k2pdfopt/default.nix
@@ -2,7 +2,7 @@
, cmake, pkgconfig, zlib, libpng, makeWrapper
, enableGSL ? true, gsl
, enableGhostScript ? true, ghostscript
-, enableMuPDF ? true, mupdf
+, enableMuPDF ? true, mupdf_1_17
, enableDJVU ? true, djvulibre
, enableGOCR ? false, gocr # Disabled by default due to crashes
, enableTesseract ? true, leptonica, tesseract4
@@ -89,7 +89,7 @@ in stdenv.mkDerivation rec {
cp ${k2pdfopt_src}/mupdf_mod/pdf-* ./source/pdf/
'';
};
- mupdf_modded = mupdf.overrideAttrs ({ patches ? [], ... }: {
+ mupdf_modded = mupdf_1_17.overrideAttrs ({ patches ? [], ... }: {
patches = patches ++ [ mupdf_patch ];
# This function is missing in font.c, see font-win32.c
postPatch = ''
diff --git a/third_party/nixpkgs/pkgs/applications/misc/klayout/default.nix b/third_party/nixpkgs/pkgs/applications/misc/klayout/default.nix
index 5f6c679f3b..0a8d7ce547 100644
--- a/third_party/nixpkgs/pkgs/applications/misc/klayout/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/misc/klayout/default.nix
@@ -1,6 +1,6 @@
{ lib, mkDerivation, fetchFromGitHub, fetchpatch
, python, ruby, qtbase, qtmultimedia, qttools, qtxmlpatterns
-, which, perl, makeWrapper, fixDarwinDylibNames
+, which, perl, makeWrapper
}:
mkDerivation rec {
diff --git a/third_party/nixpkgs/pkgs/applications/misc/llpp/default.nix b/third_party/nixpkgs/pkgs/applications/misc/llpp/default.nix
index d7752258df..c16322ad84 100644
--- a/third_party/nixpkgs/pkgs/applications/misc/llpp/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/misc/llpp/default.nix
@@ -1,16 +1,16 @@
-{ stdenv, lib, substituteAll, makeWrapper, fetchgit, ocaml, mupdf, libX11,
-libGLU, libGL, freetype, xclip, inotify-tools, procps }:
+{ stdenv, lib, substituteAll, makeWrapper, fetchgit, ocaml, mupdf, libX11, jbig2dec, openjpeg, libjpeg , lcms2, harfbuzz,
+libGLU, libGL, gumbo, freetype, zlib, xclip, inotify-tools, procps }:
assert lib.versionAtLeast (lib.getVersion ocaml) "4.07";
stdenv.mkDerivation rec {
pname = "llpp";
- version = "32";
+ version = "33";
src = fetchgit {
url = "git://repo.or.cz/llpp.git";
rev = "v${version}";
- sha256 = "1h1zysm5cz8laq8li49djl6929cnrjlflag9hw0c1dcr4zaxk32y";
+ sha256 = "0shqzhaflm2yhkx6c0csq9lxp1s1r7lh5kgpx9q5k06xya2a7yvs";
fetchSubmodules = false;
};
@@ -20,7 +20,7 @@ stdenv.mkDerivation rec {
});
nativeBuildInputs = [ makeWrapper ];
- buildInputs = [ ocaml mupdf libX11 libGLU libGL freetype ];
+ buildInputs = [ ocaml mupdf libX11 libGLU libGL freetype zlib gumbo jbig2dec openjpeg libjpeg lcms2 harfbuzz ];
dontStrip = true;
diff --git a/third_party/nixpkgs/pkgs/applications/misc/llpp/fix-build-bash.patch b/third_party/nixpkgs/pkgs/applications/misc/llpp/fix-build-bash.patch
index fbc341c8af..c12828f2d9 100644
--- a/third_party/nixpkgs/pkgs/applications/misc/llpp/fix-build-bash.patch
+++ b/third_party/nixpkgs/pkgs/applications/misc/llpp/fix-build-bash.patch
@@ -1,8 +1,9 @@
diff --git a/build.bash b/build.bash
index 7c278b6..41494c5 100755
+with manual adjustments
--- a/build.bash
+++ b/build.bash
-@@ -29,7 +29,6 @@ srcd="$(dirname $0)"
+@@ -30,7 +30,6 @@ srcd="$(dirname $0)"
mudir=$outd/mupdf
muinc="-I $mudir/include -I $mudir/thirdparty/freetype/include"
@@ -10,25 +11,25 @@ index 7c278b6..41494c5 100755
mkdir -p $outd/{$wsid,lablGL}
:>$outd/ordered
-@@ -39,12 +38,6 @@ isfresh() { test -r "$1.past" && . "$1.past" && test "$k" = "$2"; }
- mbt=${mbt:-native}
- mulibs="$mudir/build/$mbt/libmupdf.a" # $mudir/build/$mbt/libmupdf-third.a
+@@ -41,12 +40,6 @@ isfresh() { test -r "$1.past" && . "$1.past" && test "$k" = "$2"; }
+ mulibst="$mudir/build/$mbt/libs"
+ mulibs="$mudir/build/$mbt/libmupdf.a $mudir/build/$mbt/libmupdf-third.a"
-keycmd="(cd $mudir && make -q build=$mbt libs && echo); digest $mulibs"
--isfresh "$mulibs" "$(eval $keycmd)" || (
+-isfresh "$mulibst" "$(eval $keycmd)" || (
- make -C "$mudir" build=$mbt -j $mjobs libs
-- eval $keycmd >$mudir/build/$mbt/libmupdf.a.past
+- eval $keycmd >${mulibst}.past
-) && vecho "fresh mupdf"
-
oincs() {
local i=
local incs1=
-@@ -89,34 +82,6 @@ mflags() {
+@@ -100,35 +93,6 @@ mflags() {
}
overs="$(ocamlc -vnum 2>/dev/null)" || overs=""
--test "$overs" = "4.10.0" || {
-- url=https://caml.inria.fr/pub/distrib/ocaml-4.10/ocaml-4.10.0.tar.xz
+-test "$overs" = "4.11.1" || {
+- url=https://caml.inria.fr/pub/distrib/ocaml-4.11/ocaml-4.11.1.tar.xz
- txz=$outd/$(basename $url)
- keycmd="printf $url; digest $txz;"
- isfresh $txz "$(eval $keycmd)" || {
@@ -48,7 +49,8 @@ index 7c278b6..41494c5 100755
- tar xf $txz -C $outd
- bn=$(basename $url)
- cd $outd/${bn%.tar.xz}
-- ./configure --disable-ocamldoc --enable-debugger=no --prefix=$absprefix
+- ./configure --disable-ocamldoc --disable-ocamltest \
+- --enable-debugger=no --prefix=$absprefix
- make -j $mjobs world
- make install
- eval $keycmd >$absprefix/bin/ocamlc.past
@@ -58,7 +60,7 @@ index 7c278b6..41494c5 100755
ccomp=${LLPP_CC-$(ocamlc -config | grep "^c_compiler: " | \
{ read _ c; echo $c; })}
-@@ -230,7 +195,7 @@ bobjc() {
+@@ -243,7 +208,7 @@ bobjc() {
} && vecho "fresh $o"
}
@@ -67,12 +69,12 @@ index 7c278b6..41494c5 100755
cmd="(. $srcd/genconfstr.sh >$outd/confstruct.ml)"
keycmd="digest $srcd/genconfstr.sh $outd/confstruct.ml"
-@@ -284,7 +249,7 @@ for m in ml_gl ml_glarray ml_raw; do
+@@ -291,7 +256,7 @@ for m in ml_gl ml_glarray ml_raw; do
done
libs="str.cma unix.cma"
-clibs="-L$mudir/build/$mbt -lmupdf -lmupdf-third -lpthread"
-+clibs="-lmupdf -lfreetype -lpthread"
++clibs="-lmupdf -lmupdf-third -lfreetype -lgumbo -ljpeg -lopenjp2 -ljbig2dec -llcms2 -lharfbuzz -lpthread -lz"
if $darwin; then
mcomp=$(ocamlc -config | grep bytecomp_c_co | { read _ c; echo $c; })
clibs="$clibs -framework Cocoa -framework OpenGL"
diff --git a/third_party/nixpkgs/pkgs/applications/misc/mupdf/1.17.nix b/third_party/nixpkgs/pkgs/applications/misc/mupdf/1.17.nix
new file mode 100644
index 0000000000..c6243e5f1d
--- /dev/null
+++ b/third_party/nixpkgs/pkgs/applications/misc/mupdf/1.17.nix
@@ -0,0 +1,95 @@
+{ stdenv, lib, fetchurl, fetchpatch, pkgconfig, freetype, harfbuzz, openjpeg
+, jbig2dec, libjpeg , darwin
+, enableX11 ? true, libX11, libXext, libXi, libXrandr
+, enableCurl ? true, curl, openssl
+, enableGL ? true, freeglut, libGLU
+}:
+
+let
+
+ # OpenJPEG version is hardcoded in package source
+ openJpegVersion = with stdenv;
+ lib.versions.majorMinor (lib.getVersion openjpeg);
+
+
+in stdenv.mkDerivation rec {
+ version = "1.17.0";
+ pname = "mupdf";
+
+ src = fetchurl {
+ url = "https://mupdf.com/downloads/archive/${pname}-${version}-source.tar.gz";
+ sha256 = "13nl9nrcx2awz9l83mlv2psi1lmn3hdnfwxvwgwiwbxlkjl3zqq0";
+ };
+
+ patches =
+ # Use shared libraries to decrease size
+ stdenv.lib.optional (!stdenv.isDarwin) ./mupdf-1.14-shared_libs.patch
+ ++ stdenv.lib.optional stdenv.isDarwin ./darwin.patch
+ ;
+
+ postPatch = ''
+ sed -i "s/__OPENJPEG__VERSION__/${openJpegVersion}/" source/fitz/load-jpx.c
+ '';
+
+ makeFlags = [ "prefix=$(out) USE_SYSTEM_LIBS=yes" ];
+ nativeBuildInputs = [ pkgconfig ];
+ buildInputs = [ freetype harfbuzz openjpeg jbig2dec libjpeg freeglut libGLU ]
+ ++ lib.optionals enableX11 [ libX11 libXext libXi libXrandr ]
+ ++ lib.optionals enableCurl [ curl openssl ]
+ ++ lib.optionals enableGL (
+ if stdenv.isDarwin then
+ with darwin.apple_sdk.frameworks; [ GLUT OpenGL ]
+ else
+ [ freeglut libGLU ])
+ ;
+ outputs = [ "bin" "dev" "out" "man" "doc" ];
+
+ preConfigure = ''
+ # Don't remove mujs because upstream version is incompatible
+ rm -rf thirdparty/{curl,freetype,glfw,harfbuzz,jbig2dec,libjpeg,openjpeg,zlib}
+ '';
+
+ postInstall = ''
+ mkdir -p "$out/lib/pkgconfig"
+ cat >"$out/lib/pkgconfig/mupdf.pc" < $bin/share/applications/mupdf.desktop < /dev/null
+ '';
+
+ meta = with lib; {
+ description = "Command-line tool to customize Spotify client";
+ homepage = "https://github.com/khanhas/spicetify-cli/";
+ license = licenses.gpl3Plus;
+ maintainers = with maintainers; [ jonringer ];
+ };
+}
diff --git a/third_party/nixpkgs/pkgs/applications/misc/syncthingtray/default.nix b/third_party/nixpkgs/pkgs/applications/misc/syncthingtray/default.nix
index bb4b3ac90c..beccfe5477 100644
--- a/third_party/nixpkgs/pkgs/applications/misc/syncthingtray/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/misc/syncthingtray/default.nix
@@ -20,14 +20,14 @@
}:
mkDerivation rec {
- version = "1.0.0";
+ version = "1.0.1";
pname = "syncthingtray";
src = fetchFromGitHub {
owner = "Martchus";
repo = "syncthingtray";
rev = "v${version}";
- sha256 = "sha256-mB23UOUrOfEmbFfVsAXyi3iod0NAfp/sl7Gkklqfmbo=";
+ sha256 = "1dln5gh3p8nz9qmg07cw2s0lpzp3rfhyrwdhczj89g27bwk0lr4k";
};
buildInputs = [ qtbase cpp-utilities qtutilities ]
diff --git a/third_party/nixpkgs/pkgs/applications/networking/browsers/amfora/default.nix b/third_party/nixpkgs/pkgs/applications/networking/browsers/amfora/default.nix
index eaea5f12b8..925cc1a4f9 100644
--- a/third_party/nixpkgs/pkgs/applications/networking/browsers/amfora/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/networking/browsers/amfora/default.nix
@@ -2,16 +2,16 @@
buildGoModule rec {
pname = "amfora";
- version = "1.5.0";
+ version = "1.6.0";
src = fetchFromGitHub {
owner = "makeworld-the-better-one";
repo = "amfora";
rev = "v${version}";
- sha256 = "011h5xzwiafh3fdp9wil8n618p45ph9swa66lw6s82ijpiizz79s";
+ sha256 = "1f5r12hmdgj26p4ss5pcpfcvqlcn19fr9xvvvk2izckcr48p4fy7";
};
- vendorSha256 = "10f3bh3r3jc1185r8r1ihg8rprdpl8qwg5b6wqwsda96ydkbpi2b";
+ vendorSha256 = "0mkk7xxfxxp1w9890mkmag11mzxhy2zmh8v1macpyp1zmzgs21f8";
postInstall = ''
sed -i "s:amfora:$out/bin/amfora:" amfora.desktop
diff --git a/third_party/nixpkgs/pkgs/applications/networking/browsers/chromium/upstream-info.json b/third_party/nixpkgs/pkgs/applications/networking/browsers/chromium/upstream-info.json
index 565f884c51..8a6ed0453a 100644
--- a/third_party/nixpkgs/pkgs/applications/networking/browsers/chromium/upstream-info.json
+++ b/third_party/nixpkgs/pkgs/applications/networking/browsers/chromium/upstream-info.json
@@ -1,8 +1,8 @@
{
"stable": {
- "version": "86.0.4240.183",
- "sha256": "1g39i82js7fm4fqb8i66d6xs0kzqjxzi4vzvvwz5y9rkbikcc4ma",
- "sha256bin64": "1r0dxqsx6j19hgwr3v2sdlb2vd7gb961c4wba4ymd8wy8j8pzly9",
+ "version": "86.0.4240.193",
+ "sha256": "0d55xkw3fygqpa3a5bvz7vqmzb0d9w1kis72h54cnwsqgw4xag90",
+ "sha256bin64": "1x1f8fv0fi965apk2a5v6jmhz8j5m3rz0k5x5vmkwqprvlblfjpw",
"deps": {
"gn": {
"version": "2020-08-07",
@@ -13,9 +13,9 @@
}
},
"beta": {
- "version": "87.0.4280.40",
- "sha256": "07xh76fl257np68way6i5rf64qbvirkfddy7m5gvqb0fzcqd7dp3",
- "sha256bin64": "1b2z0aqlh28pqrk6dmabxp1d4mvp9iyfmi4kqmns4cdpg0qgaf41",
+ "version": "87.0.4280.47",
+ "sha256": "0a3c4kz85857wrbcxqknbqmai250d36nq332l66a83r8sidhbxfq",
+ "sha256bin64": "0bjls2airr4p448rx7im1a7gff68yfnfb5vymr4bin4kz0s38mpw",
"deps": {
"gn": {
"version": "2020-09-09",
@@ -26,15 +26,15 @@
}
},
"dev": {
- "version": "88.0.4300.0",
- "sha256": "00cfs2rp4h8ybn2snr1d8ygg635hx7q5gv2aqriy1j6f8a1pgh1b",
- "sha256bin64": "110r1m14h91212nx6pfhn8wkics7wlwx1608l5cqsxxcpvpzl3pv",
+ "version": "88.0.4315.5",
+ "sha256": "0k6man2xq8vmnk73dqv3fcc9929agqq8j6s6nvc9z653q4jdphkw",
+ "sha256bin64": "0m139w8lwaawridk8in24ss1g1i6ah5298xky226k3vhk5i4mn3j",
"deps": {
"gn": {
- "version": "2020-09-09",
+ "version": "2020-10-21",
"url": "https://gn.googlesource.com/gn",
- "rev": "e002e68a48d1c82648eadde2f6aafa20d08c36f2",
- "sha256": "0x4c7amxwzxs39grqs3dnnz0531mpf1p75niq7zhinyfqm86i4dk"
+ "rev": "f5f465b52e5df6d4de9fbe67cc79f1914ba4dbfc",
+ "sha256": "1xb31vsvg27ivvcdyiq93h8wj4d90qdrpagfh1dvm6xszkajsca1"
}
}
}
diff --git a/third_party/nixpkgs/pkgs/applications/networking/browsers/ungoogled-chromium/common.nix b/third_party/nixpkgs/pkgs/applications/networking/browsers/ungoogled-chromium/common.nix
index fd5a860445..2b8dc83da5 100644
--- a/third_party/nixpkgs/pkgs/applications/networking/browsers/ungoogled-chromium/common.nix
+++ b/third_party/nixpkgs/pkgs/applications/networking/browsers/ungoogled-chromium/common.nix
@@ -344,7 +344,12 @@ let
patchelf --set-rpath "${libGL}/lib:$origRpath" "$chromiumBinary"
'';
- passthru.updateScript = ./update.py;
+ passthru = {
+ updateScript = ./update.py;
+ chromiumDeps = {
+ gn = gnChromium;
+ };
+ };
};
# Remove some extraAttrs we supplied to the base attributes already.
diff --git a/third_party/nixpkgs/pkgs/applications/networking/browsers/ungoogled-chromium/default.nix b/third_party/nixpkgs/pkgs/applications/networking/browsers/ungoogled-chromium/default.nix
index 3cd0ec34db..b02c91c6e2 100644
--- a/third_party/nixpkgs/pkgs/applications/networking/browsers/ungoogled-chromium/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/networking/browsers/ungoogled-chromium/default.nix
@@ -37,26 +37,15 @@ let
inherit channel gnome gnomeSupport gnomeKeyringSupport proprietaryCodecs
cupsSupport pulseSupport useOzone;
inherit ungoogled;
- # TODO: Remove after we can update gn for the stable channel (backward incompatible changes):
gnChromium = gn.overrideAttrs (oldAttrs: {
- version = "2020-07-20";
+ inherit (upstream-info.deps.gn) version;
src = fetchgit {
- url = "https://gn.googlesource.com/gn";
- rev = "3028c6a426a4aaf6da91c4ebafe716ae370225fe";
- sha256 = "0h3wf4152zdvrbb0jbj49q6814lfl3rcy5mj8b2pl9s0ahvkbc6q";
+ inherit (upstream-info.deps.gn) url rev sha256;
};
});
} // lib.optionalAttrs (lib.versionAtLeast upstream-info.version "87") {
useOzone = true; # YAY: https://chromium-review.googlesource.com/c/chromium/src/+/2382834 \o/
useVaapi = !stdenv.isAarch64; # TODO: Might be best to not set use_vaapi anymore (default is fine)
- gnChromium = gn.overrideAttrs (oldAttrs: {
- version = "2020-08-17";
- src = fetchgit {
- url = "https://gn.googlesource.com/gn";
- rev = "6f13aaac55a977e1948910942675c69f2b4f7a94";
- sha256 = "01hpma1sllpdx09mvr4d6073sg6zmk6iv44kd3r28khymcj4s251";
- };
- });
});
browser = callPackage ./browser.nix { inherit channel enableWideVine; };
diff --git a/third_party/nixpkgs/pkgs/applications/networking/browsers/ungoogled-chromium/ungoogled-src.nix b/third_party/nixpkgs/pkgs/applications/networking/browsers/ungoogled-chromium/ungoogled-src.nix
index abcb2ce391..73c9796aaa 100644
--- a/third_party/nixpkgs/pkgs/applications/networking/browsers/ungoogled-chromium/ungoogled-src.nix
+++ b/third_party/nixpkgs/pkgs/applications/networking/browsers/ungoogled-chromium/ungoogled-src.nix
@@ -1,6 +1,6 @@
{
- "86.0.4240.111" = {
- rev = "86.0.4240.111-1";
- sha256 = "0fkk0lxbvik8q8d5njxmwiam64qz5g74hlb56w24nh5mh1jm59a8";
+ "86.0.4240.183" = {
+ rev = "86.0.4240.183-1";
+ sha256 = "0528l2wr5bpl1cwsxzl5zxz1gw91kffkh5j1kzmc5n7m4mscqxyc";
};
}
diff --git a/third_party/nixpkgs/pkgs/applications/networking/browsers/ungoogled-chromium/update.py b/third_party/nixpkgs/pkgs/applications/networking/browsers/ungoogled-chromium/update.py
index bfc7f0d247..b404ca555b 100755
--- a/third_party/nixpkgs/pkgs/applications/networking/browsers/ungoogled-chromium/update.py
+++ b/third_party/nixpkgs/pkgs/applications/networking/browsers/ungoogled-chromium/update.py
@@ -1,13 +1,15 @@
#! /usr/bin/env nix-shell
-#! nix-shell -i python -p python3 nix
+#! nix-shell -i python -p python3 nix nix-prefetch-git
import csv
import json
+import re
import subprocess
import sys
from codecs import iterdecode
from collections import OrderedDict
+from datetime import datetime
from os.path import abspath, dirname
from urllib.request import urlopen
@@ -26,6 +28,30 @@ def nix_prefetch_url(url, algo='sha256'):
out = subprocess.check_output(['nix-prefetch-url', '--type', algo, url])
return out.decode('utf-8').rstrip()
+def nix_prefetch_git(url, rev):
+ print(f'nix-prefetch-git {url} {rev}')
+ out = subprocess.check_output(['nix-prefetch-git', '--quiet', '--url', url, '--rev', rev])
+ return json.loads(out)
+
+def get_file_revision(revision, file_path):
+ url = f'https://raw.githubusercontent.com/chromium/chromium/{revision}/{file_path}'
+ with urlopen(url) as http_response:
+ return http_response.read()
+
+def get_channel_dependencies(channel):
+ deps = get_file_revision(channel['version'], 'DEPS')
+ gn_pattern = b"'gn_version': 'git_revision:([0-9a-f]{40})'"
+ gn_commit = re.search(gn_pattern, deps).group(1).decode()
+ gn = nix_prefetch_git('https://gn.googlesource.com/gn', gn_commit)
+ return {
+ 'gn': {
+ 'version': datetime.fromisoformat(gn['date']).date().isoformat(),
+ 'url': gn['url'],
+ 'rev': gn['rev'],
+ 'sha256': gn['sha256']
+ }
+ }
+
channels = {}
last_channels = load_json(JSON_PATH)
@@ -58,6 +84,8 @@ with urlopen(HISTORY_URL) as resp:
# the next one.
continue
+ channel['deps'] = get_channel_dependencies(channel)
+
channels[channel_name] = channel
with open(JSON_PATH, 'w') as out:
diff --git a/third_party/nixpkgs/pkgs/applications/networking/browsers/ungoogled-chromium/upstream-info.json b/third_party/nixpkgs/pkgs/applications/networking/browsers/ungoogled-chromium/upstream-info.json
index 5fded39c74..565f884c51 100644
--- a/third_party/nixpkgs/pkgs/applications/networking/browsers/ungoogled-chromium/upstream-info.json
+++ b/third_party/nixpkgs/pkgs/applications/networking/browsers/ungoogled-chromium/upstream-info.json
@@ -1,17 +1,41 @@
{
"stable": {
- "version": "86.0.4240.111",
- "sha256": "05y7lwr89awkhvgmwkx3br9j4ap2aypg2wsc0nz8mi7kxc1dnyzj",
- "sha256bin64": "10aqiiydw4i3jxnw8xxdgkgcqbfqc67n1fbrg40y54kg0v5dz8l6"
+ "version": "86.0.4240.183",
+ "sha256": "1g39i82js7fm4fqb8i66d6xs0kzqjxzi4vzvvwz5y9rkbikcc4ma",
+ "sha256bin64": "1r0dxqsx6j19hgwr3v2sdlb2vd7gb961c4wba4ymd8wy8j8pzly9",
+ "deps": {
+ "gn": {
+ "version": "2020-08-07",
+ "url": "https://gn.googlesource.com/gn",
+ "rev": "e327ffdc503815916db2543ec000226a8df45163",
+ "sha256": "0kvlfj3www84zp1vmxh76x8fdjm9hyk8lkh2vdsidafpmm75fphr"
+ }
+ }
},
"beta": {
- "version": "87.0.4280.27",
- "sha256": "0w0asxj7jlsw69cssfia8km4q9cx1c2mliks2rmhf4jk0hsghasm",
- "sha256bin64": "1lsx4mhy8nachfb8c9f3mrx5nqw2bi046dqirb4lnv7y80jjjs1k"
+ "version": "87.0.4280.40",
+ "sha256": "07xh76fl257np68way6i5rf64qbvirkfddy7m5gvqb0fzcqd7dp3",
+ "sha256bin64": "1b2z0aqlh28pqrk6dmabxp1d4mvp9iyfmi4kqmns4cdpg0qgaf41",
+ "deps": {
+ "gn": {
+ "version": "2020-09-09",
+ "url": "https://gn.googlesource.com/gn",
+ "rev": "e002e68a48d1c82648eadde2f6aafa20d08c36f2",
+ "sha256": "0x4c7amxwzxs39grqs3dnnz0531mpf1p75niq7zhinyfqm86i4dk"
+ }
+ }
},
"dev": {
- "version": "88.0.4298.4",
- "sha256": "0ka11gmpkyrmifajaxm66c16hrj3xakdvhjqg04slyp2sv0nlhrl",
- "sha256bin64": "0768y31jqbl1znp7yp6mvl5j12xl1nwjkh2l8zdga81q0wz52hh6"
+ "version": "88.0.4300.0",
+ "sha256": "00cfs2rp4h8ybn2snr1d8ygg635hx7q5gv2aqriy1j6f8a1pgh1b",
+ "sha256bin64": "110r1m14h91212nx6pfhn8wkics7wlwx1608l5cqsxxcpvpzl3pv",
+ "deps": {
+ "gn": {
+ "version": "2020-09-09",
+ "url": "https://gn.googlesource.com/gn",
+ "rev": "e002e68a48d1c82648eadde2f6aafa20d08c36f2",
+ "sha256": "0x4c7amxwzxs39grqs3dnnz0531mpf1p75niq7zhinyfqm86i4dk"
+ }
+ }
}
}
diff --git a/third_party/nixpkgs/pkgs/applications/networking/calls/default.nix b/third_party/nixpkgs/pkgs/applications/networking/calls/default.nix
index 39ad9ef1d1..e57cf81049 100644
--- a/third_party/nixpkgs/pkgs/applications/networking/calls/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/networking/calls/default.nix
@@ -3,7 +3,7 @@
, meson
, ninja
, pkgconfig
-, libhandy
+, libhandy_0
, modemmanager
, gtk3
, gom
@@ -43,13 +43,12 @@ stdenv.mkDerivation rec {
buildInputs = [
modemmanager
- libhandy
+ libhandy_0
evolution-data-server
folks
gom
gsound
gtk3
- libhandy
libpeas
];
diff --git a/third_party/nixpkgs/pkgs/applications/networking/cluster/argo/default.nix b/third_party/nixpkgs/pkgs/applications/networking/cluster/argo/default.nix
index 49b45308ce..6f2344bd3e 100644
--- a/third_party/nixpkgs/pkgs/applications/networking/cluster/argo/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/networking/cluster/argo/default.nix
@@ -19,13 +19,13 @@ let
in
buildGoModule rec {
pname = "argo";
- version = "2.11.6";
+ version = "2.11.7";
src = fetchFromGitHub {
owner = "argoproj";
repo = "argo";
rev = "v${version}";
- sha256 = "1vlz1f4hyzgz1x9xgzlmpnbjba8xyhpx9ybia0pwilfg7mwfq92r";
+ sha256 = "1i7qgghnb39bibnk07f47k64qpkb1k8mi3bbfnx6mxl0jlq335af";
};
vendorSha256 = "1ca0ssvbi4vrsn9ljc783hnh9bmf5p8nr1lz5wm8g3gbrrrf1ray";
diff --git a/third_party/nixpkgs/pkgs/applications/networking/cluster/helmfile/default.nix b/third_party/nixpkgs/pkgs/applications/networking/cluster/helmfile/default.nix
index f8c7ce2254..64106a7507 100644
--- a/third_party/nixpkgs/pkgs/applications/networking/cluster/helmfile/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/networking/cluster/helmfile/default.nix
@@ -2,16 +2,16 @@
buildGoModule rec {
pname = "helmfile";
- version = "0.132.1";
+ version = "0.134.0";
src = fetchFromGitHub {
owner = "roboll";
repo = "helmfile";
rev = "v${version}";
- sha256 = "03i9pl3iwqk5az73qm9rxdq8c5nd9l4w3c28yk55bfgpwpnxcwjc";
+ sha256 = "0s64l3dj5ydal7rfyg1avckb2ri7a34y2x7rhbplam8lk0vdzx03";
};
- vendorSha256 = "0r4p4nwhmxg06qyf86gd2g61l4r1mlpblh4vhsc1shbz9iigykzi";
+ vendorSha256 = "1p5m5v5lpdyzywq2ybsa9zkygixdkaifn2szxj7v8x162bzf16r5";
doCheck = false;
diff --git a/third_party/nixpkgs/pkgs/applications/networking/cluster/helmsman/default.nix b/third_party/nixpkgs/pkgs/applications/networking/cluster/helmsman/default.nix
index d4f1e82d51..d044840637 100644
--- a/third_party/nixpkgs/pkgs/applications/networking/cluster/helmsman/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/networking/cluster/helmsman/default.nix
@@ -2,13 +2,13 @@
buildGoModule rec {
pname = "helmsman";
- version = "3.4.6";
+ version = "3.5.1";
src = fetchFromGitHub {
owner = "Praqma";
repo = "helmsman";
rev = "v${version}";
- sha256 = "018bkl6q6q8njv9qy87affs0g6c716vmhcqv2czv8qz454hn7i5h";
+ sha256 = "0vng0ra8bjxmfq6xvdxn72f5bcjrv8i72dams80lf0mq3l7wjl7c";
};
vendorSha256 = "05vnysr5r3hbayss1pyifgp989kjw81h95iack8ady62k6ys5njl";
diff --git a/third_party/nixpkgs/pkgs/applications/networking/cluster/k9s/default.nix b/third_party/nixpkgs/pkgs/applications/networking/cluster/k9s/default.nix
index f26697f056..ec5b6f44c6 100644
--- a/third_party/nixpkgs/pkgs/applications/networking/cluster/k9s/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/networking/cluster/k9s/default.nix
@@ -2,13 +2,13 @@
buildGoModule rec {
pname = "k9s";
- version = "0.23.3";
+ version = "0.23.10";
src = fetchFromGitHub {
owner = "derailed";
repo = "k9s";
rev = "v${version}";
- sha256 = "0jdrjsv6miprw0bj964rgkbci4xdwfi536z3px93i2n9zrhhawpn";
+ sha256 = "0nfgi67ja36mymhcyh4902680pkfnk4g8j8nbajksx9nfp53n91v";
};
buildFlagsArray = ''
@@ -18,7 +18,7 @@ buildGoModule rec {
-X github.com/derailed/k9s/cmd.commit=${src.rev}
'';
- vendorSha256 = "105vmy8agl3ppgi28wg7djx0jrfam7nxfvvlps9ycgyrv2qpjh2n";
+ vendorSha256 = "116aidry55917ays7rn5r5kj17nbgb9qi16bplml9kxfkjv072kz";
doCheck = false;
diff --git a/third_party/nixpkgs/pkgs/applications/networking/cluster/kube3d/default.nix b/third_party/nixpkgs/pkgs/applications/networking/cluster/kube3d/default.nix
index 0f39fc5281..f6306ef904 100644
--- a/third_party/nixpkgs/pkgs/applications/networking/cluster/kube3d/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/networking/cluster/kube3d/default.nix
@@ -2,7 +2,7 @@
buildGoModule rec {
pname = "kube3d";
- version = "3.1.5";
+ version = "3.2.0";
k3sVersion = "1.18.9-k3s1";
excludedPackages = ''tools'';
@@ -11,7 +11,7 @@ buildGoModule rec {
owner = "rancher";
repo = "k3d";
rev = "v${version}";
- sha256 = "0aspkar9im323d8117k48fvh1yylyspi2p2l2f5rdg1ilpa6hm53";
+ sha256 = "0jy0l8rvmwi0qznnvv97v50lfkpc2bwjmbnq4pxnmf9ih970wjwh";
};
buildFlagsArray = ''
@@ -23,12 +23,11 @@ buildGoModule rec {
nativeBuildInputs = [ installShellFiles ];
- # TODO: Move to enhanced installShellCompletion when in master: PR #83630
postInstall = ''
- $out/bin/k3d completion bash > k3d.bash
- $out/bin/k3d completion fish > k3d.fish
- $out/bin/k3d completion zsh > _k3d
- installShellCompletion k3d.{bash,fish} --zsh _k3d
+ installShellCompletion --cmd k3d \
+ --bash <($out/bin/k3d completion bash) \
+ --fish <($out/bin/k3d completion fish) \
+ --zsh <($out/bin/k3d completion zsh)
'';
vendorSha256 = null;
diff --git a/third_party/nixpkgs/pkgs/applications/networking/cluster/kubelogin/default.nix b/third_party/nixpkgs/pkgs/applications/networking/cluster/kubelogin/default.nix
index 4d883553bc..ced9c43876 100644
--- a/third_party/nixpkgs/pkgs/applications/networking/cluster/kubelogin/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/networking/cluster/kubelogin/default.nix
@@ -2,13 +2,13 @@
buildGoModule rec {
pname = "kubelogin";
- version = "0.0.6";
+ version = "0.0.7";
src = fetchFromGitHub {
owner = "Azure";
repo = pname;
rev = "v${version}";
- sha256 = "18rkjdl8asr5c1kgdm2iqb5qwkfcrv2sk3nns3hhfqzs2v9mxmha";
+ sha256 = "0jw8v6ff0iwkwxlhcr35cvhy4zg31dsm1s3q4fxgi901yj1wn6zy";
};
vendorSha256 = "0al8y65xvnwl34jkpqyf6zwr21xn30zswknlym9nnn1n47fyayxb";
diff --git a/third_party/nixpkgs/pkgs/applications/networking/cluster/terraform-providers/default.nix b/third_party/nixpkgs/pkgs/applications/networking/cluster/terraform-providers/default.nix
index ebe787a251..6ce7ad6092 100644
--- a/third_party/nixpkgs/pkgs/applications/networking/cluster/terraform-providers/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/networking/cluster/terraform-providers/default.nix
@@ -149,16 +149,6 @@ let
'';
});
- # provider was moved to the `vultr` organization, but kept the old references:
- # https://github.com/vultr/terraform-provider-vultr/pull/67
- # this override should be removed as soon as new version (>1.4.1) is released.
- vultr = automated-providers.vultr.overrideAttrs (attrs: {
- prePatch = attrs.prePatch or "" + ''
- substituteInPlace go.mod --replace terraform-providers/terraform-provider-vultr vultr/terraform-provider-vultr
- substituteInPlace main.go --replace terraform-providers/terraform-provider-vultr vultr/terraform-provider-vultr
- '';
- });
-
# Packages that don't fit the default model
ansible = callPackage ./ansible {};
cloudfoundry = callPackage ./cloudfoundry {};
diff --git a/third_party/nixpkgs/pkgs/applications/networking/cluster/terraform-providers/providers.json b/third_party/nixpkgs/pkgs/applications/networking/cluster/terraform-providers/providers.json
index 83843a82a6..3136529bae 100644
--- a/third_party/nixpkgs/pkgs/applications/networking/cluster/terraform-providers/providers.json
+++ b/third_party/nixpkgs/pkgs/applications/networking/cluster/terraform-providers/providers.json
@@ -1017,9 +1017,9 @@
"vultr": {
"owner": "vultr",
"repo": "terraform-provider-vultr",
- "rev": "v1.4.1",
- "sha256": "1jx9p4bwpa5zxig6gfk4akfsnbivvyhwcw8id2ch2ga9a67pwald",
- "version": "1.4.1"
+ "rev": "v1.5.0",
+ "sha256": "04qy366ignn53bbdj9s3032qr1x7h84q36qzl5ywydlw2va0qbsd",
+ "version": "1.5.0"
},
"wavefront": {
"owner": "terraform-providers",
diff --git a/third_party/nixpkgs/pkgs/applications/networking/cluster/terraform/default.nix b/third_party/nixpkgs/pkgs/applications/networking/cluster/terraform/default.nix
index b73f24ed47..b478071ead 100644
--- a/third_party/nixpkgs/pkgs/applications/networking/cluster/terraform/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/networking/cluster/terraform/default.nix
@@ -114,7 +114,7 @@ let
(orig: { passthru = orig.passthru // passthru; })
else
lib.appendToName "with-plugins" (stdenv.mkDerivation {
- inherit (terraform) name;
+ inherit (terraform) name meta;
buildInputs = [ makeWrapper ];
buildCommand = pluginDir + ''
diff --git a/third_party/nixpkgs/pkgs/applications/networking/feedreaders/newsflash/default.nix b/third_party/nixpkgs/pkgs/applications/networking/feedreaders/newsflash/default.nix
index 896904b0ca..441a80fc07 100644
--- a/third_party/nixpkgs/pkgs/applications/networking/feedreaders/newsflash/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/networking/feedreaders/newsflash/default.nix
@@ -8,7 +8,7 @@
, gdk-pixbuf
, glib
, gtk3
-, libhandy
+, libhandy_0
, openssl
, sqlite
, webkitgtk
@@ -54,7 +54,7 @@ rustPlatform.buildRustPackage rec {
buildInputs = [
gtk3
- libhandy
+ libhandy_0
openssl
sqlite
webkitgtk
diff --git a/third_party/nixpkgs/pkgs/applications/networking/instant-messengers/element/element-desktop-package.json b/third_party/nixpkgs/pkgs/applications/networking/instant-messengers/element/element-desktop-package.json
index 364f5a25d0..871850fd6a 100644
--- a/third_party/nixpkgs/pkgs/applications/networking/instant-messengers/element/element-desktop-package.json
+++ b/third_party/nixpkgs/pkgs/applications/networking/instant-messengers/element/element-desktop-package.json
@@ -2,7 +2,7 @@
"name": "element-desktop",
"productName": "Element",
"main": "src/electron-main.js",
- "version": "1.7.12",
+ "version": "1.7.13",
"description": "A feature-rich client for Matrix.org",
"author": "Element",
"repository": {
diff --git a/third_party/nixpkgs/pkgs/applications/networking/instant-messengers/element/element-desktop.nix b/third_party/nixpkgs/pkgs/applications/networking/instant-messengers/element/element-desktop.nix
index b31841c5e7..4f387045bb 100644
--- a/third_party/nixpkgs/pkgs/applications/networking/instant-messengers/element/element-desktop.nix
+++ b/third_party/nixpkgs/pkgs/applications/networking/instant-messengers/element/element-desktop.nix
@@ -8,12 +8,12 @@
let
executableName = "element-desktop";
- version = "1.7.12";
+ version = "1.7.13";
src = fetchFromGitHub {
owner = "vector-im";
repo = "riot-desktop";
rev = "v${version}";
- sha256 = "08d9llrglap5bbicdkbdl9l71wba2kkyhdyd0a4iqdz3l2jvv698";
+ sha256 = "04nm5amhc0bqqwcc1c9x88lnbjaaryfs0xhi4as65l5ac4jdkzjc";
};
electron = electron_9;
diff --git a/third_party/nixpkgs/pkgs/applications/networking/instant-messengers/element/element-web.nix b/third_party/nixpkgs/pkgs/applications/networking/instant-messengers/element/element-web.nix
index 0d3e771630..93f9e34f86 100644
--- a/third_party/nixpkgs/pkgs/applications/networking/instant-messengers/element/element-web.nix
+++ b/third_party/nixpkgs/pkgs/applications/networking/instant-messengers/element/element-web.nix
@@ -12,11 +12,11 @@ let
in stdenv.mkDerivation rec {
pname = "element-web";
- version = "1.7.12";
+ version = "1.7.13";
src = fetchurl {
url = "https://github.com/vector-im/riot-web/releases/download/v${version}/riot-v${version}.tar.gz";
- sha256 = "173hdg09cw13vqh0lvz6kl0mq4i3rsacjxhspkpydh2qd1g3hjrs";
+ sha256 = "13ylzyr1kkrppvp86kih60pqxlsvqlcsgz2gj4azgmrf2bijfby3";
};
installPhase = ''
diff --git a/third_party/nixpkgs/pkgs/applications/networking/instant-messengers/fractal/default.nix b/third_party/nixpkgs/pkgs/applications/networking/instant-messengers/fractal/default.nix
index 68e7282870..7098bba2de 100644
--- a/third_party/nixpkgs/pkgs/applications/networking/instant-messengers/fractal/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/networking/instant-messengers/fractal/default.nix
@@ -12,7 +12,7 @@
, pkg-config
, gtksourceview4
, glib
-, libhandy
+, libhandy_0
, gtk3
, dbus
, openssl
@@ -63,10 +63,10 @@ rustPlatform.buildRustPackage rec {
gtkSupport = true;
})
gst_all_1.gstreamer
- gst_all_1.gst-validate
+ gst_all_1.gst-devtools
gtk3
gtksourceview4
- libhandy
+ libhandy_0
openssl
sqlite
];
diff --git a/third_party/nixpkgs/pkgs/applications/networking/mailreaders/thunderbird-bin/release_sources.nix b/third_party/nixpkgs/pkgs/applications/networking/mailreaders/thunderbird-bin/release_sources.nix
index ca2b8a7734..ec2d3c9af1 100644
--- a/third_party/nixpkgs/pkgs/applications/networking/mailreaders/thunderbird-bin/release_sources.nix
+++ b/third_party/nixpkgs/pkgs/applications/networking/mailreaders/thunderbird-bin/release_sources.nix
@@ -1,665 +1,665 @@
{
- version = "78.4.1";
+ version = "78.4.2";
sources = [
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-x86_64/af/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-x86_64/af/thunderbird-78.4.2.tar.bz2";
locale = "af";
arch = "linux-x86_64";
- sha256 = "36268a7fe6ec5a0ea0243f83ffbd73204d5c4ef257b0c8857a50428304b2d4c2";
+ sha256 = "8b1c2e12bd1de45251131d9fe444b06681577cafc019219dac4aa13b3abf989b";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-x86_64/ar/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-x86_64/ar/thunderbird-78.4.2.tar.bz2";
locale = "ar";
arch = "linux-x86_64";
- sha256 = "831e70f807f05ce2f82bb11db35d05ed80dac53ad00c12ff6e191a627d0d42d0";
+ sha256 = "708ce9ae434ae78bd21d2c8a608a732d6ebdc88c2cc3c91c748d2b6a4eab24bd";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-x86_64/ast/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-x86_64/ast/thunderbird-78.4.2.tar.bz2";
locale = "ast";
arch = "linux-x86_64";
- sha256 = "e6efde72ce7aeeda5f7c6d7cc0f3a08265c44546a0f8fc84a2adbc11cc038601";
+ sha256 = "46aadaa73a4e214c016f05eb9e0dc0a3daa6a87fc72988c696bf243d475d0285";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-x86_64/be/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-x86_64/be/thunderbird-78.4.2.tar.bz2";
locale = "be";
arch = "linux-x86_64";
- sha256 = "07fe33390caf37a96c000e0f5435d07711f7a95dbe04f85a222b17ae5a13f1bc";
+ sha256 = "06abeef2331df228ad303d9280d077ef4a74af8658c4ac0147ae59e181dfc42e";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-x86_64/bg/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-x86_64/bg/thunderbird-78.4.2.tar.bz2";
locale = "bg";
arch = "linux-x86_64";
- sha256 = "d460e201cbe4a1d6548a52121a33c2aaa7cbbf0e126fa1c4e8a431423424fb9e";
+ sha256 = "3aa13c52a514f5331bf626f9e3138bfe995c6a223559a9fbd6d590858484d9c1";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-x86_64/br/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-x86_64/br/thunderbird-78.4.2.tar.bz2";
locale = "br";
arch = "linux-x86_64";
- sha256 = "9e85928f1145391d9c3f238612b93e6344a2ad5e6179bf09502b1b69c8ad1b03";
+ sha256 = "1f2d9ee7090e96e3e5611011c9fef8389b514dda4edbf47e889019312df6ab5f";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-x86_64/ca/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-x86_64/ca/thunderbird-78.4.2.tar.bz2";
locale = "ca";
arch = "linux-x86_64";
- sha256 = "1516236c252f22933adf23bfe93d73fa272a4574deb674aef6e1f35006a6cc50";
+ sha256 = "f48d5d02a04212ca14cd4c175102a0e45483299d8a4615ff96232431c4ffa4a5";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-x86_64/cak/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-x86_64/cak/thunderbird-78.4.2.tar.bz2";
locale = "cak";
arch = "linux-x86_64";
- sha256 = "c46508321d32c468d067d86c04973ca345b09b0e983954eaa123d02778d61fbd";
+ sha256 = "28b541daeac6aa6274f4185f9471ce8b2a46e18fe55ae1e373246d9f23d78ec6";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-x86_64/cs/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-x86_64/cs/thunderbird-78.4.2.tar.bz2";
locale = "cs";
arch = "linux-x86_64";
- sha256 = "227209429c07238f38d334e5ac8a5fd895a4c87f51b21b4376df89c50bb6a789";
+ sha256 = "d4f061ac86da0b6279b81b30c8949cca93aca5b2f90d0e5dafc5cdecc2868e05";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-x86_64/cy/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-x86_64/cy/thunderbird-78.4.2.tar.bz2";
locale = "cy";
arch = "linux-x86_64";
- sha256 = "b272926205e5470df8aec8b22d6733e4f47993e76123fe81d4be26ad5a153062";
+ sha256 = "824c703a570ae23d8e7b86d93baabb193842ac36fbc9d4ec65ae686e3d540de1";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-x86_64/da/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-x86_64/da/thunderbird-78.4.2.tar.bz2";
locale = "da";
arch = "linux-x86_64";
- sha256 = "13f9fe10c84d2b8d8d0215cb58a9852486741f5bc8c6979f0a701bef14a70f4f";
+ sha256 = "8dd27d2596346853e3fddab12ad0dabd700c5216310922e768faacb019b5b3d9";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-x86_64/de/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-x86_64/de/thunderbird-78.4.2.tar.bz2";
locale = "de";
arch = "linux-x86_64";
- sha256 = "590f9a5a975544d2effedda942e3989a13be23b95f4e6707f9905fed3fc08214";
+ sha256 = "3920c60073ee3066fbe35a1d2c34ab03a7b7e2dfbbe22af97fa32814000f6942";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-x86_64/dsb/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-x86_64/dsb/thunderbird-78.4.2.tar.bz2";
locale = "dsb";
arch = "linux-x86_64";
- sha256 = "5b572c847f9ec76b25c225652c23ecf8c56523ffc3071b437310f0d8f9049b05";
+ sha256 = "fd09bbf80996e3aaf12dba79c366c4cfff41a0db0cdf7f6ed4d9722fd2623ff1";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-x86_64/el/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-x86_64/el/thunderbird-78.4.2.tar.bz2";
locale = "el";
arch = "linux-x86_64";
- sha256 = "7cad76ea5a07dce6bdd3db78485f83a998ff27037f8ca68f8617659a06910a05";
+ sha256 = "a9df959b2df9c381b9881fe3015e654ac82ca441a3cfc25036c1e658401bf810";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-x86_64/en-CA/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-x86_64/en-CA/thunderbird-78.4.2.tar.bz2";
locale = "en-CA";
arch = "linux-x86_64";
- sha256 = "f261b38fbc8d83c20be63015a444644a95f7d8b6584fcfc193145abcc69a4164";
+ sha256 = "126e6fffa28b9c2a7eb7bb49254786fd0884aba62524dcf7d8352d6542903f77";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-x86_64/en-GB/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-x86_64/en-GB/thunderbird-78.4.2.tar.bz2";
locale = "en-GB";
arch = "linux-x86_64";
- sha256 = "5c0c364b1408182c0cbae1c2d05041781e2e4f3a17fb1735d61196c9b647dba4";
+ sha256 = "099ef4c54072c6a4a134badd02a51255573e876c8b630c3b9eaecfde997f9e03";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-x86_64/en-US/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-x86_64/en-US/thunderbird-78.4.2.tar.bz2";
locale = "en-US";
arch = "linux-x86_64";
- sha256 = "a152c3b8c6ad4ba3a92a8a1f909b99599d8c3ded62b57e9721fb333b47f6509d";
+ sha256 = "e6041bd8ad2a21f0a8f8d78fd395239f1f41e2948584770673aaa0f3a9978b3e";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-x86_64/es-AR/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-x86_64/es-AR/thunderbird-78.4.2.tar.bz2";
locale = "es-AR";
arch = "linux-x86_64";
- sha256 = "dc06a64e0b20dd174d6158e5d2f393bf6a6907f8f515120220bb2a8480f58d1c";
+ sha256 = "d4055f3134cd255f8e91ee2ef012bd4e4443e6db519cb7bf2543d4e193f59f61";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-x86_64/es-ES/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-x86_64/es-ES/thunderbird-78.4.2.tar.bz2";
locale = "es-ES";
arch = "linux-x86_64";
- sha256 = "7d3b7ff0ffb9b19f10bd7c2cffb5dbff8216c65c01fd4032ba5b7924c73ce343";
+ sha256 = "39f3c8e5262b1125f21e2bc0e51d53b09283ef4922a7bbec6146605ea0bd1d51";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-x86_64/et/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-x86_64/et/thunderbird-78.4.2.tar.bz2";
locale = "et";
arch = "linux-x86_64";
- sha256 = "a9a8e610bc1c696137ee650fa11f2cbf8dece4ba32d1f0961ae697f6433cf1b2";
+ sha256 = "60331d65f98b68397a0d53a08a169b97654aae3d26efe48f494f575e1a51fe13";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-x86_64/eu/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-x86_64/eu/thunderbird-78.4.2.tar.bz2";
locale = "eu";
arch = "linux-x86_64";
- sha256 = "6835e8459b4191cd4bb5ae8011d032d475631e7a532450b98f0b087ed0a80fb6";
+ sha256 = "206026522eb361b599dccf433887b1314b554adfea90ee558f36d116ae6c8f70";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-x86_64/fa/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-x86_64/fa/thunderbird-78.4.2.tar.bz2";
locale = "fa";
arch = "linux-x86_64";
- sha256 = "7cfd8681a7ed38364a823881fbb42af8cf33d17bf911e9f5b97dd18102b412f5";
+ sha256 = "88f1421d251e0bc5288f2c8ca333345ec97ca0a86d491b242471d1af82c04776";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-x86_64/fi/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-x86_64/fi/thunderbird-78.4.2.tar.bz2";
locale = "fi";
arch = "linux-x86_64";
- sha256 = "8c84662afb60e3dc94eace5a493f7feef6598b78613fe99f195408e4ee2b0a11";
+ sha256 = "4abbc607c3d6ec03a8416636e88ffdfd61fc0b062aa135d14fb3918c284f9ebd";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-x86_64/fr/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-x86_64/fr/thunderbird-78.4.2.tar.bz2";
locale = "fr";
arch = "linux-x86_64";
- sha256 = "24449816c690757b05d1913ff1fa12eed47f316ac13c76a195ae0628c6950da0";
+ sha256 = "406437d8cf7a695b636c3c1005df5a65f174bbb10d0d961ddda08833ee2c808d";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-x86_64/fy-NL/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-x86_64/fy-NL/thunderbird-78.4.2.tar.bz2";
locale = "fy-NL";
arch = "linux-x86_64";
- sha256 = "9a0334f032333eda16cdabd5dffb05f5a22edb1dcf4bcd0b47495defd0d9f3dc";
+ sha256 = "456f51fbef14e1de16fdb3d7c31b6736e0e7b43c509ac38bdb8a88cb4a2de0d9";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-x86_64/ga-IE/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-x86_64/ga-IE/thunderbird-78.4.2.tar.bz2";
locale = "ga-IE";
arch = "linux-x86_64";
- sha256 = "33e5a54e2259984ff29d3394fe936b5af8830e489e0775ff36eace4c6b3dc145";
+ sha256 = "0f1ab856deed39280ab9d6a43afd6f719470d4aafc4404e0662da0e14b64308a";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-x86_64/gd/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-x86_64/gd/thunderbird-78.4.2.tar.bz2";
locale = "gd";
arch = "linux-x86_64";
- sha256 = "b91c4b3aafa2166cd27c52977711c55aa425f68c5f7cca64be1dd07fd533bc05";
+ sha256 = "07f2fc13f34a70d4e6ecc65d465e33f5bcff63196996fe057f8584ef2e7e595c";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-x86_64/gl/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-x86_64/gl/thunderbird-78.4.2.tar.bz2";
locale = "gl";
arch = "linux-x86_64";
- sha256 = "d1c03b3b92bef4f3c94518981cf99840944c8a36aab7b2cfe3f72f1f0e57e045";
+ sha256 = "f4cb60a537ffba88823c8c8a60f2c164e62fbba13d448f2931c71e7d98d6abe0";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-x86_64/he/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-x86_64/he/thunderbird-78.4.2.tar.bz2";
locale = "he";
arch = "linux-x86_64";
- sha256 = "7fdaf0e83eeb39b66a6d1c2600f2c6f1b69ec4f67dd7b33a39132e838a699f06";
+ sha256 = "425a0bd38d231308fa5cac5d362b7818ccfb6b5fc06924ce312433ba4d5bf2b0";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-x86_64/hr/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-x86_64/hr/thunderbird-78.4.2.tar.bz2";
locale = "hr";
arch = "linux-x86_64";
- sha256 = "4ba99eaa25964bde6108eeab702b096ba50b45d8db7e36f3203b0a71cc1e30cf";
+ sha256 = "37d3f14aeed404bad5cab35c256473a5927787f889afee3da112e510999373f9";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-x86_64/hsb/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-x86_64/hsb/thunderbird-78.4.2.tar.bz2";
locale = "hsb";
arch = "linux-x86_64";
- sha256 = "187a5f2b2e1b16fad948356f31b2ac903fe318432d9a3f105055c23d1225d11b";
+ sha256 = "3249467db25d25866a4d1e0acd9a18a26bad13e2ca683df04ca5f8ca19affac3";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-x86_64/hu/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-x86_64/hu/thunderbird-78.4.2.tar.bz2";
locale = "hu";
arch = "linux-x86_64";
- sha256 = "8f6b79692143e6e27cc844985366004d06c8e55184a73477fd20020575947ad8";
+ sha256 = "f3a82c5917757f221ca59c4b6a950991b52b10f2782b1dffe21c7a7ca6a26272";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-x86_64/hy-AM/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-x86_64/hy-AM/thunderbird-78.4.2.tar.bz2";
locale = "hy-AM";
arch = "linux-x86_64";
- sha256 = "4066683e4a635b163b9b14e1921d834b37a95cee8dd04fc6885094c5e0394dee";
+ sha256 = "cb917c1ff3fa342a8ad3253a03a1dbb4a417c0bc3cdfd1422ef5ff06dcfcca74";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-x86_64/id/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-x86_64/id/thunderbird-78.4.2.tar.bz2";
locale = "id";
arch = "linux-x86_64";
- sha256 = "1fed6d3a9a11d303db2f2c6f7a92639b92ca144ce3b45eed4607696ea4617511";
+ sha256 = "1599ddf22093c6a99ccd3ec3e1492e65ce0b5ebdc3a69aafb321ec26f22b6a13";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-x86_64/is/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-x86_64/is/thunderbird-78.4.2.tar.bz2";
locale = "is";
arch = "linux-x86_64";
- sha256 = "a627c95d2284b4e828a466865aa19262aa84a1a2267235c3f62d13c52081c580";
+ sha256 = "8cb02ca7ce8c28c10aa1f16ed08417342e93da2dd00f15c5a89fd71306f9afb3";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-x86_64/it/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-x86_64/it/thunderbird-78.4.2.tar.bz2";
locale = "it";
arch = "linux-x86_64";
- sha256 = "6b01e88da702deee95a3a6d526e563e854be7ae13414fed3a2c9cc427e906ffa";
+ sha256 = "16f3c54980e614b20ef6a8c0a09ebe7707e298d753d373da79bb2d52d1cc43b6";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-x86_64/ja/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-x86_64/ja/thunderbird-78.4.2.tar.bz2";
locale = "ja";
arch = "linux-x86_64";
- sha256 = "3b63cf4c45945f4a40159a417ed217b77128905de82812fe2165c0c5f66410a7";
+ sha256 = "e4ec88dd86b46d814232662a4d558361043ac97b348a8fbb2076ec856087be6e";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-x86_64/ka/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-x86_64/ka/thunderbird-78.4.2.tar.bz2";
locale = "ka";
arch = "linux-x86_64";
- sha256 = "c9d11ae298691f2e302078f865b047b1c2b568ae763495fbfe2f2d4f04a9ef6a";
+ sha256 = "9c2a110ed4df58c334b533255c0f3bf46d777960967e46e74f7f376203bf467b";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-x86_64/kab/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-x86_64/kab/thunderbird-78.4.2.tar.bz2";
locale = "kab";
arch = "linux-x86_64";
- sha256 = "b6367ccb74b2ced8708ca9f4c2c06aeaaf4f3bcba0b2b2fdf2c552aa10fcfc03";
+ sha256 = "1f5cf7b8a03fb4273d9ce4d657c3a77ac4a26b7716e3bed700e14f05a398163d";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-x86_64/kk/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-x86_64/kk/thunderbird-78.4.2.tar.bz2";
locale = "kk";
arch = "linux-x86_64";
- sha256 = "99ece9975a3981fa33887d3b5d60cd6874e1dab7c51d830dc0d13c28c103ca79";
+ sha256 = "002ac92fee28c3ec9c05587025eddb4065a842df0430ace7f468ed8f3ec2df27";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-x86_64/ko/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-x86_64/ko/thunderbird-78.4.2.tar.bz2";
locale = "ko";
arch = "linux-x86_64";
- sha256 = "d81c844cbd490e5eeeb2739a9b040062baf3bbdf13ddfbceb59b5630019b935d";
+ sha256 = "277f0fdfbda0d215a03ccd663f0986cf1b0a1c4e68e3ef36e81c8505d6eb7d09";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-x86_64/lt/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-x86_64/lt/thunderbird-78.4.2.tar.bz2";
locale = "lt";
arch = "linux-x86_64";
- sha256 = "56b5813a5b0debfe90fa2a20fb9a13ea210e2eed37f180f3e23e851f871241e2";
+ sha256 = "65b6737b4ff528453bdaf57cc525a74c79899a9563d189123f87db729aa0f529";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-x86_64/ms/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-x86_64/ms/thunderbird-78.4.2.tar.bz2";
locale = "ms";
arch = "linux-x86_64";
- sha256 = "8dc3f341a69b9ef458c1203ff15779beecf3db2dede1cd8740ee19a9552f22f3";
+ sha256 = "cd40e14d4dbcf03ea7e5ab672678abc9b3b46c5b67fdbb961928a860c2f3218b";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-x86_64/nb-NO/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-x86_64/nb-NO/thunderbird-78.4.2.tar.bz2";
locale = "nb-NO";
arch = "linux-x86_64";
- sha256 = "0fe431d3773de39431cd777cf301d2c3d8074dd41596bf6a6f1bef96870413b4";
+ sha256 = "49c9633a0552a704b06df87ea91991017be920684d12f66c72f6795dafd1cd5d";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-x86_64/nl/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-x86_64/nl/thunderbird-78.4.2.tar.bz2";
locale = "nl";
arch = "linux-x86_64";
- sha256 = "4127bdb6338210d9928fc84838a57cfb731aa3254aa5427471deca00bb12beca";
+ sha256 = "4514d79caa1e2b44cafdc9ef06aa54c4708763c888a489d6bdf4473597221316";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-x86_64/nn-NO/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-x86_64/nn-NO/thunderbird-78.4.2.tar.bz2";
locale = "nn-NO";
arch = "linux-x86_64";
- sha256 = "cf0c6d67115ee36b80010d93d50991a544af332ca19f1ed1199f49c7dd125049";
+ sha256 = "f6aab88e4708659658be8cfb457c40533969a261af489a976f4010439a833458";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-x86_64/pa-IN/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-x86_64/pa-IN/thunderbird-78.4.2.tar.bz2";
locale = "pa-IN";
arch = "linux-x86_64";
- sha256 = "283c2be7f9bc0aa3d505f1838f1c03721a4b956870ac2b1e762b966e87767ce0";
+ sha256 = "10f5a885550f2cbee158fedc7111b96a0f07764b5d6d60004d17c233153f304b";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-x86_64/pl/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-x86_64/pl/thunderbird-78.4.2.tar.bz2";
locale = "pl";
arch = "linux-x86_64";
- sha256 = "4c07e4500ad4c0d698942e3c47ced3bbd6142e4a70292629ebbe53ef5f1816f9";
+ sha256 = "1a192c0a9b8ac2f9b18445e69024462b8e95b78bff48014b55dd451e260aaf73";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-x86_64/pt-BR/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-x86_64/pt-BR/thunderbird-78.4.2.tar.bz2";
locale = "pt-BR";
arch = "linux-x86_64";
- sha256 = "c6ace3452d1720681e668da50d16811286c1e73021bd06ab9b538c6f6fc5fda6";
+ sha256 = "b9dc3db4d8cf4fc2b958695f9077c50d48d355e850618320adff179d33a116d0";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-x86_64/pt-PT/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-x86_64/pt-PT/thunderbird-78.4.2.tar.bz2";
locale = "pt-PT";
arch = "linux-x86_64";
- sha256 = "b9ab4d38b271e2987b5e425a277042dc149794cf461283114553133e7fed5f06";
+ sha256 = "0a3887ff46f9ecc1576bda76e1469eed8ef43813ccec25536e2dbae289196bd5";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-x86_64/rm/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-x86_64/rm/thunderbird-78.4.2.tar.bz2";
locale = "rm";
arch = "linux-x86_64";
- sha256 = "50fc69135b789b2bb5d8008292d3fc25f1a0a30bba35c6e24ddfeabe55231407";
+ sha256 = "1a13d443c00da4300aaf58d0af0620541de04e02e87218fa0774cad4b2aaa34f";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-x86_64/ro/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-x86_64/ro/thunderbird-78.4.2.tar.bz2";
locale = "ro";
arch = "linux-x86_64";
- sha256 = "1e050b33a942dc815e739c57944a0d705982e18e74637172b0366a9b06916f7b";
+ sha256 = "62bd15566895dc9462b985f2f5e1afcc7057ef4e93f69005b9ebe89821a2a73a";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-x86_64/ru/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-x86_64/ru/thunderbird-78.4.2.tar.bz2";
locale = "ru";
arch = "linux-x86_64";
- sha256 = "c295bda57db84e07f28affa4201c4f612478efce733cb9c69962f6d7a797218b";
+ sha256 = "e0624e745da31cafe1b885393e11622bac6ddd2e3e4c0cd35432eb5e0e57a47c";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-x86_64/si/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-x86_64/si/thunderbird-78.4.2.tar.bz2";
locale = "si";
arch = "linux-x86_64";
- sha256 = "63dc83cfab8be94893ca6a0d60e448d14db1afcae55192149a882456dca77e9a";
+ sha256 = "46e286fd0913b07ede577514b8e64ce279afd7bda3054b7cba4ec1f9981eef03";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-x86_64/sk/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-x86_64/sk/thunderbird-78.4.2.tar.bz2";
locale = "sk";
arch = "linux-x86_64";
- sha256 = "5ab5ea76649582ddf10fa77bbb95040d157883e0905df72f5bc0ae79167d97be";
+ sha256 = "3ab838c25d5e10d318705bed69e690d287e6b988412a3f9d5d94f2b7c8cd831b";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-x86_64/sl/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-x86_64/sl/thunderbird-78.4.2.tar.bz2";
locale = "sl";
arch = "linux-x86_64";
- sha256 = "da3f8a30797386bc7c9ba135ba360cee01143bc76a2315e7a2223bab90e2283e";
+ sha256 = "c04e1a339c4fb2ca8748da6bbc0f5a4dc9eb032b565d6f2333c7d1751eaaaa9a";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-x86_64/sq/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-x86_64/sq/thunderbird-78.4.2.tar.bz2";
locale = "sq";
arch = "linux-x86_64";
- sha256 = "f2f9639c4b4dc4bfba476aa92814fee65ecd3fca27652177614d1107e4200246";
+ sha256 = "ae9052f081baf3f25c43b2b1e109ce50abeacb5b2322ef38f8d42fb070417908";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-x86_64/sr/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-x86_64/sr/thunderbird-78.4.2.tar.bz2";
locale = "sr";
arch = "linux-x86_64";
- sha256 = "3bcad0c845e4481a22c1b330b6cd94c3c6fc46c33597ce5af0594368579a8260";
+ sha256 = "c4eec55d9be21e02158e8266b9b7b424aa1f5d1078d9de2f0dfce4fef5f801d2";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-x86_64/sv-SE/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-x86_64/sv-SE/thunderbird-78.4.2.tar.bz2";
locale = "sv-SE";
arch = "linux-x86_64";
- sha256 = "9b09d4ab71000429c5015dd8a0642cfe0eeeaa785d2cac6e876b1cd6aadaeb44";
+ sha256 = "c7c01c580e1201e2948d0bfe3e029b6bd3a98e9845e6ff648d8bd4fbc8189d37";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-x86_64/th/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-x86_64/th/thunderbird-78.4.2.tar.bz2";
locale = "th";
arch = "linux-x86_64";
- sha256 = "b33e42f0271ee84a581a737513197d5f036695706b19697a53000834c199c75f";
+ sha256 = "f09079980e41c156e62f8d008d600850ca8a62fc88917f3cc06d10321bb3e500";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-x86_64/tr/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-x86_64/tr/thunderbird-78.4.2.tar.bz2";
locale = "tr";
arch = "linux-x86_64";
- sha256 = "f419ed9f0f06575da2f89486d830ab7fd2b439dcfcac92f1b31c573901e7b9ea";
+ sha256 = "2b99f6fcf904c7cdf67de2ed957167b6e1fe7d997c5a422641bba0af8a22b7f4";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-x86_64/uk/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-x86_64/uk/thunderbird-78.4.2.tar.bz2";
locale = "uk";
arch = "linux-x86_64";
- sha256 = "bcecec66a6ef8b928da2aa5d52d89f4f1587d4e45bf0e836b71912b0e5a43f7c";
+ sha256 = "d502f4447e1e0c02e9384435e1b552c4da6d083225555b03f90d71ed04314324";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-x86_64/uz/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-x86_64/uz/thunderbird-78.4.2.tar.bz2";
locale = "uz";
arch = "linux-x86_64";
- sha256 = "2b33f40b9da386e61f3bdcacd9c16fc06dac18d2b36865292700744dfbe2da25";
+ sha256 = "7b9548f91dcf0ee6bfaed9d735baf9254842a633e3f06986d00d9d86b0f645d6";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-x86_64/vi/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-x86_64/vi/thunderbird-78.4.2.tar.bz2";
locale = "vi";
arch = "linux-x86_64";
- sha256 = "b5d005c45221c41e1e81234b755f6a9d380220cc03f43012c40440a0378c19e0";
+ sha256 = "32f78b425fd56900d1b3319e571af151214edee83a22321a449556e8ddebea69";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-x86_64/zh-CN/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-x86_64/zh-CN/thunderbird-78.4.2.tar.bz2";
locale = "zh-CN";
arch = "linux-x86_64";
- sha256 = "c08765cc8562cce08b4cda04123cd8672f5abb130b597f36f4c143d74b09b9b3";
+ sha256 = "a6252fdd66dbfbd33444a3ebdacef38f8b600891af324d31f22f2fcf59b1e7fb";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-x86_64/zh-TW/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-x86_64/zh-TW/thunderbird-78.4.2.tar.bz2";
locale = "zh-TW";
arch = "linux-x86_64";
- sha256 = "56f84ea43a5288a6cd34f8de5f69dde05737474f11c70d638981ef2ff4ea5bfa";
+ sha256 = "b97a176fc12f156d8503e07819e9a0536b338850b8527c3896d93a36d64083aa";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-i686/af/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-i686/af/thunderbird-78.4.2.tar.bz2";
locale = "af";
arch = "linux-i686";
- sha256 = "95384cf3d0ab6ad8d3bb133e8ff7c1881523c0f7be840c5ab6016325ebc7f9ff";
+ sha256 = "e1f0a03f540da701f9e742cf7a05e21a1216ba5c60c402968799ff494ffb1fcc";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-i686/ar/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-i686/ar/thunderbird-78.4.2.tar.bz2";
locale = "ar";
arch = "linux-i686";
- sha256 = "c2cf87579a092bec69042b35743574872b8b791d54628c35c28d44c1dc605b6b";
+ sha256 = "5bbee34fe9c5cf02f2f3c8160264f3a0ca3ad880bd75fd1ede87f906b886c7fd";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-i686/ast/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-i686/ast/thunderbird-78.4.2.tar.bz2";
locale = "ast";
arch = "linux-i686";
- sha256 = "127ce24b2c06606e9567e2106ba5cb9628d8bda10620b01cbfe60bc287977c94";
+ sha256 = "8a5e481e9aa16619513260d532ec6f7e2c6338b41a0a44468950ec26287b2a26";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-i686/be/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-i686/be/thunderbird-78.4.2.tar.bz2";
locale = "be";
arch = "linux-i686";
- sha256 = "e8acd7cc25f91af91caee7487598cf1f60512864cf1fee714d2289a65f0cc195";
+ sha256 = "27f600f0d4b977cde9ede5bd39efd97bfa1abc04f3d1c7a3290339e7eedaef47";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-i686/bg/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-i686/bg/thunderbird-78.4.2.tar.bz2";
locale = "bg";
arch = "linux-i686";
- sha256 = "461e4ec0b0f3dcb78426a99f0b8dc32b14dbc561b89e8d422433f5360425448d";
+ sha256 = "a9a6c127461ca7da6b5fca5e2d2ca8b1eecbbe78b42a9e18e16bc7a343c761ec";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-i686/br/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-i686/br/thunderbird-78.4.2.tar.bz2";
locale = "br";
arch = "linux-i686";
- sha256 = "ba3902a457d0570d3eeaa63cc83a67e35532e547127b71f38781158bc3cc5e60";
+ sha256 = "b8f363ca9ada5b2ed80a9526d1f775d9c17bfecd6b84113391fd6a5b1966bd90";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-i686/ca/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-i686/ca/thunderbird-78.4.2.tar.bz2";
locale = "ca";
arch = "linux-i686";
- sha256 = "609de3623c6f4075bedee741533843f6f9fd1afc5933fe3a8709f5c16c7d7bc5";
+ sha256 = "e1c5035ab818ce7525c2bd659622b14b3fe544b7f4c8432bca2b018c7ba1bfa5";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-i686/cak/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-i686/cak/thunderbird-78.4.2.tar.bz2";
locale = "cak";
arch = "linux-i686";
- sha256 = "4a5aa707eca53cf5490189a09d222abaa8290ea3366d4bf081273c23e89b3fc0";
+ sha256 = "f42d03442c8ab4bd844b0414e6d6c8ee168230714b55bbff1704117315f26a0d";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-i686/cs/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-i686/cs/thunderbird-78.4.2.tar.bz2";
locale = "cs";
arch = "linux-i686";
- sha256 = "0450c73284b274af21f3f0c4c21842e11fa2a86fcb38f96332c1ca8984149c62";
+ sha256 = "c45a3b75c5106377d73f72b905814972a58604b4f2bfe49f05f5177584f2e0d6";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-i686/cy/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-i686/cy/thunderbird-78.4.2.tar.bz2";
locale = "cy";
arch = "linux-i686";
- sha256 = "5686316ec53a76dab272934dbd274a47802c5c31f2ae8719bcf85c22e12cc3f7";
+ sha256 = "e8e1f70703c9c22fceb2efe10f55a2f25da4085822ada1a3a3a3736ae41c0503";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-i686/da/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-i686/da/thunderbird-78.4.2.tar.bz2";
locale = "da";
arch = "linux-i686";
- sha256 = "2025f5946989905fd197fe5bf6c51160e7c9d281d6cfd220ea3ee0393cc54ca0";
+ sha256 = "d8fb3be7bc41ae6ae0d064bdf9ab9cc569f65dc18f720de960ace84bb2514b68";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-i686/de/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-i686/de/thunderbird-78.4.2.tar.bz2";
locale = "de";
arch = "linux-i686";
- sha256 = "906e8a5de0aa12b496f4d4447df25432b11c88d79b7ab4a55291a9d65434aa03";
+ sha256 = "373f50cb99608779e502d76af0e4a301ef0b8b75a6ec235f64da7626188157c6";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-i686/dsb/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-i686/dsb/thunderbird-78.4.2.tar.bz2";
locale = "dsb";
arch = "linux-i686";
- sha256 = "d6bfb2b790d8391344916515d1cc6ca2eb68a3e58934cacba14e77788aec6b09";
+ sha256 = "07518d32b488fb805adceea1126ca104f2e86e3a1245f6cc4fe108b70335c995";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-i686/el/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-i686/el/thunderbird-78.4.2.tar.bz2";
locale = "el";
arch = "linux-i686";
- sha256 = "5f96345a945697326b24fcd73a96fa2f49edb66b02f4c23b6d392fad87935e08";
+ sha256 = "97699a80d96422dad4c95658c9c4d472bd1d69e1823f5a5f7dce5fdaddf1211f";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-i686/en-CA/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-i686/en-CA/thunderbird-78.4.2.tar.bz2";
locale = "en-CA";
arch = "linux-i686";
- sha256 = "b57e44fd16e33b178778a60f0bd47519585a3e648b3b621f1fd693836c5fb598";
+ sha256 = "0b2dc377399c4f27acb717c7f0e59e9e735ad3d2ba1e617a93a3fa337b6dd2c0";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-i686/en-GB/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-i686/en-GB/thunderbird-78.4.2.tar.bz2";
locale = "en-GB";
arch = "linux-i686";
- sha256 = "6f656dcbd7aaab5995beb11a9847e32f8820199272e2f9ce27583cd3d7e50a76";
+ sha256 = "679fd1138a8795b0e7d64a4b8d8a2821deb8b30d40092e9df98b0a08d6cc6539";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-i686/en-US/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-i686/en-US/thunderbird-78.4.2.tar.bz2";
locale = "en-US";
arch = "linux-i686";
- sha256 = "8c6bccc757df947bed74a3f7448a3885932a4f6c21d24ab6b5c7a94ab83ebae5";
+ sha256 = "a86f2780353dff8a449f323d5f54d83ce70b724db1a2d77dc3cecf6d1e849ada";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-i686/es-AR/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-i686/es-AR/thunderbird-78.4.2.tar.bz2";
locale = "es-AR";
arch = "linux-i686";
- sha256 = "55bbc629ceadf359e0ad05e763a31479f6c57c38f372e55812b028681a5ff32a";
+ sha256 = "1fbd2312a971f658243dd6733067157fe3de509a88b2cce766ee8e45c243d23d";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-i686/es-ES/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-i686/es-ES/thunderbird-78.4.2.tar.bz2";
locale = "es-ES";
arch = "linux-i686";
- sha256 = "bf30dd8882b2b35bfaa62a6c4b40a823333476128a6d5dd3e3d2c8eb16303b9a";
+ sha256 = "e51217ca711a307c67f538d487eb836d49e4ccd6b8ff9b1a1926bd481322d46f";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-i686/et/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-i686/et/thunderbird-78.4.2.tar.bz2";
locale = "et";
arch = "linux-i686";
- sha256 = "5b977eab7f203e230d6a03b36afebdb32c481f1eb8129e454977791469ed5651";
+ sha256 = "345ccfa0e703893795d226aacf95645cc2cdc7dc99f5f9fba108466f74af19fe";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-i686/eu/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-i686/eu/thunderbird-78.4.2.tar.bz2";
locale = "eu";
arch = "linux-i686";
- sha256 = "f2d606a6f825640c0f344cf470d87a1dea5fc6ff538239ce25c3d7c9fc76237d";
+ sha256 = "47e95ce28a229dbd01d8598d3a5b7f00d8e2c1934f8da4ff92052693dbb0c7c9";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-i686/fa/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-i686/fa/thunderbird-78.4.2.tar.bz2";
locale = "fa";
arch = "linux-i686";
- sha256 = "95d0d3d1b456c035cc6ed09df970e9e772a71af3703f05e9388e844d7f80edab";
+ sha256 = "6c05b6a34a1ae3232b417e37c6c71bb05e46a296019b55192331cd441f212e1b";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-i686/fi/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-i686/fi/thunderbird-78.4.2.tar.bz2";
locale = "fi";
arch = "linux-i686";
- sha256 = "e0be2532774bbe017a6091d7e1ec79901f692c39e04e01fe4094f7c8179fbaf4";
+ sha256 = "fe043a86dd6679dc20ed17920e008894d78562d099861c0cda598c74aff3b176";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-i686/fr/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-i686/fr/thunderbird-78.4.2.tar.bz2";
locale = "fr";
arch = "linux-i686";
- sha256 = "48cc16a61958160f369b32e8a0dcd2979ee65e18efe3d1dd3a4af1109842718b";
+ sha256 = "950fa73e6f5fcf2fd66da9af7b79e43420e3ce75c9227fee095ea65ce2769a7f";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-i686/fy-NL/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-i686/fy-NL/thunderbird-78.4.2.tar.bz2";
locale = "fy-NL";
arch = "linux-i686";
- sha256 = "386d0a2ed01b158f0fe18eb6820ff9a17fbbea61241eaf873782271ac84eb103";
+ sha256 = "e01f59e5b7abde309421515240229d16cc0ec6ad4ea52ef1a54fb65f0bc49091";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-i686/ga-IE/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-i686/ga-IE/thunderbird-78.4.2.tar.bz2";
locale = "ga-IE";
arch = "linux-i686";
- sha256 = "c0c15410e6812e8652181ab347b3fe60fdce3b5b9958d54ef3f96ecc46a4d344";
+ sha256 = "53a7b0b5a2046525701120101fbab5c581b99de56caadf3aed4732f444c35569";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-i686/gd/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-i686/gd/thunderbird-78.4.2.tar.bz2";
locale = "gd";
arch = "linux-i686";
- sha256 = "3989f0c0f87ebfca3e4cfad0ac9ca2964791ab8f1163f1bec340444ae4a72a7b";
+ sha256 = "eaea6b3770d5bc51a00e25fee02110f5614d9ef52049fc092d90dc1e8de4c210";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-i686/gl/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-i686/gl/thunderbird-78.4.2.tar.bz2";
locale = "gl";
arch = "linux-i686";
- sha256 = "eb1b58c93e492a79f92660909e671ee7ec504701b8e074d3dc6f3d3fe3619660";
+ sha256 = "b0c5d871785d1efa23bdbe341d8186b96394375ac56bb541d5d9a75bc784b471";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-i686/he/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-i686/he/thunderbird-78.4.2.tar.bz2";
locale = "he";
arch = "linux-i686";
- sha256 = "f584e117ba4fbfbb7d2c28b68377a88aad87929657141adac5ce960bcf5f4fa3";
+ sha256 = "cef410178a3cf310c7bf158eba5c12093385dfda1de334d6d6e0c28ada16c7ca";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-i686/hr/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-i686/hr/thunderbird-78.4.2.tar.bz2";
locale = "hr";
arch = "linux-i686";
- sha256 = "633eab2f8ac99426dd85b614f04d96509125f0799c187305b7678496d9ceff0f";
+ sha256 = "9040e2235a752a50cbe09207684df928b84787629d21c8d53e6b9bfc708b09a3";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-i686/hsb/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-i686/hsb/thunderbird-78.4.2.tar.bz2";
locale = "hsb";
arch = "linux-i686";
- sha256 = "80e4b98bbc9874de9b4c8e35633f6eea7b5707cfc4943df7264cf0bbfba49d99";
+ sha256 = "b0bb84d18c588abf2f05abc8ecb1f3a169221fcdf4117e48b3169362cfc69aa6";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-i686/hu/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-i686/hu/thunderbird-78.4.2.tar.bz2";
locale = "hu";
arch = "linux-i686";
- sha256 = "5a9339a876a7e0dced6769a99a948329f6eaa400acb6920a24d06695120f682a";
+ sha256 = "6d5d0ded325cf7852ef638d7f5d8dd4d7ce127ad7f4eace22ce696541f9485a5";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-i686/hy-AM/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-i686/hy-AM/thunderbird-78.4.2.tar.bz2";
locale = "hy-AM";
arch = "linux-i686";
- sha256 = "286542d67a76a6e8f0c34e7aca9c23c8922bf85f8be77c913285e208f8b195a7";
+ sha256 = "cbb8de1462385ef9bdb42cec5e8c81664347dc9e7573f602f41ff586c217d8ea";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-i686/id/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-i686/id/thunderbird-78.4.2.tar.bz2";
locale = "id";
arch = "linux-i686";
- sha256 = "930cbbe1520c544a25cfbdf8d10b4e6ae19a812c8a20ce51053ba0d5fc2b4b24";
+ sha256 = "358a95d7d87adc85cd39bf6da1373026de5b8631139ee1ec44e9410b027e00cd";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-i686/is/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-i686/is/thunderbird-78.4.2.tar.bz2";
locale = "is";
arch = "linux-i686";
- sha256 = "7fca3c4c9d3a309ec182d1486438973741fe2f1e39afd3ccb769256657db20a6";
+ sha256 = "c7b27e5311737cd5f3d314830aba0ec165669d8c949edb37482fb4df3b460f9e";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-i686/it/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-i686/it/thunderbird-78.4.2.tar.bz2";
locale = "it";
arch = "linux-i686";
- sha256 = "3b44f63975cfe7460f3eadd9f71f13db9ded5d9e5622ec322f556692f979434b";
+ sha256 = "a302c50190fb992fcdaa66a8de9c5f5d177a5563fcec55e5f433761646ccfcbd";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-i686/ja/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-i686/ja/thunderbird-78.4.2.tar.bz2";
locale = "ja";
arch = "linux-i686";
- sha256 = "1284e52cda834b1ef9b5ac6a1dc29858f6e1519d0fd47d330744c0d294338650";
+ sha256 = "d2357cc5bb5b5493035a79b504db8db2750f5880705b693554e2170d8d840cb0";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-i686/ka/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-i686/ka/thunderbird-78.4.2.tar.bz2";
locale = "ka";
arch = "linux-i686";
- sha256 = "b12a79e20fce3db2541dcde61e04206e82530d1d79b58637bfcede87294fd801";
+ sha256 = "2d150d1160d92499fd9dc4d632e006170a27929f88909715c0d0210005516ff7";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-i686/kab/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-i686/kab/thunderbird-78.4.2.tar.bz2";
locale = "kab";
arch = "linux-i686";
- sha256 = "9766eab276e77b0e33ad7ecbf8f26b84aa2a079a4fc9e4dfc992c41074513e40";
+ sha256 = "4f9879d5a106ec9fc3bd423fdb5df25a3e0d47690cfec652654472addd21a2c2";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-i686/kk/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-i686/kk/thunderbird-78.4.2.tar.bz2";
locale = "kk";
arch = "linux-i686";
- sha256 = "aec202db7c28ae69c9f7684a2e4f30a16ab29ec983aacb32bbe4b5bd31b76e94";
+ sha256 = "f8d7fe1f39af2019bb37e117545e8cb2901feb0d31a92287eb4b30da2e431a6b";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-i686/ko/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-i686/ko/thunderbird-78.4.2.tar.bz2";
locale = "ko";
arch = "linux-i686";
- sha256 = "b0e553c14925413461a87f1d81591bfa4e2ce2c5ad87e8ec609fef76ba4f17d8";
+ sha256 = "bd9abd627205fe33430717a60eea8b54498325a8fe4d92fb5572a2719ba50341";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-i686/lt/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-i686/lt/thunderbird-78.4.2.tar.bz2";
locale = "lt";
arch = "linux-i686";
- sha256 = "6036247e3025c2b513762577e7de1d1eda050572f674c31391e583ccd16e80f8";
+ sha256 = "69ab343eb79c42c4a1a9ea480aa2ac50d95e9140968690fd99b3d13824be17ef";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-i686/ms/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-i686/ms/thunderbird-78.4.2.tar.bz2";
locale = "ms";
arch = "linux-i686";
- sha256 = "0852cb745130e22af327e2ce39249751ed482c8216c18f4545bd294f4afb4e29";
+ sha256 = "fb1246094e22ff59f8671a6aa0827c8e51a7fa8dc2bb565a3cb446d35c098f16";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-i686/nb-NO/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-i686/nb-NO/thunderbird-78.4.2.tar.bz2";
locale = "nb-NO";
arch = "linux-i686";
- sha256 = "eebec58d3a20956894711266715ce5a4afcfd44b5eb7b334dc0c22068fbb10a6";
+ sha256 = "0ffcd2db855686c4b7e8751884aa4a8729b0fc8da597d256d37d6c73a50c7585";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-i686/nl/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-i686/nl/thunderbird-78.4.2.tar.bz2";
locale = "nl";
arch = "linux-i686";
- sha256 = "0c6d35960d89681087bcfbf403ff727f53ba2e67de9c69d04f96b68447b616d8";
+ sha256 = "615205a37248619a664b4649f808ddce9b019aae60a900fe4d2ca2dfdd717fe2";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-i686/nn-NO/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-i686/nn-NO/thunderbird-78.4.2.tar.bz2";
locale = "nn-NO";
arch = "linux-i686";
- sha256 = "b761b921ba2e604dcde7ac0e03a83ef29a3311309cb95bc39801b8bcfd80ef98";
+ sha256 = "8813d2b40da457d5d7c0da88d54b8b0c13d2ea0215b9bee2966215d366d79a81";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-i686/pa-IN/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-i686/pa-IN/thunderbird-78.4.2.tar.bz2";
locale = "pa-IN";
arch = "linux-i686";
- sha256 = "fa350ad64a3ff760a6e2cc6ac6b6ad1d6b9ad300b6c3420477148152bc207499";
+ sha256 = "31feb987ff8493d96e15395deb93506b13089db28d91c0bf6ee4da271db8a0d2";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-i686/pl/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-i686/pl/thunderbird-78.4.2.tar.bz2";
locale = "pl";
arch = "linux-i686";
- sha256 = "8b187d44bc1364dc76258ff3452610483b2ab3d060c9de43e47c25fd3103c5d9";
+ sha256 = "a9c30450e918ec4c0a95da51c071f8c4ec4f870976ac494ae6042aa3fdbc4a56";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-i686/pt-BR/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-i686/pt-BR/thunderbird-78.4.2.tar.bz2";
locale = "pt-BR";
arch = "linux-i686";
- sha256 = "1ff199f91e49d72bd9821bfe3e2d33cb4a750a6c46aaf16a80554c195694ed43";
+ sha256 = "157d64059b2a7a1082f233c05fdc0302f92dfa496c0075761bd54327b439594c";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-i686/pt-PT/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-i686/pt-PT/thunderbird-78.4.2.tar.bz2";
locale = "pt-PT";
arch = "linux-i686";
- sha256 = "098043202612b362a16353c84a5b9e662331c2311679357592b5a77a6690b68d";
+ sha256 = "d8a403996d56e22809e9124fc4c9dec98cda19a5fad7144fa87e452ae75a990e";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-i686/rm/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-i686/rm/thunderbird-78.4.2.tar.bz2";
locale = "rm";
arch = "linux-i686";
- sha256 = "ab9bb22e53da48744885634a14886ddb23dd5ccab376e5323824daa3f22ae0cf";
+ sha256 = "97524948b2f9259d1b08b9bbc6533b79fd5e592b08fb5fc5cc63bdb749d5866c";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-i686/ro/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-i686/ro/thunderbird-78.4.2.tar.bz2";
locale = "ro";
arch = "linux-i686";
- sha256 = "fb3e61830c5693c7f3b84eb4e3c60ff97324c5654352008aabbe9f16ea40cb0e";
+ sha256 = "99e2c94054fd01001555fdcf4e9ee8a04fbae77e5ff9d34ebc42a6415b939bbd";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-i686/ru/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-i686/ru/thunderbird-78.4.2.tar.bz2";
locale = "ru";
arch = "linux-i686";
- sha256 = "f9fceef81a605ebc66fd90e2759205c4eb7160095312579eb7543b4293dd7a7d";
+ sha256 = "f1996c3f3b6b5371f853f6854edd15ee030b6238f396870a2cff39320eac111a";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-i686/si/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-i686/si/thunderbird-78.4.2.tar.bz2";
locale = "si";
arch = "linux-i686";
- sha256 = "0903c3d1bf790c5c10167839e3bc60d80a23e4230895703f7c931856cb617038";
+ sha256 = "10df360a1d5a94ccd218a265024fb3f3d9d9a72b8c749ab93d797a3879cbad03";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-i686/sk/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-i686/sk/thunderbird-78.4.2.tar.bz2";
locale = "sk";
arch = "linux-i686";
- sha256 = "2018e5685fbcb5c2cc8925be39b04f6d98347cb59446af62846378818d6435f6";
+ sha256 = "a5f9e0b983961cc4e4ff7cb6f03c197cd8729eead74d6c0b657b441a91635326";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-i686/sl/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-i686/sl/thunderbird-78.4.2.tar.bz2";
locale = "sl";
arch = "linux-i686";
- sha256 = "d20b13b5caa2f5c9c431f3e69095f094800fa520b3a5a57c27a4c9c565961fb8";
+ sha256 = "10526684f3066322066f204a2cf978c779bb895d5c7ba73880ee32caf63d62a7";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-i686/sq/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-i686/sq/thunderbird-78.4.2.tar.bz2";
locale = "sq";
arch = "linux-i686";
- sha256 = "164041c3958f57f90d17fe1457205a420f326c17e88da0197732435cf6a5dfca";
+ sha256 = "d422e42397d2012efaeeb37101a5b1b29feb34e9e9dbaf87a85f9e2f881511ea";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-i686/sr/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-i686/sr/thunderbird-78.4.2.tar.bz2";
locale = "sr";
arch = "linux-i686";
- sha256 = "8ffcd2dea1b4980519220a27346b5c0fa955b89580836c38711c21c8eb7d26c8";
+ sha256 = "1e9b5637581c2c4973efcc5b0844ca228f66c4fbb0a44e88201973623aad0b83";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-i686/sv-SE/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-i686/sv-SE/thunderbird-78.4.2.tar.bz2";
locale = "sv-SE";
arch = "linux-i686";
- sha256 = "83536011e7bfe2e7a0a760ed879e041b4caa3ee27e95829331faefd29e8deebb";
+ sha256 = "592daeeebdb5f56f486a4e6efa1c51e709d834a65c861e76e5b6fd86f8a4bb09";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-i686/th/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-i686/th/thunderbird-78.4.2.tar.bz2";
locale = "th";
arch = "linux-i686";
- sha256 = "13be237b698dc9b468af7a2b8ff062118421a7b798771f1db4f82bcb1098f83c";
+ sha256 = "00f883ed3d542d0bf3da3e744523cfd1b3405ae0b928dd83c42e55e5f1bab4e1";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-i686/tr/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-i686/tr/thunderbird-78.4.2.tar.bz2";
locale = "tr";
arch = "linux-i686";
- sha256 = "c70d085f6ceed58e7ea55ab01d121627a55df2f5e961ef160f4965db941660b3";
+ sha256 = "ab69a35eebbd1cdef80b22a398c4d570c17e13a8a36e5399b892974d7ed29b10";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-i686/uk/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-i686/uk/thunderbird-78.4.2.tar.bz2";
locale = "uk";
arch = "linux-i686";
- sha256 = "c1b7b0efe7af03a488c80020247e2d8038d6dffa313188083bb75c1bc09c35fc";
+ sha256 = "efbd5bf9552333d78c68191265b3ecccb2a59ae19f2bfe7a1d8b096a44c9fcdc";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-i686/uz/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-i686/uz/thunderbird-78.4.2.tar.bz2";
locale = "uz";
arch = "linux-i686";
- sha256 = "f4b8d20603c5e1dcc72760623803fc4cb34fffffd7b394c1998b860b5e3bc129";
+ sha256 = "db90d47b59efeb5c847ecdf8b7438a4f99d0954283f1deda39a0ee08f54fdfd1";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-i686/vi/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-i686/vi/thunderbird-78.4.2.tar.bz2";
locale = "vi";
arch = "linux-i686";
- sha256 = "6d9d7885ba742ae28766ed98e64aa59892ffb51ad67eb9bc47d5a3974b8a7f50";
+ sha256 = "1d616c682f04f7c0ec976d41eb71d3ac929eaa3199b4af749a80c906a3f2a212";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-i686/zh-CN/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-i686/zh-CN/thunderbird-78.4.2.tar.bz2";
locale = "zh-CN";
arch = "linux-i686";
- sha256 = "e47c2e9b66c99c8ba02c60f739d31ea2d679cdc4d6f1f407257ef3372cabf364";
+ sha256 = "490e4e310606846836d93ca9704b7de11bf307b918933fd0187aa5d3795a82bf";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.1/linux-i686/zh-TW/thunderbird-78.4.1.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/78.4.2/linux-i686/zh-TW/thunderbird-78.4.2.tar.bz2";
locale = "zh-TW";
arch = "linux-i686";
- sha256 = "1cbab249ae670a204e464a9082365967a74ce2533bdab60682c14fe65dafba16";
+ sha256 = "c62476ac43d302ad9895524f6f66350122edfdf393697111d5868cf25b996c1a";
}
];
}
diff --git a/third_party/nixpkgs/pkgs/applications/networking/mailreaders/thunderbird/default.nix b/third_party/nixpkgs/pkgs/applications/networking/mailreaders/thunderbird/default.nix
index dd339ef1c1..e92e89c712 100644
--- a/third_party/nixpkgs/pkgs/applications/networking/mailreaders/thunderbird/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/networking/mailreaders/thunderbird/default.nix
@@ -70,13 +70,13 @@ assert waylandSupport -> gtk3Support == true;
stdenv.mkDerivation rec {
pname = "thunderbird";
- version = "78.4.1";
+ version = "78.4.2";
src = fetchurl {
url =
"mirror://mozilla/thunderbird/releases/${version}/source/thunderbird-${version}.source.tar.xz";
sha512 =
- "2mbb139xdi69bnvvg7zabwbw181xnz7y154viynmkwyh4iww0hcsvr88q246gnif8a7jns3pi4qgqxgzflyl6mzpsvfdrbjs5hylanx";
+ "1bd8z6fm2nky4p3qxc5jh9dca7v7g77i6kdn6p5dzzm4gyadqvk00bfa4nzglzi9nwwyld14r3ydjd6ms012yk07q4aqdsrf51b9k4y";
};
nativeBuildInputs = [
diff --git a/third_party/nixpkgs/pkgs/applications/networking/nextcloud-client/default.nix b/third_party/nixpkgs/pkgs/applications/networking/nextcloud-client/default.nix
index 64bcf5f683..bfc928cfbc 100644
--- a/third_party/nixpkgs/pkgs/applications/networking/nextcloud-client/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/networking/nextcloud-client/default.nix
@@ -64,7 +64,7 @@ mkDerivation rec {
description = "Nextcloud themed desktop client";
homepage = "https://nextcloud.com";
license = licenses.gpl2;
- maintainers = with maintainers; [ caugner ma27 ];
+ maintainers = with maintainers; [ caugner ];
platforms = platforms.linux;
};
}
diff --git a/third_party/nixpkgs/pkgs/applications/networking/remote/freerdp/default.nix b/third_party/nixpkgs/pkgs/applications/networking/remote/freerdp/default.nix
index 52f8decf17..a81356da25 100644
--- a/third_party/nixpkgs/pkgs/applications/networking/remote/freerdp/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/networking/remote/freerdp/default.nix
@@ -1,9 +1,10 @@
-{ stdenv, lib, fetchFromGitHub, cmake, pkgconfig, alsaLib, ffmpeg_3, glib, openssl
+{ stdenv, lib, fetchFromGitHub, cmake, pkgconfig, alsaLib, ffmpeg, glib, openssl
, pcre, zlib, libX11, libXcursor, libXdamage, libXext, libXi, libXinerama
, libXrandr, libXrender, libXv, libXtst, libxkbcommon, libxkbfile, wayland
-, gstreamer, gst-plugins-base, gst-plugins-good, libunwind, orc, libxslt
-, libusb1, libpulseaudio ? null, cups ? null, pcsclite ? null, systemd ? null
-, buildServer ? true, nocaps ? false }:
+, gstreamer, gst-plugins-base, gst-plugins-good, libunwind, orc, libxslt, cairo
+, libusb1, libpulseaudio, cups, pcsclite, systemd, libjpeg_turbo
+, buildServer ? true, nocaps ? false
+}:
let
cmFlag = flag: if flag then "ON" else "OFF";
@@ -49,8 +50,9 @@ in stdenv.mkDerivation rec {
buildInputs = with lib;
[
alsaLib
+ cairo
cups
- ffmpeg_3
+ ffmpeg
glib
gst-plugins-base
gst-plugins-good
@@ -65,6 +67,7 @@ in stdenv.mkDerivation rec {
libXrender
libXtst
libXv
+ libjpeg_turbo
libpulseaudio
libunwind
libusb1
@@ -93,6 +96,9 @@ in stdenv.mkDerivation rec {
WITH_PULSE = (libpulseaudio != null);
WITH_SERVER = buildServer;
WITH_SSE2 = stdenv.isx86_64;
+ WITH_VAAPI = true;
+ WITH_JPEG = (libjpeg_turbo != null);
+ WITH_CAIRO = (cairo != null);
};
meta = with lib; {
diff --git a/third_party/nixpkgs/pkgs/applications/networking/sync/rsync/default.nix b/third_party/nixpkgs/pkgs/applications/networking/sync/rsync/default.nix
index 7f384846c9..e07fecbf89 100644
--- a/third_party/nixpkgs/pkgs/applications/networking/sync/rsync/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/networking/sync/rsync/default.nix
@@ -35,7 +35,13 @@ stdenv.mkDerivation rec {
++ stdenv.lib.optional enableXXHash xxHash;
nativeBuildInputs = [perl];
- configureFlags = ["--with-nobody-group=nogroup"]
+ configureFlags = [
+ "--with-nobody-group=nogroup"
+
+ # disable the included zlib explicitly as it otherwise still compiles and
+ # links them even.
+ "--with-included-zlib=no"
+ ]
# Work around issue with cross-compilation:
# configure.sh: error: cannot run test program while cross compiling
# Remove once 3.2.4 or more recent is released.
diff --git a/third_party/nixpkgs/pkgs/applications/networking/sync/unison/4.08-compatibility.patch b/third_party/nixpkgs/pkgs/applications/networking/sync/unison/4.08-compatibility.patch
deleted file mode 100644
index a6921b516f..0000000000
--- a/third_party/nixpkgs/pkgs/applications/networking/sync/unison/4.08-compatibility.patch
+++ /dev/null
@@ -1,52 +0,0 @@
-From 29fa058c3127f3b47c347dcaa4a94f4c0e888308 Mon Sep 17 00:00:00 2001
-From: Jaap Boender
-Date: Thu, 21 Mar 2019 12:26:51 +0000
-Subject: [PATCH] Compatibility with OCaml 4.08
-
----
- src/files.ml | 2 +-
- src/recon.ml | 4 ++--
- src/system/system_generic.ml | 2 +-
- 3 files changed, 4 insertions(+), 4 deletions(-)
-
-diff --git a/src/files.ml b/src/files.ml
-index ba42ad57..5babf21e 100644
---- a/src/files.ml
-+++ b/src/files.ml
-@@ -722,7 +722,7 @@ let get_files_in_directory dir =
- with End_of_file ->
- dirh.System.closedir ()
- end;
-- Sort.list (<) !files
-+ List.sort String.compare !files
-
- let ls dir pattern =
- Util.convertUnixErrorsToTransient
-diff --git a/src/recon.ml b/src/recon.ml
-index 5ed358d7..0df2cfe4 100644
---- a/src/recon.ml
-+++ b/src/recon.ml
-@@ -651,8 +651,8 @@ let rec reconcile
-
- (* Sorts the paths so that they will be displayed in order *)
- let sortPaths pathUpdatesList =
-- Sort.list
-- (fun (p1, _) (p2, _) -> Path.compare p1 p2 <= 0)
-+ List.sort
-+ Path.compare
- pathUpdatesList
-
- let rec enterPath p1 p2 t =
-diff --git a/src/system/system_generic.ml b/src/system/system_generic.ml
-index ed8e18f3..0e28a781 100755
---- a/src/system/system_generic.ml
-+++ b/src/system/system_generic.ml
-@@ -47,7 +47,7 @@ let open_out_gen = open_out_gen
- let chmod = Unix.chmod
- let chown = Unix.chown
- let utimes = Unix.utimes
--let link = Unix.link
-+let link s d = Unix.link s d
- let openfile = Unix.openfile
- let opendir f =
- let h = Unix.opendir f in
diff --git a/third_party/nixpkgs/pkgs/applications/networking/sync/unison/default.nix b/third_party/nixpkgs/pkgs/applications/networking/sync/unison/default.nix
index 7b7318544c..36e8035092 100644
--- a/third_party/nixpkgs/pkgs/applications/networking/sync/unison/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/networking/sync/unison/default.nix
@@ -6,12 +6,12 @@ let inherit (ocamlPackages) ocaml lablgtk; in
stdenv.mkDerivation (rec {
pname = "unison";
- version = "2.51.2";
+ version = "2.51.3";
src = fetchFromGitHub {
owner = "bcpierce00";
repo = "unison";
rev = "v${version}";
- sha256 = "1bykiyc0dc5pkw8x370qkg2kygq9pq7yqzsgczd3y13b6ivm4sdq";
+ sha256 = "sha256-42hmdMwOYSWGiDCmhuqtpCWtvtyD2l+kA/bhHD/Qh5Y=";
};
buildInputs = [ ocaml makeWrapper ncurses ];
@@ -27,12 +27,6 @@ stdenv.mkDerivation (rec {
"UISTYLE=${if enableX11 then "gtk2" else "text"}"
] ++ stdenv.lib.optional (!ocaml.nativeCompilers) "NATIVE=false";
- patches = [
- # NOTE: Only needed until Unison 2.51.3 is released!
- ./4.08-compatibility.patch
- ./lablgtk.patch
- ];
-
preInstall = "mkdir -p $out/bin";
postInstall = if enableX11 then ''
diff --git a/third_party/nixpkgs/pkgs/applications/networking/sync/unison/lablgtk.patch b/third_party/nixpkgs/pkgs/applications/networking/sync/unison/lablgtk.patch
deleted file mode 100644
index 20c1db1b11..0000000000
--- a/third_party/nixpkgs/pkgs/applications/networking/sync/unison/lablgtk.patch
+++ /dev/null
@@ -1,31 +0,0 @@
-From 2e7ea9481c6c3ff2ec513c39f73cfe15c0763c06 Mon Sep 17 00:00:00 2001
-From: daviddavid
-Date: Mon, 26 Feb 2018 13:36:36 +0100
-Subject: [PATCH] Fix for lablgtk >= 2.18.6
-
----
- src/uigtk2.ml | 4 ++--
- 1 file changed, 2 insertions(+), 2 deletions(-)
-
-diff --git a/src/uigtk2.ml b/src/uigtk2.ml
-index 2ba6d79..04c4da4 100644
---- a/src/uigtk2.ml
-+++ b/src/uigtk2.ml
-@@ -89,12 +89,12 @@ let fontItalic = lazy (Pango.Font.from_string "italic")
- (* This does not work with the current version of Lablgtk, due to a bug
- let icon =
- GdkPixbuf.from_data ~width:48 ~height:48 ~has_alpha:true
-- (Gpointer.region_of_string Pixmaps.icon_data)
-+ (Gpointer.region_of_bytes Pixmaps.icon_data)
- *)
- let icon =
- let p = GdkPixbuf.create ~width:48 ~height:48 ~has_alpha:true () in
- Gpointer.blit
-- (Gpointer.region_of_string Pixmaps.icon_data) (GdkPixbuf.get_pixels p);
-+ (Gpointer.region_of_bytes Pixmaps.icon_data) (GdkPixbuf.get_pixels p);
- p
-
- let leftPtrWatch =
---
-2.25.1
-
diff --git a/third_party/nixpkgs/pkgs/applications/networking/syncthing-gtk/default.nix b/third_party/nixpkgs/pkgs/applications/networking/syncthing-gtk/default.nix
index cf1e053dd5..e432b37951 100644
--- a/third_party/nixpkgs/pkgs/applications/networking/syncthing-gtk/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/networking/syncthing-gtk/default.nix
@@ -59,6 +59,7 @@ buildPythonApplication rec {
description = "GTK3 & python based GUI for Syncthing";
homepage = "https://github.com/syncthing/syncthing-gtk";
license = licenses.gpl2;
+ broken = true;
maintainers = with maintainers; [ ];
platforms = syncthing.meta.platforms;
};
diff --git a/third_party/nixpkgs/pkgs/applications/office/portfolio/default.nix b/third_party/nixpkgs/pkgs/applications/office/portfolio/default.nix
index e186b3e3ce..163e612157 100644
--- a/third_party/nixpkgs/pkgs/applications/office/portfolio/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/office/portfolio/default.nix
@@ -24,11 +24,11 @@ let
in
stdenv.mkDerivation rec {
pname = "PortfolioPerformance";
- version = "0.49.0";
+ version = "0.49.2";
src = fetchurl {
url = "https://github.com/buchen/portfolio/releases/download/${version}/PortfolioPerformance-${version}-linux.gtk.x86_64.tar.gz";
- sha256 = "1b3dll6ljkj2wyiy3ns9cgxqgjjr60dfrqrbbwdbndqj4pzfvbyf";
+ sha256 = "0c2ixzwbc094wqc2lyrh3w1azswg6xz3wdh8l4lbkiw02s9czhhn";
};
nativeBuildInputs = [
diff --git a/third_party/nixpkgs/pkgs/applications/office/timekeeper/default.nix b/third_party/nixpkgs/pkgs/applications/office/timekeeper/default.nix
new file mode 100644
index 0000000000..60b4bad60b
--- /dev/null
+++ b/third_party/nixpkgs/pkgs/applications/office/timekeeper/default.nix
@@ -0,0 +1,44 @@
+{ stdenv
+, fetchFromGitHub
+, poco
+, pkg-config
+, gnome2
+, gtkmm2
+, lib
+}:
+
+stdenv.mkDerivation rec {
+ pname = "timekeeper";
+ version = "1.0";
+
+ src = fetchFromGitHub {
+ owner = "bburdette";
+ repo = "TimeKeeper";
+ rev = "v${version}";
+ fetchSubmodules = true;
+ sha256 = "03rvzkygnn7igcindbb5bcmfy0l83n0awkzprsnhlb6ndxax3k9w";
+ };
+
+ nativeBuildInputs = [
+ poco
+ pkg-config
+ ];
+
+ buildInputs = [
+ gtkmm2
+ gnome2.libglademm
+ gnome2.libglade
+ ];
+
+ installPhase = ''
+ install -Dm755 TimeKeeper/TimeKeeper $out/bin/timekeeper
+ '';
+
+ meta = with stdenv.lib; {
+ description = "Log hours worked and make reports";
+ homepage = "https://github.com/bburdette/TimeKeeper";
+ maintainers = with maintainers; [ bburdette ];
+ platforms = [ "x86_64-linux" ];
+ license = licenses.bsd3;
+ };
+}
diff --git a/third_party/nixpkgs/pkgs/applications/radio/gqrx/default.nix b/third_party/nixpkgs/pkgs/applications/radio/gqrx/default.nix
index 786e463686..106d2103ec 100644
--- a/third_party/nixpkgs/pkgs/applications/radio/gqrx/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/radio/gqrx/default.nix
@@ -9,13 +9,13 @@ assert pulseaudioSupport -> libpulseaudio != null;
mkDerivation rec {
pname = "gqrx";
- version = "2.13.2";
+ version = "2.13.5";
src = fetchFromGitHub {
owner = "csete";
repo = "gqrx";
rev = "v${version}";
- sha256 = "1lcy9gqb1x9fwq550bywj7h66rdacq5893wsax1p7qvqa27d945b";
+ sha256 = "168wjad5g0ka555hwsciwbj7fqx1c89q59hq1yxj8aiyp5kfcahx";
};
nativeBuildInputs = [ cmake ];
diff --git a/third_party/nixpkgs/pkgs/applications/radio/quisk/default.nix b/third_party/nixpkgs/pkgs/applications/radio/quisk/default.nix
new file mode 100644
index 0000000000..1a032554e1
--- /dev/null
+++ b/third_party/nixpkgs/pkgs/applications/radio/quisk/default.nix
@@ -0,0 +1,39 @@
+{ stdenv, python38Packages, fetchPypi
+, fftw, alsaLib, pulseaudio, wxPython_4_0 }:
+
+python38Packages.buildPythonApplication rec {
+ pname = "quisk";
+ version = "4.1.72";
+
+ src = fetchPypi {
+ inherit pname version;
+ sha256 = "0qw00b9d0l3ysdrmd3nr5a2zlwg9ygdil7krnk2gjp5g8bb778k7";
+ };
+
+ buildInputs = [ fftw alsaLib pulseaudio ];
+
+ propagatedBuildInputs = [ wxPython_4_0 ];
+
+ doCheck = false;
+
+ meta = with stdenv.lib; {
+ description = "A SDR transceiver for radios that use the Hermes protocol";
+ longDescription = ''
+ QUISK is a Software Defined Radio (SDR) transceiver. You supply radio
+ hardware that converts signals at the antenna to complex (I/Q) data at an
+ intermediate frequency (IF). Data can come from a sound card, Ethernet or
+ USB. Quisk then filters and demodulates the data and sends the audio to
+ your speakers or headphones. For transmit, Quisk takes the microphone
+ signal, converts it to I/Q data and sends it to the hardware.
+
+ Quisk can be used with SoftRock, Hermes Lite 2, HiQSDR, Odyssey and many
+ radios that use the Hermes protocol. Quisk can connect to digital
+ programs like Fldigi and WSJT-X. Quisk can be connected to other software
+ like N1MM+ and software that uses Hamlib.
+ '';
+ license = licenses.gpl2Plus;
+ homepage = "https://james.ahlstrom.name/quisk/";
+ maintainers = with maintainers; [ pulsation ];
+ platforms = platforms.linux;
+ };
+}
diff --git a/third_party/nixpkgs/pkgs/applications/science/logic/lean/default.nix b/third_party/nixpkgs/pkgs/applications/science/logic/lean/default.nix
index 749220382c..88e1b4fbc0 100644
--- a/third_party/nixpkgs/pkgs/applications/science/logic/lean/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/science/logic/lean/default.nix
@@ -2,13 +2,13 @@
stdenv.mkDerivation rec {
pname = "lean";
- version = "3.21.0";
+ version = "3.23.0";
src = fetchFromGitHub {
owner = "leanprover-community";
repo = "lean";
rev = "v${version}";
- sha256 = "1c7f2x6hdamjkr50761gcb5mg8hhlc75k1mf18vn1k9zsy1gxlgz";
+ sha256 = "09mklc1p6ms1jayg2f89hqfmhca3h5744lli936l38ypn1d00sxx";
};
nativeBuildInputs = [ cmake ];
diff --git a/third_party/nixpkgs/pkgs/applications/science/logic/z3/default.nix b/third_party/nixpkgs/pkgs/applications/science/logic/z3/default.nix
index 88aafcdae2..dd71cf2cb1 100644
--- a/third_party/nixpkgs/pkgs/applications/science/logic/z3/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/science/logic/z3/default.nix
@@ -22,7 +22,8 @@ stdenv.mkDerivation rec {
sha256 = "1hnbzq10d23drd7ksm3c1n2611c3kd0q0yxgz8y78zaafwczvwxx";
};
- buildInputs = [ python fixDarwinDylibNames ]
+ nativeBuildInputs = optional stdenv.hostPlatform.isDarwin fixDarwinDylibNames;
+ buildInputs = [ python ]
++ optional javaBindings jdk
++ optionals ocamlBindings [ ocaml findlib zarith ]
;
diff --git a/third_party/nixpkgs/pkgs/applications/science/math/qalculate-gtk/default.nix b/third_party/nixpkgs/pkgs/applications/science/math/qalculate-gtk/default.nix
index 133df7c75a..48c4b77c2c 100644
--- a/third_party/nixpkgs/pkgs/applications/science/math/qalculate-gtk/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/science/math/qalculate-gtk/default.nix
@@ -2,13 +2,13 @@
stdenv.mkDerivation rec {
pname = "qalculate-gtk";
- version = "3.13.0";
+ version = "3.14.0";
src = fetchFromGitHub {
owner = "qalculate";
repo = "qalculate-gtk";
rev = "v${version}";
- sha256 = "0yrzvsii84r9d2i2hrs4f65wzv3yj24l9d9yqfv3j85881h8wkm2";
+ sha256 = "1pff3m5xnw9kai6n110j1grxzcf2r7pxi76jin1lxhm8q8gmnnz1";
};
hardeningDisable = [ "format" ];
diff --git a/third_party/nixpkgs/pkgs/applications/version-management/git-and-tools/default.nix b/third_party/nixpkgs/pkgs/applications/version-management/git-and-tools/default.nix
index 114e8fe012..f68a3c7728 100644
--- a/third_party/nixpkgs/pkgs/applications/version-management/git-and-tools/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/version-management/git-and-tools/default.nix
@@ -198,7 +198,7 @@ let
gitstatus = callPackage ./gitstatus { };
gitui = callPackage ./gitui {
- inherit (darwin.apple_sdk.frameworks) Security;
+ inherit (darwin.apple_sdk.frameworks) Security AppKit;
};
grv = callPackage ./grv { };
diff --git a/third_party/nixpkgs/pkgs/applications/version-management/git-and-tools/gh/default.nix b/third_party/nixpkgs/pkgs/applications/version-management/git-and-tools/gh/default.nix
index 4fe805f752..767e471f8a 100644
--- a/third_party/nixpkgs/pkgs/applications/version-management/git-and-tools/gh/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/version-management/git-and-tools/gh/default.nix
@@ -2,16 +2,16 @@
buildGoModule rec {
pname = "gh";
- version = "1.2.0";
+ version = "1.2.1";
src = fetchFromGitHub {
owner = "cli";
repo = "cli";
rev = "v${version}";
- sha256 = "17hbgi1jh4p07r4p5mr7w7p01i6zzr28mn5i4jaki7p0jwfqbvvi";
+ sha256 = "1lk3lhw598v966c553a3j0bp6vhf03xg7ggv827vzs1s8gnhxshz";
};
- vendorSha256 = "0ybbwbw4vdsxdq4w75s1i0dqad844sfgs69b3vlscwfm6g3i9h51";
+ vendorSha256 = "0bkd2ndda6w8pdpvw8hhlb60g8r6gbyymgfb69dvanw5i5shsp5q";
nativeBuildInputs = [ installShellFiles ];
@@ -30,9 +30,8 @@ buildGoModule rec {
done
'';
- checkPhase = ''
- make test
- '';
+ # fails with `unable to find git executable in PATH`
+ doCheck = false;
meta = with lib; {
description = "GitHub CLI tool";
diff --git a/third_party/nixpkgs/pkgs/applications/version-management/git-and-tools/git/default.nix b/third_party/nixpkgs/pkgs/applications/version-management/git-and-tools/git/default.nix
index 49dc7866db..b6efb78513 100644
--- a/third_party/nixpkgs/pkgs/applications/version-management/git-and-tools/git/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/version-management/git-and-tools/git/default.nix
@@ -2,7 +2,7 @@
, curl, openssl, zlib, expat, perlPackages, python3, gettext, cpio
, gnugrep, gnused, gawk, coreutils # needed at runtime by git-filter-branch etc
, openssh, pcre2
-, asciidoc, texinfo, xmlto, docbook2x, docbook_xsl, docbook_xml_dtd_45
+, asciidoctor, texinfo, xmlto, docbook2x, docbook_xsl, docbook_xsl_ns, docbook_xml_dtd_45
, libxslt, tcl, tk, makeWrapper, libiconv
, svnSupport, subversionClient, perlLibs, smtpPerlLibs
, perlSupport ? true
@@ -22,7 +22,7 @@ assert sendEmailSupport -> perlSupport;
assert svnSupport -> perlSupport;
let
- version = "2.29.0";
+ version = "2.29.2";
svn = subversionClient.override { perlBindings = perlSupport; };
gitwebPerlLibs = with perlPackages; [ CGI HTMLParser CGIFast FCGI FCGIProcManager HTMLTagCloud ];
@@ -34,7 +34,7 @@ stdenv.mkDerivation {
src = fetchurl {
url = "https://www.kernel.org/pub/software/scm/git/git-${version}.tar.xz";
- sha256 = "KEMtmVJXxGJv4PsgkfWI327tmOlXFBnnLIO8Izcua4k=";
+ sha256 = "1h87yv117ypnc0yi86941089c14n91gixk8b6shj2y35prp47z7j";
};
outputs = [ "out" ] ++ stdenv.lib.optional withManual "doc";
@@ -65,8 +65,8 @@ stdenv.mkDerivation {
'';
nativeBuildInputs = [ gettext perlPackages.perl ]
- ++ stdenv.lib.optionals withManual [ asciidoc texinfo xmlto docbook2x
- docbook_xsl docbook_xml_dtd_45 libxslt ];
+ ++ stdenv.lib.optionals withManual [ asciidoctor texinfo xmlto docbook2x
+ docbook_xsl docbook_xsl_ns docbook_xml_dtd_45 libxslt ];
buildInputs = [curl openssl zlib expat cpio makeWrapper libiconv]
++ stdenv.lib.optionals perlSupport [ perlPackages.perl ]
++ stdenv.lib.optionals guiSupport [tcl tk]
@@ -145,7 +145,7 @@ stdenv.mkDerivation {
}
# Install git-subtree.
- make -C contrib/subtree install ${stdenv.lib.optionalString withManual "install-doc"}
+ make -C contrib/subtree install ${stdenv.lib.optionalString withManual "USE_ASCIIDOCTOR=1 install-doc"}
rm -rf contrib/subtree
# Install contrib stuff.
@@ -230,7 +230,7 @@ stdenv.mkDerivation {
'')
+ stdenv.lib.optionalString withManual ''# Install man pages and Info manual
- make -j $NIX_BUILD_CORES -l $NIX_BUILD_CORES PERL_PATH="${buildPackages.perl}/bin/perl" cmd-list.made install install-html install-info \
+ make -j $NIX_BUILD_CORES -l $NIX_BUILD_CORES USE_ASCIIDOCTOR=1 PERL_PATH="${buildPackages.perl}/bin/perl" cmd-list.made install install-html install-info \
-C Documentation ''
+ (if guiSupport then ''
diff --git a/third_party/nixpkgs/pkgs/applications/version-management/git-and-tools/gitui/default.nix b/third_party/nixpkgs/pkgs/applications/version-management/git-and-tools/gitui/default.nix
index 6aad5b78fb..ef77a8e7fe 100644
--- a/third_party/nixpkgs/pkgs/applications/version-management/git-and-tools/gitui/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/version-management/git-and-tools/gitui/default.nix
@@ -1,4 +1,4 @@
-{ stdenv, rustPlatform, fetchFromGitHub, libiconv, xorg, python3, Security }:
+{ stdenv, rustPlatform, fetchFromGitHub, libiconv, xorg, python3, Security, AppKit }:
rustPlatform.buildRustPackage rec {
pname = "gitui";
version = "0.10.1";
@@ -15,7 +15,7 @@ rustPlatform.buildRustPackage rec {
nativeBuildInputs = [ python3 ];
buildInputs = [ ]
++ stdenv.lib.optional stdenv.isLinux xorg.libxcb
- ++ stdenv.lib.optionals stdenv.isDarwin [ libiconv Security ];
+ ++ stdenv.lib.optionals stdenv.isDarwin [ libiconv Security AppKit ];
meta = with stdenv.lib; {
description = "Blazing fast terminal-ui for git written in rust";
diff --git a/third_party/nixpkgs/pkgs/applications/version-management/gitlab-triage/Gemfile b/third_party/nixpkgs/pkgs/applications/version-management/gitlab-triage/Gemfile
new file mode 100644
index 0000000000..7549ada640
--- /dev/null
+++ b/third_party/nixpkgs/pkgs/applications/version-management/gitlab-triage/Gemfile
@@ -0,0 +1,3 @@
+source 'https://rubygems.org' do
+ gem 'gitlab-triage'
+end
diff --git a/third_party/nixpkgs/pkgs/applications/version-management/gitlab-triage/Gemfile.lock b/third_party/nixpkgs/pkgs/applications/version-management/gitlab-triage/Gemfile.lock
new file mode 100644
index 0000000000..adec5b524f
--- /dev/null
+++ b/third_party/nixpkgs/pkgs/applications/version-management/gitlab-triage/Gemfile.lock
@@ -0,0 +1,35 @@
+GEM
+ remote: https://rubygems.org/
+ specs:
+ activesupport (5.2.4.4)
+ concurrent-ruby (~> 1.0, >= 1.0.2)
+ i18n (>= 0.7, < 2)
+ minitest (~> 5.1)
+ tzinfo (~> 1.1)
+ concurrent-ruby (1.1.7)
+ gitlab-triage (1.13.0)
+ activesupport (~> 5.1)
+ httparty (~> 0.17)
+ httparty (0.18.1)
+ mime-types (~> 3.0)
+ multi_xml (>= 0.5.2)
+ i18n (1.8.5)
+ concurrent-ruby (~> 1.0)
+ mime-types (3.3.1)
+ mime-types-data (~> 3.2015)
+ mime-types-data (3.2020.0512)
+ minitest (5.14.2)
+ multi_xml (0.6.0)
+ thread_safe (0.3.6)
+ tzinfo (1.2.7)
+ thread_safe (~> 0.1)
+
+PLATFORMS
+ ruby
+ x86_64-linux
+
+DEPENDENCIES
+ gitlab-triage!
+
+BUNDLED WITH
+ 2.1.4
diff --git a/third_party/nixpkgs/pkgs/applications/version-management/gitlab-triage/default.nix b/third_party/nixpkgs/pkgs/applications/version-management/gitlab-triage/default.nix
new file mode 100644
index 0000000000..09dfbcbc36
--- /dev/null
+++ b/third_party/nixpkgs/pkgs/applications/version-management/gitlab-triage/default.nix
@@ -0,0 +1,14 @@
+{ lib, bundlerApp }:
+
+bundlerApp {
+ pname = "gitlab-triage";
+ gemdir = ./.;
+ exes = [ "gitlab-triage" ];
+
+ meta = with lib; {
+ description = "GitLab's issues and merge requests triage, automated!";
+ homepage = "https://gitlab.com/gitlab-org/gitlab-triage";
+ license = licenses.mit;
+ maintainers = with maintainers; [ SuperSandro2000 ];
+ };
+}
diff --git a/third_party/nixpkgs/pkgs/applications/version-management/gitlab-triage/gemset.nix b/third_party/nixpkgs/pkgs/applications/version-management/gitlab-triage/gemset.nix
new file mode 100644
index 0000000000..1ce8450bba
--- /dev/null
+++ b/third_party/nixpkgs/pkgs/applications/version-management/gitlab-triage/gemset.nix
@@ -0,0 +1,118 @@
+{
+ activesupport = {
+ dependencies = ["concurrent-ruby" "i18n" "minitest" "tzinfo"];
+ groups = ["default"];
+ platforms = [];
+ source = {
+ remotes = ["https://rubygems.org"];
+ sha256 = "0dpnk20s754fz6jfz9sp3ri49hn46ksw4hf6ycnlw7s3hsdxqgcd";
+ type = "gem";
+ };
+ version = "5.2.4.4";
+ };
+ concurrent-ruby = {
+ groups = ["default"];
+ platforms = [];
+ source = {
+ remotes = ["https://rubygems.org"];
+ sha256 = "1vnxrbhi7cq3p4y2v9iwd10v1c7l15is4var14hwnb2jip4fyjzz";
+ type = "gem";
+ };
+ version = "1.1.7";
+ };
+ gitlab-triage = {
+ dependencies = ["activesupport" "httparty"];
+ groups = ["default"];
+ platforms = [];
+ source = {
+ remotes = ["https://rubygems.org"];
+ sha256 = "11sas3h3n638gni1mysck1ahyakqnl8gg6g21pc3krs6jrg9qxj9";
+ type = "gem";
+ };
+ version = "1.13.0";
+ };
+ httparty = {
+ dependencies = ["mime-types" "multi_xml"];
+ groups = ["default"];
+ platforms = [];
+ source = {
+ remotes = ["https://rubygems.org"];
+ sha256 = "17gpnbf2a7xkvsy20jig3ljvx8hl5520rqm9pffj2jrliq1yi3w7";
+ type = "gem";
+ };
+ version = "0.18.1";
+ };
+ i18n = {
+ dependencies = ["concurrent-ruby"];
+ groups = ["default"];
+ platforms = [];
+ source = {
+ remotes = ["https://rubygems.org"];
+ sha256 = "153sx77p16vawrs4qpkv7qlzf9v5fks4g7xqcj1dwk40i6g7rfzk";
+ type = "gem";
+ };
+ version = "1.8.5";
+ };
+ mime-types = {
+ dependencies = ["mime-types-data"];
+ groups = ["default"];
+ platforms = [];
+ source = {
+ remotes = ["https://rubygems.org"];
+ sha256 = "1zj12l9qk62anvk9bjvandpa6vy4xslil15wl6wlivyf51z773vh";
+ type = "gem";
+ };
+ version = "3.3.1";
+ };
+ mime-types-data = {
+ groups = ["default"];
+ platforms = [];
+ source = {
+ remotes = ["https://rubygems.org"];
+ sha256 = "1z75svngyhsglx0y2f9rnil2j08f9ab54b3l95bpgz67zq2if753";
+ type = "gem";
+ };
+ version = "3.2020.0512";
+ };
+ minitest = {
+ groups = ["default"];
+ platforms = [];
+ source = {
+ remotes = ["https://rubygems.org"];
+ sha256 = "170y2cvx51gm3cm3nhdf7j36sxnkh6vv8ls36p90ric7w8w16h4v";
+ type = "gem";
+ };
+ version = "5.14.2";
+ };
+ multi_xml = {
+ groups = ["default"];
+ platforms = [];
+ source = {
+ remotes = ["https://rubygems.org"];
+ sha256 = "0lmd4f401mvravi1i1yq7b2qjjli0yq7dfc4p1nj5nwajp7r6hyj";
+ type = "gem";
+ };
+ version = "0.6.0";
+ };
+ thread_safe = {
+ groups = ["default"];
+ platforms = [];
+ source = {
+ remotes = ["https://rubygems.org"];
+ sha256 = "0nmhcgq6cgz44srylra07bmaw99f5271l0dpsvl5f75m44l0gmwy";
+ type = "gem";
+ };
+ version = "0.3.6";
+ };
+ tzinfo = {
+ dependencies = ["thread_safe"];
+ groups = ["default"];
+ platforms = [];
+ source = {
+ remotes = ["https://rubygems.org"];
+ sha256 = "1i3jh086w1kbdj3k5l60lc3nwbanmzdf8yjj3mlrx9b2gjjxhi9r";
+ type = "gem";
+ };
+ version = "1.2.7";
+ };
+}
\ No newline at end of file
diff --git a/third_party/nixpkgs/pkgs/applications/version-management/meld/default.nix b/third_party/nixpkgs/pkgs/applications/version-management/meld/default.nix
index 07af934164..5068dc15f4 100644
--- a/third_party/nixpkgs/pkgs/applications/version-management/meld/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/version-management/meld/default.nix
@@ -37,6 +37,7 @@ python3.pkgs.buildPythonApplication rec {
desktop-file-utils
gobject-introspection
wrapGAppsHook
+ gtk3 # for gtk-update-icon-cache
];
buildInputs = [
diff --git a/third_party/nixpkgs/pkgs/applications/version-management/pijul/default.nix b/third_party/nixpkgs/pkgs/applications/version-management/pijul/default.nix
index b17e759c65..0eadb51fd1 100644
--- a/third_party/nixpkgs/pkgs/applications/version-management/pijul/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/version-management/pijul/default.nix
@@ -1,64 +1,44 @@
-{ stdenv, fetchurl, rustPlatform, darwin, openssl, libsodium, nettle, clang, libclang, pkgconfig }:
+{ stdenv
+, fetchCrate
+, rustPlatform
+, pkg-config
+, clang
+, libclang
+, libsodium
+, openssl
+, xxHash
+, zstd
+, darwin
+, gitImportSupport ? true
+, libgit2 ? null
+}:
-let
- # nettle-sys=1.0.1 requires the des-compat.h header, but it was removed in
- # nettle 3.5. See https://nest.pijul.com/pijul_org/pijul/discussions/416
- # Remove with the next release
- nettle_34 = nettle.overrideAttrs (_oldAttrs: rec {
- version = "3.4.1";
- src = fetchurl {
- url = "mirror://gnu/nettle/nettle-${version}.tar.gz";
- sha256 = "1bcji95n1iz9p9vsgdgr26v6s7zhpsxfbjjwpqcihpfd6lawyhgr";
- };
- });
-in rustPlatform.buildRustPackage rec {
+rustPlatform.buildRustPackage rec {
pname = "pijul";
- version = "0.12.0";
+ version = "1.0.0-alpha";
- src = fetchurl {
- url = "https://pijul.org/releases/${pname}-${version}.tar.gz";
- sha256 = "1rm787kkh3ya8ix0rjvj7sbrg9armm0rnpkga6gjmsbg5bx20y4q";
+ src = fetchCrate {
+ inherit version pname;
+ sha256 = "0dnw2cxsxb20my81szyqjsmmnkakxawvsk6cnd1fi88k4lr0z2xh";
};
- cargoSha256 = "0rf8qmgzgyl718yznbskzafyg963ygibjmqncd93zdandgl9nj5v";
+ cargoSha256 = "130vryqs0g4a0328ivqafdylwqs64g4mp8vgmz6nz4c9l3h9wgcx";
- # N.B. The cargo depfile checker expects us to have unpacked the src tarball
- # into the standard dirname "source".
- cargoDepsHook = ''
- ln -s ${pname}-${version} source
- '';
-
- # TODO: Delete once pijul fixes upstream:
- # https://nest.pijul.com/pijul_org/pijul/discussions/447
- postPatch = ''
- pushd ../${pname}-${version}-vendor.tar.gz/thrussh/
- patch -p1 < ${./thrussh-build-fix.patch}
- substituteInPlace .cargo-checksum.json --replace \
- 9696ed2422a483cd8de48ac241178a0441be6636909c76174c536b8b1cba9d45 \
- a199f2bba520d56e11607b77be4dde0cfae576c90badb9fbd39af4784e8120d1
- popd
- '';
-
- nativeBuildInputs = [ pkgconfig clang ];
-
- postInstall = ''
- mkdir -p $out/share/{bash-completion/completions,zsh/site-functions,fish/vendor_completions.d}
- $out/bin/pijul generate-completions --bash > $out/share/bash-completion/completions/pijul
- $out/bin/pijul generate-completions --zsh > $out/share/zsh/site-functions/_pijul
- $out/bin/pijul generate-completions --fish > $out/share/fish/vendor_completions.d/pijul.fish
- '';
-
- LIBCLANG_PATH = libclang + "/lib";
-
- buildInputs = [ openssl libsodium nettle_34 libclang ] ++ stdenv.lib.optionals stdenv.isDarwin
- (with darwin.apple_sdk.frameworks; [ CoreServices Security ]);
+ cargoBuildFlags = stdenv.lib.optional gitImportSupport "--features=git";
+ LIBCLANG_PATH = "${libclang}/lib";
doCheck = false;
+ nativeBuildInputs = [ pkg-config clang ];
+ buildInputs = [ openssl libclang libsodium xxHash zstd ]
+ ++ (stdenv.lib.optionals gitImportSupport [ libgit2 ])
+ ++ (stdenv.lib.optionals stdenv.isDarwin (with darwin.apple_sdk.frameworks; [
+ CoreServices Security SystemConfiguration
+ ]));
meta = with stdenv.lib; {
description = "A distributed version control system";
homepage = "https://pijul.org";
license = with licenses; [ gpl2Plus ];
- maintainers = [ maintainers.gal_bolle ];
+ maintainers = with maintainers; [ gal_bolle dywedir ];
};
}
diff --git a/third_party/nixpkgs/pkgs/applications/version-management/pijul/thrussh-build-fix.patch b/third_party/nixpkgs/pkgs/applications/version-management/pijul/thrussh-build-fix.patch
deleted file mode 100644
index 3989639620..0000000000
--- a/third_party/nixpkgs/pkgs/applications/version-management/pijul/thrussh-build-fix.patch
+++ /dev/null
@@ -1,12 +0,0 @@
---- a/src/client/connection.rs 2020-02-04 12:48:43.845299096 +0100
-+++ b/src/client/connection.rs 2020-02-04 12:50:00.140329310 +0100
-@@ -546,8 +546,8 @@
- &[msg::NEWKEYS],
- &mut session.0.write_buffer,
- );
-- session.0.kex = Some(Kex::NewKeys(newkeys));
- newkeys.sent = true;
-+ session.0.kex = Some(Kex::NewKeys(newkeys));
- }
- Ok(())
- }
diff --git a/third_party/nixpkgs/pkgs/applications/video/go-chromecast/default.nix b/third_party/nixpkgs/pkgs/applications/video/go-chromecast/default.nix
new file mode 100644
index 0000000000..89c2eb425c
--- /dev/null
+++ b/third_party/nixpkgs/pkgs/applications/video/go-chromecast/default.nix
@@ -0,0 +1,24 @@
+{ lib, buildGoModule, fetchFromGitHub }:
+
+buildGoModule rec {
+ pname = "go-chromecast";
+ version = "0.2.5";
+
+ src = fetchFromGitHub {
+ owner = "vishen";
+ repo = pname;
+ rev = "v${version}";
+ sha256 = "0y1zwy1bxnjz409vdhqwykvfjhrsyy4j503v3rjrrhkcca6vfbyg";
+ };
+
+ vendorSha256 = "04mgm3afgczq0an6ys8bilxv1hgzfwvgjx21fyl82yxd573rsf5r";
+
+ buildFlagsArray = [ "-ldflags=-s -w -X main.version=${version} -X main.commit=${src.rev} -X main.date=unknown" ];
+
+ meta = with lib; {
+ homepage = "https://github.com/vishen/go-chromecast";
+ description = "CLI for Google Chromecast, Home devices and Cast Groups";
+ license = licenses.asl20;
+ maintainers = with maintainers; [ marsam ];
+ };
+}
diff --git a/third_party/nixpkgs/pkgs/applications/video/pitivi/default.nix b/third_party/nixpkgs/pkgs/applications/video/pitivi/default.nix
index ee07a5c7cc..535913c6f2 100644
--- a/third_party/nixpkgs/pkgs/applications/video/pitivi/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/video/pitivi/default.nix
@@ -1,7 +1,6 @@
{ stdenv
, fetchFromGitHub
, fetchurl
-, fetchpatch
, pkg-config
, gettext
, itstool
@@ -11,6 +10,7 @@
, gst_all_1
, gtk3
, gobject-introspection
+, libpeas
, librsvg
, gnome3
, libnotify
@@ -20,40 +20,15 @@
, gsettings-desktop-schemas
}:
-let
- # gst-transcoder was merged with gst-plugins-bad 1.18.
- # TODO: switch to that once available.
- gst-transcoder = stdenv.mkDerivation rec {
- version = "1.14.1";
- pname = "gst-transcoder";
- src = fetchFromGitHub {
- owner = "pitivi";
- repo = "gst-transcoder";
- rev = version;
- sha256 = "16skiz9akavssii529v9nr8zd54w43livc14khdyzv164djg9q8f";
- };
- nativeBuildInputs = [
- pkg-config
- meson
- ninja
- gobject-introspection
- python3
- ];
- buildInputs = with gst_all_1; [
- gstreamer
- gst-plugins-base
- ];
- };
-
-in python3Packages.buildPythonApplication rec {
+python3Packages.buildPythonApplication rec {
pname = "pitivi";
- version = "0.999";
+ version = "2020.09.1";
format = "other";
src = fetchurl {
url = "mirror://gnome/sources/pitivi/${stdenv.lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
- sha256 = "0mxp2p4gg976fp1vj3rb5rmpl5mqfzncm9vw2719irl32f1qlvyb";
+ sha256 = "1by52b56s9c3h23n40iccygkazwlhii2gb28zhnj2xz5805j05y2";
};
patches = [
@@ -61,42 +36,6 @@ in python3Packages.buildPythonApplication rec {
# and saves them to the generated binary. This would make the build-time
# dependencies part of the closure so we remove it.
./prevent-closure-contamination.patch
-
- # Port from intltool to gettext.
- # Needed for the following patches to apply.
- (fetchpatch {
- url = "https://gitlab.gnome.org/GNOME/pitivi/commit/89b1053f2516c594f414c5c67c835471bce44b67.patch";
- sha256 = "8yhArzAtZC+WjHftcSDrstBlT8j6WlGHffU9Nj+ny+c=";
- excludes = [ "po/POTFILES.in" ];
- })
-
- # Complete switching to gst-transcoder in gst-plugins-bad.
- # Otherwise there will likely be conflics.
- # TODO: Apply this patch once we are using gst-transcoder from gst-plugins-bad.
- # (fetchpatch {
- # url = "https://gitlab.gnome.org/GNOME/pitivi/commit/51ae6533ee26ffd47e453eb5f5ad8cd46f57d15e.patch";
- # sha256 = "zxJm+E5o+oZ3lW6wYNY/ERo2g4NmCjoY8oV+uScq8j8=";
- # })
-
- # Generate renderer.so on macOS instead of dylib.
- # Needed for the following patch to apply.
- (fetchpatch {
- url = "https://gitlab.gnome.org/GNOME/pitivi/commit/bcacadcafabf8911efb0fddc8d57329237d08cd1.patch";
- sha256 = "2BM5acIwOgdr1L9vhtMMN4trrLuqCg/K6v6ZYtD1Fjw=";
- postFetch = ''
- sed -i -e "s/1.90.0.1/0.999/g" "$out"
- '';
- })
- (fetchpatch {
- url = "https://gitlab.gnome.org/GNOME/pitivi/commit/0a3cc054a2c20b59f5aaaaa307de3c9af3c0d270.patch";
- sha256 = "6DhqRlxFWFFdLwGoFem+vPt8x7v732KMVjMF9fypMK4=";
- postFetch = ''
- sed "$out" -i \
- -e "s/1.90.0.1/0.999/g" \
- -e "s/\(-python_dep.*\)/\1\n /" \
- -e "s/-1,9 +1,16/-1,10 +1,17/"
- '';
- })
];
nativeBuildInputs = [
@@ -112,13 +51,13 @@ in python3Packages.buildPythonApplication rec {
buildInputs = [
gobject-introspection
gtk3
+ libpeas
librsvg
gnome3.gnome-desktop
gsound
gnome3.adwaita-icon-theme
gsettings-desktop-schemas
libnotify
- gst-transcoder
] ++ (with gst_all_1; [
gstreamer
gst-editing-services
@@ -127,7 +66,7 @@ in python3Packages.buildPythonApplication rec {
gst-plugins-bad
gst-plugins-ugly
gst-libav
- gst-validate
+ gst-devtools
]);
pythonPath = with python3Packages; [
@@ -142,9 +81,6 @@ in python3Packages.buildPythonApplication rec {
postPatch = ''
patchShebangs ./getenvvar.py
-
- # fetchpatch does not support renamings
- mv data/org.pitivi.Pitivi-mime.xml data/org.pitivi.Pitivi-mime.xml.in
'';
# Fixes error
diff --git a/third_party/nixpkgs/pkgs/applications/virtualization/qemu/CVE-2020-27617.patch b/third_party/nixpkgs/pkgs/applications/virtualization/qemu/CVE-2020-27617.patch
new file mode 100644
index 0000000000..fa708b2983
--- /dev/null
+++ b/third_party/nixpkgs/pkgs/applications/virtualization/qemu/CVE-2020-27617.patch
@@ -0,0 +1,43 @@
+From 6d19c0cc6c5a9bba308fc29d7c0edc2dc372c41b Mon Sep 17 00:00:00 2001
+From: Prasad J Pandit
+Date: Wed, 21 Oct 2020 11:35:50 +0530
+Subject: [PATCH] net: remove an assert call in eth_get_gso_type
+
+eth_get_gso_type() routine returns segmentation offload type based on
+L3 protocol type. It calls g_assert_not_reached if L3 protocol is
+unknown, making the following return statement unreachable. Remove the
+g_assert call, it maybe triggered by a guest user.
+
+Reported-by: Gaoning Pan
+Signed-off-by: Prasad J Pandit
+---
+ net/eth.c | 6 +++---
+ 1 file changed, 3 insertions(+), 3 deletions(-)
+
+diff --git a/net/eth.c b/net/eth.c
+index 0c1d413ee2..eee77071f9 100644
+--- a/net/eth.c
++++ b/net/eth.c
+@@ -16,6 +16,7 @@
+ */
+
+ #include "qemu/osdep.h"
++#include "qemu/log.h"
+ #include "net/eth.h"
+ #include "net/checksum.h"
+ #include "net/tap.h"
+@@ -71,9 +72,8 @@ eth_get_gso_type(uint16_t l3_proto, uint8_t *l3_hdr, uint8_t l4proto)
+ return VIRTIO_NET_HDR_GSO_TCPV6 | ecn_state;
+ }
+ }
+-
+- /* Unsupported offload */
+- g_assert_not_reached();
++ qemu_log_mask(LOG_GUEST_ERROR, "%s: probably not GSO frame, "
++ "unknown L3 protocol: 0x%04"PRIx16"\n", __func__, l3_proto);
+
+ return VIRTIO_NET_HDR_GSO_NONE | ecn_state;
+ }
+--
+2.28.0
+
diff --git a/third_party/nixpkgs/pkgs/applications/virtualization/qemu/default.nix b/third_party/nixpkgs/pkgs/applications/virtualization/qemu/default.nix
index 3c86720579..2bace4f258 100644
--- a/third_party/nixpkgs/pkgs/applications/virtualization/qemu/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/virtualization/qemu/default.nix
@@ -82,6 +82,7 @@ stdenv.mkDerivation rec {
./no-etc-install.patch
./fix-qemu-ga.patch
./9p-ignore-noatime.patch
+ ./CVE-2020-27617.patch
] ++ optional nixosTestRunner ./force-uid0-on-9p.patch
++ optionals stdenv.hostPlatform.isMusl [
(fetchpatch {
diff --git a/third_party/nixpkgs/pkgs/applications/virtualization/virt-top/default.nix b/third_party/nixpkgs/pkgs/applications/virtualization/virt-top/default.nix
index 7ad60405f1..692b5f01b5 100644
--- a/third_party/nixpkgs/pkgs/applications/virtualization/virt-top/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/virtualization/virt-top/default.nix
@@ -1,4 +1,4 @@
-{ stdenv, fetchgit, ocamlPackages, autoreconfHook }:
+{ stdenv, fetchgit, fetchpatch, ocamlPackages, autoreconfHook }:
stdenv.mkDerivation rec {
pname = "virt-top";
@@ -10,6 +10,14 @@ stdenv.mkDerivation rec {
sha256 = "0m7pm8lzlpngsj0vjv0hg8l9ck3gvwpva7r472f8f03xpjffwiga";
};
+ patches = [
+ (fetchpatch {
+ name = "ocaml-libvirt-0.6.1.5-fix.patch";
+ url = "http://git.annexia.org/?p=virt-top.git;a=patch;h=24a461715d5bce47f63cb0097606fc336230589f";
+ sha256 = "15w7w9iggvlw8m9w8g4h08251wzb3m3zkb58glr7ifsgi3flbn61";
+ })
+ ];
+
nativeBuildInputs = [ autoreconfHook ];
buildInputs = with ocamlPackages; [ ocaml findlib ocaml_extlib ocaml_libvirt gettext-stub curses csv xml-light ];
diff --git a/third_party/nixpkgs/pkgs/applications/window-managers/sway/default.nix b/third_party/nixpkgs/pkgs/applications/window-managers/sway/default.nix
index 0af46db0a1..23dcf68bdd 100644
--- a/third_party/nixpkgs/pkgs/applications/window-managers/sway/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/window-managers/sway/default.nix
@@ -7,13 +7,13 @@
stdenv.mkDerivation rec {
pname = "sway-unwrapped";
- version = "1.5";
+ version = "1.5.1";
src = fetchFromGitHub {
owner = "swaywm";
repo = "sway";
rev = version;
- sha256 = "0r3b7h778l9i20z3him9i2qsaynpn9y78hzfgv3cqi8fyry2c4f9";
+ sha256 = "1xsa3h8zhf29p0mi90baxpr76jkd9pd1gr97ky8cnjbcs4isj9j0";
};
patches = [
@@ -21,12 +21,6 @@ stdenv.mkDerivation rec {
./load-configuration-from-etc.patch
];
- postPatch = ''
- substituteInPlace meson.build \
- --replace "v1.5" "1.5" \
- --replace "wlroots_version = ['>=0.11.0', '<0.12.0']" "wlroots_version = ['>=0.11.0', '<0.13.0']"
- '';
-
nativeBuildInputs = [
meson ninja pkg-config wayland scdoc
];
diff --git a/third_party/nixpkgs/pkgs/applications/window-managers/windowmaker/dockapps/AlsaMixer-app.nix b/third_party/nixpkgs/pkgs/applications/window-managers/windowmaker/dockapps/AlsaMixer-app.nix
new file mode 100644
index 0000000000..4ec0216440
--- /dev/null
+++ b/third_party/nixpkgs/pkgs/applications/window-managers/windowmaker/dockapps/AlsaMixer-app.nix
@@ -0,0 +1,38 @@
+{ stdenv, dockapps-sources, pkg-config, libX11, libXpm, libXext, alsaLib }:
+
+stdenv.mkDerivation rec {
+ pname = "AlsaMixer.app";
+ version = "0.2.1";
+
+ src = dockapps-sources;
+
+ nativeBuildInputs = [ pkg-config ];
+ buildInputs = [ libX11 libXpm libXext alsaLib ];
+
+ setSourceRoot = ''
+ export sourceRoot=$(echo */${pname})
+ '';
+
+ dontConfigure = true;
+
+ preInstall = ''
+ install -d ${placeholder "out"}/bin
+ '';
+
+ installPhase = ''
+ runHook preInstall
+ install -t ${placeholder "out"}/bin AlsaMixer.app
+ runHook postInstall
+ '';
+
+ postInstall = ''
+ ln -s ${placeholder "out"}/bin/AlsaMixer.app ${placeholder "out"}/bin/AlsaMixer
+ '';
+
+ meta = with stdenv.lib; {
+ description = "Alsa mixer application for Windowmaker";
+ homepage = "https://www.dockapps.net/alsamixerapp";
+ license = licenses.gpl2Plus;
+ maintainers = [ maintainers.bstrik ];
+ };
+}
diff --git a/third_party/nixpkgs/pkgs/applications/window-managers/windowmaker/dockapps/alsamixer.app.nix b/third_party/nixpkgs/pkgs/applications/window-managers/windowmaker/dockapps/alsamixer.app.nix
deleted file mode 100644
index 4e1256399e..0000000000
--- a/third_party/nixpkgs/pkgs/applications/window-managers/windowmaker/dockapps/alsamixer.app.nix
+++ /dev/null
@@ -1,27 +0,0 @@
-{ stdenv, fetchgit, pkgconfig, libX11, libXpm, libXext, alsaLib }:
-
-stdenv.mkDerivation {
- name = "alsamixer.app-0.2.1";
- src = fetchgit {
- url = "git://repo.or.cz/dockapps.git";
- rev = "38c74350b02f35824554ce0c4f0f251d71762040";
- sha256 = "0g9cwhlqg065fbhav4g4n16a4cqkk9jykl3y0zwbn5whhacfqyhl";
- };
-
- nativeBuildInputs = [ pkgconfig ];
- buildInputs = [ libX11 libXpm libXext alsaLib ];
-
- postUnpack = "sourceRoot=\${sourceRoot}/AlsaMixer.app";
-
- installPhase = ''
- mkdir -pv $out/bin;
- cp AlsaMixer.app $out/bin/AlsaMixer;
- '';
-
- meta = {
- description = "Alsa mixer application for Windowmaker";
- homepage = "http://windowmaker.org/dockapps/?name=AlsaMixer.app";
- license = stdenv.lib.licenses.gpl2;
- maintainers = [ stdenv.lib.maintainers.bstrik ];
- };
-}
diff --git a/third_party/nixpkgs/pkgs/applications/window-managers/windowmaker/dockapps/default.nix b/third_party/nixpkgs/pkgs/applications/window-managers/windowmaker/dockapps/default.nix
new file mode 100644
index 0000000000..8a66fdbd67
--- /dev/null
+++ b/third_party/nixpkgs/pkgs/applications/window-managers/windowmaker/dockapps/default.nix
@@ -0,0 +1,20 @@
+{ config, lib, pkgs }:
+
+lib.makeScope pkgs.newScope (self: with self; {
+
+ dockapps-sources = pkgs.fetchgit {
+ url = "https://repo.or.cz/dockapps.git";
+ rev = "b2b9d872ee61c9b329e4597c301e4417cbd9c3ea";
+ sha256 = "sha256-BuSnwPIj3gUWMjj++SK+117xm/77u4gXLQzRFttei0w=";
+ };
+
+ libdockapp = callPackage ./libdockapp.nix { };
+
+ AlsaMixer-app = callPackage ./AlsaMixer-app.nix { };
+
+ wmCalClock = callPackage ./wmCalClock.nix { };
+
+ wmsm-app = callPackage ./wmsm-app.nix { };
+
+ wmsystemtray = callPackage ./wmsystemtray.nix { };
+})
diff --git a/third_party/nixpkgs/pkgs/applications/window-managers/windowmaker/dockapps/libdockapp.nix b/third_party/nixpkgs/pkgs/applications/window-managers/windowmaker/dockapps/libdockapp.nix
new file mode 100644
index 0000000000..bcdef42a78
--- /dev/null
+++ b/third_party/nixpkgs/pkgs/applications/window-managers/windowmaker/dockapps/libdockapp.nix
@@ -0,0 +1,30 @@
+{ stdenv, dockapps-sources, autoreconfHook, pkg-config
+, libX11, libXext, libXpm, mkfontdir, fontutil }:
+
+stdenv.mkDerivation rec {
+ pname = "libdockapp";
+ version = "0.7.3";
+
+ src = dockapps-sources;
+
+ nativeBuildInputs = [ autoreconfHook pkg-config ];
+
+ buildInputs = [ libX11 libXext libXpm fontutil mkfontdir ];
+
+ setSourceRoot = ''
+ export sourceRoot=$(echo */${pname})
+ '';
+
+ # There is a bug on --with-font
+ configureFlags = [
+ "--with-examples=no"
+ "--with-font=no"
+ ];
+
+ meta = with stdenv.lib; {
+ description = "A library providing a framework for dockapps";
+ homepage = "https://www.dockapps.net/libdockapp";
+ license = licenses.gpl2Plus;
+ maintainers = [ maintainers.bstrik ];
+ };
+}
diff --git a/third_party/nixpkgs/pkgs/applications/window-managers/windowmaker/dockapps/wmCalClock.nix b/third_party/nixpkgs/pkgs/applications/window-managers/windowmaker/dockapps/wmCalClock.nix
new file mode 100644
index 0000000000..f8ea781858
--- /dev/null
+++ b/third_party/nixpkgs/pkgs/applications/window-managers/windowmaker/dockapps/wmCalClock.nix
@@ -0,0 +1,38 @@
+{ stdenv, dockapps-sources
+, libX11, libXpm, libXext }:
+
+stdenv.mkDerivation rec {
+ pname = "wmCalClock";
+ version = "1.25";
+
+ src = dockapps-sources;
+
+ buildInputs = [ libX11 libXpm libXext ];
+
+ setSourceRoot = ''
+ export sourceRoot=$(echo */${pname}/Src)
+ '';
+
+ preBuild = ''
+ makeFlagsArray+=(
+ CC="cc"
+ INCDIR="-I${libX11.dev}/include -I${libXext.dev}/include -I${libXpm.dev}/include"
+ LIBDIR="-I${libX11}/lib -I${libXext}/lib -I${libXpm}/lib"
+ )
+ '';
+
+ preInstall = ''
+ install -d ${placeholder "out"}/bin
+ install -d ${placeholder "out"}/man/man1
+ '';
+
+ installFlags = [ "DESTDIR=${placeholder "out"}" ];
+
+ meta = with stdenv.lib; {
+ description = "A Calendar clock with antialiased text";
+ homepage = "https://www.dockapps.net/wmcalclock";
+ license = licenses.gpl2Plus;
+ maintainers = [ maintainers.bstrik ];
+ platforms = platforms.linux;
+ };
+}
diff --git a/third_party/nixpkgs/pkgs/applications/window-managers/windowmaker/dockapps/wmcalclock.nix b/third_party/nixpkgs/pkgs/applications/window-managers/windowmaker/dockapps/wmcalclock.nix
deleted file mode 100644
index 48f4753d67..0000000000
--- a/third_party/nixpkgs/pkgs/applications/window-managers/windowmaker/dockapps/wmcalclock.nix
+++ /dev/null
@@ -1,32 +0,0 @@
-{ stdenv, fetchurl, pkgconfig, libX11, libXpm, libXext }:
-
-stdenv.mkDerivation {
- name = "wmCalClock-1.25";
- src = fetchurl {
- url = "http://www.cs.mun.ca/~gstarkes/wmaker/dockapps/files/wmCalClock-1.25.tar.gz";
- sha256 = "4b42b55bb7c1d7c58b5ee1f0058c683d3e4f3e3380d3a69c54a50b983c7c1b3f";
- };
-
- nativeBuildInputs = [ pkgconfig ];
- buildInputs = [ libX11 libXpm libXext ];
-
- postUnpack = "sourceRoot=\${sourceRoot}/Src";
-
- buildPhase=''
- make prefix=$out
- '';
-
- installPhase = ''
- mkdir -pv $out/bin
- mkdir -pv $out/man/man1
- make DESTDIR=$out install
- '';
-
- meta = {
- description = "Clock for Windowmaker";
- homepage = "http://www.cs.mun.ca/~gstarkes/wmaker/dockapps/time.html#wmcalclock";
- license = stdenv.lib.licenses.gpl2;
- maintainers = [ stdenv.lib.maintainers.bstrik ];
- platforms = stdenv.lib.platforms.linux;
- };
-}
diff --git a/third_party/nixpkgs/pkgs/applications/window-managers/windowmaker/dockapps/wmsm-app.nix b/third_party/nixpkgs/pkgs/applications/window-managers/windowmaker/dockapps/wmsm-app.nix
new file mode 100644
index 0000000000..dd25ee2b2f
--- /dev/null
+++ b/third_party/nixpkgs/pkgs/applications/window-managers/windowmaker/dockapps/wmsm-app.nix
@@ -0,0 +1,43 @@
+{ stdenv, dockapps-sources
+, libX11
+, libXpm
+, libXext
+, libdockapp }:
+
+stdenv.mkDerivation rec {
+ pname = "wmsm.app";
+ version = "0.2.1";
+
+ src = dockapps-sources;
+
+ buildInputs = [ libX11 libXpm libXext libdockapp ];
+
+ setSourceRoot = ''
+ export sourceRoot=$(echo */${pname}/wmsm)
+ '';
+
+ NIX_CFLAGS_COMPILE = "-std=gnu89";
+
+ postPatch = ''
+ substituteInPlace Makefile \
+ --replace "PREFIX = /usr/X11R6/bin" "" \
+ --replace "/usr/bin/install" "install"
+ '';
+
+ makeFlags = [ "CC=cc" ];
+
+ preInstall = ''
+ runHook preInstall
+ install -d ${placeholder "out"}/bin
+ runHook postInstall
+ '';
+
+ installFlags = [ "PREFIX=${placeholder "out"}/bin" ];
+
+ meta = with stdenv.lib; {
+ description = "System monitor for Windowmaker";
+ homepage = "https://www.dockapps.net/wmsmapp";
+ license = licenses.gpl2;
+ maintainers = [ maintainers.bstrik ];
+ };
+}
diff --git a/third_party/nixpkgs/pkgs/applications/window-managers/windowmaker/dockapps/wmsm.app.nix b/third_party/nixpkgs/pkgs/applications/window-managers/windowmaker/dockapps/wmsm.app.nix
deleted file mode 100644
index ad255414a6..0000000000
--- a/third_party/nixpkgs/pkgs/applications/window-managers/windowmaker/dockapps/wmsm.app.nix
+++ /dev/null
@@ -1,29 +0,0 @@
-{ stdenv, fetchurl, pkgconfig, libX11, libXpm, libXext }:
-
-stdenv.mkDerivation {
- name = "wmsm.app-0.2.1";
- src = fetchurl {
- url = "http://linux-bsd-unix.strefa.pl/wmsm.app-0.2.1.tar.bz2";
- sha256 = "369a8f2e5673c6b7ab0cf85166f38fbf553dd966c3c1cfeec0e32837defd32c7";
- };
-
- nativeBuildInputs = [ pkgconfig ];
- buildInputs = [ libX11 libXpm libXext ];
-
- postUnpack = "sourceRoot=\${sourceRoot}/wmsm";
-
- NIX_CFLAGS_COMPILE = "-std=gnu89";
-
- installPhase = ''
- substituteInPlace Makefile --replace "PREFIX = /usr/X11R6/bin" "" --replace "/usr/bin/install" "install"
- mkdir -pv $out/bin;
- make PREFIX=$out/bin install;
- '';
-
- meta = {
- description = "System monitor for Windowmaker";
- homepage = "http://linux-bsd-unix.strefa.pl";
- license = stdenv.lib.licenses.gpl2;
- maintainers = [ stdenv.lib.maintainers.bstrik ];
- };
-}
diff --git a/third_party/nixpkgs/pkgs/applications/window-managers/windowmaker/dockapps/wmsystemtray.nix b/third_party/nixpkgs/pkgs/applications/window-managers/windowmaker/dockapps/wmsystemtray.nix
index 3e073cd8e9..6ec62af5d3 100644
--- a/third_party/nixpkgs/pkgs/applications/window-managers/windowmaker/dockapps/wmsystemtray.nix
+++ b/third_party/nixpkgs/pkgs/applications/window-managers/windowmaker/dockapps/wmsystemtray.nix
@@ -1,20 +1,22 @@
{ stdenv, fetchurl, pkgconfig, libX11, libXpm, libXext, libXfixes, libXmu }:
-stdenv.mkDerivation {
- name = "wmsystemtray-1.4";
+stdenv.mkDerivation rec {
+ pname = "wmsystemtray";
+ version = "1.4";
+
src = fetchurl {
- url = "mirror://sourceforge/project/wmsystemtray/wmsystemtray/wmsystemtray-1.4.tar.gz";
- sha256 = "8edef43691e9fff071000e29166c7c1ad420c0956e9068151061e881c8ac97e9";
+ url = "mirror://sourceforge/project/${pname}/${pname}/${pname}-${version}.tar.gz";
+ sha256 = "sha256-jt70NpHp//BxAA4pFmx8GtQgwJVukGgVEGHogcisl+k=";
};
nativeBuildInputs = [ pkgconfig ];
buildInputs = [ libX11 libXpm libXext libXfixes libXmu ];
- meta = {
- description = "Systemtray for Windowmaker";
+ meta = with stdenv.lib; {
+ description = "A system tray for Windowmaker";
homepage = "http://wmsystemtray.sourceforge.net";
- license = stdenv.lib.licenses.gpl2;
- maintainers = [ stdenv.lib.maintainers.bstrik ];
- platforms = stdenv.lib.platforms.linux;
+ license = licenses.gpl2Only;
+ maintainers = [ maintainers.bstrik ];
+ platforms = platforms.linux;
};
}
diff --git a/third_party/nixpkgs/pkgs/applications/window-managers/xmonad/log-applet/default.nix b/third_party/nixpkgs/pkgs/applications/window-managers/xmonad/log-applet/default.nix
index 7c6041b576..ffd804eaba 100644
--- a/third_party/nixpkgs/pkgs/applications/window-managers/xmonad/log-applet/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/window-managers/xmonad/log-applet/default.nix
@@ -38,6 +38,7 @@ stdenv.mkDerivation rec {
meta = with stdenv.lib; {
homepage = "https://github.com/kalj/xmonad-log-applet";
license = licenses.bsd3;
+ broken = desktopSupport == "gnomeflashback";
description = "An applet that will display XMonad log information (${desktopSupport} version)";
platforms = platforms.linux;
maintainers = with maintainers; [ abbradar ];
diff --git a/third_party/nixpkgs/pkgs/data/documentation/gnome-user-docs/default.nix b/third_party/nixpkgs/pkgs/data/documentation/gnome-user-docs/default.nix
index 294f210c21..91abb04116 100644
--- a/third_party/nixpkgs/pkgs/data/documentation/gnome-user-docs/default.nix
+++ b/third_party/nixpkgs/pkgs/data/documentation/gnome-user-docs/default.nix
@@ -9,11 +9,11 @@
stdenv.mkDerivation rec {
pname = "gnome-user-docs";
- version = "3.36.2";
+ version = "3.38.0";
src = fetchurl {
url = "mirror://gnome/sources/gnome-user-docs/${stdenv.lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
- sha256 = "0n4rbrq5zww6gjjmicyw5hlvzi8azc6m4sisak15snkp6v4f93qr";
+ sha256 = "12pfvivsgz4qvx3y6zndxln28fgvbdv2kjy6l892i4f5bmdxplrq";
};
nativeBuildInputs = [
diff --git a/third_party/nixpkgs/pkgs/data/fonts/jetbrains-mono/default.nix b/third_party/nixpkgs/pkgs/data/fonts/jetbrains-mono/default.nix
index e3ac0a1f32..fc4d76f6ad 100644
--- a/third_party/nixpkgs/pkgs/data/fonts/jetbrains-mono/default.nix
+++ b/third_party/nixpkgs/pkgs/data/fonts/jetbrains-mono/default.nix
@@ -1,14 +1,14 @@
{ lib, fetchzip }:
let
- version = "2.200";
+ version = "2.210";
in
fetchzip {
name = "JetBrainsMono-${version}";
url = "https://github.com/JetBrains/JetBrainsMono/releases/download/v${version}/JetBrainsMono-${version}.zip";
- sha256 = "16v914ph9sgdz3w56yz9f26zpj2lpxjb6ppnphxlmbllh68z1fh4";
+ sha256 = "05csy42qji8xbaq5iap2nmki0d0cbiwiq9kbzjd1cah9qn6gfill";
postFetch = ''
mkdir -p $out/share/fonts
diff --git a/third_party/nixpkgs/pkgs/data/fonts/vista-fonts/default.nix b/third_party/nixpkgs/pkgs/data/fonts/vista-fonts/default.nix
index df7a6e5383..3a5ee616a0 100644
--- a/third_party/nixpkgs/pkgs/data/fonts/vista-fonts/default.nix
+++ b/third_party/nixpkgs/pkgs/data/fonts/vista-fonts/default.nix
@@ -1,4 +1,4 @@
-{stdenv, fetchzip, cabextract}:
+{ stdenv, fetchzip, cabextract }:
fetchzip {
name = "vista-fonts-1";
@@ -21,7 +21,7 @@ fetchzip {
done
'';
- sha256 = "1l27zg5jraa16zm11d3qz1w7m6f1ih3xy5avww454ylm50fw6z11";
+ sha256 = "sha256-x7JSXS9Q1fzlJTVR+MAS3f2+cmo/H0s1qkY9FPjx2zI=";
meta = {
description = "Some TrueType fonts from Microsoft Windows Vista (Calibri, Cambria, Candara, Consolas, Constantia, Corbel)";
diff --git a/third_party/nixpkgs/pkgs/data/misc/tzdata/default.nix b/third_party/nixpkgs/pkgs/data/misc/tzdata/default.nix
index dc80580ff5..5065e3718c 100644
--- a/third_party/nixpkgs/pkgs/data/misc/tzdata/default.nix
+++ b/third_party/nixpkgs/pkgs/data/misc/tzdata/default.nix
@@ -31,6 +31,7 @@ stdenv.mkDerivation rec {
"MANDIR=$(man)/share/man"
"AWK=awk"
"CFLAGS=-DHAVE_LINK=0"
+ "CFLAGS+=-DZIC_BLOAT_DEFAULT=\\\"fat\\\""
"cc=${stdenv.cc.targetPrefix}cc"
"AR=${stdenv.cc.targetPrefix}ar"
];
diff --git a/third_party/nixpkgs/pkgs/desktops/gnome-3/apps/accerciser/default.nix b/third_party/nixpkgs/pkgs/desktops/gnome-3/apps/accerciser/default.nix
index c0ca54d6fe..f05eb41d35 100644
--- a/third_party/nixpkgs/pkgs/desktops/gnome-3/apps/accerciser/default.nix
+++ b/third_party/nixpkgs/pkgs/desktops/gnome-3/apps/accerciser/default.nix
@@ -15,15 +15,15 @@
, adwaita-icon-theme
}:
- python3.pkgs.buildPythonApplication rec {
+python3.pkgs.buildPythonApplication rec {
pname = "accerciser";
- version = "3.36.3";
+ version = "3.38.0";
format = "other";
src = fetchurl {
url = "mirror://gnome/sources/${pname}/${stdenv.lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
- sha256 = "0zfhmpaqqwm89k8p4apq4la191icjvqh0097p5aig3yhy87fahp9";
+ sha256 = "0fd9vv2abd2if2qj4nlfy7mpd7rc4sx18zhmxd5ijlnfhkpggbp5";
};
nativeBuildInputs = [
diff --git a/third_party/nixpkgs/pkgs/desktops/gnome-3/apps/cheese/default.nix b/third_party/nixpkgs/pkgs/desktops/gnome-3/apps/cheese/default.nix
index 05a1cdbc08..c4998cc451 100644
--- a/third_party/nixpkgs/pkgs/desktops/gnome-3/apps/cheese/default.nix
+++ b/third_party/nixpkgs/pkgs/desktops/gnome-3/apps/cheese/default.nix
@@ -1,17 +1,46 @@
-{ stdenv, gettext, fetchurl, wrapGAppsHook, gnome-video-effects, libcanberra-gtk3
-, pkgconfig, gtk3, glib, clutter-gtk, clutter-gst, udev, gst_all_1, itstool
-, libgudev, vala, docbook_xml_dtd_43, docbook_xsl, appstream-glib
-, libxslt, yelp-tools, gnome-common, gtk-doc
-, adwaita-icon-theme, librsvg, totem, gdk-pixbuf, gnome3, gnome-desktop, libxml2
-, meson, ninja, dbus, python3 }:
+{ stdenv
+, gettext
+, fetchurl
+, wrapGAppsHook
+, gnome-video-effects
+, libcanberra-gtk3
+, pkgconfig
+, gtk3
+, glib
+, clutter-gtk
+, clutter-gst
+, udev
+, gst_all_1
+, itstool
+, libgudev
+, vala
+, docbook_xml_dtd_43
+, docbook_xsl
+, appstream-glib
+, libxslt
+, yelp-tools
+, gnome-common
+, gtk-doc
+, adwaita-icon-theme
+, librsvg
+, totem
+, gdk-pixbuf
+, gnome3
+, gnome-desktop
+, libxml2
+, meson
+, ninja
+, dbus
+, python3
+}:
stdenv.mkDerivation rec {
pname = "cheese";
- version = "3.34.0";
+ version = "3.38.0";
src = fetchurl {
url = "mirror://gnome/sources/cheese/${stdenv.lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
- sha256 = "0wvyc9wb0avrprvm529m42y5fkv3lirdphqydc9jw0c8mh05d1ni";
+ sha256 = "0vyim2avlgq3a48rgdfz5g21kqk11mfb53b2l883340v88mp7ll8";
};
postPatch = ''
@@ -24,15 +53,43 @@ stdenv.mkDerivation rec {
};
nativeBuildInputs = [
- meson ninja pkgconfig gettext itstool vala wrapGAppsHook libxml2 appstream-glib
- libxslt docbook_xml_dtd_43 docbook_xsl
- gtk-doc yelp-tools gnome-common python3
+ appstream-glib
+ docbook_xml_dtd_43
+ docbook_xsl
+ gettext
+ gnome-common
+ gtk-doc
+ itstool
+ libxml2
+ libxslt
+ meson
+ ninja
+ pkgconfig
+ python3
+ vala
+ wrapGAppsHook
+ yelp-tools
+ ];
+
+ buildInputs = [
+ adwaita-icon-theme
+ clutter-gst
+ clutter-gtk
+ dbus
+ gdk-pixbuf
+ glib
+ gnome-desktop
+ gnome-video-effects
+ gst_all_1.gst-plugins-bad
+ gst_all_1.gst-plugins-base
+ gst_all_1.gst-plugins-good
+ gst_all_1.gstreamer
+ gtk3
+ libcanberra-gtk3
+ libgudev
+ librsvg
+ udev
];
- buildInputs = [ gtk3 glib gnome-video-effects
- gdk-pixbuf adwaita-icon-theme librsvg udev gst_all_1.gstreamer
- gst_all_1.gst-plugins-base gst_all_1.gst-plugins-good gnome-desktop
- gst_all_1.gst-plugins-bad clutter-gtk clutter-gst
- libcanberra-gtk3 libgudev dbus ];
outputs = [ "out" "man" "devdoc" ];
diff --git a/third_party/nixpkgs/pkgs/desktops/gnome-3/apps/evolution/default.nix b/third_party/nixpkgs/pkgs/desktops/gnome-3/apps/evolution/default.nix
index f27050cd68..2390498ce7 100644
--- a/third_party/nixpkgs/pkgs/desktops/gnome-3/apps/evolution/default.nix
+++ b/third_party/nixpkgs/pkgs/desktops/gnome-3/apps/evolution/default.nix
@@ -43,11 +43,11 @@
stdenv.mkDerivation rec {
pname = "evolution";
- version = "3.36.5";
+ version = "3.38.1";
src = fetchurl {
url = "mirror://gnome/sources/evolution/${stdenv.lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
- sha256 = "1hpjd5d3z52xcjcc1hg5z8ypnx2y6ml9snyrlpflg9bx16yhxm1x";
+ sha256 = "1z68vhbqnm34axx4zcrds45nz2ppwzr4z1lczxrdiq0zf0cmxyfh";
};
nativeBuildInputs = [
diff --git a/third_party/nixpkgs/pkgs/desktops/gnome-3/apps/file-roller/default.nix b/third_party/nixpkgs/pkgs/desktops/gnome-3/apps/file-roller/default.nix
index 7c518c4acd..29e482135a 100644
--- a/third_party/nixpkgs/pkgs/desktops/gnome-3/apps/file-roller/default.nix
+++ b/third_party/nixpkgs/pkgs/desktops/gnome-3/apps/file-roller/default.nix
@@ -3,11 +3,11 @@
stdenv.mkDerivation rec {
pname = "file-roller";
- version = "3.36.3";
+ version = "3.38.0";
src = fetchurl {
url = "mirror://gnome/sources/${pname}/${stdenv.lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
- sha256 = "1dw1vfnfc44k57b6mip8fv565d2xv5wrigi4js044x3sbl5f2n89";
+ sha256 = "06ikvjjcgb8nxabkn2rywy76a1c7s6w8dszaxvaxldbxarp1qgbj";
};
LANG = "en_US.UTF-8"; # postinstall.py
diff --git a/third_party/nixpkgs/pkgs/desktops/gnome-3/apps/gedit/default.nix b/third_party/nixpkgs/pkgs/desktops/gnome-3/apps/gedit/default.nix
index ea33bc2932..78dc7623e3 100644
--- a/third_party/nixpkgs/pkgs/desktops/gnome-3/apps/gedit/default.nix
+++ b/third_party/nixpkgs/pkgs/desktops/gnome-3/apps/gedit/default.nix
@@ -1,29 +1,56 @@
-{ stdenv, meson, fetchurl, python3
-, pkgconfig, gtk3, glib, adwaita-icon-theme
-, libpeas, gtksourceview4, gsettings-desktop-schemas
-, wrapGAppsHook, ninja, libsoup, tepl
-, gnome3, gspell, perl, itstool, desktop-file-utils
+{ stdenv
+, meson
+, fetchurl
+, python3
+, pkgconfig
+, gtk3
+, glib
+, adwaita-icon-theme
+, libpeas
+, gtksourceview4
+, gsettings-desktop-schemas
+, wrapGAppsHook
+, ninja
+, libsoup
+, tepl
+, gnome3
+, gspell
+, perl
+, itstool
+, desktop-file-utils
+, vala
}:
stdenv.mkDerivation rec {
pname = "gedit";
- version = "3.36.2";
+ version = "3.38.0";
src = fetchurl {
url = "mirror://gnome/sources/gedit/${stdenv.lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
- sha256 = "15s1almlhjlgl3m8lxg6jpzln8jhgdxxjr635a3b7cf58d35b1v8";
+ sha256 = "1y2n3325qvfiaz526vdf7l5wbh5js25djkz3jmg6x3z5dn00dks6";
};
nativeBuildInputs = [
- pkgconfig wrapGAppsHook meson ninja
- python3 perl itstool desktop-file-utils
+ desktop-file-utils
+ itstool
+ meson
+ ninja
+ perl
+ pkgconfig
+ python3
+ vala
+ wrapGAppsHook
];
buildInputs = [
- gtk3 glib
- adwaita-icon-theme libsoup
- libpeas gtksourceview4
- gsettings-desktop-schemas gspell
+ adwaita-icon-theme
+ glib
+ gsettings-desktop-schemas
+ gspell
+ gtk3
+ gtksourceview4
+ libpeas
+ libsoup
tepl
];
diff --git a/third_party/nixpkgs/pkgs/desktops/gnome-3/apps/gnome-books/default.nix b/third_party/nixpkgs/pkgs/desktops/gnome-3/apps/gnome-books/default.nix
index 7432e8e96e..e7ea02a274 100644
--- a/third_party/nixpkgs/pkgs/desktops/gnome-3/apps/gnome-books/default.nix
+++ b/third_party/nixpkgs/pkgs/desktops/gnome-3/apps/gnome-books/default.nix
@@ -1,9 +1,30 @@
-{ stdenv, meson, ninja, gettext, fetchurl, evince, gjs
-, pkgconfig, gtk3, glib, tracker, tracker-miners, libxslt
-, webkitgtk, gnome-desktop, libgepub, gnome3, gdk-pixbuf
-, gsettings-desktop-schemas, adwaita-icon-theme, docbook_xsl
-, docbook_xml_dtd_42, desktop-file-utils, python3
-, gobject-introspection, wrapGAppsHook }:
+{ stdenv
+, meson
+, ninja
+, gettext
+, fetchurl
+, evince
+, gjs
+, pkgconfig
+, gtk3
+, glib
+, tracker
+, tracker-miners
+, libxslt
+, webkitgtk
+, gnome-desktop
+, libgepub
+, gnome3
+, gdk-pixbuf
+, gsettings-desktop-schemas
+, adwaita-icon-theme
+, docbook_xsl
+, docbook_xml_dtd_42
+, desktop-file-utils
+, python3
+, gobject-introspection
+, wrapGAppsHook
+}:
stdenv.mkDerivation rec {
pname = "gnome-books";
@@ -15,15 +36,32 @@ stdenv.mkDerivation rec {
};
nativeBuildInputs = [
- meson ninja pkgconfig gettext libxslt desktop-file-utils
- docbook_xsl docbook_xml_dtd_42 wrapGAppsHook python3
+ meson
+ ninja
+ pkgconfig
+ gettext
+ libxslt
+ desktop-file-utils
+ docbook_xsl
+ docbook_xml_dtd_42
+ wrapGAppsHook
+ python3
];
buildInputs = [
- gtk3 glib gsettings-desktop-schemas
- gdk-pixbuf adwaita-icon-theme evince
- webkitgtk gjs gobject-introspection tracker
- tracker-miners gnome-desktop libgepub
+ gtk3
+ glib
+ gsettings-desktop-schemas
+ gdk-pixbuf
+ adwaita-icon-theme
+ evince
+ webkitgtk
+ gjs
+ gobject-introspection
+ tracker
+ tracker-miners
+ gnome-desktop
+ libgepub
];
postPatch = ''
@@ -39,6 +77,7 @@ stdenv.mkDerivation rec {
};
meta = with stdenv.lib; {
+ broken = true; # Tracker 3 not supported and it cannot start Tracker 2.
homepage = "https://wiki.gnome.org/Apps/Books";
description = "An e-book manager application for GNOME";
maintainers = teams.gnome.members;
diff --git a/third_party/nixpkgs/pkgs/desktops/gnome-3/apps/gnome-boxes/default.nix b/third_party/nixpkgs/pkgs/desktops/gnome-3/apps/gnome-boxes/default.nix
index 4acc687da8..014ad123b4 100644
--- a/third_party/nixpkgs/pkgs/desktops/gnome-3/apps/gnome-boxes/default.nix
+++ b/third_party/nixpkgs/pkgs/desktops/gnome-3/apps/gnome-boxes/default.nix
@@ -11,12 +11,15 @@
, gobject-introspection
, libxml2
, gtk3
+, gtksourceview4
, gtk-vnc
, freerdp
, libvirt
, spice-gtk
, python3
+, appstream-glib
, spice-protocol
+, libhandy_0
, libsoup
, libosinfo
, systemd
@@ -51,16 +54,17 @@
stdenv.mkDerivation rec {
pname = "gnome-boxes";
- version = "3.36.6";
+ version = "3.38.1";
src = fetchurl {
url = "mirror://gnome/sources/${pname}/${stdenv.lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
- sha256 = "0c3cw90xqqcpacc2z06ljs0gg8saxizfgjzg9alhpwgz3gl4c5pg";
+ sha256 = "0zrm4mihkx5i42h3pvk9lmsqf983dqz4rnfcbccwhx4ml2s4w3qv";
};
doCheck = true;
nativeBuildInputs = [
+ appstream-glib # for appstream-util
desktop-file-utils
gettext
gobject-introspection
@@ -89,12 +93,14 @@ stdenv.mkDerivation rec {
gnome3.adwaita-icon-theme
gtk-vnc
gtk3
+ gtksourceview4
json-glib
libapparmor
libarchive
libcap
libcap_ng
libgudev
+ libhandy_0
libosinfo
librsvg
libsecret
diff --git a/third_party/nixpkgs/pkgs/desktops/gnome-3/apps/gnome-calendar/default.nix b/third_party/nixpkgs/pkgs/desktops/gnome-3/apps/gnome-calendar/default.nix
index 988cb1ed2a..1311bea08d 100644
--- a/third_party/nixpkgs/pkgs/desktops/gnome-3/apps/gnome-calendar/default.nix
+++ b/third_party/nixpkgs/pkgs/desktops/gnome-3/apps/gnome-calendar/default.nix
@@ -1,18 +1,45 @@
-{ stdenv, fetchurl, meson, ninja, pkgconfig, wrapGAppsHook, libdazzle, libgweather, geoclue2, geocode-glib, python3
-, gettext, libxml2, gnome3, gtk3, evolution-data-server, libsoup
-, glib, gnome-online-accounts, gsettings-desktop-schemas, libhandy }:
+{ stdenv
+, fetchurl
+, fetchpatch
+, meson
+, ninja
+, pkgconfig
+, wrapGAppsHook
+, libdazzle
+, libgweather
+, geoclue2
+, geocode-glib
+, python3
+, gettext
+, libxml2
+, gnome3
+, gtk3
+, evolution-data-server
+, libsoup
+, glib
+, gnome-online-accounts
+, gsettings-desktop-schemas
+, libhandy
+, adwaita-icon-theme
+}:
-let
+stdenv.mkDerivation rec {
pname = "gnome-calendar";
- version = "3.36.2";
-in stdenv.mkDerivation rec {
- name = "${pname}-${version}";
+ version = "3.38.1";
src = fetchurl {
- url = "mirror://gnome/sources/${pname}/${stdenv.lib.versions.majorMinor version}/${name}.tar.xz";
- sha256 = "07sc1kn65dzxsxpv0vl5dj1a5awljjsfl9jldrg0hnjmq12m7c6h";
+ url = "mirror://gnome/sources/${pname}/${stdenv.lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
+ sha256 = "04pmjzwcy1lswkri30rnvac99dff8zajs41as0j1cqrd1058i03j";
};
+ patches = [
+ # Port to libhandy-1
+ (fetchpatch {
+ url = "https://gitlab.gnome.org/GNOME/gnome-calendar/-/commit/8be361b6ce8f0f8053e1609decbdbdc164ec8448.patch";
+ sha256 = "Ue0pWwcbYyCZPHPPoR0dXW5n948/AZ3wVDMTIZDOnyE=";
+ })
+ ];
+
passthru = {
updateScript = gnome3.updateScript {
packageName = pname;
@@ -20,10 +47,29 @@ in stdenv.mkDerivation rec {
};
};
- nativeBuildInputs = [ meson ninja pkgconfig gettext libxml2 wrapGAppsHook python3 ];
+ nativeBuildInputs = [
+ meson
+ ninja
+ pkgconfig
+ gettext
+ libxml2
+ wrapGAppsHook
+ python3
+ ];
+
buildInputs = [
- gtk3 evolution-data-server libsoup glib gnome-online-accounts libdazzle libgweather geoclue2 geocode-glib
- gsettings-desktop-schemas gnome3.adwaita-icon-theme libhandy
+ gtk3
+ evolution-data-server
+ libsoup
+ glib
+ gnome-online-accounts
+ libdazzle
+ libgweather
+ geoclue2
+ geocode-glib
+ gsettings-desktop-schemas
+ adwaita-icon-theme
+ libhandy
];
postPatch = ''
diff --git a/third_party/nixpkgs/pkgs/desktops/gnome-3/apps/gnome-clocks/default.nix b/third_party/nixpkgs/pkgs/desktops/gnome-3/apps/gnome-clocks/default.nix
index 5e3ff58b29..1ffd15cfc1 100644
--- a/third_party/nixpkgs/pkgs/desktops/gnome-3/apps/gnome-clocks/default.nix
+++ b/third_party/nixpkgs/pkgs/desktops/gnome-3/apps/gnome-clocks/default.nix
@@ -27,11 +27,11 @@
stdenv.mkDerivation rec {
pname = "gnome-clocks";
- version = "3.36.2";
+ version = "3.38.0";
src = fetchurl {
url = "mirror://gnome/sources/gnome-clocks/${stdenv.lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
- sha256 = "1rjicycgh9jvkqir2m8hx9m4jlaa3w5lqs43k185wa0zxhi1n6zi";
+ sha256 = "0f24g76ax59qnms1rjfyf1i0sa84nadgbr0r6m26p90w1w2wnmnr";
};
nativeBuildInputs = [
diff --git a/third_party/nixpkgs/pkgs/desktops/gnome-3/apps/gnome-connections/default.nix b/third_party/nixpkgs/pkgs/desktops/gnome-3/apps/gnome-connections/default.nix
new file mode 100644
index 0000000000..676e235999
--- /dev/null
+++ b/third_party/nixpkgs/pkgs/desktops/gnome-3/apps/gnome-connections/default.nix
@@ -0,0 +1,74 @@
+{ stdenv
+, fetchurl
+, gnome3
+, meson
+, ninja
+, vala
+, pkg-config
+, glib
+, gtk3
+, python3
+, libxml2
+, gtk-vnc
+, gettext
+, desktop-file-utils
+, appstream-glib
+, gobject-introspection
+, freerdp
+, wrapGAppsHook
+}:
+
+stdenv.mkDerivation rec {
+ pname = "gnome-connections";
+ version = "3.38.0";
+
+ src = fetchurl {
+ url = "mirror://gnome/sources/connections/${stdenv.lib.versions.majorMinor version}/connections-${version}.tar.xz";
+ hash = "sha256-Eob36/zoWIGdYMpWks280FoIHGL7AHUhinFA4cEqels=";
+ };
+
+ nativeBuildInputs = [
+ desktop-file-utils
+ gettext
+ glib # glib-compile-resources
+ meson
+ appstream-glib
+ ninja
+ pkg-config
+ python3
+ vala
+ wrapGAppsHook
+
+ # for gtk-frdp subproject
+ gobject-introspection
+ ];
+
+ buildInputs = [
+ glib
+ gtk-vnc
+ gtk3
+ libxml2
+
+ # for gtk-frdp subproject
+ freerdp
+ ];
+
+ postPatch = ''
+ chmod +x build-aux/meson/postinstall.py
+ patchShebangs build-aux/meson/postinstall.py
+ '';
+
+ passthru = {
+ updateScript = gnome3.updateScript {
+ packageName = pname;
+ };
+ };
+
+ meta = with stdenv.lib; {
+ homepage = "https://gitlab.gnome.org/GNOME/connections";
+ description = "A remote desktop client for the GNOME desktop environment";
+ maintainers = teams.gnome.members;
+ license = licenses.gpl3Plus;
+ platforms = platforms.linux;
+ };
+}
diff --git a/third_party/nixpkgs/pkgs/desktops/gnome-3/apps/gnome-documents/default.nix b/third_party/nixpkgs/pkgs/desktops/gnome-3/apps/gnome-documents/default.nix
index 8d5501537a..ec1268f077 100644
--- a/third_party/nixpkgs/pkgs/desktops/gnome-3/apps/gnome-documents/default.nix
+++ b/third_party/nixpkgs/pkgs/desktops/gnome-3/apps/gnome-documents/default.nix
@@ -3,6 +3,7 @@
, ninja
, gettext
, fetchurl
+, fetchpatch
, evince
, gjs
, pkgconfig
@@ -28,6 +29,7 @@
, desktop-file-utils
, wrapGAppsHook
, python3
+, appstream-glib
, gsettings-desktop-schemas
}:
@@ -40,6 +42,14 @@ stdenv.mkDerivation rec {
sha256 = "1qph567mapg3s1a26k7b8y57g9bklhj2mh8xm758z9zkms20xafq";
};
+ patches = [
+ # Fix inkscape 1.0 usage
+ (fetchpatch {
+ url = "https://gitlab.gnome.org/GNOME/gnome-documents/commit/0f55a18c40a61e6ae4ec4652604775f139892350.diff";
+ sha256 = "1yrisq69dl1dn7639drlbza20a5ic6xg04ksr9iq4sxdx3xj3d8s";
+ })
+ ];
+
nativeBuildInputs = [
meson
ninja
@@ -52,6 +62,7 @@ stdenv.mkDerivation rec {
docbook_xml_dtd_42
wrapGAppsHook
python3
+ appstream-glib
# building getting started
inkscape
@@ -92,6 +103,12 @@ stdenv.mkDerivation rec {
substituteInPlace $out/bin/gnome-documents --replace gapplication "${glib.bin}/bin/gapplication"
'';
+ preConfigure =
+ # To silence inkscape warnings regarding profile directory
+ ''
+ export INKSCAPE_PROFILE_DIR="$(mktemp -d)"
+ '';
+
passthru = {
updateScript = gnome3.updateScript {
packageName = pname;
@@ -100,6 +117,7 @@ stdenv.mkDerivation rec {
};
meta = with stdenv.lib; {
+ broken = true; # Tracker 3 not supported and it cannot start Tracker 2.
homepage = "https://wiki.gnome.org/Apps/Documents";
description = "Document manager application designed to work with GNOME 3";
maintainers = teams.gnome.members;
diff --git a/third_party/nixpkgs/pkgs/desktops/gnome-3/apps/gnome-maps/default.nix b/third_party/nixpkgs/pkgs/desktops/gnome-3/apps/gnome-maps/default.nix
index 57ba6fd076..ffc9c7cb44 100644
--- a/third_party/nixpkgs/pkgs/desktops/gnome-3/apps/gnome-maps/default.nix
+++ b/third_party/nixpkgs/pkgs/desktops/gnome-3/apps/gnome-maps/default.nix
@@ -1,29 +1,71 @@
-{ stdenv, fetchurl, meson, ninja, gettext, python3, pkgconfig, gnome3, gtk3
-, gobject-introspection, gdk-pixbuf, librsvg, libgweather
-, geoclue2, wrapGAppsHook, folks, libchamplain, gfbgraph, libsoup, gsettings-desktop-schemas
-, webkitgtk, gjs, libgee, geocode-glib, evolution-data-server, gnome-online-accounts }:
+{ stdenv
+, fetchurl
+, meson
+, ninja
+, gettext
+, python3
+, pkgconfig
+, gnome3
+, gtk3
+, gobject-introspection
+, gdk-pixbuf
+, librsvg
+, libgweather
+, geoclue2
+, wrapGAppsHook
+, folks
+, libchamplain
+, gfbgraph
+, libsoup
+, gsettings-desktop-schemas
+, webkitgtk
+, gjs
+, libgee
+, libhandy
+, geocode-glib
+, evolution-data-server
+, gnome-online-accounts
+}:
-let
+stdenv.mkDerivation rec {
pname = "gnome-maps";
- version = "3.36.4";
-in stdenv.mkDerivation rec {
- name = "${pname}-${version}";
+ version = "3.38.1.1";
src = fetchurl {
- url = "mirror://gnome/sources/${pname}/${stdenv.lib.versions.majorMinor version}/${name}.tar.xz";
- sha256 = "1ila7li9yi4lyjc84a787qr33wr7ayppphxn451jzg410pfcamhz";
+ url = "mirror://gnome/sources/${pname}/${stdenv.lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
+ sha256 = "1y59afvfrylkikqd0ax0nj41zs6b54219l7k5bp5gzh9lxq06xgk";
};
doCheck = true;
- nativeBuildInputs = [ meson ninja pkgconfig gettext python3 wrapGAppsHook ];
+ nativeBuildInputs = [
+ gettext
+ meson
+ ninja
+ pkgconfig
+ python3
+ wrapGAppsHook
+ ];
+
buildInputs = [
+ evolution-data-server
+ folks
+ gdk-pixbuf
+ geoclue2
+ geocode-glib
+ gfbgraph
+ gjs
+ gnome-online-accounts
+ gnome3.adwaita-icon-theme
gobject-introspection
- gtk3 geoclue2 gjs libgee folks gfbgraph
- geocode-glib libchamplain libsoup
- gdk-pixbuf librsvg libgweather
- gsettings-desktop-schemas evolution-data-server
- gnome-online-accounts gnome3.adwaita-icon-theme
+ gsettings-desktop-schemas
+ gtk3
+ libchamplain
+ libgee
+ libgweather
+ libhandy
+ librsvg
+ libsoup
webkitgtk
];
diff --git a/third_party/nixpkgs/pkgs/desktops/gnome-3/apps/gnome-music/default.nix b/third_party/nixpkgs/pkgs/desktops/gnome-3/apps/gnome-music/default.nix
index 92c40f4a00..ca59c5556f 100644
--- a/third_party/nixpkgs/pkgs/desktops/gnome-3/apps/gnome-music/default.nix
+++ b/third_party/nixpkgs/pkgs/desktops/gnome-3/apps/gnome-music/default.nix
@@ -30,13 +30,13 @@
python3.pkgs.buildPythonApplication rec {
pname = "gnome-music";
- version = "3.36.4.1";
+ version = "3.38.1";
format = "other";
src = fetchurl {
url = "mirror://gnome/sources/${pname}/${stdenv.lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
- sha256 = "0zdpjgwf48bqb66wrl6k33pzcmc2g3m1046ma7z8xaj9idpi37jh";
+ sha256 = "1sda943nd646nq2y5anj0d7aaxxddznva5bh5gsx6qx0mxhi5jrv";
};
nativeBuildInputs = [
diff --git a/third_party/nixpkgs/pkgs/desktops/gnome-3/apps/gnome-notes/default.nix b/third_party/nixpkgs/pkgs/desktops/gnome-3/apps/gnome-notes/default.nix
index c32289d70d..fab4c491a6 100644
--- a/third_party/nixpkgs/pkgs/desktops/gnome-3/apps/gnome-notes/default.nix
+++ b/third_party/nixpkgs/pkgs/desktops/gnome-3/apps/gnome-notes/default.nix
@@ -13,7 +13,7 @@
, evolution-data-server
, gnome-online-accounts
, libuuid
-, libhandy
+, libhandy_0
, webkitgtk
, zeitgeist
, gnome3
@@ -22,16 +22,13 @@
, tracker
}:
-let
- version = "3.36.3";
-in
-stdenv.mkDerivation {
+stdenv.mkDerivation rec {
pname = "gnome-notes";
- inherit version;
+ version = "3.38.0";
src = fetchurl {
url = "mirror://gnome/sources/bijiben/${stdenv.lib.versions.majorMinor version}/bijiben-${version}.tar.xz";
- sha256 = "1midnphyg038s94ahhzv0pvbzzzn62ccky28c9nazxqvw4hvdsbh";
+ sha256 = "H/bMCsbGKQe/KgmhchXt0vF7dNrKs6XIminDBJFyvis=";
};
doCheck = true;
@@ -57,7 +54,7 @@ stdenv.mkDerivation {
glib
gtk3
libuuid
- libhandy
+ libhandy_0 # doesn't support libhandy-1 yet
webkitgtk
tracker
gnome-online-accounts
diff --git a/third_party/nixpkgs/pkgs/desktops/gnome-3/apps/gnome-sound-recorder/default.nix b/third_party/nixpkgs/pkgs/desktops/gnome-3/apps/gnome-sound-recorder/default.nix
index f4a72fdfb4..6875b2ec81 100644
--- a/third_party/nixpkgs/pkgs/desktops/gnome-3/apps/gnome-sound-recorder/default.nix
+++ b/third_party/nixpkgs/pkgs/desktops/gnome-3/apps/gnome-sound-recorder/default.nix
@@ -1,30 +1,60 @@
-{ stdenv, fetchurl, pkgconfig, gettext, gobject-introspection, wrapGAppsHook, gjs, glib, gtk3, gdk-pixbuf, gst_all_1, gnome3
-, meson, ninja, python3, desktop-file-utils }:
+{ stdenv
+, fetchurl
+, pkgconfig
+, gettext
+, gobject-introspection
+, wrapGAppsHook
+, gjs
+, glib
+, gtk3
+, gdk-pixbuf
+, gst_all_1
+, gnome3
+, meson
+, ninja
+, python3
+, desktop-file-utils
+, libhandy
+}:
stdenv.mkDerivation rec {
pname = "gnome-sound-recorder";
- version = "3.34.0";
+ version = "3.38.0";
src = fetchurl {
url = "mirror://gnome/sources/${pname}/${stdenv.lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
- sha256 = "1i442qas2dkp5d9j9j1z1jicb4cb7jkgbcl4c36bmhvaq3hddwa9";
+ sha256 = "I5A/c2G+QQhw+6lHIJFnuW9JB2MGQdM8y6qOQvV0tpk=";
};
nativeBuildInputs = [
- pkgconfig gettext meson ninja gobject-introspection
- wrapGAppsHook python3 desktop-file-utils
+ pkgconfig
+ gettext
+ meson
+ ninja
+ gobject-introspection
+ wrapGAppsHook
+ python3
+ desktop-file-utils
];
- buildInputs = [ gjs glib gtk3 gdk-pixbuf ] ++ (with gst_all_1; [ gstreamer.dev gstreamer gst-plugins-base gst-plugins-good gst-plugins-bad ]);
+
+ buildInputs = [
+ gjs
+ glib
+ gtk3
+ gdk-pixbuf
+ libhandy
+ ] ++ (with gst_all_1; [
+ gstreamer
+ gst-plugins-base
+ gst-plugins-good
+ gst-plugins-bad # for gstreamer-player-1.0
+ ]);
postPatch = ''
chmod +x build-aux/meson_post_install.py
patchShebangs build-aux/meson_post_install.py
'';
- # TODO: fix this in gstreamer
- # TODO: make stdenv.lib.getBin respect outputBin
- PKG_CONFIG_GSTREAMER_1_0_TOOLSDIR = "${gst_all_1.gstreamer.dev}/bin";
-
passthru = {
updateScript = gnome3.updateScript {
packageName = pname;
diff --git a/third_party/nixpkgs/pkgs/desktops/gnome-3/apps/polari/default.nix b/third_party/nixpkgs/pkgs/desktops/gnome-3/apps/polari/default.nix
index 514eecc173..c16b1f2ab1 100644
--- a/third_party/nixpkgs/pkgs/desktops/gnome-3/apps/polari/default.nix
+++ b/third_party/nixpkgs/pkgs/desktops/gnome-3/apps/polari/default.nix
@@ -5,13 +5,13 @@
let
pname = "polari";
- version = "3.36.3";
+ version = "3.38.0";
in stdenv.mkDerivation rec {
name = "${pname}-${version}";
src = fetchurl {
url = "mirror://gnome/sources/${pname}/${stdenv.lib.versions.majorMinor version}/${name}.tar.xz";
- sha256 = "0fpmrvhd40yay051bzn4x3gsrzdv42nav0pm5ps0np8wk1z689jg";
+ sha256 = "1l82nmb5qk4h69rsdhzlcmjjdhwh9jzfs4cnw8hy39sg5v9ady1s";
};
patches = [
diff --git a/third_party/nixpkgs/pkgs/desktops/gnome-3/apps/seahorse/default.nix b/third_party/nixpkgs/pkgs/desktops/gnome-3/apps/seahorse/default.nix
index 3668fc171b..370b7a07ac 100644
--- a/third_party/nixpkgs/pkgs/desktops/gnome-3/apps/seahorse/default.nix
+++ b/third_party/nixpkgs/pkgs/desktops/gnome-3/apps/seahorse/default.nix
@@ -22,16 +22,16 @@
, p11-kit
, openssh
, gsettings-desktop-schemas
-, libhandy
+, libhandy_0
}:
stdenv.mkDerivation rec {
pname = "seahorse";
- version = "3.36.2";
+ version = "3.37.2";
src = fetchurl {
url = "mirror://gnome/sources/${pname}/${stdenv.lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
- sha256 = "16wmxxppgcgfj8zkagcny5af1c81x32ysm9d6j9f2k7bmik21ss5";
+ hash = "sha256-flpBYSYDDDTONYZuRR3V2sx637Mp1dMQJ79fUGLtRio=";
};
doCheck = true;
@@ -61,7 +61,7 @@ stdenv.mkDerivation rec {
openssh
openldap
libpwquality
- libhandy
+ libhandy_0 # not yet ported to libhandy-1
];
postPatch = ''
diff --git a/third_party/nixpkgs/pkgs/desktops/gnome-3/core/adwaita-icon-theme/default.nix b/third_party/nixpkgs/pkgs/desktops/gnome-3/core/adwaita-icon-theme/default.nix
index 68c09cc918..fa489e7695 100644
--- a/third_party/nixpkgs/pkgs/desktops/gnome-3/core/adwaita-icon-theme/default.nix
+++ b/third_party/nixpkgs/pkgs/desktops/gnome-3/core/adwaita-icon-theme/default.nix
@@ -3,11 +3,11 @@
stdenv.mkDerivation rec {
pname = "adwaita-icon-theme";
- version = "3.36.1";
+ version = "3.38.0";
src = fetchurl {
url = "mirror://gnome/sources/adwaita-icon-theme/${stdenv.lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
- sha256 = "0kgiq712lfidd81yzx0yk7qwlj3q8cymp6npnxyzsk844y353674";
+ sha256 = "15xgz9wzk07442x3s3052as95g0223z4pp9qlsgcs323yama30v6";
};
# For convenience, we can specify adwaita-icon-theme only in packages
diff --git a/third_party/nixpkgs/pkgs/desktops/gnome-3/core/baobab/default.nix b/third_party/nixpkgs/pkgs/desktops/gnome-3/core/baobab/default.nix
index dce14d6d1d..274989bf3b 100644
--- a/third_party/nixpkgs/pkgs/desktops/gnome-3/core/baobab/default.nix
+++ b/third_party/nixpkgs/pkgs/desktops/gnome-3/core/baobab/default.nix
@@ -1,19 +1,19 @@
{ stdenv, gettext, fetchurl, vala, desktop-file-utils
-, meson, ninja, pkgconfig, gtk3, glib, libxml2
+, meson, ninja, pkgconfig, python3, gtk3, glib, libxml2
, wrapGAppsHook, itstool, gnome3 }:
let
pname = "baobab";
- version = "3.34.1";
+ version = "3.38.0";
in stdenv.mkDerivation rec {
name = "${pname}-${version}";
src = fetchurl {
url = "mirror://gnome/sources/${pname}/${stdenv.lib.versions.majorMinor version}/${name}.tar.xz";
- sha256 = "1i90gc1cpw5507zn54k46hj4mjgdxsq8cvpnlgxq0ksy2d7iv63z";
+ sha256 = "0ac3fbl15l836yvgw724q4whbkws9v4b6l2xy6bnp0b0g0a6i104";
};
- nativeBuildInputs = [ meson ninja pkgconfig vala gettext itstool libxml2 desktop-file-utils wrapGAppsHook ];
+ nativeBuildInputs = [ meson ninja pkgconfig vala gettext itstool libxml2 desktop-file-utils wrapGAppsHook python3 ];
buildInputs = [ gtk3 glib gnome3.adwaita-icon-theme ];
doCheck = true;
diff --git a/third_party/nixpkgs/pkgs/desktops/gnome-3/core/dconf-editor/default.nix b/third_party/nixpkgs/pkgs/desktops/gnome-3/core/dconf-editor/default.nix
index c6b02917ce..00c9d3a4c9 100644
--- a/third_party/nixpkgs/pkgs/desktops/gnome-3/core/dconf-editor/default.nix
+++ b/third_party/nixpkgs/pkgs/desktops/gnome-3/core/dconf-editor/default.nix
@@ -3,13 +3,13 @@
let
pname = "dconf-editor";
- version = "3.36.4";
+ version = "3.38.0";
in stdenv.mkDerivation rec {
name = "${pname}-${version}";
src = fetchurl {
url = "mirror://gnome/sources/${pname}/${stdenv.lib.versions.majorMinor version}/${name}.tar.xz";
- sha256 = "0y9yll77wkvr9ly132icfsl12sdz5aba9qc3aqm5rc90r6xhkhry";
+ sha256 = "1d1y33c6fm86xz9xbh3bfz4y2pyas01a58lmirmdx0lh6yd292bd";
};
nativeBuildInputs = [
diff --git a/third_party/nixpkgs/pkgs/desktops/gnome-3/core/empathy/default.nix b/third_party/nixpkgs/pkgs/desktops/gnome-3/core/empathy/default.nix
index 83c1f5d4a5..ce5ca16eb7 100644
--- a/third_party/nixpkgs/pkgs/desktops/gnome-3/core/empathy/default.nix
+++ b/third_party/nixpkgs/pkgs/desktops/gnome-3/core/empathy/default.nix
@@ -60,7 +60,7 @@ stdenv.mkDerivation rec {
};
propagatedBuildInputs = [
- folks
+ (folks.override { telepathySupport = true; })
telepathy-logger
evolution-data-server
telepathy-mission-control
diff --git a/third_party/nixpkgs/pkgs/desktops/gnome-3/core/eog/default.nix b/third_party/nixpkgs/pkgs/desktops/gnome-3/core/eog/default.nix
index 6ad0834724..1e965b8052 100644
--- a/third_party/nixpkgs/pkgs/desktops/gnome-3/core/eog/default.nix
+++ b/third_party/nixpkgs/pkgs/desktops/gnome-3/core/eog/default.nix
@@ -8,6 +8,7 @@
, libxml2
, libjpeg
, libpeas
+, libportal
, gnome3
, gtk3
, glib
@@ -27,11 +28,11 @@
stdenv.mkDerivation rec {
pname = "eog";
- version = "3.36.3";
+ version = "3.38.0";
src = fetchurl {
url = "mirror://gnome/sources/${pname}/${stdenv.lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
- sha256 = "1p1lrnsgk5iyw7h02qzax4s74dqqsh5lk85b0qsj7hwx91qm61xp";
+ sha256 = "0qyrs9cp4hsh64jfdpdi2v1hag8izw77qqnsvqwdb33871ya98z1";
};
nativeBuildInputs = [
@@ -48,6 +49,7 @@ stdenv.mkDerivation rec {
buildInputs = [
libjpeg
+ libportal
gtk3
gdk-pixbuf
glib
diff --git a/third_party/nixpkgs/pkgs/desktops/gnome-3/core/epiphany/default.nix b/third_party/nixpkgs/pkgs/desktops/gnome-3/core/epiphany/default.nix
index ad2d67972a..7b9c439b24 100644
--- a/third_party/nixpkgs/pkgs/desktops/gnome-3/core/epiphany/default.nix
+++ b/third_party/nixpkgs/pkgs/desktops/gnome-3/core/epiphany/default.nix
@@ -9,6 +9,7 @@
, icu
, wrapGAppsHook
, gnome3
+, libportal
, libxml2
, libxslt
, itstool
@@ -35,11 +36,11 @@
stdenv.mkDerivation rec {
pname = "epiphany";
- version = "3.36.4";
+ version = "3.38.1";
src = fetchurl {
url = "mirror://gnome/sources/${pname}/${stdenv.lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
- sha256 = "1gs2a94fzpciv58rljgbirsc2kqgiaiyc2yg6ff50nlgb2qpb2jq";
+ sha256 = "0hr87nl8pc7h8w65i8jwj5fdwr46wbygdnx6mhpbbyqirdm5gdsr";
};
# Tests need an X display
@@ -80,6 +81,7 @@ stdenv.mkDerivation rec {
json-glib
libdazzle
libhandy
+ libportal
libnotify
libsecret
libsoup
diff --git a/third_party/nixpkgs/pkgs/desktops/gnome-3/core/evince/default.nix b/third_party/nixpkgs/pkgs/desktops/gnome-3/core/evince/default.nix
index 11a5bcbd0f..a2c7c52a1c 100644
--- a/third_party/nixpkgs/pkgs/desktops/gnome-3/core/evince/default.nix
+++ b/third_party/nixpkgs/pkgs/desktops/gnome-3/core/evince/default.nix
@@ -43,13 +43,13 @@
stdenv.mkDerivation rec {
pname = "evince";
- version = "3.36.7";
+ version = "3.38.0";
outputs = [ "out" "dev" "devdoc" ];
src = fetchurl {
url = "mirror://gnome/sources/evince/${stdenv.lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
- sha256 = "0clg9fhgjyj23mmcmw7dp512wzgv5m18fppn05qf1frz7r11mmk5";
+ sha256 = "0j0ry0y9qi1mlm7dcjwrmrw45s1225ri8sv0s9vb8ibm85x8kpr6";
};
postPatch = ''
diff --git a/third_party/nixpkgs/pkgs/desktops/gnome-3/core/evolution-data-server/default.nix b/third_party/nixpkgs/pkgs/desktops/gnome-3/core/evolution-data-server/default.nix
index 721b38d856..9c73bf0e18 100644
--- a/third_party/nixpkgs/pkgs/desktops/gnome-3/core/evolution-data-server/default.nix
+++ b/third_party/nixpkgs/pkgs/desktops/gnome-3/core/evolution-data-server/default.nix
@@ -6,13 +6,13 @@
stdenv.mkDerivation rec {
pname = "evolution-data-server";
- version = "3.36.5";
+ version = "3.38.1";
outputs = [ "out" "dev" ];
src = fetchurl {
url = "mirror://gnome/sources/evolution-data-server/${stdenv.lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
- sha256 = "1nbzzqxlck3jz42wnxl281yfzpylcvbsbb0fvkh7nibdaj654mf5";
+ sha256 = "1dz4ybhq5rf1hnaf1d6h60ldn9xpdaj9nw42c4iqbw9lqglpiwlg";
};
patches = [
diff --git a/third_party/nixpkgs/pkgs/desktops/gnome-3/core/gdm/default.nix b/third_party/nixpkgs/pkgs/desktops/gnome-3/core/gdm/default.nix
index 58c898a5f0..026e0d2fae 100644
--- a/third_party/nixpkgs/pkgs/desktops/gnome-3/core/gdm/default.nix
+++ b/third_party/nixpkgs/pkgs/desktops/gnome-3/core/gdm/default.nix
@@ -1,7 +1,35 @@
-{ stdenv, fetchurl, substituteAll, pkgconfig, glib, itstool, libxml2, xorg
-, accountsservice, libX11, gnome3, systemd, autoreconfHook, dconf
-, gtk3, libcanberra-gtk3, pam, libtool, gobject-introspection, plymouth
-, librsvg, coreutils, xwayland, nixos-icons, fetchpatch }:
+{ stdenv
+, fetchurl
+, fetchpatch
+, substituteAll
+, meson
+, ninja
+, python3
+, rsync
+, pkg-config
+, glib
+, itstool
+, libxml2
+, xorg
+, accountsservice
+, libX11
+, gnome3
+, systemd
+, dconf
+, gtk3
+, libcanberra-gtk3
+, pam
+, libselinux
+, keyutils
+, audit
+, gobject-introspection
+, plymouth
+, librsvg
+, coreutils
+, xwayland
+, dbus
+, nixos-icons
+}:
let
@@ -19,44 +47,64 @@ in
stdenv.mkDerivation rec {
pname = "gdm";
- version = "3.34.1";
+ version = "3.38.2";
+
+ outputs = [ "out" "dev" ];
src = fetchurl {
url = "mirror://gnome/sources/gdm/${stdenv.lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
- sha256 = "1lyqvcwxhwxklbxn4xjswjzr6fhjix6h28mi9ypn34wdm9bzcpg8";
+ sha256 = "1k2k3rv10y9dppp6ffz6gqi2p6s3g03bxjyy8njvcjyxqdk6d8i5";
};
- # Only needed to make it build
- preConfigure = ''
- substituteInPlace ./configure --replace "/usr/bin/X" "${xorg.xorgserver.out}/bin/X"
- '';
-
- initialVT = "7";
-
- configureFlags = [
+ mesonFlags = [
+ "-Dgdm-xsession=true"
+ # TODO: Setup a default-path? https://gitlab.gnome.org/GNOME/gdm/-/blob/6fc40ac6aa37c8ad87c32f0b1a5d813d34bf7770/meson_options.txt#L6
+ "-Dinitial-vt=${passthru.initialVT}"
+ "-Dudev-dir=${placeholder "out"}/lib/udev/rules.d"
+ "-Dsystemdsystemunitdir=${placeholder "out"}/lib/systemd/system"
+ "-Dsystemduserunitdir=${placeholder "out"}/lib/systemd/user"
"--sysconfdir=/etc"
"--localstatedir=/var"
- "--with-plymouth=yes"
- "--enable-gdm-xsession"
- "--with-initial-vt=${initialVT}"
- "--with-systemdsystemunitdir=$(out)/etc/systemd/system"
- "--with-udevdir=$(out)/lib/udev"
];
- nativeBuildInputs = [ pkgconfig libxml2 itstool autoreconfHook libtool dconf ];
+ nativeBuildInputs = [
+ dconf
+ glib # for glib-compile-schemas
+ itstool
+ meson
+ ninja
+ pkg-config
+ python3
+ rsync
+ ];
+
buildInputs = [
- glib accountsservice systemd
- gobject-introspection libX11 gtk3
- libcanberra-gtk3 pam plymouth librsvg
+ accountsservice
+ audit
+ glib
+ gobject-introspection
+ gtk3
+ keyutils
+ libX11
+ libcanberra-gtk3
+ libselinux
+ pam
+ plymouth
+ systemd
+ xorg.libXdmcp
];
- enableParallelBuilding = true;
-
patches = [
+ # https://gitlab.gnome.org/GNOME/gdm/-/merge_requests/112
+ (fetchpatch {
+ url = "https://gitlab.gnome.org/GNOME/gdm/-/commit/1d28d4b3568381b8590d2235737b924aefd1746c.patch";
+ sha256 = "ZUXKZS4T0o0hzrApxaqcR0txCRv5zBgqeQ9K9fLNX1o=";
+ })
+
# Change hardcoded paths to nix store paths.
(substituteAll {
src = ./fix-paths.patch;
- inherit coreutils plymouth xwayland;
+ inherit coreutils plymouth xwayland dbus;
})
# The following patches implement certain environment variables in GDM which are set by
@@ -76,21 +124,52 @@ stdenv.mkDerivation rec {
./reset-environment.patch
];
- installFlags = [
- "sysconfdir=$(out)/etc"
- "dbusconfdir=$(out)/etc/dbus-1/system.d"
- ];
+ postPatch = ''
+ patchShebangs build-aux/meson_post_install.py
+
+ # Upstream checks some common paths to find an `X` binary. We already know it.
+ echo #!/bin/sh > build-aux/find-x-server.sh
+ echo "echo ${stdenv.lib.getBin xorg.xorgserver}/bin/X" >> build-aux/find-x-server.sh
+ patchShebangs build-aux/find-x-server.sh
+ '';
preInstall = ''
- schema_dir=${glib.makeSchemaPath "$out" "${pname}-${version}"}
- install -D ${override} $schema_dir/org.gnome.login-screen.gschema.override
+ install -D ${override} ${DESTDIR}/$out/share/glib-2.0/schemas/org.gnome.login-screen.gschema.override
'';
+ postInstall = ''
+ # Move stuff from DESTDIR to proper location.
+ # We use rsync to merge the directories.
+ rsync --archive "${DESTDIR}/etc" "$out"
+ rm --recursive "${DESTDIR}/etc"
+ for o in $outputs; do
+ rsync --archive "${DESTDIR}/''${!o}" "$(dirname "''${!o}")"
+ rm --recursive "${DESTDIR}/''${!o}"
+ done
+ # Ensure the DESTDIR is removed.
+ rmdir "${DESTDIR}/nix/store" "${DESTDIR}/nix" "${DESTDIR}"
+
+ # We are setting DESTDIR so the post-install script does not compile the schemas.
+ glib-compile-schemas "$out/share/glib-2.0/schemas"
+ '';
+
+ # HACK: We want to install configuration files to $out/etc
+ # but GDM should read them from /etc on a NixOS system.
+ # With autotools, it was possible to override Make variables
+ # at install time but Meson does not support this
+ # so we need to convince it to install all files to a temporary
+ # location using DESTDIR and then move it to proper one in postInstall.
+ DESTDIR = "${placeholder "out"}/dest";
+
passthru = {
updateScript = gnome3.updateScript {
packageName = "gdm";
attrPath = "gnome3.gdm";
};
+
+ # Used in GDM NixOS module
+ # Don't remove.
+ initialVT = "7";
};
meta = with stdenv.lib; {
diff --git a/third_party/nixpkgs/pkgs/desktops/gnome-3/core/gdm/fix-paths.patch b/third_party/nixpkgs/pkgs/desktops/gnome-3/core/gdm/fix-paths.patch
index 6b5bd6152b..d649556fe9 100644
--- a/third_party/nixpkgs/pkgs/desktops/gnome-3/core/gdm/fix-paths.patch
+++ b/third_party/nixpkgs/pkgs/desktops/gnome-3/core/gdm/fix-paths.patch
@@ -13,48 +13,70 @@
+++ b/daemon/gdm-manager.c
@@ -145,7 +145,7 @@
GError *error;
-
+
error = NULL;
-- res = g_spawn_command_line_sync ("/bin/plymouth --ping",
+- res = g_spawn_command_line_sync ("plymouth --ping",
+ res = g_spawn_command_line_sync ("@plymouth@/bin/plymouth --ping",
NULL, NULL, &status, &error);
if (! res) {
g_debug ("Could not ping plymouth: %s", error->message);
@@ -163,7 +163,7 @@
GError *error;
-
+
error = NULL;
-- res = g_spawn_command_line_sync ("/bin/plymouth deactivate",
+- res = g_spawn_command_line_sync ("plymouth deactivate",
+ res = g_spawn_command_line_sync ("@plymouth@/bin/plymouth deactivate",
NULL, NULL, NULL, &error);
if (! res) {
g_warning ("Could not deactivate plymouth: %s", error->message);
@@ -178,7 +178,7 @@
GError *error;
-
+
error = NULL;
-- res = g_spawn_command_line_async ("/bin/plymouth quit --retain-splash", &error);
+- res = g_spawn_command_line_async ("plymouth quit --retain-splash", &error);
+ res = g_spawn_command_line_async ("@plymouth@/bin/plymouth quit --retain-splash", &error);
if (! res) {
g_warning ("Could not quit plymouth: %s", error->message);
g_error_free (error);
@@ -194,7 +194,7 @@
GError *error;
-
+
error = NULL;
-- res = g_spawn_command_line_async ("/bin/plymouth quit", &error);
+- res = g_spawn_command_line_async ("plymouth quit", &error);
+ res = g_spawn_command_line_async ("@plymouth@/bin/plymouth quit", &error);
if (! res) {
g_warning ("Could not quit plymouth: %s", error->message);
g_error_free (error);
--- a/data/gdm.service.in
+++ b/data/gdm.service.in
-@@ -28,7 +28,7 @@ BusName=org.gnome.DisplayManager
- StandardOutput=syslog
- StandardError=inherit
- EnvironmentFile=-@LANG_CONFIG_FILE@
+@@ -26,7 +26,7 @@ Restart=always
+ IgnoreSIGPIPE=no
+ BusName=org.gnome.DisplayManager
+ EnvironmentFile=-${LANG_CONFIG_FILE}
-ExecReload=/bin/kill -SIGHUP $MAINPID
+ExecReload=@coreutils@/bin/kill -SIGHUP $MAINPID
KeyringMode=shared
-
+
[Install]
+--- a/daemon/gdm-session.c
++++ b/daemon/gdm-session.c
+@@ -2916,16 +2916,16 @@ gdm_session_start_session (GdmSession *self,
+ */
+ if (run_launcher) {
+ if (is_x11) {
+- program = g_strdup_printf (LIBEXECDIR "/gdm-x-session %s\"dbus-run-session -- %s\"",
++ program = g_strdup_printf (LIBEXECDIR "/gdm-x-session %s\"@dbus@/bin/dbus-run-session --dbus-daemon=@dbus@/bin/dbus-daemon -- %s\"",
+ register_session ? "--register-session " : "",
+ self->selected_program);
+ } else {
+- program = g_strdup_printf (LIBEXECDIR "/gdm-wayland-session %s\"dbus-run-session -- %s\"",
++ program = g_strdup_printf (LIBEXECDIR "/gdm-wayland-session %s\"@dbus@/bin/dbus-run-session --dbus-daemon=@dbus@/bin/dbus-daemon -- %s\"",
+ register_session ? "--register-session " : "",
+ self->selected_program);
+ }
+ } else {
+- program = g_strdup_printf ("dbus-run-session -- %s",
++ program = g_strdup_printf ("@dbus@/bin/dbus-run-session --dbus-daemon=@dbus@/bin/dbus-daemon -- %s",
+ self->selected_program);
+ }
+ }
diff --git a/third_party/nixpkgs/pkgs/desktops/gnome-3/core/gnome-backgrounds/default.nix b/third_party/nixpkgs/pkgs/desktops/gnome-3/core/gnome-backgrounds/default.nix
index e8463c5b70..8df32a1486 100644
--- a/third_party/nixpkgs/pkgs/desktops/gnome-3/core/gnome-backgrounds/default.nix
+++ b/third_party/nixpkgs/pkgs/desktops/gnome-3/core/gnome-backgrounds/default.nix
@@ -2,11 +2,11 @@
stdenv.mkDerivation rec {
pname = "gnome-backgrounds";
- version = "3.36.0";
+ version = "3.38.0";
src = fetchurl {
url = "mirror://gnome/sources/gnome-backgrounds/${stdenv.lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
- sha256 = "02xvfwfi3133mjljl731z2hj9hfmjas3a1jl4fxmy24xrzj83jxq";
+ sha256 = "1qqygm15rcdgm36vz2iy7b9axndjzvpi29lmygyakjc07a3jlwgp";
};
passthru = {
diff --git a/third_party/nixpkgs/pkgs/desktops/gnome-3/core/gnome-bluetooth/default.nix b/third_party/nixpkgs/pkgs/desktops/gnome-3/core/gnome-bluetooth/default.nix
index ed647bb87d..fa5b5abf0f 100644
--- a/third_party/nixpkgs/pkgs/desktops/gnome-3/core/gnome-bluetooth/default.nix
+++ b/third_party/nixpkgs/pkgs/desktops/gnome-3/core/gnome-bluetooth/default.nix
@@ -6,14 +6,14 @@ let
pname = "gnome-bluetooth";
in stdenv.mkDerivation rec {
name = "${pname}-${version}";
- version = "3.34.1";
+ version = "3.34.3";
# TODO: split out "lib"
outputs = [ "out" "dev" "devdoc" "man" ];
src = fetchurl {
url = "mirror://gnome/sources/${pname}/${stdenv.lib.versions.majorMinor version}/${name}.tar.xz";
- sha256 = "11nk8nvz5yrbx7wp75vsiaf4rniv7ik2g3nwmgwx2b42q9v11j9y";
+ sha256 = "08k4jak4r72pvn5kjhm21planyc514j6c7jjj5lv9nmvvlxqw1ha";
};
nativeBuildInputs = [
diff --git a/third_party/nixpkgs/pkgs/desktops/gnome-3/core/gnome-calculator/default.nix b/third_party/nixpkgs/pkgs/desktops/gnome-3/core/gnome-calculator/default.nix
index e14d8d136c..e92333642d 100644
--- a/third_party/nixpkgs/pkgs/desktops/gnome-3/core/gnome-calculator/default.nix
+++ b/third_party/nixpkgs/pkgs/desktops/gnome-3/core/gnome-calculator/default.nix
@@ -4,11 +4,11 @@
stdenv.mkDerivation rec {
pname = "gnome-calculator";
- version = "3.36.0";
+ version = "3.38.1";
src = fetchurl {
url = "mirror://gnome/sources/gnome-calculator/${stdenv.lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
- sha256 = "1cqd4b25qp1i0p04m669jssg1l5sdapc1mniv9jssvw5r7wk1s52";
+ sha256 = "0jajgdl2338nwym980gqw77pcjkprzhnfg8asdjksiksgz8gzzvw";
};
nativeBuildInputs = [
diff --git a/third_party/nixpkgs/pkgs/desktops/gnome-3/core/gnome-contacts/default.nix b/third_party/nixpkgs/pkgs/desktops/gnome-3/core/gnome-contacts/default.nix
index 5372552a72..23e3821ac8 100644
--- a/third_party/nixpkgs/pkgs/desktops/gnome-3/core/gnome-contacts/default.nix
+++ b/third_party/nixpkgs/pkgs/desktops/gnome-3/core/gnome-contacts/default.nix
@@ -3,16 +3,15 @@
, libchamplain, clutter-gtk, geocode-glib, gnome-desktop, gnome-online-accounts
, wrapGAppsHook, folks, libxml2, gnome3
, vala, meson, ninja, libhandy, gsettings-desktop-schemas
-# , telepathy-glib
}:
stdenv.mkDerivation rec {
pname = "gnome-contacts";
- version = "3.36.2";
+ version = "3.38";
src = fetchurl {
url = "mirror://gnome/sources/gnome-contacts/${stdenv.lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
- sha256 = "048l07biy8xrfidfyzrjd5lrnfzqhb767ih2gl7w6c4mmhj4g2dy";
+ sha256 = "f8LuaJwfOcLmN163YLlOFlHOSoKK1AggbToD4TPaGa8=";
};
propagatedUserEnvPkgs = [ evolution-data-server ];
@@ -26,7 +25,6 @@ stdenv.mkDerivation rec {
folks gnome-desktop libhandy
libxml2 gnome-online-accounts cheese
gnome3.adwaita-icon-theme libchamplain clutter-gtk geocode-glib
- # telepathy-glib 3.35.90 fails to build with telepathy
];
mesonFlags = [
diff --git a/third_party/nixpkgs/pkgs/desktops/gnome-3/core/gnome-control-center/default.nix b/third_party/nixpkgs/pkgs/desktops/gnome-3/core/gnome-control-center/default.nix
index ea28d651eb..1300f7a750 100644
--- a/third_party/nixpkgs/pkgs/desktops/gnome-3/core/gnome-control-center/default.nix
+++ b/third_party/nixpkgs/pkgs/desktops/gnome-3/core/gnome-control-center/default.nix
@@ -1,4 +1,6 @@
{ fetchurl
+, fetchFromGitLab
+, fetchpatch
, stdenv
, substituteAll
, accountsservice
@@ -68,12 +70,16 @@
stdenv.mkDerivation rec {
pname = "gnome-control-center";
- version = "3.36.4";
+ version = "3.38.1";
src = fetchurl {
url = "mirror://gnome/sources/${pname}/${stdenv.lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
- sha256 = "0m7pxjgymc7aqqz0vcmlq91nxnwzd1v7v1gdhrfam49krxmk80mc";
+ sha256 = "09i011hf23s2i4wim43vjys7y4y43cxl3kyvrnrwqvqgc5n0144d";
};
+ # See https://mail.gnome.org/archives/distributor-list/2020-September/msg00001.html
+ prePatch = (import ../gvc-with-ucm-prePatch.nix {
+ inherit fetchFromGitLab;
+ });
nativeBuildInputs = [
docbook_xsl
@@ -143,6 +149,17 @@ stdenv.mkDerivation rec {
inherit glibc libgnomekbd tzdata;
inherit cups networkmanagerapplet;
})
+
+ # Fix double free when leaving user accounts panel.
+ # https://gitlab.gnome.org/GNOME/gnome-control-center/merge_requests/853
+ (fetchpatch {
+ url = "https://gitlab.gnome.org/GNOME/gnome-control-center/commit/e80b4b5f58f448c5a3d38721f7bba32c413d46e7.patch";
+ sha256 = "GffsSU/uNS0Fg2lXbOuD/BrWBT4D2VKgWNGifG0FBUw=";
+ })
+ (fetchpatch {
+ url = "https://gitlab.gnome.org/GNOME/gnome-control-center/commit/64686cfee330849945f6ff4dcc43393eb1a6e59c.patch";
+ sha256 = "4VJU0q6qOtGzd/hmDncckInfEjCkC8+lXmDgxwc4VJU=";
+ })
];
postPatch = ''
@@ -150,10 +167,6 @@ stdenv.mkDerivation rec {
patchShebangs build-aux/meson/meson_post_install.py
'';
- mesonFlags = [
- "-Dgnome_session_libexecdir=${gnome-session}/libexec"
- ];
-
preFixup = ''
gappsWrapperArgs+=(
--prefix XDG_DATA_DIRS : "${sound-theme-freedesktop}/share"
diff --git a/third_party/nixpkgs/pkgs/desktops/gnome-3/core/gnome-desktop/default.nix b/third_party/nixpkgs/pkgs/desktops/gnome-3/core/gnome-desktop/default.nix
index e558eb66d4..a397ffe86d 100644
--- a/third_party/nixpkgs/pkgs/desktops/gnome-3/core/gnome-desktop/default.nix
+++ b/third_party/nixpkgs/pkgs/desktops/gnome-3/core/gnome-desktop/default.nix
@@ -1,16 +1,16 @@
-{ stdenv, fetchurl, substituteAll, pkgconfig, libxslt, ninja, libX11, gnome3, gtk3, glib
+{ stdenv, fetchurl, substituteAll, pkgconfig, libxslt, ninja, gnome3, gtk3, glib
, gettext, libxml2, xkeyboard_config, isocodes, meson, wayland
, libseccomp, systemd, bubblewrap, gobject-introspection, gtk-doc, docbook_xsl, gsettings-desktop-schemas }:
stdenv.mkDerivation rec {
pname = "gnome-desktop";
- version = "3.36.5";
+ version = "3.38.1";
outputs = [ "out" "dev" "devdoc" ];
src = fetchurl {
url = "mirror://gnome/sources/gnome-desktop/${stdenv.lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
- sha256 = "0lxpgb199hn37vq822qg9g43pwixbki3x5lkazqa77qhjhlj98gf";
+ sha256 = "1q1vri9vsrdwhhl26dk1f79a3dhwfn9dhbaiczli826nzq9kb40p";
};
nativeBuildInputs = [
@@ -18,7 +18,7 @@ stdenv.mkDerivation rec {
gtk-doc docbook_xsl glib
];
buildInputs = [
- libX11 bubblewrap xkeyboard_config isocodes wayland
+ bubblewrap xkeyboard_config isocodes wayland
gtk3 glib libseccomp systemd
];
diff --git a/third_party/nixpkgs/pkgs/desktops/gnome-3/core/gnome-disk-utility/default.nix b/third_party/nixpkgs/pkgs/desktops/gnome-3/core/gnome-disk-utility/default.nix
index 40085e501b..444fcfc4f6 100644
--- a/third_party/nixpkgs/pkgs/desktops/gnome-3/core/gnome-disk-utility/default.nix
+++ b/third_party/nixpkgs/pkgs/desktops/gnome-3/core/gnome-disk-utility/default.nix
@@ -5,11 +5,11 @@
stdenv.mkDerivation rec {
pname = "gnome-disk-utility";
- version = "3.36.3";
+ version = "3.38.0";
src = fetchurl {
url = "mirror://gnome/sources/gnome-disk-utility/${stdenv.lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
- sha256 = "0yhnjmjzkixj29vcw6rzaijpg4mlwm2k1kqp4g3hn1xb6qzks0yx";
+ sha256 = "08sj1csd1jsmph2lyw2lpj7jh40236alz56pmf315hwyimkcwd3p";
};
nativeBuildInputs = [
diff --git a/third_party/nixpkgs/pkgs/desktops/gnome-3/core/gnome-initial-setup/fix-paths.patch b/third_party/nixpkgs/pkgs/desktops/gnome-3/core/gnome-initial-setup/0001-fix-paths.patch
similarity index 66%
rename from third_party/nixpkgs/pkgs/desktops/gnome-3/core/gnome-initial-setup/fix-paths.patch
rename to third_party/nixpkgs/pkgs/desktops/gnome-3/core/gnome-initial-setup/0001-fix-paths.patch
index 94e14f688b..d4065c1449 100644
--- a/third_party/nixpkgs/pkgs/desktops/gnome-3/core/gnome-initial-setup/fix-paths.patch
+++ b/third_party/nixpkgs/pkgs/desktops/gnome-3/core/gnome-initial-setup/0001-fix-paths.patch
@@ -1,25 +1,35 @@
+From 1ae0eca39ba6af27f37e2fe81395b91a2761a408 Mon Sep 17 00:00:00 2001
+Message-Id: <1ae0eca39ba6af27f37e2fe81395b91a2761a408.1600627676.git-series.worldofpeace@protonmail.ch>
+From: WORLDofPEACE
+Date: Sun, 20 Sep 2020 14:46:59 -0400
+Subject: [PATCH] fix paths
+
+---
+ data/gnome-welcome-tour | 4 ++--
+ gnome-initial-setup/pages/keyboard/cc-input-chooser.c | 6 +++---
+ gnome-initial-setup/pages/timezone/tz.h | 4 ++--
+ 3 files changed, 7 insertions(+), 7 deletions(-)
+
diff --git a/data/gnome-welcome-tour b/data/gnome-welcome-tour
-index c479296..3dd629c 100755
+index 51c9b59..68ab0c4 100755
--- a/data/gnome-welcome-tour
+++ b/data/gnome-welcome-tour
-@@ -3,7 +3,7 @@
+@@ -3,11 +3,11 @@
cfgdir=${XDG_CONFIG_DIR:-$HOME/.config}
- # Don't do anything if yelp isn't installed
--yelp_path=$(which yelp 2>/dev/null)
-+yelp_path=@yelp@
- if test -z "${yelp_path}"; then
+ # Don't do anything if gnome-tour isn't installed
+-gnome_tour_path=$(which gnome-tour 2>/dev/null)
++gnome_tour_path="@gnome_tour@"
+ if test -z "${gnome_tour_path}"; then
rm -f $cfgdir/run-welcome-tour
exit
-@@ -17,5 +17,5 @@ geometry=(1024, 709)
- EOF
fi
--yelp help:gnome-help/getting-started
-+$yelp_path help:gnome-help/getting-started
+-gnome-tour
++@gnome_tour@
rm -f $cfgdir/run-welcome-tour
diff --git a/gnome-initial-setup/pages/keyboard/cc-input-chooser.c b/gnome-initial-setup/pages/keyboard/cc-input-chooser.c
-index 1c34ef7..a1e7f93 100644
+index 196abf6..613d0e5 100644
--- a/gnome-initial-setup/pages/keyboard/cc-input-chooser.c
+++ b/gnome-initial-setup/pages/keyboard/cc-input-chooser.c
@@ -177,9 +177,9 @@ preview_cb (GtkLabel *label,
@@ -34,7 +44,7 @@ index 1c34ef7..a1e7f93 100644
g_spawn_command_line_async (commandline, NULL);
g_free (commandline);
-@@ -829,7 +829,7 @@ cc_input_chooser_class_init (CcInputChooserClass *klass)
+@@ -831,7 +831,7 @@ cc_input_chooser_class_init (CcInputChooserClass *klass)
g_param_spec_string ("showing-extra", "", "", "",
G_PARAM_READABLE | G_PARAM_STATIC_STRINGS);
@@ -44,7 +54,7 @@ index 1c34ef7..a1e7f93 100644
G_TYPE_FROM_CLASS (object_class),
G_SIGNAL_RUN_FIRST,
diff --git a/gnome-initial-setup/pages/timezone/tz.h b/gnome-initial-setup/pages/timezone/tz.h
-index 93905b3..e7ee785 100644
+index a2376f8..5cb7bc9 100644
--- a/gnome-initial-setup/pages/timezone/tz.h
+++ b/gnome-initial-setup/pages/timezone/tz.h
@@ -4,7 +4,7 @@
@@ -57,7 +67,7 @@ index 93905b3..e7ee785 100644
*
* This program is free software; you can redistribute it and/or modify
@@ -28,7 +28,7 @@
- #include
+ G_BEGIN_DECLS
#ifndef __sun
-# define TZ_DATA_FILE "/usr/share/zoneinfo/zone.tab"
@@ -65,3 +75,7 @@ index 93905b3..e7ee785 100644
#else
# define TZ_DATA_FILE "/usr/share/lib/zoneinfo/tab/zone_sun.tab"
#endif
+
+base-commit: 5132e206a6bf81964450561d68473ac015760455
+--
+git-series 0.9.1
diff --git a/third_party/nixpkgs/pkgs/desktops/gnome-3/core/gnome-initial-setup/default.nix b/third_party/nixpkgs/pkgs/desktops/gnome-3/core/gnome-initial-setup/default.nix
index ff7b1f45e4..b4771641ad 100644
--- a/third_party/nixpkgs/pkgs/desktops/gnome-3/core/gnome-initial-setup/default.nix
+++ b/third_party/nixpkgs/pkgs/desktops/gnome-3/core/gnome-initial-setup/default.nix
@@ -32,15 +32,17 @@
, tzdata
, yelp
, libgnomekbd
+, gsettings-desktop-schemas
+, gnome-tour
}:
stdenv.mkDerivation rec {
pname = "gnome-initial-setup";
- version = "3.36.4";
+ version = "3.38.1";
src = fetchurl {
url = "mirror://gnome/sources/${pname}/${stdenv.lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
- sha256 = "17szzz2a5wpi7kwjnhimiwf8vg0bfliyk3k0adgv1pw2mcfpxp5s";
+ hash = "sha256-5V1PQHOZjg+3s9/MRw4qTH2VCpa+2rFQEbkITryBNnY=";
};
nativeBuildInputs = [
@@ -62,10 +64,12 @@ stdenv.mkDerivation rec {
gnome-desktop
gnome-getting-started-docs
gnome-online-accounts
+ gsettings-desktop-schemas
gtk3
json-glib
krb5
libgweather
+ libnma
libpwquality
librest
libsecret
@@ -73,14 +77,13 @@ stdenv.mkDerivation rec {
pango
polkit
webkitgtk
- libnma
];
patches = [
(substituteAll {
- src = ./fix-paths.patch;
+ src = ./0001-fix-paths.patch;
inherit tzdata libgnomekbd;
- yelp = "${yelp}/bin/yelp"; # gnome-welcome-tour
+ gnome_tour = "${gnome-tour}/bin/gnome-tour";
})
];
diff --git a/third_party/nixpkgs/pkgs/desktops/gnome-3/core/gnome-online-miners/default.nix b/third_party/nixpkgs/pkgs/desktops/gnome-3/core/gnome-online-miners/default.nix
index ede2f27924..9a94045867 100644
--- a/third_party/nixpkgs/pkgs/desktops/gnome-3/core/gnome-online-miners/default.nix
+++ b/third_party/nixpkgs/pkgs/desktops/gnome-3/core/gnome-online-miners/default.nix
@@ -1,6 +1,28 @@
-{ stdenv, fetchurl, pkgconfig, glib, gnome3, libxml2
-, libgdata, grilo, libzapojit, grilo-plugins, gnome-online-accounts, libmediaart
-, tracker, gfbgraph, librest, libsoup, json-glib, gmp, openssl, dleyna-server, wrapGAppsHook }:
+{ stdenv
+, fetchurl
+, fetchpatch
+, autoconf-archive
+, autoreconfHook
+, pkg-config
+, glib
+, gnome3
+, libxml2
+, libgdata
+, grilo
+, libzapojit
+, grilo-plugins
+, gnome-online-accounts
+, libmediaart
+, tracker
+, gfbgraph
+, librest
+, libsoup
+, json-glib
+, gmp
+, openssl
+, dleyna-server
+, wrapGAppsHook
+}:
stdenv.mkDerivation rec {
pname = "gnome-online-miners";
@@ -11,15 +33,70 @@ stdenv.mkDerivation rec {
sha256 = "1n2jz9i8a42zwxx5h8j2gdy6q1vyydh4vl00r0al7w8jzdh24p44";
};
- nativeBuildInputs = [ pkgconfig wrapGAppsHook ];
+ patches = [
+ # Fix use after free
+ # https://gitlab.gnome.org/GNOME/gnome-online-miners/merge_requests/4
+ (fetchpatch {
+ url = "https://gitlab.gnome.org/GNOME/gnome-online-miners/commit/9eb57c6a8cd1a925c508646edae936eee0a8e46b.patch";
+ sha256 = "O1GRnzs33I0mFzrNDFkTGiBKstq5krYg7fwj60367TA=";
+ })
+
+ # Port to Tracker 3
+ # https://gitlab.gnome.org/GNOME/gnome-online-miners/merge_requests/3
+ (fetchpatch {
+ url = "https://gitlab.gnome.org/GNOME/gnome-online-miners/commit/2d3798252807cad9eb061ed2b37e35170c1a1daf.patch";
+ sha256 = "hwrkxroMpTfOwJAPkYQFdDCroZ2qSsvOgDetrJDig20=";
+ })
+ (fetchpatch {
+ url = "https://gitlab.gnome.org/GNOME/gnome-online-miners/commit/1548c0c527f0e4389047448d7d3b6cff55278c8e.patch";
+ sha256 = "U9w81c9Kze7kv5KHeGqvDeSNHzSayVrUG0XYsYMa1sg=";
+ })
+ (fetchpatch {
+ url = "https://gitlab.gnome.org/GNOME/gnome-online-miners/commit/941ebd8890c9ac4f75a1f58ccbea9731f46ad912.patch";
+ sha256 = "JHtDlZ54/BlSiUA3ROHfCTtTKSin3g6JNm8NS6pYML8=";
+ })
+ (fetchpatch {
+ url = "https://gitlab.gnome.org/GNOME/gnome-online-miners/commit/d1681a64bc3f65894af2549e3ba2bffbaf6f539a.patch";
+ sha256 = "9ZEatz5I81UAnjS1qCGWYDQQOxg/qp9Tg3xG/a+3goc=";
+ })
+ (fetchpatch {
+ url = "https://gitlab.gnome.org/GNOME/gnome-online-miners/commit/3d2af8785c84d6e50d8a8e6a2569a4b709184e94.patch";
+ sha256 = "7bdUE2k6g3Z8sdGYEb6pUm1/wbKDe4BHbylXUzfuTG0=";
+ })
+ ];
+
+ nativeBuildInputs = [
+ # patch changes configure.ac
+ autoconf-archive
+ autoreconfHook
+
+ pkg-config
+ wrapGAppsHook
+ ];
+
buildInputs = [
- glib libgdata libxml2 libsoup gmp openssl
- grilo libzapojit grilo-plugins
- gnome-online-accounts libmediaart
- tracker gfbgraph json-glib librest
+ glib
+ libgdata
+ libxml2
+ libsoup
+ gmp
+ openssl
+ grilo
+ libzapojit
+ grilo-plugins
+ gnome-online-accounts
+ libmediaart
+ tracker
+ gfbgraph
+ json-glib
+ librest
dleyna-server
];
+ NIX_CFLAGS_COMPILE = [
+ "-Wno-error=format-security" # https://gitlab.gnome.org/GNOME/gnome-online-miners/merge_requests/3/diffs#note_942747
+ ];
+
enableParallelBuilding = true;
passthru = {
@@ -33,7 +110,7 @@ stdenv.mkDerivation rec {
homepage = "https://wiki.gnome.org/Projects/GnomeOnlineMiners";
description = "A set of crawlers that go through your online content and index them locally in Tracker";
maintainers = teams.gnome.members;
- license = licenses.gpl2;
+ license = licenses.gpl2Plus;
platforms = platforms.linux;
};
}
diff --git a/third_party/nixpkgs/pkgs/desktops/gnome-3/core/gnome-remote-desktop/default.nix b/third_party/nixpkgs/pkgs/desktops/gnome-3/core/gnome-remote-desktop/default.nix
index a77aee4b89..87c0d1efc8 100644
--- a/third_party/nixpkgs/pkgs/desktops/gnome-3/core/gnome-remote-desktop/default.nix
+++ b/third_party/nixpkgs/pkgs/desktops/gnome-3/core/gnome-remote-desktop/default.nix
@@ -1,23 +1,48 @@
-{ stdenv, fetchFromGitLab, meson, ninja, pkgconfig, python3, wrapGAppsHook
-, glib, pipewire, systemd, libvncserver, libsecret, libnotify, gdk-pixbuf }:
+{ stdenv
+, fetchurl
+, cairo
+, meson
+, ninja
+, pkgconfig
+, python3
+, wrapGAppsHook
+, glib
+, pipewire
+, systemd
+, libvncserver
+, libsecret
+, libnotify
+, gdk-pixbuf
+, freerdp
+}:
stdenv.mkDerivation rec {
pname = "gnome-remote-desktop";
- version = "0.1.8";
+ version = "0.1.9";
- src = fetchFromGitLab {
- domain = "gitlab.gnome.org";
- owner = "jadahl";
- repo = "gnome-remote-desktop";
- rev = version;
- sha256 = "1wcvk0w4p0wnqnrjkbwvqcby9dd4nj0cm9cz0fqna31qfjrvb913";
+ src = fetchurl {
+ url = "mirror://gnome/sources/${pname}/${stdenv.lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
+ hash = "sha256-8iZtp4tBRT7NNRKuzwop3rcMvq16RG/I2sAlEIsJ0M8=";
};
- nativeBuildInputs = [ meson ninja pkgconfig python3 wrapGAppsHook ];
+ nativeBuildInputs = [
+ meson
+ ninja
+ pkgconfig
+ python3
+ wrapGAppsHook
+ ];
buildInputs = [
- glib pipewire systemd libvncserver libsecret libnotify
+ cairo
+ freerdp
gdk-pixbuf # For libnotify
+ glib
+ libnotify
+ libsecret
+ libvncserver
+ pipewire
+ systemd
];
postPatch = ''
diff --git a/third_party/nixpkgs/pkgs/desktops/gnome-3/core/gnome-screenshot/default.nix b/third_party/nixpkgs/pkgs/desktops/gnome-3/core/gnome-screenshot/default.nix
index 2eacfc2de7..05bb189c0e 100644
--- a/third_party/nixpkgs/pkgs/desktops/gnome-3/core/gnome-screenshot/default.nix
+++ b/third_party/nixpkgs/pkgs/desktops/gnome-3/core/gnome-screenshot/default.nix
@@ -1,16 +1,16 @@
-{ stdenv, gettext, libxml2, fetchurl, pkgconfig, libcanberra-gtk3
+{ stdenv, gettext, libxml2, libhandy, fetchurl, pkgconfig, libcanberra-gtk3
, gtk3, glib, meson, ninja, python3, wrapGAppsHook, appstream-glib, desktop-file-utils
, gnome3, gsettings-desktop-schemas }:
let
pname = "gnome-screenshot";
- version = "3.36.0";
+ version = "3.38.0";
in stdenv.mkDerivation rec {
name = "${pname}-${version}";
src = fetchurl {
url = "mirror://gnome/sources/${pname}/${stdenv.lib.versions.majorMinor version}/${name}.tar.xz";
- sha256 = "0rhj6fkpxfm26jv3vsn7yb2ybkc2k86ggy23nxa945q74y4msj9k";
+ sha256 = "1h4zsaybjrlkfcrvriyybg4gfr7v9d1ndh2p516k94ad2gfx6mp5";
};
doCheck = true;
@@ -22,7 +22,7 @@ in stdenv.mkDerivation rec {
nativeBuildInputs = [ meson ninja pkgconfig gettext appstream-glib libxml2 desktop-file-utils python3 wrapGAppsHook ];
buildInputs = [
- gtk3 glib libcanberra-gtk3 gnome3.adwaita-icon-theme
+ gtk3 glib libcanberra-gtk3 libhandy gnome3.adwaita-icon-theme
gsettings-desktop-schemas
];
diff --git a/third_party/nixpkgs/pkgs/desktops/gnome-3/core/gnome-session/ctl.nix b/third_party/nixpkgs/pkgs/desktops/gnome-3/core/gnome-session/ctl.nix
new file mode 100644
index 0000000000..6bc18d5379
--- /dev/null
+++ b/third_party/nixpkgs/pkgs/desktops/gnome-3/core/gnome-session/ctl.nix
@@ -0,0 +1,41 @@
+{ stdenv
+, fetchFromGitHub
+, meson
+, ninja
+, pkg-config
+, glib
+, systemd
+, wrapGAppsHook
+}:
+
+stdenv.mkDerivation rec {
+ pname = "gnome-session-ctl";
+ version = "3.38.0";
+
+ src = fetchFromGitHub {
+ owner = "nix-community";
+ repo = pname;
+ rev = "c20907fea27fa96568b8375a6756c40d0bfb9e40"; # main
+ hash = "sha256-y9/yOH6N8wf93+gPqnqzRzV/lPXYD0M6v7dsLFF8lWo=";
+ };
+
+ nativeBuildInputs = [
+ meson
+ ninja
+ pkg-config
+ wrapGAppsHook
+ ];
+
+ buildInputs = [
+ glib
+ systemd
+ ];
+
+ meta = with stdenv.lib; {
+ description = "gnome-session-ctl extracted from gnome-session for nixpkgs";
+ homepage = "https://github.com/nix-community/gnome-session-ctl";
+ license = licenses.gpl2Plus;
+ maintainers = teams.gnome.members;
+ platforms = platforms.linux;
+ };
+}
diff --git a/third_party/nixpkgs/pkgs/desktops/gnome-3/core/gnome-session/default.nix b/third_party/nixpkgs/pkgs/desktops/gnome-3/core/gnome-session/default.nix
index b25688ea5a..4684f3ebee 100644
--- a/third_party/nixpkgs/pkgs/desktops/gnome-3/core/gnome-session/default.nix
+++ b/third_party/nixpkgs/pkgs/desktops/gnome-3/core/gnome-session/default.nix
@@ -1,16 +1,16 @@
{ fetchurl, stdenv, substituteAll, meson, ninja, pkgconfig, gnome3, glib, gtk3, gsettings-desktop-schemas
, gnome-desktop, dbus, json-glib, libICE, xmlto, docbook_xsl, docbook_xml_dtd_412, python3
-, libxslt, gettext, makeWrapper, systemd, xorg, epoxy, gnugrep, bash }:
+, libxslt, gettext, makeWrapper, systemd, xorg, epoxy, gnugrep, bash, gnome-session-ctl }:
stdenv.mkDerivation rec {
pname = "gnome-session";
- version = "3.36.0";
+ version = "3.38.0";
outputs = ["out" "sessions"];
src = fetchurl {
url = "mirror://gnome/sources/gnome-session/${stdenv.lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
- sha256 = "0ymvf1bap35348rpjqp63qwnwnnawdwi4snch95zc4n832w3hjym";
+ sha256 = "0rrxjk3vbqy3cdgnl7rw71dvcyrvhwq3m6s53dnkyjxsrnr0xk3v";
};
patches = [
@@ -23,7 +23,7 @@ stdenv.mkDerivation rec {
})
];
- mesonFlags = [ "-Dsystemd=true" ];
+ mesonFlags = [ "-Dsystemd=true" "-Dsystemd_session=default" ];
nativeBuildInputs = [
meson ninja pkgconfig gettext makeWrapper
@@ -39,6 +39,14 @@ stdenv.mkDerivation rec {
postPatch = ''
chmod +x meson_post_install.py # patchShebangs requires executable file
patchShebangs meson_post_install.py
+
+ # Use our provided `gnome-session-ctl`
+ original="@libexecdir@/gnome-session-ctl"
+ replacement="${gnome-session-ctl}/libexec/gnome-session-ctl"
+
+ find data/ -type f -name "*.service.in" -exec sed -i \
+ -e s,$original,$replacement,g \
+ {} +
'';
# `bin/gnome-session` will reset the environment when run in wayland, we
@@ -59,6 +67,9 @@ stdenv.mkDerivation rec {
mkdir $sessions
moveToOutput share/wayland-sessions "$sessions"
moveToOutput share/xsessions "$sessions"
+
+ # Our provided one is being used
+ rm -rf $out/libexec/gnome-session-ctl
'';
passthru = {
diff --git a/third_party/nixpkgs/pkgs/desktops/gnome-3/core/gnome-session/fix-paths.patch b/third_party/nixpkgs/pkgs/desktops/gnome-3/core/gnome-session/fix-paths.patch
index 2399c65601..320b3024de 100644
--- a/third_party/nixpkgs/pkgs/desktops/gnome-3/core/gnome-session/fix-paths.patch
+++ b/third_party/nixpkgs/pkgs/desktops/gnome-3/core/gnome-session/fix-paths.patch
@@ -1,6 +1,8 @@
+diff --git a/gnome-session/gnome-session.in b/gnome-session/gnome-session.in
+index ddd1a591..46a3488b 100755
--- a/gnome-session/gnome-session.in
+++ b/gnome-session/gnome-session.in
-@@ -3,11 +3,13 @@
+@@ -3,17 +3,19 @@
if [ "x$XDG_SESSION_TYPE" = "xwayland" ] &&
[ "x$XDG_SESSION_CLASS" != "xgreeter" ] &&
[ -n "$SHELL" ] &&
@@ -12,24 +14,24 @@
+ ! (echo "$SHELL" | @grep@ -q "nologin"); then
if [ "$1" != '-l' ]; then
- exec bash -c "exec -l '$SHELL' -c '$0 -l $*'"
-+ # Make sure the shell actually sets up the environment
++ # Make sure the shell actually sets up the environment.
+ unset __NIXOS_SET_ENVIRONMENT_DONE
+ exec @bash@ -c "exec -l '$SHELL' -c '$0 -l $*'"
else
shift
fi
-@@ -13,7 +13,7 @@
- fi
fi
--SETTING=$(G_MESSAGES_DEBUG= gsettings get org.gnome.system.locale region)
-+SETTING=$(G_MESSAGES_DEBUG= @gsettings@ get org.gnome.system.locale region)
+-SETTING=$(G_MESSAGES_DEBUG='' gsettings get org.gnome.system.locale region)
++SETTING=$(G_MESSAGES_DEBUG='' @gsettings@ get org.gnome.system.locale region)
REGION=${SETTING#\'}
REGION=${REGION%\'}
+diff --git a/gnome-session/main.c b/gnome-session/main.c
+index 84edfbe5..e5285489 100644
--- a/gnome-session/main.c
+++ b/gnome-session/main.c
-@@ -203,7 +203,7 @@
+@@ -215,7 +215,7 @@ require_dbus_session (int argc,
}
new_argv[i + 2] = NULL;
diff --git a/third_party/nixpkgs/pkgs/desktops/gnome-3/core/gnome-settings-daemon/default.nix b/third_party/nixpkgs/pkgs/desktops/gnome-3/core/gnome-settings-daemon/default.nix
index 2ee07fb09a..3c039bc631 100644
--- a/third_party/nixpkgs/pkgs/desktops/gnome-3/core/gnome-settings-daemon/default.nix
+++ b/third_party/nixpkgs/pkgs/desktops/gnome-3/core/gnome-settings-daemon/default.nix
@@ -1,4 +1,5 @@
{ stdenv
+, fetchpatch
, substituteAll
, fetchurl
, meson
@@ -36,18 +37,25 @@
, tzdata
, nss
, gcr
+, gnome-session-ctl
}:
stdenv.mkDerivation rec {
pname = "gnome-settings-daemon";
- version = "3.36.1";
+ version = "3.38.1";
src = fetchurl {
url = "mirror://gnome/sources/gnome-settings-daemon/${stdenv.lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
- sha256 = "0jzf2nznpcrjqq7fjwk66kw8a6x87kgbdjidc2msaqmm379xncry";
+ sha256 = "0r010wzw3dj87mapzvq15zv93i86wg0x0rpii3x2wapq3bcj30g2";
};
patches = [
+ # https://gitlab.gnome.org/GNOME/gnome-settings-daemon/-/merge_requests/202
+ (fetchpatch {
+ url = "https://gitlab.gnome.org/GNOME/gnome-settings-daemon/commit/aae1e774dd9de22fe3520cf9eb2bfbf7216f5eb0.patch";
+ sha256 = "O4m0rOW8Zrgu3Q0p0OA8b951VC0FjYbOUk9MLzB9icI=";
+ })
+
(substituteAll {
src = ./fix-paths.patch;
inherit tzdata;
@@ -95,6 +103,7 @@ stdenv.mkDerivation rec {
mesonFlags = [
"-Dudev_dir=${placeholder "out"}/lib/udev"
+ "-Dgnome_session_ctl_path=${gnome-session-ctl}/libexec/gnome-session-ctl"
];
# Default for release buildtype but passed manually because
diff --git a/third_party/nixpkgs/pkgs/desktops/gnome-3/core/gnome-shell-extensions/default.nix b/third_party/nixpkgs/pkgs/desktops/gnome-3/core/gnome-shell-extensions/default.nix
index ba1b0faedb..4b4901cab6 100644
--- a/third_party/nixpkgs/pkgs/desktops/gnome-3/core/gnome-shell-extensions/default.nix
+++ b/third_party/nixpkgs/pkgs/desktops/gnome-3/core/gnome-shell-extensions/default.nix
@@ -3,11 +3,11 @@
stdenv.mkDerivation rec {
pname = "gnome-shell-extensions";
- version = "3.36.3";
+ version = "3.38.1";
src = fetchurl {
url = "mirror://gnome/sources/gnome-shell-extensions/${stdenv.lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
- sha256 = "1cg3dqvvxg8zrdqs2rci8sds2hxjahbhm87f0xpy8b3gq56lqrrb";
+ sha256 = "150c0jgjhbb59wf7lzcnp1f22lvrigw95mg5ad3jh15qzwqqd8wx";
};
passthru = {
diff --git a/third_party/nixpkgs/pkgs/desktops/gnome-3/core/gnome-shell/default.nix b/third_party/nixpkgs/pkgs/desktops/gnome-3/core/gnome-shell/default.nix
index 8f2e78c639..3ebf409f03 100644
--- a/third_party/nixpkgs/pkgs/desktops/gnome-3/core/gnome-shell/default.nix
+++ b/third_party/nixpkgs/pkgs/desktops/gnome-3/core/gnome-shell/default.nix
@@ -16,15 +16,12 @@
, docbook-xsl-nons
, at-spi2-core
, libstartup_notification
-, telepathy-glib
-, telepathy-logger
, unzip
, shared-mime-info
, libgweather
, librsvg
, geoclue2
, perl
-, docbook_xml_dtd_412
, docbook_xml_dtd_42
, docbook_xml_dtd_43
, desktop-file-utils
@@ -51,6 +48,7 @@
, gtk3
, sassc
, systemd
+, pipewire
, gst_all_1
, adwaita-icon-theme
, gnome-bluetooth
@@ -67,13 +65,13 @@ let
in
stdenv.mkDerivation rec {
pname = "gnome-shell";
- version = "3.36.5";
+ version = "3.38.1";
outputs = [ "out" "devdoc" ];
src = fetchurl {
- url = "mirror://gnome/sources/${pname}/${stdenv.lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
- sha256 = "1hj7gmjmy92xndlgw7pzk5m6j2fbzcgfd1pxc32k38gml8qg19d4";
+ url = "mirror://gnome/sources/gnome-shell/${stdenv.lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
+ sha256 = "1d0br74gxwnqbh102yjkszkc6fc4yd6p5lcs6bxcpi33chly72dp";
};
patches = [
@@ -84,13 +82,6 @@ stdenv.mkDerivation rec {
gsettings = "${glib.bin}/bin/gsettings";
})
- # Install bash-completions to correct prefix.
- # https://gitlab.gnome.org/GNOME/gnome-shell/merge_requests/1194
- (fetchpatch {
- url = "https://gitlab.gnome.org/GNOME/gnome-shell/commit/9f1ad5d86ddbabaa840eb2860279d53f4e635453.patch";
- sha256 = "18amnqw342vllcrjpfcq232z9xr28vgjsf2z8k73xx70nwah7hvz";
- })
-
# Use absolute path for libshew installation to make our patched gobject-introspection
# aware of the location to hardcode in the generated GIR file.
./shew-gir-path.patch
@@ -113,7 +104,7 @@ stdenv.mkDerivation rec {
pkg-config
gettext
docbook-xsl-nons
- docbook_xml_dtd_412
+ # Switch to 4.5 in the 40.
docbook_xml_dtd_42
docbook_xml_dtd_43
gtk-doc
@@ -139,7 +130,6 @@ stdenv.mkDerivation rec {
librsvg
networkmanager
libstartup_notification
- telepathy-glib
gjs
mutter
libpulseaudio
@@ -155,11 +145,11 @@ stdenv.mkDerivation rec {
upower
ibus
gnome-desktop
- telepathy-logger
gnome-settings-daemon
gobject-introspection
# recording
+ pipewire
gst_all_1.gstreamer
gst_all_1.gst-plugins-base
gst_all_1.gst-plugins-good
@@ -197,7 +187,7 @@ stdenv.mkDerivation rec {
postFixup = ''
# The services need typelibs.
- for svc in org.gnome.Shell.Extensions org.gnome.Shell.Notifications; do
+ for svc in org.gnome.Shell.Extensions org.gnome.Shell.Notifications org.gnome.Shell.Screencast; do
wrapGApp $out/share/gnome-shell/$svc
done
'';
diff --git a/third_party/nixpkgs/pkgs/desktops/gnome-3/core/gnome-shell/fix-paths.patch b/third_party/nixpkgs/pkgs/desktops/gnome-3/core/gnome-shell/fix-paths.patch
index 7b93475619..e17a608a2d 100644
--- a/third_party/nixpkgs/pkgs/desktops/gnome-3/core/gnome-shell/fix-paths.patch
+++ b/third_party/nixpkgs/pkgs/desktops/gnome-3/core/gnome-shell/fix-paths.patch
@@ -19,8 +19,8 @@
+ Util.spawn(['@libgnomekbd@/bin/gkbd-keyboard-display', '-l', description]);
}
});
---- a/data/gnome-shell-disable-extensions.service
-+++ b/data/gnome-shell-disable-extensions.service
+--- a/data/org.gnome.Shell-disable-extensions.service
++++ b/data/org.gnome.Shell-disable-extensions.service
@@ -10,5 +10,5 @@ Requisite=gnome-session-stable.timer
[Service]
Type=simple
diff --git a/third_party/nixpkgs/pkgs/desktops/gnome-3/core/gnome-software/default.nix b/third_party/nixpkgs/pkgs/desktops/gnome-3/core/gnome-software/default.nix
index 9f51227f23..71744ab84a 100644
--- a/third_party/nixpkgs/pkgs/desktops/gnome-3/core/gnome-software/default.nix
+++ b/third_party/nixpkgs/pkgs/desktops/gnome-3/core/gnome-software/default.nix
@@ -1,7 +1,8 @@
{ stdenv, fetchurl, substituteAll, pkgconfig, meson, ninja, gettext, gnome3, wrapGAppsHook, packagekit, ostree
, glib, appstream-glib, libsoup, polkit, isocodes, gspell, libxslt, gobject-introspection, flatpak, fwupd
, gtk3, gsettings-desktop-schemas, gnome-desktop, libxmlb, gnome-online-accounts
-, json-glib, libsecret, valgrind-light, docbook_xsl, docbook_xml_dtd_42, docbook_xml_dtd_43, gtk-doc, desktop-file-utils }:
+, json-glib, libsecret, valgrind-light, docbook_xsl, docbook_xml_dtd_42, docbook_xml_dtd_43, gtk-doc, desktop-file-utils
+, libsysprof-capture }:
let
@@ -11,11 +12,11 @@ in
stdenv.mkDerivation rec {
pname = "gnome-software";
- version = "3.36.1";
+ version = "3.38.0";
src = fetchurl {
url = "mirror://gnome/sources/gnome-software/${stdenv.lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
- sha256 = "0vkgpy2afb33rrk94zqlm2q728xhzjj8s24n9wh9ylw00z3nckad";
+ sha256 = "0rjm486vgn6gi9mv1rqdcvr9cilmw6in4r6djqkxbxqll89cp2l7";
};
patches = [
@@ -34,7 +35,7 @@ stdenv.mkDerivation rec {
gtk3 glib packagekit appstream-glib libsoup
gsettings-desktop-schemas gnome-desktop
gspell json-glib libsecret ostree
- polkit flatpak libxmlb gnome-online-accounts
+ polkit flatpak libxmlb gnome-online-accounts libsysprof-capture
] ++ stdenv.lib.optionals withFwupd [
fwupd
];
diff --git a/third_party/nixpkgs/pkgs/desktops/gnome-3/core/gnome-system-monitor/default.nix b/third_party/nixpkgs/pkgs/desktops/gnome-3/core/gnome-system-monitor/default.nix
index 2dd4ae9e7f..d9e652de5f 100644
--- a/third_party/nixpkgs/pkgs/desktops/gnome-3/core/gnome-system-monitor/default.nix
+++ b/third_party/nixpkgs/pkgs/desktops/gnome-3/core/gnome-system-monitor/default.nix
@@ -4,11 +4,11 @@
stdenv.mkDerivation rec {
pname = "gnome-system-monitor";
- version = "3.36.1";
+ version = "3.38.0";
src = fetchurl {
url = "mirror://gnome/sources/gnome-system-monitor/${stdenv.lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
- sha256 = "18dwwwmw4m2kzvfmxyaxmnm66d1plwvh6c6naznb0xac1ymlfsw6";
+ sha256 = "1x5gd30g87im7fnqj63njlac69zywfd1r0vgsxkjag2hsns7mgvk";
};
doCheck = true;
diff --git a/third_party/nixpkgs/pkgs/desktops/gnome-3/core/gnome-terminal/default.nix b/third_party/nixpkgs/pkgs/desktops/gnome-3/core/gnome-terminal/default.nix
index 821d5707c7..8c8cc88301 100644
--- a/third_party/nixpkgs/pkgs/desktops/gnome-3/core/gnome-terminal/default.nix
+++ b/third_party/nixpkgs/pkgs/desktops/gnome-3/core/gnome-terminal/default.nix
@@ -1,14 +1,15 @@
{ stdenv, fetchurl, pkgconfig, libxml2, gnome3, dconf, nautilus
, gtk3, gsettings-desktop-schemas, vte, gettext, which, libuuid, vala
-, desktop-file-utils, itstool, wrapGAppsHook, glib, pcre2 }:
+, desktop-file-utils, itstool, wrapGAppsHook, glib, pcre2
+, libxslt, docbook-xsl-nons }:
stdenv.mkDerivation rec {
pname = "gnome-terminal";
- version = "3.36.2";
+ version = "3.38.1";
src = fetchurl {
url = "mirror://gnome/sources/gnome-terminal/${stdenv.lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
- sha256 = "0inzmkmxv8xw4px2zjfw7236d08yjcv7znxcjki6dh4pvjivdla1";
+ sha256 = "1lgkvla0fadg76j898p2x2fipqf8kkqbbmmsfkfpz11q9y1d966r";
};
buildInputs = [
@@ -18,7 +19,7 @@ stdenv.mkDerivation rec {
];
nativeBuildInputs = [
- pkgconfig gettext itstool which libxml2
+ pkgconfig gettext itstool which libxml2 libxslt docbook-xsl-nons
vala desktop-file-utils wrapGAppsHook pcre2
];
diff --git a/third_party/nixpkgs/pkgs/desktops/gnome-3/core/gnome-tour/default.nix b/third_party/nixpkgs/pkgs/desktops/gnome-3/core/gnome-tour/default.nix
index 719e97647f..ec2007e0ee 100644
--- a/third_party/nixpkgs/pkgs/desktops/gnome-3/core/gnome-tour/default.nix
+++ b/third_party/nixpkgs/pkgs/desktops/gnome-3/core/gnome-tour/default.nix
@@ -3,7 +3,7 @@
, gettext
, meson
, ninja
-, fetchFromGitLab
+, fetchurl
, pkg-config
, gtk3
, glib
@@ -13,34 +13,26 @@
, wrapGAppsHook
, python3
, gnome3
-, config
+, libhandy
+, librsvg
}:
rustPlatform.buildRustPackage rec {
pname = "gnome-tour";
- version = "0.0.1";
+ version = "3.38.0";
- # We don't use the uploaded tar.xz because it comes pre-vendored
- src = fetchFromGitLab {
- domain = "gitlab.gnome.org";
- owner = "GNOME";
- repo = "gnome-tour";
- rev = version;
- sha256 = "0lbkspnlziq3z177071w3jpghmdwflzra1krdwchzmkfmrhy50ch";
+ src = fetchurl {
+ url = "mirror://gnome/sources/${pname}/${stdenv.lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
+ hash = "sha256-hV/C/Lyz6e9zhe3FRw4Sox5gMqThDP57wVCTgcekjng=";
};
- cargoSha256 = "0k1wp9wswr57fv2d9bysxn97fchd4vz29n5r8gfyp0gcm8rclmij";
-
- mesonFlags = [
- "-Ddistro_name=NixOS"
- "-Ddistro_icon_name=nix-snowflake"
- "-Ddistro_version=20.09"
- ];
+ cargoVendorDir = "vendor";
nativeBuildInputs = [
appstream-glib
desktop-file-utils
gettext
+ glib # glib-compile-resources
meson
ninja
pkg-config
@@ -52,6 +44,8 @@ rustPlatform.buildRustPackage rec {
gdk-pixbuf
glib
gtk3
+ libhandy
+ librsvg
];
# Don't use buildRustPackage phases, only use it for rust deps setup
@@ -65,11 +59,11 @@ rustPlatform.buildRustPackage rec {
patchShebangs build-aux/meson_post_install.py
'';
- # passthru = {
- # updateScript = gnome3.updateScript {
- # packageName = pname;
- # };
- # };
+ passthru = {
+ updateScript = gnome3.updateScript {
+ packageName = pname;
+ };
+ };
meta = with stdenv.lib; {
homepage = "https://gitlab.gnome.org/GNOME/gnome-tour";
diff --git a/third_party/nixpkgs/pkgs/desktops/gnome-3/core/gvc-with-ucm-prePatch.nix b/third_party/nixpkgs/pkgs/desktops/gnome-3/core/gvc-with-ucm-prePatch.nix
new file mode 100644
index 0000000000..b2db2baf02
--- /dev/null
+++ b/third_party/nixpkgs/pkgs/desktops/gnome-3/core/gvc-with-ucm-prePatch.nix
@@ -0,0 +1,17 @@
+{ fetchFromGitLab }:
+
+let
+ # We need a gvc different then that which is shipped in the source tarball of
+ # whatever package that imports this file
+ gvc-src-with-ucm = fetchFromGitLab {
+ domain = "gitlab.gnome.org";
+ owner = "GNOME";
+ repo = "libgnome-volume-control";
+ rev = "7a621180b46421e356b33972e3446775a504139c";
+ sha256 = "07rkgh9f7qcmlpy6jqh944axzh3z38f47g48ii842f2i3a1mrbw9";
+ };
+in
+''
+ rm -r ./subprojects/gvc
+ cp -r ${gvc-src-with-ucm} ./subprojects/gvc
+''
diff --git a/third_party/nixpkgs/pkgs/desktops/gnome-3/core/mutter/3.34/0001-EGL-Include-EGL-eglmesaext.h.patch b/third_party/nixpkgs/pkgs/desktops/gnome-3/core/mutter/3.34/0001-EGL-Include-EGL-eglmesaext.h.patch
new file mode 100644
index 0000000000..3691c034d1
--- /dev/null
+++ b/third_party/nixpkgs/pkgs/desktops/gnome-3/core/mutter/3.34/0001-EGL-Include-EGL-eglmesaext.h.patch
@@ -0,0 +1,74 @@
+From 7b94f980f2a099dd4b19b60c357cfcf5ff7ada6d Mon Sep 17 00:00:00 2001
+Message-Id: <7b94f980f2a099dd4b19b60c357cfcf5ff7ada6d.1601082838.git-series.worldofpeace@protonmail.ch>
+From: WORLDofPEACE
+Date: Sun, 20 Oct 2019 12:04:31 +0200
+Subject: [PATCH 1/7] EGL: Include EGL/eglmesaext.h
+
+From: Jan Alexander Steffens (heftig)
+
+The eglext.h shipped by libglvnd does not include the Mesa extensions,
+unlike the header shipped in Mesa.
+
+Fixes https://gitlab.gnome.org/GNOME/mutter/issues/876
+
+(cherry picked from commit a444a4c5f58ea516ad3cd9d6ddc0056c3ca9bc90)
+---
+ cogl/cogl/meson.build | 2 +-
+ src/backends/meta-egl-ext.h | 1 +
+ src/backends/meta-egl.c | 1 +
+ src/backends/meta-egl.h | 1 +
+ 4 files changed, 4 insertions(+), 1 deletion(-)
+
+diff --git a/cogl/cogl/meson.build b/cogl/cogl/meson.build
+index 1057ef9..9a64294 100644
+--- a/cogl/cogl/meson.build
++++ b/cogl/cogl/meson.build
+@@ -48,7 +48,7 @@ cogl_gl_header_h = configure_file(
+ built_headers += [cogl_gl_header_h]
+
+ if have_egl
+- cogl_egl_includes_string = '#include \n#include '
++ cogl_egl_includes_string = '#include \n#include \n#include '
+ else
+ cogl_egl_includes_string = ''
+ endif
+diff --git a/src/backends/meta-egl-ext.h b/src/backends/meta-egl-ext.h
+index 8705e7d..db0b74f 100644
+--- a/src/backends/meta-egl-ext.h
++++ b/src/backends/meta-egl-ext.h
+@@ -29,6 +29,7 @@
+
+ #include
+ #include
++#include
+
+ /*
+ * This is a little different to the tests shipped with EGL implementations,
+diff --git a/src/backends/meta-egl.c b/src/backends/meta-egl.c
+index 6554be9..fdeff4f 100644
+--- a/src/backends/meta-egl.c
++++ b/src/backends/meta-egl.c
+@@ -27,6 +27,7 @@
+
+ #include
+ #include
++#include
+ #include
+ #include
+ #include
+diff --git a/src/backends/meta-egl.h b/src/backends/meta-egl.h
+index f2a8164..4591e7d 100644
+--- a/src/backends/meta-egl.h
++++ b/src/backends/meta-egl.h
+@@ -28,6 +28,7 @@
+
+ #include
+ #include
++#include
+ #include
+
+ #define META_EGL_ERROR meta_egl_error_quark ()
+
+base-commit: 48ffbb582404c1d52196eb6cc5f082c31ca4910c
+--
+git-series 0.9.1
diff --git a/third_party/nixpkgs/pkgs/desktops/gnome-3/core/mutter/3.34/drop-inheritable.patch b/third_party/nixpkgs/pkgs/desktops/gnome-3/core/mutter/3.34/0002-drop-inheritable.patch
similarity index 82%
rename from third_party/nixpkgs/pkgs/desktops/gnome-3/core/mutter/3.34/drop-inheritable.patch
rename to third_party/nixpkgs/pkgs/desktops/gnome-3/core/mutter/3.34/0002-drop-inheritable.patch
index 0f60be3a12..28f89ac7c0 100644
--- a/third_party/nixpkgs/pkgs/desktops/gnome-3/core/mutter/3.34/drop-inheritable.patch
+++ b/third_party/nixpkgs/pkgs/desktops/gnome-3/core/mutter/3.34/0002-drop-inheritable.patch
@@ -1,36 +1,40 @@
-From e9c772e265b2293af031c79f4bbc99b5847dfe3c Mon Sep 17 00:00:00 2001
-From: =?UTF-8?q?Tor=20Hedin=20Br=C3=B8nner?=
+From 14cee101882e65a57dcd66ea0f8399477b23ce7e Mon Sep 17 00:00:00 2001
+Message-Id: <14cee101882e65a57dcd66ea0f8399477b23ce7e.1601082838.git-series.worldofpeace@protonmail.ch>
+In-Reply-To: <7b94f980f2a099dd4b19b60c357cfcf5ff7ada6d.1601082838.git-series.worldofpeace@protonmail.ch>
+References: <7b94f980f2a099dd4b19b60c357cfcf5ff7ada6d.1601082838.git-series.worldofpeace@protonmail.ch>
+From: WORLDofPEACE
Date: Sat, 19 Oct 2019 13:26:05 +0200
-Subject: [PATCH] drop inheritable
+Subject: [PATCH 2/7] drop inheritable
+
+From: Tor Hedin Brønner
Adapted from https://gitlab.gnome.org/GNOME/mutter/commit/c53c47ae123b03cc66044d2b846342123ecb3a01
We only want to drop inheritable though, to prevent the ambient set leaking further than gnome-shell.
-
---
config.h.meson | 3 +++
meson.build | 5 +++++
meson_options.txt | 6 ++++++
- src/core/main.c | 11 +++++++++++
+ src/core/main.c | 10 ++++++++++
src/meson.build | 1 +
- 5 files changed, 26 insertions(+)
+ 5 files changed, 25 insertions(+)
diff --git a/config.h.meson b/config.h.meson
-index 0bab71848..202fb7ed1 100644
+index 0bab718..202fb7e 100644
--- a/config.h.meson
+++ b/config.h.meson
@@ -58,6 +58,9 @@
/* Xwayland applications allowed to issue keyboard grabs */
#mesondefine XWAYLAND_GRAB_DEFAULT_ACCESS_RULES
-
+
+/* Defined if libcap-ng is available */
+#mesondefine HAVE_LIBCAPNG
+
/* XKB base prefix */
#mesondefine XKB_BASE
-
+
diff --git a/meson.build b/meson.build
-index 3322bd3b1..01c8020fa 100644
+index 29d495b..86970df 100644
--- a/meson.build
+++ b/meson.build
@@ -35,6 +35,7 @@ libstartup_notification_req = '>= 0.7'
@@ -38,7 +42,7 @@ index 3322bd3b1..01c8020fa 100644
libwacom_req = '>= 0.13'
atk_req = '>= 2.5.3'
+libcapng_req = '>= 0.7.9'
-
+
# optional version requirements
udev_req = '>= 228'
@@ -125,6 +126,7 @@ xau_dep = dependency('xau')
@@ -46,7 +50,7 @@ index 3322bd3b1..01c8020fa 100644
atk_dep = dependency('atk', version: atk_req)
libcanberra_dep = dependency('libcanberra', version: libcanberra_req)
+libcapng_dep = dependency('libcap-ng', required: get_option('libcapng'))
-
+
# For now always require X11 support
have_x11 = true
@@ -256,6 +258,7 @@ have_core_tests = false
@@ -54,7 +58,7 @@ index 3322bd3b1..01c8020fa 100644
have_clutter_tests = false
have_installed_tests = false
+have_libcapng = libcapng_dep.found()
-
+
if have_tests
have_core_tests = get_option('core_tests')
@@ -361,6 +364,7 @@ cdata.set('HAVE_LIBWACOM', have_libwacom)
@@ -63,7 +67,7 @@ index 3322bd3b1..01c8020fa 100644
cdata.set('HAVE_INTROSPECTION', have_introspection)
+cdata.set('HAVE_LIBCAPNG', have_libcapng)
cdata.set('HAVE_PROFILER', have_profiler)
-
+
xkb_base = xkeyboard_config_dep.get_pkgconfig_variable('xkb_base')
@@ -443,6 +447,7 @@ output = [
' Startup notification..... ' + have_startup_notification.to_string(),
@@ -74,7 +78,7 @@ index 3322bd3b1..01c8020fa 100644
' Tests:',
'',
diff --git a/meson_options.txt b/meson_options.txt
-index 73aa7adde..8bfaacd9a 100644
+index 73aa7ad..8bfaacd 100644
--- a/meson_options.txt
+++ b/meson_options.txt
@@ -152,3 +152,9 @@ option('xwayland_grab_default_access_rules',
@@ -88,13 +92,13 @@ index 73aa7adde..8bfaacd9a 100644
+ description: 'Enable libcap-ng support'
+)
diff --git a/src/core/main.c b/src/core/main.c
-index 7f4f666d2..b27968f13 100644
+index 3935f35..ecf3cb2 100644
--- a/src/core/main.c
+++ b/src/core/main.c
@@ -66,6 +66,10 @@
#include
#endif
-
+
+#ifdef HAVE_LIBCAPNG
+#include
+#endif
@@ -105,7 +109,7 @@ index 7f4f666d2..b27968f13 100644
@@ -673,6 +677,12 @@ meta_run (void)
if (!meta_display_open ())
meta_exit (META_EXIT_ERROR);
-
+
+#ifdef HAVE_LIBCAPNG
+ capng_clear(CAPNG_SELECT_BOTH);
+ capng_update(CAPNG_ADD, CAPNG_EFFECTIVE|CAPNG_PERMITTED, CAP_SYS_NICE);
@@ -113,10 +117,10 @@ index 7f4f666d2..b27968f13 100644
+#endif
+
g_main_loop_run (meta_main_loop);
-
+
meta_finalize ();
diff --git a/src/meson.build b/src/meson.build
-index 90d80734f..a9fffa2c2 100644
+index 90d8073..a9fffa2 100644
--- a/src/meson.build
+++ b/src/meson.build
@@ -18,6 +18,7 @@ mutter_pkg_deps = [
@@ -126,7 +130,6 @@ index 90d80734f..a9fffa2c2 100644
+ libcapng_dep,
pango_dep,
]
-
---
-2.23.0
-
+
+--
+git-series 0.9.1
diff --git a/third_party/nixpkgs/pkgs/desktops/gnome-3/core/mutter/3.34/0001-Fix-glitches-in-gala.patch b/third_party/nixpkgs/pkgs/desktops/gnome-3/core/mutter/3.34/0003-Fix-glitches-in-gala.patch
similarity index 60%
rename from third_party/nixpkgs/pkgs/desktops/gnome-3/core/mutter/3.34/0001-Fix-glitches-in-gala.patch
rename to third_party/nixpkgs/pkgs/desktops/gnome-3/core/mutter/3.34/0003-Fix-glitches-in-gala.patch
index 7be00b33bb..9f78a324d9 100644
--- a/third_party/nixpkgs/pkgs/desktops/gnome-3/core/mutter/3.34/0001-Fix-glitches-in-gala.patch
+++ b/third_party/nixpkgs/pkgs/desktops/gnome-3/core/mutter/3.34/0003-Fix-glitches-in-gala.patch
@@ -1,7 +1,12 @@
-From e10186284103d3ad8e425980b096eac813cae631 Mon Sep 17 00:00:00 2001
+From 5d2b9a03f24b4dbc423adff52b2eeb478c4b5913 Mon Sep 17 00:00:00 2001
+Message-Id: <5d2b9a03f24b4dbc423adff52b2eeb478c4b5913.1601082838.git-series.worldofpeace@protonmail.ch>
+In-Reply-To: <7b94f980f2a099dd4b19b60c357cfcf5ff7ada6d.1601082838.git-series.worldofpeace@protonmail.ch>
+References: <7b94f980f2a099dd4b19b60c357cfcf5ff7ada6d.1601082838.git-series.worldofpeace@protonmail.ch>
+From: WORLDofPEACE
+Date: Sun, 5 Apr 2020 23:06:03 -0400
+Subject: [PATCH 3/7] Fix glitches in gala
+
From: worldofpeace
-Date: Sun, 5 Apr 2020 23:06:03 -0400
-Subject: [PATCH] Fix glitches in gala
This fixes issues for users of mutter like in gala[0].
@@ -12,7 +17,7 @@ Upstream report: https://gitlab.gnome.org/GNOME/mutter/issues/536
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/clutter/clutter/clutter-actor.c b/clutter/clutter/clutter-actor.c
-index ecf9a597d..07b8b7155 100644
+index ecf9a59..07b8b71 100644
--- a/clutter/clutter/clutter-actor.c
+++ b/clutter/clutter/clutter-actor.c
@@ -17831,7 +17831,7 @@ _clutter_actor_get_paint_volume_mutable (ClutterActor *self)
@@ -25,5 +30,4 @@ index ecf9a597d..07b8b7155 100644
}
else
--
-2.25.1
-
+git-series 0.9.1
diff --git a/third_party/nixpkgs/pkgs/desktops/gnome-3/core/mutter/3.34/0004-profiler-track-changes-in-GLib-and-Sysprof.patch b/third_party/nixpkgs/pkgs/desktops/gnome-3/core/mutter/3.34/0004-profiler-track-changes-in-GLib-and-Sysprof.patch
new file mode 100644
index 0000000000..cd98d39504
--- /dev/null
+++ b/third_party/nixpkgs/pkgs/desktops/gnome-3/core/mutter/3.34/0004-profiler-track-changes-in-GLib-and-Sysprof.patch
@@ -0,0 +1,58 @@
+From 5a9f9fbaa1322b2ad0a52fcdd171d4f44d031918 Mon Sep 17 00:00:00 2001
+Message-Id: <5a9f9fbaa1322b2ad0a52fcdd171d4f44d031918.1601082838.git-series.worldofpeace@protonmail.ch>
+In-Reply-To: <7b94f980f2a099dd4b19b60c357cfcf5ff7ada6d.1601082838.git-series.worldofpeace@protonmail.ch>
+References: <7b94f980f2a099dd4b19b60c357cfcf5ff7ada6d.1601082838.git-series.worldofpeace@protonmail.ch>
+From: WORLDofPEACE
+Date: Wed, 30 Oct 2019 15:23:24 -0700
+Subject: [PATCH 4/7] profiler: track changes in GLib and Sysprof
+
+From: Christian Hergert
+
+This tracks the changes to gdbus-codegen in terms of how GUnixFDList is
+done to use the UnixFD annotation.
+
+https://gitlab.gnome.org/GNOME/mutter/merge_requests/908
+(cherry picked from commit 605171291993460f31d470a8143d6438d0c6169c)
+---
+ src/backends/meta-profiler.c | 7 ++-----
+ 1 file changed, 2 insertions(+), 5 deletions(-)
+
+diff --git a/src/backends/meta-profiler.c b/src/backends/meta-profiler.c
+index 10d433a..0d62701 100644
+--- a/src/backends/meta-profiler.c
++++ b/src/backends/meta-profiler.c
+@@ -51,13 +51,12 @@ G_DEFINE_TYPE_WITH_CODE (MetaProfiler,
+ static gboolean
+ handle_start (MetaDBusSysprof3Profiler *dbus_profiler,
+ GDBusMethodInvocation *invocation,
++ GUnixFDList *fd_list,
+ GVariant *options,
+ GVariant *fd_variant)
+ {
+ MetaProfiler *profiler = META_PROFILER (dbus_profiler);
+ GMainContext *main_context = g_main_context_default ();
+- GDBusMessage *message;
+- GUnixFDList *fd_list;
+ const char *group_name;
+ int position;
+ int fd = -1;
+@@ -73,8 +72,6 @@ handle_start (MetaDBusSysprof3Profiler *dbus_profiler,
+
+ g_variant_get (fd_variant, "h", &position);
+
+- message = g_dbus_method_invocation_get_message (invocation);
+- fd_list = g_dbus_message_get_unix_fd_list (message);
+ if (fd_list)
+ fd = g_unix_fd_list_get (fd_list, position, NULL);
+
+@@ -98,7 +95,7 @@ handle_start (MetaDBusSysprof3Profiler *dbus_profiler,
+
+ g_debug ("Profiler running");
+
+- meta_dbus_sysprof3_profiler_complete_start (dbus_profiler, invocation);
++ meta_dbus_sysprof3_profiler_complete_start (dbus_profiler, invocation, NULL);
+ return TRUE;
+ }
+
+--
+git-series 0.9.1
diff --git a/third_party/nixpkgs/pkgs/desktops/gnome-3/core/mutter/3.34/0005-meta-Add-missing-display.h-to-meta-workspace-manager.h.patch b/third_party/nixpkgs/pkgs/desktops/gnome-3/core/mutter/3.34/0005-meta-Add-missing-display.h-to-meta-workspace-manager.h.patch
new file mode 100644
index 0000000000..138970ddda
--- /dev/null
+++ b/third_party/nixpkgs/pkgs/desktops/gnome-3/core/mutter/3.34/0005-meta-Add-missing-display.h-to-meta-workspace-manager.h.patch
@@ -0,0 +1,32 @@
+From 2caa072dd8e283a8e43febeab55fe8b76dda69b7 Mon Sep 17 00:00:00 2001
+Message-Id: <2caa072dd8e283a8e43febeab55fe8b76dda69b7.1601082838.git-series.worldofpeace@protonmail.ch>
+In-Reply-To: <7b94f980f2a099dd4b19b60c357cfcf5ff7ada6d.1601082838.git-series.worldofpeace@protonmail.ch>
+References: <7b94f980f2a099dd4b19b60c357cfcf5ff7ada6d.1601082838.git-series.worldofpeace@protonmail.ch>
+From: WORLDofPEACE
+Date: Wed, 29 Jan 2020 11:02:33 +0100
+Subject: [PATCH 5/7] meta: Add missing display.h to meta-workspace-manager.h
+
+From: Corentin Noël
+
+This is required because MetaDisplayCorner is only defined in display.h
+
+https://gitlab.gnome.org/GNOME/mutter/merge_requests/1025
+(cherry picked from commit 9d390ee49fb1f6300336e82ae94cc8061c6bae12)
+---
+ src/meta/meta-workspace-manager.h | 1 +
+ 1 file changed, 1 insertion(+)
+
+diff --git a/src/meta/meta-workspace-manager.h b/src/meta/meta-workspace-manager.h
+index 0390c44..92cd681 100644
+--- a/src/meta/meta-workspace-manager.h
++++ b/src/meta/meta-workspace-manager.h
+@@ -26,6 +26,7 @@
+ #include
+
+ #include
++#include
+ #include
+ #include
+
+--
+git-series 0.9.1
diff --git a/third_party/nixpkgs/pkgs/desktops/gnome-3/core/mutter/3.34/0006-build-bump-ABI-to-sysprof-capture-4.patch b/third_party/nixpkgs/pkgs/desktops/gnome-3/core/mutter/3.34/0006-build-bump-ABI-to-sysprof-capture-4.patch
new file mode 100644
index 0000000000..6d88f0f5e7
--- /dev/null
+++ b/third_party/nixpkgs/pkgs/desktops/gnome-3/core/mutter/3.34/0006-build-bump-ABI-to-sysprof-capture-4.patch
@@ -0,0 +1,102 @@
+From 0c95e5a5b31eab93f149b90982680f38e8977063 Mon Sep 17 00:00:00 2001
+Message-Id: <0c95e5a5b31eab93f149b90982680f38e8977063.1601082838.git-series.worldofpeace@protonmail.ch>
+In-Reply-To: <7b94f980f2a099dd4b19b60c357cfcf5ff7ada6d.1601082838.git-series.worldofpeace@protonmail.ch>
+References: <7b94f980f2a099dd4b19b60c357cfcf5ff7ada6d.1601082838.git-series.worldofpeace@protonmail.ch>
+From: WORLDofPEACE
+Date: Sat, 4 Jul 2020 12:01:28 -0700
+Subject: [PATCH 6/7] build: bump ABI to sysprof-capture-4
+
+From: Christian Hergert
+
+GLib will now be linking against sysprof-capture-4.a. To support that,
+sysprof had to remove the GLib dependency from sysprof-capture-4 which
+had the side-effect of breaking ABi.
+
+This bumps the dependency and includes a fallback to compile just the
+libsysprof-capture-4.a using a subproject wrap.
+
+https://gitlab.gnome.org/GNOME/mutter/-/merge_requests/1352
+(cherry picked from commit 2c08eb6d163b6758efec9eafe1d5c17fc1ab3692)
+---
+ meson.build | 20 ++++++++++++++++++--
+ src/meson.build | 8 ++++++--
+ subprojects/sysprof.wrap | 4 ++++
+ 3 files changed, 28 insertions(+), 4 deletions(-)
+ create mode 100644 subprojects/sysprof.wrap
+
+diff --git a/meson.build b/meson.build
+index 86970df..3dc0098 100644
+--- a/meson.build
++++ b/meson.build
+@@ -1,6 +1,6 @@
+ project('mutter', 'c',
+ version: '3.34.6',
+- meson_version: '>= 0.50.0',
++ meson_version: '>= 0.51.0',
+ license: 'GPLv2+'
+ )
+
+@@ -52,6 +52,9 @@ gbm_req = '>= 10.3'
+ # screen cast version requirements
+ libpipewire_req = '>= 0.2.5'
+
++# profiler requirements
++sysprof_req = '>= 3.37.2'
++
+ gnome = import('gnome')
+ pkg = import('pkgconfig')
+ i18n = import('i18n')
+@@ -275,7 +278,20 @@ endif
+
+ have_profiler = get_option('profiler')
+ if have_profiler
+- sysprof_dep = dependency('sysprof-capture-3')
++ # libsysprof-capture support
++ sysprof_dep = dependency('sysprof-capture-4',
++ required: true,
++ default_options: [
++ 'enable_examples=false',
++ 'enable_gtk=false',
++ 'enable_tests=false',
++ 'enable_tools=false',
++ 'libsysprof=false',
++ 'with_sysprofd=none',
++ 'help=false',
++ ],
++ fallback: ['sysprof', 'libsysprof_capture_dep'],
++ )
+ endif
+
+ required_functions = [
+diff --git a/src/meson.build b/src/meson.build
+index a9fffa2..a91baa1 100644
+--- a/src/meson.build
++++ b/src/meson.build
+@@ -711,9 +711,13 @@ if have_profiler
+ 'backends/meta-profiler.h',
+ ]
+
+- dbus_interfaces_dir = join_paths(datadir, 'dbus-1', 'interfaces')
+- sysprof3_dbus_file = join_paths(dbus_interfaces_dir, 'org.gnome.Sysprof3.Profiler.xml')
++ if sysprof_dep.type_name() == 'pkgconfig'
++ sysprof_dbus_interfaces_dir = join_paths(sysprof_dep.get_pkgconfig_variable('datadir'), 'dbus-1', 'interfaces')
++ else
++ sysprof_dbus_interfaces_dir = join_paths(meson.source_root(), 'subprojects', 'sysprof', 'src')
++ endif
+
++ sysprof3_dbus_file = join_paths(sysprof_dbus_interfaces_dir, 'org.gnome.Sysprof3.Profiler.xml')
+ dbus_sysprof3_profiler_built_sources = gnome.gdbus_codegen('meta-dbus-sysprof3-profiler',
+ sysprof3_dbus_file,
+ interface_prefix: 'org.gnome.',
+diff --git a/subprojects/sysprof.wrap b/subprojects/sysprof.wrap
+new file mode 100644
+index 0000000..c8f5883
+--- /dev/null
++++ b/subprojects/sysprof.wrap
+@@ -0,0 +1,4 @@
++[wrap-git]
++directory=sysprof
++url=https://gitlab.gnome.org/GNOME/sysprof.git
++revision=cae28263ff5dd4a510d82f3dc2e3a3b3d9b386fb
+--
+git-series 0.9.1
diff --git a/third_party/nixpkgs/pkgs/desktops/gnome-3/core/mutter/3.34/0007-fix-paths.patch b/third_party/nixpkgs/pkgs/desktops/gnome-3/core/mutter/3.34/0007-fix-paths.patch
new file mode 100644
index 0000000000..8376fc649b
--- /dev/null
+++ b/third_party/nixpkgs/pkgs/desktops/gnome-3/core/mutter/3.34/0007-fix-paths.patch
@@ -0,0 +1,27 @@
+From 7bbbf082599ec786f64f2135c9acc0b4fe2ecbf4 Mon Sep 17 00:00:00 2001
+Message-Id: <7bbbf082599ec786f64f2135c9acc0b4fe2ecbf4.1601082838.git-series.worldofpeace@protonmail.ch>
+In-Reply-To: <7b94f980f2a099dd4b19b60c357cfcf5ff7ada6d.1601082838.git-series.worldofpeace@protonmail.ch>
+References: <7b94f980f2a099dd4b19b60c357cfcf5ff7ada6d.1601082838.git-series.worldofpeace@protonmail.ch>
+From: WORLDofPEACE
+Date: Fri, 25 Sep 2020 20:48:33 -0400
+Subject: [PATCH 7/7] fix paths
+
+---
+ src/core/util.c | 2 +-
+ 1 file changed, 1 insertion(+), 1 deletion(-)
+
+diff --git a/src/core/util.c b/src/core/util.c
+index 79bcfdc..87ce549 100644
+--- a/src/core/util.c
++++ b/src/core/util.c
+@@ -623,7 +623,7 @@ meta_show_dialog (const char *type,
+
+ args = g_ptr_array_new ();
+
+- append_argument (args, "zenity");
++ append_argument (args, "@zenity@/bin/zenity");
+ append_argument (args, type);
+
+ if (display)
+--
+git-series 0.9.1
diff --git a/third_party/nixpkgs/pkgs/desktops/gnome-3/core/mutter/3.34/default.nix b/third_party/nixpkgs/pkgs/desktops/gnome-3/core/mutter/3.34/default.nix
index 8769698785..6afded7667 100644
--- a/third_party/nixpkgs/pkgs/desktops/gnome-3/core/mutter/3.34/default.nix
+++ b/third_party/nixpkgs/pkgs/desktops/gnome-3/core/mutter/3.34/default.nix
@@ -43,20 +43,19 @@
stdenv.mkDerivation rec {
pname = "mutter";
- version = "3.34.5";
+ version = "3.34.6";
outputs = [ "out" "dev" "man" ];
src = fetchurl {
url = "mirror://gnome/sources/mutter/${stdenv.lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
- sha256 = "1i3r51ghfld1rf1rczzi3jhybz3mhywqcj2jyiqhfcyp1svlklfi";
+ hash = "sha256-I73ofTO4mBNYgxzsiRW7X/Hq+cHedMkM0WYLG5WINSY=";
};
mesonFlags = [
"-Degl_device=true"
"-Dinstalled_tests=false" # TODO: enable these
"-Dwayland_eglstream=true"
- "-Dxwayland-path=${xwayland}/bin/Xwayland"
];
propagatedBuildInputs = [
@@ -105,45 +104,14 @@ stdenv.mkDerivation rec {
];
patches = [
- # Fix build with libglvnd provided headers
- (fetchpatch {
- url = "https://gitlab.gnome.org/GNOME/mutter/commit/a444a4c5f58ea516ad3cd9d6ddc0056c3ca9bc90.patch";
- sha256 = "0imy2j8af9477jliwdq4jc40yw1cifsjjf196gnmwxr9rkj0hbrd";
- })
-
- # gnome-3-34 2020-04-24
- # also fixes https://mail.gnome.org/archives/distributor-list/2020-April/msg00001.html
- (fetchpatch {
- url = "https://github.com/GNOME/mutter/compare/3.34.5..3bafd234248fdcd84bc62fef5e31c29fbb613909.patch";
- sha256 = "1a7krbdfmvx204p6av44rbp4ckp6ddg1mms8wkixxh2p871zq1pi";
- })
-
- # Drop inheritable cap_sys_nice, to prevent the ambient set from leaking
- # from mutter/gnome-shell, see https://github.com/NixOS/nixpkgs/issues/71381
- ./drop-inheritable.patch
-
- # See commit message for details
- ./0001-Fix-glitches-in-gala.patch
-
- # https://gitlab.gnome.org/GNOME/mutter/merge_requests/1094
- # https://gitlab.gnome.org/GNOME/mutter/merge_requests/957
- ./fix-sysprof.patch
-
- # profiler: track changes in GLib and Sysprof
- # https://gitlab.gnome.org/GNOME/mutter/merge_requests/908
- (fetchpatch {
- url = "https://gitlab.gnome.org/GNOME/mutter/-/commit/605171291993460f31d470a8143d6438d0c6169c.patch";
- sha256 = "10fxzj0lmic2sp57w26w3r0bv1szngjjs50p3ka22wr9pxqmzl7l";
- })
-
- # Fixes https://github.com/elementary/wingpanel/issues/305
- (fetchpatch {
- url = "https://gitlab.gnome.org/GNOME/mutter/-/commit/9d390ee49fb1f6300336e82ae94cc8061c6bae12.patch";
- sha256 = "12hmi07rvspwhp8h1y1vmcvmvbh8fihcrb07ja5g0qnh28ip5qfi";
- })
-
+ ./0001-EGL-Include-EGL-eglmesaext.h.patch
+ ./0002-drop-inheritable.patch
+ ./0003-Fix-glitches-in-gala.patch
+ ./0004-profiler-track-changes-in-GLib-and-Sysprof.patch
+ ./0005-meta-Add-missing-display.h-to-meta-workspace-manager.h.patch
+ ./0006-build-bump-ABI-to-sysprof-capture-4.patch
(substituteAll {
- src = ./fix-paths.patch;
+ src = ./0007-fix-paths.patch;
inherit zenity;
})
];
diff --git a/third_party/nixpkgs/pkgs/desktops/gnome-3/core/mutter/3.34/fix-paths.patch b/third_party/nixpkgs/pkgs/desktops/gnome-3/core/mutter/3.34/fix-paths.patch
deleted file mode 100644
index 1986c65e8f..0000000000
--- a/third_party/nixpkgs/pkgs/desktops/gnome-3/core/mutter/3.34/fix-paths.patch
+++ /dev/null
@@ -1,13 +0,0 @@
-diff --git a/src/core/util.c b/src/core/util.c
-index 57b73747d..f424cc81c 100644
---- a/src/core/util.c
-+++ b/src/core/util.c
-@@ -636,7 +636,7 @@ meta_show_dialog (const char *type,
-
- args = g_ptr_array_new ();
-
-- append_argument (args, "zenity");
-+ append_argument (args, "@zenity@/bin/zenity");
- append_argument (args, type);
-
- if (display)
diff --git a/third_party/nixpkgs/pkgs/desktops/gnome-3/core/mutter/3.34/fix-sysprof.patch b/third_party/nixpkgs/pkgs/desktops/gnome-3/core/mutter/3.34/fix-sysprof.patch
deleted file mode 100644
index 481a0ab89c..0000000000
--- a/third_party/nixpkgs/pkgs/desktops/gnome-3/core/mutter/3.34/fix-sysprof.patch
+++ /dev/null
@@ -1,25 +0,0 @@
-From 71acfd5258b4d12323fc51dda48e83830e62e696 Mon Sep 17 00:00:00 2001
-From: worldofpeace
-Date: Mon, 16 Sep 2019 11:18:27 -0400
-Subject: [PATCH] build: use get_pkgconfig_variable for sysprof dbusdir
-
----
- src/meson.build | 2 +-
- 1 file changed, 1 insertion(+), 1 deletion(-)
-
-diff --git a/src/meson.build b/src/meson.build
-index 182f7f5f5..43060865b 100644
---- a/src/meson.build
-+++ b/src/meson.build
-@@ -710,7 +710,7 @@ if have_profiler
- 'backends/meta-profiler.h',
- ]
-
-- dbus_interfaces_dir = join_paths(datadir, 'dbus-1', 'interfaces')
-+ dbus_interfaces_dir = join_paths(sysprof_dep.get_pkgconfig_variable('prefix'), 'share', 'dbus-1', 'interfaces')
- sysprof3_dbus_file = join_paths(dbus_interfaces_dir, 'org.gnome.Sysprof3.Profiler.xml')
-
- dbus_sysprof3_profiler_built_sources = gnome.gdbus_codegen('meta-dbus-sysprof3-profiler',
---
-2.22.1
-
diff --git a/third_party/nixpkgs/pkgs/desktops/gnome-3/core/mutter/default.nix b/third_party/nixpkgs/pkgs/desktops/gnome-3/core/mutter/default.nix
index 79cbbb9f5a..d0acdd5133 100644
--- a/third_party/nixpkgs/pkgs/desktops/gnome-3/core/mutter/default.nix
+++ b/third_party/nixpkgs/pkgs/desktops/gnome-3/core/mutter/default.nix
@@ -42,13 +42,13 @@
let self = stdenv.mkDerivation rec {
pname = "mutter";
- version = "3.36.5";
+ version = "3.38.1";
outputs = [ "out" "dev" "man" ];
src = fetchurl {
url = "mirror://gnome/sources/mutter/${stdenv.lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
- sha256 = "1py7sqrpvg2qvswxclshysx7hd9jk65i6cwqsagd6rg6rnjhblp0";
+ sha256 = "0cvs47h7xhalkh8xcchllaws212ml3d23aj0pmfq0qyzkw65f8g9";
};
patches = [
@@ -124,8 +124,11 @@ let self = stdenv.mkDerivation rec {
${glib.dev}/bin/glib-compile-schemas "$out/share/glib-2.0/schemas"
'';
+ # Install udev files into our own tree.
+ PKG_CONFIG_UDEV_UDEVDIR = "${placeholder "out"}/lib/udev";
+
passthru = {
- libdir = "${self}/lib/mutter-6";
+ libdir = "${self}/lib/mutter-7";
tests = {
libdirExists = runCommand "mutter-libdir-exists" {} ''
diff --git a/third_party/nixpkgs/pkgs/desktops/gnome-3/core/mutter/drop-inheritable.patch b/third_party/nixpkgs/pkgs/desktops/gnome-3/core/mutter/drop-inheritable.patch
index 1600db1e70..7374e1b869 100644
--- a/third_party/nixpkgs/pkgs/desktops/gnome-3/core/mutter/drop-inheritable.patch
+++ b/third_party/nixpkgs/pkgs/desktops/gnome-3/core/mutter/drop-inheritable.patch
@@ -102,18 +102,18 @@ index 7f4f666d2..b27968f13 100644
#if defined(HAVE_NATIVE_BACKEND) && defined(HAVE_WAYLAND)
#include
#endif /* HAVE_WAYLAND && HAVE_NATIVE_BACKEND */
-@@ -673,6 +677,12 @@ meta_run (void)
- if (!meta_display_open ())
- meta_exit (META_EXIT_ERROR);
-
+@@ -670,5 +674,12 @@ int
+ meta_run (void)
+ {
+ meta_start ();
++
+#ifdef HAVE_LIBCAPNG
+ capng_clear(CAPNG_SELECT_BOTH);
+ capng_update(CAPNG_ADD, CAPNG_EFFECTIVE|CAPNG_PERMITTED, CAP_SYS_NICE);
+ capng_apply(CAPNG_SELECT_BOTH);
+#endif
+
- g_main_loop_run (meta_main_loop);
-
+ meta_run_main_loop ();
meta_finalize ();
diff --git a/src/meson.build b/src/meson.build
index 90d80734f..a9fffa2c2 100644
diff --git a/third_party/nixpkgs/pkgs/desktops/gnome-3/core/nautilus/default.nix b/third_party/nixpkgs/pkgs/desktops/gnome-3/core/nautilus/default.nix
index 6145178de1..2107cad4a5 100644
--- a/third_party/nixpkgs/pkgs/desktops/gnome-3/core/nautilus/default.nix
+++ b/third_party/nixpkgs/pkgs/desktops/gnome-3/core/nautilus/default.nix
@@ -32,13 +32,24 @@
stdenv.mkDerivation rec {
pname = "nautilus";
- version = "3.36.3";
+ version = "3.38.1";
src = fetchurl {
url = "mirror://gnome/sources/${pname}/${stdenv.lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
- sha256 = "1y0fsd7j48v4qkc051cg41mz7jycgw4vd4g37lw682p7n5xgrjmn";
+ sha256 = "1zfh48ibap6jnw20rxls7nbv4zzqs6n5abr2dzyvfx5p2cmq2gha";
};
+ patches = [
+ # Allow changing extension directory using environment variable.
+ ./extension_dir.patch
+
+ # Hardcode required paths.
+ (substituteAll {
+ src = ./fix-paths.patch;
+ inherit tracker;
+ })
+ ];
+
nativeBuildInputs = [
desktop-file-utils
gettext
@@ -86,10 +97,6 @@ stdenv.mkDerivation rec {
patchShebangs build-aux/meson/postinstall.py
'';
- patches = [
- ./extension_dir.patch
- ];
-
passthru = {
updateScript = gnome3.updateScript {
packageName = pname;
diff --git a/third_party/nixpkgs/pkgs/desktops/gnome-3/core/nautilus/fix-paths.patch b/third_party/nixpkgs/pkgs/desktops/gnome-3/core/nautilus/fix-paths.patch
new file mode 100644
index 0000000000..dc9874359b
--- /dev/null
+++ b/third_party/nixpkgs/pkgs/desktops/gnome-3/core/nautilus/fix-paths.patch
@@ -0,0 +1,13 @@
+diff --git a/src/nautilus-tag-manager.c b/src/nautilus-tag-manager.c
+index 28b96c996..0b1fad9ab 100644
+--- a/src/nautilus-tag-manager.c
++++ b/src/nautilus-tag-manager.c
+@@ -962,7 +962,7 @@ child_watch_cb (GPid pid,
+ static void
+ export_tracker2_data (NautilusTagManager *self)
+ {
+- gchar *argv[] = {"tracker3", "export", "--2to3", "files-starred", "--keyfile", NULL};
++ gchar *argv[] = {"@tracker@/bin/tracker3", "export", "--2to3", "files-starred", "--keyfile", NULL};
+ gint stdout_fd;
+ GPid child_pid;
+ g_autoptr (GError) error = NULL;
diff --git a/third_party/nixpkgs/pkgs/desktops/gnome-3/core/rygel/add-option-for-installation-sysconfdir.patch b/third_party/nixpkgs/pkgs/desktops/gnome-3/core/rygel/add-option-for-installation-sysconfdir.patch
index 4259f93eb2..6fe651b9cb 100644
--- a/third_party/nixpkgs/pkgs/desktops/gnome-3/core/rygel/add-option-for-installation-sysconfdir.patch
+++ b/third_party/nixpkgs/pkgs/desktops/gnome-3/core/rygel/add-option-for-installation-sysconfdir.patch
@@ -1,5 +1,5 @@
diff --git a/meson.build b/meson.build
-index 209d4187..58580980 100644
+index 4aa683d6..a930d533 100644
--- a/meson.build
+++ b/meson.build
@@ -20,7 +20,11 @@ if not get_option('uninstalled')
@@ -14,7 +14,7 @@ index 209d4187..58580980 100644
+ endif
rygel_plugindir = join_paths(rygel_libdir, 'rygel-2.6', 'plugins')
rygel_enginedir = join_paths(rygel_libdir, 'rygel-2.6', 'engines')
- rygel_presetdir = join_paths(rygel_datadir, 'rygel', 'presets')
+ rygel_presetdir = join_paths(rygel_datadir, 'presets')
@@ -55,7 +59,7 @@ conf.set_quoted('DATA_DIR', rygel_datadir)
conf.set_quoted('PLUGIN_DIR', rygel_plugindir)
conf.set_quoted('BIG_ICON_DIR', rygel_bigicondir)
@@ -25,7 +25,7 @@ index 209d4187..58580980 100644
conf.set_quoted('MX_EXTRACT_PATH', join_paths(rygel_libexecdir, 'mx-extract'))
conf.set_quoted('DESKTOP_DIR', join_paths(get_option('prefix'), get_option('datadir'), 'applications'))
diff --git a/meson_options.txt b/meson_options.txt
-index f09cac58..ff11c548 100644
+index cb604c4e..1b049b77 100644
--- a/meson_options.txt
+++ b/meson_options.txt
@@ -1,6 +1,7 @@
@@ -33,6 +33,6 @@ index f09cac58..ff11c548 100644
option('api-docs', type: 'boolean', value: 'false', description: 'Build the API documentation')
option('systemd-user-units-dir', type : 'string', value : 'auto', description : 'Where to install the systemd user unit (use special values "auto" or "none", or pass a path')
+option('sysconfdir_install', type: 'string', value: '', description: 'sysconfdir to use during installation')
- option('plugins', type : 'array', choices : ['external', 'gst-launch', 'lms', 'media-export', 'mpris', 'playbin', 'ruih', 'tracker'])
+ option('plugins', type : 'array', choices : ['external', 'gst-launch', 'lms', 'media-export', 'mpris', 'playbin', 'ruih', 'tracker', 'tracker3'])
option('engines', type : 'array', choices : ['simple', 'gstreamer'])
option('examples', type : 'boolean', value : 'true')
diff --git a/third_party/nixpkgs/pkgs/desktops/gnome-3/core/rygel/default.nix b/third_party/nixpkgs/pkgs/desktops/gnome-3/core/rygel/default.nix
index 529091e5fd..f7ce3387fc 100644
--- a/third_party/nixpkgs/pkgs/desktops/gnome-3/core/rygel/default.nix
+++ b/third_party/nixpkgs/pkgs/desktops/gnome-3/core/rygel/default.nix
@@ -28,14 +28,14 @@
stdenv.mkDerivation rec {
pname = "rygel";
- version = "0.38.4";
+ version = "0.40.0";
# TODO: split out lib
outputs = [ "out" "dev" ];
src = fetchurl {
url = "mirror://gnome/sources/${pname}/${stdenv.lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
- sha256 = "0rm1m1z8rcvyj9873wqcz5i3qdg8j6gv6k1p01xifk0y9phg7rzc";
+ sha256 = "0xrbdsgm78h3g4qcvq2p8k70q31x9xdbb35bixz36q6h9s1wqznn";
};
nativeBuildInputs = [
@@ -66,6 +66,7 @@ stdenv.mkDerivation rec {
shared-mime-info
] ++ (with gst_all_1; [
gstreamer
+ gst-editing-services
gst-plugins-base
gst-plugins-good
gst-plugins-bad
@@ -77,6 +78,8 @@ stdenv.mkDerivation rec {
"-Dapi-docs=false"
"--sysconfdir=/etc"
"-Dsysconfdir_install=${placeholder "out"}/etc"
+ # Build all plug-ins except for tracker 2
+ "-Dplugins=external,gst-launch,lms,media-export,mpris,playbin,ruih,tracker3"
];
doCheck = true;
diff --git a/third_party/nixpkgs/pkgs/desktops/gnome-3/core/simple-scan/default.nix b/third_party/nixpkgs/pkgs/desktops/gnome-3/core/simple-scan/default.nix
index eebd307a30..66846876fa 100644
--- a/third_party/nixpkgs/pkgs/desktops/gnome-3/core/simple-scan/default.nix
+++ b/third_party/nixpkgs/pkgs/desktops/gnome-3/core/simple-scan/default.nix
@@ -24,11 +24,11 @@
stdenv.mkDerivation rec {
pname = "simple-scan";
- version = "3.36.4";
+ version = "3.38.1";
src = fetchurl {
url = "mirror://gnome/sources/${pname}/${stdenv.lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
- sha256 = "09gmzrlljdqkj3w6wa1c27wypy6j8z9dw3jzv9izfqvp38liibsn";
+ sha256 = "0grscz96bwj79ka4qvxh8h75avdx6824k8k38ylmaj6xbl6gi0hy";
};
nativeBuildInputs = [
diff --git a/third_party/nixpkgs/pkgs/desktops/gnome-3/core/sushi/default.nix b/third_party/nixpkgs/pkgs/desktops/gnome-3/core/sushi/default.nix
index 4bdc409d81..f0ddaef081 100644
--- a/third_party/nixpkgs/pkgs/desktops/gnome-3/core/sushi/default.nix
+++ b/third_party/nixpkgs/pkgs/desktops/gnome-3/core/sushi/default.nix
@@ -25,11 +25,11 @@
stdenv.mkDerivation rec {
pname = "sushi";
- version = "3.34.0";
+ version = "3.38.0";
src = fetchurl {
url = "mirror://gnome/sources/sushi/${stdenv.lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
- sha256 = "1zcr8wi5bgvvpb5ha1v96aiaz4vqqrsn6cvvalwzah6am85k78m8";
+ sha256 = "0vlqqk916dymv4asbyvalp1m096a5hh99nx23i4xavzvgygh4h2h";
};
nativeBuildInputs = [
diff --git a/third_party/nixpkgs/pkgs/desktops/gnome-3/core/totem/default.nix b/third_party/nixpkgs/pkgs/desktops/gnome-3/core/totem/default.nix
index 50ab50e58b..58ee706b1c 100644
--- a/third_party/nixpkgs/pkgs/desktops/gnome-3/core/totem/default.nix
+++ b/third_party/nixpkgs/pkgs/desktops/gnome-3/core/totem/default.nix
@@ -1,41 +1,107 @@
-{ stdenv, fetchurl, meson, ninja, gettext, gst_all_1
-, clutter-gtk, clutter-gst, python3Packages, shared-mime-info
-, pkgconfig, gtk3, glib, gobject-introspection, totem-pl-parser
-, wrapGAppsHook, itstool, libxml2, vala, gnome3, grilo, grilo-plugins
-, libpeas, adwaita-icon-theme, gnome-desktop, gsettings-desktop-schemas
-, gdk-pixbuf, tracker, nautilus, xvfb_run }:
+{ stdenv
+, fetchurl
+, meson
+, ninja
+, gettext
+, gst_all_1
+, clutter-gtk
+, clutter-gst
+, python3Packages
+, shared-mime-info
+, pkgconfig
+, gtk3
+, glib
+, gobject-introspection
+, totem-pl-parser
+, wrapGAppsHook
+, itstool
+, libxml2
+, vala
+, gnome3
+, grilo
+, grilo-plugins
+, libpeas
+, adwaita-icon-theme
+, gnome-desktop
+, gsettings-desktop-schemas
+, gdk-pixbuf
+, xvfb_run
+}:
stdenv.mkDerivation rec {
pname = "totem";
- version = "3.34.1";
+ version = "3.38.0";
src = fetchurl {
url = "mirror://gnome/sources/totem/${stdenv.lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
- sha256 = "028sc6xbyi7rs884862d8f3di6zhcm0lhvlpc3r69ifzjsq9my3b";
+ sha256 = "0bs33ijvxbr2prb9yj4dxglsszslsn9k258n311sld84masz4ad8";
};
- doCheck = true;
-
- nativeBuildInputs = [ meson ninja vala pkgconfig gettext python3Packages.python itstool gobject-introspection wrapGAppsHook ];
- buildInputs = [
- gtk3 glib grilo clutter-gtk clutter-gst totem-pl-parser grilo-plugins
- gst_all_1.gstreamer gst_all_1.gst-plugins-base gst_all_1.gst-plugins-good gst_all_1.gst-plugins-bad
- gst_all_1.gst-plugins-ugly gst_all_1.gst-libav libpeas shared-mime-info
- gdk-pixbuf libxml2 adwaita-icon-theme gnome-desktop
- gsettings-desktop-schemas tracker nautilus
- python3Packages.pygobject3 python3Packages.dbus-python # for plug-ins
+ nativeBuildInputs = [
+ meson
+ ninja
+ vala
+ pkgconfig
+ gettext
+ python3Packages.python
+ itstool
+ gobject-introspection
+ wrapGAppsHook
];
+ buildInputs = [
+ gtk3
+ glib
+ grilo
+ clutter-gtk
+ clutter-gst
+ totem-pl-parser
+ grilo-plugins
+ gst_all_1.gstreamer
+ gst_all_1.gst-plugins-base
+ gst_all_1.gst-plugins-good
+ gst_all_1.gst-plugins-bad
+ gst_all_1.gst-plugins-ugly
+ gst_all_1.gst-libav
+ libpeas
+ shared-mime-info
+ gdk-pixbuf
+ libxml2
+ adwaita-icon-theme
+ gnome-desktop
+ gsettings-desktop-schemas
+ # for plug-ins
+ python3Packages.pygobject3
+ python3Packages.dbus-python
+ ];
+
+ checkInputs = [
+ xvfb_run
+ ];
+
+ mesonFlags = [
+ # TODO: https://github.com/NixOS/nixpkgs/issues/36468
+ "-Dc_args=-I${glib.dev}/include/gio-unix-2.0"
+ ];
+
+ # Tests do not work with GStreamer 1.18.
+ # https://gitlab.gnome.org/GNOME/totem/-/issues/450
+ doCheck = false;
+
postPatch = ''
chmod +x meson_compile_python.py meson_post_install.py # patchShebangs requires executable file
- patchShebangs .
+ patchShebangs \
+ ./meson_compile_python.py \
+ ./meson_post_install.py
'';
- checkInputs = [ xvfb_run ];
-
checkPhase = ''
+ runHook preCheck
+
xvfb-run -s '-screen 0 800x600x24' \
ninja test
+
+ runHook postCheck
'';
wrapPrefixVariables = [ "PYTHONPATH" ];
@@ -51,7 +117,7 @@ stdenv.mkDerivation rec {
homepage = "https://wiki.gnome.org/Apps/Videos";
description = "Movie player for the GNOME desktop based on GStreamer";
maintainers = teams.gnome.members;
- license = licenses.gpl2;
+ license = licenses.gpl2Plus; # with exception to allow use of non-GPL compatible plug-ins
platforms = platforms.linux;
};
}
diff --git a/third_party/nixpkgs/pkgs/desktops/gnome-3/core/yelp-xsl/default.nix b/third_party/nixpkgs/pkgs/desktops/gnome-3/core/yelp-xsl/default.nix
index 09019e6758..a29a292b3d 100644
--- a/third_party/nixpkgs/pkgs/desktops/gnome-3/core/yelp-xsl/default.nix
+++ b/third_party/nixpkgs/pkgs/desktops/gnome-3/core/yelp-xsl/default.nix
@@ -10,11 +10,11 @@
stdenv.mkDerivation rec {
pname = "yelp-xsl";
- version = "3.36.0";
+ version = "3.38.1";
src = fetchurl {
url = "mirror://gnome/sources/yelp-xsl/${stdenv.lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
- sha256 = "1hsfj3q3a3kca0cf9i02xlq2qd4vy12qsjb89hh4r6mp6c11rrag";
+ sha256 = "0ryzvkcgxp7xi0icmpdl2rinjn904s8imbxdi6wshzxblqymc8dk";
};
nativeBuildInputs = [
diff --git a/third_party/nixpkgs/pkgs/desktops/gnome-3/core/yelp/default.nix b/third_party/nixpkgs/pkgs/desktops/gnome-3/core/yelp/default.nix
index 1235447c03..147809de9e 100644
--- a/third_party/nixpkgs/pkgs/desktops/gnome-3/core/yelp/default.nix
+++ b/third_party/nixpkgs/pkgs/desktops/gnome-3/core/yelp/default.nix
@@ -5,11 +5,11 @@
stdenv.mkDerivation rec {
pname = "yelp";
- version = "3.36.0";
+ version = "3.38.1";
src = fetchurl {
url = "mirror://gnome/sources/yelp/${stdenv.lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
- sha256 = "097djjyl096zmicjpxlb858yz6rd5cj813xc8azbxlhsscikwjzx";
+ sha256 = "102z8khj82vdp12c3y86hhxwm1x89xpkpc5zs63c7gg21cbrwdbl";
};
nativeBuildInputs = [ pkgconfig gettext itstool wrapGAppsHook ];
diff --git a/third_party/nixpkgs/pkgs/desktops/gnome-3/default.nix b/third_party/nixpkgs/pkgs/desktops/gnome-3/default.nix
index 846eefa9fa..302ad2c21a 100644
--- a/third_party/nixpkgs/pkgs/desktops/gnome-3/default.nix
+++ b/third_party/nixpkgs/pkgs/desktops/gnome-3/default.nix
@@ -79,6 +79,8 @@ lib.makeScope pkgs.newScope (self: with self; {
gnome-session = callPackage ./core/gnome-session { };
+ gnome-session-ctl = callPackage ./core/gnome-session/ctl.nix { };
+
gnome-shell = callPackage ./core/gnome-shell { };
gnome-shell-extensions = callPackage ./core/gnome-shell-extensions { };
diff --git a/third_party/nixpkgs/pkgs/desktops/gnome-3/devtools/devhelp/default.nix b/third_party/nixpkgs/pkgs/desktops/gnome-3/devtools/devhelp/default.nix
index 11bad7b89d..52d0cefdc8 100644
--- a/third_party/nixpkgs/pkgs/desktops/gnome-3/devtools/devhelp/default.nix
+++ b/third_party/nixpkgs/pkgs/desktops/gnome-3/devtools/devhelp/default.nix
@@ -20,11 +20,11 @@
stdenv.mkDerivation rec {
pname = "devhelp";
- version = "3.36.2";
+ version = "3.38.0";
src = fetchurl {
url = "mirror://gnome/sources/devhelp/${stdenv.lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
- sha256 = "0phcjdxnwgg0a0z9kyidp977jy365pny6bh2qhdyzcpvkqqq8nlb";
+ sha256 = "0s938p1snkskn8np5xh5fzp3zrjrnsh99haiz92nvci264bzp3li";
};
nativeBuildInputs = [
diff --git a/third_party/nixpkgs/pkgs/desktops/gnome-3/devtools/gnome-devel-docs/default.nix b/third_party/nixpkgs/pkgs/desktops/gnome-3/devtools/gnome-devel-docs/default.nix
index 3a53e592b5..f42d1a93e0 100644
--- a/third_party/nixpkgs/pkgs/desktops/gnome-3/devtools/gnome-devel-docs/default.nix
+++ b/third_party/nixpkgs/pkgs/desktops/gnome-3/devtools/gnome-devel-docs/default.nix
@@ -2,11 +2,11 @@
stdenv.mkDerivation rec {
pname = "gnome-devel-docs";
- version = "3.32.1";
+ version = "3.38.1";
src = fetchurl {
url = "mirror://gnome/sources/gnome-devel-docs/${stdenv.lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
- sha256 = "0xqpgf975rws60qxilq635pblbpgwspyykgzxnb4awd9zrs5lbx0";
+ sha256 = "07849yhpc4l4jscskpsbjwsp5qs8f0jz3rmh3p1nj13vxmvgm5j5";
};
passthru = {
diff --git a/third_party/nixpkgs/pkgs/desktops/gnome-3/extensions/gsconnect/default.nix b/third_party/nixpkgs/pkgs/desktops/gnome-3/extensions/gsconnect/default.nix
index 98827fd3f6..5e51b995a5 100644
--- a/third_party/nixpkgs/pkgs/desktops/gnome-3/extensions/gsconnect/default.nix
+++ b/third_party/nixpkgs/pkgs/desktops/gnome-3/extensions/gsconnect/default.nix
@@ -1,16 +1,37 @@
-{ stdenv, fetchFromGitHub, substituteAll, python3, openssl, gsound
-, meson, ninja, libxml2, pkgconfig, gobject-introspection, wrapGAppsHook
-, glib, gtk3, at-spi2-core, upower, openssh, gnome3, gjs }:
+{ stdenv
+, fetchFromGitHub
+, substituteAll
+, openssl
+, gsound
+, meson
+, ninja
+, pkg-config
+, gobject-introspection
+, wrapGAppsHook
+, glib
+, gtk3
+, openssh
+, gnome3
+, gjs
+, nixosTests
+, atk
+, harfbuzz
+, pango
+, gdk-pixbuf
+, gsettings-desktop-schemas
+}:
stdenv.mkDerivation rec {
pname = "gnome-shell-gsconnect";
- version = "41";
+ version = "43";
+
+ outputs = [ "out" "installedTests" ];
src = fetchFromGitHub {
owner = "andyholmes";
repo = "gnome-shell-extension-gsconnect";
rev = "v${version}";
- sha256 = "0lcj7k16jki54bsyh01j4ss4hhfddnahcw02zlmlkl637qdv1b5j";
+ sha256 = "0hm14hg4nhv9hrmjcf9dgm7dsvzpjfifihjmb6yc78y9yjw0i3v7";
};
patches = [
@@ -19,24 +40,23 @@ stdenv.mkDerivation rec {
src = ./fix-paths.patch;
gapplication = "${glib.bin}/bin/gapplication";
})
+
+ # Allow installing installed tests to a separate output
+ ./installed-tests-path.patch
];
nativeBuildInputs = [
- meson ninja pkgconfig
+ meson
+ ninja
+ pkg-config
gobject-introspection # for locating typelibs
wrapGAppsHook # for wrapping daemons
- libxml2 # xmllint
];
buildInputs = [
glib # libgobject
gtk3
- at-spi2-core # atspi
- gnome3.nautilus # TODO: this contaminates the package with nautilus and gnome-autoar typelibs but it is only needed for the extension
- gnome3.nautilus-python
gsound
- upower
- gnome3.caribou
gjs # for running daemon
gnome3.evolution-data-server # for libebook-contacts typelib
];
@@ -51,11 +71,13 @@ stdenv.mkDerivation rec {
"-Dsshkeygen_path=${openssh}/bin/ssh-keygen"
"-Dsession_bus_services_dir=${placeholder "out"}/share/dbus-1/services"
"-Dpost_install=true"
+ "-Dinstalled_test_prefix=${placeholder ''installedTests''}"
];
postPatch = ''
patchShebangs meson/nmh.sh
patchShebangs meson/post-install.sh
+ patchShebangs installed-tests/prepare-tests.sh
# TODO: do not include every typelib everywhere
# for example, we definitely do not need nautilus
@@ -65,20 +87,34 @@ stdenv.mkDerivation rec {
done
'';
- postFixup = ''
+ postFixup = let
+ testDeps = [
+ gtk3 harfbuzz atk pango.out gdk-pixbuf
+ ];
+ in ''
# Let’s wrap the daemons
for file in $out/share/gnome-shell/extensions/gsconnect@andyholmes.github.io/service/{daemon,nativeMessagingHost}.js; do
echo "Wrapping program $file"
wrapGApp "$file"
done
+
+ wrapProgram "$installedTests/libexec/installed-tests/gsconnect/minijasmine" \
+ --prefix XDG_DATA_DIRS : "${gsettings-desktop-schemas}/share/gsettings-schemas/${gsettings-desktop-schemas.name}" \
+ --prefix GI_TYPELIB_PATH : "${stdenv.lib.makeSearchPath "lib/girepository-1.0" testDeps}"
'';
uuid = "gsconnect@andyholmes.github.io";
+ passthru = {
+ tests = {
+ installedTests = nixosTests.installed-tests.gsconnect;
+ };
+ };
+
meta = with stdenv.lib; {
description = "KDE Connect implementation for Gnome Shell";
homepage = "https://github.com/andyholmes/gnome-shell-extension-gsconnect/wiki";
- license = licenses.gpl2;
+ license = licenses.gpl2Plus;
maintainers = with maintainers; [ etu ];
platforms = platforms.linux;
};
diff --git a/third_party/nixpkgs/pkgs/desktops/gnome-3/extensions/gsconnect/installed-tests-path.patch b/third_party/nixpkgs/pkgs/desktops/gnome-3/extensions/gsconnect/installed-tests-path.patch
new file mode 100644
index 0000000000..78e1ad96d7
--- /dev/null
+++ b/third_party/nixpkgs/pkgs/desktops/gnome-3/extensions/gsconnect/installed-tests-path.patch
@@ -0,0 +1,30 @@
+diff --git a/installed-tests/meson.build b/installed-tests/meson.build
+index c7eff2fb..ef4f6052 100644
+--- a/installed-tests/meson.build
++++ b/installed-tests/meson.build
+@@ -1,5 +1,5 @@
+-installed_tests_execdir = join_paths(libexecdir, 'installed-tests', meson.project_name())
+-installed_tests_metadir = join_paths(datadir, 'installed-tests', meson.project_name())
++installed_tests_execdir = join_paths(get_option('installed_test_prefix'), 'libexec', 'installed-tests', meson.project_name())
++installed_tests_metadir = join_paths(get_option('installed_test_prefix'), 'share', 'installed-tests', meson.project_name())
+
+ installed_tests_srcdir = meson.current_source_dir()
+ installed_tests_builddir = meson.current_build_dir()
+diff --git a/meson_options.txt b/meson_options.txt
+index 8912e052..ca6ee5eb 100644
+--- a/meson_options.txt
++++ b/meson_options.txt
+@@ -116,6 +116,13 @@ option(
+ description: 'Native Messaging Host directory for Mozilla'
+ )
+
++option(
++ 'installed_test_prefix',
++ type: 'string',
++ value: '',
++ description: 'Prefix for installed tests'
++)
++
+ option(
+ 'installed_tests',
+ type: 'boolean',
diff --git a/third_party/nixpkgs/pkgs/desktops/gnome-3/extensions/paperwm/default.nix b/third_party/nixpkgs/pkgs/desktops/gnome-3/extensions/paperwm/default.nix
index f5ffac9b2f..c2d5136e45 100644
--- a/third_party/nixpkgs/pkgs/desktops/gnome-3/extensions/paperwm/default.nix
+++ b/third_party/nixpkgs/pkgs/desktops/gnome-3/extensions/paperwm/default.nix
@@ -2,13 +2,13 @@
stdenv.mkDerivation rec {
pname = "gnome-shell-extension-paperwm";
- version = "36.0";
+ version = "38.1";
src = fetchFromGitHub {
owner = "paperwm";
repo = "PaperWM";
rev = version;
- sha256 = "1ssnabwxrns36c61ppspjkr9i3qifv08pf2jpwl7cjv3pvyn4kly";
+ sha256 = "1jq15qrq3khqpjsjbcc17amdr1k53jkvambdacdf56xbqkycvlgs";
};
uuid = "paperwm@hedning:matrix.org";
diff --git a/third_party/nixpkgs/pkgs/desktops/gnome-3/games/four-in-a-row/default.nix b/third_party/nixpkgs/pkgs/desktops/gnome-3/games/four-in-a-row/default.nix
index 3960f23300..7ed3a0d478 100644
--- a/third_party/nixpkgs/pkgs/desktops/gnome-3/games/four-in-a-row/default.nix
+++ b/third_party/nixpkgs/pkgs/desktops/gnome-3/games/four-in-a-row/default.nix
@@ -4,11 +4,11 @@
stdenv.mkDerivation rec {
pname = "four-in-a-row";
- version = "3.36.4";
+ version = "3.38.1";
src = fetchurl {
url = "mirror://gnome/sources/four-in-a-row/${stdenv.lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
- sha256 = "1y1ihh72zk0bgyj197dpwgwj1q91dhvp0rasrib8k18sisrdq31h";
+ sha256 = "10ji60bdfdzb6wk5dkwjc3yww7hqi3yjcx1k1z7x2521h2dpdli1";
};
nativeBuildInputs = [
diff --git a/third_party/nixpkgs/pkgs/desktops/gnome-3/games/gnome-chess/default.nix b/third_party/nixpkgs/pkgs/desktops/gnome-3/games/gnome-chess/default.nix
index 7747676f09..d2f9cfaa2d 100644
--- a/third_party/nixpkgs/pkgs/desktops/gnome-3/games/gnome-chess/default.nix
+++ b/third_party/nixpkgs/pkgs/desktops/gnome-3/games/gnome-chess/default.nix
@@ -3,11 +3,11 @@
stdenv.mkDerivation rec {
pname = "gnome-chess";
- version = "3.36.1";
+ version = "3.38.0";
src = fetchurl {
url = "mirror://gnome/sources/gnome-chess/${stdenv.lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
- sha256 = "165bk8s3nngyqbikggspj4rff5nxxfkfcmgzjb4grmsrgbqwk5di";
+ sha256 = "10y248xdjx9b0izxii9fjyvkra65jxfx66ivwznmn0cadda9gdqg";
};
nativeBuildInputs = [ meson ninja vala pkgconfig gettext itstool libxml2 python3 wrapGAppsHook gobject-introspection ];
diff --git a/third_party/nixpkgs/pkgs/desktops/gnome-3/games/gnome-klotski/default.nix b/third_party/nixpkgs/pkgs/desktops/gnome-3/games/gnome-klotski/default.nix
index eb6f4b10db..a51b79e0f8 100644
--- a/third_party/nixpkgs/pkgs/desktops/gnome-3/games/gnome-klotski/default.nix
+++ b/third_party/nixpkgs/pkgs/desktops/gnome-3/games/gnome-klotski/default.nix
@@ -5,13 +5,13 @@
let
pname = "gnome-klotski";
- version = "3.36.3";
+ version = "3.38.1";
in stdenv.mkDerivation rec {
name = "${pname}-${version}";
src = fetchurl {
url = "mirror://gnome/sources/${pname}/${stdenv.lib.versions.majorMinor version}/${name}.tar.xz";
- sha256 = "0fj1hlkqpjdb4hxd0di16ahm5j2r5j218ckyk88pmhjf8whb2g6z";
+ sha256 = "00rwi6z0068pbq01sq2d389ffcqsh3ylq3i8zkrqvblqid1hvnlv";
};
nativeBuildInputs = [
diff --git a/third_party/nixpkgs/pkgs/desktops/gnome-3/games/gnome-mahjongg/default.nix b/third_party/nixpkgs/pkgs/desktops/gnome-3/games/gnome-mahjongg/default.nix
index fc706b89f1..7a97002bc5 100644
--- a/third_party/nixpkgs/pkgs/desktops/gnome-3/games/gnome-mahjongg/default.nix
+++ b/third_party/nixpkgs/pkgs/desktops/gnome-3/games/gnome-mahjongg/default.nix
@@ -1,41 +1,45 @@
{ stdenv, fetchurl, pkgconfig, gnome3, gtk3, wrapGAppsHook
, librsvg, gettext, itstool, libxml2
-, meson, ninja, python3, vala, desktop-file-utils
+, meson, ninja, glib, vala, desktop-file-utils
}:
stdenv.mkDerivation rec {
pname = "gnome-mahjongg";
- version = "3.36.2";
+ version = "3.38.2";
src = fetchurl {
url = "mirror://gnome/sources/gnome-mahjongg/${stdenv.lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
- sha256 = "15xfp2acqdnn0pcwg5d77dpv758jjyclwb042wm12gg07rbg3s6j";
- };
-
- passthru = {
- updateScript = gnome3.updateScript { packageName = "gnome-mahjongg"; attrPath = "gnome3.gnome-mahjongg"; };
+ sha256 = "1wslwhr782pdzrvca7wa6smvyid5yr42kjlra6qd9ji5qss0i1wj";
};
nativeBuildInputs = [
- meson ninja vala python3 desktop-file-utils
+ meson ninja vala desktop-file-utils
pkgconfig gnome3.adwaita-icon-theme
libxml2 itstool gettext wrapGAppsHook
+ glib # for glib-compile-schemas
];
buildInputs = [
- gtk3 librsvg
+ glib
+ gtk3
+ librsvg
];
- postPatch = ''
- chmod +x data/meson_post_install.py
- patchShebangs data/meson_post_install.py
- '';
+ mesonFlags = [
+ "-Dcompile-schemas=enabled"
+ ];
+ passthru = {
+ updateScript = gnome3.updateScript {
+ packageName = pname;
+ attrPath = "gnome3.${pname}";
+ };
+ };
meta = with stdenv.lib; {
homepage = "https://wiki.gnome.org/Apps/Mahjongg";
description = "Disassemble a pile of tiles by removing matching pairs";
maintainers = teams.gnome.members;
- license = licenses.gpl2;
+ license = licenses.gpl3Plus;
platforms = platforms.linux;
};
}
diff --git a/third_party/nixpkgs/pkgs/desktops/gnome-3/games/gnome-nibbles/default.nix b/third_party/nixpkgs/pkgs/desktops/gnome-3/games/gnome-nibbles/default.nix
index a9757de639..770b8dde0c 100644
--- a/third_party/nixpkgs/pkgs/desktops/gnome-3/games/gnome-nibbles/default.nix
+++ b/third_party/nixpkgs/pkgs/desktops/gnome-3/games/gnome-nibbles/default.nix
@@ -5,11 +5,11 @@
stdenv.mkDerivation rec {
pname = "gnome-nibbles";
- version = "3.36.1";
+ version = "3.38.1";
src = fetchurl {
url = "mirror://gnome/sources/gnome-nibbles/${stdenv.lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
- sha256 = "17n6ji6yr521kzxfbfm0yxvrlnw4hlzacbwn0jqmw7xf3pdq35z6";
+ sha256 = "096mk2hsa1za002rk4cnhm0h8ps99jzl47kap27i16s4m2ny71vk";
};
nativeBuildInputs = [
diff --git a/third_party/nixpkgs/pkgs/desktops/gnome-3/games/gnome-robots/default.nix b/third_party/nixpkgs/pkgs/desktops/gnome-3/games/gnome-robots/default.nix
index 2ba6d4e704..1d9beca366 100644
--- a/third_party/nixpkgs/pkgs/desktops/gnome-3/games/gnome-robots/default.nix
+++ b/third_party/nixpkgs/pkgs/desktops/gnome-3/games/gnome-robots/default.nix
@@ -4,11 +4,11 @@
stdenv.mkDerivation rec {
pname = "gnome-robots";
- version = "3.36.1";
+ version = "3.38.0";
src = fetchurl {
url = "mirror://gnome/sources/gnome-robots/${stdenv.lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
- sha256 = "0qmdwrl70ccs3blgwmpcf3sg9k8mcvsl1dr1gds4ba3fq9ca8ipb";
+ sha256 = "1qpzpsyj9i5dsfy7anfb2dcm602bjkcgqj86fxvnxy6llx56ks0z";
};
passthru = {
diff --git a/third_party/nixpkgs/pkgs/desktops/gnome-3/games/gnome-sudoku/default.nix b/third_party/nixpkgs/pkgs/desktops/gnome-3/games/gnome-sudoku/default.nix
index 0a84e1065f..a46cfeee50 100644
--- a/third_party/nixpkgs/pkgs/desktops/gnome-3/games/gnome-sudoku/default.nix
+++ b/third_party/nixpkgs/pkgs/desktops/gnome-3/games/gnome-sudoku/default.nix
@@ -3,11 +3,11 @@
stdenv.mkDerivation rec {
pname = "gnome-sudoku";
- version = "3.36.0";
+ version = "3.38.0";
src = fetchurl {
url = "mirror://gnome/sources/gnome-sudoku/${stdenv.lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
- sha256 = "17a1r2jk5yygrxil1dycmamxyvyi64mr29mbyfgcx5hm2fylxxwm";
+ sha256 = "0cpxx63liczmax6ry06r5k0f221xpg2rqh49vkdj2snmqq61swrq";
};
nativeBuildInputs = [ meson ninja vala pkgconfig gobject-introspection gettext itstool libxml2 python3 desktop-file-utils wrapGAppsHook ];
diff --git a/third_party/nixpkgs/pkgs/desktops/gnome-3/games/gnome-taquin/default.nix b/third_party/nixpkgs/pkgs/desktops/gnome-3/games/gnome-taquin/default.nix
index 99bdffe16a..fc73ef1397 100644
--- a/third_party/nixpkgs/pkgs/desktops/gnome-3/games/gnome-taquin/default.nix
+++ b/third_party/nixpkgs/pkgs/desktops/gnome-3/games/gnome-taquin/default.nix
@@ -5,11 +5,11 @@
stdenv.mkDerivation rec {
pname = "gnome-taquin";
- version = "3.36.4";
+ version = "3.38.1";
src = fetchurl {
url = "mirror://gnome/sources/gnome-taquin/${stdenv.lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
- sha256 = "0awfssqpswsyla4gn80ifj53biwq34hcadxlknnlm7jpz0z38cp0";
+ sha256 = "0kw131q0ad0rbsp6qifjc8fjlhvjxyihil8a76kj8ya9mn7kvnwn";
};
passthru = {
diff --git a/third_party/nixpkgs/pkgs/desktops/gnome-3/games/gnome-tetravex/default.nix b/third_party/nixpkgs/pkgs/desktops/gnome-3/games/gnome-tetravex/default.nix
index f80012e22b..afa12f1cf1 100644
--- a/third_party/nixpkgs/pkgs/desktops/gnome-3/games/gnome-tetravex/default.nix
+++ b/third_party/nixpkgs/pkgs/desktops/gnome-3/games/gnome-tetravex/default.nix
@@ -5,11 +5,11 @@
stdenv.mkDerivation rec {
pname = "gnome-tetravex";
- version = "3.36.4";
+ version = "3.38.1";
src = fetchurl {
url = "mirror://gnome/sources/gnome-tetravex/${stdenv.lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
- sha256 = "0amnmd12mpny3vnf946wnphlsnbvjrvkx29sarplm57m1571qdc5";
+ sha256 = "0s70swm2acgydz77nxyzn9xv8p03la7sl3cq87s7b8g7lyw943mv";
};
passthru = {
diff --git a/third_party/nixpkgs/pkgs/desktops/gnome-3/games/hitori/default.nix b/third_party/nixpkgs/pkgs/desktops/gnome-3/games/hitori/default.nix
index 8d1c9e3dd6..7dac364dcb 100644
--- a/third_party/nixpkgs/pkgs/desktops/gnome-3/games/hitori/default.nix
+++ b/third_party/nixpkgs/pkgs/desktops/gnome-3/games/hitori/default.nix
@@ -18,11 +18,11 @@
stdenv.mkDerivation rec {
pname = "hitori";
- version = "3.36.0";
+ version = "3.38.0";
src = fetchurl {
url = "mirror://gnome/sources/hitori/${stdenv.lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
- sha256 = "0mq1jv8rbmvksnhbm1d25kcvcfr9lq58qipcacn7wa26xpx7cvs5";
+ sha256 = "0gjbbh4gym8wwa4jjg7wwifjh2h7bf6m0x23c5jjxvrf3vln9gfq";
};
nativeBuildInputs = [
diff --git a/third_party/nixpkgs/pkgs/desktops/gnome-3/games/iagno/default.nix b/third_party/nixpkgs/pkgs/desktops/gnome-3/games/iagno/default.nix
index 06831ecd0a..08d402ead5 100644
--- a/third_party/nixpkgs/pkgs/desktops/gnome-3/games/iagno/default.nix
+++ b/third_party/nixpkgs/pkgs/desktops/gnome-3/games/iagno/default.nix
@@ -19,11 +19,11 @@
stdenv.mkDerivation rec {
pname = "iagno";
- version = "3.36.4";
+ version = "3.38.1";
src = fetchurl {
url = "mirror://gnome/sources/iagno/${stdenv.lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
- sha256 = "1fh2cvyqbz8saf2wij0bz2r9bja2k4gy6fqvbvig4gv0lx66gl29";
+ sha256 = "097dw1l92l73xah9l56ka5mi3dvx48ffpiv33ni5i5rqw0ng7fc4";
};
patches = [
diff --git a/third_party/nixpkgs/pkgs/desktops/gnome-3/games/lightsoff/default.nix b/third_party/nixpkgs/pkgs/desktops/gnome-3/games/lightsoff/default.nix
index fd44bbece9..f5425205db 100644
--- a/third_party/nixpkgs/pkgs/desktops/gnome-3/games/lightsoff/default.nix
+++ b/third_party/nixpkgs/pkgs/desktops/gnome-3/games/lightsoff/default.nix
@@ -4,11 +4,11 @@
stdenv.mkDerivation rec {
pname = "lightsoff";
- version = "3.36.0";
+ version = "3.38.0";
src = fetchurl {
url = "mirror://gnome/sources/lightsoff/${stdenv.lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
- sha256 = "0qvafpciqbqmpan9i8ans3lqs29v02zblz6k0hzj4p3qq4sch3a3";
+ sha256 = "0dpnnw8v1yk1p0y08f9c9xkgswqlm8x83dfn96798nif2zbypdnh";
};
nativeBuildInputs = [
diff --git a/third_party/nixpkgs/pkgs/desktops/gnome-3/games/quadrapassel/default.nix b/third_party/nixpkgs/pkgs/desktops/gnome-3/games/quadrapassel/default.nix
index a5302fee7a..9bc1c5ee73 100644
--- a/third_party/nixpkgs/pkgs/desktops/gnome-3/games/quadrapassel/default.nix
+++ b/third_party/nixpkgs/pkgs/desktops/gnome-3/games/quadrapassel/default.nix
@@ -6,11 +6,11 @@
stdenv.mkDerivation rec {
pname = "quadrapassel";
- version = "3.36.05";
+ version = "3.38.1";
src = fetchurl {
url = "mirror://gnome/sources/${pname}/${stdenv.lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
- sha256 = "04abxmimh5npw8rhz1sfi6wxilgc6i1wka9mlnfwp8v1p1cb00cv";
+ sha256 = "033plabc6q3sk6qjr5nml8z6p07vcw57gxddxjk9b65wgg0rzzhr";
};
nativeBuildInputs = [
diff --git a/third_party/nixpkgs/pkgs/desktops/gnome-3/games/tali/default.nix b/third_party/nixpkgs/pkgs/desktops/gnome-3/games/tali/default.nix
index 2fd1d034db..fea6ce571e 100644
--- a/third_party/nixpkgs/pkgs/desktops/gnome-3/games/tali/default.nix
+++ b/third_party/nixpkgs/pkgs/desktops/gnome-3/games/tali/default.nix
@@ -1,15 +1,15 @@
{ stdenv, fetchurl, pkgconfig, gtk3, gnome3, gdk-pixbuf
-, librsvg, gettext, itstool, libxml2, wrapGAppsHook
+, librsvg, libgnome-games-support, gettext, itstool, libxml2, wrapGAppsHook
, meson, ninja, python3, desktop-file-utils
}:
stdenv.mkDerivation rec {
pname = "tali";
- version = "3.36.4";
+ version = "3.38.0";
src = fetchurl {
url = "mirror://gnome/sources/tali/${stdenv.lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
- sha256 = "12h6783m4634zzprlk31j0dmvgzrfjklhl0z49fdwcziw5bszr3c";
+ sha256 = "196f6hiap61sdqr7kvywk74yl0m2j7fvqml37p6cgfm7gfrhrvi9";
};
passthru = {
@@ -21,7 +21,7 @@ stdenv.mkDerivation rec {
pkgconfig gnome3.adwaita-icon-theme
libxml2 itstool gettext wrapGAppsHook
];
- buildInputs = [ gtk3 gdk-pixbuf librsvg ];
+ buildInputs = [ gtk3 gdk-pixbuf librsvg libgnome-games-support ];
postPatch = ''
chmod +x build-aux/meson_post_install.py
diff --git a/third_party/nixpkgs/pkgs/desktops/gnome-3/misc/geary/Bump-client-test-timeout-to-300s.patch b/third_party/nixpkgs/pkgs/desktops/gnome-3/misc/geary/Bump-client-test-timeout-to-300s.patch
new file mode 100644
index 0000000000..abd8772cf3
--- /dev/null
+++ b/third_party/nixpkgs/pkgs/desktops/gnome-3/misc/geary/Bump-client-test-timeout-to-300s.patch
@@ -0,0 +1,10 @@
+diff --git a/test/meson.build b/test/meson.build
+index 6ea5e27a..450c03e3 100644
+--- a/test/meson.build
++++ b/test/meson.build
+@@ -167,4 +167,4 @@ test_integration_bin = executable('test-integration',
+ )
+
+ test('engine-tests', test_engine_bin)
+-test('client-tests', test_client_bin)
++test('client-tests', test_client_bin, timeout: 300)
diff --git a/third_party/nixpkgs/pkgs/desktops/gnome-3/misc/geary/default.nix b/third_party/nixpkgs/pkgs/desktops/gnome-3/misc/geary/default.nix
index 0326e38aba..6390b03efa 100644
--- a/third_party/nixpkgs/pkgs/desktops/gnome-3/misc/geary/default.nix
+++ b/third_party/nixpkgs/pkgs/desktops/gnome-3/misc/geary/default.nix
@@ -1,44 +1,111 @@
-{ stdenv, fetchurl, pkgconfig, gtk3, vala, enchant2, wrapGAppsHook, meson, ninja
-, desktop-file-utils, gnome-online-accounts, gsettings-desktop-schemas, adwaita-icon-theme
-, libpeas, libsecret, gmime3, isocodes, libxml2, gettext, fetchpatch
-, sqlite, gcr, json-glib, itstool, libgee, gnome3, webkitgtk, python3
-, xvfb_run, dbus, shared-mime-info, libunwind, folks, glib-networking
-, gobject-introspection, gspell, appstream-glib, libytnef, libhandy }:
+{ stdenv
+, fetchurl
+, fetchpatch
+, pkgconfig
+, gtk3
+, vala
+, enchant2
+, wrapGAppsHook
+, meson
+, ninja
+, desktop-file-utils
+, gnome-online-accounts
+, gsettings-desktop-schemas
+, adwaita-icon-theme
+, libpeas
+, libsecret
+, gmime3
+, isocodes
+, libxml2
+, gettext
+, sqlite
+, gcr
+, json-glib
+, itstool
+, libgee
+, gnome3
+, webkitgtk
+, python3
+, gnutls
+, cacert
+, xvfb_run
+, glibcLocales
+, dbus
+, shared-mime-info
+, libunwind
+, folks
+, glib-networking
+, gobject-introspection
+, gspell
+, appstream-glib
+, libytnef
+, libhandy
+, gsound
+}:
stdenv.mkDerivation rec {
pname = "geary";
- version = "3.36.2";
+ version = "3.38.1";
src = fetchurl {
url = "mirror://gnome/sources/${pname}/${stdenv.lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
- sha256 = "09l2lbcn3ar3scw6iylmdqi1lhpb408iqs6056d0wzx2l9nkmqis";
+ sha256 = "04p8fjkz4xp5afp0ld1m09pnv0zkcx51l7hf23amfrjkk0kj2bp7";
};
- nativeBuildInputs = [
- desktop-file-utils gettext itstool libxml2 meson ninja
- pkgconfig vala wrapGAppsHook python3 appstream-glib
- gobject-introspection
- ];
-
- buildInputs = [
- adwaita-icon-theme enchant2 gcr gmime3 gnome-online-accounts
- gsettings-desktop-schemas gtk3 isocodes json-glib libpeas
- libgee libsecret sqlite webkitgtk glib-networking
- libunwind folks gspell libytnef libhandy
- ];
-
- checkInputs = [ xvfb_run dbus ];
-
- mesonFlags = [
- "-Dcontractor=true" # install the contractor file (Pantheon specific)
- ];
-
patches = [
# Longer timeout for client test.
- (fetchpatch {
- url = "https://salsa.debian.org/gnome-team/geary/raw/04be1e058a2e65075dd8cf8843d469ee45a9e09a/debian/patches/Bump-client-test-timeout-to-300s.patch";
- sha256 = "1zvnq8bgla160531bjdra8hcg15mp8r1j1n53m1xfgm0ssnj5knx";
- })
+ ./Bump-client-test-timeout-to-300s.patch
+ ];
+
+ nativeBuildInputs = [
+ appstream-glib
+ desktop-file-utils
+ gettext
+ gobject-introspection
+ itstool
+ libxml2
+ meson
+ ninja
+ pkgconfig
+ python3
+ vala
+ wrapGAppsHook
+ ];
+
+ buildInputs = [
+ adwaita-icon-theme
+ enchant2
+ folks
+ gcr
+ glib-networking
+ gmime3
+ gnome-online-accounts
+ gsettings-desktop-schemas
+ gsound
+ gspell
+ gtk3
+ isocodes
+ json-glib
+ libgee
+ libhandy
+ libpeas
+ libsecret
+ libunwind
+ libytnef
+ sqlite
+ webkitgtk
+ ];
+
+ checkInputs = [
+ dbus
+ gnutls # for certtool
+ cacert # trust store for glib-networking
+ xvfb_run
+ glibcLocales # required by Geary.ImapDb.DatabaseTest/utf8_case_insensitive_collation
+ ];
+
+ mesonFlags = [
+ "-Dcontractor=true" # install the contractor file (Pantheon specific)
];
# NOTE: Remove `build-auxyaml_to_json.py` when no longer needed, see:
@@ -54,12 +121,12 @@ stdenv.mkDerivation rec {
chmod +x desktop/geary-attach
'';
- # FIXME: fix tests
- doCheck = false;
+ doCheck = true;
checkPhase = ''
NO_AT_BRIDGE=1 \
- XDG_DATA_DIRS=:$XDG_DATA_DIRS:${gsettings-desktop-schemas}/share/gsettings-schemas/${gsettings-desktop-schemas.name}:${shared-mime-info}/share \
+ GIO_EXTRA_MODULES=$GIO_EXTRA_MODULES:${glib-networking}/lib/gio/modules \
+ XDG_DATA_DIRS=$XDG_DATA_DIRS:${gsettings-desktop-schemas}/share/gsettings-schemas/${gsettings-desktop-schemas.name}:${shared-mime-info}/share:${folks}/share/gsettings-schemas/${folks.name} \
xvfb-run -s '-screen 0 800x600x24' dbus-run-session \
--config-file=${dbus.daemon}/share/dbus-1/session.conf \
meson test -v --no-stdsplit
diff --git a/third_party/nixpkgs/pkgs/desktops/gnome-3/misc/gnome-applets/default.nix b/third_party/nixpkgs/pkgs/desktops/gnome-3/misc/gnome-applets/default.nix
index a33376618c..cc9e0a29d8 100644
--- a/third_party/nixpkgs/pkgs/desktops/gnome-3/misc/gnome-applets/default.nix
+++ b/third_party/nixpkgs/pkgs/desktops/gnome-3/misc/gnome-applets/default.nix
@@ -1,10 +1,9 @@
{ stdenv
, fetchurl
-, intltool
+, gettext
, itstool
, libxml2
-, libxslt
-, pkgconfig
+, pkg-config
, gnome-panel
, gtk3
, glib
@@ -22,23 +21,20 @@
, gnome3
}:
-let
+stdenv.mkDerivation rec {
pname = "gnome-applets";
- version = "3.36.4";
-in stdenv.mkDerivation rec {
- name = "${pname}-${version}";
+ version = "3.38.0";
src = fetchurl {
- url = "mirror://gnome/sources/${pname}/${stdenv.lib.versions.majorMinor version}/${name}.tar.xz";
- sha256 = "1cd7y2air9cjznqmnynadbsayvq4dpsi39avnz46vv0bavx1aiwz";
+ url = "mirror://gnome/sources/${pname}/${stdenv.lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
+ sha256 = "04qrzycwm7pz556agl08xw3d0r1mmr4ja9n9jfijjxs9inrhp5yc";
};
nativeBuildInputs = [
- intltool
+ gettext
itstool
- pkgconfig
+ pkg-config
libxml2
- libxslt
];
buildInputs = [
@@ -53,7 +49,7 @@ in stdenv.mkDerivation rec {
adwaita-icon-theme
libgweather
gucharmap
- tracker
+ # tracker # Tracker 3 not supported.
polkit
wirelesstools
linuxPackages.cpupower
@@ -63,9 +59,8 @@ in stdenv.mkDerivation rec {
doCheck = true;
- configureFlags = [
- "--with-libpanel-applet-dir=${placeholder "out"}/share/gnome-panel/applets"
- ];
+ # Don't try to install modules to gnome panel's directory, as it's read only
+ PKG_CONFIG_LIBGNOME_PANEL_MODULESDIR = "${placeholder "out"}/lib/gnome-panel/modules";
passthru = {
updateScript = gnome3.updateScript {
diff --git a/third_party/nixpkgs/pkgs/desktops/gnome-3/misc/gnome-flashback/default.nix b/third_party/nixpkgs/pkgs/desktops/gnome-3/misc/gnome-flashback/default.nix
index cde21551a8..93b8fc2251 100644
--- a/third_party/nixpkgs/pkgs/desktops/gnome-3/misc/gnome-flashback/default.nix
+++ b/third_party/nixpkgs/pkgs/desktops/gnome-3/misc/gnome-flashback/default.nix
@@ -27,10 +27,9 @@
, xkeyboard_config
, runCommand
}:
-
let
pname = "gnome-flashback";
- version = "3.36.3";
+ version = "3.38.0";
# From data/sessions/Makefile.am
requiredComponentsCommon = [
@@ -55,13 +54,13 @@ let
"org.gnome.SettingsDaemon.Wacom"
"org.gnome.SettingsDaemon.XSettings"
];
- requiredComponents = wmName: "RequiredComponents=${stdenv.lib.concatStringsSep ";" ([wmName] ++ requiredComponentsCommon ++ requiredComponentsGsd)};";
+ requiredComponents = wmName: "RequiredComponents=${stdenv.lib.concatStringsSep ";" ([ wmName ] ++ requiredComponentsCommon ++ requiredComponentsGsd)};";
gnome-flashback = stdenv.mkDerivation rec {
name = "${pname}-${version}";
src = fetchurl {
url = "mirror://gnome/sources/${pname}/${stdenv.lib.versions.majorMinor version}/${name}.tar.xz";
- sha256 = "19y1a4kq6db6a19basss76l4rypiz0lwr32ajli1ra1d1yj9xfid";
+ sha256 = "1r51yqdqichp4jv54kiaqrh0xhykngr4ymlvrkjhzdhivwadsg4m";
};
# make .desktop Execs absolute
@@ -143,44 +142,46 @@ let
'';
};
- gnomeSession = writeTextFile {
- name = "gnome-flashback-${wmName}-gnome-session";
- destination = "/share/gnome-session/sessions/gnome-flashback-${wmName}.session";
- text = ''
- [GNOME Session]
- Name=GNOME Flashback (${wmLabel})
- ${requiredComponents wmName}
+ gnomeSession = writeTextFile {
+ name = "gnome-flashback-${wmName}-gnome-session";
+ destination = "/share/gnome-session/sessions/gnome-flashback-${wmName}.session";
+ text = ''
+ [GNOME Session]
+ Name=GNOME Flashback (${wmLabel})
+ ${requiredComponents wmName}
+ '';
+ };
+
+ executable = writeShellScriptBin "gnome-flashback-${wmName}" ''
+ if [ -z $XDG_CURRENT_DESKTOP ]; then
+ export XDG_CURRENT_DESKTOP="GNOME-Flashback:GNOME"
+ fi
+
+ export XDG_DATA_DIRS=${wmApplication}/share:${gnomeSession}/share:${gnome-flashback}/share:${gnome-panel}/share:$XDG_DATA_DIRS
+
+ exec ${gnome-session}/bin/gnome-session --session=gnome-flashback-${wmName} "$@"
'';
+
+ in
+ writeTextFile
+ {
+ name = "gnome-flashback-${wmName}-xsession";
+ destination = "/share/xsessions/gnome-flashback-${wmName}.desktop";
+ text = ''
+ [Desktop Entry]
+ Name=GNOME Flashback (${wmLabel})
+ Comment=This session logs you into GNOME Flashback with ${wmLabel}
+ Exec=${executable}/bin/gnome-flashback-${wmName}
+ TryExec=${wmCommand}
+ Type=Application
+ DesktopNames=GNOME-Flashback;GNOME;
+ '';
+ } // {
+ providedSessions = [ "gnome-flashback-${wmName}" ];
};
- executable = writeShellScriptBin "gnome-flashback-${wmName}" ''
- if [ -z $XDG_CURRENT_DESKTOP ]; then
- export XDG_CURRENT_DESKTOP="GNOME-Flashback:GNOME"
- fi
-
- export XDG_DATA_DIRS=${wmApplication}/share:${gnomeSession}/share:${gnome-flashback}/share:${gnome-panel}/share:$XDG_DATA_DIRS
-
- exec ${gnome-session}/bin/gnome-session --session=gnome-flashback-${wmName} "$@"
- '';
-
- in writeTextFile {
- name = "gnome-flashback-${wmName}-xsession";
- destination = "/share/xsessions/gnome-flashback-${wmName}.desktop";
- text = ''
- [Desktop Entry]
- Name=GNOME Flashback (${wmLabel})
- Comment=This session logs you into GNOME Flashback with ${wmLabel}
- Exec=${executable}/bin/gnome-flashback-${wmName}
- TryExec=${wmCommand}
- Type=Application
- DesktopNames=GNOME-Flashback;GNOME;
- '';
- } // {
- providedSessions = [ "gnome-flashback-${wmName}" ];
- };
-
mkSystemdTargetForWm = { wmName }:
- runCommand "gnome-flashback-${wmName}.target" {} ''
+ runCommand "gnome-flashback-${wmName}.target" { } ''
mkdir -p $out/lib/systemd/user
cp "${gnome-flashback}/lib/systemd/user/gnome-session-x11@gnome-flashback-metacity.target" \
"$out/lib/systemd/user/gnome-session-x11@gnome-flashback-${wmName}.target"
@@ -195,4 +196,5 @@ let
platforms = platforms.linux;
};
};
- in gnome-flashback
+in
+gnome-flashback
diff --git a/third_party/nixpkgs/pkgs/desktops/gnome-3/misc/gnome-panel/default.nix b/third_party/nixpkgs/pkgs/desktops/gnome-3/misc/gnome-panel/default.nix
index 037c781210..518d8e1983 100644
--- a/third_party/nixpkgs/pkgs/desktops/gnome-3/misc/gnome-panel/default.nix
+++ b/third_party/nixpkgs/pkgs/desktops/gnome-3/misc/gnome-panel/default.nix
@@ -18,19 +18,18 @@
, pkgconfig
, polkit
, systemd
-, wrapGAppsHook }:
+, wrapGAppsHook
+}:
-let
+stdenv.mkDerivation rec {
pname = "gnome-panel";
- version = "3.36.2";
-in stdenv.mkDerivation rec {
- name = "${pname}-${version}";
+ version = "3.38.0";
outputs = [ "out" "dev" "man" ];
src = fetchurl {
- url = "mirror://gnome/sources/${pname}/${stdenv.lib.versions.majorMinor version}/${name}.tar.xz";
- sha256 = "0z0f64rgcwkv48kfd1ifzjvnmg3c386hwi9cj11mr5198rah0p4p";
+ url = "mirror://gnome/sources/${pname}/${stdenv.lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
+ hash = "sha256-GosVrvCgKmyqm5IJyNP7Q+e5h6OAB2aRwj8DFOwwLxU=";
};
# make .desktop Exec absolute
diff --git a/third_party/nixpkgs/pkgs/desktops/gnome-3/misc/gnome-tweaks/default.nix b/third_party/nixpkgs/pkgs/desktops/gnome-3/misc/gnome-tweaks/default.nix
index 0271992b64..a51eb854e7 100644
--- a/third_party/nixpkgs/pkgs/desktops/gnome-3/misc/gnome-tweaks/default.nix
+++ b/third_party/nixpkgs/pkgs/desktops/gnome-3/misc/gnome-tweaks/default.nix
@@ -1,6 +1,6 @@
{ stdenv, meson, ninja, gettext, fetchurl
, pkgconfig, gtk3, glib, libsoup, gsettings-desktop-schemas
-, itstool, libxml2, python3Packages, libhandy
+, itstool, libxml2, python3Packages, libhandy_0
, gnome3, gdk-pixbuf, libnotify, gobject-introspection, wrapGAppsHook }:
let
@@ -23,7 +23,7 @@ in stdenv.mkDerivation rec {
libnotify gnome3.gnome-shell python3Packages.pygobject3
libsoup gnome3.gnome-settings-daemon gnome3.nautilus
gnome3.mutter gnome3.gnome-desktop gobject-introspection
- gnome3.nautilus libhandy
+ gnome3.nautilus libhandy_0
# Makes it possible to select user themes through the `user-theme` extension
gnome3.gnome-shell-extensions
];
diff --git a/third_party/nixpkgs/pkgs/desktops/gnome-3/misc/gpaste/default.nix b/third_party/nixpkgs/pkgs/desktops/gnome-3/misc/gpaste/default.nix
index 59b87c3367..0071d2415c 100644
--- a/third_party/nixpkgs/pkgs/desktops/gnome-3/misc/gpaste/default.nix
+++ b/third_party/nixpkgs/pkgs/desktops/gnome-3/misc/gpaste/default.nix
@@ -17,14 +17,14 @@
}:
stdenv.mkDerivation rec {
- version = "3.36.3";
+ version = "3.38.3";
pname = "gpaste";
src = fetchFromGitHub {
owner = "Keruspe";
repo = "GPaste";
rev = "v${version}";
- sha256 = "1p1p2ng095lkly5fp9120b23wlvkj1xf4fhivzsd72css0szy7mi";
+ sha256 = "10ag0mrr4r40414nyarghpgjawvf331asxgq47dqjfxr5w7bz6wc";
};
patches = [
diff --git a/third_party/nixpkgs/pkgs/desktops/gnome-3/misc/libgnome-games-support/default.nix b/third_party/nixpkgs/pkgs/desktops/gnome-3/misc/libgnome-games-support/default.nix
index 1f9afefd2e..fb472ffff1 100644
--- a/third_party/nixpkgs/pkgs/desktops/gnome-3/misc/libgnome-games-support/default.nix
+++ b/third_party/nixpkgs/pkgs/desktops/gnome-3/misc/libgnome-games-support/default.nix
@@ -1,22 +1,43 @@
-{ stdenv, fetchurl, pkgconfig, glib, gtk3, libgee, gettext, vala, gnome3
-, libintl, meson, ninja }:
+{ stdenv
+, fetchurl
+, pkgconfig
+, glib
+, gtk3
+, libgee
+, gettext
+, vala
+, gnome3
+, libintl
+, meson
+, ninja
+}:
-let
+stdenv.mkDerivation rec {
pname = "libgnome-games-support";
- version = "1.6.1";
-in stdenv.mkDerivation rec {
- name = "${pname}-${version}";
+ version = "1.8.0";
src = fetchurl {
- url = "mirror://gnome/sources/${pname}/${stdenv.lib.versions.majorMinor version}/${name}.tar.xz";
- sha256 = "1gq8p38k92lsr6dbav6pgmw0adnzzhcs06jqdkr37p145vv6ls7v";
+ url = "mirror://gnome/sources/${pname}/${stdenv.lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
+ sha256 = "1pdk9hc30xdlv0ba24f7pvcr2d5370zykrmpws7hgmjgl4wfbpdb";
};
- nativeBuildInputs = [ meson ninja pkgconfig gettext vala ];
- buildInputs = [ libintl ];
+ nativeBuildInputs = [
+ gettext
+ meson
+ ninja
+ pkgconfig
+ vala
+ ];
+
+ buildInputs = [
+ libintl
+ ];
+
propagatedBuildInputs = [
# Required by libgnome-games-support-1.pc
- glib gtk3 libgee
+ glib
+ gtk3
+ libgee
];
passthru = {
diff --git a/third_party/nixpkgs/pkgs/desktops/gnome-3/misc/metacity/default.nix b/third_party/nixpkgs/pkgs/desktops/gnome-3/misc/metacity/default.nix
index e62c6fe7fe..04008f4c84 100644
--- a/third_party/nixpkgs/pkgs/desktops/gnome-3/misc/metacity/default.nix
+++ b/third_party/nixpkgs/pkgs/desktops/gnome-3/misc/metacity/default.nix
@@ -5,6 +5,7 @@
, gnome3
, gsettings-desktop-schemas
, gtk3
+, xorg
, libcanberra-gtk3
, libgtop
, libstartup_notification
@@ -12,17 +13,16 @@
, pkgconfig
, substituteAll
, wrapGAppsHook
-, zenity }:
+, zenity
+}:
-let
+stdenv.mkDerivation rec {
pname = "metacity";
- version = "3.36.1";
-in stdenv.mkDerivation rec {
- name = "${pname}-${version}";
+ version = "3.38.0";
src = fetchurl {
- url = "mirror://gnome/sources/${pname}/${stdenv.lib.versions.majorMinor version}/${name}.tar.xz";
- sha256 = "08xkq5i6czvms0ygbj7ywzl70q1l0z44nfh6b43q8rmjwa9pdw0i";
+ url = "mirror://gnome/sources/${pname}/${stdenv.lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
+ sha256 = "1b0i9sq6qa540f2006cv1p8i6lxg1h6w00apxwzwjpfqn0hk26c1";
};
patches = [
@@ -40,6 +40,8 @@ in stdenv.mkDerivation rec {
];
buildInputs = [
+ xorg.libXres
+ xorg.libXpresent
glib
gsettings-desktop-schemas
gtk3
diff --git a/third_party/nixpkgs/pkgs/desktops/pantheon/apps/appcenter/default.nix b/third_party/nixpkgs/pkgs/desktops/pantheon/apps/appcenter/default.nix
index 18ee7bdd84..21ffef71ca 100644
--- a/third_party/nixpkgs/pkgs/desktops/pantheon/apps/appcenter/default.nix
+++ b/third_party/nixpkgs/pkgs/desktops/pantheon/apps/appcenter/default.nix
@@ -25,7 +25,7 @@
, python3
, vala
, polkit
-, libhandy
+, libhandy_0
, wrapGAppsHook
}:
@@ -69,7 +69,7 @@ stdenv.mkDerivation rec {
gtk3
json-glib
libgee
- libhandy
+ libhandy_0 # doesn't support libhandy-1 yet
libsoup
libxml2
packagekit
diff --git a/third_party/nixpkgs/pkgs/desktops/pantheon/apps/switchboard-plugs/onlineaccounts/default.nix b/third_party/nixpkgs/pkgs/desktops/pantheon/apps/switchboard-plugs/onlineaccounts/default.nix
index 16e8c7e66c..913fa58e28 100644
--- a/third_party/nixpkgs/pkgs/desktops/pantheon/apps/switchboard-plugs/onlineaccounts/default.nix
+++ b/third_party/nixpkgs/pkgs/desktops/pantheon/apps/switchboard-plugs/onlineaccounts/default.nix
@@ -62,6 +62,12 @@ stdenv.mkDerivation rec {
url = "https://github.com/elementary/switchboard-plug-onlineaccounts/commit/5fa2882f765076d20c6ef4886198a34a05159f8a.patch";
sha256 = "1szryyy7shdmbvx9yhpi0bhzaayg7hl6pq2c456j1qf9kfv0m4hf";
})
+
+ # fix build with vala 0.48.9
+ (fetchpatch {
+ url = "https://github.com/elementary/switchboard-plug-onlineaccounts/commit/b1853b7427102b8dd94774e1e2cc455f50902263.patch";
+ sha256 = "J3C71GyEHEZWSghGXlwXPHFJRhrvx6i0yvi8NIDb4WE=";
+ })
];
PKG_CONFIG_LIBACCOUNTS_GLIB_PROVIDERFILESDIR = "${placeholder "out"}/share/accounts/providers";
diff --git a/third_party/nixpkgs/pkgs/desktops/pantheon/desktop/elementary-onboarding/default.nix b/third_party/nixpkgs/pkgs/desktops/pantheon/desktop/elementary-onboarding/default.nix
index 31ed7f3672..73de43594b 100644
--- a/third_party/nixpkgs/pkgs/desktops/pantheon/desktop/elementary-onboarding/default.nix
+++ b/third_party/nixpkgs/pkgs/desktops/pantheon/desktop/elementary-onboarding/default.nix
@@ -32,6 +32,17 @@ stdenv.mkDerivation rec {
sha256 = "sha256-tLTwXA2miHqYqCUbIiBjb2nQB+uN/WzuE4F9m3fVCbM=";
};
+ patches = [
+ # Port to Libhandy-1
+ (fetchpatch {
+ url = "https://github.com/elementary/onboarding/commit/8af6b7d9216f8cbf725f708b36ef4d4f6c400c78.patch";
+ sha256 = "cnSCSSFEQlNd9Ncw5VCJ32stZ8D4vhl3f+derAk/Cas=";
+ excludes = [
+ ".github/workflows/main.yml"
+ ];
+ })
+ ];
+
passthru = {
updateScript = nix-update-script {
attrPath = "pantheon.${pname}";
diff --git a/third_party/nixpkgs/pkgs/desktops/pantheon/desktop/wingpanel-indicators/applications-menu/default.nix b/third_party/nixpkgs/pkgs/desktops/pantheon/desktop/wingpanel-indicators/applications-menu/default.nix
index 94d91329e3..27e6215b78 100644
--- a/third_party/nixpkgs/pkgs/desktops/pantheon/desktop/wingpanel-indicators/applications-menu/default.nix
+++ b/third_party/nixpkgs/pkgs/desktops/pantheon/desktop/wingpanel-indicators/applications-menu/default.nix
@@ -1,5 +1,6 @@
{ stdenv
, fetchFromGitHub
+, fetchpatch
, nix-update-script
, pantheon
, substituteAll
@@ -82,6 +83,12 @@ stdenv.mkDerivation rec {
];
patches = [
+ # Port to Libhandy-1
+ (fetchpatch {
+ url = "https://github.com/elementary/applications-menu/commit/8eb2430e8513e9d37f875c5c9b8b15a968c27127.patch";
+ sha256 = "8Uw9mUw7U5nrAwUDGVpAwoRqb9ah503wQCr9kPbBJIo=";
+ })
+
(substituteAll {
src = ./fix-paths.patch;
bc = "${bc}/bin/bc";
diff --git a/third_party/nixpkgs/pkgs/desktops/plasma-5/default.nix b/third_party/nixpkgs/pkgs/desktops/plasma-5/default.nix
index 265c22b556..39299d8c83 100644
--- a/third_party/nixpkgs/pkgs/desktops/plasma-5/default.nix
+++ b/third_party/nixpkgs/pkgs/desktops/plasma-5/default.nix
@@ -129,6 +129,7 @@ let
plasma-integration = callPackage ./plasma-integration {};
plasma-nm = callPackage ./plasma-nm {};
plasma-pa = callPackage ./plasma-pa.nix { inherit gconf; };
+ plasma-thunderbolt = callPackage ./plasma-thunderbolt.nix { };
plasma-vault = callPackage ./plasma-vault {};
plasma-workspace = callPackage ./plasma-workspace {};
plasma-workspace-wallpapers = callPackage ./plasma-workspace-wallpapers.nix {};
diff --git a/third_party/nixpkgs/pkgs/desktops/plasma-5/plasma-thunderbolt.nix b/third_party/nixpkgs/pkgs/desktops/plasma-5/plasma-thunderbolt.nix
new file mode 100644
index 0000000000..1bb79c327e
--- /dev/null
+++ b/third_party/nixpkgs/pkgs/desktops/plasma-5/plasma-thunderbolt.nix
@@ -0,0 +1,16 @@
+{ mkDerivation
+, extra-cmake-modules
+, kcmutils
+, kcoreaddons
+, bolt
+}:
+
+mkDerivation {
+ name = "plasma-thunderbolt";
+ nativeBuildInputs = [ extra-cmake-modules ];
+ buildInputs = [
+ kcmutils
+ kcoreaddons
+ bolt
+ ];
+}
diff --git a/third_party/nixpkgs/pkgs/development/compilers/4th/default.nix b/third_party/nixpkgs/pkgs/development/compilers/4th/default.nix
new file mode 100644
index 0000000000..ee3050b8ba
--- /dev/null
+++ b/third_party/nixpkgs/pkgs/development/compilers/4th/default.nix
@@ -0,0 +1,39 @@
+{ stdenv, fetchurl }:
+
+stdenv.mkDerivation rec {
+ pname = "4th";
+ version = "3.62.5";
+
+ src = fetchurl {
+ url = "https://sourceforge.net/projects/forth-4th/files/${pname}-${version}/${pname}-${version}-unix.tar.gz";
+ sha256 = "sha256-+CL33Yz7CxdEpi1lPG7+kzV4rheJ7GCgiFCaOLyktPw=";
+ };
+
+ dontConfigure = true;
+
+ makeFlags = [
+ "-C sources"
+ "CC=${stdenv.cc}/bin/cc"
+ ];
+
+ preInstall = ''
+ install -d ${placeholder "out"}/bin \
+ ${placeholder "out"}/lib \
+ ${placeholder "out"}/share/doc/${pname} \
+ ${placeholder "out"}/share/man
+ '';
+
+ installFlags = [
+ "BINARIES=${placeholder "out"}/bin"
+ "LIBRARIES=${placeholder "out"}/lib"
+ "DOCDIR=${placeholder "out"}/share/doc"
+ "MANDIR=${placeholder "out"}/share/man"
+ ];
+
+ meta = with stdenv.lib; {
+ description = "A portable Forth compiler";
+ homepage = "https://thebeez.home.xs4all.nl/4tH/index.html";
+ license = licenses.lgpl3;
+ platforms = platforms.linux;
+ };
+}
diff --git a/third_party/nixpkgs/pkgs/development/compilers/bluespec/default.nix b/third_party/nixpkgs/pkgs/development/compilers/bluespec/default.nix
index 09e76d6323..e1728e8c93 100644
--- a/third_party/nixpkgs/pkgs/development/compilers/bluespec/default.nix
+++ b/third_party/nixpkgs/pkgs/development/compilers/bluespec/default.nix
@@ -90,6 +90,6 @@ in stdenv.mkDerivation rec {
platforms = [ "x86_64-linux" ];
# darwin fails at https://github.com/B-Lang-org/bsc/pull/35#issuecomment-583731562
# aarch64 fails, as GHC fails with "ghc: could not execute: opt"
- maintainers = with stdenv.lib.maintainers; [ flokli thoughtpolice ];
+ maintainers = with stdenv.lib.maintainers; [ jcumming thoughtpolice ];
};
}
diff --git a/third_party/nixpkgs/pkgs/development/compilers/compcert/default.nix b/third_party/nixpkgs/pkgs/development/compilers/compcert/default.nix
index 8c8a56d8e2..3dea91970e 100644
--- a/third_party/nixpkgs/pkgs/development/compilers/compcert/default.nix
+++ b/third_party/nixpkgs/pkgs/development/compilers/compcert/default.nix
@@ -3,9 +3,6 @@
, tools ? stdenv.cc
}:
-assert lib.versionAtLeast ocamlPackages.ocaml.version "4.02";
-assert lib.versionAtLeast coq.coq-version "8.8.0";
-
let
ocaml-pkgs = with ocamlPackages; [ ocaml findlib menhir ];
ccomp-platform = if stdenv.isDarwin then "x86_64-macosx" else "x86_64-linux";
diff --git a/third_party/nixpkgs/pkgs/development/compilers/dasm/default.nix b/third_party/nixpkgs/pkgs/development/compilers/dasm/default.nix
index 6ab729cd31..627ac36329 100644
--- a/third_party/nixpkgs/pkgs/development/compilers/dasm/default.nix
+++ b/third_party/nixpkgs/pkgs/development/compilers/dasm/default.nix
@@ -2,13 +2,13 @@
stdenv.mkDerivation rec {
pname = "dasm";
- version = "2.20.14";
+ version = "2.20.14.1";
src = fetchFromGitHub {
owner = "dasm-assembler";
repo = "dasm";
rev = version;
- sha256 = "09hzw228j43a78624bmq9cam7y1fjs48d3hpjqh2gn8iwnyk0pnp";
+ sha256 = "1bna0bj503xyn5inwzzsrsgi9qg8p20by4dfk7azj91ynw56pl41";
};
configurePhase = false;
diff --git a/third_party/nixpkgs/pkgs/development/compilers/dmd/binary.nix b/third_party/nixpkgs/pkgs/development/compilers/dmd/binary.nix
index cd3a15889b..2ff2b35060 100644
--- a/third_party/nixpkgs/pkgs/development/compilers/dmd/binary.nix
+++ b/third_party/nixpkgs/pkgs/development/compilers/dmd/binary.nix
@@ -17,7 +17,8 @@ in mkDerivation {
dontConfigure = true;
dontBuild = true;
- nativeBuildInputs = [ fixDarwinDylibNames autoPatchelfHook ];
+ nativeBuildInputs = [ autoPatchelfHook ]
+ ++ lib.optional hostPlatform.isDarwin fixDarwinDylibNames;
propagatedBuildInputs = [ curl tzdata ] ++ lib.optional hostPlatform.isLinux glibc;
installPhase = ''
diff --git a/third_party/nixpkgs/pkgs/development/compilers/dotnet/default.nix b/third_party/nixpkgs/pkgs/development/compilers/dotnet/default.nix
index b4d6a0933e..54784ea63c 100644
--- a/third_party/nixpkgs/pkgs/development/compilers/dotnet/default.nix
+++ b/third_party/nixpkgs/pkgs/development/compilers/dotnet/default.nix
@@ -105,12 +105,30 @@ rec {
# v5.0.0
- sdk_5_0 = buildNetCoreSdk {
- version = "5.0.100-rc.1.20452.10";
+ aspnetcore_5_0 = buildAspNetCore {
+ version = "5.0.0";
sha512 = {
- x86_64-linux = "d7e709dacc4bb188c2380060d24bfb5b791240dc33af8499fb4a31e1885a9377dad1d1ebc76847432ea67d5e4ac832a31679dc293e09fa6dade28f5fbbe4db9b";
- aarch64-linux = "2d04890c71e845d1eb08f5dfbbb9c93024d7a52fb1cc3fd50bd51bc6bd44e455c5c82abc8f04eef23bd012984ae5f86143c600ceb49c4c733935d95d5b68785f";
- x86_64-darwin = "06bb40273071f3dd1e84ebf58abc7798795d5f1ac298f24bf7109d1597fd52ff31bcbf2b81f86d91d37ae293678d07f8da0469d7cbd318d19a8d718b6629dcac";
+ x86_64-linux = "402046ee144915ef7d75a788cf19552eea56cf897681721b74bfc403fd366f71eb7e56f6b83ea299b6b812c6b87378c15e7bfe249415427dcd147dfeacd084d0";
+ aarch64-linux = "13e174de1cf10135531468c2a76852de2c37253f4d8b487ff25d249c2d7a1c590475545ca246515338baff2950422ec6c5ffe2180e8327f25cb5f9fede696ccc";
+ x86_64-darwin = "b47a9958f5412b22edb2cb47702ad442c389901ede3ca2a7f75d901f8ed608494431849f498c2191327065ff1db52a1658b1a8c0feb53aaec4c814fb0baf6818";
+ };
+ };
+
+ net_5_0 = buildNetCore {
+ version = "5.0.0";
+ sha512 = {
+ x86_64-linux = "d4d67df5ff5f6dde0d865a6e87559955bd57429df396cf7d05fe77f09e6220c67dc5e66439b1801ca4d301a62f81f666122bf4b623b31a46b861677dcafc62a4";
+ aarch64-linux = "c7a5ae2bd4e0edbd3b681c2997ebf1633bfa1cd30a4333cb63fc9945b4e7c9278282516fb5bc22c710ce6fb59dc2e28230c07b0e99826165fa148406ab8afb0f";
+ x86_64-darwin = "eba97211e158a0c1c15b03a79b42027319d83456dc377a2513c32defb560cd43fcfa1e84154a43243b77ca6b454c4dbc32be4153f0ba9c954c7b1e69ab5d7c53";
+ };
+ };
+
+ sdk_5_0 = buildNetCoreSdk {
+ version = "5.0.100";
+ sha512 = {
+ x86_64-linux = "bec37bfb327c45cc01fd843ef93b22b556f753b04724bba501622df124e7e144c303a4d7e931b5dbadbd4f7b39e5adb8f601cb6293e317ad46d8fe7d52aa9a09";
+ aarch64-linux = "5fceac0a9468097d66af25516da597eb4836b294ed1647ba272ade5c8faea2ed977a95d9ce720c44d71607fa3a0cf9de55afe0e66c0c89ab1cc6736945978204";
+ x86_64-darwin = "69ccc7c686ac06f6c658d118f59cf1a0e7284b4570375dd88d3e3043098e311745922301f2650d159624d09c4d39a1f3cbdd5daee0e408eef915de839e3bce8f";
};
};
}
diff --git a/third_party/nixpkgs/pkgs/development/compilers/fsharp41/default.nix b/third_party/nixpkgs/pkgs/development/compilers/fsharp41/default.nix
index 8a4fa30393..6475deb102 100644
--- a/third_party/nixpkgs/pkgs/development/compilers/fsharp41/default.nix
+++ b/third_party/nixpkgs/pkgs/development/compilers/fsharp41/default.nix
@@ -41,6 +41,7 @@ stdenv.mkDerivation rec {
./fsharp-IsPathRooted-type-inference.patch
./fsharp-string-switchName.patch
./fsharp-path-overloads.patch
+ ./fsharp-GetFileNameWithoutExtension-type-inference.patch
];
configurePhase = ''
diff --git a/third_party/nixpkgs/pkgs/development/compilers/fsharp41/fsharp-GetFileNameWithoutExtension-type-inference.patch b/third_party/nixpkgs/pkgs/development/compilers/fsharp41/fsharp-GetFileNameWithoutExtension-type-inference.patch
new file mode 100644
index 0000000000..14e9444b1d
--- /dev/null
+++ b/third_party/nixpkgs/pkgs/development/compilers/fsharp41/fsharp-GetFileNameWithoutExtension-type-inference.patch
@@ -0,0 +1,13 @@
+diff --git a/src/scripts/fssrgen.fsx b/src/scripts/fssrgen.fsx
+index 0bee9b79e..e6ceda11e 100644
+--- a/src/scripts/fssrgen.fsx
++++ b/src/scripts/fssrgen.fsx
+@@ -329,7 +329,7 @@ let StringBoilerPlate filename =
+ // END BOILERPLATE
+ "
+
+-let RunMain(filename, outFilename, outXmlFilenameOpt, projectNameOpt) =
++let RunMain(filename:string, outFilename, outXmlFilenameOpt, projectNameOpt) =
+ try
+ let justfilename = System.IO.Path.GetFileNameWithoutExtension(filename)
+ if justfilename |> Seq.exists (fun c -> not(System.Char.IsLetterOrDigit(c))) then
diff --git a/third_party/nixpkgs/pkgs/development/compilers/ldc/binary.nix b/third_party/nixpkgs/pkgs/development/compilers/ldc/binary.nix
index 56d40be861..cbdb56efb1 100644
--- a/third_party/nixpkgs/pkgs/development/compilers/ldc/binary.nix
+++ b/third_party/nixpkgs/pkgs/development/compilers/ldc/binary.nix
@@ -17,7 +17,8 @@ in mkDerivation {
dontConfigure = true;
dontBuild = true;
- nativeBuildInputs = [ fixDarwinDylibNames autoPatchelfHook ];
+ nativeBuildInputs = [ autoPatchelfHook ]
+ ++ lib.optional hostPlatform.isDarwin fixDarwinDylibNames;
buildInputs = lib.optionals stdenv.hostPlatform.isLinux [ libxml2 stdenv.cc.cc ];
diff --git a/third_party/nixpkgs/pkgs/development/compilers/llvm/10/clang/default.nix b/third_party/nixpkgs/pkgs/development/compilers/llvm/10/clang/default.nix
index a3d6e7e402..fef7720d72 100644
--- a/third_party/nixpkgs/pkgs/development/compilers/llvm/10/clang/default.nix
+++ b/third_party/nixpkgs/pkgs/development/compilers/llvm/10/clang/default.nix
@@ -19,10 +19,10 @@ let
'';
nativeBuildInputs = [ cmake python3 lld ]
- ++ stdenv.lib.optional enableManpages python3.pkgs.sphinx;
+ ++ stdenv.lib.optional enableManpages python3.pkgs.sphinx
+ ++ stdenv.lib.optional stdenv.hostPlatform.isDarwin fixDarwinDylibNames;
- buildInputs = [ libxml2 llvm ]
- ++ stdenv.lib.optional stdenv.isDarwin fixDarwinDylibNames;
+ buildInputs = [ libxml2 llvm ];
cmakeFlags = [
"-DCMAKE_CXX_FLAGS=-std=c++14"
diff --git a/third_party/nixpkgs/pkgs/development/compilers/llvm/10/libc++/default.nix b/third_party/nixpkgs/pkgs/development/compilers/llvm/10/libc++/default.nix
index 651f188755..9571190393 100644
--- a/third_party/nixpkgs/pkgs/development/compilers/llvm/10/libc++/default.nix
+++ b/third_party/nixpkgs/pkgs/development/compilers/llvm/10/libc++/default.nix
@@ -21,9 +21,10 @@ stdenv.mkDerivation {
patchShebangs utils/cat_files.py
'';
nativeBuildInputs = [ cmake ]
- ++ stdenv.lib.optional (stdenv.hostPlatform.isMusl || stdenv.hostPlatform.isWasi) python3;
+ ++ stdenv.lib.optional (stdenv.hostPlatform.isMusl || stdenv.hostPlatform.isWasi) python3
+ ++ stdenv.lib.optional stdenv.hostPlatform.isDarwin fixDarwinDylibNames;
- buildInputs = [ libcxxabi ] ++ lib.optional stdenv.isDarwin fixDarwinDylibNames;
+ buildInputs = [ libcxxabi ];
cmakeFlags = [
"-DLIBCXX_LIBCXXABI_LIB_PATH=${libcxxabi}/lib"
diff --git a/third_party/nixpkgs/pkgs/development/compilers/llvm/11/clang/default.nix b/third_party/nixpkgs/pkgs/development/compilers/llvm/11/clang/default.nix
index 4f5e20cfe7..2de5f65b4a 100644
--- a/third_party/nixpkgs/pkgs/development/compilers/llvm/11/clang/default.nix
+++ b/third_party/nixpkgs/pkgs/development/compilers/llvm/11/clang/default.nix
@@ -20,10 +20,10 @@ let
'';
nativeBuildInputs = [ cmake python3 lld ]
- ++ stdenv.lib.optional enableManpages python3.pkgs.sphinx;
+ ++ stdenv.lib.optional enableManpages python3.pkgs.sphinx
+ ++ stdenv.lib.optional stdenv.hostPlatform.isDarwin fixDarwinDylibNames;
- buildInputs = [ libxml2 llvm ]
- ++ stdenv.lib.optional stdenv.isDarwin fixDarwinDylibNames;
+ buildInputs = [ libxml2 llvm ];
cmakeFlags = [
"-DCMAKE_CXX_FLAGS=-std=c++14"
diff --git a/third_party/nixpkgs/pkgs/development/compilers/llvm/5/clang/default.nix b/third_party/nixpkgs/pkgs/development/compilers/llvm/5/clang/default.nix
index cd7d952243..b5e7b54fa5 100644
--- a/third_party/nixpkgs/pkgs/development/compilers/llvm/5/clang/default.nix
+++ b/third_party/nixpkgs/pkgs/development/compilers/llvm/5/clang/default.nix
@@ -19,10 +19,10 @@ let
'';
nativeBuildInputs = [ cmake python3 ]
- ++ stdenv.lib.optional enableManpages python3.pkgs.sphinx;
+ ++ stdenv.lib.optional enableManpages python3.pkgs.sphinx
+ ++ stdenv.lib.optional stdenv.hostPlatform.isDarwin fixDarwinDylibNames;
- buildInputs = [ libxml2 llvm ]
- ++ stdenv.lib.optional stdenv.isDarwin fixDarwinDylibNames;
+ buildInputs = [ libxml2 llvm ];
cmakeFlags = [
"-DCMAKE_CXX_FLAGS=-std=c++11"
diff --git a/third_party/nixpkgs/pkgs/development/compilers/llvm/5/libc++/default.nix b/third_party/nixpkgs/pkgs/development/compilers/llvm/5/libc++/default.nix
index f8185fc3ff..9bebedbc04 100644
--- a/third_party/nixpkgs/pkgs/development/compilers/llvm/5/libc++/default.nix
+++ b/third_party/nixpkgs/pkgs/development/compilers/llvm/5/libc++/default.nix
@@ -25,9 +25,11 @@ stdenv.mkDerivation {
'' + lib.optionalString stdenv.hostPlatform.isMusl ''
patchShebangs utils/cat_files.py
'';
- nativeBuildInputs = [ cmake ] ++ stdenv.lib.optional stdenv.hostPlatform.isMusl python3;
+ nativeBuildInputs = [ cmake ]
+ ++ stdenv.lib.optional stdenv.hostPlatform.isMusl python3
+ ++ stdenv.lib.optional stdenv.hostPlatform.isDarwin fixDarwinDylibNames;
- buildInputs = [ libcxxabi ] ++ lib.optional stdenv.isDarwin fixDarwinDylibNames;
+ buildInputs = [ libcxxabi ];
cmakeFlags = [
"-DLIBCXX_LIBCXXABI_LIB_PATH=${libcxxabi}/lib"
diff --git a/third_party/nixpkgs/pkgs/development/compilers/llvm/6/clang/default.nix b/third_party/nixpkgs/pkgs/development/compilers/llvm/6/clang/default.nix
index 8f6479fe2f..ec3effebfd 100644
--- a/third_party/nixpkgs/pkgs/development/compilers/llvm/6/clang/default.nix
+++ b/third_party/nixpkgs/pkgs/development/compilers/llvm/6/clang/default.nix
@@ -19,10 +19,10 @@ let
'';
nativeBuildInputs = [ cmake python3 ]
- ++ stdenv.lib.optional enableManpages python3.pkgs.sphinx;
+ ++ stdenv.lib.optional enableManpages python3.pkgs.sphinx
+ ++ stdenv.lib.optional stdenv.hostPlatform.isDarwin fixDarwinDylibNames;
- buildInputs = [ libxml2 llvm ]
- ++ stdenv.lib.optional stdenv.isDarwin fixDarwinDylibNames;
+ buildInputs = [ libxml2 llvm ];
cmakeFlags = [
"-DCMAKE_CXX_FLAGS=-std=c++11"
diff --git a/third_party/nixpkgs/pkgs/development/compilers/llvm/6/libc++/default.nix b/third_party/nixpkgs/pkgs/development/compilers/llvm/6/libc++/default.nix
index a922bcfaf0..727a322608 100644
--- a/third_party/nixpkgs/pkgs/development/compilers/llvm/6/libc++/default.nix
+++ b/third_party/nixpkgs/pkgs/development/compilers/llvm/6/libc++/default.nix
@@ -25,9 +25,11 @@ stdenv.mkDerivation {
'' + lib.optionalString stdenv.hostPlatform.isMusl ''
patchShebangs utils/cat_files.py
'';
- nativeBuildInputs = [ cmake ] ++ stdenv.lib.optional stdenv.hostPlatform.isMusl python3;
+ nativeBuildInputs = [ cmake ]
+ ++ stdenv.lib.optional stdenv.hostPlatform.isMusl python3
+ ++ stdenv.lib.optional stdenv.hostPlatform.isDarwin fixDarwinDylibNames;
- buildInputs = [ libcxxabi ] ++ lib.optional stdenv.isDarwin fixDarwinDylibNames;
+ buildInputs = [ libcxxabi ];
cmakeFlags = [
"-DLIBCXX_LIBCXXABI_LIB_PATH=${libcxxabi}/lib"
diff --git a/third_party/nixpkgs/pkgs/development/compilers/llvm/7/clang/default.nix b/third_party/nixpkgs/pkgs/development/compilers/llvm/7/clang/default.nix
index 905ec862ad..969938681f 100644
--- a/third_party/nixpkgs/pkgs/development/compilers/llvm/7/clang/default.nix
+++ b/third_party/nixpkgs/pkgs/development/compilers/llvm/7/clang/default.nix
@@ -20,10 +20,10 @@ let
'';
nativeBuildInputs = [ cmake python3 ]
- ++ stdenv.lib.optional enableManpages python3.pkgs.sphinx;
+ ++ stdenv.lib.optional enableManpages python3.pkgs.sphinx
+ ++ stdenv.lib.optional stdenv.hostPlatform.isDarwin fixDarwinDylibNames;
- buildInputs = [ libxml2 llvm lld ]
- ++ stdenv.lib.optional stdenv.isDarwin fixDarwinDylibNames;
+ buildInputs = [ libxml2 llvm lld ];
cmakeFlags = [
"-DCMAKE_CXX_FLAGS=-std=c++11"
diff --git a/third_party/nixpkgs/pkgs/development/compilers/llvm/7/libc++/default.nix b/third_party/nixpkgs/pkgs/development/compilers/llvm/7/libc++/default.nix
index 83c05cf0e6..76baadf1c6 100644
--- a/third_party/nixpkgs/pkgs/development/compilers/llvm/7/libc++/default.nix
+++ b/third_party/nixpkgs/pkgs/development/compilers/llvm/7/libc++/default.nix
@@ -24,9 +24,12 @@ stdenv.mkDerivation {
'' + lib.optionalString stdenv.hostPlatform.isMusl ''
patchShebangs utils/cat_files.py
'';
- nativeBuildInputs = [ cmake ] ++ stdenv.lib.optional stdenv.hostPlatform.isMusl python3;
- buildInputs = [ libcxxabi ] ++ lib.optional stdenv.isDarwin fixDarwinDylibNames;
+ nativeBuildInputs = [ cmake ]
+ ++ stdenv.lib.optional stdenv.hostPlatform.isMusl python3
+ ++ stdenv.lib.optional stdenv.hostPlatform.isDarwin fixDarwinDylibNames;
+
+ buildInputs = [ libcxxabi ] ;
cmakeFlags = [
"-DLIBCXX_LIBCXXABI_LIB_PATH=${libcxxabi}/lib"
diff --git a/third_party/nixpkgs/pkgs/development/compilers/llvm/8/clang/default.nix b/third_party/nixpkgs/pkgs/development/compilers/llvm/8/clang/default.nix
index 2d7fc80689..5c1dca5e33 100644
--- a/third_party/nixpkgs/pkgs/development/compilers/llvm/8/clang/default.nix
+++ b/third_party/nixpkgs/pkgs/development/compilers/llvm/8/clang/default.nix
@@ -20,10 +20,10 @@ let
'';
nativeBuildInputs = [ cmake python3 ]
- ++ stdenv.lib.optional enableManpages python3.pkgs.sphinx;
+ ++ stdenv.lib.optional enableManpages python3.pkgs.sphinx
+ ++ stdenv.lib.optional stdenv.hostPlatform.isDarwin fixDarwinDylibNames;
- buildInputs = [ libxml2 llvm lld ]
- ++ stdenv.lib.optional stdenv.isDarwin fixDarwinDylibNames;
+ buildInputs = [ libxml2 llvm lld ];
cmakeFlags = [
"-DCMAKE_CXX_FLAGS=-std=c++11"
diff --git a/third_party/nixpkgs/pkgs/development/compilers/llvm/8/libc++/default.nix b/third_party/nixpkgs/pkgs/development/compilers/llvm/8/libc++/default.nix
index 9c0c7951c7..01e0d8e008 100644
--- a/third_party/nixpkgs/pkgs/development/compilers/llvm/8/libc++/default.nix
+++ b/third_party/nixpkgs/pkgs/development/compilers/llvm/8/libc++/default.nix
@@ -25,9 +25,10 @@ stdenv.mkDerivation {
patchShebangs utils/cat_files.py
'';
nativeBuildInputs = [ cmake ]
- ++ stdenv.lib.optional (stdenv.hostPlatform.isMusl || stdenv.hostPlatform.isWasi) python3;
+ ++ stdenv.lib.optional (stdenv.hostPlatform.isMusl || stdenv.hostPlatform.isWasi) python3
+ ++ stdenv.lib.optional stdenv.hostPlatform.isDarwin fixDarwinDylibNames;
- buildInputs = [ libcxxabi ] ++ lib.optional stdenv.isDarwin fixDarwinDylibNames;
+ buildInputs = [ libcxxabi ];
cmakeFlags = [
"-DLIBCXX_LIBCXXABI_LIB_PATH=${libcxxabi}/lib"
diff --git a/third_party/nixpkgs/pkgs/development/compilers/llvm/9/clang/default.nix b/third_party/nixpkgs/pkgs/development/compilers/llvm/9/clang/default.nix
index 81117e904d..cfaee05944 100644
--- a/third_party/nixpkgs/pkgs/development/compilers/llvm/9/clang/default.nix
+++ b/third_party/nixpkgs/pkgs/development/compilers/llvm/9/clang/default.nix
@@ -20,10 +20,10 @@ let
'';
nativeBuildInputs = [ cmake python3 ]
- ++ stdenv.lib.optional enableManpages python3.pkgs.sphinx;
+ ++ stdenv.lib.optional enableManpages python3.pkgs.sphinx
+ ++ stdenv.lib.optional stdenv.hostPlatform.isDarwin fixDarwinDylibNames;
- buildInputs = [ libxml2 llvm lld ]
- ++ stdenv.lib.optional stdenv.isDarwin fixDarwinDylibNames;
+ buildInputs = [ libxml2 llvm lld ];
cmakeFlags = [
"-DCMAKE_CXX_FLAGS=-std=c++11"
diff --git a/third_party/nixpkgs/pkgs/development/compilers/llvm/9/libc++/default.nix b/third_party/nixpkgs/pkgs/development/compilers/llvm/9/libc++/default.nix
index cec6de61ca..c9f0e6254a 100644
--- a/third_party/nixpkgs/pkgs/development/compilers/llvm/9/libc++/default.nix
+++ b/third_party/nixpkgs/pkgs/development/compilers/llvm/9/libc++/default.nix
@@ -21,9 +21,10 @@ stdenv.mkDerivation {
patchShebangs utils/cat_files.py
'';
nativeBuildInputs = [ cmake ]
- ++ stdenv.lib.optional (stdenv.hostPlatform.isMusl || stdenv.hostPlatform.isWasi) python3;
+ ++ stdenv.lib.optional (stdenv.hostPlatform.isMusl || stdenv.hostPlatform.isWasi) python3
+ ++ stdenv.lib.optional stdenv.hostPlatform.isDarwin fixDarwinDylibNames;
- buildInputs = [ libcxxabi ] ++ lib.optional stdenv.isDarwin fixDarwinDylibNames;
+ buildInputs = [ libcxxabi ];
cmakeFlags = [
"-DLIBCXX_LIBCXXABI_LIB_PATH=${libcxxabi}/lib"
diff --git a/third_party/nixpkgs/pkgs/development/compilers/nasm/default.nix b/third_party/nixpkgs/pkgs/development/compilers/nasm/default.nix
index 67665c3bab..89217db681 100644
--- a/third_party/nixpkgs/pkgs/development/compilers/nasm/default.nix
+++ b/third_party/nixpkgs/pkgs/development/compilers/nasm/default.nix
@@ -1,27 +1,25 @@
-{ stdenv, fetchFromRepoOrCz, autoreconfHook, perl, asciidoc, xmlto, docbook_xml_dtd_45, docbook_xsl }:
+{ stdenv, fetchurl, perl }:
stdenv.mkDerivation rec {
pname = "nasm";
- version = "2.14.02";
+ version = "2.15.05";
- src = fetchFromRepoOrCz {
- repo = "nasm";
- rev = "${pname}-${version}";
- sha256 = "15z6ybnzlsrqs2964h6czqhpmr7vc3ln4y4h0z9vrznk4mqcwbsa";
+ src = fetchurl {
+ url = "https://www.nasm.us/pub/nasm/releasebuilds/${version}/${pname}-${version}.tar.xz";
+ sha256 = "0gqand86b0r86k3h46dh560lykxmxqqywz5m55kgjfq7q4lngbrw";
};
- nativeBuildInputs = [ autoreconfHook perl asciidoc xmlto docbook_xml_dtd_45 docbook_xsl ];
+ nativeBuildInputs = [ perl ];
- postBuild = "make manpages";
+ enableParallelBuilding = true;
doCheck = true;
checkPhase = ''
- make golden && make test
+ make golden
+ make test
'';
- NIX_CFLAGS_COMPILE="-Wno-error=attributes";
-
meta = with stdenv.lib; {
homepage = "https://www.nasm.us/";
description = "An 80x86 and x86-64 assembler designed for portability and modularity";
diff --git a/third_party/nixpkgs/pkgs/development/compilers/vala/default.nix b/third_party/nixpkgs/pkgs/development/compilers/vala/default.nix
index 3b4cd1a5a7..1964d74cf3 100644
--- a/third_party/nixpkgs/pkgs/development/compilers/vala/default.nix
+++ b/third_party/nixpkgs/pkgs/development/compilers/vala/default.nix
@@ -123,8 +123,8 @@ in rec {
};
vala_0_48 = generic {
- version = "0.48.7";
- sha256 = "0lswkb7gj0chas9n3l3dbrm9l71hs77adhvm2v600id2ipi37pi8";
+ version = "0.48.9";
+ sha256 = "1agyrvslv2yh9ikiw7k5nw6j6il1l2zrzfan0pzdpb9xpg9idslw";
};
vala = vala_0_48;
diff --git a/third_party/nixpkgs/pkgs/development/dhall-modules/Prelude.nix b/third_party/nixpkgs/pkgs/development/dhall-modules/Prelude.nix
index 6af08edf88..36bfda403c 100644
--- a/third_party/nixpkgs/pkgs/development/dhall-modules/Prelude.nix
+++ b/third_party/nixpkgs/pkgs/development/dhall-modules/Prelude.nix
@@ -1,59 +1,11 @@
-{ buildDhallGitHubPackage, lib }:
+{ buildDhallGitHubPackage }:
-let
- makePrelude =
- version: { rev, sha256 }:
- buildDhallGitHubPackage {
- name = "Prelude-${version}";
- owner = "dhall-lang";
- repo = "dhall-lang";
- directory = "Prelude";
- file = "package.dhall";
-
- inherit rev sha256;
- };
-
-in
- lib.mapAttrs makePrelude {
- # Prelude versions older than 7.0.0 use old-style union literals, which are
- # no longer supported by the latest version of the standard
- "7.0.0" = {
- rev = "f0509b403ace4b8a72ebb5fa9c473b9aeabeaf33";
- sha256 = "00ldlvqfh411vnrnc41zfnlvgfanwfd3l8hdia8kni3r8q9qmd71";
- };
-
- "8.0.0" = {
- rev = "136a3491753fef251b2087031617d1ee1053f285";
- sha256 = "0haxd5dhi5bmg06a0hx1blpivmwrcnndydwagibj3zvch4knyi2q";
- };
-
- "9.0.0" = {
- rev = "6cbf57c946e7e6576babc23a38320e53ecfa6bee";
- sha256 = "1r06fijszyifq5b4j6libwkm06g8693m9n5c4kq61dvzrjfd2gim";
- };
-
- "10.0.0" = {
- rev = "ecbf82785cff406bbd162bbabf3df6f817c805e0";
- sha256 = "0gxkr9649jqpykdzqjc98gkwnjry8wp469037brfghyidwsm021m";
- };
-
- "11.0.0" = {
- rev = "8098184d17c3aecc82674a7b874077a7641be05a";
- sha256 = "0rdvyxq7mvas82wsfzzpk6imzm8ax4q58l522mx0ks69pacpr3yi";
- };
-
- "11.1.0" = {
- rev = "31e90e1996f6c4cb50e03ccb1f3c45beb4bd278c";
- sha256 = "0rdvyxq7mvas82wsfzzpk6imzm8ax4q58l522mx0ks69pacpr3yi";
- };
-
- "12.0.0" = {
- rev = "9f248138f69ee5e22192dc3d0417d5c77b189e04";
- sha256 = "1gbr0376sfamp0ibhcbxz4vaxr6ipv42y42p5wyksfhz3ls9x5ph";
- };
-
- "13.0.0" = {
- rev = "48db9e1ff1f8881fa4310085834fbc19e313ebf0";
- sha256 = "0kg3rzag3irlcldck63rjspls614bc2sbs3zq44h0pzcz9v7z5h9";
- };
- }
+buildDhallGitHubPackage {
+ name = "Prelude-13.0.0";
+ owner = "dhall-lang";
+ repo = "dhall-lang";
+ directory = "Prelude";
+ file = "package.dhall";
+ rev = "48db9e1ff1f8881fa4310085834fbc19e313ebf0";
+ sha256 = "0kg3rzag3irlcldck63rjspls614bc2sbs3zq44h0pzcz9v7z5h9";
+}
diff --git a/third_party/nixpkgs/pkgs/development/dhall-modules/dhall-kubernetes.nix b/third_party/nixpkgs/pkgs/development/dhall-modules/dhall-kubernetes.nix
index 2de89d63ec..337ae474da 100644
--- a/third_party/nixpkgs/pkgs/development/dhall-modules/dhall-kubernetes.nix
+++ b/third_party/nixpkgs/pkgs/development/dhall-modules/dhall-kubernetes.nix
@@ -1,27 +1,10 @@
-{ buildDhallGitHubPackage, lib }:
+{ buildDhallGitHubPackage }:
-let
- makeDhallKubernetes =
- version: { rev, sha256 }:
- buildDhallGitHubPackage {
- name = "dhall-kubernetes-${version}";
- owner = "dhall-lang";
- repo = "dhall-kubernetes";
- file = "package.dhall";
-
- inherit rev sha256;
- };
-
-in
- lib.mapAttrs makeDhallKubernetes {
- # 2.1.0 was the first version to introduce a top-level `package.dhall` file
- "2.1.0" = {
- rev = "bbfec3d8548b605f1c9628f34029ab4a7d928839";
- sha256 = "10zkigj05khiy6w2sqcm5nw7d47r5k52xq8np8q86h0phy798g96";
- };
-
- "3.0.0" = {
- rev = "3c6d09a9409977cdde58a091d76a6d20509ca4b0";
- sha256 = "1r4awh770ghsrwabh5ddy3jpmrbigakk0h32542n1kh71w3cdq1h";
- };
- }
+buildDhallGitHubPackage {
+ name = "dhall-kubernetes-3.0.0";
+ owner = "dhall-lang";
+ repo = "dhall-kubernetes";
+ file = "package.dhall";
+ rev = "3c6d09a9409977cdde58a091d76a6d20509ca4b0";
+ sha256 = "1r4awh770ghsrwabh5ddy3jpmrbigakk0h32542n1kh71w3cdq1h";
+}
diff --git a/third_party/nixpkgs/pkgs/development/dhall-modules/dhall-packages.nix b/third_party/nixpkgs/pkgs/development/dhall-modules/dhall-packages.nix
index 866b689e38..989531db8d 100644
--- a/third_party/nixpkgs/pkgs/development/dhall-modules/dhall-packages.nix
+++ b/third_party/nixpkgs/pkgs/development/dhall-modules/dhall-packages.nix
@@ -1,51 +1,51 @@
-{ buildDhallGitHubPackage, dhall-kubernetes, lib, Prelude }:
+{ buildDhallGitHubPackage, dhall-kubernetes, Prelude }:
let
- makeDhallPackages =
- version: { rev, sha256, dependencies }:
- buildDhallGitHubPackage {
- name = "dhall-packages-${version}";
- owner = "EarnestResearch";
- repo = "dhall-packages";
- file = "package.dhall";
+ Prelude_12_0_0 = Prelude.overridePackage {
+ name = "Prelude-12.0.0";
+ rev = "9f248138f69ee5e22192dc3d0417d5c77b189e04";
+ sha256 = "1gbr0376sfamp0ibhcbxz4vaxr6ipv42y42p5wyksfhz3ls9x5ph";
+ };
- inherit rev sha256 dependencies;
- };
+ kubernetes = {
+ "6a47bd" = dhall-kubernetes.overridePackage {
+ name = "dhall-kubernetes-6a47bd";
+ rev = "6a47bd50c4d3984a13570ea62382a3ad4a9919a4";
+ sha256 = "1azqs0x2kia3xw93rfk2mdi8izd7gy9aq6qzbip32gin7dncmfhh";
+ };
+
+ "4ad581" = dhall-kubernetes.overridePackage {
+ name = "dhall-kubernetes-4ad581";
+ rev = "4ad58156b7fdbbb6da0543d8b314df899feca077";
+ sha256 = "12fm70qbhcainxia388svsay2cfg9iksc6mss0nvhgxhpypgp8r0";
+ };
+
+ "fee24c" = dhall-kubernetes.overridePackage {
+ name = "dhall-kubernetes-fee24c";
+ rev = "fee24c0993ba0b20190e2fdb94e386b7fb67252d";
+ sha256 = "11d93z8y0jzrb8dl43gqha9z96nxxqkl7cbxpz8hw8ky9x6ggayk";
+ };
+ };
in
- lib.mapAttrs makeDhallPackages {
- "0.11.1" =
- let
- k8s_6a47bd = dhall-kubernetes.override {
- rev = "6a47bd50c4d3984a13570ea62382a3ad4a9919a4";
- sha256 = "1azqs0x2kia3xw93rfk2mdi8izd7gy9aq6qzbip32gin7dncmfhh";
- };
+ buildDhallGitHubPackage {
+ name = "dhall-packages-0.11.1";
+ owner = "EarnestResearch";
+ repo = "dhall-packages";
+ file = "package.dhall";
+ rev = "8d228f578fbc7bb16c04a7c9ac8c6c7d2e13d1f7";
+ sha256 = "1v4y1x13lxy6cxf8xqc6sb0mc4mrd4frkxih95v9q2wxw4vkw2h7";
- k8s_4ad581 = dhall-kubernetes.override {
- rev = "4ad58156b7fdbbb6da0543d8b314df899feca077";
- sha256 = "12fm70qbhcainxia388svsay2cfg9iksc6mss0nvhgxhpypgp8r0";
- };
-
- k8s_fee24c = dhall-kubernetes.override {
- rev = "fee24c0993ba0b20190e2fdb94e386b7fb67252d";
- sha256 = "11d93z8y0jzrb8dl43gqha9z96nxxqkl7cbxpz8hw8ky9x6ggayk";
- };
-
- in
- { rev = "8d228f578fbc7bb16c04a7c9ac8c6c7d2e13d1f7";
- sha256 = "1v4y1x13lxy6cxf8xqc6sb0mc4mrd4frkxih95v9q2wxw4vkw2h7";
-
- dependencies = [
- (k8s_6a47bd.override { file = "1.14/package.dhall"; })
- (k8s_6a47bd.override { file = "1.15/package.dhall"; })
- (k8s_6a47bd.override { file = "1.16/package.dhall"; })
- (k8s_4ad581.override { file = "types.dhall"; })
- (k8s_fee24c.override { file = "types/io.k8s.api.core.v1.ServiceSpec.dhall"; })
- (k8s_fee24c.override { file = "types/io.k8s.api.core.v1.PodTemplateSpec.dhall"; })
- Prelude."12.0.0"
- (Prelude."12.0.0".override { file = "JSON/package.dhall"; })
- (Prelude."12.0.0".override { file = "JSON/Type"; })
- (Prelude."12.0.0".override { file = "Map/Type"; })
- ];
- };
+ dependencies = [
+ (kubernetes."6a47bd".overridePackage { file = "1.14/package.dhall"; })
+ (kubernetes."6a47bd".overridePackage { file = "1.15/package.dhall"; })
+ (kubernetes."6a47bd".overridePackage { file = "1.16/package.dhall"; })
+ (kubernetes."4ad581".overridePackage { file = "types.dhall"; })
+ (kubernetes."fee24c".overridePackage { file = "types/io.k8s.api.core.v1.ServiceSpec.dhall"; })
+ (kubernetes."fee24c".overridePackage { file = "types/io.k8s.api.core.v1.PodTemplateSpec.dhall"; })
+ Prelude_12_0_0
+ (Prelude_12_0_0.overridePackage { file = "JSON/package.dhall"; })
+ (Prelude_12_0_0.overridePackage { file = "JSON/Type"; })
+ (Prelude_12_0_0.overridePackage { file = "Map/Type"; })
+ ];
}
diff --git a/third_party/nixpkgs/pkgs/development/dhall-modules/lib.nix b/third_party/nixpkgs/pkgs/development/dhall-modules/lib.nix
new file mode 100644
index 0000000000..c1993d0af0
--- /dev/null
+++ b/third_party/nixpkgs/pkgs/development/dhall-modules/lib.nix
@@ -0,0 +1,25 @@
+{ lib }:
+
+let
+ # This is essentially the same thing as `lib.makeOverridable`, except storing
+ # the override method in a method named `overridePackage` so that it's not
+ # shadowed by the `override` method added by `callPackage`
+ makePackageOverridable = f: args:
+ let
+ result = lib.makeOverridable f args;
+
+ copyArgs = g: lib.setFunctionArgs g (lib.functionArgs f);
+
+ overrideWith =
+ update: args // (if lib.isFunction update then update args else update);
+
+ overridePackage =
+ copyArgs (update: makePackageOverridable f (overrideWith update));
+
+ in
+ result // { inherit overridePackage; };
+
+in
+ lib // {
+ inherit makePackageOverridable;
+ }
diff --git a/third_party/nixpkgs/pkgs/development/haskell-modules/configuration-nix.nix b/third_party/nixpkgs/pkgs/development/haskell-modules/configuration-nix.nix
index a74b1eb05c..7c233ade74 100644
--- a/third_party/nixpkgs/pkgs/development/haskell-modules/configuration-nix.nix
+++ b/third_party/nixpkgs/pkgs/development/haskell-modules/configuration-nix.nix
@@ -95,7 +95,15 @@ self: super: builtins.intersectAttrs super {
sfml-audio = appendConfigureFlag super.sfml-audio "--extra-include-dirs=${pkgs.openal}/include/AL";
# profiling is disabled to allow C++/C mess to work, which is fixed in GHC 8.8
- cachix = disableLibraryProfiling super.cachix;
+ cachix = overrideSrc (disableLibraryProfiling super.cachix) {
+ src = (pkgs.fetchFromGitHub {
+ owner = "cachix";
+ repo = "cachix";
+ rev = "1471050f5906ecb7cd0d72115503d07d2e3beb17";
+ sha256 = "1lkrmhv5x9dpy53w33kxnhv4x4qm711ha8hsgccrjmxaqcsdm59g";
+ }) + "/cachix";
+ version = "0.5.1";
+ };
hercules-ci-agent = disableLibraryProfiling super.hercules-ci-agent;
# avoid compiling twice by providing executable as a separate output (with small closure size)
diff --git a/third_party/nixpkgs/pkgs/development/interpreters/dhall/build-dhall-directory-package.nix b/third_party/nixpkgs/pkgs/development/interpreters/dhall/build-dhall-directory-package.nix
index b4401a85d1..0c182b25d5 100644
--- a/third_party/nixpkgs/pkgs/development/interpreters/dhall/build-dhall-directory-package.nix
+++ b/third_party/nixpkgs/pkgs/development/interpreters/dhall/build-dhall-directory-package.nix
@@ -5,7 +5,7 @@
# the `file`
#
# This function is used by `dhall-to-nixpkgs` when given a directory
-lib.makeOverridable
+lib.makePackageOverridable
( { # Arguments passed through to `buildDhallPackage`
name
, dependencies ? []
diff --git a/third_party/nixpkgs/pkgs/development/interpreters/dhall/build-dhall-github-package.nix b/third_party/nixpkgs/pkgs/development/interpreters/dhall/build-dhall-github-package.nix
index 9289e9b656..bdb958fb8b 100644
--- a/third_party/nixpkgs/pkgs/development/interpreters/dhall/build-dhall-github-package.nix
+++ b/third_party/nixpkgs/pkgs/development/interpreters/dhall/build-dhall-github-package.nix
@@ -1,7 +1,7 @@
{ buildDhallPackage, fetchFromGitHub, lib }:
# This function is used by `dhall-to-nixpkgs` when given a GitHub repository
-lib.makeOverridable
+lib.makePackageOverridable
( { # Arguments passed through to `buildDhallPackage`
name
, dependencies ? []
diff --git a/third_party/nixpkgs/pkgs/development/interpreters/python/cpython/3.10/no-ldconfig.patch b/third_party/nixpkgs/pkgs/development/interpreters/python/cpython/3.10/no-ldconfig.patch
index a1f9d68eb1..c259aed72b 100644
--- a/third_party/nixpkgs/pkgs/development/interpreters/python/cpython/3.10/no-ldconfig.patch
+++ b/third_party/nixpkgs/pkgs/development/interpreters/python/cpython/3.10/no-ldconfig.patch
@@ -1,18 +1,18 @@
-From 597e73f2a4b2f0b508127931b36d5540d6941823 Mon Sep 17 00:00:00 2001
-From: Frederik Rietdijk
-Date: Mon, 28 Aug 2017 09:24:06 +0200
-Subject: [PATCH] Don't use ldconfig
+From 084c6dd6352077e64f10cf7aa168f95d800f3819 Mon Sep 17 00:00:00 2001
+From: Jonathan Ringer
+Date: Mon, 9 Nov 2020 10:24:35 -0800
+Subject: [PATCH] CPython: Don't use ldconfig
---
- Lib/ctypes/util.py | 70 ++----------------------------------------------------
- 1 file changed, 2 insertions(+), 68 deletions(-)
+ Lib/ctypes/util.py | 77 ++--------------------------------------------
+ 1 file changed, 2 insertions(+), 75 deletions(-)
diff --git a/Lib/ctypes/util.py b/Lib/ctypes/util.py
-index 5e8b31a854..7b45ce6c15 100644
+index 0c2510e..7fb98af 100644
--- a/Lib/ctypes/util.py
+++ b/Lib/ctypes/util.py
-@@ -94,46 +94,7 @@ elif os.name == "posix":
- import re, tempfile
+@@ -100,53 +100,7 @@ elif os.name == "posix":
+ return thefile.read(4) == elf_header
def _findLib_gcc(name):
- # Run GCC's linker with the -t (aka --trace) option and examine the
@@ -51,15 +51,22 @@ index 5e8b31a854..7b45ce6c15 100644
- # Raised if the file was already removed, which is the normal
- # behaviour of GCC if linking fails
- pass
-- res = re.search(expr, trace)
+- res = re.findall(expr, trace)
- if not res:
- return None
-- return os.fsdecode(res.group(0))
+-
+- for file in res:
+- # Check if the given file is an elf file: gcc can report
+- # some files that are linker scripts and not actual
+- # shared objects. See bpo-41976 for more details
+- if not _is_elf(file):
+- continue
+- return os.fsdecode(file)
+ return None
if sys.platform == "sunos5":
-@@ -255,34 +216,7 @@ elif os.name == "posix":
+@@ -268,34 +222,7 @@ elif os.name == "posix":
else:
def _findSoname_ldconfig(name):
@@ -96,5 +103,5 @@ index 5e8b31a854..7b45ce6c15 100644
def _findLib_ld(name):
# See issue #9998 for why this is needed
--
-2.15.0
+2.28.0
diff --git a/third_party/nixpkgs/pkgs/development/interpreters/python/cpython/default.nix b/third_party/nixpkgs/pkgs/development/interpreters/python/cpython/default.nix
index b25d613eb7..77512c02d5 100644
--- a/third_party/nixpkgs/pkgs/development/interpreters/python/cpython/default.nix
+++ b/third_party/nixpkgs/pkgs/development/interpreters/python/cpython/default.nix
@@ -14,6 +14,7 @@
, self
, configd
, autoreconfHook
+, autoconf-archive
, python-setup-hook
, nukeReferences
# For the Python package set
@@ -67,6 +68,8 @@ let
nativeBuildInputs = optionals (!stdenv.isDarwin) [
autoreconfHook
+ ] ++ optionals (!stdenv.isDarwin && passthru.pythonAtLeast "3.10") [
+ autoconf-archive # needed for AX_CHECK_COMPILE_FLAG
] ++ [
nukeReferences
] ++ optionals (stdenv.hostPlatform != stdenv.buildPlatform) [
@@ -291,13 +294,6 @@ in with passthru; stdenv.mkDerivation {
find $out -name "*.py" | ${pythonForBuildInterpreter} -OO -m compileall -q -f -x "lib2to3" -i -
'' + optionalString stripBytecode ''
find $out -type d -name __pycache__ -print0 | xargs -0 -I {} rm -rf "{}"
- '' + ''
- # *strip* shebang from libpython gdb script - it should be dual-syntax and
- # interpretable by whatever python the gdb in question is using, which may
- # not even match the major version of this python. doing this after the
- # bytecode compilations for the same reason.
- mkdir -p $out/share/gdb
- sed '/^#!/d' Tools/gdb/libpython.py > $out/share/gdb/libpython.py
'';
preFixup = stdenv.lib.optionalString (stdenv.hostPlatform != stdenv.buildPlatform) ''
@@ -315,8 +311,6 @@ in with passthru; stdenv.mkDerivation {
pythonForBuild buildPackages.bash
];
- separateDebugInfo = true;
-
inherit passthru;
enableParallelBuilding = true;
diff --git a/third_party/nixpkgs/pkgs/development/interpreters/python/default.nix b/third_party/nixpkgs/pkgs/development/interpreters/python/default.nix
index a8db9bc925..ae666d44f5 100644
--- a/third_party/nixpkgs/pkgs/development/interpreters/python/default.nix
+++ b/third_party/nixpkgs/pkgs/development/interpreters/python/default.nix
@@ -122,9 +122,9 @@ in {
major = "3";
minor = "10";
patch = "0";
- suffix = "a1";
+ suffix = "a2";
};
- sha256 = "0q59a99w1yad808mx4w6l0j7bk7dbd2kakngbk0w1h9z4dhr8wyv";
+ sha256 = "0zl5h61s8n2w2v1n40af0mwaw7lqh5fl1ys7kyjgcph60vb9wzjr";
inherit (darwin) configd;
inherit passthruFun;
};
diff --git a/third_party/nixpkgs/pkgs/development/interpreters/python/hooks/pip-install-hook.sh b/third_party/nixpkgs/pkgs/development/interpreters/python/hooks/pip-install-hook.sh
index 770739b36b..4eefe22d3f 100644
--- a/third_party/nixpkgs/pkgs/development/interpreters/python/hooks/pip-install-hook.sh
+++ b/third_party/nixpkgs/pkgs/development/interpreters/python/hooks/pip-install-hook.sh
@@ -11,9 +11,7 @@ pipInstallPhase() {
export PYTHONPATH="$out/@pythonSitePackages@:$PYTHONPATH"
pushd dist || return 1
- mkdir tmpbuild
- NIX_PIP_INSTALL_TMPDIR=tmpbuild @pythonInterpreter@ -m pip install ./*.whl --no-index --prefix="$out" --no-cache $pipInstallFlags
- rm -rf tmpbuild
+ @pythonInterpreter@ -m pip install ./*.whl --no-index --prefix="$out" --no-cache $pipInstallFlags --build tmpbuild
popd || return 1
runHook postInstall
diff --git a/third_party/nixpkgs/pkgs/development/interpreters/ruby/default.nix b/third_party/nixpkgs/pkgs/development/interpreters/ruby/default.nix
index 7b36b04d11..189be8945f 100644
--- a/third_party/nixpkgs/pkgs/development/interpreters/ruby/default.nix
+++ b/third_party/nixpkgs/pkgs/development/interpreters/ruby/default.nix
@@ -108,6 +108,9 @@ let
sed -i configure.ac -e '/config.guess/d'
cp --remove-destination ${config}/config.guess tool/
cp --remove-destination ${config}/config.sub tool/
+ # Make the build reproducible for ruby <= 2.7
+ # See https://github.com/ruby/io-console/commit/679a941d05d869f5e575730f6581c027203b7b26#diff-d8422f096931c58d4463e2489f62a228b0f24f0492950ba88c8c89a0d741cfe6
+ sed -i ext/io/console/io-console.gemspec -e '/s\.date/d'
'';
# Force the revision.h generation. Somehow `revision.tmp` is an empty
diff --git a/third_party/nixpkgs/pkgs/development/interpreters/wasmtime/default.nix b/third_party/nixpkgs/pkgs/development/interpreters/wasmtime/default.nix
index 75a022de91..3d13dddb64 100644
--- a/third_party/nixpkgs/pkgs/development/interpreters/wasmtime/default.nix
+++ b/third_party/nixpkgs/pkgs/development/interpreters/wasmtime/default.nix
@@ -2,17 +2,17 @@
rustPlatform.buildRustPackage rec {
pname = "wasmtime";
- version = "0.20.0";
+ version = "0.21.0";
src = fetchFromGitHub {
owner = "bytecodealliance";
repo = pname;
rev = "v${version}";
- sha256 = "01k1fpk2qp4kv0xr4f0xmrjkr98j5ws48r1aks8l80mffs4ynqfr";
+ sha256 = "0q7wsnq5zdskxwzsxwm98jfnv2frnwca1dkhwndcn9yyz2gyw57m";
fetchSubmodules = true;
};
- cargoSha256 = "0vghcs1nbxlkmw9wfikzb1ndscx7fkmgv5q8dnfcisl05zpkj7si";
+ cargoSha256 = "1r1fm28zaxfbzd17jzaz8ql6ss6y6djgdhpfpkvpbw9l8l06x4lc";
nativeBuildInputs = [ python cmake clang ];
buildInputs = [ llvmPackages.libclang ] ++
diff --git a/third_party/nixpkgs/pkgs/development/libraries/amtk/default.nix b/third_party/nixpkgs/pkgs/development/libraries/amtk/default.nix
index b33c45adb4..e514b8b5c3 100644
--- a/third_party/nixpkgs/pkgs/development/libraries/amtk/default.nix
+++ b/third_party/nixpkgs/pkgs/development/libraries/amtk/default.nix
@@ -1,19 +1,26 @@
-{ stdenv, fetchurl, gtk3
-, pkgconfig, gnome3, dbus, xvfb_run }:
-let
- version = "5.1.1";
+{ stdenv
+, fetchurl
+, gtk3
+, pkgconfig
+, gobject-introspection
+, gnome3
+, dbus
+, xvfb_run
+}:
+
+stdenv.mkDerivation rec {
pname = "amtk";
-in stdenv.mkDerivation {
- name = "${pname}-${version}";
+ version = "5.2.0";
src = fetchurl {
url = "mirror://gnome/sources/${pname}/${stdenv.lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
- sha256 = "1wax6mim8dj0m21k8ima7ysm3bzzp54r00jganwbzakq8bfnnrgr";
+ sha256 = "0y3hmmflw4i0y0yb9a8rlihbv3cbwnvdcf1n5jycwzpq9jxla1c2";
};
nativeBuildInputs = [
pkgconfig
dbus
+ gobject-introspection
];
buildInputs = [
diff --git a/third_party/nixpkgs/pkgs/development/libraries/at-spi2-atk/default.nix b/third_party/nixpkgs/pkgs/development/libraries/at-spi2-atk/default.nix
index 6a1ca6d24d..04f8c26613 100644
--- a/third_party/nixpkgs/pkgs/development/libraries/at-spi2-atk/default.nix
+++ b/third_party/nixpkgs/pkgs/development/libraries/at-spi2-atk/default.nix
@@ -16,11 +16,11 @@
stdenv.mkDerivation rec {
pname = "at-spi2-atk";
- version = "2.34.2";
+ version = "2.38.0";
src = fetchurl {
url = "mirror://gnome/sources/${pname}/${stdenv.lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
- sha256 = "1w7l4xg00qx3dwhn0zaa64daiv5f073hdvjdxh0mrw7fw37264wh";
+ sha256 = "z6AIpa+CKzauYofxgYLEDJHdaZxV+qOGBYge0XXKRk8=";
};
nativeBuildInputs = [ meson ninja pkgconfig ];
diff --git a/third_party/nixpkgs/pkgs/development/libraries/at-spi2-core/default.nix b/third_party/nixpkgs/pkgs/development/libraries/at-spi2-core/default.nix
index 2c959434f0..ba77020ec7 100644
--- a/third_party/nixpkgs/pkgs/development/libraries/at-spi2-core/default.nix
+++ b/third_party/nixpkgs/pkgs/development/libraries/at-spi2-core/default.nix
@@ -20,11 +20,11 @@
stdenv.mkDerivation rec {
pname = "at-spi2-core";
- version = "2.36.1";
+ version = "2.38.0";
src = fetchurl {
url = "mirror://gnome/sources/${pname}/${stdenv.lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
- sha256 = "0m3crrdbc9vdn9dr4lssdwrjmm8z5wxs2qhhnbkh1w5vkn87nhcp";
+ sha256 = "hONsP+ZoYhM/X+Ipdyt2qiUm4Q3lAUo3ePL6Rs5VDaU=";
};
outputs = [ "out" "dev" ];
diff --git a/third_party/nixpkgs/pkgs/development/libraries/atk/default.nix b/third_party/nixpkgs/pkgs/development/libraries/atk/default.nix
index b54ba53130..aa132515b3 100644
--- a/third_party/nixpkgs/pkgs/development/libraries/atk/default.nix
+++ b/third_party/nixpkgs/pkgs/development/libraries/atk/default.nix
@@ -17,9 +17,8 @@ stdenv.mkDerivation rec {
outputs = [ "out" "dev" ];
- buildInputs = stdenv.lib.optional stdenv.isDarwin fixDarwinDylibNames;
-
- nativeBuildInputs = [ meson ninja pkgconfig gettext gobject-introspection glib ];
+ nativeBuildInputs = [ meson ninja pkgconfig gettext gobject-introspection glib ]
+ ++ stdenv.lib.optional stdenv.hostPlatform.isDarwin fixDarwinDylibNames;
propagatedBuildInputs = [
# Required by atk.pc
diff --git a/third_party/nixpkgs/pkgs/development/libraries/bobcat/default.nix b/third_party/nixpkgs/pkgs/development/libraries/bobcat/default.nix
index 17f7bbc667..a95f131c00 100644
--- a/third_party/nixpkgs/pkgs/development/libraries/bobcat/default.nix
+++ b/third_party/nixpkgs/pkgs/development/libraries/bobcat/default.nix
@@ -1,13 +1,14 @@
-{ stdenv, fetchFromGitHub, icmake
+{ stdenv, fetchFromGitLab, icmake
, libmilter, libX11, openssl, readline
, utillinux, yodl }:
stdenv.mkDerivation rec {
pname = "bobcat";
- version = "4.08.03";
+ version = "5.05.00";
- src = fetchFromGitHub {
- sha256 = "163mdl8hxids7123bjxmqhcaqyc1dv7hv8k33s713ac6lzawarq2";
+ src = fetchFromGitLab {
+ sha256 = "sha256:14lvxzkxmkk54s97ah996m6s1wbw1g3iwawbhsf8qw7sf75vlp1h";
+ domain = "gitlab.com";
rev = version;
repo = "bobcat";
owner = "fbb-git";
@@ -36,7 +37,7 @@ stdenv.mkDerivation rec {
meta = with stdenv.lib; {
description = "Brokken's Own Base Classes And Templates";
- homepage = "https://fbb-git.github.io/bobcat/";
+ homepage = "https://fbb-git.gitlab.io/bobcat/";
license = licenses.gpl3;
platforms = platforms.linux;
};
diff --git a/third_party/nixpkgs/pkgs/development/libraries/boost/generic.nix b/third_party/nixpkgs/pkgs/development/libraries/boost/generic.nix
index 8295be238f..a195a2c7bb 100644
--- a/third_party/nixpkgs/pkgs/development/libraries/boost/generic.nix
+++ b/third_party/nixpkgs/pkgs/development/libraries/boost/generic.nix
@@ -146,11 +146,11 @@ stdenv.mkDerivation {
enableParallelBuilding = true;
- nativeBuildInputs = [ which ];
+ nativeBuildInputs = [ which ]
+ ++ optional stdenv.hostPlatform.isDarwin fixDarwinDylibNames;
depsBuildBuild = [ buildPackages.stdenv.cc ];
buildInputs = [ expat zlib bzip2 libiconv ]
++ optional (stdenv.hostPlatform == stdenv.buildPlatform) icu
- ++ optional stdenv.isDarwin fixDarwinDylibNames
++ optional enablePython python
++ optional enableNumpy python.pkgs.numpy;
diff --git a/third_party/nixpkgs/pkgs/development/libraries/catch2/default.nix b/third_party/nixpkgs/pkgs/development/libraries/catch2/default.nix
index 6d6282debf..4e41f39b49 100644
--- a/third_party/nixpkgs/pkgs/development/libraries/catch2/default.nix
+++ b/third_party/nixpkgs/pkgs/development/libraries/catch2/default.nix
@@ -2,13 +2,13 @@
stdenv.mkDerivation rec {
pname = "catch2";
- version = "2.13.2";
+ version = "2.13.3";
src = fetchFromGitHub {
owner = "catchorg";
repo = "Catch2";
rev = "v${version}";
- sha256="100r0kmra8jmra2hv92lzvwcmphpaiccwvq3lpdsa5b7hailhach";
+ sha256="0m7pwsam1nb93akgnf5fxi737pgbrbcj0y28bavhzcss7yrm4gys";
};
nativeBuildInputs = [ cmake ];
diff --git a/third_party/nixpkgs/pkgs/development/libraries/cogl/default.nix b/third_party/nixpkgs/pkgs/development/libraries/cogl/default.nix
index 08b3b96784..f2a69e87d8 100644
--- a/third_party/nixpkgs/pkgs/development/libraries/cogl/default.nix
+++ b/third_party/nixpkgs/pkgs/development/libraries/cogl/default.nix
@@ -7,11 +7,11 @@ let
pname = "cogl";
in stdenv.mkDerivation rec {
name = "${pname}-${version}";
- version = "1.22.6";
+ version = "1.22.8";
src = fetchurl {
url = "mirror://gnome/sources/${pname}/${stdenv.lib.versions.majorMinor version}/${name}.tar.xz";
- sha256 = "0x8v4n61q89qy27v824bqswpz6bmn801403w2q3pa1lcwk9ln4vd";
+ sha256 = "0nfph4ai60ncdx7hy6hl1i1cmp761jgnyjfhagzi0iqq36qb41d8";
};
patches = [
@@ -29,12 +29,6 @@ in stdenv.mkDerivation rec {
url = "https://bug787443.bugzilla-attachments.gnome.org/attachment.cgi?id=361056";
sha256 = "09fyrdci4727fg6qm5aaapsbv71sf4wgfaqz8jqlyy61dibgg490";
})
-
- # Fix build with libglvnd headers (these headers used to be provided by mesa)
- (fetchpatch {
- url = "https://gitlab.gnome.org/GNOME/cogl/commit/9c4764224aded552fb855b1c2b85b26d2b894adf.patch";
- sha256 = "1v9drpzgcd5pq2shhdcw5px7mdiggk6ga13qjbklq8xpd92ac0i1";
- })
];
outputs = [ "out" "dev" ];
diff --git a/third_party/nixpkgs/pkgs/development/libraries/cpp-utilities/default.nix b/third_party/nixpkgs/pkgs/development/libraries/cpp-utilities/default.nix
index b821faebde..82c4882a36 100644
--- a/third_party/nixpkgs/pkgs/development/libraries/cpp-utilities/default.nix
+++ b/third_party/nixpkgs/pkgs/development/libraries/cpp-utilities/default.nix
@@ -7,13 +7,13 @@
stdenv.mkDerivation rec {
pname = "cpp-utilities";
- version = "5.7.0";
+ version = "5.8.0";
src = fetchFromGitHub {
owner = "Martchus";
repo = pname;
rev = "v${version}";
- sha256 = "04483v9bw6wp831f34fn46zj54v9y7f6qqfmx85fjxhkr3rqk4i0";
+ sha256 = "06mpag2hg2vb03pdc5f9cjkpgw3kdh3bh29xfrbb16ixk4rhv0j7";
};
nativeBuildInputs = [ cmake ];
diff --git a/third_party/nixpkgs/pkgs/development/libraries/cyrus-sasl/default.nix b/third_party/nixpkgs/pkgs/development/libraries/cyrus-sasl/default.nix
index 1ffb535999..cd3fa3bb7f 100644
--- a/third_party/nixpkgs/pkgs/development/libraries/cyrus-sasl/default.nix
+++ b/third_party/nixpkgs/pkgs/development/libraries/cyrus-sasl/default.nix
@@ -18,7 +18,8 @@ stdenv.mkDerivation rec {
outputs = [ "bin" "dev" "out" "man" "devdoc" ];
depsBuildBuild = [ buildPackages.stdenv.cc ];
- nativeBuildInputs = [ autoreconfHook fixDarwinDylibNames pruneLibtoolFiles ];
+ nativeBuildInputs = [ autoreconfHook pruneLibtoolFiles ]
+ ++ lib.optional stdenv.hostPlatform.isDarwin fixDarwinDylibNames;
buildInputs =
[ openssl db gettext kerberos ]
++ lib.optional enableLdap openldap
diff --git a/third_party/nixpkgs/pkgs/development/libraries/dconf/default.nix b/third_party/nixpkgs/pkgs/development/libraries/dconf/default.nix
index 444b1430dd..c9c1b9be92 100644
--- a/third_party/nixpkgs/pkgs/development/libraries/dconf/default.nix
+++ b/third_party/nixpkgs/pkgs/development/libraries/dconf/default.nix
@@ -1,6 +1,5 @@
{ stdenv
, fetchurl
-, fetchpatch
, meson
, ninja
, python3
@@ -19,24 +18,15 @@
stdenv.mkDerivation rec {
pname = "dconf";
- version = "0.36.0";
+ version = "0.38.0";
outputs = [ "out" "lib" "dev" "devdoc" ];
src = fetchurl {
url = "mirror://gnome/sources/${pname}/${stdenv.lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
- sha256 = "0bfs069pjv6lhp7xrzmrhz3876ay2ryqxzc6mlva1hhz34ibprlz";
+ sha256 = "0n2gqkp6d61h7gnnp2xnxp6w5wcl7w9ay58krrf729qd6d0hzxj5";
};
- patches = [
- # Fix bash-completion installation
- # https://gitlab.gnome.org/GNOME/dconf/merge_requests/58
- (fetchpatch {
- url = "https://gitlab.gnome.org/GNOME/dconf/commit/b3c9423c6151f3c28e526083ea2f04987a780fdf.patch";
- sha256 = "0kdapiw3zq041jhzsx90kk08vqfgzr6vy2k541iav984d0m0zcnf";
- })
- ];
-
nativeBuildInputs = [
meson
ninja
diff --git a/third_party/nixpkgs/pkgs/development/libraries/doctest/default.nix b/third_party/nixpkgs/pkgs/development/libraries/doctest/default.nix
index 5a25610568..d647d5f388 100644
--- a/third_party/nixpkgs/pkgs/development/libraries/doctest/default.nix
+++ b/third_party/nixpkgs/pkgs/development/libraries/doctest/default.nix
@@ -2,13 +2,13 @@
stdenv.mkDerivation rec {
pname = "doctest";
- version = "2.4.0";
+ version = "2.4.1";
src = fetchFromGitHub {
owner = "onqtam";
repo = "doctest";
rev = version;
- sha256 = "1yi95saqv8qb3ix6w8d7ffvs7qbwvqmq6wblckhxhicxxdxk85cd";
+ sha256 = "17g7n6rjs90i0b231x5s934qnr8m80ga2yg1z344bnsdiqcjd63w";
};
nativeBuildInputs = [ cmake ];
diff --git a/third_party/nixpkgs/pkgs/development/libraries/duckdb/default.nix b/third_party/nixpkgs/pkgs/development/libraries/duckdb/default.nix
index 9b1adb7e23..1aedee5c3b 100644
--- a/third_party/nixpkgs/pkgs/development/libraries/duckdb/default.nix
+++ b/third_party/nixpkgs/pkgs/development/libraries/duckdb/default.nix
@@ -5,13 +5,13 @@
stdenv.mkDerivation rec {
pname = "duckdb";
- version = "0.2.1";
+ version = "0.2.2";
src = fetchFromGitHub {
owner = "cwida";
repo = "duckdb";
rev = "v${version}";
- sha256 = "18l4qdzfm8k9ggn49r3h99cbcmmq01byzkxps3pvmq8q246hb55x";
+ sha256 = "1pzz2zjzpvji5am21vd9kjxj0pnxsjmrsfqrym9h2rk2mi7p2cx8";
};
nativeBuildInputs = [ cmake ];
diff --git a/third_party/nixpkgs/pkgs/development/libraries/faudio/default.nix b/third_party/nixpkgs/pkgs/development/libraries/faudio/default.nix
index 2898eb937f..8f6123fb85 100644
--- a/third_party/nixpkgs/pkgs/development/libraries/faudio/default.nix
+++ b/third_party/nixpkgs/pkgs/development/libraries/faudio/default.nix
@@ -4,16 +4,16 @@
stdenv.mkDerivation rec {
pname = "faudio";
- version = "20.10";
+ version = "20.11";
src = fetchFromGitHub {
owner = "FNA-XNA";
repo = "FAudio";
rev = version;
- sha256 = "0f5b45zdsy3yv2jsdy5zsd6xcfk1z5w5vlyvnim3d4bn875sp370";
+ sha256 = "0mc8dkdmvkaq418vwn6y9d7fbcdp47djc38rly7b4zarl8hwmc4q";
};
- nativeBuildInputs = [cmake];
+ nativeBuildInputs = [cmake];
buildInputs = [ SDL2 ];
diff --git a/third_party/nixpkgs/pkgs/development/libraries/folks/default.nix b/third_party/nixpkgs/pkgs/development/libraries/folks/default.nix
index e9df0ef401..6181cb45e1 100644
--- a/third_party/nixpkgs/pkgs/development/libraries/folks/default.nix
+++ b/third_party/nixpkgs/pkgs/development/libraries/folks/default.nix
@@ -16,7 +16,6 @@
, nss
, dbus
, libgee
-, telepathy-glib
, evolution-data-server
, libsecret
, db
@@ -26,6 +25,8 @@
, gtk-doc
, docbook-xsl-nons
, docbook_xml_dtd_43
+, telepathy-glib
+, telepathySupport ? false
}:
# TODO: enable more folks backends
@@ -43,6 +44,7 @@ stdenv.mkDerivation rec {
mesonFlags = [
"-Ddocs=true"
+ "-Dtelepathy_backend=${stdenv.lib.boolToString telepathySupport}"
];
nativeBuildInputs = [
@@ -69,8 +71,7 @@ stdenv.mkDerivation rec {
nspr
nss
readline
- telepathy-glib
- ];
+ ] ++ stdenv.lib.optional telepathySupport telepathy-glib;
propagatedBuildInputs = [
glib
@@ -109,6 +110,6 @@ stdenv.mkDerivation rec {
homepage = "https://wiki.gnome.org/Projects/Folks";
license = licenses.lgpl2Plus;
maintainers = teams.gnome.members;
- platforms = platforms.gnu ++ platforms.linux; # arbitrary choice
+ platforms = platforms.gnu ++ platforms.linux; # arbitrary choice
};
}
diff --git a/third_party/nixpkgs/pkgs/development/libraries/gcr/default.nix b/third_party/nixpkgs/pkgs/development/libraries/gcr/default.nix
index 55827b1ad0..212b087fbe 100644
--- a/third_party/nixpkgs/pkgs/development/libraries/gcr/default.nix
+++ b/third_party/nixpkgs/pkgs/development/libraries/gcr/default.nix
@@ -22,11 +22,11 @@
stdenv.mkDerivation rec {
pname = "gcr";
- version = "3.36.0";
+ version = "3.38.0";
src = fetchurl {
url = "mirror://gnome/sources/${pname}/${stdenv.lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
- sha256 = "00b6bzpr8rj8mvj66r2273r417wg2y21m6n88mhkq9m22z8bxyda";
+ sha256 = "1q97pba4bzjndm1vlvicyv8mrl0n589qsw71dp8jrz2payvcfk56";
};
postPatch = ''
diff --git a/third_party/nixpkgs/pkgs/development/libraries/gdk-pixbuf/default.nix b/third_party/nixpkgs/pkgs/development/libraries/gdk-pixbuf/default.nix
index 1f4bc5c12a..9b2fd0b778 100644
--- a/third_party/nixpkgs/pkgs/development/libraries/gdk-pixbuf/default.nix
+++ b/third_party/nixpkgs/pkgs/development/libraries/gdk-pixbuf/default.nix
@@ -61,9 +61,7 @@ stdenv.mkDerivation rec {
gobject-introspection
makeWrapper
glib
- ] ++ stdenv.lib.optional stdenv.isDarwin [
- fixDarwinDylibNames
- ];
+ ] ++ stdenv.lib.optional stdenv.isDarwin fixDarwinDylibNames;
propagatedBuildInputs = [
glib
diff --git a/third_party/nixpkgs/pkgs/development/libraries/gjs/default.nix b/third_party/nixpkgs/pkgs/development/libraries/gjs/default.nix
index 1cad5c0deb..9437d76335 100644
--- a/third_party/nixpkgs/pkgs/development/libraries/gjs/default.nix
+++ b/third_party/nixpkgs/pkgs/development/libraries/gjs/default.nix
@@ -8,7 +8,7 @@
, gtk3
, atk
, gobject-introspection
-, spidermonkey_68
+, spidermonkey_78
, pango
, cairo
, readline
@@ -29,11 +29,11 @@ let
];
in stdenv.mkDerivation rec {
pname = "gjs";
- version = "1.64.4";
+ version = "1.66.1";
src = fetchurl {
url = "mirror://gnome/sources/gjs/${stdenv.lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
- sha256 = "0k6l2qc2vkws34zrgdhl57qxf0jjkar2iziz6qn4n1w7va73mk53";
+ sha256 = "0k1ld2bc4c3zbyjpfgx15v5n02iywdvm106rys5jqr7zbr2l0hld";
};
outputs = [ "out" "dev" "installedTests" ];
@@ -51,7 +51,7 @@ in stdenv.mkDerivation rec {
gobject-introspection
cairo
readline
- spidermonkey_68
+ spidermonkey_78
dbus # for dbus-run-session
];
@@ -88,22 +88,22 @@ in stdenv.mkDerivation rec {
# in the GIR files. When running tests, the library is not yet installed,
# though, so we need to replace the absolute path with a local one during build.
# We are using a symlink that will be overridden during installation.
- mkdir -p $out/lib $installedTests/libexec/gjs/installed-tests
+ mkdir -p $out/lib $installedTests/libexec/installed-tests/gjs
ln -s $PWD/libgjs.so.0 $out/lib/libgjs.so.0
- ln -s $PWD/installed-tests/js/libgimarshallingtests.so $installedTests/libexec/gjs/installed-tests/libgimarshallingtests.so
- ln -s $PWD/installed-tests/js/libregress.so $installedTests/libexec/gjs/installed-tests/libregress.so
- ln -s $PWD/installed-tests/js/libwarnlib.so $installedTests/libexec/gjs/installed-tests/libwarnlib.so
+ ln -s $PWD/installed-tests/js/libgimarshallingtests.so $installedTests/libexec/installed-tests/gjs/libgimarshallingtests.so
+ ln -s $PWD/installed-tests/js/libregress.so $installedTests/libexec/installed-tests/gjs/libregress.so
+ ln -s $PWD/installed-tests/js/libwarnlib.so $installedTests/libexec/installed-tests/gjs/libwarnlib.so
'';
postInstall = ''
- # TODO: make the glib setup hook handle this
+ # TODO: make the glib setup hook handle moving the schemas in other outputs.
installedTestsSchemaDatadir="$installedTests/share/gsettings-schemas/${pname}-${version}"
mkdir -p "$installedTestsSchemaDatadir"
mv "$installedTests/share/glib-2.0" "$installedTestsSchemaDatadir"
'';
postFixup = ''
- wrapProgram "$installedTests/libexec/gjs/installed-tests/minijasmine" \
+ wrapProgram "$installedTests/libexec/installed-tests/gjs/minijasmine" \
--prefix XDG_DATA_DIRS : "$installedTestsSchemaDatadir" \
--prefix GI_TYPELIB_PATH : "${stdenv.lib.makeSearchPath "lib/girepository-1.0" testDeps}"
'';
diff --git a/third_party/nixpkgs/pkgs/development/libraries/gjs/installed-tests-path.patch b/third_party/nixpkgs/pkgs/development/libraries/gjs/installed-tests-path.patch
index f9b1515b68..09cd8eaff4 100644
--- a/third_party/nixpkgs/pkgs/development/libraries/gjs/installed-tests-path.patch
+++ b/third_party/nixpkgs/pkgs/development/libraries/gjs/installed-tests-path.patch
@@ -1,22 +1,22 @@
diff --git a/installed-tests/meson.build b/installed-tests/meson.build
-index 7e842025..1e5029e0 100644
+index 04c7910f..9647908c 100644
--- a/installed-tests/meson.build
+++ b/installed-tests/meson.build
@@ -1,7 +1,7 @@
### Installed tests ############################################################
--installed_tests_execdir = get_option('prefix') / pkglibexecdir / 'installed-tests'
+-installed_tests_execdir = get_option('prefix') / get_option('libexecdir') / 'installed-tests' / meson.project_name()
-installed_tests_metadir = abs_datadir / 'installed-tests' / meson.project_name()
-+installed_tests_execdir = get_option('installed_test_prefix') / 'libexec' / meson.project_name() / 'installed-tests'
++installed_tests_execdir = get_option('installed_test_prefix') / 'libexec' / 'installed-tests' / meson.project_name()
+installed_tests_metadir = get_option('installed_test_prefix') / 'share' / 'installed-tests' / meson.project_name()
# Simple shell script tests #
diff --git a/meson.build b/meson.build
-index 084d5396..e5d73fcd 100644
+index 9ab29475..42ffe07f 100644
--- a/meson.build
+++ b/meson.build
-@@ -540,7 +540,7 @@ install_data('installed-tests/extra/lsan.supp',
+@@ -557,7 +557,7 @@ install_data('installed-tests/extra/lsan.supp',
install_dir: get_option('datadir') / api_name / 'lsan')
if get_option('installed_tests')
@@ -26,7 +26,7 @@ index 084d5396..e5d73fcd 100644
meson.add_install_script('build/compile-gschemas.py', schemadir)
endif
diff --git a/meson_options.txt b/meson_options.txt
-index 66f66024..008687cb 100644
+index 825ba77a..21f0323c 100644
--- a/meson_options.txt
+++ b/meson_options.txt
@@ -25,3 +25,5 @@ option('skip_gtk_tests', type: 'boolean', value: false,
diff --git a/third_party/nixpkgs/pkgs/development/libraries/glfw/3.x.nix b/third_party/nixpkgs/pkgs/development/libraries/glfw/3.x.nix
index 1b9fcb9586..fbc1cb818c 100644
--- a/third_party/nixpkgs/pkgs/development/libraries/glfw/3.x.nix
+++ b/third_party/nixpkgs/pkgs/development/libraries/glfw/3.x.nix
@@ -18,10 +18,11 @@ stdenv.mkDerivation rec {
propagatedBuildInputs = [ libGL ];
- nativeBuildInputs = [ cmake ];
+ nativeBuildInputs = [ cmake ]
+ ++ lib.optional stdenv.isDarwin fixDarwinDylibNames;
buildInputs = [ libX11 libXrandr libXinerama libXcursor libXi libXext ]
- ++ lib.optionals stdenv.isDarwin [ Cocoa Kernel fixDarwinDylibNames ];
+ ++ lib.optionals stdenv.isDarwin [ Cocoa Kernel ];
cmakeFlags = [ "-DBUILD_SHARED_LIBS=ON" ];
diff --git a/third_party/nixpkgs/pkgs/development/libraries/glib-networking/default.nix b/third_party/nixpkgs/pkgs/development/libraries/glib-networking/default.nix
index 59bf848597..fc85b50e07 100644
--- a/third_party/nixpkgs/pkgs/development/libraries/glib-networking/default.nix
+++ b/third_party/nixpkgs/pkgs/development/libraries/glib-networking/default.nix
@@ -18,13 +18,13 @@
stdenv.mkDerivation rec {
pname = "glib-networking";
- version = "2.64.3";
+ version = "2.66.0";
outputs = [ "out" "installedTests" ];
src = fetchurl {
url = "mirror://gnome/sources/${pname}/${stdenv.lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
- sha256 = "0s518l4bwvdvcp51lbjqcw8g0vq18bznpf5hq2zi6a054jqhcylk";
+ sha256 = "16807qwflbghp0c66jdx2gnaffvdp4bla35ppzp9dlgx6wjbxmy5";
};
patches = [
diff --git a/third_party/nixpkgs/pkgs/development/libraries/glib/default.nix b/third_party/nixpkgs/pkgs/development/libraries/glib/default.nix
index df19b9fc88..de874a798b 100644
--- a/third_party/nixpkgs/pkgs/development/libraries/glib/default.nix
+++ b/third_party/nixpkgs/pkgs/development/libraries/glib/default.nix
@@ -45,11 +45,11 @@ in
stdenv.mkDerivation rec {
pname = "glib";
- version = "2.64.5";
+ version = "2.66.2";
src = fetchurl {
url = "mirror://gnome/sources/glib/${stdenv.lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
- sha256 = "04fczq693wivkqd2qxvvi3sncqgznsvzfiiwsll1rbayf795pgcw";
+ sha256 = "1i0pd8y6xz64qlzfj73wxyqp0x7x9j6mwf4gj6ggil4d9vnhnfgc";
};
patches = optionals stdenv.isDarwin [
diff --git a/third_party/nixpkgs/pkgs/development/libraries/globalarrays/default.nix b/third_party/nixpkgs/pkgs/development/libraries/globalarrays/default.nix
index 423272fcd4..5f700f7351 100644
--- a/third_party/nixpkgs/pkgs/development/libraries/globalarrays/default.nix
+++ b/third_party/nixpkgs/pkgs/development/libraries/globalarrays/default.nix
@@ -3,7 +3,7 @@
} :
let
- version = "5.7.2";
+ version = "5.8";
in stdenv.mkDerivation {
pname = "globalarrays";
@@ -13,7 +13,7 @@ in stdenv.mkDerivation {
owner = "GlobalArrays";
repo = "ga";
rev = "v${version}";
- sha256 = "0c1y9a5jpdw9nafzfmvjcln1xc2gklskaly0r1alm18ng9zng33i";
+ sha256 = "0bky91ncz6vy0011ps9prsnq9f4a5s5xwr23kkmi39xzg0417mnd";
};
nativeBuildInputs = [ autoreconfHook ];
diff --git a/third_party/nixpkgs/pkgs/development/libraries/gnome-online-accounts/default.nix b/third_party/nixpkgs/pkgs/development/libraries/gnome-online-accounts/default.nix
index 7b254b922b..b8369db59f 100644
--- a/third_party/nixpkgs/pkgs/development/libraries/gnome-online-accounts/default.nix
+++ b/third_party/nixpkgs/pkgs/development/libraries/gnome-online-accounts/default.nix
@@ -30,7 +30,7 @@
stdenv.mkDerivation rec {
pname = "gnome-online-accounts";
- version = "3.36.0";
+ version = "3.37.90";
# https://gitlab.gnome.org/GNOME/gnome-online-accounts/issues/87
src = fetchFromGitLab {
@@ -38,7 +38,7 @@ stdenv.mkDerivation rec {
owner = "GNOME";
repo = "gnome-online-accounts";
rev = version;
- sha256 = "15j3xh93rqjphjw56j00g40m684nr4zy3hs7dsngm6a21l87fkfd";
+ sha256 = "05ahib6bjbfyj2gbqjijzg9i7x1q0r67hyph0fbrgnnadlpk2cv8";
};
outputs = [ "out" "man" "dev" "devdoc" ];
diff --git a/third_party/nixpkgs/pkgs/development/libraries/gobject-introspection/default.nix b/third_party/nixpkgs/pkgs/development/libraries/gobject-introspection/default.nix
index 03b0d1767d..97b3ea9a8f 100644
--- a/third_party/nixpkgs/pkgs/development/libraries/gobject-introspection/default.nix
+++ b/third_party/nixpkgs/pkgs/development/libraries/gobject-introspection/default.nix
@@ -26,7 +26,7 @@
stdenv.mkDerivation rec {
pname = "gobject-introspection";
- version = "1.64.1";
+ version = "1.66.1";
# outputs TODO: share/gobject-introspection-1.0/tests is needed during build
# by pygobject3 (and maybe others), but it's only searched in $out
@@ -35,7 +35,7 @@ stdenv.mkDerivation rec {
src = fetchurl {
url = "mirror://gnome/sources/${pname}/${stdenv.lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
- sha256 = "19vz7vp10h0zj3f491yk72dp89bix6rgkzxg4qcm4d6151ksxgl0";
+ sha256 = "078n0q7b6z682mf4irclrksm73cyixq295mqnqifl9plwmgaai6x";
};
patches = [
@@ -63,7 +63,6 @@ stdenv.mkDerivation rec {
bison
gtk-doc
docbook-xsl-nons
- docbook_xml_dtd_43 # FIXME: remove in next release
docbook_xml_dtd_45
python3
setupHook # move .gir files
@@ -91,6 +90,12 @@ stdenv.mkDerivation rec {
doCheck = !stdenv.isAarch64;
+ # During configurePhase, two python scripts are generated and need this. See
+ # https://github.com/NixOS/nixpkgs/pull/98316#issuecomment-695785692
+ postConfigure = ''
+ patchShebangs tools/*
+ '';
+
preCheck = ''
# Our gobject-introspection patches make the shared library paths absolute
# in the GIR files. When running tests, the library is not yet installed,
diff --git a/third_party/nixpkgs/pkgs/development/libraries/google-cloud-cpp/default.nix b/third_party/nixpkgs/pkgs/development/libraries/google-cloud-cpp/default.nix
index 7eb69d075c..104823b279 100644
--- a/third_party/nixpkgs/pkgs/development/libraries/google-cloud-cpp/default.nix
+++ b/third_party/nixpkgs/pkgs/development/libraries/google-cloud-cpp/default.nix
@@ -57,6 +57,7 @@ in stdenv.mkDerivation rec {
license = with licenses; [ asl20 ];
homepage = "https://github.com/googleapis/google-cloud-cpp";
description = "C++ Idiomatic Clients for Google Cloud Platform services";
- maintainers = with maintainers; [ andir flokli ];
+ maintainers = with maintainers; [ andir ];
+ broken = true; # Broken on Hydra since 2020-05-19
};
}
diff --git a/third_party/nixpkgs/pkgs/development/libraries/grilo-plugins/default.nix b/third_party/nixpkgs/pkgs/development/libraries/grilo-plugins/default.nix
index 3dced2d621..9073a501c0 100644
--- a/third_party/nixpkgs/pkgs/development/libraries/grilo-plugins/default.nix
+++ b/third_party/nixpkgs/pkgs/development/libraries/grilo-plugins/default.nix
@@ -31,11 +31,11 @@
stdenv.mkDerivation rec {
pname = "grilo-plugins";
- version = "0.3.11";
+ version = "0.3.12";
src = fetchurl {
url = "mirror://gnome/sources/${pname}/${stdenv.lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
- sha256 = "0wyd3n5mn7b77hxylkc3f62v01mlavh96901pz342hwrn42ydqnx";
+ sha256 = "0xr59gzb8gw2bgj14mjllgn8y7srh373j0fp0v16ak8nd84dzdn6";
};
patches = [
diff --git a/third_party/nixpkgs/pkgs/development/libraries/grilo/default.nix b/third_party/nixpkgs/pkgs/development/libraries/grilo/default.nix
index 12f069891e..858e8d81fd 100644
--- a/third_party/nixpkgs/pkgs/development/libraries/grilo/default.nix
+++ b/third_party/nixpkgs/pkgs/development/libraries/grilo/default.nix
@@ -4,7 +4,7 @@
let
pname = "grilo";
- version = "0.3.12"; # if you change minor, also change ./setup-hook.sh
+ version = "0.3.13"; # if you change minor, also change ./setup-hook.sh
in stdenv.mkDerivation rec {
name = "${pname}-${version}";
@@ -13,7 +13,7 @@ in stdenv.mkDerivation rec {
src = fetchurl {
url = "mirror://gnome/sources/${pname}/${stdenv.lib.versions.majorMinor version}/${name}.tar.xz";
- sha256 = "0w8sq5g6g1rg85h53vbll8va70fcp6082mlpmy98aa03444ddyyv";
+ sha256 = "0ywjvh7xw4ql1q4fvl0q5n06n08pga1g1nc9l7c3x5214gr3fj6i";
};
setupHook = ./setup-hook.sh;
diff --git a/third_party/nixpkgs/pkgs/development/libraries/gsettings-desktop-schemas/default.nix b/third_party/nixpkgs/pkgs/development/libraries/gsettings-desktop-schemas/default.nix
index 6a94944e9f..1032f15196 100644
--- a/third_party/nixpkgs/pkgs/development/libraries/gsettings-desktop-schemas/default.nix
+++ b/third_party/nixpkgs/pkgs/development/libraries/gsettings-desktop-schemas/default.nix
@@ -1,22 +1,41 @@
-{ stdenv, fetchurl, pkgconfig, glib, gobject-introspection
+{ stdenv
+, fetchurl
+, pkgconfig
+, glib
+, gobject-introspection
, meson
, ninja
, python3
# just for passthru
-, gnome3 }:
+, gnome3
+}:
stdenv.mkDerivation rec {
pname = "gsettings-desktop-schemas";
- version = "3.36.1";
+ version = "3.38.0";
src = fetchurl {
- url = "mirror://gnome/sources/gsettings-desktop-schemas/${stdenv.lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
- sha256 = "1nf97vq07gadwdla6kws8z510xlmv0a7wlyqwwnhyagq7kjdnjq0";
+ url = "mirror://gnome/sources/${pname}/${stdenv.lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
+ sha256 = "0rwcg9sd5rv7gjwapcd1jjk6l16w0p3j7wkicq1rdch4c0kch12p";
};
- passthru = {
- updateScript = gnome3.updateScript { packageName = "gsettings-desktop-schemas"; };
- };
+ nativeBuildInputs = [
+ glib
+ meson
+ ninja
+ pkgconfig
+ python3
+ ];
+
+ buildInputs = [
+ glib
+ gobject-introspection
+ ];
+
+ postPatch = ''
+ chmod +x build-aux/meson/post-install.py
+ patchShebangs build-aux/meson/post-install.py
+ '';
# meson installs the schemas to share/glib-2.0/schemas
# We add the override file there too so it will be compiled and later moved by
@@ -32,16 +51,15 @@ stdenv.mkDerivation rec {
EOF
'';
- postPatch = ''
- chmod +x build-aux/meson/post-install.py
- patchShebangs build-aux/meson/post-install.py
- '';
-
- buildInputs = [ glib gobject-introspection ];
-
- nativeBuildInputs = [ pkgconfig python3 meson ninja glib ];
+ passthru = {
+ updateScript = gnome3.updateScript {
+ packageName = pname;
+ };
+ };
meta = with stdenv.lib; {
+ description = "Collection of GSettings schemas for settings shared by various components of a desktop";
+ license = licenses.lgpl21Plus;
maintainers = teams.gnome.members;
};
}
diff --git a/third_party/nixpkgs/pkgs/development/libraries/gspell/default.nix b/third_party/nixpkgs/pkgs/development/libraries/gspell/default.nix
index 17e98b8e40..582244f4f4 100644
--- a/third_party/nixpkgs/pkgs/development/libraries/gspell/default.nix
+++ b/third_party/nixpkgs/pkgs/development/libraries/gspell/default.nix
@@ -2,7 +2,7 @@
let
pname = "gspell";
- version = "1.8.3";
+ version = "1.8.4";
in stdenv.mkDerivation rec {
name = "${pname}-${version}";
@@ -11,7 +11,7 @@ in stdenv.mkDerivation rec {
src = fetchurl {
url = "mirror://gnome/sources/${pname}/${stdenv.lib.versions.majorMinor version}/${name}.tar.xz";
- sha256 = "1s1dns070pz8dg04ppshdbx1r86n9406vkxcfs8hdghn0bfi9ras";
+ sha256 = "1d23pl9956dkpy52pbndp0vrba0y030msh1issdl84z82skickfg";
};
propagatedBuildInputs = [ enchant2 ]; # required for pkgconfig
diff --git a/third_party/nixpkgs/pkgs/development/libraries/gstreamer/bad/default.nix b/third_party/nixpkgs/pkgs/development/libraries/gstreamer/bad/default.nix
index 903ca66148..a29fad8a4c 100644
--- a/third_party/nixpkgs/pkgs/development/libraries/gstreamer/bad/default.nix
+++ b/third_party/nixpkgs/pkgs/development/libraries/gstreamer/bad/default.nix
@@ -29,6 +29,7 @@
, libbs2b
, libmodplug
, mpeg2dec
+, libmicrodns
, openjpeg
, libopus
, librsvg
@@ -65,6 +66,7 @@
, wayland-protocols
, wildmidi
, fluidsynth
+, libva
, libvdpau
, wayland
, libwebp
@@ -87,41 +89,45 @@ let
inherit (stdenv.lib) optional optionals;
in stdenv.mkDerivation rec {
pname = "gst-plugins-bad";
- version = "1.16.2";
+ version = "1.18.0";
outputs = [ "out" "dev" ];
src = fetchurl {
url = "${meta.homepage}/src/${pname}/${pname}-${version}.tar.xz";
- sha256 = "0x0y0hm0ga3zqi5q4090hw5sjh59y1ry9ak16qsaascm72i7mjzi";
+ sha256 = "0pqqq5bs9fjwcmbwgsgxs2dx6gznhxs7ii5pmjkslr6xmlfap0pk";
};
patches = [
- # Fix build with neon 0.31
- # https://gitlab.freedesktop.org/gstreamer/gst-plugins-bad/-/merge_requests/1165
- (fetchpatch {
- url = "https://gitlab.freedesktop.org/gstreamer/gst-plugins-bad/-/commit/f10b424418e448211e3427a76fcd046e157ef0b7.patch";
- sha256 = "0l1f6kqcl04q7w12a2b4qibcvjz6gqhs0csdv2wbvfd6zndpjm6p";
- })
./fix_pkgconfig_includedir.patch
- # https://gitlab.freedesktop.org/gstreamer/gst-plugins-bad/-/merge_requests/1235
- ./opencv-4.3.patch
+ # Fixes srt usage failing with
+ # Failed to open SRT: failed to set SRTO_LINGER (reason: Operation not supported: Bad parameters)
+ # see https://github.com/Haivision/srt/issues/1374
+ # Remove when https://gitlab.freedesktop.org/gstreamer/gst-plugins-bad/-/commit/84f8dbd932029220ee86154dd85b241911ea3891
+ # is shown as being in a release tag that nixpkgs uses.
+ (fetchpatch {
+ name = "gstreamer-srtobject-typecast-SRTO_LINGER-to-linger.patch";
+ url = "https://gitlab.freedesktop.org/gstreamer/gst-plugins-bad/-/commit/84f8dbd932029220ee86154dd85b241911ea3891.patch";
+ sha256 = "0596lvgi93sj3yn98grgmsrhnqhhq7fnjk91qi4xc6618fpqmp9x";
+ })
];
nativeBuildInputs = [
meson
ninja
pkgconfig
+ orc # for orcc
python3
gettext
gobject-introspection
] ++ optionals stdenv.isLinux [
- wayland-protocols
+ wayland # for wayland-scanner
];
buildInputs = [
gst-plugins-base
orc
+ gobject-introspection
faad2
libass
libkate
@@ -130,6 +136,7 @@ in stdenv.mkDerivation rec {
libbs2b
libmodplug
mpeg2dec
+ libmicrodns
openjpeg
libopus
librsvg
@@ -154,6 +161,7 @@ in stdenv.mkDerivation rec {
soundtouch
srtp
fluidsynth
+ libva
libvdpau
libwebp
xvidcore
@@ -173,6 +181,7 @@ in stdenv.mkDerivation rec {
] ++ optionals stdenv.isLinux [
bluez
wayland
+ wayland-protocols
] ++ optionals (!stdenv.isDarwin) [
# wildmidi requires apple's OpenAL
# TODO: package apple's OpenAL, fix wildmidi, include on Darwin
@@ -215,11 +224,14 @@ in stdenv.mkDerivation rec {
mesonFlags = [
"-Dexamples=disabled" # requires many dependencies and probably not useful for our users
+ "-Ddoc=disabled" # `hotdoc` not packaged in nixpkgs as of writing
+ "-Davtp=disabled"
"-Ddts=disabled" # required `libdca` library not packaged in nixpkgs as of writing, and marked as "BIG FAT WARNING: libdca is still in early development"
"-Dzbar=${if enableZbar then "enabled" else "disabled"}"
"-Dfaac=${if faacSupport then "enabled" else "disabled"}"
"-Diqa=disabled" # required `dssim` library not packaging in nixpkgs as of writing
+ "-Dmagicleap=disabled" # required `ml_audio` library not packaged in nixpkgs as of writing
"-Dmsdk=disabled" # not packaged in nixpkgs as of writing / no Windows support
# As of writing, with `libmpcdec` in `buildInputs` we get
# "Could not find libmpcdec header files, but Musepack was enabled via options"
@@ -236,19 +248,16 @@ in stdenv.mkDerivation rec {
"-Dopenni2=disabled" # not packaged in nixpkgs as of writing
"-Dopensles=disabled" # not packaged in nixpkgs as of writing
"-Dsctp=disabled" # required `usrsctp` library not packaged in nixpkgs as of writing
+ "-Dsvthevcenc=disabled" # required `SvtHevcEnc` library not packaged in nixpkgs as of writing
"-Dteletext=disabled" # required `zvbi` library not packaged in nixpkgs as of writing
"-Dtinyalsa=disabled" # not packaged in nixpkgs as of writing
"-Dvoaacenc=disabled" # required `vo-aacenc` library not packaged in nixpkgs as of writing
"-Dvoamrwbenc=disabled" # required `vo-amrwbenc` library not packaged in nixpkgs as of writing
"-Dvulkan=disabled" # Linux-only, and we haven't figured out yet which of the vulkan nixpkgs it needs
"-Dwasapi=disabled" # not packaged in nixpkgs as of writing / no Windows support
+ "-Dwasapi2=disabled" # not packaged in nixpkgs as of writing / no Windows support
"-Dwpe=disabled" # required `wpe-webkit` library not packaged in nixpkgs as of writing
-
- # Requires CUDA and we haven't figured out how to make Meson find CUDA yet;
- # it probably searches via pkgconfig, for which we have no .pc files,
- # see https://github.com/NixOS/nixpkgs/issues/54395
- "-Dnvdec=disabled"
- "-Dnvenc=disabled"
+ "-Dzxing=disabled" # required `zxing-cpp` library not packaged in nixpkgs as of writing
]
++ optionals stdenv.isDarwin [
"-Dbluez=disabled"
@@ -276,6 +285,14 @@ in stdenv.mkDerivation rec {
"-Dapplemedia=disabled"
];
+ # Argument list too long
+ strictDeps = true;
+
+ postPatch = ''
+ patchShebangs \
+ scripts/extract-release-date-from-doap-file.py
+ '';
+
# This package has some `_("string literal")` string formats
# that trip up clang with format security enabled.
hardeningDisable = [ "format" ];
diff --git a/third_party/nixpkgs/pkgs/development/libraries/gstreamer/bad/opencv-4.3.patch b/third_party/nixpkgs/pkgs/development/libraries/gstreamer/bad/opencv-4.3.patch
deleted file mode 100644
index 55155d5c5e..0000000000
--- a/third_party/nixpkgs/pkgs/development/libraries/gstreamer/bad/opencv-4.3.patch
+++ /dev/null
@@ -1,13 +0,0 @@
-diff --git a/ext/opencv/meson.build b/ext/opencv/meson.build
-index f38b55d..05b142e 100644
---- a/ext/opencv/meson.build
-+++ b/ext/opencv/meson.build
-@@ -65,7 +65,7 @@ if opencv_found
- endif
- endforeach
- else
-- opencv_dep = dependency('opencv4', version : ['>= 4.0.0', '< 4.2.0'], required : false)
-+ opencv_dep = dependency('opencv4', version : ['>= 4.0.0', '< 4.4.0'], required : false)
- opencv_found = opencv_dep.found()
- if opencv_found
- foreach h : libopencv4_headers
diff --git a/third_party/nixpkgs/pkgs/development/libraries/gstreamer/base/default.nix b/third_party/nixpkgs/pkgs/development/libraries/gstreamer/base/default.nix
index 79405e5077..db964c5c43 100644
--- a/third_party/nixpkgs/pkgs/development/libraries/gstreamer/base/default.nix
+++ b/third_party/nixpkgs/pkgs/development/libraries/gstreamer/base/default.nix
@@ -19,11 +19,9 @@
, libvisual
, tremor # provides 'virbisidec'
, libGL
-, gtk-doc
-, docbook_xsl
-, docbook_xml_dtd_43
, enableX11 ? stdenv.isLinux
, libXv
+, libXext
, enableWayland ? stdenv.isLinux
, wayland
, wayland-protocols
@@ -42,13 +40,13 @@
stdenv.mkDerivation rec {
pname = "gst-plugins-base";
- version = "1.16.2";
+ version = "1.18.0";
outputs = [ "out" "dev" ];
src = fetchurl {
url = "${meta.homepage}/src/${pname}/${pname}-${version}.tar.xz";
- sha256 = "0sl1hxlyq46r02k7z70v09vx1gi4rcypqmzra9jid93lzvi76gmi";
+ sha256 = "15vqvcy842vhbic3w7l4yvannzazdgwggzv2x8f9m02hm78vsakn";
};
patches = [
@@ -66,9 +64,7 @@ stdenv.mkDerivation rec {
gobject-introspection
# docs
- gtk-doc
- docbook_xsl
- docbook_xml_dtd_43
+ # TODO add hotdoc here
] ++ lib.optional enableWayland wayland;
buildInputs = [
@@ -89,6 +85,7 @@ stdenv.mkDerivation rec {
] ++ lib.optionals enableAlsa [
alsaLib
] ++ lib.optionals enableX11 [
+ libXext
libXv
pango
] ++ lib.optionals enableWayland [
@@ -103,17 +100,10 @@ stdenv.mkDerivation rec {
mesonFlags = [
"-Dexamples=disabled" # requires many dependencies and probably not useful for our users
+ "-Ddoc=disabled" # `hotdoc` not packaged in nixpkgs as of writing
"-Dgl-graphene=disabled" # not packaged in nixpkgs as of writing
# See https://github.com/GStreamer/gst-plugins-base/blob/d64a4b7a69c3462851ff4dcfa97cc6f94cd64aef/meson_options.txt#L15 for a list of choices
"-Dgl_winsys=${lib.concatStringsSep "," (lib.optional enableX11 "x11" ++ lib.optional enableWayland "wayland" ++ lib.optional enableCocoa "cocoa")}"
- # We must currently disable gtk_doc API docs generation,
- # because it is not compatible with some features being disabled.
- # See for example
- # https://gitlab.freedesktop.org/gstreamer/gst-plugins-base/issues/564
- # for it failing because some Wayland symbols are missing.
- # This problem appeared between 1.15.1 and 1.16.0.
- # In 1.18 they should switch to hotdoc, which should make this issue irrelevant.
- "-Dgtk_doc=disabled"
]
++ lib.optional (!enableX11) "-Dx11=disabled"
# TODO How to disable Wayland?
@@ -125,7 +115,9 @@ stdenv.mkDerivation rec {
];
postPatch = ''
- patchShebangs common/scangobj-merge.py
+ patchShebangs \
+ common/scangobj-merge.py \
+ scripts/extract-release-date-from-doap-file.py
'';
# This package has some `_("string literal")` string formats
diff --git a/third_party/nixpkgs/pkgs/development/libraries/gstreamer/core/default.nix b/third_party/nixpkgs/pkgs/development/libraries/gstreamer/core/default.nix
index 9c4f3ee025..be4d19f8d0 100644
--- a/third_party/nixpkgs/pkgs/development/libraries/gstreamer/core/default.nix
+++ b/third_party/nixpkgs/pkgs/development/libraries/gstreamer/core/default.nix
@@ -1,6 +1,5 @@
{ stdenv
, fetchurl
-, fetchpatch
, meson
, ninja
, pkgconfig
@@ -16,34 +15,30 @@
, darwin
, elfutils # for libdw
, bash-completion
-, docbook_xsl
-, docbook_xml_dtd_43
-, gtk-doc
, lib
, CoreServices
}:
stdenv.mkDerivation rec {
pname = "gstreamer";
- version = "1.16.2";
+ version = "1.18.0";
- outputs = [ "out" "dev" "devdoc" ];
+ outputs = [
+ "out"
+ "dev"
+ # "devdoc" # disabled until `hotdoc` is packaged in nixpkgs, see:
+ # - https://github.com/NixOS/nixpkgs/pull/98767
+ # - https://github.com/NixOS/nixpkgs/issues/98769#issuecomment-702296551
+ ];
outputBin = "dev";
src = fetchurl {
url = "${meta.homepage}/src/${pname}/${pname}-${version}.tar.xz";
- sha256 = "0kp93622y29pck8asvil1fmzf55s2gx76wv475a6izc3cwj49w73";
+ sha256 = "01bq1k0gj603zyhq975zl09q4zla12mxqvhmk9fyn2kcn12r5w0g";
};
patches = [
./fix_pkgconfig_includedir.patch
-
- # Fix build with bash-completion 2.10
- # https://gitlab.freedesktop.org/gstreamer/gstreamer/merge_requests/436
- (fetchpatch {
- url = "https://gitlab.freedesktop.org/gstreamer/gstreamer/commit/dd2ec3681e2d38e13e01477efa36e851650690fb.patch";
- sha256 = "07hwf67vndsibm1khvs4rfq30sbs9fss8k5vs502xc0kccbi1ih8";
- })
];
nativeBuildInputs = [
@@ -60,9 +55,7 @@ stdenv.mkDerivation rec {
bash-completion
# documentation
- gtk-doc
- docbook_xsl
- docbook_xml_dtd_43
+ # TODO add hotdoc here
];
buildInputs = [
@@ -82,6 +75,7 @@ stdenv.mkDerivation rec {
mesonFlags = [
"-Ddbghelp=disabled" # not needed as we already provide libunwind and libdw, and dbghelp is a fallback to those
"-Dexamples=disabled" # requires many dependencies and probably not useful for our users
+ "-Ddoc=disabled" # `hotdoc` not packaged in nixpkgs as of writing
] ++ lib.optionals stdenv.isDarwin [
# darwin.libunwind doesn't have pkgconfig definitions so meson doesn't detect it.
"-Dlibunwind=disabled"
@@ -93,7 +87,8 @@ stdenv.mkDerivation rec {
gst/parse/get_flex_version.py \
gst/parse/gen_grammar.py.in \
gst/parse/gen_lex.py.in \
- libs/gst/helpers/ptp_helper_post_install.sh
+ libs/gst/helpers/ptp_helper_post_install.sh \
+ scripts/extract-release-date-from-doap-file.py
'';
postInstall = ''
diff --git a/third_party/nixpkgs/pkgs/development/libraries/gstreamer/core/fix_pkgconfig_includedir.patch b/third_party/nixpkgs/pkgs/development/libraries/gstreamer/core/fix_pkgconfig_includedir.patch
index c388a82fa2..db16842693 100644
--- a/third_party/nixpkgs/pkgs/development/libraries/gstreamer/core/fix_pkgconfig_includedir.patch
+++ b/third_party/nixpkgs/pkgs/development/libraries/gstreamer/core/fix_pkgconfig_includedir.patch
@@ -7,8 +7,10 @@ index edb0586c2..7ed46dfce 100644
pkgconf.set('prefix', join_paths(get_option('prefix')))
pkgconf.set('exec_prefix', '${prefix}')
-pkgconf.set('libdir', '${prefix}/@0@'.format(get_option('libdir')))
+-pkgconf.set('libexecdir', '${prefix}/@0@'.format(get_option('libexecdir')))
-pkgconf.set('includedir', '${prefix}/@0@'.format(get_option('includedir')))
+pkgconf.set('libdir', join_paths(get_option('prefix'), get_option('libdir')))
++pkgconf.set('libexecdir', join_paths(get_option('prefix'), get_option('libexecdir')))
+pkgconf.set('includedir', join_paths(get_option('prefix'), get_option('includedir')))
pkgconf.set('GST_API_VERSION', apiversion)
pkgconf.set('VERSION', gst_version)
diff --git a/third_party/nixpkgs/pkgs/development/libraries/gstreamer/default.nix b/third_party/nixpkgs/pkgs/development/libraries/gstreamer/default.nix
index e7e11db612..1fdd67d836 100644
--- a/third_party/nixpkgs/pkgs/development/libraries/gstreamer/default.nix
+++ b/third_party/nixpkgs/pkgs/development/libraries/gstreamer/default.nix
@@ -17,13 +17,13 @@ rec {
gst-libav = callPackage ./libav { inherit gst-plugins-base; };
- gst-editing-services = callPackage ./ges { inherit gst-plugins-base; };
+ gst-devtools = callPackage ./devtools { inherit gstreamer gst-plugins-base; };
+
+ gst-editing-services = callPackage ./ges { inherit gst-plugins-base gst-plugins-bad gst-devtools; };
gst-vaapi = callPackage ./vaapi {
inherit gst-plugins-base gstreamer gst-plugins-bad;
};
- gst-validate = callPackage ./validate { inherit gstreamer gst-plugins-base; };
-
# note: gst-python is in ./python/default.nix - called under pythonPackages
}
diff --git a/third_party/nixpkgs/pkgs/development/libraries/gstreamer/validate/default.nix b/third_party/nixpkgs/pkgs/development/libraries/gstreamer/devtools/default.nix
similarity index 59%
rename from third_party/nixpkgs/pkgs/development/libraries/gstreamer/validate/default.nix
rename to third_party/nixpkgs/pkgs/development/libraries/gstreamer/devtools/default.nix
index 74e8984816..f865b3adf2 100644
--- a/third_party/nixpkgs/pkgs/development/libraries/gstreamer/validate/default.nix
+++ b/third_party/nixpkgs/pkgs/development/libraries/gstreamer/devtools/default.nix
@@ -1,5 +1,7 @@
{ stdenv
, fetchurl
+, meson
+, ninja
, pkgconfig
, gstreamer
, gst-plugins-base
@@ -9,19 +11,32 @@
}:
stdenv.mkDerivation rec {
- pname = "gst-validate";
- version = "1.16.2";
+ pname = "gst-devtools";
+ version = "1.18.0";
src = fetchurl {
url = "${meta.homepage}/src/${pname}/${pname}-${version}.tar.xz";
- sha256 = "1jpfrzg3yc6kp66bgq3jy14xsj3x71mk2zh0k16yf0326awwqqa8";
+ sha256 = "05jzjkkdr5hg01mjihlqdcxqnjfrm4mqk0zp83212kv5nm0p2cw2";
};
- outputs = [ "out" "dev" ];
+ patches = [
+ ./fix_pkgconfig_includedir.patch
+ ];
+
+ outputs = [
+ "out"
+ "dev"
+ # "devdoc" # disabled until `hotdoc` is packaged in nixpkgs
+ ];
nativeBuildInputs = [
+ meson
+ ninja
pkgconfig
gobject-introspection
+
+ # documentation
+ # TODO add hotdoc here
];
buildInputs = [
@@ -34,6 +49,10 @@ stdenv.mkDerivation rec {
gst-plugins-base
];
+ mesonFlags = [
+ "-Ddoc=disabled" # `hotdoc` not packaged in nixpkgs as of writing
+ ];
+
meta = with stdenv.lib; {
description = "Integration testing infrastructure for the GStreamer framework";
homepage = "https://gstreamer.freedesktop.org";
diff --git a/third_party/nixpkgs/pkgs/development/libraries/gstreamer/good/fix_pkgconfig_includedir.patch b/third_party/nixpkgs/pkgs/development/libraries/gstreamer/devtools/fix_pkgconfig_includedir.patch
similarity index 67%
rename from third_party/nixpkgs/pkgs/development/libraries/gstreamer/good/fix_pkgconfig_includedir.patch
rename to third_party/nixpkgs/pkgs/development/libraries/gstreamer/devtools/fix_pkgconfig_includedir.patch
index f68ad603a3..ff19c7cbf6 100644
--- a/third_party/nixpkgs/pkgs/development/libraries/gstreamer/good/fix_pkgconfig_includedir.patch
+++ b/third_party/nixpkgs/pkgs/development/libraries/gstreamer/devtools/fix_pkgconfig_includedir.patch
@@ -1,15 +1,15 @@
-diff --git a/pkgconfig/meson.build b/pkgconfig/meson.build
-index b3bf0d4d4..3e6e576c0 100644
---- a/pkgconfig/meson.build
-+++ b/pkgconfig/meson.build
+diff --git a/validate/pkgconfig/meson.build b/validate/pkgconfig/meson.build
+index a612b21b..c017eaff 100644
+--- a/validate/pkgconfig/meson.build
++++ b/validate/pkgconfig/meson.build
@@ -2,8 +2,8 @@ pkgconf = configuration_data()
-
+
pkgconf.set('prefix', get_option('prefix'))
pkgconf.set('exec_prefix', '${prefix}')
-pkgconf.set('libdir', '${prefix}/@0@'.format(get_option('libdir')))
-pkgconf.set('includedir', '${prefix}/@0@'.format(get_option('includedir')))
+pkgconf.set('libdir', join_paths(get_option('prefix'), get_option('libdir')))
+pkgconf.set('includedir', join_paths(get_option('prefix'), get_option('includedir')))
- pkgconf.set('GST_API_VERSION', api_version)
+ pkgconf.set('GST_API_VERSION', apiversion)
pkgconf.set('VERSION', gst_version)
-
+
diff --git a/third_party/nixpkgs/pkgs/development/libraries/gstreamer/ges/default.nix b/third_party/nixpkgs/pkgs/development/libraries/gstreamer/ges/default.nix
index af2579d059..ae217c4282 100644
--- a/third_party/nixpkgs/pkgs/development/libraries/gstreamer/ges/default.nix
+++ b/third_party/nixpkgs/pkgs/development/libraries/gstreamer/ges/default.nix
@@ -1,11 +1,13 @@
{ stdenv
, fetchurl
-, fetchpatch
, meson
, ninja
, pkgconfig
, python3
+, bash-completion
, gst-plugins-base
+, gst-plugins-bad
+, gst-devtools
, libxml2
, flex
, gettext
@@ -13,14 +15,18 @@
}:
stdenv.mkDerivation rec {
- pname = "gstreamer-editing-services";
- version = "1.16.2";
+ pname = "gst-editing-services";
+ version = "1.18.0";
- outputs = [ "out" "dev" ];
+ outputs = [
+ "out"
+ "dev"
+ # "devdoc" # disabled until `hotdoc` is packaged in nixpkgs
+ ];
src = fetchurl {
url = "${meta.homepage}/src/${pname}/${pname}-${version}.tar.xz";
- sha256 = "05hcf3prna8ajjnqd53221gj9syarrrjbgvjcbhicv0c38csc1hf";
+ sha256 = "1a00f07v0yjqz1hydhgkjjarm4rk99yjicbz5wkfl5alhzag1bjd";
};
patches = [
@@ -33,26 +39,31 @@ stdenv.mkDerivation rec {
pkgconfig
gettext
gobject-introspection
+ gst-devtools
python3
flex
+
+ # documentation
+ # TODO add hotdoc here
];
buildInputs = [
+ bash-completion
libxml2
];
propagatedBuildInputs = [
gst-plugins-base
+ gst-plugins-bad
];
mesonFlags = [
- "-Dgtk_doc=disabled"
+ "-Ddoc=disabled" # `hotdoc` not packaged in nixpkgs as of writing
];
postPatch = ''
- # for some reason, gst-plugins-bad cannot be found
- # fortunately, they are only used by tests, which we do not run
- sed -i -r -e 's/p(bad|good) = .*/p\1 = pbase/' tests/check/meson.build
+ patchShebangs \
+ scripts/extract-release-date-from-doap-file.py
'';
meta = with stdenv.lib; {
diff --git a/third_party/nixpkgs/pkgs/development/libraries/gstreamer/good/default.nix b/third_party/nixpkgs/pkgs/development/libraries/gstreamer/good/default.nix
index 100d270673..e8c885411b 100644
--- a/third_party/nixpkgs/pkgs/development/libraries/gstreamer/good/default.nix
+++ b/third_party/nixpkgs/pkgs/development/libraries/gstreamer/good/default.nix
@@ -1,6 +1,7 @@
{ stdenv
, fetchurl
, meson
+, nasm
, ninja
, pkgconfig
, python3
@@ -34,6 +35,8 @@
, libXext
, libXfixes
, ncurses
+, wayland
+, wayland-protocols
, xorg
, libgudev
, wavpack
@@ -46,23 +49,24 @@ let
in
stdenv.mkDerivation rec {
pname = "gst-plugins-good";
- version = "1.16.2";
+ version = "1.18.0";
outputs = [ "out" "dev" ];
src = fetchurl {
url = "${meta.homepage}/src/${pname}/${pname}-${version}.tar.xz";
- sha256 = "068k3cbv1yf3gbllfdzqsg263kzwh21y8dpwr0wvgh15vapkpfs0";
+ sha256 = "1b4b3a6fm2wyqpnx300pg1sz01m9qhfajadk3b7sbzisg8vvqab3";
};
- patches = [ ./fix_pkgconfig_includedir.patch ];
-
nativeBuildInputs = [
pkgconfig
python3
meson
ninja
gettext
+ nasm
+ ] ++ optionals stdenv.isLinux [
+ wayland-protocols
];
buildInputs = [
@@ -102,12 +106,14 @@ stdenv.mkDerivation rec {
libavc1394
libiec61883
libgudev
+ wayland
] ++ optionals enableJack [
libjack2
];
mesonFlags = [
"-Dexamples=disabled" # requires many dependencies and probably not useful for our users
+ "-Ddoc=disabled" # `hotdoc` not packaged in nixpkgs as of writing
"-Dqt5=disabled" # not clear as of writing how to correctly pass in the required qt5 deps
] ++ optionals (!gtkSupport) [
"-Dgtk3=disabled"
@@ -122,8 +128,14 @@ stdenv.mkDerivation rec {
"-Dv4l2=disabled" # Linux-only
"-Dximagesrc=disabled" # Linux-only
"-Dpulse=disabled" # TODO check if we can keep this enabled
+ ] ++ optionals (!(stdenv.isLinux && stdenv.hostPlatform.isAarch64)) [
+ "-Drpicamsrc=disabled" # only works on Linux aarch64, see https://gitlab.freedesktop.org/gstreamer/gst-plugins-good/-/blob/428c9b60532917c0ac49c9d48b15bdcd00a1370b/sys/rpicamsrc/meson.build#L10
];
+ postPatch = ''
+ patchShebangs \
+ scripts/extract-release-date-from-doap-file.py
+ '';
NIX_LDFLAGS = [
# linking error on Darwin
diff --git a/third_party/nixpkgs/pkgs/development/libraries/gstreamer/libav/default.nix b/third_party/nixpkgs/pkgs/development/libraries/gstreamer/libav/default.nix
index e36eba3700..648ee8bab3 100644
--- a/third_party/nixpkgs/pkgs/development/libraries/gstreamer/libav/default.nix
+++ b/third_party/nixpkgs/pkgs/development/libraries/gstreamer/libav/default.nix
@@ -15,11 +15,11 @@
stdenv.mkDerivation rec {
pname = "gst-libav";
- version = "1.16.2";
+ version = "1.18.0";
src = fetchurl {
url = "${meta.homepage}/src/${pname}/${pname}-${version}.tar.xz";
- sha256 = "1wpfilc98bad9nsv3y1qapxp35dvn2mvwvrmqwrsj58cf09gc967";
+ sha256 = "0sm0sfdlalimpkf7a7rk7whvyvmmfi2kly2z3q2j5z53x5f3zya2";
};
outputs = [ "out" "dev" ];
@@ -37,6 +37,15 @@ stdenv.mkDerivation rec {
libav
];
+ mesonFlags = [
+ "-Ddoc=disabled" # `hotdoc` not packaged in nixpkgs as of writing
+ ];
+
+ postPatch = ''
+ patchShebangs \
+ scripts/extract-release-date-from-doap-file.py
+ '';
+
meta = with lib; {
description = "FFmpeg/libav plugin for GStreamer";
homepage = "https://gstreamer.freedesktop.org";
diff --git a/third_party/nixpkgs/pkgs/development/libraries/gstreamer/rtsp-server/default.nix b/third_party/nixpkgs/pkgs/development/libraries/gstreamer/rtsp-server/default.nix
index 92e8a45a4f..e1ee9222cc 100644
--- a/third_party/nixpkgs/pkgs/development/libraries/gstreamer/rtsp-server/default.nix
+++ b/third_party/nixpkgs/pkgs/development/libraries/gstreamer/rtsp-server/default.nix
@@ -3,6 +3,7 @@
, meson
, ninja
, pkgconfig
+, python3
, gettext
, gobject-introspection
, gst-plugins-base
@@ -11,14 +12,18 @@
stdenv.mkDerivation rec {
pname = "gst-rtsp-server";
- version = "1.16.2";
+ version = "1.18.0";
src = fetchurl {
url = "${meta.homepage}/src/${pname}/${pname}-${version}.tar.xz";
- sha256 = "0vn23nxwvs96g7gcxw5zbnw23hkhky8a8r42wq68411vgf1s41yy";
+ sha256 = "03y7nyjaagis7mmg8vbhxmnc1v9xf2y3cab2s3q2vgsc0l8r7l9a";
};
- outputs = [ "out" "dev" ];
+ outputs = [
+ "out"
+ "dev"
+ # "devdoc" # disabled until `hotdoc` is packaged in nixpkgs
+ ];
patches = [
# To use split outputs, we need this so double prefix won't be used in the
@@ -35,6 +40,10 @@ stdenv.mkDerivation rec {
gettext
gobject-introspection
pkgconfig
+ python3
+
+ # documentation
+ # TODO add hotdoc here
];
buildInputs = [
@@ -44,8 +53,14 @@ stdenv.mkDerivation rec {
mesonFlags = [
"-Dexamples=disabled" # requires many dependencies and probably not useful for our users
+ "-Ddoc=disabled" # `hotdoc` not packaged in nixpkgs as of writing
];
+ postPatch = ''
+ patchShebangs \
+ scripts/extract-release-date-from-doap-file.py
+ '';
+
meta = with stdenv.lib; {
description = "GStreamer RTSP server";
homepage = "https://gstreamer.freedesktop.org";
diff --git a/third_party/nixpkgs/pkgs/development/libraries/gstreamer/ugly/default.nix b/third_party/nixpkgs/pkgs/development/libraries/gstreamer/ugly/default.nix
index d8c36fa407..ae1e2dd1b3 100644
--- a/third_party/nixpkgs/pkgs/development/libraries/gstreamer/ugly/default.nix
+++ b/third_party/nixpkgs/pkgs/development/libraries/gstreamer/ugly/default.nix
@@ -21,13 +21,13 @@
stdenv.mkDerivation rec {
pname = "gst-plugins-ugly";
- version = "1.16.2";
+ version = "1.18.0";
outputs = [ "out" "dev" ];
src = fetchurl {
url = "${meta.homepage}/src/${pname}/${pname}-${version}.tar.xz";
- sha256 = "1jpvc32x6q01zjkfgh6gmq6aaikiyfwwnhj7bmvn52syhrdl202m";
+ sha256 = "10p0nyzighvkciaspxnhlr7d7n4acrv96lf483i8l988bvj48rk8";
};
nativeBuildInputs = [
@@ -56,10 +56,15 @@ stdenv.mkDerivation rec {
]);
mesonFlags = [
- "-Dexamples=disabled" # requires many dependencies and probably not useful for our users
+ "-Ddoc=disabled" # `hotdoc` not packaged in nixpkgs as of writing
"-Dsidplay=disabled" # sidplay / sidplay/player.h isn't packaged in nixpkgs as of writing
];
+ postPatch = ''
+ patchShebangs \
+ scripts/extract-release-date-from-doap-file.py
+ '';
+
meta = with lib; {
description = "Gstreamer Ugly Plugins";
homepage = "https://gstreamer.freedesktop.org";
diff --git a/third_party/nixpkgs/pkgs/development/libraries/gstreamer/vaapi/default.nix b/third_party/nixpkgs/pkgs/development/libraries/gstreamer/vaapi/default.nix
index cac56f64cc..1b2efa630b 100644
--- a/third_party/nixpkgs/pkgs/development/libraries/gstreamer/vaapi/default.nix
+++ b/third_party/nixpkgs/pkgs/development/libraries/gstreamer/vaapi/default.nix
@@ -16,25 +16,32 @@
, gst-plugins-bad
, nasm
, libvpx
-, python
+, python3
}:
stdenv.mkDerivation rec {
pname = "gstreamer-vaapi";
- version = "1.16.2";
+ version = "1.18.0";
src = fetchurl {
url = "${meta.homepage}/src/${pname}/${pname}-${version}.tar.xz";
- sha256 = "00f6sx700qm1ximi1ag2c27m35dywwhhg6awhz85va34mfqff78r";
+ sha256 = "0ccyzv15jzf0pi0ndrmfww016cn4c0y4265bacdvnxbgff6fpvy6";
};
- outputs = [ "out" "dev" ];
+ outputs = [
+ "out"
+ "dev"
+ # "devdoc" # disabled until `hotdoc` is packaged in nixpkgs
+ ];
nativeBuildInputs = [
meson
ninja
pkgconfig
bzip2
+
+ # documentation
+ # TODO add hotdoc here
];
buildInputs = [
@@ -55,13 +62,19 @@ stdenv.mkDerivation rec {
libGLU
nasm
libvpx
- python
+ python3
];
mesonFlags = [
"-Dexamples=disabled" # requires many dependencies and probably not useful for our users
+ "-Ddoc=disabled" # `hotdoc` not packaged in nixpkgs as of writing
];
+ postPatch = ''
+ patchShebangs \
+ scripts/extract-release-date-from-doap-file.py
+ '';
+
meta = with stdenv.lib; {
description = "Set of VAAPI GStreamer Plug-ins";
homepage = "https://gstreamer.freedesktop.org";
diff --git a/third_party/nixpkgs/pkgs/development/libraries/gtk/3.x.nix b/third_party/nixpkgs/pkgs/development/libraries/gtk/3.x.nix
index bf78d15d39..2cae9546b7 100644
--- a/third_party/nixpkgs/pkgs/development/libraries/gtk/3.x.nix
+++ b/third_party/nixpkgs/pkgs/development/libraries/gtk/3.x.nix
@@ -25,6 +25,7 @@
, epoxy
, json-glib
, libxkbcommon
+, libxml2
, gmp
, gnome3
, gsettings-desktop-schemas
@@ -48,7 +49,7 @@ with stdenv.lib;
stdenv.mkDerivation rec {
pname = "gtk+3";
- version = "3.24.21";
+ version = "3.24.23";
outputs = [ "out" "dev" ] ++ optional withGtkDoc "devdoc";
outputBin = "dev";
@@ -60,7 +61,7 @@ stdenv.mkDerivation rec {
src = fetchurl {
url = "mirror://gnome/sources/gtk+/${stdenv.lib.versions.majorMinor version}/gtk+-${version}.tar.xz";
- sha256 = "0llgq2adzn9p3bfq9rv2dhscmvzs35jp3glrfvy3vs1mrpknmsmf";
+ sha256 = "1cg2vbwbcp7bc84ky0b69ipgdr9djhspnf5k8lajb8jphcj4v1jx";
};
patches = [
@@ -71,8 +72,8 @@ stdenv.mkDerivation rec {
sha256 = "0g6fhqcv8spfy3mfmxpyji93k8d4p4q4fz1v9a1c1cgcwkz41d7p";
})
- # Fix path handling in pkg-config
- # https://gitlab.gnome.org/GNOME/gtk/merge_requests/1793
+ # Fix path handling in pkg-config. MR for the gtk-3-24 branch:
+ # https://gitlab.gnome.org/GNOME/gtk/-/merge_requests/2605
(fetchpatch {
url = "https://gitlab.gnome.org/GNOME/gtk/commit/6d9db8610eff8c12d594d53b7813d9eea1247801.patch";
sha256 = "0rd1kjh0m4mrj2hkcqlsq1j0d6ahn5c237fd211r158gd1jiwys0";
@@ -97,11 +98,6 @@ stdenv.mkDerivation rec {
NIX_CFLAGS_COMPILE = "-DG_ENABLE_DEBUG -DG_DISABLE_CAST_CHECKS";
postPatch = ''
- # TODO: Remove in 3.24.21
- # https://gitlab.gnome.org/GNOME/gtk/issues/2669
- echo "${stdenv.shell}" > check-version.py
- chmod +x check-version.py
-
files=(
build-aux/meson/post-install.py
demos/gtk-demo/geninclude.py
@@ -130,6 +126,8 @@ stdenv.mkDerivation rec {
docbook_xml_dtd_43
docbook_xsl
gtk-doc
+ # For xmllint
+ libxml2
];
buildInputs = [
diff --git a/third_party/nixpkgs/pkgs/development/libraries/gtksourceview/3.x.nix b/third_party/nixpkgs/pkgs/development/libraries/gtksourceview/3.x.nix
index d882d3b1a6..d32a0eebf1 100644
--- a/third_party/nixpkgs/pkgs/development/libraries/gtksourceview/3.x.nix
+++ b/third_party/nixpkgs/pkgs/development/libraries/gtksourceview/3.x.nix
@@ -1,5 +1,5 @@
{ stdenv, fetchurl, pkgconfig, atk, cairo, glib, gtk3, pango, vala
-, libxml2, perl, intltool, gettext, gnome3, gobject-introspection, dbus, xvfb_run, shared-mime-info }:
+, libxml2, perl, intltool, gettext, gobject-introspection, dbus, xvfb_run, shared-mime-info }:
stdenv.mkDerivation rec {
pname = "gtksourceview";
@@ -42,13 +42,6 @@ stdenv.mkDerivation rec {
make check
'';
- passthru = {
- updateScript = gnome3.updateScript {
- packageName = "gtksourceview";
- attrPath = "gtksourceview3";
- };
- };
-
meta = with stdenv.lib; {
homepage = "https://wiki.gnome.org/Projects/GtkSourceView";
platforms = with platforms; linux ++ darwin;
diff --git a/third_party/nixpkgs/pkgs/development/libraries/gtksourceview/4.x.nix b/third_party/nixpkgs/pkgs/development/libraries/gtksourceview/4.x.nix
index 565b7f782d..2041e83fb0 100644
--- a/third_party/nixpkgs/pkgs/development/libraries/gtksourceview/4.x.nix
+++ b/third_party/nixpkgs/pkgs/development/libraries/gtksourceview/4.x.nix
@@ -4,11 +4,11 @@
stdenv.mkDerivation rec {
pname = "gtksourceview";
- version = "4.6.1";
+ version = "4.8.0";
src = fetchurl {
url = "mirror://gnome/sources/${pname}/${stdenv.lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
- sha256 = "0x7q9lwgrc4kkciy7vgwd80v2ji7plyqiqbvkvx2yqarmfkqgx33";
+ sha256 = "06jfbfbi73j9i3qsr7sxg3yl3643bn3aydbzx6xg3v8ca0hr3880";
};
propagatedBuildInputs = [
diff --git a/third_party/nixpkgs/pkgs/development/libraries/gusb/default.nix b/third_party/nixpkgs/pkgs/development/libraries/gusb/default.nix
index 204c9d8dd7..a2e1576914 100644
--- a/third_party/nixpkgs/pkgs/development/libraries/gusb/default.nix
+++ b/third_party/nixpkgs/pkgs/development/libraries/gusb/default.nix
@@ -1,20 +1,26 @@
{ stdenv, fetchurl, meson, ninja, pkgconfig, gettext, gobject-introspection
-, gtk-doc, docbook_xsl, docbook_xml_dtd_412, docbook_xml_dtd_44
+, gtk-doc, docbook_xsl, docbook_xml_dtd_412, docbook_xml_dtd_44, python3
, glib, systemd, libusb1, vala, hwdata
}:
+
+let
+ pythonEnv = python3.withPackages(ps: with ps; [
+ setuptools
+ ]);
+in
stdenv.mkDerivation rec {
pname = "gusb";
- version = "0.3.3";
+ version = "0.3.5";
outputs = [ "bin" "out" "dev" "devdoc" ];
src = fetchurl {
url = "https://people.freedesktop.org/~hughsient/releases/libgusb-${version}.tar.xz";
- sha256 = "14pbd0812151ga7jrpzi88fcrwkckx6m07ay84l7dzkxbdc44fgr";
+ sha256 = "1pv5ivbwxb9anq2j34i68r8fgs8nwsi4hmss7h9v1i3wk7300ajv";
};
nativeBuildInputs = [
- meson ninja pkgconfig gettext
+ meson ninja pkgconfig gettext pythonEnv
gtk-doc docbook_xsl docbook_xml_dtd_412 docbook_xml_dtd_44
gobject-introspection vala
];
diff --git a/third_party/nixpkgs/pkgs/development/libraries/gvfs/default.nix b/third_party/nixpkgs/pkgs/development/libraries/gvfs/default.nix
index cff6569be5..f79ffa579c 100644
--- a/third_party/nixpkgs/pkgs/development/libraries/gvfs/default.nix
+++ b/third_party/nixpkgs/pkgs/development/libraries/gvfs/default.nix
@@ -41,11 +41,11 @@
stdenv.mkDerivation rec {
pname = "gvfs";
- version = "1.44.1";
+ version = "1.46.1";
src = fetchurl {
url = "mirror://gnome/sources/${pname}/${stdenv.lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
- sha256 = "0ipv0jgzim6glsgizmfjkx0m3gd1l9lr242m0jj6cdmhs52k5vsh";
+ sha256 = "00r56kp8dhdn1ypyap66klymlwlh646n4f1ri797w2x6p70sc7k2";
};
postPatch = ''
diff --git a/third_party/nixpkgs/pkgs/development/libraries/hidapi/default.nix b/third_party/nixpkgs/pkgs/development/libraries/hidapi/default.nix
index 11cdd0ab7e..df8212cd5a 100644
--- a/third_party/nixpkgs/pkgs/development/libraries/hidapi/default.nix
+++ b/third_party/nixpkgs/pkgs/development/libraries/hidapi/default.nix
@@ -1,21 +1,21 @@
-{ stdenv, fetchFromGitHub, autoreconfHook, pkgconfig, systemd, libusb1
+{ stdenv, fetchFromGitHub, autoreconfHook, pkgconfig, udev, libusb1
, darwin }:
stdenv.mkDerivation rec {
pname = "hidapi";
- version = "0.9.0";
+ version = "0.10.0";
src = fetchFromGitHub {
owner = "libusb";
repo = "hidapi";
rev = "${pname}-${version}";
- sha256 = "1p4g8lgwj4rki6lbn5l6rvwj0xlbn1xfh4d255bg5pvgczmwmc4i";
+ sha256 = "1n3xn1zvxgyzb84cjpw3i5alw0gkbrps11r4ijxzyqxqym0khagr";
};
nativeBuildInputs = [ autoreconfHook pkgconfig ];
buildInputs = [ ]
- ++ stdenv.lib.optionals stdenv.isLinux [ libusb1 systemd ];
+ ++ stdenv.lib.optionals stdenv.isLinux [ libusb1 udev ];
enableParallelBuilding = true;
@@ -24,6 +24,7 @@ stdenv.mkDerivation rec {
meta = with stdenv.lib; {
description = "Library for communicating with USB and Bluetooth HID devices";
homepage = "https://github.com/libusb/hidapi";
+ maintainers = with maintainers; [ prusnak ];
# Actually, you can chose between GPLv3, BSD or HIDAPI license (more liberal)
license = licenses.bsd3;
platforms = platforms.unix;
diff --git a/third_party/nixpkgs/pkgs/development/libraries/icu/base.nix b/third_party/nixpkgs/pkgs/development/libraries/icu/base.nix
index 81f75ad526..d8e9bd16ab 100644
--- a/third_party/nixpkgs/pkgs/development/libraries/icu/base.nix
+++ b/third_party/nixpkgs/pkgs/development/libraries/icu/base.nix
@@ -57,7 +57,7 @@ let
# FIXME: This fixes dylib references in the dylibs themselves, but
# not in the programs in $out/bin.
- buildInputs = stdenv.lib.optional stdenv.isDarwin fixDarwinDylibNames;
+ nativeBuildInputs = stdenv.lib.optional stdenv.hostPlatform.isDarwin fixDarwinDylibNames;
# remove dependency on bootstrap-tools in early stdenv build
postInstall = stdenv.lib.optionalString stdenv.isDarwin ''
diff --git a/third_party/nixpkgs/pkgs/development/libraries/intel-media-driver/default.nix b/third_party/nixpkgs/pkgs/development/libraries/intel-media-driver/default.nix
index 498265a5a2..4130d8cf8b 100644
--- a/third_party/nixpkgs/pkgs/development/libraries/intel-media-driver/default.nix
+++ b/third_party/nixpkgs/pkgs/development/libraries/intel-media-driver/default.nix
@@ -5,13 +5,13 @@
stdenv.mkDerivation rec {
pname = "intel-media-driver";
- version = "20.4.0";
+ version = "20.4.1";
src = fetchFromGitHub {
owner = "intel";
repo = "media-driver";
rev = "intel-media-${version}";
- sha256 = "0nah3h3s6hqbgz1wqp5j1grzq0q939wbh4b9d27dmb4wy6ma41sl";
+ sha256 = "1axklxzv85flhv41s8nmp7m4kswnav6qpg8w9przac9ji07rknwl";
};
cmakeFlags = [
diff --git a/third_party/nixpkgs/pkgs/development/libraries/json-glib/default.nix b/third_party/nixpkgs/pkgs/development/libraries/json-glib/default.nix
index 4ae4a71091..f89d4bc453 100644
--- a/third_party/nixpkgs/pkgs/development/libraries/json-glib/default.nix
+++ b/third_party/nixpkgs/pkgs/development/libraries/json-glib/default.nix
@@ -14,8 +14,8 @@ in stdenv.mkDerivation rec {
};
propagatedBuildInputs = [ glib ];
- nativeBuildInputs = [ meson ninja pkgconfig gettext gobject-introspection glib ];
- buildInputs = stdenv.lib.optional stdenv.isDarwin fixDarwinDylibNames;
+ nativeBuildInputs = [ meson ninja pkgconfig gettext gobject-introspection glib ]
+ ++ stdenv.lib.optional stdenv.hostPlatform.isDarwin fixDarwinDylibNames;
outputs = [ "out" "dev" ];
diff --git a/third_party/nixpkgs/pkgs/development/libraries/jsonrpc-glib/default.nix b/third_party/nixpkgs/pkgs/development/libraries/jsonrpc-glib/default.nix
index b641a54730..61f357689c 100644
--- a/third_party/nixpkgs/pkgs/development/libraries/jsonrpc-glib/default.nix
+++ b/third_party/nixpkgs/pkgs/development/libraries/jsonrpc-glib/default.nix
@@ -1,7 +1,7 @@
{ stdenv, fetchurl, meson, ninja, glib, json-glib, pkgconfig, gobject-introspection, vala, gtk-doc, docbook_xsl, docbook_xml_dtd_43, gnome3 }:
stdenv.mkDerivation rec {
pname = "jsonrpc-glib";
- version = "3.34.0";
+ version = "3.38.0";
outputs = [ "out" "dev" "devdoc" ];
@@ -10,7 +10,7 @@ stdenv.mkDerivation rec {
src = fetchurl {
url = "mirror://gnome/sources/${pname}/${stdenv.lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
- sha256 = "0j05x4xv2cp3cbmp30m68z8g4rdw7b030ip4wszyfj9ya15v5kni";
+ sha256 = "3F8ZFKkRUrcPqPyaEe3hMUirSvZE2yejZjI4jJJ6ioI=";
};
mesonFlags = [
diff --git a/third_party/nixpkgs/pkgs/development/libraries/leveldb/default.nix b/third_party/nixpkgs/pkgs/development/libraries/leveldb/default.nix
index 33eca603c2..14d426701b 100644
--- a/third_party/nixpkgs/pkgs/development/libraries/leveldb/default.nix
+++ b/third_party/nixpkgs/pkgs/development/libraries/leveldb/default.nix
@@ -14,7 +14,7 @@ stdenv.mkDerivation rec {
buildInputs = [ snappy ];
nativeBuildInputs = []
- ++ stdenv.lib.optional stdenv.isDarwin [ fixDarwinDylibNames ];
+ ++ stdenv.lib.optional stdenv.isDarwin fixDarwinDylibNames;
buildPhase = ''
make all
diff --git a/third_party/nixpkgs/pkgs/development/libraries/libLAS/default.nix b/third_party/nixpkgs/pkgs/development/libraries/libLAS/default.nix
index 95569c0a81..27db14e716 100644
--- a/third_party/nixpkgs/pkgs/development/libraries/libLAS/default.nix
+++ b/third_party/nixpkgs/pkgs/development/libraries/libLAS/default.nix
@@ -9,8 +9,8 @@ stdenv.mkDerivation rec {
sha256 = "0xjfxb3ydvr2258ji3spzyf81g9caap19ql2pk91wiivqsc4mnws";
};
- buildInputs = [ boost cmake gdal libgeotiff libtiff LASzip2 ]
- ++ stdenv.lib.optional stdenv.isDarwin fixDarwinDylibNames;
+ nativeBuildInputs = stdenv.lib.optional stdenv.hostPlatform.isDarwin fixDarwinDylibNames;
+ buildInputs = [ boost cmake gdal libgeotiff libtiff LASzip2 ];
cmakeFlags = [
"-DGDAL_CONFIG=${gdal}/bin/gdal-config"
diff --git a/third_party/nixpkgs/pkgs/development/libraries/libassuan/default.nix b/third_party/nixpkgs/pkgs/development/libraries/libassuan/default.nix
index e92db2ab87..aa798668f8 100644
--- a/third_party/nixpkgs/pkgs/development/libraries/libassuan/default.nix
+++ b/third_party/nixpkgs/pkgs/development/libraries/libassuan/default.nix
@@ -2,11 +2,11 @@
stdenv.mkDerivation rec {
pname = "libassuan";
- version = "2.5.3";
+ version = "2.5.4";
src = fetchurl {
url = "mirror://gnupg/${pname}/${pname}-${version}.tar.bz2";
- sha256 = "00p7cpvzf0q3qwcgg51r9d0vbab4qga2xi8wpk2fgd36710b1g4i";
+ sha256 = "1w7vnnycq4z7gf4bk38pi4hrb8qrrzgfpz3cd7frwldxnfbfx060";
};
outputs = [ "out" "dev" "info" ];
diff --git a/third_party/nixpkgs/pkgs/development/libraries/libcbor/default.nix b/third_party/nixpkgs/pkgs/development/libraries/libcbor/default.nix
index 9b6a54d92f..ae5154eac0 100644
--- a/third_party/nixpkgs/pkgs/development/libraries/libcbor/default.nix
+++ b/third_party/nixpkgs/pkgs/development/libraries/libcbor/default.nix
@@ -2,13 +2,13 @@
stdenv.mkDerivation rec {
pname = "libcbor";
- version = "unstable-2019-07-25";
+ version = "0.8.0";
src = fetchFromGitHub {
owner = "PJK";
repo = pname;
- rev = "82512d851205fbc7f65d96a0b4a8e1bad2e4f3c6";
- sha256 = "01hy7n21gxz4gp3gdwm2ywz822p415bj2k9ccxgwz3plvncs4xa1";
+ rev = "v${version}";
+ sha256 = "01dv4vxcmbvpphqy16vqiwh25wx11x630js5wfnx7cryarsh9ld7";
};
nativeBuildInputs = [ cmake ];
@@ -16,9 +16,7 @@ stdenv.mkDerivation rec {
doCheck = false; # needs "-DWITH_TESTS=ON", but fails w/compilation error
- cmakeFlags = [ "-DCMAKE_INSTALL_LIBDIR=lib" ];
-
- NIX_CFLAGS_COMPILE = "-fno-lto";
+ cmakeFlags = [ "-DCMAKE_INSTALL_LIBDIR=lib" "-DBUILD_SHARED_LIBS=on" ];
meta = with stdenv.lib; {
description = "CBOR protocol implementation for C and others";
diff --git a/third_party/nixpkgs/pkgs/development/libraries/libdatrie/default.nix b/third_party/nixpkgs/pkgs/development/libraries/libdatrie/default.nix
new file mode 100644
index 0000000000..0d3faf69e3
--- /dev/null
+++ b/third_party/nixpkgs/pkgs/development/libraries/libdatrie/default.nix
@@ -0,0 +1,27 @@
+{ stdenv, fetchurl, makeWrapper, installShellFiles, pkg-config, libiconv }:
+
+stdenv.mkDerivation rec {
+ pname = "libdatrie";
+ version = "0.2.12";
+
+ src = fetchurl {
+ url = "https://github.com/tlwg/libdatrie/releases/download/v${version}/libdatrie-${version}.tar.xz";
+ sha256 = "0jdi01pcxv0b24zbjy7zahawsqqqw4mv94f2yy01zh4n796wqba5";
+ };
+
+ nativeBuildInputs = [ installShellFiles pkg-config ];
+
+ buildInputs = stdenv.lib.optional stdenv.isDarwin libiconv;
+
+ postInstall = ''
+ installManPage man/trietool.1
+ '';
+
+ meta = with stdenv.lib;{
+ homepage = "https://linux.thai.net/~thep/datrie/datrie.html";
+ description = "This is an implementation of double-array structure for representing trie";
+ license = licenses.lgpl21Plus;
+ platforms = platforms.unix;
+ maintainers = with maintainers; [ SuperSandro2000 ];
+ };
+}
diff --git a/third_party/nixpkgs/pkgs/development/libraries/libdazzle/default.nix b/third_party/nixpkgs/pkgs/development/libraries/libdazzle/default.nix
index 5351b2c9fc..6c43068225 100644
--- a/third_party/nixpkgs/pkgs/development/libraries/libdazzle/default.nix
+++ b/third_party/nixpkgs/pkgs/development/libraries/libdazzle/default.nix
@@ -3,14 +3,14 @@
stdenv.mkDerivation rec {
pname = "libdazzle";
- version = "3.36.0";
+ version = "3.38.0";
outputs = [ "out" "dev" "devdoc" ];
outputBin = "dev";
src = fetchurl {
url = "mirror://gnome/sources/libdazzle/${stdenv.lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
- sha256 = "0n6r16a07in82cnzw91vl675pbjzbvazkxwbqxq2kihganzipcw2";
+ sha256 = "13v7s46cgw135ycx0byn7am4inn33slrhljq0v0wwfwl2y1g52p1";
};
nativeBuildInputs = [ ninja meson pkgconfig vala gobject-introspection libxml2 gtk-doc docbook_xsl docbook_xml_dtd_43 dbus xvfb_run glib ];
diff --git a/third_party/nixpkgs/pkgs/development/libraries/libe57format/default.nix b/third_party/nixpkgs/pkgs/development/libraries/libe57format/default.nix
index 6bb48c9530..137c73990f 100644
--- a/third_party/nixpkgs/pkgs/development/libraries/libe57format/default.nix
+++ b/third_party/nixpkgs/pkgs/development/libraries/libe57format/default.nix
@@ -5,6 +5,9 @@
boost,
xercesc,
icu,
+
+ dos2unix,
+ fetchpatch,
}:
stdenv.mkDerivation rec {
@@ -25,9 +28,39 @@ stdenv.mkDerivation rec {
buildInputs = [
boost
icu
+ ];
+
+ propagatedBuildInputs = [
+ # Necessary for projects that try to find libE57Format via CMake
+ # due to the way that libe57format's CMake config is written.
xercesc
];
+ # TODO: Remove CMake patching when https://github.com/asmaloney/libE57Format/pull/60 is available.
+
+ # GNU patch cannot patch `CMakeLists.txt` that has CRLF endings,
+ # see https://unix.stackexchange.com/questions/239364/how-to-fix-hunk-1-failed-at-1-different-line-endings-message/243748#243748
+ # so convert it first.
+ prePatch = ''
+ ${dos2unix}/bin/dos2unix CMakeLists.txt
+ '';
+ patches = [
+ (fetchpatch {
+ name = "libE57Format-cmake-Fix-config-filename.patch";
+ url = "https://github.com/asmaloney/libE57Format/commit/279d8d6b60ee65fb276cdbeed74ac58770a286f9.patch";
+ sha256 = "0fbf92hs1c7yl169i7zlbaj9yhrd1yg3pjf0wsqjlh8mr5m6rp14";
+ })
+ ];
+ # It appears that while the patch has
+ # diff --git a/cmake/E57Format-config.cmake b/cmake/e57format-config.cmake
+ # similarity index 100%
+ # rename from cmake/E57Format-config.cmake
+ # rename to cmake/e57format-config.cmake
+ # GNU patch doesn't interpret that.
+ postPatch = ''
+ mv cmake/E57Format-config.cmake cmake/e57format-config.cmake
+ '';
+
# The build system by default builds ONLY static libraries, and with
# `-DE57_BUILD_SHARED=ON` builds ONLY shared libraries, see:
# https://github.com/asmaloney/libE57Format/issues/48
diff --git a/third_party/nixpkgs/pkgs/development/libraries/libevent/default.nix b/third_party/nixpkgs/pkgs/development/libraries/libevent/default.nix
index e23c7d55c5..cbde320671 100644
--- a/third_party/nixpkgs/pkgs/development/libraries/libevent/default.nix
+++ b/third_party/nixpkgs/pkgs/development/libraries/libevent/default.nix
@@ -23,10 +23,13 @@ stdenv.mkDerivation rec {
++ stdenv.lib.optional sslSupport "openssl"
;
+ nativeBuildInputs = []
+ ++ stdenv.lib.optional stdenv.hostPlatform.isDarwin fixDarwinDylibNames
+ ;
+
buildInputs = []
++ stdenv.lib.optional sslSupport openssl
++ stdenv.lib.optional stdenv.isCygwin findutils
- ++ stdenv.lib.optional stdenv.isDarwin fixDarwinDylibNames
;
doCheck = false; # needs the net
diff --git a/third_party/nixpkgs/pkgs/development/libraries/libgdata/default.nix b/third_party/nixpkgs/pkgs/development/libraries/libgdata/default.nix
index 162b5d2339..50eac40570 100644
--- a/third_party/nixpkgs/pkgs/development/libraries/libgdata/default.nix
+++ b/third_party/nixpkgs/pkgs/development/libraries/libgdata/default.nix
@@ -21,13 +21,13 @@
stdenv.mkDerivation rec {
pname = "libgdata";
- version = "0.17.12";
+ version = "0.17.13";
outputs = [ "out" "dev" "installedTests" ];
src = fetchurl {
url = "mirror://gnome/sources/${pname}/${stdenv.lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
- sha256 = "0613nihsvwvdnmlbjnwi8zqxgmpwyxdapzznq4cy1fp84246zzd0";
+ sha256 = "0bj7ij6k3lxjn62jgh8vabr8vfjs48aylnnl3779warw5iwyzfga";
};
patches = [
diff --git a/third_party/nixpkgs/pkgs/development/libraries/libgudev/default.nix b/third_party/nixpkgs/pkgs/development/libraries/libgudev/default.nix
index 439dd3827e..c7c3064acb 100644
--- a/third_party/nixpkgs/pkgs/development/libraries/libgudev/default.nix
+++ b/third_party/nixpkgs/pkgs/development/libraries/libgudev/default.nix
@@ -9,13 +9,13 @@
stdenv.mkDerivation rec {
pname = "libgudev";
- version = "233";
+ version = "234";
outputs = [ "out" "dev" ];
src = fetchurl {
url = "mirror://gnome/sources/${pname}/${stdenv.lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
- sha256 = "00xvva04lgqamhnf277lg32phjn971wgpc9cxvgf5x13xdq4jz2q";
+ sha256 = "0drf39qhsdz35kwb18hnfj2ig4yfxhfks66m783zlhnvy2narbhv";
};
nativeBuildInputs = [ pkgconfig gobject-introspection ];
diff --git a/third_party/nixpkgs/pkgs/development/libraries/libhandy/0.x.nix b/third_party/nixpkgs/pkgs/development/libraries/libhandy/0.x.nix
new file mode 100644
index 0000000000..2923f2da25
--- /dev/null
+++ b/third_party/nixpkgs/pkgs/development/libraries/libhandy/0.x.nix
@@ -0,0 +1,66 @@
+{ stdenv, fetchFromGitLab, fetchpatch, meson, ninja, pkgconfig, gobject-introspection, vala
+, gtk-doc, docbook_xsl, docbook_xml_dtd_43
+, gtk3, gnome3, glade
+, dbus, xvfb_run, libxml2
+, hicolor-icon-theme
+}:
+
+stdenv.mkDerivation rec {
+ pname = "libhandy";
+ version = "0.0.13";
+
+ outputs = [ "out" "dev" "devdoc" "glade" ];
+ outputBin = "dev";
+
+ src = fetchFromGitLab {
+ domain = "source.puri.sm";
+ owner = "Librem5";
+ repo = pname;
+ rev = "v${version}";
+ sha256 = "1y23k623sjkldfrdiwfarpchg5mg58smcy1pkgnwfwca15wm1ra5";
+ };
+
+ patches = [
+ # Fix build with Glade 3.36.0
+ # https://source.puri.sm/Librem5/libhandy/merge_requests/451
+ (fetchpatch {
+ url = "https://source.puri.sm/Librem5/libhandy/commit/887beedb467984ab5c7b91830181645fadef7849.patch";
+ sha256 = "0qgh4i0l1028qxqmig4x2c10yj5s80skl70qnc5wnp71s45alvk5";
+ excludes = [ "glade/glade-hdy-header-bar.c" ];
+ })
+ ];
+
+ nativeBuildInputs = [
+ meson ninja pkgconfig gobject-introspection vala libxml2
+ gtk-doc docbook_xsl docbook_xml_dtd_43
+ ];
+ buildInputs = [ gnome3.gnome-desktop gtk3 glade libxml2 ];
+ checkInputs = [ dbus xvfb_run hicolor-icon-theme ];
+
+ mesonFlags = [
+ "-Dgtk_doc=true"
+ "-Dglade_catalog=enabled"
+ "-Dintrospection=enabled"
+ ];
+
+ PKG_CONFIG_GLADEUI_2_0_MODULEDIR = "${placeholder "glade"}/lib/glade/modules";
+ PKG_CONFIG_GLADEUI_2_0_CATALOGDIR = "${placeholder "glade"}/share/glade/catalogs";
+
+ doCheck = true;
+
+ checkPhase = ''
+ NO_AT_BRIDGE=1 \
+ XDG_DATA_DIRS="$XDG_DATA_DIRS:${hicolor-icon-theme}/share" \
+ xvfb-run -s '-screen 0 800x600x24' dbus-run-session \
+ --config-file=${dbus.daemon}/share/dbus-1/session.conf \
+ meson test --print-errorlogs
+ '';
+
+ meta = with stdenv.lib; {
+ description = "A library full of GTK widgets for mobile phones";
+ homepage = "https://source.puri.sm/Librem5/libhandy";
+ license = licenses.lgpl21Plus;
+ maintainers = with maintainers; [ jtojnar ];
+ platforms = platforms.linux;
+ };
+}
diff --git a/third_party/nixpkgs/pkgs/development/libraries/libhandy/default.nix b/third_party/nixpkgs/pkgs/development/libraries/libhandy/default.nix
index 2923f2da25..835eaeac2b 100644
--- a/third_party/nixpkgs/pkgs/development/libraries/libhandy/default.nix
+++ b/third_party/nixpkgs/pkgs/development/libraries/libhandy/default.nix
@@ -1,66 +1,89 @@
-{ stdenv, fetchFromGitLab, fetchpatch, meson, ninja, pkgconfig, gobject-introspection, vala
-, gtk-doc, docbook_xsl, docbook_xml_dtd_43
-, gtk3, gnome3, glade
-, dbus, xvfb_run, libxml2
+{ stdenv
+, fetchurl
+, meson
+, ninja
+, pkgconfig
+, gobject-introspection
+, vala
+, gtk-doc
+, docbook_xsl
+, docbook_xml_dtd_43
+, gtk3
+, gnome3
+, glade
+, dbus
+, xvfb_run
+, libxml2
+, gdk-pixbuf
+, librsvg
, hicolor-icon-theme
}:
stdenv.mkDerivation rec {
pname = "libhandy";
- version = "0.0.13";
+ version = "1.0.0";
outputs = [ "out" "dev" "devdoc" "glade" ];
outputBin = "dev";
- src = fetchFromGitLab {
- domain = "source.puri.sm";
- owner = "Librem5";
- repo = pname;
- rev = "v${version}";
- sha256 = "1y23k623sjkldfrdiwfarpchg5mg58smcy1pkgnwfwca15wm1ra5";
+ src = fetchurl {
+ url = "mirror://gnome/sources/${pname}/${stdenv.lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
+ hash = "sha256-qTmFgvR7fXKSBdbqwMBo/vNarySf3Vfuo3JPhRjSZpk=";
};
- patches = [
- # Fix build with Glade 3.36.0
- # https://source.puri.sm/Librem5/libhandy/merge_requests/451
- (fetchpatch {
- url = "https://source.puri.sm/Librem5/libhandy/commit/887beedb467984ab5c7b91830181645fadef7849.patch";
- sha256 = "0qgh4i0l1028qxqmig4x2c10yj5s80skl70qnc5wnp71s45alvk5";
- excludes = [ "glade/glade-hdy-header-bar.c" ];
- })
+ nativeBuildInputs = [
+ docbook_xml_dtd_43
+ docbook_xsl
+ gobject-introspection
+ gtk-doc
+ libxml2
+ meson
+ ninja
+ pkgconfig
+ vala
];
- nativeBuildInputs = [
- meson ninja pkgconfig gobject-introspection vala libxml2
- gtk-doc docbook_xsl docbook_xml_dtd_43
+ buildInputs = [
+ gdk-pixbuf
+ glade
+ gtk3
+ libxml2
+ ];
+
+ checkInputs = [
+ dbus
+ hicolor-icon-theme
+ xvfb_run
];
- buildInputs = [ gnome3.gnome-desktop gtk3 glade libxml2 ];
- checkInputs = [ dbus xvfb_run hicolor-icon-theme ];
mesonFlags = [
"-Dgtk_doc=true"
- "-Dglade_catalog=enabled"
- "-Dintrospection=enabled"
];
+ # Uses define_variable in pkgconfig, but we still need it to use the glade output
PKG_CONFIG_GLADEUI_2_0_MODULEDIR = "${placeholder "glade"}/lib/glade/modules";
PKG_CONFIG_GLADEUI_2_0_CATALOGDIR = "${placeholder "glade"}/share/glade/catalogs";
- doCheck = true;
+ # Bail out! dbind-FATAL-WARNING:
+ # AT-SPI: Error retrieving accessibility bus address: org.freedesktop.DBus.Error.ServiceUnknown:
+ # The name org.a11y.Bus was not provided by any .service files
+ doCheck = false;
checkPhase = ''
NO_AT_BRIDGE=1 \
- XDG_DATA_DIRS="$XDG_DATA_DIRS:${hicolor-icon-theme}/share" \
+ XDG_DATA_DIRS="$XDG_DATA_DIRS:${hicolor-icon-theme}/share"
+ GDK_PIXBUF_MODULE_FILE="${librsvg.out}/lib/gdk-pixbuf-2.0/2.10.0/loaders.cache" \
xvfb-run -s '-screen 0 800x600x24' dbus-run-session \
--config-file=${dbus.daemon}/share/dbus-1/session.conf \
meson test --print-errorlogs
'';
meta = with stdenv.lib; {
- description = "A library full of GTK widgets for mobile phones";
- homepage = "https://source.puri.sm/Librem5/libhandy";
+ changelog = "https://gitlab.gnome.org/GNOME/libhandy/-/tags/${version}";
+ description = "Building blocks for modern adaptive GNOME apps";
+ homepage = "https://gitlab.gnome.org/GNOME/libhandy";
license = licenses.lgpl21Plus;
- maintainers = with maintainers; [ jtojnar ];
+ maintainers = teams.gnome.members;
platforms = platforms.linux;
};
}
diff --git a/third_party/nixpkgs/pkgs/development/libraries/libical/default.nix b/third_party/nixpkgs/pkgs/development/libraries/libical/default.nix
index 62034a7bce..c03367da97 100644
--- a/third_party/nixpkgs/pkgs/development/libraries/libical/default.nix
+++ b/third_party/nixpkgs/pkgs/development/libraries/libical/default.nix
@@ -91,7 +91,7 @@ stdenv.mkDerivation rec {
runHook preInstallCheck
export TZDIR=${tzdata}/share/zoneinfo
- ctest --output-on-failure --exclude-regex 'regression|recur|timezones|libical-glib-array|libical-glib-component|libical-glib-timezone'
+ ctest --output-on-failure
runHook postInstallCheck
'';
diff --git a/third_party/nixpkgs/pkgs/development/libraries/libimagequant/default.nix b/third_party/nixpkgs/pkgs/development/libraries/libimagequant/default.nix
index 44fa395204..2bfc9ec96c 100644
--- a/third_party/nixpkgs/pkgs/development/libraries/libimagequant/default.nix
+++ b/third_party/nixpkgs/pkgs/development/libraries/libimagequant/default.nix
@@ -2,13 +2,13 @@
stdenv.mkDerivation rec {
pname = "libimagequant";
- version = "2.12.6";
+ version = "2.13.0";
src = fetchFromGitHub {
owner = "ImageOptim";
repo = pname;
rev = version;
- sha256 = "00w7fny3xf14cfyhbdnmqyh9ddqdh1irvgzxd35a2z65kp7vnvj0";
+ sha256 = "12alfvq761nhdl927aj93yv3r6rzxlf7csdr28xgga7cz53fmrrp";
};
preConfigure = ''
diff --git a/third_party/nixpkgs/pkgs/development/libraries/libmanette/default.nix b/third_party/nixpkgs/pkgs/development/libraries/libmanette/default.nix
index eb3cbf4bfe..83ee19075d 100644
--- a/third_party/nixpkgs/pkgs/development/libraries/libmanette/default.nix
+++ b/third_party/nixpkgs/pkgs/development/libraries/libmanette/default.nix
@@ -13,13 +13,13 @@
stdenv.mkDerivation rec {
pname = "libmanette";
- version = "0.2.4";
+ version = "0.2.5";
outputs = [ "out" "dev" ];
src = fetchurl {
url = "mirror://gnome/sources/${pname}/${stdenv.lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
- sha256 = "1xrc6rh73v5w3kbkflzv1yg8sbxk4wf06hfk95raxhxlssza9q2g";
+ sha256 = "gAbghIDAy9T3SewVWCfRAER88jkD+tgkCnxMMhqgmis=";
};
nativeBuildInputs = [
diff --git a/third_party/nixpkgs/pkgs/development/libraries/libndctl/default.nix b/third_party/nixpkgs/pkgs/development/libraries/libndctl/default.nix
index be5c75806d..c0800c991c 100644
--- a/third_party/nixpkgs/pkgs/development/libraries/libndctl/default.nix
+++ b/third_party/nixpkgs/pkgs/development/libraries/libndctl/default.nix
@@ -5,13 +5,13 @@
stdenv.mkDerivation rec {
pname = "libndctl";
- version = "69";
+ version = "70.1";
src = fetchFromGitHub {
owner = "pmem";
repo = "ndctl";
rev = "v${version}";
- sha256 = "1l7p0ycj27d4z07gf9qp796xpg16kfsg3rwx6plhilbhip1as4w7";
+ sha256 = "09ymdibcr18vpmyf2n0xrnzgccfvr7iy3p2l5lbh7cgz7djyl5wq";
};
outputs = [ "out" "lib" "man" "dev" ];
diff --git a/third_party/nixpkgs/pkgs/development/libraries/libpeas/default.nix b/third_party/nixpkgs/pkgs/development/libraries/libpeas/default.nix
index 6c2276a08c..1d360b4505 100644
--- a/third_party/nixpkgs/pkgs/development/libraries/libpeas/default.nix
+++ b/third_party/nixpkgs/pkgs/development/libraries/libpeas/default.nix
@@ -4,13 +4,13 @@
stdenv.mkDerivation rec {
pname = "libpeas";
- version = "1.26.0";
+ version = "1.28.0";
outputs = [ "out" "dev" ];
src = fetchurl {
url = "mirror://gnome/sources/${pname}/${stdenv.lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
- sha256 = "0xkk9zhkw8f2fm7g9nb4ry4xxig5n27s7rjmx6l7jr2941zdfxm9";
+ sha256 = "05cb7drn6arc4gi02wgsvzibigi2riz5gnfnmlb0zmbfnj9ikna2";
};
nativeBuildInputs = [ pkgconfig meson ninja gettext gobject-introspection ];
diff --git a/third_party/nixpkgs/pkgs/development/libraries/libpsl/default.nix b/third_party/nixpkgs/pkgs/development/libraries/libpsl/default.nix
index fb9e5b12bc..67e87a5faa 100644
--- a/third_party/nixpkgs/pkgs/development/libraries/libpsl/default.nix
+++ b/third_party/nixpkgs/pkgs/development/libraries/libpsl/default.nix
@@ -31,8 +31,9 @@ stdenv.mkDerivation rec {
lzip
pkgconfig
python3
- (stdenv.lib.optionalString (!stdenv.isDarwin) valgrind)
libxslt
+ ] ++ stdenv.lib.optionals (!stdenv.isDarwin) [
+ valgrind
];
buildInputs = [
@@ -56,15 +57,16 @@ stdenv.mkDerivation rec {
configureFlags = [
# "--enable-gtk-doc"
"--enable-man"
- "--enable-valgrind-tests"
"--with-psl-distfile=${publicsuffix-list}/share/publicsuffix/public_suffix_list.dat"
"--with-psl-file=${publicsuffix-list}/share/publicsuffix/public_suffix_list.dat"
"--with-psl-testfile=${publicsuffix-list}/share/publicsuffix/test_psl.txt"
+ ] ++ stdenv.lib.optionals (!stdenv.isDarwin) [
+ "--enable-valgrind-tests"
];
enableParallelBuilding = true;
- doCheck = !stdenv.isDarwin;
+ doCheck = true;
meta = with stdenv.lib; {
description = "C library for the Publix Suffix List";
diff --git a/third_party/nixpkgs/pkgs/development/libraries/librsvg/default.nix b/third_party/nixpkgs/pkgs/development/libraries/librsvg/default.nix
index fb61b50346..ecf518d04d 100644
--- a/third_party/nixpkgs/pkgs/development/libraries/librsvg/default.nix
+++ b/third_party/nixpkgs/pkgs/development/libraries/librsvg/default.nix
@@ -4,14 +4,14 @@
let
pname = "librsvg";
- version = "2.48.8";
+ version = "2.50.1";
in
stdenv.mkDerivation rec {
name = "${pname}-${version}";
src = fetchurl {
url = "mirror://gnome/sources/${pname}/${stdenv.lib.versions.majorMinor version}/${name}.tar.xz";
- sha256 = "14i6xzghcidv64cyd3g0wdjbl82rph737yxn9s3x29nzpcjs707l";
+ sha256 = "02csvx2nzygh8kyal2qiy3y6xb7d52vszxxr37dzav704a9pkncv";
};
outputs = [ "out" "dev" "installedTests" ];
diff --git a/third_party/nixpkgs/pkgs/development/libraries/libsoup/default.nix b/third_party/nixpkgs/pkgs/development/libraries/libsoup/default.nix
index 9f4a5bac25..65e0ced1d9 100644
--- a/third_party/nixpkgs/pkgs/development/libraries/libsoup/default.nix
+++ b/third_party/nixpkgs/pkgs/development/libraries/libsoup/default.nix
@@ -1,14 +1,15 @@
-{ stdenv, fetchurl, glib, libxml2, meson, ninja, pkgconfig, gnome3
+{ stdenv, lib, fetchurl, glib, libxml2, meson, ninja, pkgconfig, gnome3, libsysprof-capture
, gnomeSupport ? true, sqlite, glib-networking, gobject-introspection, vala
-, libpsl, python3, brotli, lib }:
+, libpsl, python3, brotli
+}:
stdenv.mkDerivation rec {
pname = "libsoup";
- version = "2.70.0";
+ version = "2.72.0";
src = fetchurl {
url = "mirror://gnome/sources/${pname}/${stdenv.lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
- sha256 = "0hjk9lgppc5435my0lyywbpmj7ib5vvcylwfin8ki97g9bvj1c2l";
+ sha256 = "11skbyw2pw32178q3h8pi7xqa41b2x4k6q4k9f75zxmh8s23y30p";
};
postPatch = ''
@@ -17,7 +18,14 @@ stdenv.mkDerivation rec {
outputs = [ "out" "dev" ];
- buildInputs = [ python3 sqlite libpsl brotli ];
+ buildInputs = [
+ python3
+ sqlite
+ libpsl
+ brotli
+ ] ++ lib.optionals stdenv.isLinux [
+ libsysprof-capture
+ ];
nativeBuildInputs = [ meson ninja pkgconfig gobject-introspection vala glib ];
propagatedBuildInputs = [ glib libxml2 ];
@@ -27,6 +35,8 @@ stdenv.mkDerivation rec {
"-Dvapi=enabled"
"-Dgnome=${lib.boolToString gnomeSupport}"
"-Dntlm=disabled"
+ ] ++ lib.optionals (!stdenv.isLinux) [
+ "-Dsysprof=disabled"
];
doCheck = false; # ERROR:../tests/socket-test.c:37:do_unconnected_socket_test: assertion failed (res == SOUP_STATUS_OK): (2 == 200)
@@ -41,7 +51,7 @@ stdenv.mkDerivation rec {
meta = {
description = "HTTP client/server library for GNOME";
homepage = "https://wiki.gnome.org/Projects/libsoup";
- license = stdenv.lib.licenses.gpl2;
+ license = stdenv.lib.licenses.lgpl2Plus;
inherit (glib.meta) maintainers platforms;
};
}
diff --git a/third_party/nixpkgs/pkgs/development/libraries/libthai/default.nix b/third_party/nixpkgs/pkgs/development/libraries/libthai/default.nix
new file mode 100644
index 0000000000..6179ad0f6b
--- /dev/null
+++ b/third_party/nixpkgs/pkgs/development/libraries/libthai/default.nix
@@ -0,0 +1,27 @@
+{ stdenv, fetchurl, makeWrapper, installShellFiles, pkg-config, libdatrie }:
+
+stdenv.mkDerivation rec {
+ pname = "libthai";
+ version = "0.1.28";
+
+ src = fetchurl {
+ url = "https://github.com/tlwg/libthai/releases/download/v${version}/libthai-${version}.tar.xz";
+ sha256 = "04g93bgxrcnay9fglpq2lj9nr7x1xh06i60m7haip8as9dxs3q7z";
+ };
+
+ nativeBuildInputs = [ installShellFiles pkg-config ];
+
+ buildInputs = [ libdatrie ];
+
+ postInstall = ''
+ installManPage man/man3/*.3
+ '';
+
+ meta = with stdenv.lib; {
+ homepage = "https://linux.thai.net/projects/libthai/";
+ description = "Set of Thai language support routines";
+ license = licenses.lgpl21Plus;
+ platforms = platforms.unix;
+ maintainers = with maintainers; [ SuperSandro2000 ];
+ };
+}
diff --git a/third_party/nixpkgs/pkgs/development/libraries/libusb1/default.nix b/third_party/nixpkgs/pkgs/development/libraries/libusb1/default.nix
index a3323c8e02..8499e16c29 100644
--- a/third_party/nixpkgs/pkgs/development/libraries/libusb1/default.nix
+++ b/third_party/nixpkgs/pkgs/development/libraries/libusb1/default.nix
@@ -2,14 +2,14 @@
, fetchFromGitHub
, autoreconfHook
, pkgconfig
-, enableSystemd ? stdenv.isLinux && !stdenv.hostPlatform.isMusl
-, systemd ? null
+, enableUdev ? stdenv.isLinux && !stdenv.hostPlatform.isMusl
+, udev ? null
, libobjc
, IOKit
, withStatic ? false
}:
-assert enableSystemd -> systemd != null;
+assert enableUdev -> udev != null;
stdenv.mkDerivation rec {
pname = "libusb";
@@ -26,15 +26,15 @@ stdenv.mkDerivation rec {
nativeBuildInputs = [ pkgconfig autoreconfHook ];
propagatedBuildInputs =
- stdenv.lib.optional enableSystemd systemd ++
+ stdenv.lib.optional enableUdev udev ++
stdenv.lib.optionals stdenv.isDarwin [ libobjc IOKit ];
dontDisableStatic = withStatic;
- configureFlags = stdenv.lib.optional (!enableSystemd) "--disable-udev";
+ configureFlags = stdenv.lib.optional (!enableUdev) "--disable-udev";
- preFixup = stdenv.lib.optionalString enableSystemd ''
- sed 's,-ludev,-L${stdenv.lib.getLib systemd}/lib -ludev,' -i $out/lib/libusb-1.0.la
+ preFixup = stdenv.lib.optionalString enableUdev ''
+ sed 's,-ludev,-L${stdenv.lib.getLib udev}/lib -ludev,' -i $out/lib/libusb-1.0.la
'';
meta = with stdenv.lib; {
diff --git a/third_party/nixpkgs/pkgs/development/libraries/libva/default.nix b/third_party/nixpkgs/pkgs/development/libraries/libva/default.nix
index d357828373..f6c8c9d0bb 100644
--- a/third_party/nixpkgs/pkgs/development/libraries/libva/default.nix
+++ b/third_party/nixpkgs/pkgs/development/libraries/libva/default.nix
@@ -7,13 +7,13 @@
stdenv.mkDerivation rec {
name = "libva-${lib.optionalString minimal "minimal-"}${version}";
- version = "2.9.0"; # Also update the hash for libva-utils!
+ version = "2.9.1"; # Also update the hash for libva-utils!
src = fetchFromGitHub {
owner = "intel";
repo = "libva";
rev = version;
- sha256 = "17m8k8fn41vzi1lzh9idf2mn4x73bwlkw60kl5zj396kpw4n1z1r";
+ sha256 = "1c9rwrz30q2p47spzb9gsakwci9c5mw6i309z7p7hr2d8233ay4x";
};
outputs = [ "dev" "out" ];
diff --git a/third_party/nixpkgs/pkgs/development/libraries/libva/utils.nix b/third_party/nixpkgs/pkgs/development/libraries/libva/utils.nix
index 71a1d085d1..675d85508b 100644
--- a/third_party/nixpkgs/pkgs/development/libraries/libva/utils.nix
+++ b/third_party/nixpkgs/pkgs/development/libraries/libva/utils.nix
@@ -10,7 +10,7 @@ stdenv.mkDerivation rec {
owner = "intel";
repo = "libva-utils";
rev = version;
- sha256 = "1xylc940ffhqay9lyy48872cfw61ziky8dw21vm69psngfz3zs9n";
+ sha256 = "1viqxq9r424hvbfgjlw4zb1idsq24fqr5cz6rk47j37rcnqclj2k";
};
nativeBuildInputs = [ meson ninja pkg-config ];
diff --git a/third_party/nixpkgs/pkgs/development/libraries/mimalloc/default.nix b/third_party/nixpkgs/pkgs/development/libraries/mimalloc/default.nix
index 997fd2ab63..7382ed57c6 100644
--- a/third_party/nixpkgs/pkgs/development/libraries/mimalloc/default.nix
+++ b/third_party/nixpkgs/pkgs/development/libraries/mimalloc/default.nix
@@ -7,13 +7,13 @@ let
in
stdenv.mkDerivation rec {
pname = "mimalloc";
- version = "1.6.4";
+ version = "1.6.7";
src = fetchFromGitHub {
owner = "microsoft";
repo = pname;
rev = "v${version}";
- sha256 = "0b6ymi2a9is2q6n49dvlnjxknikj0rfff5ygbc4n7894h5mllvvr";
+ sha256 = "1ymffs3ixc4vkhpr09ph6xhyknm2cx8ij8j5l70cq6119mwilnwa";
};
nativeBuildInputs = [ cmake ninja ];
diff --git a/third_party/nixpkgs/pkgs/development/libraries/mm-common/default.nix b/third_party/nixpkgs/pkgs/development/libraries/mm-common/default.nix
index 3c02e537d2..3981e05ef0 100644
--- a/third_party/nixpkgs/pkgs/development/libraries/mm-common/default.nix
+++ b/third_party/nixpkgs/pkgs/development/libraries/mm-common/default.nix
@@ -8,11 +8,11 @@
stdenv.mkDerivation rec {
pname = "mm-common";
- version = "1.0.1";
+ version = "1.0.2";
src = fetchurl {
url = "mirror://gnome/sources/${pname}/${stdenv.lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
- sha256 = "1jasx9a9g7nqf7jcv3mrg4qh5cp9sq724jxjaz4wa1dzmxsxg8i8";
+ sha256 = "07b4s5ckcz9q5gwx8vchim19mhfgl8wysqwi30pndks3m4zrzad2";
};
nativeBuildInputs = [
diff --git a/third_party/nixpkgs/pkgs/development/libraries/nanoflann/default.nix b/third_party/nixpkgs/pkgs/development/libraries/nanoflann/default.nix
index 8480cc868c..3bd6bb02a0 100644
--- a/third_party/nixpkgs/pkgs/development/libraries/nanoflann/default.nix
+++ b/third_party/nixpkgs/pkgs/development/libraries/nanoflann/default.nix
@@ -1,14 +1,14 @@
{stdenv, fetchFromGitHub, cmake}:
stdenv.mkDerivation rec {
- version = "1.3.1";
+ version = "1.3.2";
pname = "nanoflann";
-
+
src = fetchFromGitHub {
owner = "jlblancoc";
repo = "nanoflann";
rev = "v${version}";
- sha256 = "07vi3yn5y9zk9acdbxy954ghdml15wnyqfizzqwsw8zmc9bf30ih";
+ sha256 = "0lq1zqwjvk8wv15hd7aw57jsqbvv45cwb8ngdh1d2iyw5rvnbhsn";
};
buildInputs = [ cmake ];
diff --git a/third_party/nixpkgs/pkgs/development/libraries/nss/3.44.nix b/third_party/nixpkgs/pkgs/development/libraries/nss/3.44.nix
index ad58bfccae..1c89dd7933 100644
--- a/third_party/nixpkgs/pkgs/development/libraries/nss/3.44.nix
+++ b/third_party/nixpkgs/pkgs/development/libraries/nss/3.44.nix
@@ -19,10 +19,10 @@ in stdenv.mkDerivation rec {
depsBuildBuild = [ buildPackages.stdenv.cc ];
- nativeBuildInputs = [ perl ];
+ nativeBuildInputs = [ perl ]
+ ++ stdenv.lib.optional stdenv.hostPlatform.isDarwin fixDarwinDylibNames;
- buildInputs = [ zlib sqlite ]
- ++ stdenv.lib.optional stdenv.isDarwin fixDarwinDylibNames;
+ buildInputs = [ zlib sqlite ];
propagatedBuildInputs = [ nspr ];
diff --git a/third_party/nixpkgs/pkgs/development/libraries/nss/default.nix b/third_party/nixpkgs/pkgs/development/libraries/nss/default.nix
index e9ca475802..c7c87a436b 100644
--- a/third_party/nixpkgs/pkgs/development/libraries/nss/default.nix
+++ b/third_party/nixpkgs/pkgs/development/libraries/nss/default.nix
@@ -1,4 +1,8 @@
-{ stdenv, fetchurl, nspr, perl, zlib, sqlite, darwin, fixDarwinDylibNames, buildPackages, ninja }:
+{ stdenv, fetchurl, nspr, perl, zlib, sqlite, darwin, fixDarwinDylibNames, buildPackages, ninja
+, # allow FIPS mode. Note that this makes the output non-reproducible.
+ # https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_Tech_Notes/nss_tech_note6
+ enableFIPS ? false
+}:
let
nssPEM = fetchurl {
@@ -20,10 +24,9 @@ in stdenv.mkDerivation rec {
depsBuildBuild = [ buildPackages.stdenv.cc ];
nativeBuildInputs = [ perl ninja (buildPackages.python3.withPackages (ps: with ps; [ gyp ])) ]
- ++ stdenv.lib.optional stdenv.isDarwin darwin.cctools;
+ ++ stdenv.lib.optionals stdenv.hostPlatform.isDarwin [ darwin.cctools fixDarwinDylibNames ];
- buildInputs = [ zlib sqlite ]
- ++ stdenv.lib.optional stdenv.isDarwin fixDarwinDylibNames;
+ buildInputs = [ zlib sqlite ];
propagatedBuildInputs = [ nspr ];
@@ -84,6 +87,7 @@ in stdenv.mkDerivation rec {
-Dhost_arch=${host} \
-Duse_system_zlib=1 \
--enable-libpkix \
+ ${stdenv.lib.optionalString enableFIPS "--enable-fips"} \
${stdenv.lib.optionalString stdenv.isDarwin "--clang"} \
${stdenv.lib.optionalString (stdenv.hostPlatform != stdenv.buildPlatform) "--disable-tests"}
@@ -129,7 +133,8 @@ in stdenv.mkDerivation rec {
postFixup = let
isCross = stdenv.hostPlatform != stdenv.buildPlatform;
nss = if isCross then buildPackages.nss.tools else "$out";
- in ''
+ in
+ (stdenv.lib.optionalString enableFIPS (''
for libname in freebl3 nssdbm3 softokn3
do '' +
(if stdenv.isDarwin
@@ -142,7 +147,8 @@ in stdenv.mkDerivation rec {
'') + ''
${nss}/bin/shlibsign -v -i "$libfile"
done
-
+ '')) +
+ ''
moveToOutput bin "$tools"
moveToOutput bin/nss-config "$dev"
moveToOutput lib/libcrmf.a "$dev" # needed by firefox, for example
diff --git a/third_party/nixpkgs/pkgs/development/libraries/odpic/default.nix b/third_party/nixpkgs/pkgs/development/libraries/odpic/default.nix
index 6c3744493d..7f27f7d1c1 100644
--- a/third_party/nixpkgs/pkgs/development/libraries/odpic/default.nix
+++ b/third_party/nixpkgs/pkgs/development/libraries/odpic/default.nix
@@ -16,7 +16,7 @@ in stdenv.mkDerivation {
sha256 = "1g2wdchlwdihqj0ynx58nwyrpncxanghlnykgir97p0wimg3hnxl";
};
- nativeBuildInputs = stdenv.lib.optional stdenv.isDarwin [ fixDarwinDylibNames ];
+ nativeBuildInputs = stdenv.lib.optional stdenv.isDarwin fixDarwinDylibNames;
buildInputs = [ oracle-instantclient ]
++ stdenv.lib.optionals stdenv.isLinux [ libaio ];
diff --git a/third_party/nixpkgs/pkgs/development/libraries/oneDNN/default.nix b/third_party/nixpkgs/pkgs/development/libraries/oneDNN/default.nix
index b780b9f4e3..6dc4bd704d 100644
--- a/third_party/nixpkgs/pkgs/development/libraries/oneDNN/default.nix
+++ b/third_party/nixpkgs/pkgs/development/libraries/oneDNN/default.nix
@@ -5,13 +5,13 @@
# https://github.com/oneapi-src/oneDNN#oneapi-deep-neural-network-library-onednn
stdenv.mkDerivation rec {
pname = "oneDNN";
- version = "1.6.4";
+ version = "1.7";
src = fetchFromGitHub {
owner = "oneapi-src";
repo = "oneDNN";
rev = "v${version}";
- sha256 = "0y4lpx24k08wydv4aprfn2icg6ixk0iprk8pmbvyaa6gyab70vjy";
+ sha256 = "15kanz3zflmxr355dhny4rdycq0ni9iz42vvlblzc5lmj39n84fj";
};
outputs = [ "out" "dev" "doc" ];
diff --git a/third_party/nixpkgs/pkgs/development/libraries/opencv/default.nix b/third_party/nixpkgs/pkgs/development/libraries/opencv/default.nix
index 0749ec9e7f..56414cfa39 100644
--- a/third_party/nixpkgs/pkgs/development/libraries/opencv/default.nix
+++ b/third_party/nixpkgs/pkgs/development/libraries/opencv/default.nix
@@ -19,13 +19,13 @@ in
stdenv.mkDerivation rec {
pname = "opencv";
- version = "2.4.13";
+ version = "2.4.13.7";
src = fetchFromGitHub {
- owner = "Itseez";
+ owner = "opencv";
repo = "opencv";
rev = version;
- sha256 = "1k29rxlvrhgc5hadg2nc50wa3d2ls9ndp373257p756a0aividxh";
+ sha256 = "062js7zhh4ixi2wk61wyi23qp9zsk5vw24iz2i5fab2hp97y5zq3";
};
patches =
@@ -87,6 +87,5 @@ stdenv.mkDerivation rec {
license = licenses.bsd3;
maintainers = with maintainers; [ ];
platforms = platforms.linux;
- broken = true;
};
}
diff --git a/third_party/nixpkgs/pkgs/development/libraries/opendht/default.nix b/third_party/nixpkgs/pkgs/development/libraries/opendht/default.nix
index f9b2e07fb4..e160bfb7d3 100644
--- a/third_party/nixpkgs/pkgs/development/libraries/opendht/default.nix
+++ b/third_party/nixpkgs/pkgs/development/libraries/opendht/default.nix
@@ -5,13 +5,13 @@
stdenv.mkDerivation rec {
pname = "opendht";
- version = "2.1.4";
+ version = "2.1.6";
src = fetchFromGitHub {
owner = "savoirfairelinux";
repo = "opendht";
rev = version;
- sha256 = "1ax26ri1ifb6s8ppd28jmanka9yf8mw3np65q2h4djhhik0phhal";
+ sha256 = "0sjb2a3yqnabwgmmn8gapc1dq9m8vp9z8w85zhsj654i5h3gp6zv";
};
nativeBuildInputs =
diff --git a/third_party/nixpkgs/pkgs/development/libraries/openldap/default.nix b/third_party/nixpkgs/pkgs/development/libraries/openldap/default.nix
index 7f9c2dbf3e..1304799f56 100644
--- a/third_party/nixpkgs/pkgs/development/libraries/openldap/default.nix
+++ b/third_party/nixpkgs/pkgs/development/libraries/openldap/default.nix
@@ -8,6 +8,16 @@ stdenv.mkDerivation rec {
sha256 = "0qmy2jkk6v9iqwrsdsn8s7lwzaplr01a2mgf21r6nl66lig7g47l";
};
+ patches = [
+ (fetchurl {
+ # Fix a null-ptr dereference for unauthenticated packet in slapd
+ # NO CVE yet
+ # https://bugs.openldap.org/show_bug.cgi?id=9370
+ url = "https://git.openldap.org/openldap/openldap/-/commit/4c774220a752bf8e3284984890dc0931fe73165d.patch";
+ sha256 = "1vkbb6szscnhch5zzf6iq104l3dkwd50rih8jk9y0s2vgyz76mil";
+ })
+ ];
+
# TODO: separate "out" and "bin"
outputs = [ "out" "dev" "man" "devdoc" ];
diff --git a/third_party/nixpkgs/pkgs/development/libraries/pango/default.nix b/third_party/nixpkgs/pkgs/development/libraries/pango/default.nix
index e3bdba9b3b..b3dd2062ca 100644
--- a/third_party/nixpkgs/pkgs/development/libraries/pango/default.nix
+++ b/third_party/nixpkgs/pkgs/development/libraries/pango/default.nix
@@ -1,5 +1,5 @@
{ stdenv, fetchurl, fetchpatch, pkgconfig, cairo, harfbuzz
-, libintl, gobject-introspection, darwin, fribidi, gnome3
+, libintl, libthai, gobject-introspection, darwin, fribidi, gnome3
, gtk-doc, docbook_xsl, docbook_xml_dtd_43, makeFontsConf, freefont_ttf
, meson, ninja, glib
, x11Support? !stdenv.isDarwin, libXft
@@ -9,26 +9,15 @@ with stdenv.lib;
let
pname = "pango";
- version = "1.45.3";
+ version = "1.47.0";
in stdenv.mkDerivation rec {
name = "${pname}-${version}";
src = fetchurl {
url = "mirror://gnome/sources/${pname}/${stdenv.lib.versions.majorMinor version}/${name}.tar.xz";
- sha256 = "0zg6gvzk227q997jf1c9p7j5ra87nm008hlgq6q8na9xmgmw2x8z";
+ sha256 = "0ry3j9n0lvdfmjwi2w7wa4gkalnip56kghqq6bh8hcf45xjvh3bk";
};
- patches = [
- # Fix issue with Pango loading unsupported formats that
- # breaks mixed x11/opentype font packages.
- # See https://gitlab.gnome.org/GNOME/pango/issues/457
- # Remove on next release.
- (fetchpatch {
- url = "https://gitlab.gnome.org/GNOME/pango/commit/fe1ee773310bac83d8e5d3c062b13a51fb5fb4ad.patch";
- sha256 = "1px66g31l2jx4baaqi4md59wlmvw0ywgspn6zr919fxl4h1kkh0h";
- })
- ];
-
# FIXME: docs fail on darwin
outputs = [ "bin" "dev" "out" ] ++ optional (!stdenv.isDarwin) "devdoc";
@@ -39,6 +28,7 @@ in stdenv.mkDerivation rec {
];
buildInputs = [
fribidi
+ libthai
] ++ optionals stdenv.isDarwin (with darwin.apple_sdk.frameworks; [
ApplicationServices
Carbon
@@ -50,6 +40,8 @@ in stdenv.mkDerivation rec {
mesonFlags = [
"-Dgtk_doc=${if stdenv.isDarwin then "false" else "true"}"
+ ] ++ stdenv.lib.optionals stdenv.isDarwin [
+ "-Dxft=disabled" # only works with x11
];
enableParallelBuilding = true;
diff --git a/third_party/nixpkgs/pkgs/development/libraries/physics/geant4/default.nix b/third_party/nixpkgs/pkgs/development/libraries/physics/geant4/default.nix
index 97822d769d..dc809d5893 100644
--- a/third_party/nixpkgs/pkgs/development/libraries/physics/geant4/default.nix
+++ b/third_party/nixpkgs/pkgs/development/libraries/physics/geant4/default.nix
@@ -38,6 +38,9 @@
# For enablePython
, boost
, python3
+
+# For tests
+, callPackage
}:
let
@@ -45,12 +48,12 @@ let
in
stdenv.mkDerivation rec {
- version = "10.6.2";
+ version = "10.6.3";
pname = "geant4";
src = fetchurl{
- url = "https://geant4-data.web.cern.ch/geant4-data/releases/geant4.10.06.p02.tar.gz";
- sha256 = "0vznm3pjlbihjy1wsxc4gj229k0dzc283wvil2xghyl08vwdpnpc";
+ url = "https://geant4-data.web.cern.ch/geant4-data/releases/geant4.10.06.p03.tar.gz";
+ sha256 = "1wzv5xky1pfm7wdfdkvqcaaqlcnsrz35dc7zcrxh8l3j5rki6pqb";
};
boost_python_lib = "python${builtins.replaceStrings ["."] [""] python3.pythonVersion}";
@@ -108,6 +111,8 @@ stdenv.mkDerivation rec {
inherit stdenv fetchurl;
geant_version = version;
};
+
+ tests = callPackage ./tests.nix {};
};
# Set the myriad of envars required by Geant4 if we use a nix-shell.
diff --git a/third_party/nixpkgs/pkgs/development/libraries/physics/geant4/tests.nix b/third_party/nixpkgs/pkgs/development/libraries/physics/geant4/tests.nix
new file mode 100644
index 0000000000..83afee6089
--- /dev/null
+++ b/third_party/nixpkgs/pkgs/development/libraries/physics/geant4/tests.nix
@@ -0,0 +1,31 @@
+{ stdenv, cmake, geant4 }:
+
+{
+ example_B1 = stdenv.mkDerivation {
+ name = "${geant4.name}-test-example_B1";
+
+ inherit (geant4) src;
+
+ nativeBuildInputs = [ cmake ];
+ buildInputs = [ geant4 ];
+ checkInputs = with geant4.data; [
+ G4EMLOW
+ G4ENSDFSTATE
+ G4PARTICLEXS
+ G4PhotonEvaporation
+ ];
+
+ prePatch = ''
+ cd examples/basic/B1
+ '';
+
+ doCheck = true;
+ checkPhase = ''
+ runHook preCheck
+
+ ./exampleB1 ../run2.mac
+
+ runHook postCheck
+ '';
+ };
+}
diff --git a/third_party/nixpkgs/pkgs/development/libraries/pipewire/0.2.nix b/third_party/nixpkgs/pkgs/development/libraries/pipewire/0.2.nix
index 1dbfe0647f..eaedc2c0ac 100644
--- a/third_party/nixpkgs/pkgs/development/libraries/pipewire/0.2.nix
+++ b/third_party/nixpkgs/pkgs/development/libraries/pipewire/0.2.nix
@@ -1,5 +1,5 @@
{ stdenv, fetchFromGitHub, meson, ninja, pkgconfig, doxygen, graphviz, valgrind
-, glib, dbus, gst_all_1, alsaLib, ffmpeg_3, libjack2, udev, libva, xorg
+, glib, dbus, gst_all_1, alsaLib, ffmpeg_4, libjack2, udev, libva, xorg
, sbc, SDL2, makeFontsConf
}:
@@ -25,7 +25,7 @@ in stdenv.mkDerivation rec {
];
buildInputs = [
glib dbus gst_all_1.gst-plugins-base gst_all_1.gstreamer
- alsaLib ffmpeg_3 libjack2 udev libva xorg.libX11 sbc SDL2
+ alsaLib ffmpeg_4 libjack2 udev libva xorg.libX11 sbc SDL2
];
mesonFlags = [
diff --git a/third_party/nixpkgs/pkgs/development/libraries/qpdf/default.nix b/third_party/nixpkgs/pkgs/development/libraries/qpdf/default.nix
index 9405e18eda..c098680d27 100644
--- a/third_party/nixpkgs/pkgs/development/libraries/qpdf/default.nix
+++ b/third_party/nixpkgs/pkgs/development/libraries/qpdf/default.nix
@@ -2,13 +2,13 @@
stdenv.mkDerivation rec {
pname = "qpdf";
- version = "10.0.1";
+ version = "10.0.3";
src = fetchFromGitHub {
owner = "qpdf";
repo = "qpdf";
rev = "release-qpdf-${version}";
- sha256 = "0g3rqf4wd1n9cms7ra1jnszsgw5bygv37jq2l20d8z5fajckhyyi";
+ sha256 = "14c4ig51hhrvrwhhriklylp40349xqgd3filajsvqk9vaww6na7f";
};
nativeBuildInputs = [ perl ];
diff --git a/third_party/nixpkgs/pkgs/development/libraries/qrencode/default.nix b/third_party/nixpkgs/pkgs/development/libraries/qrencode/default.nix
index 83d2db6a26..2c60c4c10d 100644
--- a/third_party/nixpkgs/pkgs/development/libraries/qrencode/default.nix
+++ b/third_party/nixpkgs/pkgs/development/libraries/qrencode/default.nix
@@ -2,13 +2,13 @@
stdenv.mkDerivation rec {
pname = "qrencode";
- version = "4.0.2";
+ version = "4.1.1";
outputs = [ "bin" "out" "man" "dev" ];
src = fetchurl {
url = "https://fukuchi.org/works/qrencode/qrencode-${version}.tar.gz";
- sha256 = "079v3a15ydpr67zdi3xbgvic8n2kxvi0m32dyz8jaik10yffgayv";
+ sha256 = "sha256-2kSO1PUqumvLDNSMrA3VG4aSvMxM0SdDFAL8pvgXHo4=";
};
nativeBuildInputs = [ pkgconfig ];
diff --git a/third_party/nixpkgs/pkgs/development/libraries/science/math/libtorch/bin.nix b/third_party/nixpkgs/pkgs/development/libraries/science/math/libtorch/bin.nix
index 6180c14c4d..7c78f61af6 100644
--- a/third_party/nixpkgs/pkgs/development/libraries/science/math/libtorch/bin.nix
+++ b/third_party/nixpkgs/pkgs/development/libraries/science/math/libtorch/bin.nix
@@ -45,6 +45,14 @@ in stdenv.mkDerivation {
# We do not care about Java support...
rm -f $out/lib/lib*jni* 2> /dev/null || true
+
+ # Fix up library paths for split outputs
+ substituteInPlace $dev/share/cmake/Torch/TorchConfig.cmake \
+ --replace \''${TORCH_INSTALL_PREFIX}/lib "$out/lib" \
+
+ substituteInPlace \
+ $dev/share/cmake/Caffe2/Caffe2Targets-release.cmake \
+ --replace \''${_IMPORT_PREFIX}/lib "$out/lib" \
'';
postFixup = let
diff --git a/third_party/nixpkgs/pkgs/development/libraries/science/math/libtorch/test/CMakeLists.txt b/third_party/nixpkgs/pkgs/development/libraries/science/math/libtorch/test/CMakeLists.txt
index b302449ef7..4e96704a4c 100644
--- a/third_party/nixpkgs/pkgs/development/libraries/science/math/libtorch/test/CMakeLists.txt
+++ b/third_party/nixpkgs/pkgs/development/libraries/science/math/libtorch/test/CMakeLists.txt
@@ -1,3 +1,4 @@
+cmake_minimum_required(VERSION 3.0)
find_package(Torch REQUIRED)
set(CMAKE_CXX_FLAGS "${CMAKE_CXX_FLAGS} ${TORCH_CXX_FLAGS}")
add_executable(test test.cpp)
diff --git a/third_party/nixpkgs/pkgs/development/libraries/science/math/openblas/0001-Disable-optimised-aarch64-dgemm_beta-pending-fix.patch b/third_party/nixpkgs/pkgs/development/libraries/science/math/openblas/0001-Disable-optimised-aarch64-dgemm_beta-pending-fix.patch
deleted file mode 100644
index 1da1f3fb31..0000000000
--- a/third_party/nixpkgs/pkgs/development/libraries/science/math/openblas/0001-Disable-optimised-aarch64-dgemm_beta-pending-fix.patch
+++ /dev/null
@@ -1,26 +0,0 @@
-From 6cb9aa7c69c20a677ca9fb1bc5fa1580e3236fbd Mon Sep 17 00:00:00 2001
-From: Tom Hall
-Date: Sat, 14 Mar 2020 11:55:45 +0000
-Subject: [PATCH] Disable optimised aarch64 dgemm_beta pending fix
-
-Identified as source of https://github.com/xianyi/OpenBLAS/issues/2496,
-but not yet fixed.
----
- kernel/arm64/KERNEL.ARMV8 | 1 -
- 1 file changed, 1 deletion(-)
-
-diff --git a/kernel/arm64/KERNEL.ARMV8 b/kernel/arm64/KERNEL.ARMV8
-index fe32d313..33d12f94 100644
---- a/kernel/arm64/KERNEL.ARMV8
-+++ b/kernel/arm64/KERNEL.ARMV8
-@@ -102,7 +102,6 @@ CDOTKERNEL = zdot.S
- ZDOTKERNEL = zdot.S
- DSDOTKERNEL = dot.S
-
--DGEMM_BETA = dgemm_beta.S
- SGEMM_BETA = sgemm_beta.S
-
- SGEMMKERNEL = sgemm_kernel_$(SGEMM_UNROLL_M)x$(SGEMM_UNROLL_N).S
---
-2.24.1
-
diff --git a/third_party/nixpkgs/pkgs/development/libraries/science/math/openblas/default.nix b/third_party/nixpkgs/pkgs/development/libraries/science/math/openblas/default.nix
index b03e2b3a8c..d670a40f32 100644
--- a/third_party/nixpkgs/pkgs/development/libraries/science/math/openblas/default.nix
+++ b/third_party/nixpkgs/pkgs/development/libraries/science/math/openblas/default.nix
@@ -106,7 +106,7 @@ let
in
stdenv.mkDerivation rec {
pname = "openblas";
- version = "0.3.10";
+ version = "0.3.12";
outputs = [ "out" "dev" ];
@@ -114,7 +114,7 @@ stdenv.mkDerivation rec {
owner = "xianyi";
repo = "OpenBLAS";
rev = "v${version}";
- sha256 = "174id98ga82bhz2v7sy9yj6pqy0h0088p3mkdikip69p9rh3d17b";
+ sha256 = "0mk1kjkr96bvvcq2zigzjrs0cnhwsf6gfi0855mp9yifn8lvp20y";
};
inherit blas64;
@@ -144,12 +144,6 @@ stdenv.mkDerivation rec {
buildPackages.stdenv.cc
];
- # Disable an optimisation which seems to cause issues, pending an
- # upstream fix: https://github.com/xianyi/OpenBLAS/issues/2496
- patches = stdenv.lib.optionals stdenv.hostPlatform.isAarch64 [
- ./0001-Disable-optimised-aarch64-dgemm_beta-pending-fix.patch
- ];
-
makeFlags = mkMakeFlagsFromConfig (config // {
FC = "${stdenv.cc.targetPrefix}gfortran";
CC = "${stdenv.cc.targetPrefix}${if stdenv.cc.isClang then "clang" else "cc"}";
diff --git a/third_party/nixpkgs/pkgs/development/libraries/simpleitk/default.nix b/third_party/nixpkgs/pkgs/development/libraries/simpleitk/default.nix
index 319f955b95..bfc1c55d2c 100644
--- a/third_party/nixpkgs/pkgs/development/libraries/simpleitk/default.nix
+++ b/third_party/nixpkgs/pkgs/development/libraries/simpleitk/default.nix
@@ -2,13 +2,13 @@
stdenv.mkDerivation rec {
pname = "simpleitk";
- version = "2.0.0";
+ version = "2.0.1";
src = fetchFromGitHub {
owner = "SimpleITK";
repo = "SimpleITK";
rev = "v${version}";
- sha256 = "1nf3cl3ywqg04446xhkb97kcashrgibsihxn2sqrs81i9d0rw5kn";
+ sha256 = "0yijli538hd96pfg4vpfk983y6d5bw9dlbs9nsq4rp83r08qdcc5";
};
nativeBuildInputs = [ cmake swig ];
diff --git a/third_party/nixpkgs/pkgs/development/libraries/tepl/default.nix b/third_party/nixpkgs/pkgs/development/libraries/tepl/default.nix
index 008f0f5b42..77cf9fd024 100644
--- a/third_party/nixpkgs/pkgs/development/libraries/tepl/default.nix
+++ b/third_party/nixpkgs/pkgs/development/libraries/tepl/default.nix
@@ -1,28 +1,41 @@
-{ stdenv, fetchurl
-, amtk, gnome3, gtk3, gtksourceview4, libuchardet, libxml2, pkgconfig }:
-let
- version = "4.4.0";
+{ stdenv
+, fetchurl
+, meson
+, ninja
+, amtk
+, gnome3
+, gobject-introspection
+, gtk3
+, gtksourceview4
+, icu
+, pkg-config
+}:
+
+stdenv.mkDerivation rec {
pname = "tepl";
-in stdenv.mkDerivation {
- name = "${pname}-${version}";
+ version = "5.0.0";
+
+ outputs = [ "out" "dev" ];
src = fetchurl {
url = "mirror://gnome/sources/${pname}/${stdenv.lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
- sha256 = "0mm2z849hnni7597an05mrv0dckrxjngpf2xfa0g5s17i8x6gxp6";
+ sha256 = "0x2s0ks575b57jdqnp9r9miz40pm705n2dlj2k8bfj1hyl22kgf6";
};
nativeBuildInputs = [
- pkgconfig
+ meson
+ ninja
+ gobject-introspection
+ pkg-config
];
buildInputs = [
- libxml2
+ icu
];
propagatedBuildInputs = [
amtk
gtksourceview4
- libuchardet
gtk3
];
@@ -38,8 +51,8 @@ in stdenv.mkDerivation {
meta = with stdenv.lib; {
homepage = "https://wiki.gnome.org/Projects/Tepl";
description = "Text editor product line";
- maintainers = [ maintainers.manveru ];
- license = licenses.lgpl21Plus;
+ maintainers = teams.gnome.members ++ [ maintainers.manveru ];
+ license = licenses.lgpl3Plus;
platforms = platforms.linux;
};
}
diff --git a/third_party/nixpkgs/pkgs/development/libraries/tiledb/default.nix b/third_party/nixpkgs/pkgs/development/libraries/tiledb/default.nix
index 2726ed7f23..89318dd4e7 100644
--- a/third_party/nixpkgs/pkgs/development/libraries/tiledb/default.nix
+++ b/third_party/nixpkgs/pkgs/development/libraries/tiledb/default.nix
@@ -41,7 +41,7 @@ stdenv.mkDerivation rec {
cmake
python
doxygen
- ];
+ ] ++ lib.optional stdenv.hostPlatform.isDarwin fixDarwinDylibNames;
checkInputs = [
gtest
@@ -60,7 +60,7 @@ stdenv.mkDerivation rec {
openssl
boost
libpqxx
- ] ++ lib.optional stdenv.isDarwin fixDarwinDylibNames;
+ ];
# emulate the process of pulling catch down
postPatch = ''
diff --git a/third_party/nixpkgs/pkgs/development/libraries/tracker-miners/default.nix b/third_party/nixpkgs/pkgs/development/libraries/tracker-miners/default.nix
index f93721bdfc..0670fdcdbd 100644
--- a/third_party/nixpkgs/pkgs/development/libraries/tracker-miners/default.nix
+++ b/third_party/nixpkgs/pkgs/development/libraries/tracker-miners/default.nix
@@ -1,7 +1,10 @@
{ stdenv
, fetchurl
, substituteAll
-, intltool
+, asciidoc
+, docbook-xsl-nons
+, docbook_xml_dtd_45
+, gettext
, itstool
, libxslt
, gexiv2
@@ -15,7 +18,6 @@
, dbus
, evolution-data-server
, exempi
-, flac
, giflib
, glib
, gnome3
@@ -35,9 +37,10 @@
, libsoup
, libtiff
, libuuid
-, libvorbis
, libxml2
+, networkmanager
, poppler
+, systemd
, taglib
, upower
, totem-pl-parser
@@ -45,15 +48,18 @@
stdenv.mkDerivation rec {
pname = "tracker-miners";
- version = "2.3.3";
+ version = "3.0.1";
src = fetchurl {
url = "mirror://gnome/sources/${pname}/${stdenv.lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
- sha256 = "06abxrnrz7xayykrabn135rpsm6z0fqw7gibrb9j09l6swlalwkl";
+ sha256 = "1kfi5d6pccqx28hbnja6k1mpwjd53k5zs704sg01rlzmbshz1zn6";
};
nativeBuildInputs = [
- intltool
+ asciidoc
+ docbook-xsl-nons
+ docbook_xml_dtd_45
+ gettext
itstool
libxslt
meson
@@ -69,7 +75,6 @@ stdenv.mkDerivation rec {
dbus
evolution-data-server
exempi
- flac
giflib
glib
gexiv2
@@ -92,9 +97,10 @@ stdenv.mkDerivation rec {
libsoup
libtiff
libuuid
- libvorbis
libxml2
+ networkmanager
poppler
+ systemd
taglib
upower
];
@@ -102,19 +108,12 @@ stdenv.mkDerivation rec {
mesonFlags = [
# TODO: tests do not like our sandbox
"-Dfunctional_tests=false"
- "-Ddbus_services=${placeholder "out"}/share/dbus-1/services"
- "-Dsystemd_user_services=${placeholder "out"}/lib/systemd/user"
];
patches = [
(substituteAll {
src = ./fix-paths.patch;
- inherit tracker;
- })
- # https://bugzilla.gnome.org/show_bug.cgi?id=795576
- (fetchurl {
- url = "https://bugzilla.gnome.org/attachment.cgi?id=371427";
- sha256 = "187flswvzymjfxwfrrhizb1cvs780zm39aa3i2vwa5fbllr7kcpf";
+ inherit asciidoc;
})
];
diff --git a/third_party/nixpkgs/pkgs/development/libraries/tracker-miners/fix-paths.patch b/third_party/nixpkgs/pkgs/development/libraries/tracker-miners/fix-paths.patch
index ce44416055..8661648eac 100644
--- a/third_party/nixpkgs/pkgs/development/libraries/tracker-miners/fix-paths.patch
+++ b/third_party/nixpkgs/pkgs/development/libraries/tracker-miners/fix-paths.patch
@@ -1,11 +1,13 @@
---- a/src/libtracker-miners-common/tracker-domain-ontology.c
-+++ b/src/libtracker-miners-common/tracker-domain-ontology.c
-@@ -323,7 +323,7 @@
- goto end;
- }
- } else {
-- path = g_build_filename (SHAREDIR, "tracker", "domain-ontologies",
-+ path = g_build_filename ("@tracker@", "share", "tracker", "domain-ontologies",
- DEFAULT_RULE, NULL);
-
- if (!g_file_test (path, G_FILE_TEST_IS_REGULAR)) {
+diff --git a/docs/manpages/meson.build b/docs/manpages/meson.build
+index 0b8a64863..a09db59f0 100644
+--- a/docs/manpages/meson.build
++++ b/docs/manpages/meson.build
+@@ -43,7 +43,7 @@ foreach m : daemon_manpages + cli_manpages
+ command: [xsltproc,
+ '--output', '@OUTPUT@',
+ '--stringparam', 'man.authors.section.enabled', '0',
+- '/etc/asciidoc/docbook-xsl/manpage.xsl', '@INPUT@'],
++ '@asciidoc@/etc/asciidoc/docbook-xsl/manpage.xsl', '@INPUT@'],
+ input: xml,
+ output: manpage,
+ install: true,
diff --git a/third_party/nixpkgs/pkgs/development/libraries/tracker/default.nix b/third_party/nixpkgs/pkgs/development/libraries/tracker/default.nix
index fb111829c7..40ab73405a 100644
--- a/third_party/nixpkgs/pkgs/development/libraries/tracker/default.nix
+++ b/third_party/nixpkgs/pkgs/development/libraries/tracker/default.nix
@@ -4,12 +4,11 @@
, meson
, ninja
, pkgconfig
+, asciidoc
, gobject-introspection
, python3
, gtk-doc
-, docbook_xsl
-, docbook_xml_dtd_412
-, docbook_xml_dtd_43
+, docbook-xsl-nons
, docbook_xml_dtd_45
, libxml2
, glib
@@ -21,7 +20,6 @@
, gnome3
, icu
, libuuid
-, networkmanager
, libsoup
, json-glib
, systemd
@@ -31,19 +29,19 @@
stdenv.mkDerivation rec {
pname = "tracker";
- version = "2.3.4";
+ version = "3.0.1";
outputs = [ "out" "dev" "devdoc" ];
src = fetchurl {
url = "mirror://gnome/sources/${pname}/${stdenv.lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
- sha256 = "0vai0qz9jn3z5dlzysynwhbbmslp84ygdql81f5wfxxr98j54yap";
+ sha256 = "1rhcs75axga7p7hl37h6jzb2az89jddlcwc7ykrnb2khyhka78rr";
};
patches = [
(substituteAll {
src = ./fix-paths.patch;
- gdbus = "${glib.bin}/bin/gdbus";
+ inherit asciidoc;
})
];
@@ -52,14 +50,13 @@ stdenv.mkDerivation rec {
ninja
vala
pkgconfig
+ asciidoc
gettext
libxslt
wrapGAppsHook
gobject-introspection
gtk-doc
- docbook_xsl
- docbook_xml_dtd_412
- docbook_xml_dtd_43
+ docbook-xsl-nons
docbook_xml_dtd_45
python3 # for data-generators
systemd # used for checks to install systemd user service
@@ -71,7 +68,6 @@ stdenv.mkDerivation rec {
libxml2
sqlite
icu
- networkmanager
libsoup
libuuid
json-glib
@@ -83,8 +79,6 @@ stdenv.mkDerivation rec {
];
mesonFlags = [
- # TODO: figure out wrapping unit tests, some of them fail on missing gsettings-desktop-schemas
- # "-Dfunctional_tests=true"
"-Ddocs=true"
];
@@ -106,9 +100,17 @@ stdenv.mkDerivation rec {
# though, so we need to replace the absolute path with a local one during build.
# We are using a symlink that will be overridden during installation.
mkdir -p $out/lib
- ln -s $PWD/src/libtracker-sparql-backend/libtracker-sparql-2.0.so $out/lib/libtracker-sparql-2.0.so.0
- ln -s $PWD/src/libtracker-miner/libtracker-miner-2.0.so $out/lib/libtracker-miner-2.0.so.0
- ln -s $PWD/src/libtracker-data/libtracker-data.so $out/lib/libtracker-data.so
+ ln -s $PWD/src/libtracker-sparql/libtracker-sparql-3.0.so $out/lib/libtracker-sparql-3.0.so.0
+ '';
+
+ checkPhase = ''
+ runHook preCheck
+
+ dbus-run-session \
+ --config-file=${dbus.daemon}/share/dbus-1/session.conf \
+ meson test --print-errorlogs
+
+ runHook postCheck
'';
postCheck = ''
@@ -116,10 +118,6 @@ stdenv.mkDerivation rec {
rm -r $out/lib
'';
- postInstall = ''
- glib-compile-schemas "$out/share/glib-2.0/schemas"
- '';
-
passthru = {
updateScript = gnome3.updateScript {
packageName = pname;
diff --git a/third_party/nixpkgs/pkgs/development/libraries/tracker/fix-paths.patch b/third_party/nixpkgs/pkgs/development/libraries/tracker/fix-paths.patch
index f5c13c3fcd..5e4d8657f7 100644
--- a/third_party/nixpkgs/pkgs/development/libraries/tracker/fix-paths.patch
+++ b/third_party/nixpkgs/pkgs/development/libraries/tracker/fix-paths.patch
@@ -1,12 +1,13 @@
---- a/src/tracker-store/tracker-store.desktop.in
-+++ b/src/tracker-store/tracker-store.desktop.in
-@@ -1,8 +1,8 @@
- [Desktop Entry]
- Name=Tracker Store
- Comment=Metadata database store and lookup manager
--Exec=gdbus call -e -d org.freedesktop.DBus -o /org/freedesktop/DBus -m org.freedesktop.DBus.StartServiceByName org.freedesktop.Tracker1 0
-+Exec=@gdbus@ call -e -d org.freedesktop.DBus -o /org/freedesktop/DBus -m org.freedesktop.DBus.StartServiceByName org.freedesktop.Tracker1 0
- Terminal=false
- Type=Application
- Categories=Utility;
- X-GNOME-Autostart-enabled=true
+diff --git a/docs/manpages/meson.build b/docs/manpages/meson.build
+index f90c757cf..40d9c939d 100644
+--- a/docs/manpages/meson.build
++++ b/docs/manpages/meson.build
+@@ -32,7 +32,7 @@ foreach m : manpages
+ command: [xsltproc,
+ '--output', '@OUTPUT@',
+ '--stringparam', 'man.authors.section.enabled', '0',
+- '/etc/asciidoc/docbook-xsl/manpage.xsl', '@INPUT@'],
++ '@asciidoc@/etc/asciidoc/docbook-xsl/manpage.xsl', '@INPUT@'],
+ input: xml,
+ output: manpage,
+ install: true,
diff --git a/third_party/nixpkgs/pkgs/development/libraries/vte/default.nix b/third_party/nixpkgs/pkgs/development/libraries/vte/default.nix
index 811921df3e..014b2615d5 100644
--- a/third_party/nixpkgs/pkgs/development/libraries/vte/default.nix
+++ b/third_party/nixpkgs/pkgs/development/libraries/vte/default.nix
@@ -24,13 +24,13 @@
stdenv.mkDerivation rec {
pname = "vte";
- version = "0.60.2";
+ version = "0.62.1";
outputs = [ "out" "dev" ];
src = fetchurl {
url = "mirror://gnome/sources/${pname}/${stdenv.lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
- sha256 = "19ccbw0yca78h5qcnm8claj4fg1pj68nj1fsjqqfpzhj7w72i81m";
+ sha256 = "139had0zcggzrxx9rjy0a67mahzm474amafh168y11421iyfhsf3";
};
passthru = {
diff --git a/third_party/nixpkgs/pkgs/development/libraries/wayland/default.nix b/third_party/nixpkgs/pkgs/development/libraries/wayland/default.nix
index 1821d7a723..cd84495d87 100644
--- a/third_party/nixpkgs/pkgs/development/libraries/wayland/default.nix
+++ b/third_party/nixpkgs/pkgs/development/libraries/wayland/default.nix
@@ -1,4 +1,4 @@
-{ lib, stdenv, fetchurl, meson, pkgconfig, ninja
+{ lib, stdenv, fetchurl, fetchpatch, meson, pkgconfig, ninja
, libffi, libxml2, wayland
, expat ? null # Build wayland-scanner (currently cannot be disabled as of 1.7.0)
, withDocumentation ? stdenv.hostPlatform == stdenv.buildPlatform
@@ -20,6 +20,14 @@ in stdenv.mkDerivation rec {
sha256 = "0k995rn96xkplrapz5k648j651wc43kq817xk1x8280h16gsfxa6";
};
+ patches = [
+ # Fix documentation to be reproducible.
+ (fetchpatch {
+ url = "https://gitlab.freedesktop.org/wayland/wayland/-/commit/e53e0edf0f892670f3e8c5dd527b3bb22335d32d.patch";
+ sha256 = "15sbhi86m9k72lsj56p7zr20ph2b0y4svl639snsbafn2ir1zdb2";
+ })
+ ];
+
outputs = [ "out" ] ++ lib.optionals withDocumentation [ "doc" "man" ];
separateDebugInfo = true;
diff --git a/third_party/nixpkgs/pkgs/development/libraries/webkitgtk/default.nix b/third_party/nixpkgs/pkgs/development/libraries/webkitgtk/default.nix
index d60e56763a..814a1f2259 100644
--- a/third_party/nixpkgs/pkgs/development/libraries/webkitgtk/default.nix
+++ b/third_party/nixpkgs/pkgs/development/libraries/webkitgtk/default.nix
@@ -41,34 +41,33 @@
, enableGeoLocation ? true
, geoclue2
, sqlite
-, enableGtk2Plugins ? false
-, gtk2 ? null
, enableGLES ? true
, gst-plugins-base
, gst-plugins-bad
, woff2
, bubblewrap
, libseccomp
+, systemd
, xdg-dbus-proxy
, substituteAll
, glib
}:
assert enableGeoLocation -> geoclue2 != null;
-assert enableGtk2Plugins -> gtk2 != null;
-assert stdenv.isDarwin -> !enableGtk2Plugins;
with stdenv.lib;
stdenv.mkDerivation rec {
pname = "webkitgtk";
- version = "2.28.4";
+ version = "2.30.1";
outputs = [ "out" "dev" ];
+ separateDebugInfo = stdenv.isLinux;
+
src = fetchurl {
url = "https://webkitgtk.org/releases/${pname}-${version}.tar.xz";
- sha256 = "0r4lkk21pny2g4mmsw0ds14m5hhjys1l47gvy59dfgihr7l546c2";
+ sha256 = "1cfnsl5kvwrbclmp7v9q9ynrz702i9ncb6xmx6972dxpmpyrvi8p";
};
patches = optionals stdenv.isLinux [
@@ -140,10 +139,10 @@ stdenv.mkDerivation rec {
] ++ optionals stdenv.isLinux [
bubblewrap
libseccomp
+ systemd
wayland
xdg-dbus-proxy
- ] ++ optional enableGeoLocation geoclue2
- ++ optional enableGtk2Plugins gtk2;
+ ] ++ optional enableGeoLocation geoclue2;
propagatedBuildInputs = [
gtk3
@@ -167,8 +166,7 @@ stdenv.mkDerivation rec {
"-DENABLE_X11_TARGET=OFF"
"-DUSE_ACCELERATE=0"
"-DUSE_SYSTEM_MALLOC=ON"
- ] ++ optional (!enableGtk2Plugins) "-DENABLE_PLUGIN_PROCESS_GTK2=OFF"
- ++ optional (stdenv.isLinux && enableGLES) "-DENABLE_GLES2=ON";
+ ] ++ optional (stdenv.isLinux && enableGLES) "-DENABLE_GLES2=ON";
postPatch = ''
patchShebangs .
@@ -178,7 +176,7 @@ stdenv.mkDerivation rec {
description = "Web content rendering engine, GTK port";
homepage = "https://webkitgtk.org/";
license = licenses.bsd2;
- platforms = platforms.linux;
+ platforms = platforms.linux ++ platforms.darwin;
maintainers = teams.gnome.members;
};
}
diff --git a/third_party/nixpkgs/pkgs/development/libraries/wxwidgets/3.1/default.nix b/third_party/nixpkgs/pkgs/development/libraries/wxwidgets/3.1/default.nix
index 44e6fe49b4..8b0e6811ef 100644
--- a/third_party/nixpkgs/pkgs/development/libraries/wxwidgets/3.1/default.nix
+++ b/third_party/nixpkgs/pkgs/development/libraries/wxwidgets/3.1/default.nix
@@ -1,13 +1,32 @@
-{ stdenv, fetchFromGitHub, fetchurl, pkgconfig
-, libXinerama, libSM, libXxf86vm
-, gtk2, gtk3
-, xorgproto, gst_all_1, setfile
+{ stdenv
+, fetchFromGitHub
+, fetchurl
+, pkgconfig
+, libXinerama
+, libSM
+, libXxf86vm
+, libXtst
+, gtk2
+, GConf ? null
+, gtk3
+, xorgproto
+, gst_all_1
+, setfile
, libGLSupported ? stdenv.lib.elem stdenv.hostPlatform.system stdenv.lib.platforms.mesaPlatforms
-, withMesa ? libGLSupported, libGLU ? null, libGL ? null
-, compat28 ? false, compat30 ? true, unicode ? true
+, withMesa ? libGLSupported
+, libGLU ? null
+, libGL ? null
+, compat28 ? false
+, compat30 ? true
+, unicode ? true
, withGtk2 ? true
-, withWebKit ? false, webkitgtk ? null
-, AGL ? null, Carbon ? null, Cocoa ? null, Kernel ? null, QTKit ? null
+, withWebKit ? false
+, webkitgtk ? null
+, AGL ? null
+, Carbon ? null
+, Cocoa ? null
+, Kernel ? null
+, QTKit ? null
}:
with stdenv.lib;
@@ -18,47 +37,58 @@ assert withWebKit -> webkitgtk != null;
assert assertMsg (withGtk2 -> withWebKit == false) "wxGTK31: You cannot enable withWebKit when using withGtk2.";
stdenv.mkDerivation rec {
- version = "3.1.3";
+ version = "3.1.4";
pname = "wxwidgets";
src = fetchFromGitHub {
owner = "wxWidgets";
repo = "wxWidgets";
rev = "v${version}";
- sha256 = "022mby78q7n0bhd4mph04hz93c9qamnvzv3h1s26r839k28760f4";
+ sha256 = "1fwzrk6w5k0vs8kqdq5lpzdbp5c09hx740wg6mi6vgmc1r67dv67";
+ fetchSubmodules = true;
};
buildInputs = [
- libXinerama libSM libXxf86vm xorgproto gst_all_1.gstreamer gst_all_1.gst-plugins-base
- ] ++ optionals withGtk2 [ gtk2 ]
- ++ optional (!withGtk2) gtk3
- ++ optional withMesa libGLU
- ++ optional withWebKit webkitgtk
- ++ optionals stdenv.isDarwin [ setfile Carbon Cocoa Kernel QTKit ];
+ libXinerama
+ libSM
+ libXxf86vm
+ libXtst
+ xorgproto
+ gst_all_1.gstreamer
+ gst_all_1.gst-plugins-base
+ ] ++ optionals withGtk2 [ gtk2 GConf ]
+ ++ optional (!withGtk2) gtk3
+ ++ optional withMesa libGLU
+ ++ optional withWebKit webkitgtk
+ ++ optionals stdenv.isDarwin [ setfile Carbon Cocoa Kernel QTKit ];
nativeBuildInputs = [ pkgconfig ];
propagatedBuildInputs = optional stdenv.isDarwin AGL;
patches = [
- (fetchurl { # https://trac.wxwidgets.org/ticket/17942
+ (fetchurl {
+ # https://trac.wxwidgets.org/ticket/17942
url = "https://trac.wxwidgets.org/raw-attachment/ticket/17942/"
- + "fix_assertion_using_hide_in_destroy.diff";
+ + "fix_assertion_using_hide_in_destroy.diff";
sha256 = "009y3dav79wiig789vkkc07g1qdqprg1544lih79199kb1h64lvy";
})
];
configureFlags =
- [ "--disable-precomp-headers" "--enable-mediactrl"
+ [
+ "--disable-precomp-headers"
+ "--enable-mediactrl"
(if compat28 then "--enable-compat28" else "--disable-compat28")
- (if compat30 then "--enable-compat30" else "--disable-compat30") ]
+ (if compat30 then "--enable-compat30" else "--disable-compat30")
+ ]
++ optional unicode "--enable-unicode"
++ optional withMesa "--with-opengl"
++ optionals stdenv.isDarwin
# allow building on 64-bit
[ "--with-cocoa" "--enable-universal-binaries" "--with-macosx-version-min=10.7" ]
++ optionals withWebKit
- ["--enable-webview" "--enable-webviewwebkit"];
+ [ "--enable-webview" "--enable-webviewwebkit" ];
SEARCH_LIB = "${libGLU.out}/lib ${libGL.out}/lib ";
@@ -90,8 +120,19 @@ stdenv.mkDerivation rec {
platforms = with platforms; darwin ++ linux;
license = licenses.wxWindows;
homepage = "https://www.wxwidgets.org/";
- description = "a C++ library that lets developers create applications for Windows, macOS, Linux and other platforms with a single code base";
- longDescription = "wxWidgets gives you a single, easy-to-use API for writing GUI applications on multiple platforms that still utilize the native platform's controls and utilities. Link with the appropriate library for your platform and compiler, and your application will adopt the look and feel appropriate to that platform. On top of great GUI functionality, wxWidgets gives you: online help, network programming, streams, clipboard and drag and drop, multithreading, image loading and saving in a variety of popular formats, database support, HTML viewing and printing, and much more.";
+ description = "A C++ library that lets developers create applications for Windows, macOS, Linux and other platforms with a single code base";
+ longDescription = ''
+ WxWidgets gives you a single, easy-to-use API for
+ writing GUI applications on multiple platforms that still utilize the
+ native platform's controls and utilities. Link with the appropriate library
+ for your platform and compiler, and your application will adopt the look
+ and feel appropriate to that platform. On top of great GUI functionality,
+ wxWidgets gives you: online help, network programming, streams, clipboard
+ and drag and drop, multithreading, image loading and saving in a variety of
+ popular formats, database support, HTML viewing and printing, and much
+ more.
+ '';
badPlatforms = [ "x86_64-darwin" ];
+ maintainers = with maintainers; [ tfmoraes ];
};
}
diff --git a/third_party/nixpkgs/pkgs/development/libraries/zeitgeist/default.nix b/third_party/nixpkgs/pkgs/development/libraries/zeitgeist/default.nix
index 98c94cfecc..95f09f5950 100644
--- a/third_party/nixpkgs/pkgs/development/libraries/zeitgeist/default.nix
+++ b/third_party/nixpkgs/pkgs/development/libraries/zeitgeist/default.nix
@@ -11,13 +11,11 @@
, libtool
, gettext
, dbus
-, telepathy-glib
, gtk3
, json-glib
, librdf_raptor2
-, dbus-glib
, pythonSupport ? true
-, python2Packages
+, python3
}:
stdenv.mkDerivation rec {
@@ -50,23 +48,21 @@ stdenv.mkDerivation rec {
gettext
gobject-introspection
vala
- python2Packages.python
+ python3
];
buildInputs = [
glib
sqlite
dbus
- telepathy-glib
- dbus-glib
gtk3
json-glib
librdf_raptor2
- python2Packages.rdflib
+ python3.pkgs.rdflib
];
configureFlags = [
- "--with-session-bus-services-dir=${placeholder "out"}/share/dbus-1/services"
+ "--disable-telepathy"
];
enableParallelBuilding = true;
@@ -80,14 +76,14 @@ stdenv.mkDerivation rec {
'';
postFixup = stdenv.lib.optionalString pythonSupport ''
- moveToOutput lib/${python2Packages.python.libPrefix} "$py"
+ moveToOutput lib/${python3.libPrefix} "$py"
'';
meta = with stdenv.lib; {
description = "A service which logs the users’s activities and events";
homepage = "https://zeitgeist.freedesktop.org/";
maintainers = with maintainers; [ lethalman worldofpeace ];
- license = licenses.gpl2;
+ license = licenses.lgpl21Plus;
platforms = platforms.linux;
};
}
diff --git a/third_party/nixpkgs/pkgs/development/misc/yelp-tools/default.nix b/third_party/nixpkgs/pkgs/development/misc/yelp-tools/default.nix
index 7714ef046b..19e345b3c2 100644
--- a/third_party/nixpkgs/pkgs/development/misc/yelp-tools/default.nix
+++ b/third_party/nixpkgs/pkgs/development/misc/yelp-tools/default.nix
@@ -2,11 +2,11 @@
stdenv.mkDerivation rec {
pname = "yelp-tools";
- version = "3.32.2";
+ version = "3.38.0";
src = fetchurl {
url = "mirror://gnome/sources/yelp-tools/${stdenv.lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
- sha256 = "1yg8f5g5wadhmy4yfd9yjhvd8vll4gq4l86ibp0b42qbxnsmcf0q";
+ sha256 = "1c045c794sm83rrjan67jmsk20qacrw1m814p4nw85w5xsry8z30";
};
passthru = {
diff --git a/third_party/nixpkgs/pkgs/development/ocaml-modules/ocaml-libvirt/default.nix b/third_party/nixpkgs/pkgs/development/ocaml-modules/ocaml-libvirt/default.nix
index 026aeb220e..dc6cef0bbb 100644
--- a/third_party/nixpkgs/pkgs/development/ocaml-modules/ocaml-libvirt/default.nix
+++ b/third_party/nixpkgs/pkgs/development/ocaml-modules/ocaml-libvirt/default.nix
@@ -1,28 +1,24 @@
-{ stdenv, fetchgit, libvirt, autoconf, ocaml, findlib }:
+{ stdenv, fetchFromGitLab, libvirt, autoreconfHook, pkg-config, ocaml, findlib, perl }:
stdenv.mkDerivation rec {
pname = "ocaml-libvirt";
- rev = "bab7f84ade84ceaddb08b6948792d49b3d04b897";
- version = "0.6.1.4.2017-11-08-unstable"; # libguestfs-1.34+ needs ocaml-libvirt newer than the latest release 0.6.1.4
+ version = "0.6.1.5";
- src = fetchgit {
- url = "git://git.annexia.org/git/ocaml-libvirt.git";
- rev = rev;
- sha256 = "0vxgx1n58fp4qmly6i5zxiacr7303127d6j78a295xin1p3a8xcw";
+ src = fetchFromGitLab {
+ owner = "libvirt";
+ repo = "libvirt-ocaml";
+ rev = "v${version}";
+ sha256 = "0xpkdmknk74yqxgw8z2w8b7ss8hpx92xnab5fsqg2byyj55gzf2k";
};
propagatedBuildInputs = [ libvirt ];
- nativeBuildInputs = [ autoconf findlib ];
+ nativeBuildInputs = [ autoreconfHook pkg-config findlib perl ];
buildInputs = [ ocaml ];
createFindlibDestdir = true;
- preConfigure = ''
- autoconf
- '';
-
buildPhase = "make all opt CPPFLAGS=-Wno-error";
installPhase = "make install-opt";
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/aioconsole/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/aioconsole/default.nix
index 3090c3cb1f..c198676e3e 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/aioconsole/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/aioconsole/default.nix
@@ -10,12 +10,12 @@
# wrapped to be able to find aioconsole and any other packages.
buildPythonPackage rec {
pname = "aioconsole";
- version = "0.3.0";
+ version = "0.3.1";
disabled = pythonOlder "3.6";
src = fetchPypi {
inherit pname version;
- sha256 = "b84724e6b93d1306a909974864df377236cf4bab8e0594096fed7936207205c5";
+ sha256 = "7c038bb40b7690bf5be6b17154830b7bff25e7be1c02d8420a346c3efbd5d8e5";
};
# hardcodes a test dependency on an old version of pytest-asyncio
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/ansible-lint/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/ansible-lint/default.nix
index 2c324bc427..2718ba7670 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/ansible-lint/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/ansible-lint/default.nix
@@ -15,13 +15,13 @@
buildPythonPackage rec {
pname = "ansible-lint";
- version = "4.3.6";
+ version = "4.3.7";
# pip is not able to import version info on raumel.yaml
disabled = isPy27;
src = fetchPypi {
inherit pname version;
- sha256 = "1fn7mdykm4id78k4faibi92q9yxbjbyxb90ww0by03c31m8z5348";
+ sha256 = "0kwwv9dv9rgsqvp15r2vma7hii9lkkqn0n2irvp5h32cbhzzq4hh";
};
format = "pyproject";
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/awkward/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/awkward/default.nix
index 65dfd46285..6a919c768c 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/awkward/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/awkward/default.nix
@@ -10,11 +10,11 @@
buildPythonPackage rec {
pname = "awkward";
- version = "0.13.0";
+ version = "0.14.0";
src = fetchPypi {
inherit pname version;
- sha256 = "1a461ee084ea5e98333dacf2506e9b2619ee89cece14b9b99830b546b35c5922";
+ sha256 = "6a3878f46e8bc2acf28a0b9feb69d354ad2fee2a2a0f65c48c115aa74f245204";
};
nativeBuildInputs = [ pytestrunner ];
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/azure-mgmt-sql/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/azure-mgmt-sql/default.nix
index 36432ccbc8..aa60cde714 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/azure-mgmt-sql/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/azure-mgmt-sql/default.nix
@@ -10,12 +10,12 @@
buildPythonPackage rec {
pname = "azure-mgmt-sql";
- version = "0.23.0";
+ version = "0.24.0";
src = fetchPypi {
inherit pname version;
extension = "zip";
- sha256 = "acf7d4c83fb43152a809e3894528e561e601be543250c2824cc615cc88a70855";
+ sha256 = "da391ed00d82cd8e20ca50affdc43b99fd9a7919b54a3a0d53c73cb41eea09d3";
};
propagatedBuildInputs = [
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/bootstrapped-pip/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/bootstrapped-pip/default.nix
index 8bb713b764..04bac36cf5 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/bootstrapped-pip/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/bootstrapped-pip/default.nix
@@ -2,6 +2,7 @@
, pipInstallHook
, setuptoolsBuildHook
, wheel, pip, setuptools
+, isPy27
}:
stdenv.mkDerivation rec {
@@ -24,6 +25,10 @@ stdenv.mkDerivation rec {
postPatch = ''
mkdir -p $out/bin
+ '' + stdenv.lib.optionalString isPy27 ''
+ pushd "${pip.src.name}"
+ patch -p1 < ${builtins.elemAt pip.patches 0}
+ popd
'';
nativeBuildInputs = [ makeWrapper unzip ];
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/cairosvg/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/cairosvg/default.nix
index 31f7d7bc5d..da3e84b725 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/cairosvg/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/cairosvg/default.nix
@@ -4,13 +4,13 @@
buildPythonPackage rec {
pname = "CairoSVG";
- version = "2.4.2";
+ version = "2.5.0";
disabled = !isPy3k;
src = fetchPypi {
inherit pname version;
- sha256 = "1bb7irxbaxxb9ahm3z5wsx1q96mm5gzskc7b6q07h9ikcnb8yrjf";
+ sha256 = "3fc50d10f0cbef53b3ee376a97a88d81bbd9e2f190f7e63de08431a1a08e9afa";
};
propagatedBuildInputs = [ cairocffi cssselect2 defusedxml pillow tinycss2 ];
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/chalice/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/chalice/default.nix
index f985da36d1..7eb06e2645 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/chalice/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/chalice/default.nix
@@ -22,11 +22,11 @@
buildPythonPackage rec {
pname = "chalice";
- version = "1.21.3";
+ version = "1.21.4";
src = fetchPypi {
inherit pname version;
- sha256 = "0b44514cdbafab08b18e21f59fc016cead0b78f5f5fdf14eccd993c469130b39";
+ sha256 = "fb3580272cc66ba0fd59914b7ac395d2da6b9b32b11dc7557aa80a0ae7cccf3c";
};
checkInputs = [ watchdog pytest hypothesis mock ];
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/coconut/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/coconut/default.nix
new file mode 100644
index 0000000000..b75a82b6c2
--- /dev/null
+++ b/third_party/nixpkgs/pkgs/development/python-modules/coconut/default.nix
@@ -0,0 +1,52 @@
+{
+ lib,
+ buildPythonApplication,
+ fetchFromGitHub,
+ fetchpatch,
+
+ cpyparsing,
+ ipykernel,
+ mypy,
+ pygments,
+ pytest,
+ prompt_toolkit,
+ tkinter,
+ watchdog
+}:
+
+buildPythonApplication rec {
+ pname = "coconut";
+ version = "1.4.3";
+
+ src = fetchFromGitHub {
+ owner = "evhub";
+ repo = "coconut";
+ rev = "v${version}";
+ sha256 = "1pz13vza3yy95dbylnq89fzc3mwgcqr7ds096wy25k6vxd9dp9c3";
+ };
+
+ propagatedBuildInputs = [ cpyparsing pygments prompt_toolkit ipykernel mypy watchdog ];
+
+ patches = [
+ (fetchpatch {
+ name = "fix-setuptools-version-check.patch";
+ url = "https://github.com/LibreCybernetics/coconut/commit/2916a087da1e063cc4438b68d4077347fd1ea4a2.patch";
+ sha256 = "136jbd2rvnifw30y73vv667002nf7sbkm5qyihshj4db7ngysr6q";
+ })
+ ];
+
+ checkInputs = [ pytest tkinter ];
+ # Currently most tests do not work on Hydra due to external fetches.
+ checkPhase = ''
+ pytest tests/constants_test.py
+ pytest tests/main_test.py::TestShell::test_compile_to_file
+ pytest tests/main_test.py::TestShell::test_convenience
+ '';
+
+ meta = with lib; {
+ homepage = "http://coconut-lang.org/";
+ description = "Simple, elegant, Pythonic functional programming";
+ license = licenses.asl20;
+ maintainers = with maintainers; [ fabianhjr ];
+ };
+}
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/colorlog/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/colorlog/default.nix
index a7a04c1f60..a29894fcf4 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/colorlog/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/colorlog/default.nix
@@ -2,11 +2,11 @@
buildPythonPackage rec {
pname = "colorlog";
- version = "4.2.1";
+ version = "4.4.0";
src = fetchPypi {
inherit pname version;
- sha256 = "066i7904vc7814gqnlprksf0ikz2dmviw93r2mr7sf53qci5irbm";
+ sha256 = "0272c537469ab1e63b9915535874d15b671963c9325db0c4891a2aeff97ce3d1";
};
checkInputs = [ pytest ];
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/cpyparsing/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/cpyparsing/default.nix
new file mode 100644
index 0000000000..66f173106e
--- /dev/null
+++ b/third_party/nixpkgs/pkgs/development/python-modules/cpyparsing/default.nix
@@ -0,0 +1,24 @@
+{ lib, buildPythonPackage, fetchFromGitHub, cython, python }:
+
+buildPythonPackage rec {
+ pname = "cpyparsing";
+ version = "2.4.5.0.1.1";
+
+ src = fetchFromGitHub {
+ owner = "evhub";
+ repo = pname;
+ rev = "aa8ee45daec5c55328446bad7202ab8f799ab0ce"; # No tags on repo
+ sha256 = "1mxa5q41cb0k4lkibs0d4lzh1w6kmhhdrsm0w0r1m3s80m05ffmw";
+ };
+
+ nativeBuildInputs = [ cython ];
+
+ checkPhase = "${python.interpreter} tests/cPyparsing_test.py";
+
+ meta = with lib; {
+ homepage = "https://github.com/evhub/cpyparsing";
+ description = "Cython PyParsing implementation";
+ license = licenses.asl20;
+ maintainers = with maintainers; [ fabianhjr ];
+ };
+}
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/cryptography/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/cryptography/default.nix
index 426f6af7aa..8774b181fc 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/cryptography/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/cryptography/default.nix
@@ -22,11 +22,11 @@
buildPythonPackage rec {
pname = "cryptography";
- version = "3.1.1"; # Also update the hash in vectors.nix
+ version = "3.2.1"; # Also update the hash in vectors.nix
src = fetchPypi {
inherit pname version;
- sha256 = "0z81q4d1nangw3r0v5f41mfl4d9r04qnbayl5ll5v5jpcfhwd7wx";
+ sha256 = "1qxz02kfsrihq1h4afyqwcsv9nh3s9mmrr6y9lhi4angw05y3mfk";
};
outputs = [ "out" "dev" ];
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/cryptography/vectors.nix b/third_party/nixpkgs/pkgs/development/python-modules/cryptography/vectors.nix
index c7b244ff04..567ce23783 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/cryptography/vectors.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/cryptography/vectors.nix
@@ -7,7 +7,7 @@ buildPythonPackage rec {
src = fetchPypi {
inherit pname version;
- sha256 = "1xp2j79c1y8qj4b97ygx451gzp8l4cp830hnvg3zw8j134bcaaam";
+ sha256 = "12dq1grn0bjj7c6sj6apd6328525n7xq4kbbmww63sn3x7081vls";
};
# No tests included
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/dbus-next/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/dbus-next/default.nix
index 163a7adcb1..216e636385 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/dbus-next/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/dbus-next/default.nix
@@ -7,13 +7,13 @@
buildPythonPackage rec {
pname = "dbus-next";
- version = "0.1.4";
+ version = "0.2.1";
src = fetchFromGitHub {
owner = "altdesktop";
repo = "python-dbus-next";
rev = "v${version}";
- sha256 = "sha256-C/aFDHmt6Qws6ek+++wM5GRN6TEvMGMiFktKIXRdGL0=";
+ sha256 = "0c14mmysx014n1m4pi4ymi6pzxf8dkjr6fm2cmp96x05z9v90vlr";
};
checkInputs = [
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/dbus/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/dbus/default.nix
index 5d1fd9ef0b..aadf53e992 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/dbus/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/dbus/default.nix
@@ -1,5 +1,5 @@
{ lib, fetchPypi, buildPythonPackage, python, pkgconfig, dbus, dbus-glib, isPyPy
-, ncurses, pygobject3 }:
+, ncurses, pygobject3, isPy3k }:
buildPythonPackage rec {
pname = "dbus-python";
@@ -25,7 +25,7 @@ buildPythonPackage rec {
# It seems not to retain the dependency anyway.
++ lib.optional (! python ? modules) ncurses;
- doCheck = true;
+ doCheck = isPy3k;
checkInputs = [ dbus.out pygobject3 ];
meta = {
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/django-q/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/django-q/default.nix
index a81aa2a63c..0755c5055a 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/django-q/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/django-q/default.nix
@@ -3,11 +3,11 @@
buildPythonPackage rec {
pname = "django-q";
- version = "1.3.3";
+ version = "1.3.4";
src = fetchPypi {
inherit pname version;
- sha256 = "de7077660ede36bfdd89ab9405d6393b598bb3e0bfed61f59a0a9074cc4942bb";
+ sha256 = "523d54dcf1b66152c1b658f914f00ed3b518a3432a9decd4898738ca8dbbe10f";
};
propagatedBuildInputs = [
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/dropbox/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/dropbox/default.nix
index 07d13c74c8..20576e5e47 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/dropbox/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/dropbox/default.nix
@@ -3,11 +3,11 @@
buildPythonPackage rec {
pname = "dropbox";
- version = "10.7.0";
+ version = "10.8.0";
src = fetchPypi {
inherit pname version;
- sha256 = "08c1e0bbc16499e0138431e34777c35ea086734ff15ee5067b0df3424df2a9ec";
+ sha256 = "2312a0314d7698f6aa6944bf6d73a756f4ff7d7d90fa26c323a418a84dc3b533";
};
# Set DROPBOX_TOKEN environment variable to a valid token.
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/google_cloud_automl/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/google_cloud_automl/default.nix
index 8ed42aeed2..3ad8dcb12f 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/google_cloud_automl/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/google_cloud_automl/default.nix
@@ -4,11 +4,11 @@
buildPythonPackage rec {
pname = "google-cloud-automl";
- version = "2.0.0";
+ version = "2.1.0";
src = fetchPypi {
inherit pname version;
- sha256 = "16hr1i2771z4yh19xg6kk037h9cv5j64q5bxb9nmkvj12hdwbwgv";
+ sha256 = "520dfe2ee04d28f3088c9c582fa2a534fc272647d5e2e59acc903c0152e61696";
};
disabled = pythonOlder "3.6";
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/gphoto2/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/gphoto2/default.nix
index d5ad49f349..2834fc5a73 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/gphoto2/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/gphoto2/default.nix
@@ -4,11 +4,11 @@
buildPythonPackage rec {
pname = "gphoto2";
- version = "2.2.3";
+ version = "2.2.4";
src = fetchPypi {
inherit pname version;
- sha256 = "35d3ae97a9f13526746fb506de627a73328328528b436a51567fcb7e640883e9";
+ sha256 = "48b4c4ab70826d3ddaaf7440564d513c02d78680fa690994b0640d383ffb8a7d";
};
nativeBuildInputs = [ pkgconfig ];
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/gst-python/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/gst-python/default.nix
index 00d05e1891..c66ceedc3c 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/gst-python/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/gst-python/default.nix
@@ -4,17 +4,16 @@
, ninja
, stdenv
, pkgconfig
-, python
+, python3
, pygobject3
, gobject-introspection
, gst-plugins-base
, isPy3k
-, fetchpatch
}:
buildPythonPackage rec {
pname = "gst-python";
- version = "1.16.2";
+ version = "1.18.0";
format = "other";
@@ -22,14 +21,17 @@ buildPythonPackage rec {
src = fetchurl {
url = "${meta.homepage}/src/gst-python/${pname}-${version}.tar.xz";
- sha256 = "1a48ca66izmm8hnp608jv5isg3jxb0vlfmhns0bg9nbkilag7390";
+ sha256 = "0ifx2s2j24sj2w5jm7cxyg1kinnhbxiz4x0qp3gnsjlwbawfigvn";
};
+ # Python 2.x is not supported.
+ disabled = !isPy3k;
+
nativeBuildInputs = [
meson
ninja
pkgconfig
- python
+ python3
gobject-introspection
gst-plugins-base
];
@@ -39,24 +41,8 @@ buildPythonPackage rec {
pygobject3
];
- patches = stdenv.lib.optionals stdenv.isDarwin [
- # Fix configure python lib detection in macOS. Remove with the next release
- (fetchpatch {
- url = "https://github.com/GStreamer/gst-python/commit/f98c206bdf01529f8ea395a719b10baf2bdf717f.patch";
- sha256 = "04n4zrnfivgr7iaqw4sjlbd882s8halc2bbbhfxqf0sg2lqwmrxg";
- })
- ] ++ [
- # Fix linking against Python 3.8
- # https://gitlab.freedesktop.org/gstreamer/gst-python/merge_requests/30
- (fetchpatch {
- url = "https://gitlab.freedesktop.org/gstreamer/gst-python/commit/22f28155d86e27c4134de4ed2861264003fcfd23.patch";
- sha256 = "Y70qVguHUBmmRVMFBKAP0d6anBQw5W0TKyu2bAwxbQg=";
- })
- ];
-
mesonFlags = [
- "-Dpython=python${if isPy3k then "3" else "2"}"
- "-Dpygi-overrides-dir=${placeholder "out"}/${python.sitePackages}/gi/overrides"
+ "-Dpygi-overrides-dir=${placeholder "out"}/${python3.sitePackages}/gi/overrides"
];
doCheck = true;
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/gtts-token/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/gtts-token/default.nix
index d3443ef0c9..f3325aab8e 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/gtts-token/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/gtts-token/default.nix
@@ -1,31 +1,35 @@
{ lib
, buildPythonPackage
-, fetchPypi
+, fetchFromGitHub
, requests
+, pytestCheckHook
}:
buildPythonPackage rec {
pname = "gtts-token";
- version = "1.1.3";
+ version = "1.1.4";
- src = fetchPypi {
- pname = "gTTS-token";
- inherit version;
- sha256 = "9d6819a85b813f235397ef931ad4b680f03d843c9b2a9e74dd95175a4bc012c5";
+ src = fetchFromGitHub {
+ owner = "boudewijn26";
+ repo = "gTTS-token";
+ rev = "v${version}";
+ sha256 = "0vr52zc0jqyfvsccl67j1baims3cdx2is1y2lpx2kav9gadkn8hp";
};
propagatedBuildInputs = [
requests
];
- # Tests only in github repo, require working internet connection
- doCheck = false;
+ checkInputs = [ pytestCheckHook ];
+
+ # requires internet access
+ disabledTests = [ "test_real" ];
meta = with lib; {
description = "Calculates a token to run the Google Translate text to speech";
homepage = "https://github.com/boudewijn26/gTTS-token";
license = licenses.mit;
- maintainers = [ maintainers.makefu ];
+ maintainers = with maintainers; [ makefu ];
};
}
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/hidapi/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/hidapi/default.nix
index 9e9e965d33..df9ac9ebed 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/hidapi/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/hidapi/default.nix
@@ -2,11 +2,11 @@
buildPythonPackage rec {
pname = "hidapi";
- version = "0.9.0.post3";
+ version = "0.10.0";
src = fetchPypi {
inherit pname version;
- sha256 = "5a2442928f17ba742d9c53073f48b152051c5747d758d2fefd937543da5ab2e5";
+ sha256 = "2560ad8db212f54cf40ea8d78715adad7df803011cfdce9dabbac0e76acf31ef";
};
propagatedBuildInputs =
@@ -26,11 +26,11 @@ buildPythonPackage rec {
pythonImportsCheck = [ "hid" ];
meta = with stdenv.lib; {
- description = "A Cython interface to the hidapi from https://github.com/signal11/hidapi";
+ description = "A Cython interface to the hidapi from https://github.com/libusb/hidapi";
homepage = "https://github.com/trezor/cython-hidapi";
# license can actually be either bsd3 or gpl3
# see https://github.com/trezor/cython-hidapi/blob/master/LICENSE-orig.txt
license = licenses.bsd3;
- maintainers = with maintainers; [ np ];
+ maintainers = with maintainers; [ np prusnak ];
};
}
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/itemadapter/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/itemadapter/default.nix
index 297d7fcef0..e1efb9aa67 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/itemadapter/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/itemadapter/default.nix
@@ -2,13 +2,13 @@
buildPythonPackage rec {
pname = "itemadapter";
- version = "0.1.1";
+ version = "0.2.0";
disabled = isPy27;
src = fetchPypi {
inherit pname version;
- sha256 = "b5e75d48c769ee5c89de12aeba537b2d62d7b575cd549d5d430ed8a67faa63f2";
+ sha256 = "cb7aaa577fefe2aa6f229ccf4d058e05f44e0178a98c8fb70ee4d95acfabb423";
};
doCheck = false; # infinite recursion with Scrapy
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/keep/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/keep/default.nix
index 6108ea5068..4e7003aef9 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/keep/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/keep/default.nix
@@ -9,11 +9,11 @@
buildPythonPackage rec {
pname = "keep";
- version = "2.9";
+ version = "2.10";
src = fetchPypi {
inherit pname version;
- sha256 = "0902kcvhbmy5q5n0ai1df29ybf87qaljz306c5ssl8j9xdjipcq2";
+ sha256 = "ce71d14110df197ab5afdbd26a14c0bd266b79671118ae1351835fa192e61d9b";
};
propagatedBuildInputs = [
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/onnx/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/onnx/default.nix
index 6c0560bbaf..278d7c1df0 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/onnx/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/onnx/default.nix
@@ -18,7 +18,7 @@
buildPythonPackage rec {
pname = "onnx";
- version = "1.7.0";
+ version = "1.8.0";
# Due to Protobuf packaging issues this build of Onnx with Python 2 gives
# errors on import.
@@ -27,7 +27,7 @@ buildPythonPackage rec {
src = fetchPypi {
inherit pname version;
- sha256 = "0j6rgfbhsw3a8id8pyg18y93k68lbjbj1kq6qia36h69f6pvlyjy";
+ sha256 = "5f787fd3ce1290e12da335237b3b921152157e51aa09080b65631b3ce3fcc50c";
};
nativeBuildInputs = [ cmake ];
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/pip/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/pip/default.nix
index fa566c8951..d451ca4a9b 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/pip/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/pip/default.nix
@@ -10,27 +10,32 @@
, pytest
, setuptools
, wheel
+, isPy27
+, fetchpatch
}:
buildPythonPackage rec {
pname = "pip";
- version = "20.1.1";
+ version = "20.2.4";
format = "other";
src = fetchFromGitHub {
owner = "pypa";
repo = pname;
rev = version;
- sha256 = "01wq01ysv0ijcrg8a4mj72zb8al15b8vw8g3ywhxq53kbsyhfxn4";
+ sha256 = "eMVV4ftgV71HLQsSeaOchYlfaJVgzNrwUynn3SA1/Do=";
name = "${pname}-${version}-source";
};
- # Remove when solved https://github.com/NixOS/nixpkgs/issues/81441
- # Also update pkgs/development/interpreters/python/hooks/pip-install-hook.sh accordingly
- patches = [ ./reproducible.patch ];
-
nativeBuildInputs = [ bootstrapped-pip ];
+ patches = lib.optionals isPy27 [
+ (fetchpatch {
+ url = "https://github.com/pypa/pip/commit/94fbb6cf78c267bf7cdf83eeeb2536ad56cfe639.patch";
+ sha256 = "Z6x5yxBp8QkU/GOfb1ltI0dVt//MaI09XK3cdY42kFs=";
+ })
+ ];
+
# pip detects that we already have bootstrapped_pip "installed", so we need
# to force it a little.
pipInstallFlags = [ "--ignore-installed" ];
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/pip/reproducible.patch b/third_party/nixpkgs/pkgs/development/python-modules/pip/reproducible.patch
deleted file mode 100644
index 528ac2b49b..0000000000
--- a/third_party/nixpkgs/pkgs/development/python-modules/pip/reproducible.patch
+++ /dev/null
@@ -1,13 +0,0 @@
-diff --git a/src/pip/_internal/operations/install/wheel.py b/src/pip/_internal/operations/install/wheel.py
-index e7315ee4..4e36b03d 100644
---- a/src/pip/_internal/operations/install/wheel.py
-+++ b/src/pip/_internal/operations/install/wheel.py
-@@ -615,6 +615,8 @@ def install_wheel(
- direct_url=None, # type: Optional[DirectUrl]
- ):
- # type: (...) -> None
-+ _temp_dir_for_testing = (
-+ _temp_dir_for_testing or os.environ.get("NIX_PIP_INSTALL_TMPDIR"))
- with TempDirectory(
- path=_temp_dir_for_testing, kind="unpacked-wheel"
- ) as unpacked_dir, ZipFile(wheel_path, allowZip64=True) as z:
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/py-multihash/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/py-multihash/default.nix
index 5034f6df46..1b49ffa153 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/py-multihash/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/py-multihash/default.nix
@@ -1,6 +1,6 @@
{ base58
, buildPythonPackage
-, fetchPypi
+, fetchFromGitHub
, isPy27
, lib
, morphys
@@ -14,11 +14,13 @@
buildPythonPackage rec {
pname = "py-multihash";
- version = "0.2.3";
+ version = "1.0.0";
- src = fetchPypi {
- inherit pname version ;
- sha256 = "f0ade4de820afdc4b4aaa40464ec86c9da5cae3a4578cda2daab4b0eb7e5b18d";
+ src = fetchFromGitHub {
+ owner = "multiformats";
+ repo = pname;
+ rev = "v${version}";
+ sha256 = "07qglrbgcb8sr9msqw2v7dqj9s4rs6nyvhdnx02i5w6xx5ibzi3z";
};
nativeBuildInputs = [
@@ -38,6 +40,8 @@ buildPythonPackage rec {
pytestcov
];
+ pythonImportsCheck = [ "multihash" ];
+
disabled = isPy27;
meta = with lib; {
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/pyatspi/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/pyatspi/default.nix
index 74b9f7dfde..232e44d099 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/pyatspi/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/pyatspi/default.nix
@@ -2,12 +2,12 @@
buildPythonPackage rec {
pname = "pyatspi";
- version = "2.36.0";
+ version = "2.38.0";
format = "other";
src = fetchurl {
url = "mirror://gnome/sources/${pname}/${stdenv.lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
- sha256 = "1pg1zzjl167iavin6xzzm20mh3m6dvl7d8h1r571s44yj6zw2dji";
+ sha256 = "/4CTEv0ML2HhkcGBoaY4owtXm5G2gs+1oFU1pVJltD0=";
};
nativeBuildInputs = [ pkgconfig ];
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/pygobject/3.nix b/third_party/nixpkgs/pkgs/development/python-modules/pygobject/3.nix
index 9e38d64039..6e34e7f910 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/pygobject/3.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/pygobject/3.nix
@@ -3,21 +3,19 @@ pycairo, cairo, which, ncurses, meson, ninja, isPy3k, gnome3 }:
buildPythonPackage rec {
pname = "pygobject";
- version = "3.36.1";
+ version = "3.38.0";
+
+ disabled = ! isPy3k;
format = "other";
src = fetchurl {
url = "mirror://gnome/sources/${pname}/${stdenv.lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
- sha256 = "0b9CgC0c7BE7Wtqg579/N0W0RSHcIWNYjSdtXNYdcY8=";
+ sha256 = "A3LRu5Ei/Bn1AKJJsfOMK7Z0hQAPWIdJe0sgWz5whNU=";
};
outputs = [ "out" "dev" ];
- mesonFlags = [
- "-Dpython=python${if isPy3k then "3" else "2" }"
- ];
-
nativeBuildInputs = [ pkgconfig meson ninja gobject-introspection ];
buildInputs = [ glib gobject-introspection ]
++ stdenv.lib.optionals stdenv.isDarwin [ which ncurses ];
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/pymavlink/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/pymavlink/default.nix
index b401f1f90b..f0a5b222c2 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/pymavlink/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/pymavlink/default.nix
@@ -2,11 +2,11 @@
buildPythonPackage rec {
pname = "pymavlink";
- version = "2.4.11";
+ version = "2.4.12";
src = fetchPypi {
inherit pname version;
- sha256 = "0b1265b169f809c6ca94911ad2d7649b8e087a7cc573a0a6ea62ade9bea7ca5c";
+ sha256 = "2954bb071ff67fc5ab29ed2dabe3b5355c4063fb8b014477d9bfbceb87358bc6";
};
propagatedBuildInputs = [ future lxml ];
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/pymupdf/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/pymupdf/default.nix
index bc2f2c6e95..c3cf43be01 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/pymupdf/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/pymupdf/default.nix
@@ -1,11 +1,11 @@
{ stdenv, buildPythonPackage, fetchPypi, mupdf, swig }:
buildPythonPackage rec {
pname = "PyMuPDF";
- version = "1.17.6";
+ version = "1.18.0";
src = fetchPypi {
inherit pname version;
- sha256 = "5eef4ff61698016a296932858625a5a0039b923ba692043e2c98ca02966f1da2";
+ sha256 = "64ce58f92d9edd2631e447175fa13b4024ac3b6dce6e718e0b003c41de6f7952";
};
patchPhase = ''
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/pytest-pylint/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/pytest-pylint/default.nix
index f7a9a31430..e35d2ebc73 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/pytest-pylint/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/pytest-pylint/default.nix
@@ -11,12 +11,12 @@
buildPythonPackage rec {
pname = "pytest-pylint";
- version = "0.17.0";
+ version = "0.18.0";
disabled = isPy27;
src = fetchPypi {
inherit pname version;
- sha256 = "b0c177d63f6e3f5b82fa2720a6570dd2ecff1616c26ed6d02d0cbf75fd98ddf9";
+ sha256 = "790c7a8019fab08e59bd3812db1657a01995a975af8b1c6ce95b9aa39d61da27";
};
nativeBuildInputs = [ pytestrunner ];
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/pytest-timeout/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/pytest-timeout/default.nix
index 30bd93e433..6bf3483d40 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/pytest-timeout/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/pytest-timeout/default.nix
@@ -1,34 +1,36 @@
-{ buildPythonPackage
+{ lib
+, buildPythonPackage
, fetchPypi
-, fetchpatch
-, lib
-, pexpect
, pytest
+, pytestCheckHook
+, pexpect
+, pytestcov
}:
buildPythonPackage rec {
pname = "pytest-timeout";
- version = "1.3.3";
+ version = "1.4.2";
src = fetchPypi {
inherit pname version;
- sha256 = "1cczcjhw4xx5sjkhxlhc5c1bkr7x6fcyx12wrnvwfckshdvblc2a";
+ sha256 = "0xnsigs0kmpq1za0d4i522sp3f71x5bgpdh3ski0rs74yqy13cr0";
};
- patches = fetchpatch {
- url = "https://bitbucket.org/pytest-dev/pytest-timeout/commits/36998c891573d8ec1db1acd4f9438cb3cf2aee2e/raw";
- sha256 = "05zc2w7mjgv8rm8i1cbxp7k09vlscmay5iy78jlzgjqkrx3wkf46";
- };
+ propagatedBuildInputs = [ pytest ];
- checkInputs = [ pytest pexpect ];
- checkPhase = ''
- # test_suppresses_timeout_when_pdb_is_entered fails under heavy load
- pytest -ra -k 'not test_suppresses_timeout_when_pdb_is_entered'
- '';
+ checkInputs = [ pytestCheckHook pexpect pytestcov ];
- meta = with lib;{
+ disabledTests = [
+ "test_suppresses_timeout_when_pdb_is_entered"
+ ];
+ pytestFlagsArray = [
+ "-ra"
+ ];
+
+ meta = with lib; {
description = "py.test plugin to abort hanging tests";
- homepage = "https://bitbucket.org/pytest-dev/pytest-timeout/";
+ homepage = "https://github.com/pytest-dev/pytest-timeout/";
+ changelog = "https://github.com/pytest-dev/pytest-timeout/#changelog";
license = licenses.mit;
maintainers = with maintainers; [ makefu costrouc ];
};
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/pytorch/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/pytorch/default.nix
index 4635f813c3..fc18c6e516 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/pytorch/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/pytorch/default.nix
@@ -4,8 +4,18 @@
openMPISupport ? false, openmpi ? null,
buildDocs ? false,
cudaArchList ? null,
- numpy, pyyaml, cffi, click, typing, cmake, hypothesis, numactl, psutil,
- linkFarm, symlinkJoin,
+
+ # Native build inputs
+ cmake, utillinux, linkFarm, symlinkJoin, which,
+
+ # Build inputs
+ numactl,
+
+ # Propagated build inputs
+ dataclasses, numpy, pyyaml, cffi, click, typing-extensions,
+
+ # Unit tests
+ hypothesis, psutil,
# virtual pkg that consistently instantiates blas across nixpkgs
# See https://github.com/NixOS/nixpkgs/pull/83888
@@ -17,7 +27,7 @@
# dependencies for torch.utils.tensorboard
pillow, six, future, tensorflow-tensorboard, protobuf,
- utillinux, which, isPy3k }:
+ isPy3k, pythonOlder }:
assert !openMPISupport || openmpi != null;
@@ -102,7 +112,7 @@ let
in buildPythonPackage rec {
pname = "pytorch";
# Don't forget to update pytorch-bin to the same version.
- version = "1.6.0";
+ version = "1.7.0";
disabled = !isPy3k;
@@ -117,23 +127,10 @@ in buildPythonPackage rec {
repo = "pytorch";
rev = "v${version}";
fetchSubmodules = true;
- sha256 = "14hhjsi6fnpaw9m1a3bhvdinsks6fhss6bbcrfk6jgns64abqdaz";
+ sha256 = "0hb11m5kvs4nsi5bc9ijnv6k07593p9dw40rcn33s9vspinrcjd4";
};
- patches = lib.optionals stdenv.isAarch64 [
- # GNU aarch64 assembler does not support 4s on neon mov:
- # https://github.com/pytorch/pytorch/issues/33124
- #
- # Fix from:
- # https://github.com/pytorch/pytorch/pull/40584
- #
- # This patch can be removed with the next major version (1.7.0).
- (fetchpatch {
- name = "qnnpack-neon-fix.patch";
- url = "https://github.com/pytorch/pytorch/commit/7676682584d0caf9243bce74ea0a88711ec4a807.diff";
- sha256 = "13spncaqlpsp8qk2850yly7xqwmhhfwznhmzkk8jgpslkbx75vgq";
- })
- ] ++ lib.optionals stdenv.isDarwin [
+ patches = lib.optionals stdenv.isDarwin [
# pthreadpool added support for Grand Central Dispatch in April
# 2020. However, this relies on functionality (DISPATCH_APPLY_AUTO)
# that is available starting with macOS 10.13. However, our current
@@ -142,6 +139,13 @@ in buildPythonPackage rec {
./pthreadpool-disable-gcd.diff
];
+ # The dataclasses module is included with Python >= 3.7. This should
+ # be fixed with the next PyTorch release.
+ postPatch = ''
+ substituteInPlace setup.py \
+ --replace "'dataclasses'" "'dataclasses; python_version < \"3.7\"'"
+ '';
+
preConfigure = lib.optionalString cudaSupport ''
export TORCH_CUDA_ARCH_LIST="${lib.strings.concatStringsSep ";" final_cudaArchList}"
export CC=${cudatoolkit.cc}/bin/gcc CXX=${cudatoolkit.cc}/bin/g++
@@ -217,9 +221,11 @@ in buildPythonPackage rec {
click
numpy
pyyaml
+ typing-extensions
# the following are required for tensorboard support
pillow six future tensorflow-tensorboard protobuf
- ] ++ lib.optionals openMPISupport [ openmpi ];
+ ] ++ lib.optionals openMPISupport [ openmpi ]
+ ++ lib.optionals (pythonOlder "3.7") [ dataclasses ];
checkInputs = [ hypothesis ninja psutil ];
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/pyvmomi/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/pyvmomi/default.nix
index 25845c9847..8f8ca6f1d7 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/pyvmomi/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/pyvmomi/default.nix
@@ -2,13 +2,13 @@
buildPythonPackage rec {
pname = "pyvmomi";
- version = "7.0";
+ version = "7.0.1";
src = fetchFromGitHub {
owner = "vmware";
repo = pname;
rev = "v${version}";
- sha256 = "1qqljrlc9h7kddx3xxc6479gk75fvaxspfikzjn6zj5mznsvfwj5";
+ sha256 = "1i7zni4ygdikc22wfrbnzwqh6qy402s3di6sdlfcvky2y7fzx52x";
};
# requires old version of vcrpy
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/rope/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/rope/default.nix
index fd7bf55ad5..81e306f81d 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/rope/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/rope/default.nix
@@ -2,11 +2,11 @@
buildPythonPackage rec {
pname = "rope";
- version = "0.17.0";
+ version = "0.18.0";
src = fetchPypi {
inherit pname version;
- sha256 = "658ad6705f43dcf3d6df379da9486529cf30e02d9ea14c5682aa80eb33b649e1";
+ sha256 = "786b5c38c530d4846aa68a42604f61b4e69a493390e3ca11b88df0fbfdc3ed04";
};
checkInputs = [ nose ];
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/rtslib/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/rtslib/default.nix
index 28b66ec5a5..aaf879d2a3 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/rtslib/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/rtslib/default.nix
@@ -2,13 +2,13 @@
buildPythonPackage rec {
pname = "rtslib";
- version = "2.1.72";
+ version = "2.1.74";
src = fetchFromGitHub {
owner = "open-iscsi";
repo = "${pname}-fb";
rev = "v${version}";
- sha256 = "13kycf9xkyxm1ik8yh3qpd96vird8y65daigyiyb4jvx0lmrd0kv";
+ sha256 = "1in10z6ckmkfhykar435k1fmswbfajysv4g9nsav893ij8g694fy";
};
propagatedBuildInputs = [ six pyudev pygobject3 ];
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/snowflake-connector-python/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/snowflake-connector-python/default.nix
index 6f271e1758..bc60d7897c 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/snowflake-connector-python/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/snowflake-connector-python/default.nix
@@ -25,12 +25,12 @@
buildPythonPackage rec {
pname = "snowflake-connector-python";
- version = "2.3.4";
+ version = "2.3.5";
disabled = isPy27;
src = fetchPypi {
inherit pname version;
- sha256 = "5a072ee61ef156e5938e04447f0b99248b87ef262e498b5e5002f5b579cd7fb2";
+ sha256 = "b953a53141a88406e9c0e3144582a7c257e5c89fa81e97664d520999991812e7";
};
propagatedBuildInputs = [
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/streamz/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/streamz/default.nix
index d34a826a06..d17aed6ae4 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/streamz/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/streamz/default.nix
@@ -15,11 +15,11 @@
buildPythonPackage rec {
pname = "streamz";
- version = "0.5.5";
+ version = "0.6.1";
src = fetchPypi {
inherit pname version;
- sha256 = "787ade4796c5b2e79af2aac678841ba3748a65a3adce150697dcdd31c4f80365";
+ sha256 = "215703456479d24f524cdcd0365006250d4502d242f57e2f5db18e8638bc8694";
};
propagatedBuildInputs = [
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/tensorboardx/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/tensorboardx/default.nix
index d2532777d0..a95f8e0292 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/tensorboardx/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/tensorboardx/default.nix
@@ -19,6 +19,12 @@ buildPythonPackage rec {
propagatedBuildInputs = [ numpy protobuf six ];
+ # apparently torch API changed a bit at 1.6
+ postPatch = ''
+ substituteInPlace tensorboardX/pytorch_graph.py --replace "torch.onnx.set_training(model, False)" "torch.onnx.select_model_mode_for_export(model, torch.onnx.TrainingMode.EVAL)"
+ '';
+
+
disabledTests = [ "test_TorchVis" "test_onnx_graph" ];
meta = with lib; {
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/tokenizers/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/tokenizers/default.nix
index 5b0ba5d0bf..4e5aacd6c7 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/tokenizers/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/tokenizers/default.nix
@@ -32,6 +32,14 @@ let
url = "https://norvig.com/big.txt";
sha256 = "0yz80icdly7na03cfpl0nfk5h3j3cam55rj486n03wph81ynq1ps";
};
+ docPipelineTokenizer = fetchurl {
+ url = "https://s3.amazonaws.com/models.huggingface.co/bert/anthony/doc-pipeline/tokenizer.json";
+ hash = "sha256-i533xC8J5CDMNxBjo+p6avIM8UOcui8RmGAmK0GmfBc=";
+ };
+ docQuicktourTokenizer = fetchurl {
+ url = "https://s3.amazonaws.com/models.huggingface.co/bert/anthony/doc-quicktour/tokenizer.json";
+ hash = "sha256-ipY9d5DR5nxoO6kj7rItueZ9AO5wq9+Nzr6GuEIfIBI=";
+ };
openaiVocab = fetchurl {
url = "https://s3.amazonaws.com/models.huggingface.co/bert/openai-gpt-vocab.json";
sha256 = "0y40gc9bixj5rxv674br1rxmxkd3ly29p80x1596h8yywwcrpx7x";
@@ -42,16 +50,16 @@ let
};
in rustPlatform.buildRustPackage rec {
pname = "tokenizers";
- version = "0.9.2";
+ version = "0.9.4";
src = fetchFromGitHub {
owner = "huggingface";
repo = pname;
rev = "python-v${version}";
- sha256 = "0rsm1g5zfq3ygdb3s8v9xqqpgfzvvkc4n5ik3ahy8sw7pyjljb4m";
+ hash = "sha256-JXoH9yfhMIFg5qDY5zrF6iWb7XKugjMfk1NxSizfaWg=";
};
- cargoSha256 = "0yn699dq9hdjh7fyci99ni8mmd5qdhzrsi80grzgf5cch8g38rbi";
+ cargoSha256 = "sha256-u9qitrOxJSABs0VjwHUZgmw7VTQXNbp6l8fKKE/RQ7M=";
sourceRoot = "source/bindings/python";
@@ -82,6 +90,8 @@ in rustPlatform.buildRustPackage rec {
ln -s ${robertaMerges} roberta-base-merges.txt
ln -s ${albertVocab} albert-base-v1-tokenizer.json
ln -s ${bertVocab} bert-base-uncased-vocab.txt
+ ln -s ${docPipelineTokenizer} bert-wiki.json
+ ln -s ${docQuicktourTokenizer} tokenizer-wiki.json
ln -s ${norvigBig} big.txt
ln -s ${openaiVocab} openai-gpt-vocab.json
ln -s ${openaiMerges} openai-gpt-merges.txt )
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/transformers/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/transformers/default.nix
index e3fd150fbc..95e982f8ec 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/transformers/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/transformers/default.nix
@@ -45,6 +45,11 @@ buildPythonPackage rec {
timeout-decorator
];
+ postPatch = ''
+ substituteInPlace setup.py \
+ --replace "tokenizers == 0.9.2" "tokenizers"
+ '';
+
preCheck = ''
export HOME="$TMPDIR"
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/trytond/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/trytond/default.nix
index 5a9495746c..74dc6c79a7 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/trytond/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/trytond/default.nix
@@ -25,12 +25,12 @@ with stdenv.lib;
buildPythonApplication rec {
pname = "trytond";
- version = "5.6.8";
+ version = "5.8.0";
disabled = pythonOlder "3.5";
src = fetchPypi {
inherit pname version;
- sha256 = "330067d7319a50b9fb15e89d224e89ab28bc363926774adf7fa119f681b106b6";
+ sha256 = "ae9baf7a83a3249686703eee71e81a0283570f545ce985a999fd74b6ab3d4e4f";
};
# Tells the tests which database to use
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/uproot-methods/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/uproot-methods/default.nix
index 298f6c96d5..1e382629e8 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/uproot-methods/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/uproot-methods/default.nix
@@ -6,12 +6,12 @@
}:
buildPythonPackage rec {
- version = "0.7.4";
+ version = "0.8.0";
pname = "uproot-methods";
src = fetchPypi {
inherit pname version;
- sha256 = "7f110208a3a2aa9b4d6da11233fd0f206ea039b52bca4bfe312f1b9dcf788476";
+ sha256 = "57da3d67e1a42b548020debdd23285b5710e3bb2aac20eb7b2d2a686822aa1ab";
};
propagatedBuildInputs = [ numpy awkward ];
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/wxPython/4.1.nix b/third_party/nixpkgs/pkgs/development/python-modules/wxPython/4.1.nix
new file mode 100644
index 0000000000..6d07f8b5e2
--- /dev/null
+++ b/third_party/nixpkgs/pkgs/development/python-modules/wxPython/4.1.nix
@@ -0,0 +1,75 @@
+{ lib
+, stdenv
+, fetchPypi
+, buildPythonPackage
+, which
+, pkgconfig
+, python
+, isPy27
+, pyopengl
+, doxygen
+, cairo
+, ncurses
+, pango
+, wxGTK
+}:
+let
+ dynamic-linker = stdenv.cc.bintools.dynamicLinker;
+in
+buildPythonPackage rec {
+ pname = "wxPython";
+ version = "4.1.0";
+ disabled = isPy27;
+
+ src = fetchPypi {
+ inherit pname version;
+ sha256 = "12x4ci5q7qni4rkfiq6lnpn1fk8b0sfc6dck5wyxkj2sfp5pa91f";
+ };
+
+ # https://github.com/NixOS/nixpkgs/issues/75759
+ # https://github.com/wxWidgets/Phoenix/issues/1316
+ doCheck = false;
+
+ nativeBuildInputs = [ which doxygen wxGTK pkgconfig ];
+
+ buildInputs = [
+ wxGTK.gtk
+ ncurses
+ ];
+
+ DOXYGEN = "${doxygen}/bin/doxygen";
+
+ preConfigure = lib.optionalString (!stdenv.isDarwin) ''
+ substituteInPlace wx/lib/wxcairo/wx_pycairo.py \
+ --replace 'cairoLib = None' 'cairoLib = ctypes.CDLL("${cairo}/lib/libcairo.so")'
+ substituteInPlace wx/lib/wxcairo/wx_pycairo.py \
+ --replace '_dlls = dict()' '_dlls = {k: ctypes.CDLL(v) for k, v in [
+ ("gdk", "${wxGTK.gtk}/lib/libgtk-x11-3.0.so"),
+ ("pangocairo", "${pango.out}/lib/libpangocairo-1.0.so"),
+ ("appsvc", None)
+ ]}'
+
+ # https://github.com/wxWidgets/Phoenix/pull/1584
+ # It'll be not needed in next version because https://github.com/wxWidgets/Phoenix/pull/1699
+ substituteInPlace build.py --replace "os.environ['PYTHONPATH'] = phoenixDir()" \
+ "os.environ['PYTHONPATH'] = os.environ['PYTHONPATH'] + os.pathsep + phoenixDir()"
+ '';
+
+ buildPhase = ''
+ ${python.interpreter} build.py -v --use_syswx dox etg --nodoc build_py
+ '';
+
+ installPhase = ''
+ ${python.interpreter} setup.py install --skip-build --prefix=$out
+ wrapPythonPrograms
+ '';
+
+ passthru = { inherit wxGTK; };
+
+ meta = with lib; {
+ description = "Cross platform GUI toolkit for Python, Phoenix version";
+ homepage = "http://wxpython.org/";
+ license = licenses.wxWindows;
+ maintainers = with maintainers; [ tfmoraes ];
+ };
+}
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/xstatic-bootbox/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/xstatic-bootbox/default.nix
index ba75ed0b88..6e5200d2a8 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/xstatic-bootbox/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/xstatic-bootbox/default.nix
@@ -5,11 +5,11 @@
buildPythonPackage rec {
pname = "XStatic-Bootbox";
- version = "4.4.0.1";
+ version = "5.5.1.1";
src = fetchPypi {
inherit version pname;
- sha256 = "1g00q38g1k576lxjlwglv4w3fj4z0z8lxlwpc66wyhjglj4r4bwd";
+ sha256 = "4b2120bb33a1d8ada8f9e0532ad99987aa03879b17b08bfdc6b8326d6eb7c205";
};
# no tests implemented
diff --git a/third_party/nixpkgs/pkgs/development/ruby-modules/gem/default.nix b/third_party/nixpkgs/pkgs/development/ruby-modules/gem/default.nix
index 158d5891ec..910949d847 100644
--- a/third_party/nixpkgs/pkgs/development/ruby-modules/gem/default.nix
+++ b/third_party/nixpkgs/pkgs/development/ruby-modules/gem/default.nix
@@ -207,7 +207,7 @@ stdenv.mkDerivation ((builtins.removeAttrs attrs ["source"]) // {
# looks like useless files which break build repeatability and consume space
pushd $out/${ruby.gemPath}
rm -fv doc/*/*/created.rid || true
- rm -fv {gems/*/ext/*,extensions/*/*/*}/{mkmf.log,gem_make.out} || true
+ rm -fv {gems/*/ext/*,extensions/*/*/*}/{Makefile,mkmf.log,gem_make.out} || true
rm -fvr cache
popd
diff --git a/third_party/nixpkgs/pkgs/development/tools/analysis/cargo-tarpaulin/default.nix b/third_party/nixpkgs/pkgs/development/tools/analysis/cargo-tarpaulin/default.nix
index d2ad97141c..b4cfa356b2 100644
--- a/third_party/nixpkgs/pkgs/development/tools/analysis/cargo-tarpaulin/default.nix
+++ b/third_party/nixpkgs/pkgs/development/tools/analysis/cargo-tarpaulin/default.nix
@@ -2,13 +2,13 @@
rustPlatform.buildRustPackage rec {
pname = "cargo-tarpaulin";
- version = "0.15.0";
+ version = "0.17.0";
src = fetchFromGitHub {
owner = "xd009642";
repo = "tarpaulin";
rev = version;
- sha256 = "0ga2zfq4365hxvr3wd3isc146ibivy3bfcy24rb6cq3av3b90a8k";
+ sha256 = "1z104cd3wg718x1d89znppx4h6f0c6icgmpcllyrd0d19lb71a2b";
};
nativeBuildInputs = [
@@ -16,7 +16,7 @@ rustPlatform.buildRustPackage rec {
];
buildInputs = [ openssl ];
- cargoSha256 = "1ij1bic95315kba7k7igix33kmwr2va0c2hbysjs0bl5kcnai4f7";
+ cargoSha256 = "0pn9xgryfb7f0plx50v9i7hsv1wib87pi0fl43cv6hgqyrdb52ny";
#checkFlags = [ "--test-threads" "1" ];
doCheck = false;
diff --git a/third_party/nixpkgs/pkgs/development/tools/analysis/codeql/default.nix b/third_party/nixpkgs/pkgs/development/tools/analysis/codeql/default.nix
index ba50f643ab..5e1e93951c 100644
--- a/third_party/nixpkgs/pkgs/development/tools/analysis/codeql/default.nix
+++ b/third_party/nixpkgs/pkgs/development/tools/analysis/codeql/default.nix
@@ -12,7 +12,7 @@
stdenv.mkDerivation rec {
pname = "codeql";
- version = "2.3.2";
+ version = "2.3.3";
dontConfigure = true;
dontBuild = true;
@@ -20,7 +20,7 @@ stdenv.mkDerivation rec {
src = fetchzip {
url = "https://github.com/github/codeql-cli-binaries/releases/download/v${version}/codeql.zip";
- sha256 = "1fzybh21jw02gdmqkh54gin4chqxj5r5alkrqk1wcryhf73brsbb";
+ sha256 = "17a574g92jfff2059mhaw2x31npglp9rfcwwk73adbajpiyf4g8q";
};
nativeBuildInputs = [
diff --git a/third_party/nixpkgs/pkgs/development/tools/analysis/rr/default.nix b/third_party/nixpkgs/pkgs/development/tools/analysis/rr/default.nix
index 47832c5ae2..5e80d5b096 100644
--- a/third_party/nixpkgs/pkgs/development/tools/analysis/rr/default.nix
+++ b/third_party/nixpkgs/pkgs/development/tools/analysis/rr/default.nix
@@ -1,14 +1,14 @@
{ stdenv, fetchFromGitHub, cmake, libpfm, zlib, pkgconfig, python3Packages, which, procps, gdb, capnproto }:
stdenv.mkDerivation rec {
- version = "5.3.0";
+ version = "5.4.0";
pname = "rr";
src = fetchFromGitHub {
owner = "mozilla";
repo = "rr";
rev = version;
- sha256 = "1x6l1xsdksnhz9v50p4r7hhmr077cq20kaywqy1jzdklvkjqzf64";
+ sha256 = "1sfldgkkmsdyaqa28i5agcykc63gwm3zjihd64g86i852w8al2w6";
};
postPatch = ''
diff --git a/third_party/nixpkgs/pkgs/development/tools/azcopy/default.nix b/third_party/nixpkgs/pkgs/development/tools/azcopy/default.nix
index 096e321fe7..1c5bb899b6 100644
--- a/third_party/nixpkgs/pkgs/development/tools/azcopy/default.nix
+++ b/third_party/nixpkgs/pkgs/development/tools/azcopy/default.nix
@@ -2,18 +2,18 @@
buildGoModule rec {
pname = "azure-storage-azcopy";
- version = "10.6.1";
+ version = "10.7.0";
src = fetchFromGitHub {
owner = "Azure";
repo = "azure-storage-azcopy";
rev = "v${version}";
- sha256 = "1gmpdyc55mkzdkkhyzvy9517znvcj8hd9x3rpkpr86vfzgjv9qyv";
+ sha256 = "0l2109r9a8fhd66zgsi56zdmy390fpnvy08rbxf6rfc0a55n96ka";
};
subPackages = [ "." ];
- vendorSha256 = "10sxkb2dh1il4ps15dlvq0xsry8hax27imb5qg3khdmjhb4yaj7k";
+ vendorSha256 = "032yzl8mmgmmxbpsymndp4ddgi572jh5drwql0bjjabp3yqwj1g1";
doCheck = false;
diff --git a/third_party/nixpkgs/pkgs/development/tools/build-managers/bear/default.nix b/third_party/nixpkgs/pkgs/development/tools/build-managers/bear/default.nix
index cd5e508fbd..712778665d 100644
--- a/third_party/nixpkgs/pkgs/development/tools/build-managers/bear/default.nix
+++ b/third_party/nixpkgs/pkgs/development/tools/build-managers/bear/default.nix
@@ -16,13 +16,13 @@
stdenv.mkDerivation rec {
pname = "bear";
- version = "3.0.1";
+ version = "3.0.2";
src = fetchFromGitHub {
owner = "rizsotto";
repo = pname;
rev = version;
- sha256 = "02vzlm48ywf6s3fly19j94k11dqx94x8pgmkq1ylx3z3d1y3b5zb";
+ sha256 = "0x1an9sxcr0f45c9kdpgpcrc773cc28zsffbxddpqp0h1qh9s4ns";
};
nativeBuildInputs = [ cmake pkg-config ];
diff --git a/third_party/nixpkgs/pkgs/development/tools/build-managers/bloop/default.nix b/third_party/nixpkgs/pkgs/development/tools/build-managers/bloop/default.nix
index 61a6b4bed4..4c6d47ecb1 100644
--- a/third_party/nixpkgs/pkgs/development/tools/build-managers/bloop/default.nix
+++ b/third_party/nixpkgs/pkgs/development/tools/build-managers/bloop/default.nix
@@ -10,11 +10,11 @@
stdenv.mkDerivation rec {
pname = "bloop";
- version = "1.4.4";
+ version = "1.4.5";
bloop-coursier-channel = fetchurl {
url = "https://github.com/scalacenter/bloop/releases/download/v${version}/bloop-coursier.json";
- sha256 = "1pyf559bpnsmvca4kw36nb9lwkwa9q0ghrpa117s96dhvrp3i2bv";
+ sha256 = "0a3ayvq62nbfrcs2xgrfqg27h0wf9x28pxabmwd8y0ncafsnifjy";
};
bloop-bash = fetchurl {
@@ -54,8 +54,8 @@ stdenv.mkDerivation rec {
outputHashMode = "recursive";
outputHashAlgo = "sha256";
- outputHash = if stdenv.isLinux && stdenv.isx86_64 then "0hf0priy93zqba78a9nvbgl3mzwlc4jz43gz7cv2cdkj6x0lp0y1"
- else if stdenv.isDarwin && stdenv.isx86_64 then "0g2rnmlfnqymji4f4rn0kaz7hipgv3bakdpn08600gg1f3s8gabw"
+ outputHash = if stdenv.isLinux && stdenv.isx86_64 then "0wh02djny3a9882423lh4kf67z981d1ky85gfphsw52fbdhbzmn9"
+ else if stdenv.isDarwin && stdenv.isx86_64 then "0db30zbqpa9q285hspaba124dfnnr1gmlrxwwvn9szxz1d55n417"
else throw "unsupported platform";
};
diff --git a/third_party/nixpkgs/pkgs/development/tools/build-managers/qbs/default.nix b/third_party/nixpkgs/pkgs/development/tools/build-managers/qbs/default.nix
index d4f94c1aed..359c942d18 100644
--- a/third_party/nixpkgs/pkgs/development/tools/build-managers/qbs/default.nix
+++ b/third_party/nixpkgs/pkgs/development/tools/build-managers/qbs/default.nix
@@ -3,13 +3,13 @@
stdenv.mkDerivation rec {
pname = "qbs";
- version = "1.16.0";
+ version = "1.17.0";
src = fetchFromGitHub {
owner = "qbs";
repo = "qbs";
rev = "v${version}";
- sha256 = "1kg11s3figpkvgd85p0zk416s57gnvlzrz1isbc2lv13adidf041";
+ sha256 = "0sd4qwl1wh8b1hck846plrgddkrdwdfqwk2dgh5hdsrlrvx5xjrr";
};
nativeBuildInputs = [ qmake ];
diff --git a/third_party/nixpkgs/pkgs/development/tools/build-managers/sbt-extras/default.nix b/third_party/nixpkgs/pkgs/development/tools/build-managers/sbt-extras/default.nix
index 49d18d9e85..291c3539f3 100644
--- a/third_party/nixpkgs/pkgs/development/tools/build-managers/sbt-extras/default.nix
+++ b/third_party/nixpkgs/pkgs/development/tools/build-managers/sbt-extras/default.nix
@@ -1,18 +1,17 @@
-{ stdenv, fetchFromGitHub, which, curl, makeWrapper, jdk }:
+{ stdenv, fetchFromGitHub, which, curl, makeWrapper, jdk, writeScript
+, common-updater-scripts, cacert, git, nixfmt, nix, jq, coreutils, gnused
+, nixosTests }:
-let
- rev = "1e9230f35879ce23cbd8d16add07d2134fd479c9";
- version = "2020-09-24";
-in
-stdenv.mkDerivation {
- name = "sbt-extras-${version}";
- inherit version;
+stdenv.mkDerivation rec {
+ pname = "sbt-extras";
+ rev = "a36958f50bf8806c13f7c67ab0f13936e189351b";
+ version = "2020-11-08";
src = fetchFromGitHub {
owner = "paulp";
repo = "sbt-extras";
inherit rev;
- sha256 = "1k6vknjjbhr5jfpiyh2yzayn2ziqi1bb862l1q2786q59161ij3j";
+ sha256 = "1xp5r7ia8r2nr4g76wp0mnh95d5ha0dblsqvgicq240dgc28360r";
};
dontBuild = true;
@@ -26,14 +25,53 @@ stdenv.mkDerivation {
install bin/sbt $out/bin
- wrapProgram $out/bin/sbt --prefix PATH : ${stdenv.lib.makeBinPath [ which curl ]}
+ wrapProgram $out/bin/sbt --prefix PATH : ${
+ stdenv.lib.makeBinPath [ which curl ]
+ }
'';
+ passthru = {
+ tests = { inherit (nixosTests) sbt-extras; };
+
+ updateScript = writeScript "update.sh" ''
+ #!${stdenv.shell}
+ set -xo errexit
+ PATH=${
+ stdenv.lib.makeBinPath [
+ common-updater-scripts
+ curl
+ cacert
+ git
+ nixfmt
+ nix
+ jq
+ coreutils
+ gnused
+ ]
+ }
+
+ oldVersion="$(nix-instantiate --eval -E "with import ./. {}; lib.getVersion ${pname}" | tr -d '"')"
+ latestSha="$(curl -L -s https://api.github.com/repos/paulp/sbt-extras/commits\?sha\=master\&since\=$oldVersion | jq -r '.[0].sha')"
+
+ if [ ! "null" = "$latestSha" ]; then
+ nixpkgs="$(git rev-parse --show-toplevel)"
+ default_nix="$nixpkgs/pkgs/development/tools/build-managers/sbt-extras/default.nix"
+ latestDate="$(curl -L -s https://api.github.com/repos/paulp/sbt-extras/commits/$latestSha | jq '.commit.committer.date' | sed 's|"\(.*\)T.*|\1|g')"
+ update-source-version ${pname} "$latestSha" --version-key=rev
+ update-source-version ${pname} "$latestDate" --ignore-same-hash
+ nixfmt "$default_nix"
+ else
+ echo "${pname} is already up-to-date"
+ fi
+ '';
+ };
+
meta = {
- description = "A more featureful runner for sbt, the simple/scala/standard build tool";
+ description =
+ "A more featureful runner for sbt, the simple/scala/standard build tool";
homepage = "https://github.com/paulp/sbt-extras";
license = stdenv.lib.licenses.bsd3;
- maintainers = with stdenv.lib.maintainers; [ puffnfresh ];
+ maintainers = with stdenv.lib.maintainers; [ nequissimus puffnfresh ];
platforms = stdenv.lib.platforms.unix;
};
}
diff --git a/third_party/nixpkgs/pkgs/development/tools/doctl/default.nix b/third_party/nixpkgs/pkgs/development/tools/doctl/default.nix
index b30bd8d299..51dffdbe2b 100644
--- a/third_party/nixpkgs/pkgs/development/tools/doctl/default.nix
+++ b/third_party/nixpkgs/pkgs/development/tools/doctl/default.nix
@@ -2,7 +2,7 @@
buildGoModule rec {
pname = "doctl";
- version = "1.49.0";
+ version = "1.51.0";
vendorSha256 = null;
@@ -32,7 +32,7 @@ buildGoModule rec {
owner = "digitalocean";
repo = "doctl";
rev = "v${version}";
- sha256 = "1z7424am1fb1l9bz8q1lfzmhz84c29v7k5p391m4hhbl8h46x6ca";
+ sha256 = "1pc1nyzjzgnwchxbhgwiq46rysxpvxv7nmshvmphqm7avxfsmdzf";
};
meta = with lib; {
diff --git a/third_party/nixpkgs/pkgs/development/tools/documentation/gtk-doc/default.nix b/third_party/nixpkgs/pkgs/development/tools/documentation/gtk-doc/default.nix
index c93ee954ce..d7779540f9 100644
--- a/third_party/nixpkgs/pkgs/development/tools/documentation/gtk-doc/default.nix
+++ b/third_party/nixpkgs/pkgs/development/tools/documentation/gtk-doc/default.nix
@@ -14,7 +14,7 @@
python3.pkgs.buildPythonApplication rec {
pname = "gtk-doc";
- version = "1.32";
+ version = "1.33.0";
format = "other";
@@ -22,8 +22,8 @@ python3.pkgs.buildPythonApplication rec {
domain = "gitlab.gnome.org";
owner = "GNOME";
repo = pname;
- rev = "GTK_DOC_${stdenv.lib.replaceStrings ["."] ["_"] version }";
- sha256 = "14fihxj662gg4ln1ngff6s52zzkpbcc58qa0nxysxypnhp0h4ypk";
+ rev = version;
+ sha256 = "ahOTEWwVVwHt8TDWBnPKHIAUq0GXllEvMRmaKul1Tq0=";
};
patches = [
diff --git a/third_party/nixpkgs/pkgs/development/tools/dt-schema/default.nix b/third_party/nixpkgs/pkgs/development/tools/dt-schema/default.nix
index 776a3b0614..0392c4c95f 100644
--- a/third_party/nixpkgs/pkgs/development/tools/dt-schema/default.nix
+++ b/third_party/nixpkgs/pkgs/development/tools/dt-schema/default.nix
@@ -11,11 +11,11 @@
buildPythonPackage rec {
pname = "dtschema";
- version = "2020.8.1";
+ version = "2020.11";
src = fetchPypi {
inherit pname version;
- sha256 = "5c98202abb4977aac6a2995a7f4ed2f7e51739db6fd72861d29681f865c27c1b";
+ sha256 = "ad052d293eadb5b64631bfffac62c496427ad4105e76eef19a5422ba762ee734";
};
nativeBuildInputs = [ setuptools_scm git ];
diff --git a/third_party/nixpkgs/pkgs/development/tools/gauge/default.nix b/third_party/nixpkgs/pkgs/development/tools/gauge/default.nix
index 457d7b7a4b..d7ec8564cf 100644
--- a/third_party/nixpkgs/pkgs/development/tools/gauge/default.nix
+++ b/third_party/nixpkgs/pkgs/development/tools/gauge/default.nix
@@ -2,7 +2,7 @@
buildGoPackage rec {
pname = "gauge";
- version = "1.1.4";
+ version = "1.1.5";
goPackagePath = "github.com/getgauge/gauge";
excludedPackages = ''\(build\|man\)'';
@@ -11,7 +11,7 @@ buildGoPackage rec {
owner = "getgauge";
repo = "gauge";
rev = "v${version}";
- sha256 = "07kq6j5scbcicgb8dqkf129q5ppvnlvkfp165ql30jrkfd6ybf6y";
+ sha256 = "0jijw9x1ccqbb9kkzx1bj3wsq6v1415hvlbiihswqbb559bcmira";
};
meta = with stdenv.lib; {
diff --git a/third_party/nixpkgs/pkgs/development/tools/goconst/default.nix b/third_party/nixpkgs/pkgs/development/tools/goconst/default.nix
index 5c2e40032e..50574923e4 100644
--- a/third_party/nixpkgs/pkgs/development/tools/goconst/default.nix
+++ b/third_party/nixpkgs/pkgs/development/tools/goconst/default.nix
@@ -5,7 +5,7 @@
buildGoPackage rec {
pname = "goconst";
- version = "1.2.0";
+ version = "1.3.2";
goPackagePath = "github.com/jgautheron/goconst";
@@ -15,7 +15,7 @@ buildGoPackage rec {
owner = "jgautheron";
repo = "goconst";
rev = version;
- sha256 = "10yy9llmbznaq3v11sxywk1wpwhn0ddly7lxs31z1sf8paan7aig";
+ sha256 = "0bfiblp1498ic5jbdsm6mnc8s9drhasbqsw0asi6kmcz2kmslp9s";
};
meta = with lib; {
diff --git a/third_party/nixpkgs/pkgs/development/tools/golangci-lint/default.nix b/third_party/nixpkgs/pkgs/development/tools/golangci-lint/default.nix
index 743247d601..e65f45e647 100644
--- a/third_party/nixpkgs/pkgs/development/tools/golangci-lint/default.nix
+++ b/third_party/nixpkgs/pkgs/development/tools/golangci-lint/default.nix
@@ -2,16 +2,16 @@
buildGoModule rec {
pname = "golangci-lint";
- version = "1.32.0";
+ version = "1.32.2";
src = fetchFromGitHub {
owner = "golangci";
repo = "golangci-lint";
rev = "v${version}";
- sha256 = "157sqpwhb2984yri7w6x6pzp53ql56svv8bvbigcih3syrngxspr";
+ sha256 = "14zy8sq5bc26hxb3hg4afd7dpnrw25qi3g6v8y2p05isdf55laww";
};
- vendorSha256 = "1caf0flmq032azxwyfq6dvhw757nncxigfkf32s2a6g3jmqr1g3y";
+ vendorSha256 = "1l73qqpyn40z2czh2d8wgp3lpj6vnv8ll29yyryx0wm59ric732g";
doCheck = false;
diff --git a/third_party/nixpkgs/pkgs/development/tools/hcloud/default.nix b/third_party/nixpkgs/pkgs/development/tools/hcloud/default.nix
index 704477421c..edaaa9c3a6 100644
--- a/third_party/nixpkgs/pkgs/development/tools/hcloud/default.nix
+++ b/third_party/nixpkgs/pkgs/development/tools/hcloud/default.nix
@@ -2,18 +2,18 @@
buildGoModule rec {
pname = "hcloud";
- version = "1.19.1";
+ version = "1.20.0";
src = fetchFromGitHub {
owner = "hetznercloud";
repo = "cli";
rev = "v${version}";
- sha256 = "0iq04jfqvmwlm6947kzz4c3a33lvwxvj42z179rc3126b5v7bq54";
+ sha256 = "0sjshcppcfdfz29nsrzvrciypcb4r7fbl2sqhlkcq948b7k3jk8b";
};
nativeBuildInputs = [ installShellFiles ];
- vendorSha256 = "1svwrb5wyz5d8fgx36bpypnfq4hmpfxyd197cla9wnqpbkia7n5r";
+ vendorSha256 = "0q6jm2ghwrbjxn76i8wz72xjdmwfvl5dn8n4zilyjjx9vvllwdjw";
doCheck = false;
diff --git a/third_party/nixpkgs/pkgs/development/tools/metals/default.nix b/third_party/nixpkgs/pkgs/development/tools/metals/default.nix
index 55125fbeff..19e666ced1 100644
--- a/third_party/nixpkgs/pkgs/development/tools/metals/default.nix
+++ b/third_party/nixpkgs/pkgs/development/tools/metals/default.nix
@@ -2,7 +2,7 @@
stdenv.mkDerivation rec {
pname = "metals";
- version = "0.9.4";
+ version = "0.9.5";
deps = stdenv.mkDerivation {
name = "${pname}-deps-${version}";
@@ -16,7 +16,7 @@ stdenv.mkDerivation rec {
'';
outputHashMode = "recursive";
outputHashAlgo = "sha256";
- outputHash = "1k07gg13z3kambvvrxsc27781cd5npb2a50ahdbj7x6j6h67k0pg";
+ outputHash = "1hcfnxxahh3yfkpz6ybfr9xsf5mx008rhn7q6p8pmfxrgkdh4c1l";
};
nativeBuildInputs = [ makeWrapper ];
diff --git a/third_party/nixpkgs/pkgs/development/tools/misc/act/default.nix b/third_party/nixpkgs/pkgs/development/tools/misc/act/default.nix
index 9456335d72..bd4017ed44 100644
--- a/third_party/nixpkgs/pkgs/development/tools/misc/act/default.nix
+++ b/third_party/nixpkgs/pkgs/development/tools/misc/act/default.nix
@@ -2,13 +2,13 @@
buildGoModule rec {
pname = "act";
- version = "0.2.16";
+ version = "0.2.17";
src = fetchFromGitHub {
owner = "nektos";
repo = pname;
rev = "v${version}";
- sha256 = "0zhn6av1adphkk9g13m5na63r8fqcjw8wibcja9v9mbw886zcc3p";
+ sha256 = "0s7bgm2q7z9xpaj6kfvg63v12k35ckaxwmh6bbjh15xibaw58183";
};
vendorSha256 = "0bcrw3hf92m7n58lrlm0vj1wiwwy82q2rl1a725q3d6xwvi5kh9h";
diff --git a/third_party/nixpkgs/pkgs/development/tools/misc/arcanist/default.nix b/third_party/nixpkgs/pkgs/development/tools/misc/arcanist/default.nix
index fcddf1d0ca..14ef09ee7e 100644
--- a/third_party/nixpkgs/pkgs/development/tools/misc/arcanist/default.nix
+++ b/third_party/nixpkgs/pkgs/development/tools/misc/arcanist/default.nix
@@ -1,20 +1,24 @@
-{ stdenv, fetchFromGitHub, php, flex }:
+{ bison
+, fetchFromGitHub
+, flex
+, php
+, stdenv
+}:
# Make a custom wrapper. If `wrapProgram` is used, arcanist thinks .arc-wrapped is being
# invoked and complains about it being an unknown toolset. We could use `makeWrapper`, but
# then we’d need to still craft a script that does the `php libexec/arcanist/bin/...` dance
# anyway... So just do everything at once.
let makeArcWrapper = toolset: ''
- cat << WRAPPER > $out/bin/${toolset}
- #!$shell -e
- export PATH='${php}/bin/'\''${PATH:+':'}\$PATH
- exec ${php}/bin/php $out/libexec/arcanist/bin/${toolset} "\$@"
- WRAPPER
- chmod +x $out/bin/${toolset}
+ cat << WRAPPER > $out/bin/${toolset}
+ #!$shell -e
+ export PATH='${php}/bin/'\''${PATH:+':'}\$PATH
+ exec ${php}/bin/php $out/libexec/arcanist/bin/${toolset} "\$@"
+ WRAPPER
+ chmod +x $out/bin/${toolset}
'';
in
-
stdenv.mkDerivation {
pname = "arcanist";
version = "20200711";
@@ -25,7 +29,7 @@ stdenv.mkDerivation {
rev = "2565cc7b4d1dbce6bc7a5b3c4e72ae94be4712fe";
sha256 = "0jiv4aj4m5750dqw9r8hizjkwiyxk4cg4grkr63sllsa2dpiibxw";
};
- buildInputs = [ php flex ];
+ buildInputs = [ bison flex php ];
postPatch = stdenv.lib.optionalString stdenv.isAarch64 ''
substituteInPlace support/xhpast/Makefile \
@@ -33,13 +37,15 @@ stdenv.mkDerivation {
'';
buildPhase = ''
+ make cleanall -C support/xhpast
make xhpast -C support/xhpast
'';
installPhase = ''
mkdir -p $out/bin $out/libexec
make install -C support/xhpast
- cp -R $src $out/libexec/arcanist
+ make cleanall -C support/xhpast
+ cp -R . $out/libexec/arcanist
${makeArcWrapper "arc"}
${makeArcWrapper "phage"}
@@ -53,9 +59,9 @@ stdenv.mkDerivation {
meta = {
description = "Command line interface to Phabricator";
- homepage = "http://phabricator.org";
- license = stdenv.lib.licenses.asl20;
- platforms = stdenv.lib.platforms.unix;
+ homepage = "http://phabricator.org";
+ license = stdenv.lib.licenses.asl20;
+ platforms = stdenv.lib.platforms.unix;
maintainers = [ stdenv.lib.maintainers.thoughtpolice ];
};
}
diff --git a/third_party/nixpkgs/pkgs/development/tools/misc/autogen/default.nix b/third_party/nixpkgs/pkgs/development/tools/misc/autogen/default.nix
index 3e634bedfd..87b8bde58a 100644
--- a/third_party/nixpkgs/pkgs/development/tools/misc/autogen/default.nix
+++ b/third_party/nixpkgs/pkgs/development/tools/misc/autogen/default.nix
@@ -42,13 +42,23 @@ stdenv.mkDerivation rec {
guile libxml2
];
- configureFlags = stdenv.lib.optionals (stdenv.hostPlatform != stdenv.buildPlatform) [
- "--with-libxml2=${libxml2.dev}"
- "--with-libxml2-cflags=-I${libxml2.dev}/include/libxml2"
- # the configure check for regcomp wants to run a host program
- "libopts_cv_with_libregex=yes"
- #"MAKEINFO=${buildPackages.texinfo}/bin/makeinfo"
- ];
+ configureFlags =
+ [
+ # Make sure to use a static value for the timeout. If we do not set a value
+ # here autogen will select one based on the execution time of the configure
+ # phase which is not really reproducible.
+ #
+ # If you are curious about the number 78, it has been cargo-culted from
+ # Debian: https://salsa.debian.org/debian/autogen/-/blob/master/debian/rules#L21
+ "--enable-timeout=78"
+ ]
+ ++ (stdenv.lib.optionals (stdenv.hostPlatform != stdenv.buildPlatform) [
+ "--with-libxml2=${libxml2.dev}"
+ "--with-libxml2-cflags=-I${libxml2.dev}/include/libxml2"
+ # the configure check for regcomp wants to run a host program
+ "libopts_cv_with_libregex=yes"
+ #"MAKEINFO=${buildPackages.texinfo}/bin/makeinfo"
+ ]);
#doCheck = true; # not reliable
diff --git a/third_party/nixpkgs/pkgs/development/tools/misc/circleci-cli/default.nix b/third_party/nixpkgs/pkgs/development/tools/misc/circleci-cli/default.nix
index adfcdbb1ff..27fdb76cf8 100644
--- a/third_party/nixpkgs/pkgs/development/tools/misc/circleci-cli/default.nix
+++ b/third_party/nixpkgs/pkgs/development/tools/misc/circleci-cli/default.nix
@@ -2,16 +2,16 @@
buildGoModule rec {
pname = "circleci-cli";
- version = "0.1.11146";
+ version = "0.1.11458";
src = fetchFromGitHub {
owner = "CircleCI-Public";
repo = pname;
rev = "v${version}";
- sha256 = "1pn421sc3ipdqvdwl6fvlvwcddck3v23j8rfk5lq5a2n4ip5r8z8";
+ sha256 = "028qm25vhqp2a1jpvy4csgzqy5ijmsnzyh9696x660glrk5q2r1i";
};
- vendorSha256 = "0fjj8hh0s0jcgz48japbcfpl4ihba2drvvxlyg69j8hrcb9lmi4l";
+ vendorSha256 = "15l9f87vgspdsxhwqdm56z3dvrspc8k1bbyvhhhnvqf3fkiki2bw";
doCheck = false;
diff --git a/third_party/nixpkgs/pkgs/development/tools/misc/gdb/default.nix b/third_party/nixpkgs/pkgs/development/tools/misc/gdb/default.nix
index a480663443..d9bac6e3c8 100644
--- a/third_party/nixpkgs/pkgs/development/tools/misc/gdb/default.nix
+++ b/third_party/nixpkgs/pkgs/development/tools/misc/gdb/default.nix
@@ -26,11 +26,11 @@ assert pythonSupport -> python3 != null;
stdenv.mkDerivation rec {
pname = targetPrefix + basename;
- version = "9.2";
+ version = "10.1";
src = fetchurl {
url = "mirror://gnu/gdb/${basename}-${version}.tar.xz";
- sha256 = "0mf5fn8v937qwnal4ykn3ji1y2sxk0fa1yfqi679hxmpg6pdf31n";
+ sha256 = "1h32dckz1y8fnyxh22iyw8h3hnhxr79v1ng85px3ljn1xv71wbzq";
};
postPatch = if stdenv.isDarwin then ''
diff --git a/third_party/nixpkgs/pkgs/development/tools/misc/lsof/default.nix b/third_party/nixpkgs/pkgs/development/tools/misc/lsof/default.nix
index 274577c4a4..e5988b1d5a 100644
--- a/third_party/nixpkgs/pkgs/development/tools/misc/lsof/default.nix
+++ b/third_party/nixpkgs/pkgs/development/tools/misc/lsof/default.nix
@@ -4,7 +4,7 @@ let dialect = with stdenv.lib; last (splitString "-" stdenv.hostPlatform.system)
stdenv.mkDerivation rec {
pname = "lsof";
- version = "4.93.2";
+ version = "4.94.0";
depsBuildBuild = [ buildPackages.stdenv.cc ];
buildInputs = [ ncurses ];
@@ -13,7 +13,7 @@ stdenv.mkDerivation rec {
owner = "lsof-org";
repo = "lsof";
rev = version;
- sha256 = "1gd6r0nv8xz76pmvk52dgmfl0xjvkxl0s51b4jk4a0lphw3393yv";
+ sha256 = "0yxv2jg6rnzys49lyrz9yjb4knamah4xvlqj596y6ix3vm4k3chp";
};
patches = [ ./no-build-info.patch ];
diff --git a/third_party/nixpkgs/pkgs/development/tools/misc/nix-build-uncached/default.nix b/third_party/nixpkgs/pkgs/development/tools/misc/nix-build-uncached/default.nix
index 6450ee4338..7886c7c450 100644
--- a/third_party/nixpkgs/pkgs/development/tools/misc/nix-build-uncached/default.nix
+++ b/third_party/nixpkgs/pkgs/development/tools/misc/nix-build-uncached/default.nix
@@ -2,13 +2,13 @@
buildGoModule rec {
pname = "nix-build-uncached";
- version = "1.0.2";
+ version = "1.1.0";
src = fetchFromGitHub {
owner = "Mic92";
repo = "nix-build-uncached";
rev = "v${version}";
- sha256 = "0hjx2gdwzg02fzxhsf7akp03vqj2s7wmcv9xfqn765zbqnljz14v";
+ sha256 = "1v9xyv0hhvfw61k4pbgzrlgy7igl619cangi40fkh7gdvs01dxz4";
};
vendorSha256 = null;
diff --git a/third_party/nixpkgs/pkgs/development/tools/misc/ycmd/default.nix b/third_party/nixpkgs/pkgs/development/tools/misc/ycmd/default.nix
index 02298d93b8..4bbff3ca33 100644
--- a/third_party/nixpkgs/pkgs/development/tools/misc/ycmd/default.nix
+++ b/third_party/nixpkgs/pkgs/development/tools/misc/ycmd/default.nix
@@ -18,9 +18,10 @@ stdenv.mkDerivation {
sha256 = "1c5axdngxaxj5vc6lr8sxb99mr5adsm1dnjckaxc23kq78pc8cn7";
};
- nativeBuildInputs = [ cmake ];
+ nativeBuildInputs = [ cmake ]
+ ++ stdenv.lib.optional stdenv.hostPlatform.isDarwin fixDarwinDylibNames;
buildInputs = [ boost llvmPackages.libclang ]
- ++ stdenv.lib.optional stdenv.isDarwin [ fixDarwinDylibNames Cocoa ];
+ ++ stdenv.lib.optional stdenv.hostPlatform.isDarwin Cocoa;
buildPhase = ''
export EXTRA_CMAKE_ARGS=-DPATH_TO_LLVM_ROOT=${llvmPackages.clang-unwrapped}
diff --git a/third_party/nixpkgs/pkgs/development/tools/packet-cli/default.nix b/third_party/nixpkgs/pkgs/development/tools/packet-cli/default.nix
index f7bcc8bf8f..6b603ef006 100644
--- a/third_party/nixpkgs/pkgs/development/tools/packet-cli/default.nix
+++ b/third_party/nixpkgs/pkgs/development/tools/packet-cli/default.nix
@@ -2,16 +2,16 @@
buildGoModule rec {
pname = "packet-cli";
- version = "0.0.8";
+ version = "0.1.1";
src = fetchFromGitHub {
owner = "packethost";
repo = pname;
rev = version;
- sha256 = "0ys6zyhyi65g0sj15pb6rslgbjgkh73y32gc0yvhfd6xmgzaxpxf";
+ sha256 = "089fcn7yslijjivyvwl85j32gfwif8aazqdhm6hi676lz80ssppp";
};
- vendorSha256 = "1h9p3hrr61hwkhkh4qbw0ld3hd5xi75qm8rwfrpz5z06jba1ll25";
+ vendorSha256 = "1p3v4pzw9hc1iviv1zghw9imbd23nlp24dpa8hf0w8a03jvpy96x";
postInstall = ''
ln -s $out/bin/packet-cli $out/bin/packet
diff --git a/third_party/nixpkgs/pkgs/development/tools/parsing/bisonc++/default.nix b/third_party/nixpkgs/pkgs/development/tools/parsing/bisonc++/default.nix
new file mode 100644
index 0000000000..c6a4fc1a06
--- /dev/null
+++ b/third_party/nixpkgs/pkgs/development/tools/parsing/bisonc++/default.nix
@@ -0,0 +1,56 @@
+{stdenv, fetchurl, fetchFromGitLab
+, yodl, icmake, flexcpp, bobcat
+}:
+stdenv.mkDerivation rec {
+ pname = "bisonc++";
+ version = "6.04.00";
+
+ src = fetchFromGitLab {
+ domain = "gitlab.com";
+ owner = "fbb-git";
+ repo = "bisoncpp";
+ rev = "6.04.00";
+ sha256 = "sha256:0aa9bij4g08ilsk6cgrbgi03vyhqr9fn6j2164sjin93m63212wl";
+ };
+
+ buildInputs = [ bobcat ];
+
+ nativeBuildInputs = [ yodl icmake flexcpp ];
+
+ setSourceRoot = ''
+ sourceRoot="$(echo */bisonc++)"
+ '';
+
+ gpl = fetchurl {
+ url = "https://www.gnu.org/licenses/old-licenses/gpl-2.0.txt";
+ sha256 = "sha256:0hq6i0dm4420825fdm0lnnppbil6z67ls67n5kgjcd912dszjxw1";
+ };
+
+ postPatch = ''
+ substituteInPlace INSTALL.im --replace /usr $out
+ patchShebangs .
+ for file in $(find documentation -type f); do
+ substituteInPlace "$file" --replace /usr/share/common-licenses/GPL ${gpl}
+ substituteInPlace "$file" --replace /usr $out
+ done
+ '';
+
+ buildPhase = ''
+ ./build program
+ ./build man
+ ./build manual
+ '';
+
+ installPhase = ''
+ ./build install x
+ '';
+
+ meta = with stdenv.lib; {
+ inherit version;
+ description = "A parser generator like bison, but it generates C++ code";
+ license = licenses.gpl2Plus;
+ maintainers = with maintainers; [ raskin ];
+ platforms = platforms.linux;
+ homepage = "https://fbb-git.gitlab.io/bisoncpp/";
+ };
+}
diff --git a/third_party/nixpkgs/pkgs/development/tools/parsing/tree-sitter/default.nix b/third_party/nixpkgs/pkgs/development/tools/parsing/tree-sitter/default.nix
index 63082f60ac..e343506156 100644
--- a/third_party/nixpkgs/pkgs/development/tools/parsing/tree-sitter/default.nix
+++ b/third_party/nixpkgs/pkgs/development/tools/parsing/tree-sitter/default.nix
@@ -3,6 +3,9 @@
, writeShellScript, runCommand, which
, rustPlatform, jq, nix-prefetch-git, xe, curl, emscripten
, callPackage
+, enableShared ? true
+, enableStatic ? false
+, Security
}:
# TODO: move to carnix or https://github.com/kolloch/crate2nix
@@ -11,9 +14,9 @@ let
# 1) change all these hashes
# 2) nix-build -A tree-sitter.updater.update-all-grammars
# 3) run the ./result script that is output by that (it updates ./grammars)
- version = "0.17.1";
- sha256 = "sha256-k61actAEyao/Ea8aw9PCm252U+1I0d43MAYC68/lui4=";
- cargoSha256 = "sha256-Jp/Fl20ZZfaIdWinOOujNVH5JjJNtyUYHfyTrmeeoRg=";
+ version = "0.17.3";
+ sha256 = "sha256-uQs80r9cPX8Q46irJYv2FfvuppwonSS5HVClFujaP+U=";
+ cargoSha256 = "sha256-fonlxLNh9KyEwCj7G5vxa7cM/DlcHNFbQpp0SwVQ3j4=";
src = fetchFromGitHub {
owner = "tree-sitter";
@@ -49,6 +52,8 @@ in rustPlatform.buildRustPackage {
pname = "tree-sitter";
inherit src version cargoSha256;
+ buildInputs = lib.optionals stdenv.isDarwin [ Security ];
+
nativeBuildInputs = [ emscripten which ];
postPatch = ''
@@ -68,6 +73,12 @@ in rustPlatform.buildRustPackage {
bash ./script/build-wasm --debug
'';
+ postInstall = ''
+ PREFIX=$out make install
+ ${lib.optionalString (!enableShared) "rm $out/lib/*.so{,.*}"}
+ ${lib.optionalString (!enableStatic) "rm $out/lib/*.a"}
+ '';
+
# test result: FAILED. 120 passed; 13 failed; 0 ignored; 0 measured; 0 filtered out
doCheck = false;
@@ -95,9 +106,8 @@ in rustPlatform.buildRustPackage {
'';
license = lib.licenses.mit;
maintainers = with lib.maintainers; [ Profpatsch ];
- # Darwin needs some more work with default libraries
# Aarch has test failures with how tree-sitter compiles the generated C files
- broken = stdenv.isDarwin || stdenv.isAarch64;
+ broken = stdenv.isAarch64;
};
}
diff --git a/third_party/nixpkgs/pkgs/development/tools/parsing/tree-sitter/grammars/default.nix b/third_party/nixpkgs/pkgs/development/tools/parsing/tree-sitter/grammars/default.nix
index 083dc61a96..e9cb0a1db6 100644
--- a/third_party/nixpkgs/pkgs/development/tools/parsing/tree-sitter/grammars/default.nix
+++ b/third_party/nixpkgs/pkgs/development/tools/parsing/tree-sitter/grammars/default.nix
@@ -5,6 +5,7 @@
embedded-template = (builtins.fromJSON (builtins.readFile ./tree-sitter-embedded-template.json));
go = (builtins.fromJSON (builtins.readFile ./tree-sitter-go.json));
html = (builtins.fromJSON (builtins.readFile ./tree-sitter-html.json));
+ java = (builtins.fromJSON (builtins.readFile ./tree-sitter-java.json));
javascript = (builtins.fromJSON (builtins.readFile ./tree-sitter-javascript.json));
jsdoc = (builtins.fromJSON (builtins.readFile ./tree-sitter-jsdoc.json));
json = (builtins.fromJSON (builtins.readFile ./tree-sitter-json.json));
diff --git a/third_party/nixpkgs/pkgs/development/tools/parsing/tree-sitter/grammars/tree-sitter-cpp.json b/third_party/nixpkgs/pkgs/development/tools/parsing/tree-sitter/grammars/tree-sitter-cpp.json
index 99af884be9..16aef8ee33 100644
--- a/third_party/nixpkgs/pkgs/development/tools/parsing/tree-sitter/grammars/tree-sitter-cpp.json
+++ b/third_party/nixpkgs/pkgs/development/tools/parsing/tree-sitter/grammars/tree-sitter-cpp.json
@@ -1,9 +1,9 @@
{
"url": "https://github.com/tree-sitter/tree-sitter-cpp",
- "rev": "5e7476bd014445abdae879661e9caf299215478a",
- "date": "2020-05-14T11:46:56-07:00",
- "path": "/nix/store/xz540ah1xx06n3wwmk3ym72nj0bz82hh-tree-sitter-cpp",
- "sha256": "0v2l5269bhbpzcd929r3pn88gqcczx6spsq7p6ibsvsydbwj95wx",
+ "rev": "fb8250eef8b4cf1ce104806c50dc206e388b0e72",
+ "date": "2020-11-02T09:46:58-08:00",
+ "path": "/nix/store/qmza43f0fraa111bg50vaxsgnrs5kqs1-tree-sitter-cpp",
+ "sha256": "1sbk5a2p1fh6798naiswsap6fpj7n7bqhwd3xdyi35xf613qpwsi",
"fetchSubmodules": false,
"deepClone": false,
"leaveDotGit": false
diff --git a/third_party/nixpkgs/pkgs/development/tools/parsing/tree-sitter/grammars/tree-sitter-go.json b/third_party/nixpkgs/pkgs/development/tools/parsing/tree-sitter/grammars/tree-sitter-go.json
index 67d58d6406..612b8eb64d 100644
--- a/third_party/nixpkgs/pkgs/development/tools/parsing/tree-sitter/grammars/tree-sitter-go.json
+++ b/third_party/nixpkgs/pkgs/development/tools/parsing/tree-sitter/grammars/tree-sitter-go.json
@@ -1,9 +1,9 @@
{
"url": "https://github.com/tree-sitter/tree-sitter-go",
- "rev": "34181774b3e86b7801c939c79c7b80a82df91a2b",
- "date": "2020-08-13T12:21:50-07:00",
- "path": "/nix/store/3a5w7pz1m74y0lhbzq3bw3k2297lypqs-tree-sitter-go",
- "sha256": "0cfi7ghs0m3iqwd4jvsqgsj4gnfikn1j2q0wbkdfvz2j25l0qwq0",
+ "rev": "dadfd9c9aab2630632e61cfce645c13c35aa092f",
+ "date": "2020-10-27T13:42:16-04:00",
+ "path": "/nix/store/91a8w265vjc955hyp7cqvpm8ks9zcmqv-tree-sitter-go",
+ "sha256": "1pwbzkg7s0l2fhr4p1rpcldjcpxbkaqsm3q81543almc75k38x8w",
"fetchSubmodules": false,
"deepClone": false,
"leaveDotGit": false
diff --git a/third_party/nixpkgs/pkgs/development/tools/parsing/tree-sitter/grammars/tree-sitter-java.json b/third_party/nixpkgs/pkgs/development/tools/parsing/tree-sitter/grammars/tree-sitter-java.json
new file mode 100644
index 0000000000..260dc4d10c
--- /dev/null
+++ b/third_party/nixpkgs/pkgs/development/tools/parsing/tree-sitter/grammars/tree-sitter-java.json
@@ -0,0 +1,10 @@
+{
+ "url": "https://github.com/tree-sitter/tree-sitter-java",
+ "rev": "f7b62ac33d63bea56ce202ace107aaa4285e50af",
+ "date": "2020-10-27T13:41:02-04:00",
+ "path": "/nix/store/h51zjbzdrm89gczcdv7nyih54vnd2xps-tree-sitter-java",
+ "sha256": "0jbh79brs1dskfqw05s9ndrp46hibyc37nfvhxlvanmgj3pjwgxb",
+ "fetchSubmodules": false,
+ "deepClone": false,
+ "leaveDotGit": false
+}
diff --git a/third_party/nixpkgs/pkgs/development/tools/parsing/tree-sitter/grammars/tree-sitter-javascript.json b/third_party/nixpkgs/pkgs/development/tools/parsing/tree-sitter/grammars/tree-sitter-javascript.json
index 9020e8a40b..68008d393d 100644
--- a/third_party/nixpkgs/pkgs/development/tools/parsing/tree-sitter/grammars/tree-sitter-javascript.json
+++ b/third_party/nixpkgs/pkgs/development/tools/parsing/tree-sitter/grammars/tree-sitter-javascript.json
@@ -1,9 +1,9 @@
{
"url": "https://github.com/tree-sitter/tree-sitter-javascript",
- "rev": "3d5493495b62b4ff8e8c24aee7519dd904e25813",
- "date": "2020-09-21T17:18:41-07:00",
- "path": "/nix/store/bhjws8yif1ihhvhfsrdrp4inf03ks08r-tree-sitter-javascript",
- "sha256": "10fscmclcgl1a0314ppkfy0s7pmiiz5vjipbmks76608kic8nzpp",
+ "rev": "852f11b394804ac2a8986f8bcaafe77753635667",
+ "date": "2020-10-27T13:43:40-04:00",
+ "path": "/nix/store/7a9nd3prxbv2izvilqdxf58his097ak7-tree-sitter-javascript",
+ "sha256": "1cdqx75fm7fvna0iymw7n03a7f6gayfg97qwqz3himi0775fz9ir",
"fetchSubmodules": false,
"deepClone": false,
"leaveDotGit": false
diff --git a/third_party/nixpkgs/pkgs/development/tools/parsing/tree-sitter/grammars/tree-sitter-python.json b/third_party/nixpkgs/pkgs/development/tools/parsing/tree-sitter/grammars/tree-sitter-python.json
index 1c057f51ea..402c4c087b 100644
--- a/third_party/nixpkgs/pkgs/development/tools/parsing/tree-sitter/grammars/tree-sitter-python.json
+++ b/third_party/nixpkgs/pkgs/development/tools/parsing/tree-sitter/grammars/tree-sitter-python.json
@@ -1,9 +1,9 @@
{
"url": "https://github.com/tree-sitter/tree-sitter-python",
- "rev": "30f538aa1f932a2864c102694761d3127a61dc68",
- "date": "2020-09-21T13:21:51-07:00",
- "path": "/nix/store/bxv85lm636xdsdqjf4n7sxjlhhh35qnv-tree-sitter-python",
- "sha256": "0hzzz90pn1qwyl5xk03cah62rbvp1c1yp1pw2m3hifqflxg4rs1g",
+ "rev": "d245768132eb6cb74d8a394ca4d29dc57169b096",
+ "date": "2020-10-27T13:20:04-04:00",
+ "path": "/nix/store/afv7ibxpf5c2shafa89cnza88hsfb7kj-tree-sitter-python",
+ "sha256": "075r5i2id2rn76xm3pcrn5cpvj63dlaxcpvphig39a4c9f9hrpdx",
"fetchSubmodules": false,
"deepClone": false,
"leaveDotGit": false
diff --git a/third_party/nixpkgs/pkgs/development/tools/parsing/tree-sitter/grammars/tree-sitter-ruby.json b/third_party/nixpkgs/pkgs/development/tools/parsing/tree-sitter/grammars/tree-sitter-ruby.json
index 06418942b4..d5a1767a23 100644
--- a/third_party/nixpkgs/pkgs/development/tools/parsing/tree-sitter/grammars/tree-sitter-ruby.json
+++ b/third_party/nixpkgs/pkgs/development/tools/parsing/tree-sitter/grammars/tree-sitter-ruby.json
@@ -1,9 +1,9 @@
{
"url": "https://github.com/tree-sitter/tree-sitter-ruby",
- "rev": "a6fcb529e9097a2efbbb3f4857e42773e7f2474f",
- "date": "2020-05-26T16:18:48-07:00",
- "path": "/nix/store/yqd5b7ky21scahnhrik9psalbkwi3ab3-tree-sitter-ruby",
- "sha256": "0bxg5lfdazz5mlfnf0amcygvc8b2ydzl2blvbbhnziyx92r8di6q",
+ "rev": "f86d90cce578e28c824afdcdbdca7d031b88c0b0",
+ "date": "2020-11-02T20:49:49-08:00",
+ "path": "/nix/store/gs0hhb1dlgmv0y60zyyz7ki30yvpddfx-tree-sitter-ruby",
+ "sha256": "1n1irdjfmv27p5ia2vqzv8zfsq19pxi0as0wrkb7z7s1lqr1gwrb",
"fetchSubmodules": false,
"deepClone": false,
"leaveDotGit": false
diff --git a/third_party/nixpkgs/pkgs/development/tools/parsing/tree-sitter/grammars/tree-sitter-rust.json b/third_party/nixpkgs/pkgs/development/tools/parsing/tree-sitter/grammars/tree-sitter-rust.json
index 9f037cdc09..4e0e2e2f7f 100644
--- a/third_party/nixpkgs/pkgs/development/tools/parsing/tree-sitter/grammars/tree-sitter-rust.json
+++ b/third_party/nixpkgs/pkgs/development/tools/parsing/tree-sitter/grammars/tree-sitter-rust.json
@@ -1,9 +1,9 @@
{
"url": "https://github.com/tree-sitter/tree-sitter-rust",
- "rev": "40620bf4097cbc9cea79504d7e877865df43a19e",
- "date": "2020-05-15T10:53:35-07:00",
- "path": "/nix/store/r24bba6gxchb5zqzghna8yjvqnngbv4a-tree-sitter-rust",
- "sha256": "0hjp6nsskw341g97x41481b3zfwh8g853fs9six6j1mh92irmv6y",
+ "rev": "cf47ff80cbd8bdc6dd649a005c5f5d73f9c347e2",
+ "date": "2020-11-04T06:23:40-08:00",
+ "path": "/nix/store/8cvjxw8cz5jrkqwvgq88r7rfm269xwk1-tree-sitter-rust",
+ "sha256": "0yzcag0yy3ncxwpnb3fmsw8bxaidp7z8kbl8wwaxaj2vvxxf6sam",
"fetchSubmodules": false,
"deepClone": false,
"leaveDotGit": false
diff --git a/third_party/nixpkgs/pkgs/development/tools/parsing/tree-sitter/grammars/tree-sitter-typescript.json b/third_party/nixpkgs/pkgs/development/tools/parsing/tree-sitter/grammars/tree-sitter-typescript.json
index 7081d3036c..d31f72754b 100644
--- a/third_party/nixpkgs/pkgs/development/tools/parsing/tree-sitter/grammars/tree-sitter-typescript.json
+++ b/third_party/nixpkgs/pkgs/development/tools/parsing/tree-sitter/grammars/tree-sitter-typescript.json
@@ -1,9 +1,9 @@
{
"url": "https://github.com/tree-sitter/tree-sitter-typescript",
- "rev": "5a38a5bd04364d9f48b902fd1514e075b98b0edc",
- "date": "2020-09-17T10:19:01-07:00",
- "path": "/nix/store/b3q7vz9zhgjdbv3c2xap4k2ghpdjp2yf-tree-sitter-typescript",
- "sha256": "1mxwvzqbaaq11cz7zidiwr29fs0b6ycf3nadwdkgiz8c6x2xx398",
+ "rev": "73afadbd117a8e8551758af9c3a522ef46452119",
+ "date": "2020-10-20T12:15:52-07:00",
+ "path": "/nix/store/wrgp1j5l50cigv5cmlxikw693a55i6g9-tree-sitter-typescript",
+ "sha256": "0dsbmcvjzys9s229drp1l8anram7d6nsx1nixl5m9znw54hr4w9p",
"fetchSubmodules": false,
"deepClone": false,
"leaveDotGit": false
diff --git a/third_party/nixpkgs/pkgs/development/tools/pipenv/default.nix b/third_party/nixpkgs/pkgs/development/tools/pipenv/default.nix
index 3a6ea879e5..f8b800745d 100644
--- a/third_party/nixpkgs/pkgs/development/tools/pipenv/default.nix
+++ b/third_party/nixpkgs/pkgs/development/tools/pipenv/default.nix
@@ -18,11 +18,11 @@ let
in buildPythonApplication rec {
pname = "pipenv";
- version = "2020.8.13";
+ version = "2020.11.4";
src = fetchPypi {
inherit pname version;
- sha256 = "eff0e10eadb330f612edfa5051d3d8e775e9e0e918c3c50361da703bd0daa035";
+ sha256 = "d6ac39d1721517b23aca12cdb4c726dc318ec4d7bdede5c1220bbb81775005c3";
};
LC_ALL = "en_US.UTF-8";
diff --git a/third_party/nixpkgs/pkgs/development/tools/profiling/sysprof/capture.nix b/third_party/nixpkgs/pkgs/development/tools/profiling/sysprof/capture.nix
new file mode 100644
index 0000000000..a1f5d00332
--- /dev/null
+++ b/third_party/nixpkgs/pkgs/development/tools/profiling/sysprof/capture.nix
@@ -0,0 +1,30 @@
+{ stdenv
+, meson
+, ninja
+, sysprof
+}:
+
+stdenv.mkDerivation rec {
+ pname = "libsysprof-capture";
+
+ inherit (sysprof) src version;
+
+ nativeBuildInputs = [
+ meson
+ ninja
+ ];
+
+ mesonFlags = [
+ "-Dwith_sysprofd=none"
+ "-Dlibsysprof=false"
+ "-Dhelp=false"
+ "-Denable_tools=false"
+ "-Denable_tests=false"
+ "-Denable_examples=false"
+ ];
+
+ meta = sysprof.meta // {
+ description = "Static library for Sysprof capture data generation";
+ platforms = stdenv.lib.platforms.all;
+ };
+}
diff --git a/third_party/nixpkgs/pkgs/development/tools/profiling/sysprof/default.nix b/third_party/nixpkgs/pkgs/development/tools/profiling/sysprof/default.nix
index ce73130988..49b8e88486 100644
--- a/third_party/nixpkgs/pkgs/development/tools/profiling/sysprof/default.nix
+++ b/third_party/nixpkgs/pkgs/development/tools/profiling/sysprof/default.nix
@@ -2,7 +2,6 @@
, lib
, desktop-file-utils
, fetchurl
-, fetchpatch
, gettext
, glib
, gtk3
@@ -21,24 +20,15 @@
stdenv.mkDerivation rec {
pname = "sysprof";
- version = "3.36.0";
+ version = "3.38.1";
outputs = [ "out" "lib" "dev" ];
src = fetchurl {
url = "mirror://gnome/sources/${pname}/${stdenv.lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
- sha256 = "024i0gzqnm79rpr4gqxdvcj6gvf82xdlcp2p1k9ikcppmi6xnw46";
+ sha256 = "1z2i9187f2jx456l7h07wy8m9a0p7pj3xiv1aji3snq7rjb1lkj0";
};
- patches = [
- # Fix 32-bit builds
- # https://gitlab.gnome.org/GNOME/sysprof/merge_requests/24
- (fetchpatch {
- url = "https://gitlab.gnome.org/GNOME/sysprof/commit/5dea152c7728f5a37370ad8a229115833e36b4f6.patch";
- sha256 = "0c76s7r329pbdlmgvm3grn89iylrxv5wg87craqp937nwk3wb80g";
- })
- ];
-
nativeBuildInputs = [
desktop-file-utils
gettext
diff --git a/third_party/nixpkgs/pkgs/development/tools/rust/cargo-make/default.nix b/third_party/nixpkgs/pkgs/development/tools/rust/cargo-make/default.nix
index 4249e55247..881a53872c 100644
--- a/third_party/nixpkgs/pkgs/development/tools/rust/cargo-make/default.nix
+++ b/third_party/nixpkgs/pkgs/development/tools/rust/cargo-make/default.nix
@@ -4,11 +4,11 @@
rustPlatform.buildRustPackage rec {
pname = "cargo-make";
- version = "0.32.8";
+ version = "0.32.9";
src = fetchCrate {
inherit pname version;
- sha256 = "sha256-TwutU4RjiYtxc2vT67Bgqe/WRHi5aXwgzvZu7Wk4Cao=";
+ sha256 = "0f6avprq0d65v5fk3kn2kvw3w024f21yq6v8y7d9rbwqxxf87jlf";
};
nativeBuildInputs = [ pkg-config ];
@@ -16,7 +16,7 @@ rustPlatform.buildRustPackage rec {
buildInputs = [ openssl ]
++ stdenv.lib.optionals stdenv.isDarwin [ Security SystemConfiguration ];
- cargoSha256 = "sha256-HzRriPVaMn6qDu6h/NQjILglO4/0//8J1orV4Uz+XEI=";
+ cargoSha256 = "0v0657hh8ivqaq4sn0saaiz06shxavhrh9mksjlzj7c2ym6cxkih";
# Some tests fail because they need network access.
# However, Travis ensures a proper build.
diff --git a/third_party/nixpkgs/pkgs/development/tools/vagrant/default.nix b/third_party/nixpkgs/pkgs/development/tools/vagrant/default.nix
index 24f93f55ef..3d5fe88bfc 100644
--- a/third_party/nixpkgs/pkgs/development/tools/vagrant/default.nix
+++ b/third_party/nixpkgs/pkgs/development/tools/vagrant/default.nix
@@ -5,9 +5,9 @@
let
# NOTE: bumping the version and updating the hash is insufficient;
# you must use bundix to generate a new gemset.nix in the Vagrant source.
- version = "2.2.11";
+ version = "2.2.13";
url = "https://github.com/hashicorp/vagrant/archive/v${version}.tar.gz";
- sha256 = "sha256-KDQDEMebqQYgsBroHmQrm/OJWTES9C9eGl0dDHTBpIc=";
+ sha256 = "sha256-NN+8t08yycINbtxOjhOWU96nJ0fZKDAopEr3WyAeG8U=";
deps = bundlerEnv rec {
name = "${pname}-${version}";
diff --git a/third_party/nixpkgs/pkgs/development/tools/vagrant/gemset.nix b/third_party/nixpkgs/pkgs/development/tools/vagrant/gemset.nix
index f1b9fa1197..c18b9818f3 100644
--- a/third_party/nixpkgs/pkgs/development/tools/vagrant/gemset.nix
+++ b/third_party/nixpkgs/pkgs/development/tools/vagrant/gemset.nix
@@ -138,10 +138,10 @@
platforms = [];
source = {
remotes = ["https://rubygems.org"];
- sha256 = "1w923wmdi3gyiky0asqdw5dnh3gcjs2xyn82ajvjfjwh6sn0clgi";
+ sha256 = "07q48aca4r782jh53znqq7ams4pcf1dhmq21dwhyxzjqfclcb48g";
type = "gem";
};
- version = "3.2.1";
+ version = "3.3.0";
};
little-plugger = {
groups = ["default"];
diff --git a/third_party/nixpkgs/pkgs/development/tools/vala-lint/default.nix b/third_party/nixpkgs/pkgs/development/tools/vala-lint/default.nix
index 199f1626c8..378bc935e2 100644
--- a/third_party/nixpkgs/pkgs/development/tools/vala-lint/default.nix
+++ b/third_party/nixpkgs/pkgs/development/tools/vala-lint/default.nix
@@ -12,13 +12,13 @@
stdenv.mkDerivation rec {
pname = "vala-lint-unstable";
- version = "2019-10-11";
+ version = "2020-08-18";
src = fetchFromGitHub {
owner = "vala-lang";
repo = "vala-lint";
- rev = "a077bbec30dea128616a23583ce3f8364ff2ef11";
- sha256 = "0w0rmaj4v42wc4vq2lfjnj6airag5ahv6522xkw3j1nmccxq3s72";
+ rev = "fc5dd9e95bc61540b404d5bc070c0629903baad9";
+ sha256 = "n6pp6vYGaRF8B3phWp/e9KnpKGf0Op+xGVdT6HHe0rM=";
};
nativeBuildInputs = [
diff --git a/third_party/nixpkgs/pkgs/development/tools/wrangler/default.nix b/third_party/nixpkgs/pkgs/development/tools/wrangler/default.nix
index 8844ed2558..d62e2e377d 100644
--- a/third_party/nixpkgs/pkgs/development/tools/wrangler/default.nix
+++ b/third_party/nixpkgs/pkgs/development/tools/wrangler/default.nix
@@ -13,7 +13,7 @@ rustPlatform.buildRustPackage rec {
cargoSha256 = "0d9wvdjjakznz8dnqx4gqxh0xkxrh4229460hg6dr9qn492p7nfx";
- nativeBuildInputs = stdenv.lib.optionals stdenv.isLinux [ pkg-config perl ];
+ nativeBuildInputs = [ perl ] ++ stdenv.lib.optionals stdenv.isLinux [ pkg-config ];
buildInputs = stdenv.lib.optionals stdenv.isLinux [ openssl ]
++ stdenv.lib.optionals stdenv.isDarwin [
diff --git a/third_party/nixpkgs/pkgs/development/web/deno/default.nix b/third_party/nixpkgs/pkgs/development/web/deno/default.nix
index 0c60821102..5fe6eb0575 100644
--- a/third_party/nixpkgs/pkgs/development/web/deno/default.nix
+++ b/third_party/nixpkgs/pkgs/development/web/deno/default.nix
@@ -18,16 +18,16 @@ let
in
rustPlatform.buildRustPackage rec {
pname = "deno";
- version = "1.5.1";
+ version = "1.5.2";
src = fetchFromGitHub {
owner = "denoland";
repo = pname;
rev = "v${version}";
- sha256 = "19ki9qyg9q26jq4jkcf8b6xhy4g4cn30zqccgl3324mnijhl33jk";
+ sha256 = "0dpx74zp85a3qcabfmwnsh1kl0c74ygafybqzmyvwjmax0hdgkq6";
fetchSubmodules = true;
};
- cargoSha256 = "1q3gmilphkbh54y7m711ccr1gr5slk2nn91qq61rmmphyylwkgv2";
+ cargoSha256 = "0358vbpda9x0ib0vla4crn052lk299x2hg14g8lzymg33277lk3p";
# Install completions post-install
nativeBuildInputs = [ installShellFiles ];
@@ -52,15 +52,14 @@ rustPlatform.buildRustPackage rec {
# Skipping until resolved
doCheck = false;
- # TODO: Move to enhanced installShellCompletion when merged: PR #83630
postInstall = ''
# remove test plugin and test server
rm -rf $out/lib $out/bin/test_server
- $out/bin/deno completions bash > deno.bash
- $out/bin/deno completions fish > deno.fish
- $out/bin/deno completions zsh > _deno
- installShellCompletion deno.{bash,fish} --zsh _deno
+ installShellCompletion --cmd deno \
+ --bash <($out/bin/deno completions bash) \
+ --fish <($out/bin/deno completions fish) \
+ --zsh <($out/bin/deno completions zsh)
'';
passthru.updateScript = ./update/update.ts;
diff --git a/third_party/nixpkgs/pkgs/development/web/flyctl/default.nix b/third_party/nixpkgs/pkgs/development/web/flyctl/default.nix
index dbc6bfb9a0..73450d0867 100644
--- a/third_party/nixpkgs/pkgs/development/web/flyctl/default.nix
+++ b/third_party/nixpkgs/pkgs/development/web/flyctl/default.nix
@@ -2,13 +2,13 @@
buildGoModule rec {
pname = "flyctl";
- version = "0.0.145";
+ version = "0.0.146";
src = fetchFromGitHub {
owner = "superfly";
repo = "flyctl";
rev = "v${version}";
- sha256 = "00by00jslj9nkq89iwvc5f0jcn4lv8i6xs9y9l2x044rq525q08q";
+ sha256 = "0qqrzzgr7r2j5cwhbfwfl1z6k9qgqpsdf8f0n545hg48i52q0p2q";
};
preBuild = ''
diff --git a/third_party/nixpkgs/pkgs/development/web/nodejs/v15.nix b/third_party/nixpkgs/pkgs/development/web/nodejs/v15.nix
index 23a14dc834..b5319493da 100644
--- a/third_party/nixpkgs/pkgs/development/web/nodejs/v15.nix
+++ b/third_party/nixpkgs/pkgs/development/web/nodejs/v15.nix
@@ -8,6 +8,6 @@ let
in
buildNodejs {
inherit enableNpm;
- version = "15.1.0";
- sha256 = "1fd0ck6nlmp937j00y17q2k9xszzwf4s383p1z4v4qzj0qzxflvk";
+ version = "15.2.0";
+ sha256 = "022kw29sjf46mgvwciihi2cmf9sfjpqi0xih8xpk7xiwfmx02ypn";
}
diff --git a/third_party/nixpkgs/pkgs/games/quakespasm/vulkan.nix b/third_party/nixpkgs/pkgs/games/quakespasm/vulkan.nix
index 49f9e68323..73639fd755 100644
--- a/third_party/nixpkgs/pkgs/games/quakespasm/vulkan.nix
+++ b/third_party/nixpkgs/pkgs/games/quakespasm/vulkan.nix
@@ -2,13 +2,13 @@
stdenv.mkDerivation rec {
pname = "vkquake";
- version = "1.05.0";
+ version = "1.05.1";
src = fetchFromGitHub {
owner = "Novum";
repo = "vkQuake";
rev = version;
- sha256 = "16ryjfkmnhlxv7b6yvyk3247q7ih4g90a7c4z501xiyp7h0wlsw8";
+ sha256 = "03b2vxpakp6zizb0m65q9lq800z67b052k01q251b3f04kr1waih";
};
sourceRoot = "source/Quake";
diff --git a/third_party/nixpkgs/pkgs/misc/drivers/sc-controller/default.nix b/third_party/nixpkgs/pkgs/misc/drivers/sc-controller/default.nix
index ff5fb6e5ee..23c5e3f9dc 100644
--- a/third_party/nixpkgs/pkgs/misc/drivers/sc-controller/default.nix
+++ b/third_party/nixpkgs/pkgs/misc/drivers/sc-controller/default.nix
@@ -55,6 +55,7 @@ buildPythonApplication rec {
meta = with lib; {
homepage = "https://github.com/kozec/sc-controller";
# donations: https://www.patreon.com/kozec
+ broken = true;
description = "User-mode driver and GUI for Steam Controller and other controllers";
license = licenses.gpl2;
platforms = platforms.linux;
diff --git a/third_party/nixpkgs/pkgs/misc/sndio/default.nix b/third_party/nixpkgs/pkgs/misc/sndio/default.nix
index 46c505ed43..34e60b8a4b 100644
--- a/third_party/nixpkgs/pkgs/misc/sndio/default.nix
+++ b/third_party/nixpkgs/pkgs/misc/sndio/default.nix
@@ -4,8 +4,8 @@ stdenv.mkDerivation rec {
pname = "sndio";
version = "1.7.0";
enableParallelBuilding = true;
- buildInputs = stdenv.lib.optionals stdenv.isLinux [ alsaLib ]
- ++ stdenv.lib.optionals stdenv.isDarwin [ fixDarwinDylibNames ];
+ nativeBuildInputs = stdenv.lib.optional stdenv.hostPlatform.isDarwin fixDarwinDylibNames;
+ buildInputs = stdenv.lib.optional stdenv.hostPlatform.isLinux alsaLib;
src = fetchurl {
url = "http://www.sndio.org/sndio-${version}.tar.gz";
diff --git a/third_party/nixpkgs/pkgs/misc/vscode-extensions/default.nix b/third_party/nixpkgs/pkgs/misc/vscode-extensions/default.nix
index 53796981e5..cd1d4ab285 100644
--- a/third_party/nixpkgs/pkgs/misc/vscode-extensions/default.nix
+++ b/third_party/nixpkgs/pkgs/misc/vscode-extensions/default.nix
@@ -179,8 +179,8 @@ stdenv.lib.mapAttrs (_n: stdenv.lib.recurseIntoAttrs)
mktplcRef = {
name = "scala";
publisher = "scala-lang";
- version = "0.3.8";
- sha256 = "17dl10m3ayf57sqgil4mr9fjdm7i8gb5clrs227b768pp2d39ll9";
+ version = "0.4.5";
+ sha256 = "0nrj32a7a86vwc9gfh748xs3mmfwbc304dp7nks61f0lx8b4wzxw";
};
meta = {
license = stdenv.lib.licenses.mit;
@@ -191,8 +191,8 @@ stdenv.lib.mapAttrs (_n: stdenv.lib.recurseIntoAttrs)
mktplcRef = {
name = "metals";
publisher = "scalameta";
- version = "1.9.4";
- sha256 = "029s1al1f3qk4pa3539rs045g9jwkhbmdg7wj7biqc6shcria4ca";
+ version = "1.9.6";
+ sha256 = "12sjzk64kz7z8zqh3zg1dyb3v4c5xxgi1ain1jvw8hwf0hicqlgi";
};
meta = {
license = stdenv.lib.licenses.asl20;
diff --git a/third_party/nixpkgs/pkgs/os-specific/darwin/apple-source-releases/adv_cmds/default.nix b/third_party/nixpkgs/pkgs/os-specific/darwin/apple-source-releases/adv_cmds/default.nix
index 0cbd7d81b9..6113eed007 100644
--- a/third_party/nixpkgs/pkgs/os-specific/darwin/apple-source-releases/adv_cmds/default.nix
+++ b/third_party/nixpkgs/pkgs/os-specific/darwin/apple-source-releases/adv_cmds/default.nix
@@ -3,27 +3,22 @@
appleDerivation {
# We can't just run the root build, because https://github.com/facebook/xcbuild/issues/264
+ patchPhase = ''
+ substituteInPlace adv_cmds.xcodeproj/project.pbxproj \
+ --replace '/usr/lib/libtermcap.dylib' 'libncurses.dylib'
+ '';
+
# pkill requires special private headers that are unavailable in
# NixPkgs. These ones are needed:
# - xpc/xpxc.h
# - os/base_private.h
# - _simple.h
# We disable it here for now. TODO: build pkill inside adv_cmds
-
- # We also disable locale here because of some issues with a missing
- # "lstdc++".
- patchPhase = ''
- substituteInPlace adv_cmds.xcodeproj/project.pbxproj \
- --replace "FD201DC214369B4200906237 /* pkill.c in Sources */," "" \
- --replace "FDF278D60FC6204E00D7A3C6 /* locale.cc in Sources */," "" \
- --replace '/usr/lib/libtermcap.dylib' 'libncurses.dylib'
- '';
-
buildPhase = ''
targets=$(xcodebuild -list \
| awk '/Targets:/{p=1;print;next} p&&/^\s*$/{p=0};p' \
| tail -n +2 | sed 's/^[ \t]*//' \
- | grep -v -e Desktop -e Embedded -e mklocale -e colldef)
+ | grep -v -e Desktop -e Embedded -e mklocale -e pkill -e pgrep -e colldef)
for i in $targets; do
xcodebuild SYMROOT=$PWD/Products OBJROOT=$PWD/Intermediates -target $i
@@ -34,7 +29,7 @@ appleDerivation {
installPhase = ''
for f in Products/Release/*; do
if [ -f $f ]; then
- install -D $file $out/bin/$(basename $f)
+ install -D $f $out/bin/$(basename $f)
fi
done
diff --git a/third_party/nixpkgs/pkgs/os-specific/darwin/libtapi/default.nix b/third_party/nixpkgs/pkgs/os-specific/darwin/libtapi/default.nix
index 1f1e00d13f..a6bc16d42f 100644
--- a/third_party/nixpkgs/pkgs/os-specific/darwin/libtapi/default.nix
+++ b/third_party/nixpkgs/pkgs/os-specific/darwin/libtapi/default.nix
@@ -1,7 +1,9 @@
{ lib, stdenv, fetchFromGitHub, cmake, python3, ncurses }:
-stdenv.mkDerivation {
- name = "libtapi-1000.10.8";
+stdenv.mkDerivation rec {
+ pname = "libtapi";
+ version = "1000.10.8"; # determined by looking at VERSION.txt
+
src = fetchFromGitHub {
owner = "tpoechtrager";
repo = "apple-libtapi";
@@ -33,11 +35,13 @@ stdenv.mkDerivation {
installTargets = [ "install-libtapi" "install-tapi-headers" ];
- postInstall = ''
+ postInstall = lib.optionalString stdenv.isDarwin ''
install_name_tool -id $out/lib/libtapi.dylib $out/lib/libtapi.dylib
'';
meta = with lib; {
+ description = "Replaces the Mach-O Dynamic Library Stub files in Apple's SDKs to reduce the size";
+ homepage = "https://github.com/tpoechtrager/apple-libtapi";
license = licenses.apsl20;
maintainers = with maintainers; [ matthewbauer ];
};
diff --git a/third_party/nixpkgs/pkgs/os-specific/linux/alsa-topology-conf/default.nix b/third_party/nixpkgs/pkgs/os-specific/linux/alsa-topology-conf/default.nix
index 54340d017a..4b6678d09b 100644
--- a/third_party/nixpkgs/pkgs/os-specific/linux/alsa-topology-conf/default.nix
+++ b/third_party/nixpkgs/pkgs/os-specific/linux/alsa-topology-conf/default.nix
@@ -2,11 +2,11 @@
stdenv.mkDerivation rec {
name = "alsa-topology-conf-${version}";
- version = "1.2.3";
+ version = "1.2.4";
src = fetchurl {
url = "mirror://alsa/lib/${name}.tar.bz2";
- sha256 = "1zwxc9zhfcmyffjjbibzpdvf4kx7wv9g2zl6xz7y0d6srfr9jgw3";
+ sha256 = "01zdg6q4s6d01k39z96wi4vbhrfw1i2g4yi5dijwfk6a5vjfdq2m";
};
dontBuild = true;
diff --git a/third_party/nixpkgs/pkgs/os-specific/linux/alsa-ucm-conf/default.nix b/third_party/nixpkgs/pkgs/os-specific/linux/alsa-ucm-conf/default.nix
index 2a9f28c855..3ee8004381 100644
--- a/third_party/nixpkgs/pkgs/os-specific/linux/alsa-ucm-conf/default.nix
+++ b/third_party/nixpkgs/pkgs/os-specific/linux/alsa-ucm-conf/default.nix
@@ -2,11 +2,11 @@
stdenv.mkDerivation rec {
name = "alsa-ucm-conf-${version}";
- version = "1.2.3";
+ version = "1.2.4";
src = fetchurl {
url = "mirror://alsa/lib/${name}.tar.bz2";
- sha256 = "000db5yla7dljidjbbwbiaxvc1a7wh1zpw694gipaymj9fh4vhhv";
+ sha256 = "0h6kzi1cfdqyxp4pwpqh5wb89c8s9wrgix315bvamffwfxf56frc";
};
dontBuild = true;
diff --git a/third_party/nixpkgs/pkgs/os-specific/linux/batman-adv/version.nix b/third_party/nixpkgs/pkgs/os-specific/linux/batman-adv/version.nix
index e617881a57..d93f8a6c46 100644
--- a/third_party/nixpkgs/pkgs/os-specific/linux/batman-adv/version.nix
+++ b/third_party/nixpkgs/pkgs/os-specific/linux/batman-adv/version.nix
@@ -1,9 +1,9 @@
{
- version = "2020.3";
+ version = "2020.4";
sha256 = {
- batman-adv = "0wrzh0k44zzjx2s5zj65hjkh4jm9y38qpis1s5cbx9cyj756slb5";
- alfred = "13bvccz90pkjl09jyw68gj23pbrw9b05w1vhds9sjggwf3jkj5w2";
- batctl = "0r2w2v4sy6wgr7mp9lc7yj9k4ldsbsm3425rjil7p0b17zmzf4rm";
+ batman-adv = "1cxr0zmn9nzisawkrfk0gzd9fx0pg6261c889kz47hwp4f545v6d";
+ alfred = "1ay69nifzghpbvy11fdca5cllkn852h6rg045lci4vzgqf7b2bd2";
+ batctl = "05rrpfbpdhxn5zgdps849qls2ifis6a94cjryb60d4y1nc2n0d7w";
};
}
diff --git a/third_party/nixpkgs/pkgs/os-specific/linux/bluez/default.nix b/third_party/nixpkgs/pkgs/os-specific/linux/bluez/default.nix
index 401ab39bca..8e110fb13a 100644
--- a/third_party/nixpkgs/pkgs/os-specific/linux/bluez/default.nix
+++ b/third_party/nixpkgs/pkgs/os-specific/linux/bluez/default.nix
@@ -19,11 +19,11 @@
];
in stdenv.mkDerivation rec {
pname = "bluez";
- version = "5.54";
+ version = "5.55";
src = fetchurl {
url = "mirror://kernel/linux/bluetooth/${pname}-${version}.tar.xz";
- sha256 = "1p2ncvjz6alr9n3l5wvq2arqgc7xjs6dqyar1l9jp0z8cfgapkb8";
+ sha256 = "124v9s4y1s7s6klx5vlmzpk1jlr4x84ch7r7scm7x2f42dqp2qw8";
};
buildInputs = [
diff --git a/third_party/nixpkgs/pkgs/os-specific/linux/bolt/default.nix b/third_party/nixpkgs/pkgs/os-specific/linux/bolt/default.nix
index 114a90129a..8bd442843b 100644
--- a/third_party/nixpkgs/pkgs/os-specific/linux/bolt/default.nix
+++ b/third_party/nixpkgs/pkgs/os-specific/linux/bolt/default.nix
@@ -1,28 +1,49 @@
-{ stdenv, meson, ninja, pkgconfig, fetchFromGitLab,
- python3, umockdev, gobject-introspection, dbus,
- asciidoc, libxml2, libxslt, docbook_xml_dtd_45, docbook_xsl,
- glib, systemd, polkit
+{ stdenv
+, meson
+, ninja
+, pkgconfig
+, fetchFromGitLab
+, python3
+, umockdev
+, gobject-introspection
+, dbus
+, asciidoc
+, libxml2
+, libxslt
+, docbook_xml_dtd_45
+, docbook_xsl
+, glib
+, systemd
+, polkit
}:
stdenv.mkDerivation rec {
pname = "bolt";
- version = "0.8";
+ version = "0.9";
src = fetchFromGitLab {
domain = "gitlab.freedesktop.org";
owner = "bolt";
repo = "bolt";
rev = version;
- sha256 = "1qamls0fll0qc27lqavf56hv1yj6v6n4ry90g7bcnwpvccmd82yd";
+ sha256 = "sha256-lcJE+bMK2S2GObHMy/Fu12WGb3T1HrWjsNyZPz4/f4E=";
};
nativeBuildInputs = [
- meson ninja pkgconfig
- asciidoc libxml2 libxslt docbook_xml_dtd_45 docbook_xsl
+ asciidoc
+ docbook_xml_dtd_45
+ docbook_xsl
+ libxml2
+ libxslt
+ meson
+ ninja
+ pkgconfig
] ++ stdenv.lib.optional (!doCheck) python3;
buildInputs = [
- glib systemd polkit
+ glib
+ polkit
+ systemd
];
doCheck = true;
@@ -32,7 +53,9 @@ stdenv.mkDerivation rec {
'';
checkInputs = [
- dbus umockdev gobject-introspection
+ dbus
+ gobject-introspection
+ umockdev
(python3.withPackages
(p: [ p.pygobject3 p.dbus-python p.python-dbusmock ]))
];
@@ -55,7 +78,7 @@ stdenv.mkDerivation rec {
description = "Thunderbolt 3 device management daemon";
homepage = "https://gitlab.freedesktop.org/bolt/bolt";
license = licenses.lgpl21Plus;
- maintainers = [ maintainers.callahad ];
+ maintainers = with maintainers; [ callahad ];
platforms = platforms.linux;
};
}
diff --git a/third_party/nixpkgs/pkgs/os-specific/linux/firmware/fwupd/add-option-for-installation-sysconfdir.patch b/third_party/nixpkgs/pkgs/os-specific/linux/firmware/fwupd/add-option-for-installation-sysconfdir.patch
index a727e5f4a8..6faa607935 100644
--- a/third_party/nixpkgs/pkgs/os-specific/linux/firmware/fwupd/add-option-for-installation-sysconfdir.patch
+++ b/third_party/nixpkgs/pkgs/os-specific/linux/firmware/fwupd/add-option-for-installation-sysconfdir.patch
@@ -1,5 +1,5 @@
diff --git a/data/meson.build b/data/meson.build
-index bb749fd4..b611875b 100644
+index 14454458..12a798c0 100644
--- a/data/meson.build
+++ b/data/meson.build
@@ -17,7 +17,7 @@ endif
@@ -73,10 +73,10 @@ index 826a3c1d..b78db663 100644
+ install_dir: join_paths(sysconfdir_install, 'fwupd', 'remotes.d'),
)
diff --git a/meson.build b/meson.build
-index 87ea67e5..3a4374db 100644
+index a6fb55dd..aedb7530 100644
--- a/meson.build
+++ b/meson.build
-@@ -175,6 +175,12 @@ endif
+@@ -183,6 +183,12 @@ endif
mandir = join_paths(prefix, get_option('mandir'))
localedir = join_paths(prefix, get_option('localedir'))
@@ -90,19 +90,16 @@ index 87ea67e5..3a4374db 100644
gio = dependency('gio-2.0', version : '>= 2.45.8')
giounix = dependency('gio-unix-2.0', version : '>= 2.45.8', required: false)
diff --git a/meson_options.txt b/meson_options.txt
-index 3da9b6c4..6c80275b 100644
+index 0a0e2853..198ae930 100644
--- a/meson_options.txt
+++ b/meson_options.txt
-@@ -24,6 +24,7 @@ option('plugin_coreboot', type : 'boolean', value : true, description : 'enable
- option('systemd', type : 'boolean', value : true, description : 'enable systemd support')
- option('systemdunitdir', type: 'string', value: '', description: 'Directory for systemd units')
- option('elogind', type : 'boolean', value : false, description : 'enable elogind support')
+@@ -1,3 +1,4 @@
+option('sysconfdir_install', type: 'string', value: '', description: 'sysconfdir to use during installation')
- option('tests', type : 'boolean', value : true, description : 'enable tests')
- option('udevdir', type: 'string', value: '', description: 'Directory for udev rules')
- option('efi-cc', type : 'string', value : 'gcc', description : 'the compiler to use for EFI modules')
+ option('build', type : 'combo', choices : ['all', 'standalone', 'library'], value : 'all', description : 'build type')
+ option('agent', type : 'boolean', value : true, description : 'enable the fwupd agent')
+ option('consolekit', type : 'boolean', value : true, description : 'enable ConsoleKit support')
diff --git a/plugins/ata/meson.build b/plugins/ata/meson.build
-index 8444bb8a..fa4a8ad1 100644
+index f32b97fe..679ccc7b 100644
--- a/plugins/ata/meson.build
+++ b/plugins/ata/meson.build
@@ -7,7 +7,7 @@ install_data([
@@ -125,11 +122,37 @@ index ed4eee70..76dbdb1d 100644
- install_dir: join_paths(sysconfdir, 'fwupd', 'remotes.d'),
+ install_dir: join_paths(sysconfdir_install, 'fwupd', 'remotes.d'),
)
+diff --git a/plugins/msr/meson.build b/plugins/msr/meson.build
+index d829e153..e2917bbe 100644
+--- a/plugins/msr/meson.build
++++ b/plugins/msr/meson.build
+@@ -5,7 +5,7 @@ install_data(['msr.quirk'],
+ )
+
+ install_data(['fwupd-msr.conf'],
+- install_dir: join_paths(sysconfdir, 'modules-load.d')
++ install_dir: join_paths(sysconfdir_install, 'modules-load.d')
+ )
+
+ shared_module('fu_plugin_msr',
+diff --git a/plugins/platform-integrity/meson.build b/plugins/platform-integrity/meson.build
+index 6f1c4bc5..c5d043fc 100644
+--- a/plugins/platform-integrity/meson.build
++++ b/plugins/platform-integrity/meson.build
+@@ -7,7 +7,7 @@ install_data([
+ )
+
+ install_data(['fwupd-platform-integrity.conf'],
+- install_dir: join_paths(sysconfdir, 'modules-load.d')
++ install_dir: join_paths(sysconfdir_install, 'modules-load.d')
+ )
+
+ shared_module('fu_plugin_platform_integrity',
diff --git a/plugins/redfish/meson.build b/plugins/redfish/meson.build
-index 25fc5c7d..77eb9a83 100644
+index 92762791..08bb37ea 100644
--- a/plugins/redfish/meson.build
+++ b/plugins/redfish/meson.build
-@@ -27,7 +27,7 @@ shared_module('fu_plugin_redfish',
+@@ -26,7 +26,7 @@ shared_module('fu_plugin_redfish',
)
install_data(['redfish.conf'],
@@ -139,10 +162,10 @@ index 25fc5c7d..77eb9a83 100644
if get_option('tests')
diff --git a/plugins/thunderbolt/meson.build b/plugins/thunderbolt/meson.build
-index 06ab34ee..297a9182 100644
+index 6b2368fb..2bd06fed 100644
--- a/plugins/thunderbolt/meson.build
+++ b/plugins/thunderbolt/meson.build
-@@ -46,7 +46,7 @@ executable('tbtfwucli',
+@@ -31,7 +31,7 @@ fu_plugin_thunderbolt = shared_module('fu_plugin_thunderbolt',
)
install_data(['thunderbolt.conf'],
@@ -152,10 +175,10 @@ index 06ab34ee..297a9182 100644
# we use functions from 2.52 in the tests
if get_option('tests') and umockdev.found() and gio.version().version_compare('>= 2.52')
diff --git a/plugins/uefi/meson.build b/plugins/uefi/meson.build
-index 5838cecc..9ba3d5cd 100644
+index 2d1b2d22..c4217a72 100644
--- a/plugins/uefi/meson.build
+++ b/plugins/uefi/meson.build
-@@ -101,7 +101,7 @@ if get_option('man')
+@@ -97,7 +97,7 @@ if get_option('man')
endif
install_data(['uefi.conf'],
diff --git a/third_party/nixpkgs/pkgs/os-specific/linux/firmware/fwupd/default.nix b/third_party/nixpkgs/pkgs/os-specific/linux/firmware/fwupd/default.nix
index d502d049ac..85f5bbbf5b 100644
--- a/third_party/nixpkgs/pkgs/os-specific/linux/firmware/fwupd/default.nix
+++ b/third_party/nixpkgs/pkgs/os-specific/linux/firmware/fwupd/default.nix
@@ -3,6 +3,7 @@
{ stdenv
, fetchurl
, fetchpatch
+, fetchFromGitHub
, substituteAll
, gtk-doc
, pkg-config
@@ -88,7 +89,7 @@ let
self = stdenv.mkDerivation rec {
pname = "fwupd";
- version = "1.4.6";
+ version = "1.5.1";
# libfwupd goes to lib
# daemon, plug-ins and libfwupdplugin go to out
@@ -97,7 +98,7 @@ let
src = fetchurl {
url = "https://people.freedesktop.org/~hughsient/releases/fwupd-${version}.tar.xz";
- sha256 = "AKG5stioIveQc7ooYb/2UoOaBzbPUFzYk8tZK0rzvK0=";
+ sha256 = "0fpxcl6bighiipyl4qspjhi0lwisrgq8jdahm68mk34rmrx50sgf";
};
patches = [
@@ -118,6 +119,12 @@ let
# Needs a different set of modules than po/make-images.
inherit installedTestsPython;
})
+
+ # Skip tests requiring network.
+ (fetchpatch {
+ url = "https://github.com/fwupd/fwupd/commit/db15442c7c217610954786bd40779c14ed0e034b.patch";
+ sha256 = "/jzpGMJcqLisjecKpSUfA8ZCU53n7BOPR6tMgEX/qL8=";
+ })
];
nativeBuildInputs = [
@@ -229,6 +236,19 @@ let
addToSearchPath XDG_DATA_DIRS "${shared-mime-info}/share"
'';
+ postInstall =
+ let
+ testFw = fetchFromGitHub {
+ owner = "fwupd";
+ repo = "fwupd-test-firmware";
+ rev = "42b62c62dc85ecfb8e38099fe5de0625af87a722";
+ sha256 = "XUpxE003DZSeLJMtyV5UN5CNHH89/nEVKpCbMStm91Q=";
+ };
+ in ''
+ # These files have weird licenses so they are shipped separately.
+ cp --recursive --dereference "${testFw}/installed-tests/tests" "$installedTests/libexec/installed-tests/fwupd"
+ '';
+
preFixup = let
binPath = [
efibootmgr
@@ -254,6 +274,8 @@ let
done
'';
+ separateDebugInfo = true;
+
passthru = {
filesInstalledToEtc = [
"fwupd/ata.conf"
@@ -277,8 +299,8 @@ let
"fwupd/remotes.d/dell-esrt.conf"
];
- # BlacklistPlugins key in fwupd/daemon.conf
- defaultBlacklistedPlugins = [
+ # DisabledPlugins key in fwupd/daemon.conf
+ defaultDisabledPlugins = [
"test"
"invalid"
];
@@ -302,9 +324,9 @@ let
config = configparser.RawConfigParser()
config.read('${self}/etc/fwupd/daemon.conf')
- package_blacklisted_plugins = config.get('fwupd', 'BlacklistPlugins').rstrip(';').split(';')
- passthru_blacklisted_plugins = ${listToPy passthru.defaultBlacklistedPlugins}
- assert package_blacklisted_plugins == passthru_blacklisted_plugins, f'Default blacklisted plug-ins in the package {package_blacklisted_plugins} do not match those listed in passthru.defaultBlacklistedPlugins {passthru_blacklisted_plugins}'
+ package_disabled_plugins = config.get('fwupd', 'DisabledPlugins').rstrip(';').split(';')
+ passthru_disabled_plugins = ${listToPy passthru.defaultDisabledPlugins}
+ assert package_disabled_plugins == passthru_disabled_plugins, f'Default disabled plug-ins in the package {package_disabled_plugins} do not match those listed in passthru.defaultDisabledPlugins {passthru_disabled_plugins}'
pathlib.Path(os.getenv('out')).touch()
'';
diff --git a/third_party/nixpkgs/pkgs/os-specific/linux/firmware/fwupd/installed-tests-path.patch b/third_party/nixpkgs/pkgs/os-specific/linux/firmware/fwupd/installed-tests-path.patch
index 432056cbe7..d8f1a533b8 100644
--- a/third_party/nixpkgs/pkgs/os-specific/linux/firmware/fwupd/installed-tests-path.patch
+++ b/third_party/nixpkgs/pkgs/os-specific/linux/firmware/fwupd/installed-tests-path.patch
@@ -1,3 +1,5 @@
+diff --git a/data/device-tests/hardware.py b/data/device-tests/hardware.py
+index 7f1e1907..10fee1b8 100755
--- a/data/device-tests/hardware.py
+++ b/data/device-tests/hardware.py
@@ -1,4 +1,4 @@
@@ -6,25 +8,41 @@
# pylint: disable=wrong-import-position,too-many-locals,unused-argument,wrong-import-order
#
# Copyright (C) 2017 Richard Hughes
+diff --git a/data/installed-tests/meson.build b/data/installed-tests/meson.build
+index adadbcdd..1b51bb9c 100644
--- a/data/installed-tests/meson.build
+++ b/data/installed-tests/meson.build
-@@ -1,4 +1,4 @@
--installed_test_datadir = join_paths(datadir, 'installed-tests', 'fwupd')
-+installed_test_datadir = join_paths(get_option('installed_test_prefix'), 'share', 'installed-tests', 'fwupd')
-
- con2 = configuration_data()
- con2.set('installedtestsdir', installed_test_datadir)
-@@ -52,5 +52,5 @@ configure_file(
+@@ -65,5 +65,5 @@ configure_file(
output : 'fwupd-tests.conf',
configuration : con2,
install: true,
- install_dir: join_paths(sysconfdir, 'fwupd', 'remotes.d'),
+ install_dir: join_paths(get_option('installed_test_prefix'), 'etc', 'fwupd', 'remotes.d'),
)
+diff --git a/meson.build b/meson.build
+index 772b7bbe..f59302cd 100644
+--- a/meson.build
++++ b/meson.build
+@@ -177,8 +177,8 @@ else
+ datadir = join_paths(prefix, get_option('datadir'))
+ sysconfdir = join_paths(prefix, get_option('sysconfdir'))
+ localstatedir = join_paths(prefix, get_option('localstatedir'))
+- installed_test_bindir = join_paths(libexecdir, 'installed-tests', meson.project_name())
+- installed_test_datadir = join_paths(datadir, 'installed-tests', meson.project_name())
++ installed_test_bindir = join_paths(get_option('installed_test_prefix'), 'libexec', 'installed-tests', meson.project_name())
++ installed_test_datadir = join_paths(get_option('installed_test_prefix'), 'share', 'installed-tests', meson.project_name())
+ endif
+ mandir = join_paths(prefix, get_option('mandir'))
+ localedir = join_paths(prefix, get_option('localedir'))
+diff --git a/meson_options.txt b/meson_options.txt
+index 0a0e2853..5f68d78b 100644
--- a/meson_options.txt
+++ b/meson_options.txt
-@@ -1,3 +1,4 @@
-+option('installed_test_prefix', type: 'string', value: '', description: 'Prefix for installed tests')
- option('build', type : 'combo', choices : ['all', 'standalone', 'library'], value : 'all', description : 'build type')
- option('agent', type : 'boolean', value : true, description : 'enable the fwupd agent')
- option('consolekit', type : 'boolean', value : true, description : 'enable ConsoleKit support')
+@@ -25,6 +26,7 @@ option('plugin_coreboot', type : 'boolean', value : true, description : 'enable
+ option('systemd', type : 'boolean', value : true, description : 'enable systemd support')
+ option('systemd_root_prefix', type: 'string', value: '', description: 'Directory to base systemd’s installation directories on')
+ option('elogind', type : 'boolean', value : false, description : 'enable elogind support')
++option('installed_test_prefix', type: 'string', description: 'Prefix for installed tests')
+ option('tests', type : 'boolean', value : true, description : 'enable tests')
+ option('tpm', type : 'boolean', value : true, description : 'enable TPM support')
+ option('udevdir', type: 'string', value: '', description: 'Directory for udev rules')
diff --git a/third_party/nixpkgs/pkgs/os-specific/linux/jfbview/default.nix b/third_party/nixpkgs/pkgs/os-specific/linux/jfbview/default.nix
index f8e211fb28..7984e26780 100644
--- a/third_party/nixpkgs/pkgs/os-specific/linux/jfbview/default.nix
+++ b/third_party/nixpkgs/pkgs/os-specific/linux/jfbview/default.nix
@@ -1,5 +1,5 @@
{ stdenv, fetchFromGitHub
-, freetype, harfbuzz, jbig2dec, libjpeg, libX11, mupdf, ncurses, openjpeg
+, freetype, harfbuzz, jbig2dec, libjpeg, libX11, mupdf_1_17, ncurses, openjpeg
, openssl
, imageSupport ? true, imlib2 ? null }:
@@ -32,7 +32,7 @@ stdenv.mkDerivation rec {
hardeningDisable = [ "format" ];
buildInputs = [
- freetype harfbuzz jbig2dec libjpeg libX11 mupdf ncurses openjpeg
+ freetype harfbuzz jbig2dec libjpeg libX11 mupdf_1_17 ncurses openjpeg
openssl
] ++ stdenv.lib.optionals imageSupport [
imlib2
diff --git a/third_party/nixpkgs/pkgs/os-specific/linux/kernel/hardened/patches.json b/third_party/nixpkgs/pkgs/os-specific/linux/kernel/hardened/patches.json
index f97474556c..101b8fdb6c 100644
--- a/third_party/nixpkgs/pkgs/os-specific/linux/kernel/hardened/patches.json
+++ b/third_party/nixpkgs/pkgs/os-specific/linux/kernel/hardened/patches.json
@@ -1,18 +1,18 @@
{
"4.14": {
- "name": "linux-hardened-4.14.204.a.patch",
- "sha256": "1vwja9mqycw3322p8a896l9mkxvzym6r9q17zfgwpqi3kvr9k74h",
- "url": "https://github.com/anthraxx/linux-hardened/releases/download/4.14.204.a/linux-hardened-4.14.204.a.patch"
+ "name": "linux-hardened-4.14.206.a.patch",
+ "sha256": "17pd23lvhkpa923nw24g5b0gv0kmzj9jkkmc8366k86r0zxk6z53",
+ "url": "https://github.com/anthraxx/linux-hardened/releases/download/4.14.206.a/linux-hardened-4.14.206.a.patch"
},
"4.19": {
- "name": "linux-hardened-4.19.155.a.patch",
- "sha256": "0jrvd9yws7cym08j28r7wv3i83zlk5z0vl0l1mibak04h43mibgf",
- "url": "https://github.com/anthraxx/linux-hardened/releases/download/4.19.155.a/linux-hardened-4.19.155.a.patch"
+ "name": "linux-hardened-4.19.157.a.patch",
+ "sha256": "159v7z1a55b5kcmkrdna18hvcnscxf79r00kvr0kl8flvsnhf1p0",
+ "url": "https://github.com/anthraxx/linux-hardened/releases/download/4.19.157.a/linux-hardened-4.19.157.a.patch"
},
"5.4": {
- "name": "linux-hardened-5.4.75.a.patch",
- "sha256": "169m2a3wm5lsyzp7cp8nvxarhgcnan41ap7k5r7jx7x1frx2vzxm",
- "url": "https://github.com/anthraxx/linux-hardened/releases/download/5.4.75.a/linux-hardened-5.4.75.a.patch"
+ "name": "linux-hardened-5.4.77.a.patch",
+ "sha256": "0b47id64vi55s7lmyasmvhwbfcv9cjwfhw9g4lf220g0rnl6h8jm",
+ "url": "https://github.com/anthraxx/linux-hardened/releases/download/5.4.77.a/linux-hardened-5.4.77.a.patch"
},
"5.8": {
"name": "linux-hardened-5.8.18.a.patch",
@@ -20,8 +20,8 @@
"url": "https://github.com/anthraxx/linux-hardened/releases/download/5.8.18.a/linux-hardened-5.8.18.a.patch"
},
"5.9": {
- "name": "linux-hardened-5.9.6.a.patch",
- "sha256": "1h25jkbp0yz2jfmbnwrldd1rcpag8mbf8dv6kc79j7qg1agafxkn",
- "url": "https://github.com/anthraxx/linux-hardened/releases/download/5.9.6.a/linux-hardened-5.9.6.a.patch"
+ "name": "linux-hardened-5.9.8.a.patch",
+ "sha256": "1sb4rsd3yfh49aqg5j24zav9x38c44q7d9pyx6pb8pl368rd26l4",
+ "url": "https://github.com/anthraxx/linux-hardened/releases/download/5.9.8.a/linux-hardened-5.9.8.a.patch"
}
}
diff --git a/third_party/nixpkgs/pkgs/os-specific/linux/kernel/linux-4.14.nix b/third_party/nixpkgs/pkgs/os-specific/linux/kernel/linux-4.14.nix
index dedd3485c2..99f20985cd 100644
--- a/third_party/nixpkgs/pkgs/os-specific/linux/kernel/linux-4.14.nix
+++ b/third_party/nixpkgs/pkgs/os-specific/linux/kernel/linux-4.14.nix
@@ -3,7 +3,7 @@
with stdenv.lib;
buildLinux (args // rec {
- version = "4.14.204";
+ version = "4.14.206";
# modDirVersion needs to be x.y.z, will automatically add .0 if needed
modDirVersion = if (modDirVersionArg == null) then concatStringsSep "." (take 3 (splitVersion "${version}.0")) else modDirVersionArg;
@@ -13,6 +13,6 @@ buildLinux (args // rec {
src = fetchurl {
url = "mirror://kernel/linux/kernel/v4.x/linux-${version}.tar.xz";
- sha256 = "1ncacsy2g80zigfx8nmr1f7v50s1y9ys1xy9jgizrnvmxjcji0wy";
+ sha256 = "1b46f0s15xnlam43cmw8w41rrvcwrhm6km0278lq6f86lpx3w8qw";
};
} // (args.argsOverride or {}))
diff --git a/third_party/nixpkgs/pkgs/os-specific/linux/kernel/linux-4.19.nix b/third_party/nixpkgs/pkgs/os-specific/linux/kernel/linux-4.19.nix
index dcde8fceba..6458f02da6 100644
--- a/third_party/nixpkgs/pkgs/os-specific/linux/kernel/linux-4.19.nix
+++ b/third_party/nixpkgs/pkgs/os-specific/linux/kernel/linux-4.19.nix
@@ -3,7 +3,7 @@
with stdenv.lib;
buildLinux (args // rec {
- version = "4.19.155";
+ version = "4.19.157";
# modDirVersion needs to be x.y.z, will automatically add .0 if needed
modDirVersion = if (modDirVersionArg == null) then concatStringsSep "." (take 3 (splitVersion "${version}.0")) else modDirVersionArg;
@@ -13,6 +13,6 @@ buildLinux (args // rec {
src = fetchurl {
url = "mirror://kernel/linux/kernel/v4.x/linux-${version}.tar.xz";
- sha256 = "1lj81aadyskmxs3j4s923nhnk69dfj2kiwm0nxabbcjw83sliinb";
+ sha256 = "0mgpgv2ny49bb7kgaygy2ay6ckjgw7mg091viivi66jw4mjs7p3n";
};
} // (args.argsOverride or {}))
diff --git a/third_party/nixpkgs/pkgs/os-specific/linux/kernel/linux-4.4.nix b/third_party/nixpkgs/pkgs/os-specific/linux/kernel/linux-4.4.nix
index 64d0114618..ad34346b91 100644
--- a/third_party/nixpkgs/pkgs/os-specific/linux/kernel/linux-4.4.nix
+++ b/third_party/nixpkgs/pkgs/os-specific/linux/kernel/linux-4.4.nix
@@ -1,11 +1,11 @@
{ stdenv, buildPackages, fetchurl, perl, buildLinux, ... } @ args:
buildLinux (args // rec {
- version = "4.4.241";
+ version = "4.4.243";
extraMeta.branch = "4.4";
src = fetchurl {
url = "mirror://kernel/linux/kernel/v4.x/linux-${version}.tar.xz";
- sha256 = "054jd6jgymxbkjfmk8wbckihl355gjimjg2xi5yr4v2343qi9zij";
+ sha256 = "1daqbmj9ka9wdkkym625hqwqaxq5n11y7c4yc9ln3xkjpnv4dplm";
};
} // (args.argsOverride or {}))
diff --git a/third_party/nixpkgs/pkgs/os-specific/linux/kernel/linux-4.9.nix b/third_party/nixpkgs/pkgs/os-specific/linux/kernel/linux-4.9.nix
index 2d81826d6c..3682f6fd5e 100644
--- a/third_party/nixpkgs/pkgs/os-specific/linux/kernel/linux-4.9.nix
+++ b/third_party/nixpkgs/pkgs/os-specific/linux/kernel/linux-4.9.nix
@@ -1,11 +1,11 @@
{ stdenv, buildPackages, fetchurl, perl, buildLinux, ... } @ args:
buildLinux (args // rec {
- version = "4.9.241";
+ version = "4.9.243";
extraMeta.branch = "4.9";
src = fetchurl {
url = "mirror://kernel/linux/kernel/v4.x/linux-${version}.tar.xz";
- sha256 = "0b5k9cwz7vpaybw4nd03pn2z4d8qbhmhd9mx4j2yd0fqj57x1in4";
+ sha256 = "111rlzx6z4kf8zwxncib96d9wy6qmkbs0cq3dhnybipwlyf1iank";
};
} // (args.argsOverride or {}))
diff --git a/third_party/nixpkgs/pkgs/os-specific/linux/kernel/linux-5.4.nix b/third_party/nixpkgs/pkgs/os-specific/linux/kernel/linux-5.4.nix
index 9db1ada350..93f7fc599b 100644
--- a/third_party/nixpkgs/pkgs/os-specific/linux/kernel/linux-5.4.nix
+++ b/third_party/nixpkgs/pkgs/os-specific/linux/kernel/linux-5.4.nix
@@ -3,7 +3,7 @@
with stdenv.lib;
buildLinux (args // rec {
- version = "5.4.75";
+ version = "5.4.77";
# modDirVersion needs to be x.y.z, will automatically add .0 if needed
modDirVersion = if (modDirVersionArg == null) then concatStringsSep "." (take 3 (splitVersion "${version}.0")) else modDirVersionArg;
@@ -13,6 +13,6 @@ buildLinux (args // rec {
src = fetchurl {
url = "mirror://kernel/linux/kernel/v5.x/linux-${version}.tar.xz";
- sha256 = "0w0lpiy56zqdm2vpx9ckxakna334n88pnqbv52zyfcslxgb6yinj";
+ sha256 = "1xyvml0mps7bsa11bgpa4l0w8x6pasdz9yab2z4ds394f1lkxq53";
};
} // (args.argsOverride or {}))
diff --git a/third_party/nixpkgs/pkgs/os-specific/linux/kernel/linux-5.9.nix b/third_party/nixpkgs/pkgs/os-specific/linux/kernel/linux-5.9.nix
index 59f18baa8c..0f81431147 100644
--- a/third_party/nixpkgs/pkgs/os-specific/linux/kernel/linux-5.9.nix
+++ b/third_party/nixpkgs/pkgs/os-specific/linux/kernel/linux-5.9.nix
@@ -3,7 +3,7 @@
with stdenv.lib;
buildLinux (args // rec {
- version = "5.9.6";
+ version = "5.9.8";
# modDirVersion needs to be x.y.z, will automatically add .0 if needed
modDirVersion = if (modDirVersionArg == null) then concatStringsSep "." (take 3 (splitVersion "${version}.0")) else modDirVersionArg;
@@ -13,6 +13,6 @@ buildLinux (args // rec {
src = fetchurl {
url = "mirror://kernel/linux/kernel/v5.x/linux-${version}.tar.xz";
- sha256 = "0w2kcng09nzk09dwkx4azdfgnwzbd2mz8lyl4j69bwx837z85hbc";
+ sha256 = "19l67gzk97higd2cbggipcb0wi21pv0ag0mc4qh6cqk564xp6mkn";
};
} // (args.argsOverride or {}))
diff --git a/third_party/nixpkgs/pkgs/os-specific/linux/kernel/linux-libre.nix b/third_party/nixpkgs/pkgs/os-specific/linux/kernel/linux-libre.nix
index 1e8514e9c2..a6ef21fe91 100644
--- a/third_party/nixpkgs/pkgs/os-specific/linux/kernel/linux-libre.nix
+++ b/third_party/nixpkgs/pkgs/os-specific/linux/kernel/linux-libre.nix
@@ -1,8 +1,8 @@
{ stdenv, lib, fetchsvn, linux
, scripts ? fetchsvn {
url = "https://www.fsfla.org/svn/fsfla/software/linux-libre/releases/branches/";
- rev = "17744";
- sha256 = "120jf6d1xrpwf8yfqzfqp8a1189lca0si8fxci16sf4bdg5q1had";
+ rev = "17762";
+ sha256 = "1fj77j9x20w8xwk2xmga625dv81c145gj01z8yxz8i3x2cxwccrs";
}
, ...
}:
diff --git a/third_party/nixpkgs/pkgs/os-specific/linux/libcap-ng/default.nix b/third_party/nixpkgs/pkgs/os-specific/linux/libcap-ng/default.nix
index c9b061fe03..cfcaea694e 100644
--- a/third_party/nixpkgs/pkgs/os-specific/linux/libcap-ng/default.nix
+++ b/third_party/nixpkgs/pkgs/os-specific/linux/libcap-ng/default.nix
@@ -6,11 +6,11 @@ stdenv.mkDerivation rec {
pname = "libcap-ng";
# When updating make sure to test that the version with
# all of the python bindings still works
- version = "0.7.10";
+ version = "0.7.11";
src = fetchurl {
url = "${meta.homepage}/${pname}-${version}.tar.gz";
- sha256 = "1gzzy12agfa9ddipdf72h9y68zqqnvsjjylv4vnq6hj4w2safk58";
+ sha256 = "1s8akhnnazk0b5c6z5i3x54rjb26p8pz2wdl1m21ml3231qmr0c5";
};
nativeBuildInputs = [ swig ];
diff --git a/third_party/nixpkgs/pkgs/os-specific/linux/pcm/default.nix b/third_party/nixpkgs/pkgs/os-specific/linux/pcm/default.nix
index 3e9a8d41b3..74042cf702 100644
--- a/third_party/nixpkgs/pkgs/os-specific/linux/pcm/default.nix
+++ b/third_party/nixpkgs/pkgs/os-specific/linux/pcm/default.nix
@@ -1,14 +1,14 @@
{ stdenv, fetchFromGitHub }:
stdenv.mkDerivation rec {
- version = "202009";
+ version = "202010";
pname = "pcm";
src = fetchFromGitHub {
owner = "opcm";
repo = "pcm";
rev = version;
- sha256 = "1phkdmbgvrmv5w0xa4i2j9v7lcxkxjdhzi5x6l52z9y9as30dzbd";
+ sha256 = "00i7bp7hqwnphh7qyjydvz5s14ydj8rwivz995bdnd37582dyij9";
};
installPhase = ''
diff --git a/third_party/nixpkgs/pkgs/os-specific/linux/systemd/0012-Install-default-configuration-into-out-share-factory.patch b/third_party/nixpkgs/pkgs/os-specific/linux/systemd/0012-Install-default-configuration-into-out-share-factory.patch
index d1961d32f9..a2d08753d4 100644
--- a/third_party/nixpkgs/pkgs/os-specific/linux/systemd/0012-Install-default-configuration-into-out-share-factory.patch
+++ b/third_party/nixpkgs/pkgs/os-specific/linux/systemd/0012-Install-default-configuration-into-out-share-factory.patch
@@ -16,6 +16,7 @@ store again, while having executables looking up files in /etc.
network/meson.build | 2 +-
src/core/meson.build | 10 +++++-----
src/coredump/meson.build | 2 +-
+ src/home/meson.build | 2 +-
src/journal-remote/meson.build | 4 ++--
src/journal/meson.build | 2 +-
src/kernel-install/meson.build | 2 +-
@@ -28,7 +29,7 @@ store again, while having executables looking up files in /etc.
sysctl.d/meson.build | 2 +-
tmpfiles.d/meson.build | 2 +-
units/meson.build | 2 +-
- 17 files changed, 29 insertions(+), 26 deletions(-)
+ 18 files changed, 30 insertions(+), 27 deletions(-)
diff --git a/hwdb.d/meson.build b/hwdb.d/meson.build
index 5c77387a26..6404bc01ba 100644
@@ -144,6 +145,17 @@ index 7fa5942697..34c865dfa0 100644
endif
tests += [
+diff --git a/src/home/meson.build b/src/home/meson.build
+index 797f3a3c6d..232904ab42 100644
+--- a/src/home/meson.build
++++ b/src/home/meson.build
+@@ -98,5 +98,5 @@ if conf.get('ENABLE_HOMED') == 1
+ install_dir : polkitpolicydir)
+
+ install_data('homed.conf',
+- install_dir : pkgsysconfdir)
++ install_dir : factoryconfdir)
+ endif
diff --git a/src/journal-remote/meson.build b/src/journal-remote/meson.build
index 87b8ba6495..daff8ec967 100644
--- a/src/journal-remote/meson.build
diff --git a/third_party/nixpkgs/pkgs/os-specific/linux/systemd/0019-revert-get-rid-of-seat_can_multi_session.patch b/third_party/nixpkgs/pkgs/os-specific/linux/systemd/0019-logind-seat-debus-show-CanMultiSession-again.patch
similarity index 72%
rename from third_party/nixpkgs/pkgs/os-specific/linux/systemd/0019-revert-get-rid-of-seat_can_multi_session.patch
rename to third_party/nixpkgs/pkgs/os-specific/linux/systemd/0019-logind-seat-debus-show-CanMultiSession-again.patch
index 6ed82a42e7..4f8cc0822d 100644
--- a/third_party/nixpkgs/pkgs/os-specific/linux/systemd/0019-revert-get-rid-of-seat_can_multi_session.patch
+++ b/third_party/nixpkgs/pkgs/os-specific/linux/systemd/0019-logind-seat-debus-show-CanMultiSession-again.patch
@@ -1,3 +1,13 @@
+From 3999d8949ddaf9296928f603661abcea13576d83 Mon Sep 17 00:00:00 2001
+From: Thomas Tuegel
+Date: Mon, 26 Oct 2020 21:21:38 +0100
+Subject: [PATCH 19/19] logind-seat-debus: show CanMultiSession again
+
+Fixes the "switch user" function in Plasma < 5.20.
+---
+ src/login/logind-seat-dbus.c | 2 +-
+ 1 file changed, 1 insertion(+), 1 deletion(-)
+
diff --git a/src/login/logind-seat-dbus.c b/src/login/logind-seat-dbus.c
index a91765205c..742aeb1064 100644
--- a/src/login/logind-seat-dbus.c
@@ -11,3 +21,6 @@ index a91765205c..742aeb1064 100644
SD_BUS_PROPERTY("CanTTY", "b", property_get_can_tty, 0, SD_BUS_VTABLE_PROPERTY_CONST),
SD_BUS_PROPERTY("CanGraphical", "b", property_get_can_graphical, 0, SD_BUS_VTABLE_PROPERTY_EMITS_CHANGE),
SD_BUS_PROPERTY("Sessions", "a(so)", property_get_sessions, 0, 0),
+--
+2.28.0
+
diff --git a/third_party/nixpkgs/pkgs/os-specific/linux/systemd/default.nix b/third_party/nixpkgs/pkgs/os-specific/linux/systemd/default.nix
index da99280f63..85c78ce142 100644
--- a/third_party/nixpkgs/pkgs/os-specific/linux/systemd/default.nix
+++ b/third_party/nixpkgs/pkgs/os-specific/linux/systemd/default.nix
@@ -1,60 +1,116 @@
-{ stdenv, lib, fetchFromGitHub
+{ stdenv
+, lib
+, fetchFromGitHub
, buildPackages
-, ninja, meson, m4, pkgconfig, coreutils, gperf, getent
-, patchelf, perl, glibcLocales, glib, substituteAll
-, gettext, python3Packages
+, ninja
+, meson
+, m4
+, pkgconfig
+, coreutils
+, gperf
+, getent
+, patchelf
+, glibcLocales
+, glib
+, substituteAll
+, gettext
+, python3Packages
-# Mandatory dependencies
+ # Mandatory dependencies
, libcap
, utillinux
, kbd
, kmod
-# Optional dependencies
-, pam, cryptsetup, lvm2, audit, acl
-, lz4, libgcrypt, libgpgerror, libidn2
-, curl, gnutar, gnupg, zlib
-, xz, libuuid, libffi
-, libapparmor, intltool
-, bzip2, pcre2, e2fsprogs
+ # Optional dependencies
+, pam
+, cryptsetup
+, lvm2
+, audit
+, acl
+, lz4
+, libgcrypt
+, libgpgerror
+, libidn2
+, curl
+, gnutar
+, gnupg
+, zlib
+, xz
+, libuuid
+, libapparmor
+, intltool
+, bzip2
+, pcre2
+, e2fsprogs
, linuxHeaders ? stdenv.cc.libc.linuxHeaders
, gnu-efi
, iptables
-, withSelinux ? false, libselinux
-, withLibseccomp ? lib.any (lib.meta.platformMatch stdenv.hostPlatform) libseccomp.meta.platforms, libseccomp
-, withKexectools ? lib.any (lib.meta.platformMatch stdenv.hostPlatform) kexectools.meta.platforms, kexectools
+, withSelinux ? false
+, libselinux
+, withLibseccomp ? lib.any (lib.meta.platformMatch stdenv.hostPlatform) libseccomp.meta.platforms
+, libseccomp
+, withKexectools ? lib.any (lib.meta.platformMatch stdenv.hostPlatform) kexectools.meta.platforms
+, kexectools
, bashInteractive
+, libmicrohttpd
-, withResolved ? true
-, withLogind ? true
+, withAnalyze ? true
+, withApparmor ? true
+, withCoredump ? true
+, withCompression ? true # adds bzip2, lz4 and xz
+, withCryptsetup ? true
+, withDocumentation ? true
+, withEfi ? stdenv.hostPlatform.isEfi
, withHostnamed ? true
+, withHwdb ? true
+, withImportd ? true
, withLocaled ? true
+, withLogind ? true
+, withMachined ? true
, withNetworkd ? true
+, withNss ? true
+, withPCRE2 ? true
+, withPolkit ? true
+, withRemote ? true
+, withResolved ? true
+, withShellCompletions ? true
, withTimedated ? true
, withTimesyncd ? true
-, withHwdb ? true
-, withEfi ? stdenv.hostPlatform.isEfi
-, withImportd ? true
-, withCryptsetup ? true
+, withUserDb ? true
+, withHomed ? false, p11-kit, libfido2
+# , withPortabled ? false TODO
-# name argument
+ # name argument
, pname ? "systemd"
-, libxslt, docbook_xsl, docbook_xml_dtd_42, docbook_xml_dtd_45
+, libxslt
+, docbook_xsl
+, docbook_xml_dtd_42
+, docbook_xml_dtd_45
}:
assert withResolved -> (libgcrypt != null && libgpgerror != null);
assert withImportd ->
- ( curl.dev != null && zlib != null && xz != null && libgcrypt != null
- && gnutar != null && gnupg != null);
+(curl.dev != null && zlib != null && xz != null && libgcrypt != null
+ && gnutar != null && gnupg != null && withCompression );
+
+assert withEfi -> (gnu-efi != null);
+assert withRemote -> lib.getDev curl != null;
+assert withCoredump -> withCompression;
+
+assert withHomed -> withCryptsetup;
assert withCryptsetup ->
- ( cryptsetup != null );
+(cryptsetup != null);
let
+ wantCurl = withRemote || withImportd;
+
version = "246.6";
-in stdenv.mkDerivation {
+in
+stdenv.mkDerivation {
inherit version pname;
# We use systemd/systemd-stable for src, and ship NixOS-specific patches inside nixpkgs directly
@@ -88,7 +144,7 @@ in stdenv.mkDerivation {
./0016-systemd-sleep-execute-scripts-in-etc-systemd-system-.patch
./0017-kmod-static-nodes.service-Update-ConditionFileNotEmp.patch
./0018-path-util.h-add-placeholder-for-DEFAULT_PATH_NORMAL.patch
- ./0019-revert-get-rid-of-seat_can_multi_session.patch
+ ./0019-logind-seat-debus-show-CanMultiSession-again.patch
];
postPatch = ''
@@ -105,29 +161,55 @@ in stdenv.mkDerivation {
outputs = [ "out" "man" "dev" ];
nativeBuildInputs =
- [ pkgconfig gperf
- ninja meson
+ [
+ pkgconfig
+ gperf
+ ninja
+ meson
coreutils # meson calls date, stat etc.
glibcLocales
- patchelf getent m4
- perl # to patch the libsystemd.so and remove dependencies on aarch64
+ patchelf
+ getent
+ m4
intltool
gettext
- libxslt docbook_xsl docbook_xml_dtd_42 docbook_xml_dtd_45
- (buildPackages.python3Packages.python.withPackages ( ps: with ps; [ python3Packages.lxml ]))
+ libxslt
+ docbook_xsl
+ docbook_xml_dtd_42
+ docbook_xml_dtd_45
+ (buildPackages.python3Packages.python.withPackages (ps: with ps; [ python3Packages.lxml ]))
];
+
buildInputs =
- [ linuxHeaders libcap curl.dev kmod xz pam acl
- cryptsetup libuuid glib libgcrypt libgpgerror libidn2
- pcre2 ] ++
- stdenv.lib.optional withKexectools kexectools ++
- stdenv.lib.optional withLibseccomp libseccomp ++
- [ libffi audit lz4 bzip2 libapparmor iptables ] ++
- stdenv.lib.optional withEfi gnu-efi ++
- stdenv.lib.optional withSelinux libselinux ++
- stdenv.lib.optional withCryptsetup cryptsetup.dev;
+ [
+ acl
+ audit
+ glib
+ kmod
+ libcap
+ libgcrypt
+ libidn2
+ libuuid
+ linuxHeaders
+ pam
+ ]
+
+ ++ lib.optional withApparmor libapparmor
+ ++ lib.optional wantCurl (lib.getDev curl)
+ ++ lib.optionals withCompression [ bzip2 lz4 xz ]
+ ++ lib.optional withCryptsetup (lib.getDev cryptsetup.dev)
+ ++ lib.optional withEfi gnu-efi
+ ++ lib.optional withKexectools kexectools
+ ++ lib.optional withLibseccomp libseccomp
+ ++ lib.optional withNetworkd iptables
+ ++ lib.optional withPCRE2 pcre2
+ ++ lib.optional withResolved libgpgerror
+ ++ lib.optional withSelinux libselinux
+ ++ lib.optional withRemote libmicrohttpd
+ ++ lib.optionals withHomed [ p11-kit libfido2 ]
+ ;
#dontAddPrefix = true;
@@ -143,27 +225,33 @@ in stdenv.mkDerivation {
"-Dsetfont-path=${kbd}/bin/setfont"
"-Dtty-gid=3" # tty in NixOS has gid 3
"-Ddebug-shell=${bashInteractive}/bin/bash"
+ "-Dglib=${lib.boolToString (glib != null)}"
# while we do not run tests we should also not build them. Removes about 600 targets
"-Dtests=false"
- "-Dimportd=${stdenv.lib.boolToString withImportd}"
- "-Dlz4=true"
- "-Dhomed=false"
- "-Dlogind=${stdenv.lib.boolToString withLogind}"
- "-Dlocaled=${stdenv.lib.boolToString withLocaled}"
- "-Dhostnamed=${stdenv.lib.boolToString withHostnamed}"
- "-Dnetworkd=${stdenv.lib.boolToString withNetworkd}"
- "-Dcryptsetup=${stdenv.lib.boolToString withCryptsetup}"
+ "-Danalyze=${lib.boolToString withAnalyze}"
+ "-Dgcrypt=${lib.boolToString (libgcrypt != null)}"
+ "-Dimportd=${lib.boolToString withImportd}"
+ "-Dlz4=${lib.boolToString withCompression}"
+ "-Dhomed=${stdenv.lib.boolToString withHomed}"
+ "-Dlogind=${lib.boolToString withLogind}"
+ "-Dlocaled=${lib.boolToString withLocaled}"
+ "-Dhostnamed=${lib.boolToString withHostnamed}"
+ "-Dmachined=${lib.boolToString withMachined}"
+ "-Dnetworkd=${lib.boolToString withNetworkd}"
+ "-Dpolkit=${lib.boolToString withPolkit}"
+ "-Dcryptsetup=${lib.boolToString withCryptsetup}"
"-Dportabled=false"
- "-Dhwdb=${stdenv.lib.boolToString withHwdb}"
- "-Dremote=false"
+ "-Dhwdb=${lib.boolToString withHwdb}"
+ "-Dremote=${lib.boolToString withRemote}"
"-Dsysusers=false"
- "-Dtimedated=${stdenv.lib.boolToString withTimedated}"
- "-Dtimesyncd=${stdenv.lib.boolToString withTimesyncd}"
+ "-Dtimedated=${lib.boolToString withTimedated}"
+ "-Dtimesyncd=${lib.boolToString withTimesyncd}"
+ "-Duserdb=${lib.boolToString withUserDb}"
+ "-Dcoredump=${lib.boolToString withCoredump}"
"-Dfirstboot=false"
- "-Dlocaled=true"
- "-Dresolve=${stdenv.lib.boolToString withResolved}"
+ "-Dresolve=${lib.boolToString withResolved}"
"-Dsplit-usr=false"
- "-Dlibcurl=true"
+ "-Dlibcurl=${lib.boolToString wantCurl}"
"-Dlibidn=false"
"-Dlibidn2=true"
"-Dquotacheck=false"
@@ -200,11 +288,20 @@ in stdenv.mkDerivation {
# more frequent development builds
"-Dman=true"
- "-Dgnu-efi=${stdenv.lib.boolToString (withEfi && gnu-efi != null)}"
- ] ++ stdenv.lib.optionals (withEfi && gnu-efi != null) [
+ "-Defi=${lib.boolToString withEfi}"
+ "-Dgnu-efi=${lib.boolToString withEfi}"
+ ] ++ lib.optionals withEfi [
"-Defi-libdir=${toString gnu-efi}/lib"
"-Defi-includedir=${toString gnu-efi}/include/efi"
"-Defi-ldsdir=${toString gnu-efi}/lib"
+ ] ++ lib.optionals (withShellCompletions == false) [
+ "-Dbashcompletiondir=no"
+ "-Dzshcompletiondir=no"
+ ] ++ lib.optionals (!withNss) [
+ "-Dnss-myhostname=false"
+ "-Dnss-mymachines=false"
+ "-Dnss-resolve=false"
+ "-Dnss-systemd=false"
];
preConfigure = ''
@@ -216,7 +313,6 @@ in stdenv.mkDerivation {
src/core/mount.c \
src/core/swap.c \
src/cryptsetup/cryptsetup-generator.c \
- src/fsck/fsck.c \
src/journal/cat.c \
src/nspawn/nspawn.c \
src/remount-fs/remount-fs.c \
@@ -233,8 +329,6 @@ in stdenv.mkDerivation {
--replace /sbin/mkswap ${lib.getBin utillinux}/sbin/mkswap \
--replace /sbin/swapon ${lib.getBin utillinux}/sbin/swapon \
--replace /sbin/swapoff ${lib.getBin utillinux}/sbin/swapoff \
- --replace /sbin/mke2fs ${lib.getBin e2fsprogs}/sbin/mke2fs \
- --replace /sbin/fsck ${lib.getBin utillinux}/sbin/fsck \
--replace /bin/echo ${coreutils}/bin/echo \
--replace /bin/cat ${coreutils}/bin/cat \
--replace /sbin/sulogin ${lib.getBin utillinux}/sbin/sulogin \
@@ -271,14 +365,17 @@ in stdenv.mkDerivation {
NIX_CFLAGS_COMPILE = toString [
# Can't say ${polkit.bin}/bin/pkttyagent here because that would
# lead to a cyclic dependency.
- "-UPOLKIT_AGENT_BINARY_PATH" "-DPOLKIT_AGENT_BINARY_PATH=\"/run/current-system/sw/bin/pkttyagent\""
+ "-UPOLKIT_AGENT_BINARY_PATH"
+ "-DPOLKIT_AGENT_BINARY_PATH=\"/run/current-system/sw/bin/pkttyagent\""
# Set the release_agent on /sys/fs/cgroup/systemd to the
# currently running systemd (/run/current-system/systemd) so
# that we don't use an obsolete/garbage-collected release agent.
- "-USYSTEMD_CGROUP_AGENT_PATH" "-DSYSTEMD_CGROUP_AGENT_PATH=\"/run/current-system/systemd/lib/systemd/systemd-cgroups-agent\""
+ "-USYSTEMD_CGROUP_AGENT_PATH"
+ "-DSYSTEMD_CGROUP_AGENT_PATH=\"/run/current-system/systemd/lib/systemd/systemd-cgroups-agent\""
- "-USYSTEMD_BINARY_PATH" "-DSYSTEMD_BINARY_PATH=\"/run/current-system/systemd/lib/systemd/systemd\""
+ "-USYSTEMD_BINARY_PATH"
+ "-DSYSTEMD_BINARY_PATH=\"/run/current-system/systemd/lib/systemd/systemd\""
];
doCheck = false; # fails a bunch of tests
@@ -310,7 +407,9 @@ in stdenv.mkDerivation {
# "kernel-install" shouldn't be used on NixOS.
find $out -name "*kernel-install*" -exec rm {} \;
- ''; # */
+ '' + lib.optionalString (!withDocumentation) ''
+ rm -rf $out/share/doc
+ '';
enableParallelBuilding = true;
@@ -322,7 +421,7 @@ in stdenv.mkDerivation {
# runtime; otherwise we can't and we need to reboot.
passthru.interfaceVersion = 2;
- meta = with stdenv.lib; {
+ meta = with lib; {
homepage = "https://www.freedesktop.org/wiki/Software/systemd/";
description = "A system and service manager for Linux";
license = licenses.lgpl21Plus;
diff --git a/third_party/nixpkgs/pkgs/os-specific/linux/wireguard/default.nix b/third_party/nixpkgs/pkgs/os-specific/linux/wireguard/default.nix
index b8b65fecaf..ef81dd54a7 100644
--- a/third_party/nixpkgs/pkgs/os-specific/linux/wireguard/default.nix
+++ b/third_party/nixpkgs/pkgs/os-specific/linux/wireguard/default.nix
@@ -14,6 +14,10 @@ stdenv.mkDerivation rec {
sha256 = "1nd2kc3c62907kxm1084dw7krd8xsy3hxydmcpz4jvk03vm5dnkg";
};
+ patches = [
+ ./linux-5.4.76-fix.patch
+ ];
+
hardeningDisable = [ "pic" ];
KERNELDIR = "${kernel.dev}/lib/modules/${kernel.modDirVersion}/build";
diff --git a/third_party/nixpkgs/pkgs/os-specific/linux/wireguard/linux-5.4.76-fix.patch b/third_party/nixpkgs/pkgs/os-specific/linux/wireguard/linux-5.4.76-fix.patch
new file mode 100644
index 0000000000..78c3365bcb
--- /dev/null
+++ b/third_party/nixpkgs/pkgs/os-specific/linux/wireguard/linux-5.4.76-fix.patch
@@ -0,0 +1,12 @@
+diff -u -r wireguard-linux-compat-1.0.20200908/src/compat/compat-asm.h wireguard-linux-compat-1.0.20200908-lts/src/compat/compat-asm.h
+--- wireguard-linux-compat-1.0.20200908/src/compat/compat-asm.h 2020-09-08 16:22:40.000000000 +0000
++++ wireguard-linux-compat-1.0.20200908-lts/src/compat/compat-asm.h 2020-11-10 15:05:43.720093522 +0000
+@@ -40,7 +40,7 @@
+ #undef pull
+ #endif
+
+-#if LINUX_VERSION_CODE < KERNEL_VERSION(5, 5, 0)
++#if LINUX_VERSION_CODE < KERNEL_VERSION(5, 4, 76)
+ #define SYM_FUNC_START ENTRY
+ #define SYM_FUNC_END ENDPROC
+ #endif
diff --git a/third_party/nixpkgs/pkgs/os-specific/linux/zfs/default.nix b/third_party/nixpkgs/pkgs/os-specific/linux/zfs/default.nix
index bb4a2dcf97..b9a8c83060 100644
--- a/third_party/nixpkgs/pkgs/os-specific/linux/zfs/default.nix
+++ b/third_party/nixpkgs/pkgs/os-specific/linux/zfs/default.nix
@@ -161,10 +161,11 @@ let
(cd $out/share/bash-completion/completions; ln -s zfs zpool)
'';
- postFixup = ''
- path="PATH=${makeBinPath [ coreutils gawk gnused gnugrep utillinux smartmontools sysstat sudo ]}"
+ postFixup = let
+ path = "PATH=${makeBinPath [ coreutils gawk gnused gnugrep utillinux smartmontools sysstat ]}:$PATH";
+ in ''
for i in $out/libexec/zfs/zpool.d/*; do
- sed -i "2i$path" $i
+ sed -i '2i${path}' $i
done
'';
diff --git a/third_party/nixpkgs/pkgs/servers/asterisk/default.nix b/third_party/nixpkgs/pkgs/servers/asterisk/default.nix
index c5c2f6d513..aa4b2a6415 100644
--- a/third_party/nixpkgs/pkgs/servers/asterisk/default.nix
+++ b/third_party/nixpkgs/pkgs/servers/asterisk/default.nix
@@ -105,8 +105,8 @@ in rec {
asterisk = asterisk_18;
asterisk_13 = common {
- version = "13.37.0";
- sha256 = "09wc6cqh4f15wm62drzdppwvh7nwgnbwapvz1kgb0qdgixsshn3v";
+ version = "13.37.1";
+ sha256 = "1zc3104zw4y7i8bhhgrgy3snq0zr1904p64ykfc3ldh4xyfy3ld6";
externals = {
"externals_cache/pjproject-2.10.tar.bz2" = pjproject_2_10;
"addons/mp3" = mp3-202;
@@ -114,8 +114,8 @@ in rec {
};
asterisk_16 = common {
- version = "16.14.0";
- sha256 = "1y120p4jlhg4iwihdxlk64y3y3n8w7y785lwqxsyqg6zviz0ghx6";
+ version = "16.14.1";
+ sha256 = "1lhh3npyy8hvy29jwjgapnxfjv1ahp2qdi4iq1d6a61ffhd20vfs";
externals = {
"externals_cache/pjproject-2.10.tar.bz2" = pjproject_2_10;
"addons/mp3" = mp3-202;
@@ -123,8 +123,8 @@ in rec {
};
asterisk_17 = common {
- version = "17.8.0";
- sha256 = "0xhwh8s8n8xg43gcdkqjj484assva7lm5ah1b306a5nf6j8p9bjy";
+ version = "17.8.1";
+ sha256 = "0m7gw01kpvsc0f9lb1hiq5b4g1fdh4gdfyxlqxp6m37vgxh2a48p";
externals = {
"externals_cache/pjproject-2.10.tar.bz2" = pjproject_2_10;
"addons/mp3" = mp3-202;
@@ -132,8 +132,8 @@ in rec {
};
asterisk_18 = common {
- version = "18.0.0";
- sha256 = "174zasx8d7ragy2fz4vwc4pbra9wl471mnisz1z0a3b2qsbh4y4v";
+ version = "18.0.1";
+ sha256 = "1kyly10pk7bpfqg3mjbvb8p795fnj9lvd29yp2xsxwgsqi1dn9p8";
externals = {
"externals_cache/pjproject-2.10.tar.bz2" = pjproject_2_10;
"addons/mp3" = mp3-202;
diff --git a/third_party/nixpkgs/pkgs/servers/atlassian/confluence.nix b/third_party/nixpkgs/pkgs/servers/atlassian/confluence.nix
index 88b0c84358..a3a5990643 100644
--- a/third_party/nixpkgs/pkgs/servers/atlassian/confluence.nix
+++ b/third_party/nixpkgs/pkgs/servers/atlassian/confluence.nix
@@ -8,11 +8,11 @@ assert withMysql -> (mysql_jdbc != null);
stdenvNoCC.mkDerivation rec {
pname = "atlassian-confluence";
- version = "7.8.1";
+ version = "7.9.0";
src = fetchurl {
url = "https://product-downloads.atlassian.com/software/confluence/downloads/${pname}-${version}.tar.gz";
- sha256 = "0jgwd8vb58yzwvnns0kyb0vzgrdvjwzvpk4x8228hrisjxahsm45";
+ sha256 = "0y21ivvzzs6mq2p96csmhbvz1jzwp1x4zrw26qrwavf84l2v7nlh";
};
buildPhase = ''
diff --git a/third_party/nixpkgs/pkgs/servers/dns/knot-dns/default.nix b/third_party/nixpkgs/pkgs/servers/dns/knot-dns/default.nix
index 61faf3bd40..9eb3fc4e74 100644
--- a/third_party/nixpkgs/pkgs/servers/dns/knot-dns/default.nix
+++ b/third_party/nixpkgs/pkgs/servers/dns/knot-dns/default.nix
@@ -7,11 +7,11 @@ let inherit (stdenv.lib) optional optionals; in
stdenv.mkDerivation rec {
pname = "knot-dns";
- version = "3.0.1";
+ version = "3.0.2";
src = fetchurl {
url = "https://secure.nic.cz/files/knot-dns/knot-${version}.tar.xz";
- sha256 = "97af6724b04308f691392c80d75564ff8b246871f2f59c4f03cede3c4dd401bb";
+ sha256 = "f813a5e53263ef51d0415508e1f7d33cfbb75a139ccb10a344ae5a91689933fb";
};
outputs = [ "bin" "out" "dev" ];
diff --git a/third_party/nixpkgs/pkgs/servers/dns/knot-resolver/default.nix b/third_party/nixpkgs/pkgs/servers/dns/knot-resolver/default.nix
index 9f54d2f5fa..aabfcd9796 100644
--- a/third_party/nixpkgs/pkgs/servers/dns/knot-resolver/default.nix
+++ b/third_party/nixpkgs/pkgs/servers/dns/knot-resolver/default.nix
@@ -16,11 +16,11 @@ lua = luajitPackages;
unwrapped = stdenv.mkDerivation rec {
pname = "knot-resolver";
- version = "5.1.3";
+ version = "5.2.0";
src = fetchurl {
url = "https://secure.nic.cz/files/knot-resolver/${pname}-${version}.tar.xz";
- sha256 = "20cd829027e39a9f7d993894e3640e886825b492d9ac1a744ac5616cc101458b";
+ sha256 = "8824267ca3331fa06d418c1351b68c648da0af121bcbc84c6e08f5b1e28d9433";
};
outputs = [ "out" "dev" ];
@@ -67,6 +67,7 @@ unwrapped = stdenv.mkDerivation rec {
postInstall = ''
rm "$out"/lib/libkres.a
rm "$out"/lib/knot-resolver/upgrade-4-to-5.lua # not meaningful on NixOS
+ rm -r "$out"/lib/sysusers.d/ # ATM more likely to harm than help
'';
doInstallCheck = with stdenv; hostPlatform == buildPlatform;
diff --git a/third_party/nixpkgs/pkgs/servers/home-assistant/component-packages.nix b/third_party/nixpkgs/pkgs/servers/home-assistant/component-packages.nix
index add9dcebde..fa54c2b5f2 100644
--- a/third_party/nixpkgs/pkgs/servers/home-assistant/component-packages.nix
+++ b/third_party/nixpkgs/pkgs/servers/home-assistant/component-packages.nix
@@ -2,7 +2,7 @@
# Do not edit!
{
- version = "0.117.5";
+ version = "0.117.6";
components = {
"abode" = ps: with ps; [ abodepy ];
"accuweather" = ps: with ps; [ accuweather ];
@@ -312,7 +312,7 @@
"google_maps" = ps: with ps; [ ]; # missing inputs: locationsharinglib
"google_pubsub" = ps: with ps; [ google_cloud_pubsub ];
"google_translate" = ps: with ps; [ gtts-token ];
- "google_travel_time" = ps: with ps; [ ]; # missing inputs: googlemaps
+ "google_travel_time" = ps: with ps; [ googlemaps ];
"google_wifi" = ps: with ps; [ ];
"gpmdp" = ps: with ps; [ websocket_client ];
"gpsd" = ps: with ps; [ ]; # missing inputs: gps3
diff --git a/third_party/nixpkgs/pkgs/servers/home-assistant/default.nix b/third_party/nixpkgs/pkgs/servers/home-assistant/default.nix
index d0d88f73bc..fb2909c325 100644
--- a/third_party/nixpkgs/pkgs/servers/home-assistant/default.nix
+++ b/third_party/nixpkgs/pkgs/servers/home-assistant/default.nix
@@ -67,7 +67,7 @@ let
extraBuildInputs = extraPackages py.pkgs;
# Don't forget to run parse-requirements.py after updating
- hassVersion = "0.117.5";
+ hassVersion = "0.117.6";
in with py.pkgs; buildPythonApplication rec {
pname = "homeassistant";
@@ -83,7 +83,7 @@ in with py.pkgs; buildPythonApplication rec {
owner = "home-assistant";
repo = "core";
rev = version;
- sha256 = "1al2pwj2xrhqyaz2pal4a1bdh4sm63ijfaw8pajghz5z23gf62r0";
+ sha256 = "1f9w7migwmdvnbiv4bi0b31zdfrsg87zgiz2l3gymn6w89f3h8y1";
};
# leave this in, so users don't have to constantly update their downstream patch handling
diff --git a/third_party/nixpkgs/pkgs/servers/jackett/default.nix b/third_party/nixpkgs/pkgs/servers/jackett/default.nix
index 27f816b269..a2ae37efe8 100644
--- a/third_party/nixpkgs/pkgs/servers/jackett/default.nix
+++ b/third_party/nixpkgs/pkgs/servers/jackett/default.nix
@@ -2,11 +2,11 @@
stdenv.mkDerivation rec {
pname = "jackett";
- version = "0.16.1964";
+ version = "0.16.2131";
src = fetchurl {
url = "https://github.com/Jackett/Jackett/releases/download/v${version}/Jackett.Binaries.Mono.tar.gz";
- sha256 = "06mj9pahziwm77nqjiqcbg3zfxkjy7sp15h84iqcxp0lpz0w2z55";
+ sha256 = "1689w80cjji7wq1x3sgkpmx0n543mqkzvhb3hdmz6f66h479hcpk";
};
nativeBuildInputs = [ makeWrapper ];
diff --git a/third_party/nixpkgs/pkgs/servers/livepeer/default.nix b/third_party/nixpkgs/pkgs/servers/livepeer/default.nix
index 5430c7ddf0..959e82d259 100644
--- a/third_party/nixpkgs/pkgs/servers/livepeer/default.nix
+++ b/third_party/nixpkgs/pkgs/servers/livepeer/default.nix
@@ -4,7 +4,7 @@
buildGoModule rec {
pname = "livepeer";
- version = "0.5.11";
+ version = "0.5.12";
runVend = true;
vendorSha256 = "13cgwpf3v4vlvb0mgdxsdybpghx1cp3fzkdwmq8b193a8dcl8s63";
@@ -13,7 +13,7 @@ buildGoModule rec {
owner = "livepeer";
repo = "go-livepeer";
rev = "v${version}";
- sha256 = "12vbnl74z6jk77bnws8a5z5n7bnhkbb4ngzxfir5l3g9zrpsc5p3";
+ sha256 = "15gx6pd6zn40x60p07dyaf1ydxvrg372lk3djp302mph8y0ijqfg";
};
# livepeer_cli has a vendoring problem
diff --git a/third_party/nixpkgs/pkgs/servers/mail/postfix/default.nix b/third_party/nixpkgs/pkgs/servers/mail/postfix/default.nix
index e449f4ae95..9aee89db9b 100644
--- a/third_party/nixpkgs/pkgs/servers/mail/postfix/default.nix
+++ b/third_party/nixpkgs/pkgs/servers/mail/postfix/default.nix
@@ -26,11 +26,11 @@ in stdenv.mkDerivation rec {
pname = "postfix";
- version = "3.5.6";
+ version = "3.5.7";
src = fetchurl {
url = "ftp://ftp.cs.uu.nl/mirror/postfix/postfix-release/official/${pname}-${version}.tar.gz";
- sha256 = "0shyxk83adv4pbfilmskyrgjpb57vyhmvqbmfqawxbc22mksmh4f";
+ sha256 = "0q89iwan5yd84yrzdv3sqg1zanmw56bl2f5gyv5wfg8m9vqp995p";
};
nativeBuildInputs = [ makeWrapper m4 ];
diff --git a/third_party/nixpkgs/pkgs/servers/monitoring/do-agent/default.nix b/third_party/nixpkgs/pkgs/servers/monitoring/do-agent/default.nix
index c2527acc1c..6ebcf94014 100644
--- a/third_party/nixpkgs/pkgs/servers/monitoring/do-agent/default.nix
+++ b/third_party/nixpkgs/pkgs/servers/monitoring/do-agent/default.nix
@@ -2,13 +2,13 @@
buildGoModule rec {
pname = "do-agent";
- version = "3.7.1";
+ version = "3.8.0";
src = fetchFromGitHub {
owner = "digitalocean";
repo = "do-agent";
rev = version;
- sha256 = "16mmh1kz6zbncfisd9qnb3ssgpkcb4hb7700jlzbdjqxyjmy0qsf";
+ sha256 = "141hmkswb65sq99ad6vg4dkrbhsmni88hlrfdxqdn89hvsz8f7b2";
};
buildFlagsArray = ''
diff --git a/third_party/nixpkgs/pkgs/servers/monitoring/grafana/default.nix b/third_party/nixpkgs/pkgs/servers/monitoring/grafana/default.nix
index 7679cd8864..85420f237f 100644
--- a/third_party/nixpkgs/pkgs/servers/monitoring/grafana/default.nix
+++ b/third_party/nixpkgs/pkgs/servers/monitoring/grafana/default.nix
@@ -2,7 +2,7 @@
buildGoModule rec {
pname = "grafana";
- version = "7.3.1";
+ version = "7.3.2";
excludedPackages = [ "release_publisher" ];
@@ -10,15 +10,15 @@ buildGoModule rec {
rev = "v${version}";
owner = "grafana";
repo = "grafana";
- sha256 = "02by07d0h07zvws2yj71qa84sgp3x49p5ib0bahh0iyr50xqb3yj";
+ sha256 = "0lknymp203bgrwq8g05pk07p385k2hh9wap4ql4lxylsn89szs65";
};
srcStatic = fetchurl {
url = "https://dl.grafana.com/oss/release/grafana-${version}.linux-amd64.tar.gz";
- sha256 = "0rqipwiz8bsqkhiv30k9jmk5szhabk9rgl37n7y8l0yk2avbq895";
+ sha256 = "08smddc86jm3ign1pb1arw1zqkh72dbddizzn1bqg4lanx2xwjca";
};
- vendorSha256 = "0shaxm2y5i29rb0k5bfpcsxbw3ap913l1rb5qbr9hrx7l142dbx8";
+ vendorSha256 = "09rb96fm7ij16r843lbwcxb26vmjyahs1bi5pnnqz0mnm0vvmsjb";
postPatch = ''
substituteInPlace pkg/cmd/grafana-server/main.go \
diff --git a/third_party/nixpkgs/pkgs/servers/monitoring/loki/default.nix b/third_party/nixpkgs/pkgs/servers/monitoring/loki/default.nix
index c4bfeed8c8..f1cefdc0b1 100644
--- a/third_party/nixpkgs/pkgs/servers/monitoring/loki/default.nix
+++ b/third_party/nixpkgs/pkgs/servers/monitoring/loki/default.nix
@@ -1,4 +1,12 @@
-{ stdenv, lib, buildGoModule, fetchFromGitHub, makeWrapper, systemd, fetchpatch }:
+{ stdenv
+, lib
+, buildGoModule
+, fetchFromGitHub
+, makeWrapper
+, nixosTests
+, systemd
+, fetchpatch
+}:
buildGoModule rec {
version = "2.0.0";
@@ -32,6 +40,8 @@ buildGoModule rec {
--prefix LD_LIBRARY_PATH : "${lib.getLib systemd}/lib"
'';
+ passthru.tests = { inherit (nixosTests) loki; };
+
doCheck = true;
meta = with stdenv.lib; {
diff --git a/third_party/nixpkgs/pkgs/servers/monitoring/mackerel-agent/default.nix b/third_party/nixpkgs/pkgs/servers/monitoring/mackerel-agent/default.nix
new file mode 100644
index 0000000000..c5548fafd3
--- /dev/null
+++ b/third_party/nixpkgs/pkgs/servers/monitoring/mackerel-agent/default.nix
@@ -0,0 +1,42 @@
+{ stdenv, lib, buildGoModule, fetchFromGitHub, makeWrapper, iproute, nettools }:
+
+buildGoModule rec {
+ pname = "mackerel-agent";
+ version = "0.69.3";
+
+ src = fetchFromGitHub {
+ owner = "mackerelio";
+ repo = pname;
+ rev = "v${version}";
+ sha256 = "0jkvqqzk6wyjsdsmn2l2cdw8pjqzswlqb9p492czhgrfy065lrqp";
+ };
+
+ nativeBuildInputs = [ makeWrapper ];
+ checkInputs = lib.optionals (!stdenv.isDarwin) [ nettools ];
+ buildInputs = lib.optionals (!stdenv.isDarwin) [ iproute ];
+
+ vendorSha256 = "0kjky2mhs6dapnr4xpjpnbibp6y8r320igddplynsfsp8vwrfp7m";
+
+ subPackages = [ "." ];
+
+ buildFlagsArray = ''
+ -ldflags=
+ -X=main.version=${version}
+ -X=main.gitcommit=v${version}
+ '';
+
+ postInstall = ''
+ wrapProgram $out/bin/mackerel-agent \
+ --prefix PATH : "${lib.makeBinPath buildInputs}"
+ '';
+
+ doCheck = true;
+
+ meta = with lib; {
+ description = "System monitoring service for mackerel.io";
+ homepage = "https://github.com/mackerelio/mackerel-agent";
+ license = licenses.asl20;
+ maintainers = with maintainers; [ midchildan ];
+ platforms = platforms.all;
+ };
+}
diff --git a/third_party/nixpkgs/pkgs/servers/monitoring/prometheus/process-exporter.nix b/third_party/nixpkgs/pkgs/servers/monitoring/prometheus/process-exporter.nix
index 9b90b9a57f..53497b685b 100644
--- a/third_party/nixpkgs/pkgs/servers/monitoring/prometheus/process-exporter.nix
+++ b/third_party/nixpkgs/pkgs/servers/monitoring/prometheus/process-exporter.nix
@@ -2,7 +2,7 @@
buildGoPackage rec {
pname = "process-exporter";
- version = "0.5.0";
+ version = "0.7.1";
goPackagePath = "github.com/ncabatoff/process-exporter";
@@ -10,7 +10,7 @@ buildGoPackage rec {
owner = "ncabatoff";
repo = pname;
rev = "v${version}";
- sha256 = "129vqry3l8waxcyvx83wg0dvh3qg4pr3rl5fw7vmhgdzygbaq3bq";
+ sha256 = "0jkh4xzjlrlabpll3igpyhqs35f1dxifjkbfxvijjcq9yahxfj0x";
};
postPatch = ''
diff --git a/third_party/nixpkgs/pkgs/servers/monitoring/prometheus/promscale.nix b/third_party/nixpkgs/pkgs/servers/monitoring/prometheus/promscale.nix
index 25ad49e7c8..f8827b1f1f 100644
--- a/third_party/nixpkgs/pkgs/servers/monitoring/prometheus/promscale.nix
+++ b/third_party/nixpkgs/pkgs/servers/monitoring/prometheus/promscale.nix
@@ -5,13 +5,13 @@
buildGoModule rec {
pname = "promscale";
- version = "0.1.1";
+ version = "0.1.2";
src = fetchFromGitHub {
owner = "timescale";
repo = pname;
rev = version;
- sha256 = "sha256:00mhkp3nf6h2zsvmmwyza1lahvmm05isfi7rqkx24c0dmkmif3x9";
+ sha256 = "sha256-Yl61hX4YBddw0euTwheMIOy08jgS47rAU0cKyXiz9s4=";
};
vendorSha256 = "sha256:1ilciwf08678sciwwrjalwvcs5bp7x254nxc3nhdf88cf0bp2nxi";
diff --git a/third_party/nixpkgs/pkgs/servers/pounce/default.nix b/third_party/nixpkgs/pkgs/servers/pounce/default.nix
index a418417ce2..62d576ffc6 100644
--- a/third_party/nixpkgs/pkgs/servers/pounce/default.nix
+++ b/third_party/nixpkgs/pkgs/servers/pounce/default.nix
@@ -2,11 +2,11 @@
stdenv.mkDerivation rec {
pname = "pounce";
- version = "1.4p2";
+ version = "2.0";
src = fetchzip {
url = "https://git.causal.agency/pounce/snapshot/pounce-${version}.tar.gz";
- sha256 = "0fpnj9yvmj4gbbfpya4i0lyin56r782pz19z3pgd8xgs22gd48cc";
+ sha256 = "0vr42s8l617k6893zq7qn9wz7kcdchmr99ivbkrmvd38qrhsa02l";
};
buildInputs = [ libressl ];
diff --git a/third_party/nixpkgs/pkgs/servers/pulseaudio/add-option-for-installation-sysconfdir.patch b/third_party/nixpkgs/pkgs/servers/pulseaudio/add-option-for-installation-sysconfdir.patch
new file mode 100644
index 0000000000..dd4de7321e
--- /dev/null
+++ b/third_party/nixpkgs/pkgs/servers/pulseaudio/add-option-for-installation-sysconfdir.patch
@@ -0,0 +1,100 @@
+
+diff --git a/meson.build b/meson.build
+index 86af7243e..e2d48ab94 100644
+--- a/meson.build
++++ b/meson.build
+@@ -65,6 +65,11 @@ datadir = join_paths(prefix, get_option('datadir'))
+ localedir = join_paths(prefix, get_option('localedir'))
+ localstatedir = join_paths(prefix, get_option('localstatedir'))
+ sysconfdir = join_paths(prefix, get_option('sysconfdir'))
++if get_option('sysconfdir_install') != ''
++ sysconfdir_install = join_paths(get_option('prefix'), get_option('sysconfdir_install'))
++else
++ sysconfdir_install = sysconfdir
++endif
+ privlibdir = join_paths(libdir, 'pulseaudio')
+
+ alsadatadir = get_option('alsadatadir')
+@@ -75,6 +80,11 @@ endif
+ pkgconfigdir = join_paths(libdir, 'pkgconfig')
+ pulselibexecdir = join_paths(libexecdir, 'pulse')
+ pulsesysconfdir = join_paths(sysconfdir, 'pulse')
++if get_option('sysconfdir_install') != ''
++ pulsesysconfdir_install = join_paths(get_option('prefix'), get_option('sysconfdir_install'), 'pulse')
++else
++ pulsesysconfdir_install = pulsesysconfdir
++endif
+
+ modlibexecdir = get_option('modlibexecdir')
+ if modlibexecdir == ''
+diff --git a/meson_options.txt b/meson_options.txt
+index 824f24e08..59a2b57ab 100644
+--- a/meson_options.txt
++++ b/meson_options.txt
+@@ -66,6 +66,9 @@ option('bashcompletiondir',
+ option('zshcompletiondir',
+ type : 'string',
+ description : 'Directory for zsh completion scripts ["no" disables]')
++option('sysconfdir_install',
++ type: 'string', value: '',
++ description: 'sysconfdir to use during installation')
+
+ # Optional features
+
+diff --git a/src/daemon/meson.build b/src/daemon/meson.build
+index 9c9f807e7..425cecb46 100644
+--- a/src/daemon/meson.build
++++ b/src/daemon/meson.build
+@@ -53,7 +53,7 @@ if x11_dep.found()
+ po_dir : po_dir,
+ type : 'desktop',
+ install : true,
+- install_dir : join_paths(sysconfdir, 'xdg', 'autostart'),
++ install_dir : join_paths(sysconfdir_install, 'xdg', 'autostart'),
+ )
+
+ desktop_utils = find_program('desktop-file-validate', required: false)
+@@ -85,7 +85,7 @@ custom_target('daemon.conf',
+ command : [m4, '@INPUT@'],
+ build_by_default : true,
+ install : true,
+- install_dir : pulsesysconfdir,
++ install_dir : pulsesysconfdir_install,
+ )
+
+ default_conf = configuration_data()
+@@ -111,7 +111,7 @@ custom_target('default.pa',
+ command : [m4, '@INPUT@'],
+ build_by_default : true,
+ install : true,
+- install_dir : pulsesysconfdir,
++ install_dir : pulsesysconfdir_install,
+ )
+
+ system_conf = configuration_data()
+@@ -132,12 +132,12 @@ custom_target('system.pa',
+ command : [m4, '@INPUT@'],
+ build_by_default : true,
+ install : true,
+- install_dir : pulsesysconfdir,
++ install_dir : pulsesysconfdir_install,
+ )
+
+ if dbus_dep.found()
+ install_data('pulseaudio-system.conf',
+- install_dir : join_paths(sysconfdir, 'dbus-1', 'system.d')
++ install_dir : join_paths(sysconfdir_install, 'dbus-1', 'system.d')
+ )
+ endif
+
+diff --git a/src/pulse/meson.build b/src/pulse/meson.build
+index aaebff53e..05a29a0d0 100644
+--- a/src/pulse/meson.build
++++ b/src/pulse/meson.build
+@@ -130,5 +130,5 @@ client_conf_file = configure_file(
+ input : 'client.conf.in',
+ output : 'client.conf',
+ configuration : client_conf,
+- install_dir : pulsesysconfdir,
++ install_dir : pulsesysconfdir_install,
+ )
diff --git a/third_party/nixpkgs/pkgs/servers/pulseaudio/correct-ldflags.patch b/third_party/nixpkgs/pkgs/servers/pulseaudio/correct-ldflags.patch
new file mode 100644
index 0000000000..174cb8b4f7
--- /dev/null
+++ b/third_party/nixpkgs/pkgs/servers/pulseaudio/correct-ldflags.patch
@@ -0,0 +1,13 @@
+diff --git a/meson.build b/meson.build
+index 45df103f0..d57d13172 100644
+--- a/meson.build
++++ b/meson.build
+@@ -342,7 +342,7 @@ cdata.set('MESON_BUILD', 1)
+ # On ELF systems we don't want the libraries to be unloaded since we don't clean them up properly,
+ # so we request the nodelete flag to be enabled.
+ # On other systems, we don't really know how to do that, but it's welcome if somebody can tell.
+-nodelete_link_args = ['-Wl,-z,nodelete']
++nodelete_link_args = cc.get_supported_link_arguments(['-Wl,-z,nodelete'])
+
+ # Code coverage
+
diff --git a/third_party/nixpkgs/pkgs/servers/pulseaudio/default.nix b/third_party/nixpkgs/pkgs/servers/pulseaudio/default.nix
index 513249cb7a..c9e2c3aa6e 100644
--- a/third_party/nixpkgs/pkgs/servers/pulseaudio/default.nix
+++ b/third_party/nixpkgs/pkgs/servers/pulseaudio/default.nix
@@ -124,6 +124,10 @@ stdenv.mkDerivation rec {
--prefix GIO_EXTRA_MODULES : "${lib.getLib dconf}/lib/gio/modules"
'';
+ passthru = {
+ pulseDir = "lib/pulse-" + lib.versions.majorMinor version;
+ };
+
meta = {
description = "Sound server for POSIX and Win32 systems";
homepage = "http://www.pulseaudio.org/";
diff --git a/third_party/nixpkgs/pkgs/servers/pulseaudio/hsphfpd.nix b/third_party/nixpkgs/pkgs/servers/pulseaudio/hsphfpd.nix
new file mode 100644
index 0000000000..8c1bea86ac
--- /dev/null
+++ b/third_party/nixpkgs/pkgs/servers/pulseaudio/hsphfpd.nix
@@ -0,0 +1,46 @@
+{ stdenv, fetchFromGitHub, makeWrapper, perlPackages }:
+
+let
+ perlLibs = with perlPackages; [ NetDBus XMLTwig XMLParser ];
+in
+stdenv.mkDerivation {
+ pname = "hsphfpd";
+ version = "2020-10-25";
+
+ src = fetchFromGitHub {
+ owner = "pali";
+ repo = "hsphfpd-prototype";
+ rev = "601bf8f7bf2da97257aa6f786ec4cbb69b0ecbc8";
+ sha256 = "06hh0xmp143334x8dg5nmp5727g38q2m5kqsvlrfia6vw2hcq0v0";
+ };
+
+ nativeBuildInputs = [ makeWrapper ];
+ buildInputs = [ perlPackages.perl ];
+ dontBuild = true;
+
+ installPhase = ''
+ runHook preInstall
+
+ mkdir -p $out/share/dbus-1/system.d
+ cp org.hsphfpd.conf $out/share/dbus-1/system.d
+
+ mkdir -p $out/bin
+ cp *.pl $out/bin
+
+ runHook postInstall
+ '';
+
+ postFixup = ''
+ for f in $out/bin/*.pl; do
+ wrapProgram "$f" --set PERL5LIB "${perlPackages.makePerlPath perlLibs}"
+ done
+ '';
+
+ meta = with stdenv.lib; {
+ description = "Bluetooth HSP/HFP daemon";
+ homepage = "https://github.com/pali/hsphfpd-prototype";
+ license = licenses.artistic1;
+ maintainers = with maintainers; [ gebner ];
+ platforms = platforms.linux;
+ };
+}
diff --git a/third_party/nixpkgs/pkgs/servers/pulseaudio/pali.nix b/third_party/nixpkgs/pkgs/servers/pulseaudio/pali.nix
new file mode 100644
index 0000000000..d5ae80b5e7
--- /dev/null
+++ b/third_party/nixpkgs/pkgs/servers/pulseaudio/pali.nix
@@ -0,0 +1,219 @@
+{ lib
+, stdenv
+, fetchurl
+, fetchFromGitLab
+, meson
+, ninja
+, pkgconfig
+, libsndfile
+, libtool
+, makeWrapper
+, perlPackages
+, xorg
+, libcap
+, alsaLib
+, glib
+, dconf
+, avahi
+, libjack2
+, libasyncns
+, lirc
+, dbus
+, sbc
+, bluez5
+, udev
+, openssl
+, fftwFloat
+, soxr
+, speexdsp
+, systemd
+, webrtc-audio-processing
+, gtk3
+, tdb
+, orc
+, check
+, gettext
+, gst_all_1
+, libopenaptx
+
+, x11Support ? true
+
+, # Whether to support the JACK sound system as a backend.
+ jackaudioSupport ? false
+
+, airtunesSupport ? true
+
+, bluetoothSupport ? true
+
+, remoteControlSupport ? true
+
+, zeroconfSupport ? true
+
+, # Whether to build only the library.
+ libOnly ? false
+
+# Building from Git source
+, fromGit ? true
+
+, CoreServices
+, AudioUnit
+, Cocoa
+}:
+
+stdenv.mkDerivation rec {
+ pname = "${if libOnly then "lib" else ""}pulseaudio-hsphfpd";
+ version = "13.99.2";
+
+ outputs = [ "out" "dev" ];
+
+ # https://gitlab.freedesktop.org/pulseaudio/pulseaudio/-/merge_requests/288
+ src = fetchFromGitLab {
+ domain = "gitlab.freedesktop.org";
+ owner = "pali";
+ repo = "pulseaudio";
+ rev = "5336b39e7e03cf50386e719e287a712b59730eb8";
+ sha256 = "0vc0i5rzkns3xw6y2q0c94p2qdi5k3mgjvhicgq1b0py2qxmji16";
+ };
+
+ patches = [
+ ./add-option-for-installation-sysconfdir.patch
+ ./correct-ldflags.patch
+ ];
+
+ # Says it should be v${version} but it's parsing logic is broken
+ preConfigure = lib.optionalString fromGit ''
+ sed -i "s@version : run_command.*@version: '${version}',@" meson.build
+ '';
+
+ nativeBuildInputs = [
+ gettext
+ makeWrapper
+ meson
+ ninja
+ pkgconfig
+ perlPackages.perl
+ perlPackages.XMLParser
+ ];
+
+ checkInputs = [
+ check
+ ];
+
+ propagatedBuildInputs = lib.optional stdenv.isLinux libcap;
+
+ buildInputs = [
+ libopenaptx
+ fftwFloat
+ libsndfile
+ libtool
+ orc
+ soxr
+ speexdsp
+ tdb
+ sbc
+ gst_all_1.gst-plugins-base
+ ] ++ lib.optionals bluetoothSupport [
+ bluez5
+ ] ++ lib.optionals stdenv.isLinux [
+ dbus
+ glib
+ gtk3
+ libasyncns
+ ] ++ lib.optionals stdenv.isDarwin [
+ AudioUnit
+ Cocoa
+ CoreServices
+ ] ++ lib.optionals (!libOnly) (
+ lib.optionals x11Support [
+ xorg.libXi
+ xorg.libXtst
+ xorg.xlibsWrapper
+ ] ++ lib.optionals stdenv.isLinux [
+ alsaLib
+ systemd
+ udev
+ ] ++ lib.optional airtunesSupport openssl
+ ++ lib.optional jackaudioSupport libjack2
+ ++ lib.optional remoteControlSupport lirc
+ ++ lib.optional zeroconfSupport avahi
+ ++ [ webrtc-audio-processing ]
+ );
+
+ mesonFlags = [
+ "--localstatedir=/var"
+ "--sysconfdir=/etc"
+ "-Daccess_group=audio"
+ "-Dbashcompletiondir=${placeholder "out"}/share/bash-completions/completions"
+ "-Dman=false" # TODO: needs xmltoman; also doesn't check for this
+ "-Dsysconfdir_install=${placeholder "out"}/etc"
+ "-Dsystemduserunitdir=${placeholder "out"}/lib/systemd/user"
+ "-Dudevrulesdir=${placeholder "out"}/lib/udev/rules.d"
+ "-Dzshcompletiondir=${placeholder "out"}/share/zsh/site-functions"
+ ] ++ lib.optionals (!stdenv.isLinux) [
+ "-Dasyncns=disabled"
+ "-Ddbus=disabled"
+ "-Dglib=disabled"
+ "-Dgsettings=disabled"
+ "-Dgtk=disabled"
+ ] ++ lib.optionals (!stdenv.isLinux || libOnly) [
+ "-Dalsa=disabled"
+ "-Dsystemd=disabled"
+ "-Dudev=disabled"
+ ] ++ lib.optional libOnly "-Dwebrtc-aec=disabled"
+ ++ lib.optional (!x11Support) "-Dx11=disabled"
+ ++ lib.optional (!bluetoothSupport) "-Dbluez5=false"
+ ++ lib.optional (!airtunesSupport) "-Dopenssl=disabled"
+ ++ lib.optional (!jackaudioSupport) "-Djack=disabled"
+ ++ lib.optional (!remoteControlSupport) "-Dlirc=disabled"
+ ++ lib.optional (!zeroconfSupport) "-Davahi=disabled"
+ ++ lib.optional (!doCheck) "-Dtests=false";
+
+ # To create ~/.config/pulse
+ preCheck = ''
+ export HOME=$(mktemp -d)
+ '';
+
+ doCheck = true;
+
+ # not sure what the best practices are here -- can't seem to find a way
+ # for the compiler to bring in stdlib and stdio (etc.) properly
+ # the alternative is to copy the files from /usr/include to src, but there are
+ # probably a large number of files that would need to be copied (I stopped
+ # after the seventh)
+ NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I/usr/include";
+
+ NIX_LDFLAGS = lib.optionalString stdenv.isDarwin "-framework CoreServices -framework Cocoa -framework AudioUnit";
+
+ postInstall = ''
+ moveToOutput lib/cmake "$dev"
+ rm -f $out/bin/qpaeq # this is packaged by the "qpaeq" package now, because of missing deps
+ '' + lib.optionalString libOnly ''
+ rm -rf $out/{bin,share,etc,lib/{pulse-*,systemd}}
+ '';
+
+ preFixup = lib.optionalString (stdenv.isLinux && !libOnly) ''
+ wrapProgram $out/libexec/pulse/gsettings-helper \
+ --prefix XDG_DATA_DIRS : "$out/share/gsettings-schemas/${pname}-${version}" \
+ --prefix GIO_EXTRA_MODULES : "${lib.getLib dconf}/lib/gio/modules"
+ '';
+
+ passthru = {
+ pulseDir = "lib/pulse-" + lib.versions.majorMinor version;
+ };
+
+ meta = with lib; {
+ description = "A featureful, general-purpose sound server";
+ homepage = "http://www.pulseaudio.org/";
+ license = licenses.lgpl2Plus;
+ maintainers = with maintainers; [ lovek323 ];
+ platforms = platforms.unix;
+ longDescription = ''
+ PulseAudio is a sound system for POSIX OSes, meaning that it is
+ a proxy for your sound applications. It allows you to do advanced
+ operations on your sound data as it passes between your application
+ and your hardware. Things like transferring the audio to a different machine,
+ changing the sample format or channel count and mixing several sounds into one
+ are easily achieved using a sound server.
+ '';
+ };
+}
diff --git a/third_party/nixpkgs/pkgs/servers/rtsp-simple-server/default.nix b/third_party/nixpkgs/pkgs/servers/rtsp-simple-server/default.nix
index 72cebb95b6..892ac1921a 100644
--- a/third_party/nixpkgs/pkgs/servers/rtsp-simple-server/default.nix
+++ b/third_party/nixpkgs/pkgs/servers/rtsp-simple-server/default.nix
@@ -5,16 +5,16 @@
buildGoModule rec {
pname = "rtsp-simple-server";
- version = "0.10.0";
+ version = "0.12.0";
src = fetchFromGitHub {
owner = "aler9";
repo = pname;
rev = "v${version}";
- sha256 = "rnUmPyT9jAqm7Vf2TokgRGPTn7rTBUvrpJU21IopFsM=";
+ sha256 = "0mslag208410bvnhnd5hr7zvj8026m291ivkvr9sz3v6rh68cisy";
};
- vendorSha256 = "jAWDz/TclfCKQR/Gh99zSiGAsraciNU+yzFe5DGTeQI=";
+ vendorSha256 = "1884lbfsalry68m0kzfvbrk4dz9y19d2xxaivafwb7nc0wp64734";
# Tests need docker
doCheck = false;
diff --git a/third_party/nixpkgs/pkgs/servers/sql/dolt/default.nix b/third_party/nixpkgs/pkgs/servers/sql/dolt/default.nix
index 8d4e925513..08b873ea03 100644
--- a/third_party/nixpkgs/pkgs/servers/sql/dolt/default.nix
+++ b/third_party/nixpkgs/pkgs/servers/sql/dolt/default.nix
@@ -2,18 +2,18 @@
buildGoModule rec {
pname = "dolt";
- version = "0.21.1";
+ version = "0.21.4";
src = fetchFromGitHub {
owner = "liquidata-inc";
repo = "dolt";
rev = "v${version}";
- sha256 = "03fg91r6lxfq58c5843vysaw8hbagiq4r2qxc4nh9w1b3mc71h7v";
+ sha256 = "13dr3iq3v14i9zlcpv8yvq6yp90b70512bk2jkr5arlk2bilba8c";
};
modRoot = "./go";
subPackages = [ "cmd/dolt" "cmd/git-dolt" "cmd/git-dolt-smudge" ];
- vendorSha256 = "19755xbjxxva574mj0sc7kqqmr4k22bbvf4aj3d0hhcfjpyhn434";
+ vendorSha256 = "1x3a4q629jrgh7x8b81n2iapbxjfd389pj1wc2zd6c5l9r70xr97";
doCheck = false;
diff --git a/third_party/nixpkgs/pkgs/servers/sql/mariadb/default.nix b/third_party/nixpkgs/pkgs/servers/sql/mariadb/default.nix
index d6ee70856f..cbfae1d5e6 100644
--- a/third_party/nixpkgs/pkgs/servers/sql/mariadb/default.nix
+++ b/third_party/nixpkgs/pkgs/servers/sql/mariadb/default.nix
@@ -34,12 +34,13 @@ common = rec { # attributes common to both builds
name = "mariadb-${version}.tar.gz";
};
- nativeBuildInputs = [ cmake pkgconfig ];
+ nativeBuildInputs = [ cmake pkgconfig ]
+ ++ optional stdenv.hostPlatform.isDarwin fixDarwinDylibNames;
buildInputs = [
ncurses openssl zlib pcre libiconv curl
] ++ optionals stdenv.hostPlatform.isLinux [ libaio systemd libkrb5 ]
- ++ optionals stdenv.hostPlatform.isDarwin [ perl fixDarwinDylibNames cctools CoreServices ]
+ ++ optionals stdenv.hostPlatform.isDarwin [ perl cctools CoreServices ]
++ optional (!stdenv.hostPlatform.isDarwin && withStorageToku) [ jemalloc450 ]
++ optional (!stdenv.hostPlatform.isDarwin && !withStorageToku) [ jemalloc ];
diff --git a/third_party/nixpkgs/pkgs/servers/tracing/tempo/default.nix b/third_party/nixpkgs/pkgs/servers/tracing/tempo/default.nix
index c97f8344c9..37bc4aa70d 100644
--- a/third_party/nixpkgs/pkgs/servers/tracing/tempo/default.nix
+++ b/third_party/nixpkgs/pkgs/servers/tracing/tempo/default.nix
@@ -1,14 +1,14 @@
{ lib, buildGoModule, fetchFromGitHub }:
buildGoModule rec {
- version = "0.2.0";
+ version = "0.3.0";
pname = "tempo";
src = fetchFromGitHub {
rev = "v${version}";
owner = "grafana";
repo = "tempo";
- sha256 = "061l72il8arxa53zfbasiwyjdxc4bf498glxrdj5ijcwgvx14275";
+ sha256 = "0inqljiavqyq8dk2w0w0l2bds5390mrf8j190yb7lqwx9ra0cjp9";
};
vendorSha256 = null;
diff --git a/third_party/nixpkgs/pkgs/servers/trezord/default.nix b/third_party/nixpkgs/pkgs/servers/trezord/default.nix
index a59f74873d..a6841f7fab 100644
--- a/third_party/nixpkgs/pkgs/servers/trezord/default.nix
+++ b/third_party/nixpkgs/pkgs/servers/trezord/default.nix
@@ -1,18 +1,22 @@
-{ stdenv, buildGoPackage, fetchFromGitHub, trezor-udev-rules }:
+{ stdenv
+, buildGoModule
+, fetchFromGitHub
+, trezor-udev-rules
+}:
-buildGoPackage rec {
+buildGoModule rec {
pname = "trezord-go";
- version = "2.0.29";
-
- goPackagePath = "github.com/trezor/trezord-go";
+ version = "2.0.30";
src = fetchFromGitHub {
owner = "trezor";
repo = "trezord-go";
rev = "v${version}";
- sha256 = "1ks1fa0027s3xp0z6qp0dxmayvrb4dwwscfhbx7da0khp153f2cp";
+ sha256 = "1hzvk0wfgg7b4wpqjk3738yqxlv3pj5i7zxwm0jady2h97hmrqrr";
};
+ vendorSha256 = "0wb959xzyvr5zzjvkfqc422frmf97q5nr460f02wwx0pj6ch0y61";
+
propagatedBuildInputs = [ trezor-udev-rules ];
meta = with stdenv.lib; {
diff --git a/third_party/nixpkgs/pkgs/servers/web-apps/moodle/default.nix b/third_party/nixpkgs/pkgs/servers/web-apps/moodle/default.nix
index b9f11b5c17..da84481c93 100644
--- a/third_party/nixpkgs/pkgs/servers/web-apps/moodle/default.nix
+++ b/third_party/nixpkgs/pkgs/servers/web-apps/moodle/default.nix
@@ -1,8 +1,8 @@
{ lib, stdenv, fetchurl, writeText, plugins ? [ ] }:
let
- version = "3.9.2";
- stableVersion = builtins.substring 0 2 (builtins.replaceStrings ["."] [""] version);
+ version = "3.10";
+ stableVersion = lib.concatStrings (lib.take 2 (lib.splitVersion version));
in stdenv.mkDerivation rec {
pname = "moodle";
@@ -11,7 +11,7 @@ in stdenv.mkDerivation rec {
src = fetchurl {
url =
"https://download.moodle.org/stable${stableVersion}/${pname}-${version}.tgz";
- sha256 = "ygy9xlYs49Ga3u2Q/vqxhnDnqXsrh6YYTAtcsXF8kNo=";
+ sha256 = "4aYKZmXym1Tq/462PIgJb4sHGUclEkU0Ok1iQJ6u0aw=";
};
phpConfig = writeText "config.php" ''
diff --git a/third_party/nixpkgs/pkgs/servers/x11/xorg/default.nix b/third_party/nixpkgs/pkgs/servers/x11/xorg/default.nix
index 263ae99333..bd0d5bd6d8 100644
--- a/third_party/nixpkgs/pkgs/servers/x11/xorg/default.nix
+++ b/third_party/nixpkgs/pkgs/servers/x11/xorg/default.nix
@@ -2522,16 +2522,19 @@ lib.makeScope newScope (self: with self; {
meta.platforms = stdenv.lib.platforms.unix;
}) {};
- xkeyboardconfig = callPackage ({ stdenv, pkgconfig, fetchurl, libX11, xorgproto }: stdenv.mkDerivation {
- name = "xkeyboard-config-2.27";
+ xkeyboardconfig = callPackage ({ stdenv, python3, pkgconfig, fetchurl, libX11, xorgproto }: stdenv.mkDerivation {
+ name = "xkeyboard-config-2.31";
builder = ./builder.sh;
src = fetchurl {
- url = "mirror://xorg/individual/data/xkeyboard-config/xkeyboard-config-2.27.tar.bz2";
- sha256 = "07wh443lhwv1j0q6xnxnji7f7ahh7xphxj90fv02cdd6zv4aw3b9";
+ url = "mirror://xorg/individual/data/xkeyboard-config/xkeyboard-config-2.31.tar.bz2";
+ sha256 = "18xddaxh83zm698syh50w983jg6b7b8zgv0dfaf7ha485hgihi6s";
};
hardeningDisable = [ "bindnow" "relro" ];
- nativeBuildInputs = [ pkgconfig ];
+ nativeBuildInputs = [ pkgconfig python3 ];
buildInputs = [ libX11 xorgproto ];
+ prePatch = ''
+ patchShebangs rules/merge.py
+ '';
meta.platforms = stdenv.lib.platforms.unix;
}) {};
diff --git a/third_party/nixpkgs/pkgs/servers/x11/xorg/overrides.nix b/third_party/nixpkgs/pkgs/servers/x11/xorg/overrides.nix
index e6047458cf..14ef7a95c4 100644
--- a/third_party/nixpkgs/pkgs/servers/x11/xorg/overrides.nix
+++ b/third_party/nixpkgs/pkgs/servers/x11/xorg/overrides.nix
@@ -318,8 +318,9 @@ self: super:
setxkbmap = super.setxkbmap.overrideAttrs (attrs: {
postInstall =
''
- mkdir -p $out/share
+ mkdir -p $out/share/man/man7
ln -sfn ${self.xkeyboardconfig}/etc/X11 $out/share/X11
+ ln -sfn ${self.xkeyboardconfig}/share/man/man7/xkeyboard-config.7.gz $out/share/man/man7
'';
});
diff --git a/third_party/nixpkgs/pkgs/shells/oil/default.nix b/third_party/nixpkgs/pkgs/shells/oil/default.nix
index 94fd062e45..e1d4ff1585 100644
--- a/third_party/nixpkgs/pkgs/shells/oil/default.nix
+++ b/third_party/nixpkgs/pkgs/shells/oil/default.nix
@@ -2,11 +2,11 @@
stdenv.mkDerivation rec {
pname = "oil";
- version = "0.8.1";
+ version = "0.8.3";
src = fetchurl {
url = "https://www.oilshell.org/download/oil-${version}.tar.xz";
- sha256 = "0mhzys1siry848v7swr1iv2wp329ksw0gpz1qd82fmlakml5brc1";
+ sha256 = "1jrw8lbcya5wza1g65b5mgm432a2r00d8i0p1plz0kp8rl3ccy1z";
};
postPatch = ''
diff --git a/third_party/nixpkgs/pkgs/shells/zsh/oh-my-zsh/default.nix b/third_party/nixpkgs/pkgs/shells/zsh/oh-my-zsh/default.nix
index 7c402b4733..35d6e706ea 100644
--- a/third_party/nixpkgs/pkgs/shells/zsh/oh-my-zsh/default.nix
+++ b/third_party/nixpkgs/pkgs/shells/zsh/oh-my-zsh/default.nix
@@ -5,15 +5,15 @@
, nix, nixfmt, jq, coreutils, gnused, curl, cacert }:
stdenv.mkDerivation rec {
- version = "2020-11-04";
+ version = "2020-11-11";
pname = "oh-my-zsh";
- rev = "3e6ee85a161c8089955c19364728e167025a911d";
+ rev = "1beac5958ede29855ef2ac4313ada83ed37f5ea8";
src = fetchFromGitHub {
inherit rev;
owner = "ohmyzsh";
repo = "ohmyzsh";
- sha256 = "/8ySf5ulSx2HtPG/tzPzOI1ljksxF+hGwjXFhGIseBk=";
+ sha256 = "01pm1g4dhdg05fd9jqp148xi4aw9fkd6kyrvmxizbvsbbz8m751h";
};
installPhase = ''
@@ -92,7 +92,7 @@ stdenv.mkDerivation rec {
if [ ! "null" = "$latestSha" ]; then
nixpkgs="$(git rev-parse --show-toplevel)"
default_nix="$nixpkgs/pkgs/shells/zsh/oh-my-zsh/default.nix"
- latestDate="$(curl -L -s https://api.github.com/repos/ohmyzsh/ohmyzsh/commits/$latestSha | jq '.commit.author.date' | sed 's|"\(.*\)T.*|\1|g')"
+ latestDate="$(curl -L -s https://api.github.com/repos/ohmyzsh/ohmyzsh/commits/$latestSha | jq '.commit.committer.date' | sed 's|"\(.*\)T.*|\1|g')"
update-source-version oh-my-zsh "$latestSha" --version-key=rev
update-source-version oh-my-zsh "$latestDate" --ignore-same-hash
nixfmt "$default_nix"
diff --git a/third_party/nixpkgs/pkgs/shells/zsh/pure-prompt/default.nix b/third_party/nixpkgs/pkgs/shells/zsh/pure-prompt/default.nix
index bfcd3be5e9..ac7035045b 100644
--- a/third_party/nixpkgs/pkgs/shells/zsh/pure-prompt/default.nix
+++ b/third_party/nixpkgs/pkgs/shells/zsh/pure-prompt/default.nix
@@ -4,13 +4,13 @@ with stdenv.lib;
stdenv.mkDerivation rec {
pname = "pure-prompt";
- version = "1.13.0";
+ version = "1.15.0";
src = fetchFromGitHub {
owner = "sindresorhus";
repo = "pure";
rev = "v${version}";
- sha256 = "16q9v4c8lagp4vxm7qhagilqnwf1g4pbds56x5wfj4cwc0x2gclw";
+ sha256 = "0r4y8bglwdq85dwlxh9sm23ppzy1z7i8kmjny5mx9css0likj8qv";
};
installPhase = ''
diff --git a/third_party/nixpkgs/pkgs/stdenv/generic/check-meta.nix b/third_party/nixpkgs/pkgs/stdenv/generic/check-meta.nix
index b93ea558ea..0ceb60535f 100644
--- a/third_party/nixpkgs/pkgs/stdenv/generic/check-meta.nix
+++ b/third_party/nixpkgs/pkgs/stdenv/generic/check-meta.nix
@@ -80,9 +80,9 @@ let
pos_str = meta: meta.position or "«unknown-file»";
remediation = {
- unfree = remediate_whitelist "Unfree";
- broken = remediate_whitelist "Broken";
- unsupported = remediate_whitelist "UnsupportedSystem";
+ unfree = remediate_whitelist "Unfree" remediate_unfree_predicate;
+ broken = remediate_whitelist "Broken" (x: "");
+ unsupported = remediate_whitelist "UnsupportedSystem" (x: "");
blacklisted = x: "";
insecure = remediate_insecure;
broken-outputs = remediateOutputsToInstall;
@@ -98,7 +98,17 @@ let
Broken = "broken packages";
UnsupportedSystem = "packages that are unsupported for this system";
}.${allow_attr};
- remediate_whitelist = allow_attr: attrs:
+ remediate_unfree_predicate = attrs:
+ ''
+
+ Alternatively you can configure a predicate to whitelist specific packages:
+ { nixpkgs.config.allowUnfreePredicate = pkg: builtins.elem (lib.getName pkg) [
+ "${lib.getName attrs}"
+ ];
+ }
+ '';
+
+ remediate_whitelist = allow_attr: rebuild_amendment: attrs:
''
a) To temporarily allow ${remediation_phrase allow_attr}, you can use an environment variable
for a single invocation of the nix tools.
@@ -108,7 +118,7 @@ let
b) For `nixos-rebuild` you can set
{ nixpkgs.config.allow${allow_attr} = true; }
in configuration.nix to override this.
-
+ ${rebuild_amendment attrs}
c) For `nix-env`, `nix-build`, `nix-shell` or any other Nix command you can add
{ allow${allow_attr} = true; }
to ~/.config/nixpkgs/config.nix.
diff --git a/third_party/nixpkgs/pkgs/tools/admin/azure-cli/default.nix b/third_party/nixpkgs/pkgs/tools/admin/azure-cli/default.nix
index 5f636dcf74..820fef1a74 100644
--- a/third_party/nixpkgs/pkgs/tools/admin/azure-cli/default.nix
+++ b/third_party/nixpkgs/pkgs/tools/admin/azure-cli/default.nix
@@ -1,12 +1,12 @@
{ stdenv, lib, python, fetchFromGitHub, installShellFiles }:
let
- version = "2.14.0";
+ version = "2.14.2";
src = fetchFromGitHub {
owner = "Azure";
repo = "azure-cli";
rev = "azure-cli-${version}";
- sha256 = "0rihxkdckfkqzrr3jc8jpdpjg3pgz5jymyz19lpva8qqln7cmzpy";
+ sha256 = "1d5qd39b0i5icg193ybr9gzl0axqw5ml5zjwqin1zxqj5y3r6sc2";
};
# put packages that needs to be overriden in the py package scope
diff --git a/third_party/nixpkgs/pkgs/tools/admin/exoscale-cli/default.nix b/third_party/nixpkgs/pkgs/tools/admin/exoscale-cli/default.nix
index e131389aa8..9fbedcdbf4 100644
--- a/third_party/nixpkgs/pkgs/tools/admin/exoscale-cli/default.nix
+++ b/third_party/nixpkgs/pkgs/tools/admin/exoscale-cli/default.nix
@@ -2,13 +2,13 @@
buildGoPackage rec {
pname = "exoscale-cli";
- version = "1.19.0";
+ version = "1.20.2";
src = fetchFromGitHub {
owner = "exoscale";
repo = "cli";
rev = "v${version}";
- sha256 = "05j9bwg8ph3xysd3rvykfznzs476w6wi6hj4mfg7jzw5r23ddc7k";
+ sha256 = "1vawc3ba7p35gil57wz9s1mlp1x99imvwcxfzlkfhgizfa56vfrx";
};
goPackagePath = "github.com/exoscale/cli";
diff --git a/third_party/nixpkgs/pkgs/tools/admin/procs/default.nix b/third_party/nixpkgs/pkgs/tools/admin/procs/default.nix
index 528a4467bb..05d0f7c7c2 100644
--- a/third_party/nixpkgs/pkgs/tools/admin/procs/default.nix
+++ b/third_party/nixpkgs/pkgs/tools/admin/procs/default.nix
@@ -2,16 +2,16 @@
rustPlatform.buildRustPackage rec {
pname = "procs";
- version = "0.10.5";
+ version = "0.10.7";
src = fetchFromGitHub {
owner = "dalance";
repo = pname;
rev = "v${version}";
- sha256 = "0w6a8pfk5s30yi5038kdqh4dncx2pskm7a23z66c4xj3842ci79c";
+ sha256 = "0aaspzx8sna1m5zldql0ps3sldazwr32q0md0p8z3nimww24i3b3";
};
- cargoSha256 = "07fwznx2czk1ibb77xcfhma9dpqps0m7rsmbb90gah6f32gah617";
+ cargoSha256 = "1nb38nnmmc4hf8crp0bka029hlph15zm796nqziq25i26cgz4xvp";
buildInputs = stdenv.lib.optional stdenv.isDarwin Security;
diff --git a/third_party/nixpkgs/pkgs/tools/audio/volctl/default.nix b/third_party/nixpkgs/pkgs/tools/audio/volctl/default.nix
index dd58671824..2a55015be1 100644
--- a/third_party/nixpkgs/pkgs/tools/audio/volctl/default.nix
+++ b/third_party/nixpkgs/pkgs/tools/audio/volctl/default.nix
@@ -1,6 +1,6 @@
-{ stdenv, fetchFromGitHub, pythonPackages, libpulseaudio, glib, gtk3, gobject-introspection, wrapGAppsHook }:
+{ stdenv, fetchFromGitHub, python3, libpulseaudio, glib, gtk3, gobject-introspection, wrapGAppsHook }:
-pythonPackages.buildPythonApplication rec {
+python3.pkgs.buildPythonApplication rec {
pname = "volctl";
version = "0.6.3";
@@ -22,7 +22,7 @@ pythonPackages.buildPythonApplication rec {
libpulseaudio
];
- pythonPath = with pythonPackages; [
+ pythonPath = with python3.pkgs; [
pygobject3
];
diff --git a/third_party/nixpkgs/pkgs/tools/filesystems/davfs2/0002-Make-sure-that-the-setuid-wrapped-umount-is-invoked.patch b/third_party/nixpkgs/pkgs/tools/filesystems/davfs2/0002-Make-sure-that-the-setuid-wrapped-umount-is-invoked.patch
new file mode 100644
index 0000000000..0e31725936
--- /dev/null
+++ b/third_party/nixpkgs/pkgs/tools/filesystems/davfs2/0002-Make-sure-that-the-setuid-wrapped-umount-is-invoked.patch
@@ -0,0 +1,42 @@
+From 56873cf29974ff0dfc1ba1afb7022ce49e300835 Mon Sep 17 00:00:00 2001
+From: Maximilian Bosch
+Date: Wed, 11 Nov 2020 11:58:25 +0100
+Subject: [PATCH 2/2] Make sure that the setuid-wrapped `umount` is invoked
+
+---
+ src/dav_fuse.c | 2 +-
+ src/umount_davfs.c | 4 ++--
+ 2 files changed, 3 insertions(+), 3 deletions(-)
+
+diff --git a/src/dav_fuse.c b/src/dav_fuse.c
+index 734bc1f..4501433 100644
+--- a/src/dav_fuse.c
++++ b/src/dav_fuse.c
+@@ -187,7 +187,7 @@ dav_fuse_loop(int device, char *mpoint, size_t bufsize, time_t idle_time,
+ unmounting = 1;
+ pid_t pid = fork();
+ if (pid == 0) {
+- execl("/bin/umount", "umount", "-il", mountpoint, NULL);
++ execl("@wrapperDir@/umount", "umount", "-il", mountpoint, NULL);
+ _exit(EXIT_FAILURE);
+ }
+ }
+diff --git a/src/umount_davfs.c b/src/umount_davfs.c
+index b7019c3..75e3b4b 100644
+--- a/src/umount_davfs.c
++++ b/src/umount_davfs.c
+@@ -122,9 +122,9 @@ main(int argc, char *argv[])
+
+ char *umount_command = NULL;
+ if (mpoint) {
+- umount_command = ne_concat("umount -i '", mpoint, "'", NULL);
++ umount_command = ne_concat("@wrapperDir@/umount -i '", mpoint, "'", NULL);
+ } else {
+- umount_command = ne_concat("umount -i '", argv[optind], "'", NULL);
++ umount_command = ne_concat("@wrapperDir@/umount -i '", argv[optind], "'", NULL);
+ error(0, 0,
+ _("\n"
+ " can't evaluate PID file name;\n"
+--
+2.28.0
+
diff --git a/third_party/nixpkgs/pkgs/tools/filesystems/davfs2/default.nix b/third_party/nixpkgs/pkgs/tools/filesystems/davfs2/default.nix
index 4f818ed213..02536a13d1 100644
--- a/third_party/nixpkgs/pkgs/tools/filesystems/davfs2/default.nix
+++ b/third_party/nixpkgs/pkgs/tools/filesystems/davfs2/default.nix
@@ -1,42 +1,32 @@
{ stdenv
, fetchurl
, fetchpatch
-, autoreconfHook
, neon
, procps
, substituteAll
, zlib
+, wrapperDir ? "/run/wrappers/bin"
}:
stdenv.mkDerivation rec {
- name = "davfs2-1.5.6";
+ name = "davfs2-1.6.0";
src = fetchurl {
url = "mirror://savannah/davfs2/${name}.tar.gz";
- sha256 = "00fqadhmhi2bmdar5a48nicmjcagnmaj9wgsvjr6cffmrz6pcx21";
+ sha256 = "sha256-LmtnVoW9kXdyvmDwmZrgmMgPef8g3BMej+xFR8u2O1A=";
};
- nativeBuildInputs = [
- autoreconfHook # neon-0.31.patch requires reconfiguration
- ];
-
buildInputs = [ neon zlib ];
patches = [
- ./isdir.patch
./fix-sysconfdir.patch
(substituteAll {
src = ./0001-umount_davfs-substitute-ps-command.patch;
ps = "${procps}/bin/ps";
})
-
- # Fix build with neon 0.31
- # http://savannah.nongnu.org/bugs/?58101
- (fetchpatch {
- name = "neon-0.31.patch";
- url = "http://savannah.nongnu.org/bugs/download.php?file_id=48737";
- sha256 = "117x9rql6wk230pl1nram3pp8svll9wzfs5nf407z4jnrdr1zm0j";
- extraPrefix = ""; # empty means add 'a/' and 'b/'
+ (substituteAll {
+ src = ./0002-Make-sure-that-the-setuid-wrapped-umount-is-invoked.patch;
+ inherit wrapperDir;
})
];
diff --git a/third_party/nixpkgs/pkgs/tools/filesystems/duperemove/default.nix b/third_party/nixpkgs/pkgs/tools/filesystems/duperemove/default.nix
index 53ebbb2f8d..3d70f2f73c 100644
--- a/third_party/nixpkgs/pkgs/tools/filesystems/duperemove/default.nix
+++ b/third_party/nixpkgs/pkgs/tools/filesystems/duperemove/default.nix
@@ -3,13 +3,13 @@
stdenv.mkDerivation rec {
pname = "duperemove";
- version = "0.11.1";
+ version = "0.11.2";
src = fetchFromGitHub {
owner = "markfasheh";
repo = "duperemove";
rev = "v${version}";
- sha256 = "1scz76pvpljvrpfn176125xwaqwyy4pirlm11sc9spb2hyzknw2z";
+ sha256 = "1a87mka2sfzhbch2jip6wlvvs0glxq9lqwmyrp359d1rmwwmqiw9";
};
nativeBuildInputs = [ pkgconfig ];
diff --git a/third_party/nixpkgs/pkgs/tools/filesystems/netatalk/default.nix b/third_party/nixpkgs/pkgs/tools/filesystems/netatalk/default.nix
index f7732cd76f..6abad44551 100644
--- a/third_party/nixpkgs/pkgs/tools/filesystems/netatalk/default.nix
+++ b/third_party/nixpkgs/pkgs/tools/filesystems/netatalk/default.nix
@@ -1,6 +1,6 @@
{ fetchurl, stdenv, autoreconfHook, pkgconfig, perl, python
, db, libgcrypt, avahi, libiconv, pam, openssl, acl
-, ed, glibc, libevent
+, ed, libtirpc, libevent
}:
stdenv.mkDerivation rec {
@@ -38,7 +38,7 @@ stdenv.mkDerivation rec {
/^afpd_LDADD
/am__append_2
a
- ${glibc.static}/lib/librpcsvc.a \\
+ ${libtirpc}/lib/libtirpc.so \\
.
w
EOF
diff --git a/third_party/nixpkgs/pkgs/tools/filesystems/rar2fs/default.nix b/third_party/nixpkgs/pkgs/tools/filesystems/rar2fs/default.nix
index 816aa1498c..889f075645 100644
--- a/third_party/nixpkgs/pkgs/tools/filesystems/rar2fs/default.nix
+++ b/third_party/nixpkgs/pkgs/tools/filesystems/rar2fs/default.nix
@@ -7,13 +7,13 @@
stdenv.mkDerivation rec {
pname = "rar2fs";
- version = "1.29.1";
+ version = "1.29.2";
src = fetchFromGitHub {
owner = "hasse69";
repo = pname;
rev = "v${version}";
- sha256 = "03m20bnlm70xamrxnswxs4fzc2lr2wr6f7jq6b3a8sdwq3pqbzzx";
+ sha256 = "0j7ai0gcbln2lyfc87xxmj0zpf3lnqa6fdm5rar3kdqhczb7s93y";
};
postPatch = ''
diff --git a/third_party/nixpkgs/pkgs/tools/filesystems/sshfs-fuse/default.nix b/third_party/nixpkgs/pkgs/tools/filesystems/sshfs-fuse/default.nix
index 018dfe7858..3922851af3 100644
--- a/third_party/nixpkgs/pkgs/tools/filesystems/sshfs-fuse/default.nix
+++ b/third_party/nixpkgs/pkgs/tools/filesystems/sshfs-fuse/default.nix
@@ -1,22 +1,22 @@
{ stdenv, fetchFromGitHub
-, meson, pkgconfig, ninja, docutils, makeWrapper
+, meson, pkg-config, ninja, docutils, makeWrapper
, fuse3, glib
, which, python3Packages
, openssh
}:
stdenv.mkDerivation rec {
- version = "3.7.0";
+ version = "3.7.1";
pname = "sshfs-fuse";
src = fetchFromGitHub {
owner = "libfuse";
repo = "sshfs";
rev = "sshfs-${version}";
- sha256 = "119qvjaai3nqs2psqk2kv4gxjchrnrcfnmlwk7yxnj3v59pgyxhv";
+ sha256 = "088mgcsqv9f2vly4xn6lvvkmqkgr9jjmjs9qp8938hl7j6rrgd17";
};
- nativeBuildInputs = [ meson pkgconfig ninja docutils makeWrapper ];
+ nativeBuildInputs = [ meson pkg-config ninja docutils makeWrapper ];
buildInputs = [ fuse3 glib ];
checkInputs = [ which python3Packages.pytest ];
diff --git a/third_party/nixpkgs/pkgs/tools/graphics/gifski/default.nix b/third_party/nixpkgs/pkgs/tools/graphics/gifski/default.nix
index 612db49c8a..aa247a4c91 100644
--- a/third_party/nixpkgs/pkgs/tools/graphics/gifski/default.nix
+++ b/third_party/nixpkgs/pkgs/tools/graphics/gifski/default.nix
@@ -2,16 +2,16 @@
rustPlatform.buildRustPackage rec {
pname = "gifski";
- version = "1.2.2";
+ version = "1.2.4";
src = fetchFromGitHub {
owner = "ImageOptim";
repo = "gifski";
rev = version;
- sha256 = "175wlvn6psa3xx9g2i05xykk24wpmkr0m27rm95jyi0kzlqdc466";
+ sha256 = "0mr4ni75klmzfjivfv5xmcdw03y1gjvkz1d297gwh46zq1q7blf3";
};
- cargoSha256 = "01gf8v6q2rpaik6dyxch8n2mpaxp222v32zrw19059hn3smg98l0";
+ cargoSha256 = "0wm139lik6w2hwg72j8hcphp0z89bbabfxjmfyqrih6akyzb0l01";
nativeBuildInputs = [ pkgconfig ];
diff --git a/third_party/nixpkgs/pkgs/tools/graphics/oxipng/default.nix b/third_party/nixpkgs/pkgs/tools/graphics/oxipng/default.nix
index 965c799a21..cdb8a16708 100644
--- a/third_party/nixpkgs/pkgs/tools/graphics/oxipng/default.nix
+++ b/third_party/nixpkgs/pkgs/tools/graphics/oxipng/default.nix
@@ -1,20 +1,15 @@
-{ stdenv, fetchFromGitHub, rustPlatform }:
+{ stdenv, fetchCrate, rustPlatform }:
rustPlatform.buildRustPackage rec {
- version = "3.0.1";
+ version = "4.0.0";
pname = "oxipng";
- src = fetchFromGitHub {
- owner = "shssoichiro";
- repo = pname;
- rev = "v${version}";
- sha256 = "11lncwxksm7aqczy9ay1qnba2wmgfsirhgrl6vv1jlgj41b7mzi5";
+ src = fetchCrate {
+ inherit version pname;
+ sha256 = "0p9h006l75ci324lbcx496732pb77srcd46g6dnfw3mcrg33cspc";
};
- cargoSha256 = "0lalb981qzlnmqfg170mh6lnc0qlzb94wc39mf859g2jvxk3pkrl";
-
- # https://crates.io/crates/cloudflare-zlib#arm-vs-nightly-rust
- cargoBuildFlags = [ "--features=cloudflare-zlib/arm-always" ];
+ cargoSha256 = "1r2zw7p95abxqc31b5gswdyhm4msxsiml34dsh9x8zydhqnwy17j";
doCheck = !stdenv.isAarch64 && !stdenv.isDarwin;
diff --git a/third_party/nixpkgs/pkgs/tools/inputmethods/ibus-engines/ibus-libthai/default.nix b/third_party/nixpkgs/pkgs/tools/inputmethods/ibus-engines/ibus-libthai/default.nix
new file mode 100644
index 0000000000..9c5f2cefb5
--- /dev/null
+++ b/third_party/nixpkgs/pkgs/tools/inputmethods/ibus-engines/ibus-libthai/default.nix
@@ -0,0 +1,24 @@
+{ stdenv, fetchurl, makeWrapper, pkg-config, ibus, gtk3, libthai }:
+
+stdenv.mkDerivation rec {
+ pname = "ibus-libthai";
+ version = "0.1.4";
+
+ src = fetchurl {
+ url = "https://linux.thai.net/pub/ThaiLinux/software/libthai/ibus-libthai-${version}.tar.xz";
+ sha256 = "0iam7308rxkx2xwaabc5wyj7vrxgd4cr95pvwrkm8fr9gh2xnwgv";
+ };
+
+ nativeBuildInputs = [ pkg-config ];
+
+ buildInputs = [ gtk3 ibus libthai ];
+
+ meta = with stdenv.lib; {
+ isIbusEngine = true;
+ homepage = "https://linux.thai.net/projects/ibus-libthai";
+ description = "Thai input method engine for IBus";
+ license = licenses.lgpl21Plus;
+ platforms = platforms.unix;
+ maintainers = with maintainers; [ SuperSandro2000 ];
+ };
+}
diff --git a/third_party/nixpkgs/pkgs/tools/misc/bandwidth/default.nix b/third_party/nixpkgs/pkgs/tools/misc/bandwidth/default.nix
index 8cd926c5c2..024454a347 100644
--- a/third_party/nixpkgs/pkgs/tools/misc/bandwidth/default.nix
+++ b/third_party/nixpkgs/pkgs/tools/misc/bandwidth/default.nix
@@ -1,13 +1,8 @@
{ stdenv, fetchurl, nasm }:
let
- arch =
- if stdenv.hostPlatform.system == "x86_64-linux" then "bandwidth64"
- else if stdenv.hostPlatform.system == "i686-linux" then "bandwidth32"
- else if stdenv.hostPlatform.system == "x86_64-darwin" then "bandwidth-mac64"
- else if stdenv.hostPlatform.system == "i686-darwin" then "bandwidth-mac32"
- else if stdenv.hostPlatform.system == "i686-cygwin" then "bandwidth-win32"
- else throw "Unknown architecture";
+ inherit (stdenv.hostPlatform.parsed.cpu) bits;
+ arch = "bandwidth${toString bits}";
in
stdenv.mkDerivation rec {
pname = "bandwidth";
@@ -18,21 +13,25 @@ stdenv.mkDerivation rec {
sha256 = "0x798xj3vhiwq2hal0vmf92sq4h7yalp3i6ylqwhnnpv99m2zws4";
};
- buildInputs = [ nasm ];
+ postPatch = ''
+ sed -i 's,^CC=gcc .*,,' OOC/Makefile Makefile*
+ sed -i 's,ar ,$(AR) ,g' OOC/Makefile
+ '';
- buildFlags = [ arch ]
- ++ stdenv.lib.optionals stdenv.cc.isClang [ "CC=clang" "LD=clang" ];
+ nativeBuildInputs = [ nasm ];
+
+ buildFlags = [ arch ];
installPhase = ''
mkdir -p $out/bin
- cp ${arch} $out/bin
- ln -s ${arch} $out/bin/bandwidth
+ cp ${arch} $out/bin/bandwidth
'';
meta = with stdenv.lib; {
homepage = "https://zsmith.co/bandwidth.html";
description = "Artificial benchmark for identifying weaknesses in the memory subsystem";
- license = licenses.mit;
- platforms = platforms.unix;
+ license = licenses.gpl2Plus;
+ platforms = platforms.x86;
+ maintainers = with maintainers; [ r-burns ];
};
}
diff --git a/third_party/nixpkgs/pkgs/tools/misc/cp437/default.nix b/third_party/nixpkgs/pkgs/tools/misc/cp437/default.nix
new file mode 100644
index 0000000000..70ca44bd06
--- /dev/null
+++ b/third_party/nixpkgs/pkgs/tools/misc/cp437/default.nix
@@ -0,0 +1,28 @@
+{ stdenv, fetchFromGitHub }:
+let version = "0.6";
+in
+stdenv.mkDerivation {
+ pname = "cp437";
+ inherit version;
+
+ src = fetchFromGitHub {
+ owner = "keaston";
+ repo = "cp437";
+ rev = "v${version}";
+ sha256 = "18f4mnfnyviqclbhmbhix80k823481ypkwbp26qfvhnxdgzbggcc";
+ };
+
+ installPhase = ''
+ install -Dm755 cp437 -t $out/bin
+ '';
+
+ meta = with stdenv.lib; {
+ description = ''
+ Emulates an old-style "code page 437" / "IBM-PC" character
+ set terminal on a modern UTF-8 terminal emulator
+ '';
+ homepage = "https://github.com/keaston/cp437";
+ license = licenses.bsd3;
+ maintainers = with maintainers; [ jb55 ];
+ };
+}
diff --git a/third_party/nixpkgs/pkgs/tools/misc/duf/default.nix b/third_party/nixpkgs/pkgs/tools/misc/duf/default.nix
index 831d66c73c..29456f54cd 100644
--- a/third_party/nixpkgs/pkgs/tools/misc/duf/default.nix
+++ b/third_party/nixpkgs/pkgs/tools/misc/duf/default.nix
@@ -2,13 +2,13 @@
buildGoModule rec {
pname = "duf";
- version = "0.4.0";
+ version = "0.5.0";
src = fetchFromGitHub {
owner = "muesli";
repo = "duf";
rev = "v${version}";
- sha256 = "093kir1zwpkl0jic4p1f032ir5k7kra94di2indzn0fa4j4r7a0i";
+ sha256 = "0n0nvrqrlr75dmf2j6ja615ighzs35cfixn7z9cwdz3vhj1xhc5f";
};
dontStrip = true;
diff --git a/third_party/nixpkgs/pkgs/tools/misc/fend/default.nix b/third_party/nixpkgs/pkgs/tools/misc/fend/default.nix
new file mode 100644
index 0000000000..ee91c66cc8
--- /dev/null
+++ b/third_party/nixpkgs/pkgs/tools/misc/fend/default.nix
@@ -0,0 +1,22 @@
+{ lib, fetchFromGitHub, rustPlatform }:
+
+rustPlatform.buildRustPackage rec {
+ pname = "fend";
+ version = "0.1.9";
+
+ src = fetchFromGitHub {
+ owner = "printfn";
+ repo = pname;
+ rev = "v${version}";
+ sha256 = "11cvpg7j2rvqri16cr3gb6dpm7dzgs3vywhdc91aa531f87qj16c";
+ };
+
+ cargoSha256 = "0q9gkvbay6rnb0nd14z71h3506yzn9610zc6g8wbpgmw6cpwvbg9";
+
+ meta = with lib; {
+ description = "Arbitrary-precision unit-aware calculator";
+ homepage = "https://github.com/printfn/fend";
+ license = licenses.mit;
+ maintainers = with maintainers; [ djanatyn ];
+ };
+}
diff --git a/third_party/nixpkgs/pkgs/tools/misc/fluent-bit/default.nix b/third_party/nixpkgs/pkgs/tools/misc/fluent-bit/default.nix
index 0f67ab84d4..7616e6a5b3 100644
--- a/third_party/nixpkgs/pkgs/tools/misc/fluent-bit/default.nix
+++ b/third_party/nixpkgs/pkgs/tools/misc/fluent-bit/default.nix
@@ -2,13 +2,13 @@
stdenv.mkDerivation rec {
pname = "fluent-bit";
- version = "1.6.2";
+ version = "1.6.3";
src = fetchFromGitHub {
owner = "fluent";
repo = "fluent-bit";
rev = "v${version}";
- sha256 = "0v2n43mn6n4nn6r2d4ksp98793xkx334xp078vhvgi01nsmd60x7";
+ sha256 = "0c8b5xg1shdncw24jsnzwk96ln4qmw1h2qlxv6467lf083kz0azw";
};
nativeBuildInputs = [ cmake flex bison ];
diff --git a/third_party/nixpkgs/pkgs/tools/misc/lokalise2-cli/default.nix b/third_party/nixpkgs/pkgs/tools/misc/lokalise2-cli/default.nix
index 19dafb4cef..a823973bf9 100644
--- a/third_party/nixpkgs/pkgs/tools/misc/lokalise2-cli/default.nix
+++ b/third_party/nixpkgs/pkgs/tools/misc/lokalise2-cli/default.nix
@@ -2,13 +2,13 @@
buildGoModule rec {
pname = "lokalise2-cli";
- version = "2.6.0";
+ version = "2.6.1";
src = fetchFromGitHub {
owner = "lokalise";
repo = "lokalise-cli-2-go";
rev = "v${version}";
- sha256 = "15lwy2rrb5d5r0asa51bgjr42pcknk6znx6qirw9s924i8dbzp6s";
+ sha256 = "0a3bah5xa2vmxgqkqihbvcc8rpl64yhw3i0c30lhfdfza0jisaql";
};
vendorSha256 = "06y1v0v1kkbd5vxa8h0qvasm9ibwwhz0v4x03k3nb5xlwn0x9jx8";
diff --git a/third_party/nixpkgs/pkgs/tools/misc/mutagen/default.nix b/third_party/nixpkgs/pkgs/tools/misc/mutagen/default.nix
index ca75bf34dd..8d71f75622 100644
--- a/third_party/nixpkgs/pkgs/tools/misc/mutagen/default.nix
+++ b/third_party/nixpkgs/pkgs/tools/misc/mutagen/default.nix
@@ -2,13 +2,13 @@
buildGoModule rec {
pname = "mutagen";
- version = "0.11.7";
+ version = "0.11.8";
src = fetchFromGitHub {
owner = "mutagen-io";
repo = pname;
rev = "v${version}";
- sha256 = "11wp94khj9bzmadij0nq6i6q0x9z6h0zy4a6fhf322y5nxsmvcgy";
+ sha256 = "17ycd2y7hgwa2yxbin86i6aj67x7xaajwz3mqgdyfvkja5hgbjyr";
};
vendorSha256 = "0szs9yc49fyh55ra1wf8zj76kdah0x49d45cgivk3gqh2hl17j6l";
diff --git a/third_party/nixpkgs/pkgs/tools/misc/onefetch/default.nix b/third_party/nixpkgs/pkgs/tools/misc/onefetch/default.nix
index ba210ca363..4b35d23940 100644
--- a/third_party/nixpkgs/pkgs/tools/misc/onefetch/default.nix
+++ b/third_party/nixpkgs/pkgs/tools/misc/onefetch/default.nix
@@ -3,16 +3,16 @@
rustPlatform.buildRustPackage rec {
pname = "onefetch";
- version = "2.7.0";
+ version = "2.7.1";
src = fetchFromGitHub {
owner = "o2sh";
repo = pname;
rev = "v${version}";
- sha256 = "sha256-9HZLr/dwr5T1m6H/SHy9ULfKMkyrLNb2Z8W3RlSWzGM=";
+ sha256 = "1l4acikxkxvmdqn10ck4w4f100vz7kfrzghz5h4haj7ycrr35j3l";
};
- cargoSha256 = "sha256-cyffVX1XEF5zaNbk/VeZEtKG/Npwv5Yzz9OU5G9UyGc=";
+ cargoSha256 = "0rmy0jnf5rqd4dqyl6rinxb3n3rzqnixrybs4i27lcas9m753z40";
buildInputs = with stdenv;
lib.optionals isDarwin [ CoreFoundation libiconv libresolv Security ];
diff --git a/third_party/nixpkgs/pkgs/tools/misc/pgcenter/default.nix b/third_party/nixpkgs/pkgs/tools/misc/pgcenter/default.nix
index a84ad1fadb..601694ebc3 100644
--- a/third_party/nixpkgs/pkgs/tools/misc/pgcenter/default.nix
+++ b/third_party/nixpkgs/pkgs/tools/misc/pgcenter/default.nix
@@ -2,13 +2,13 @@
buildGoModule rec {
pname = "pgcenter";
- version = "0.6.5";
+ version = "0.6.6";
src = fetchFromGitHub {
owner = "lesovsky";
repo = "pgcenter";
rev = "v${version}";
- sha256 = "03n1gn944z6rz5g643y68hvfxpxp65mip32w1zx43xr60x1vpf2v";
+ sha256 = "1axwsclssxsg38ppdmd4v1lbs87ksrwj5z76ckjk8jjfni1xp9sr";
};
vendorSha256 = "1mzvpr12qh9668iz97p62zl4zhlrcyfgwr4a9zg9irj585pkb5x2";
diff --git a/third_party/nixpkgs/pkgs/tools/misc/pgmetrics/default.nix b/third_party/nixpkgs/pkgs/tools/misc/pgmetrics/default.nix
index 600aa3d07d..ff1b6c01f4 100644
--- a/third_party/nixpkgs/pkgs/tools/misc/pgmetrics/default.nix
+++ b/third_party/nixpkgs/pkgs/tools/misc/pgmetrics/default.nix
@@ -2,13 +2,13 @@
buildGoModule rec {
pname = "pgmetrics";
- version = "1.10.0";
+ version = "1.10.2";
src = fetchFromGitHub {
owner = "rapidloop";
repo = pname;
rev = "v${version}";
- sha256 = "1256mcac75nlr1c7pzsgqmjq026m6qxh9dlldndvl1s08bk7pxr9";
+ sha256 = "0mhdw985gs9gh44iz78a588nnnapirpnd7s0zh35jyripx8pgw47";
};
vendorSha256 = "16x33fmh4q993rw0jr65337yimska4fwgyyw3kmq84q0x28a3zg5";
diff --git a/third_party/nixpkgs/pkgs/tools/misc/pistol/default.nix b/third_party/nixpkgs/pkgs/tools/misc/pistol/default.nix
index dfbe5536bc..d5061d61f5 100644
--- a/third_party/nixpkgs/pkgs/tools/misc/pistol/default.nix
+++ b/third_party/nixpkgs/pkgs/tools/misc/pistol/default.nix
@@ -6,16 +6,16 @@
buildGoModule rec {
pname = "pistol";
- version = "0.1.4";
+ version = "0.1.7";
src = fetchFromGitHub {
owner = "doronbehar";
repo = pname;
rev = "v${version}";
- sha256 = "1x9wb0gj5l71xz15ia0i2hrnhcpf457i21w41jzw2ink2fbdxp3b";
+ sha256 = "0kspix7ac4fb0gblrlhnf8hi2ijc997qqkhmy47jibmj6120lmqk";
};
- vendorSha256 = "0dg4f9g6895nv3c6d74ijl6hzsyn620ndspbcq7ynvb1z0hsg6iz";
+ vendorSha256 = "08fjavadx5mwibzc130mlhp4zph6iwv15xnd4rsniw6zldkzmczy";
doCheck = false;
diff --git a/third_party/nixpkgs/pkgs/tools/misc/tmuxp/default.nix b/third_party/nixpkgs/pkgs/tools/misc/tmuxp/default.nix
index 515d7001fb..a02c1d0f43 100644
--- a/third_party/nixpkgs/pkgs/tools/misc/tmuxp/default.nix
+++ b/third_party/nixpkgs/pkgs/tools/misc/tmuxp/default.nix
@@ -4,11 +4,11 @@ with python.pkgs;
buildPythonApplication rec {
pname = "tmuxp";
- version = "1.5.8";
+ version = "1.6.2";
src = fetchPypi {
inherit pname version;
- sha256 = "09b403c9e1ef50695fab1e72376ff5674906b485fbcaad50c7cafec1ba775087";
+ sha256 = "feec0be98a60c8cd8557bce388156202496dd9c8998e6913e595e939aeb0f735";
};
postPatch = ''
diff --git a/third_party/nixpkgs/pkgs/tools/misc/topgrade/default.nix b/third_party/nixpkgs/pkgs/tools/misc/topgrade/default.nix
index 9da96dd352..01c52ba6cc 100644
--- a/third_party/nixpkgs/pkgs/tools/misc/topgrade/default.nix
+++ b/third_party/nixpkgs/pkgs/tools/misc/topgrade/default.nix
@@ -2,16 +2,16 @@
rustPlatform.buildRustPackage rec {
pname = "topgrade";
- version = "5.8.1";
+ version = "5.9.1";
src = fetchFromGitHub {
owner = "r-darwish";
repo = pname;
rev = "v${version}";
- sha256 = "0m3kqk0ghlpzysyql777jlk5c0nb36z44vabw6r0484fh5vncwrh";
+ sha256 = "17vrnwx8qv2s2m9sj7h4gxxrnppqs9yzjzp8jsyfnpqd66h60wcg";
};
- cargoSha256 = "1h5cyiyhpagdin9a8gfsccbl4jahw33nbkg5m74axyp4qrfc1mkz";
+ cargoSha256 = "1k5lslin5qpmgz1zkz6xazjnapbr0i5r2ifzcz7bdbxwkaaliksd";
buildInputs = lib.optional stdenv.isDarwin Foundation;
diff --git a/third_party/nixpkgs/pkgs/tools/misc/trash-cli/default.nix b/third_party/nixpkgs/pkgs/tools/misc/trash-cli/default.nix
index 141cceff24..d7354425b7 100644
--- a/third_party/nixpkgs/pkgs/tools/misc/trash-cli/default.nix
+++ b/third_party/nixpkgs/pkgs/tools/misc/trash-cli/default.nix
@@ -3,13 +3,13 @@
python3Packages.buildPythonApplication rec {
pname = "trash-cli";
- version = "0.17.1.14";
+ version = "0.20.11.7";
src = fetchFromGitHub {
owner = "andreafrancia";
repo = "trash-cli";
rev = version;
- sha256 = "1bqazna223ibqjwbc1wfvfnspfyrvjy8347qlrgv4cpng72n7gfi";
+ sha256 = "0083vagy0jkahb5sw1il7r53ggk45zbjwwjsqd76v7ph3v1awf4v";
};
patches = [
@@ -19,18 +19,6 @@ python3Packages.buildPythonApplication rec {
libc = let ext = if stdenv.isDarwin then ".dylib" else ".so.6";
in "${stdenv.cc.libc}/lib/libc${ext}";
})
-
- # Fix build on Python 3.6.
- (fetchpatch {
- url = "https://github.com/andreafrancia/trash-cli/commit/a21b80d1e69783bb09376c3f60dd2f2a10578805.patch";
- sha256 = "0w49rjh433sjfc2cl5a9wlbr6kcn9f1qg905qsyv7ay3ar75wvyp";
- })
-
- # Fix listing trashed files over mount points, see https://github.com/andreafrancia/trash-cli/issues/95
- (fetchpatch {
- url = "https://github.com/andreafrancia/trash-cli/commit/436dfddb4c2932ba3ff696e4732750b7bdc58461.patch";
- sha256 = "02pkcz7nj67jbnqpw1943nrv95m8xyjvab4j62fa64r73fagm8m4";
- })
];
checkInputs = with python3Packages; [
diff --git a/third_party/nixpkgs/pkgs/tools/misc/vector/default.nix b/third_party/nixpkgs/pkgs/tools/misc/vector/default.nix
index 37595702b6..701e86dbf9 100644
--- a/third_party/nixpkgs/pkgs/tools/misc/vector/default.nix
+++ b/third_party/nixpkgs/pkgs/tools/misc/vector/default.nix
@@ -4,9 +4,11 @@
, tzdata
, features ?
- (if stdenv.isAarch64
+ ((if stdenv.isAarch64
then [ "jemallocator" "rdkafka" "rdkafka/dynamic_linking" ]
else [ "leveldb" "leveldb/leveldb-sys-2" "jemallocator" "rdkafka" "rdkafka/dynamic_linking" ])
+ ++
+ [ "sinks" "sources" "transforms" ])
, coreutils
, CoreServices
}:
@@ -38,9 +40,20 @@ rustPlatform.buildRustPackage rec {
# vector.dev during the checkPhase, which obviously isn't going to work.
# these tests in the DNS module are trivial though, so stubbing them out is
# fine IMO.
+ #
+ # the geoip transform yields maxmindb.so which contains references to rustc.
+ # neither figured out why the shared object is included in the output
+ # (it doesn't seem to be a runtime dependencies of the geoip transform),
+ # nor do I know why it depends on rustc.
+ # However, in order for the closure size to stay at a reasonable level,
+ # transforms-geoip is patched out of Cargo.toml for now - unless explicitly asked for.
patchPhase = ''
substituteInPlace ./src/dns.rs \
--replace "#[test]" ""
+
+ ${lib.optionalString (!builtins.elem "transforms-geoip" features) ''
+ substituteInPlace ./Cargo.toml --replace '"transforms-geoip",' ""
+ ''}
'';
meta = with stdenv.lib; {
diff --git a/third_party/nixpkgs/pkgs/tools/networking/dnsproxy/default.nix b/third_party/nixpkgs/pkgs/tools/networking/dnsproxy/default.nix
index 68739507d3..b2c19e2acf 100644
--- a/third_party/nixpkgs/pkgs/tools/networking/dnsproxy/default.nix
+++ b/third_party/nixpkgs/pkgs/tools/networking/dnsproxy/default.nix
@@ -2,13 +2,13 @@
buildGoModule rec {
pname = "dnsproxy";
- version = "0.32.6";
+ version = "0.33.2";
src = fetchFromGitHub {
owner = "AdguardTeam";
repo = pname;
rev = "v${version}";
- sha256 = "0wcn2wr521n2vcmpnwphgycq109251nkfdr0wzn7lk2zl5qx81ax";
+ sha256 = "0x005lgncaf1fzs27fpcpf6dcncb7wia6fka64pmjxdsq7nmh1hh";
};
vendorSha256 = null;
diff --git a/third_party/nixpkgs/pkgs/tools/networking/frp/default.nix b/third_party/nixpkgs/pkgs/tools/networking/frp/default.nix
index 0e00009751..582ec78d09 100644
--- a/third_party/nixpkgs/pkgs/tools/networking/frp/default.nix
+++ b/third_party/nixpkgs/pkgs/tools/networking/frp/default.nix
@@ -2,13 +2,13 @@
buildGoModule rec {
pname = "frp";
- version = "0.34.1";
+ version = "0.34.2";
src = fetchFromGitHub {
owner = "fatedier";
repo = pname;
rev = "v${version}";
- sha256 = "1n1b7rr6njblz3rmsdl6xng4swlagg2z3jnik0gnajiq3w8ajwdj";
+ sha256 = "0r7bp99kbp5nh5kqrxc4fb7pblpmcksbq67c6z922hvynpgnycj0";
};
vendorSha256 = "18d9478ndzywwmh0jsxcb4i2rqyn3vzrgwflqrsv7krijalknsc9";
diff --git a/third_party/nixpkgs/pkgs/tools/networking/network-manager/default.nix b/third_party/nixpkgs/pkgs/tools/networking/network-manager/default.nix
index f5b12a6cf3..c02275ef5b 100644
--- a/third_party/nixpkgs/pkgs/tools/networking/network-manager/default.nix
+++ b/third_party/nixpkgs/pkgs/tools/networking/network-manager/default.nix
@@ -62,6 +62,13 @@ in stdenv.mkDerivation rec {
# Meson does not support using different directories during build and
# for installation like Autotools did with flags passed to make install.
./fix-install-paths.patch
+
+ # Fix build
+ # https://gitlab.freedesktop.org/NetworkManager/NetworkManager/-/merge_requests/620
+ (fetchpatch {
+ url = "https://gitlab.freedesktop.org/NetworkManager/NetworkManager/commit/54e25f23f53af889703dfc50d51a8afeeea8a439.patch";
+ sha256 = "oy/AZhOC15anWeIMYJfDBcITqJ7CiU715he68XvPRxk=";
+ })
];
buildInputs = [
diff --git a/third_party/nixpkgs/pkgs/tools/networking/openssh/default.nix b/third_party/nixpkgs/pkgs/tools/networking/openssh/default.nix
index 64e6757891..1a96cc58d5 100644
--- a/third_party/nixpkgs/pkgs/tools/networking/openssh/default.nix
+++ b/third_party/nixpkgs/pkgs/tools/networking/openssh/default.nix
@@ -19,13 +19,13 @@
let
- version = "8.3p1";
+ version = "8.4p1";
# **please** update this patch when you update to a new openssh release.
gssapiPatch = fetchpatch {
name = "openssh-gssapi.patch";
- url = "https://salsa.debian.org/ssh-team/openssh/raw/debian/1%25${version}-1/debian/patches/gssapi.patch";
- sha256 = "0j22ccg6msyi88mpsb6x0il5cg8v2b7qdah57ninbwx5isyld80l";
+ url = "https://salsa.debian.org/ssh-team/openssh/raw/debian/1%25${version}-2/debian/patches/gssapi.patch";
+ sha256 = "1z1ckzimlkm1dmr9f5fqjnjg28gsqcwx6xka0klak857548d2lp2";
};
in
@@ -37,12 +37,12 @@ stdenv.mkDerivation rec {
src = if hpnSupport then
fetchurl {
url = "https://github.com/rapier1/openssh-portable/archive/hpn-KitchenSink-${replaceStrings [ "." "p" ] [ "_" "_P" ] version}.tar.gz";
- sha256 = "1ssdwgdxnvjwigisqi8c053znps5a4jf7bzsi99y0xyfzbw0x55k";
+ sha256 = "06mr2q8d9kbj145r7mzmpm3a4ilnssibwlbjyy0bjsqrqnrll3zl";
}
else
fetchurl {
url = "mirror://openbsd/OpenSSH/portable/${pname}-${version}.tar.gz";
- sha256 = "1cl74ghi9y21dc3f4xa0qamb7dhwacbynh1ks9syprrg8zhgpgpj";
+ sha256 = "091b3pxdlj47scxx6kkf4agkx8c8sdacdxx8m1dw1cby80pd40as";
};
patches =
diff --git a/third_party/nixpkgs/pkgs/tools/nix/nixos-generators/default.nix b/third_party/nixpkgs/pkgs/tools/nix/nixos-generators/default.nix
index c1e8449460..74bbcbd0ae 100644
--- a/third_party/nixpkgs/pkgs/tools/nix/nixos-generators/default.nix
+++ b/third_party/nixpkgs/pkgs/tools/nix/nixos-generators/default.nix
@@ -2,12 +2,12 @@
stdenv.mkDerivation rec {
pname = "nixos-generators";
- version = "1.1.0";
+ version = "1.2.0";
src = fetchFromGitHub {
owner = "nix-community";
repo = "nixos-generators";
rev = version;
- sha256 = "04cfhj42c2m7lafir9ksh36n3nhx3x20lhamyk4zc5p3pm1xdbs6";
+ sha256 = "1iwc39hzvzzyndxwbnl3fck7phxnjpnhy8zn4nyp8is1fiw0648v";
};
nativeBuildInputs = [ makeWrapper ];
installFlags = [ "PREFIX=$(out)" ];
diff --git a/third_party/nixpkgs/pkgs/tools/package-management/nfpm/default.nix b/third_party/nixpkgs/pkgs/tools/package-management/nfpm/default.nix
index 2ecc64a09b..62baff512b 100644
--- a/third_party/nixpkgs/pkgs/tools/package-management/nfpm/default.nix
+++ b/third_party/nixpkgs/pkgs/tools/package-management/nfpm/default.nix
@@ -2,16 +2,16 @@
buildGoModule rec {
pname = "nfpm";
- version = "1.8.0";
+ version = "1.10.0";
src = fetchFromGitHub {
owner = "goreleaser";
repo = pname;
rev = "v${version}";
- sha256 = "0hg15k9bz5iw7mv4m31rg4f5anfiirr3vjvy16z532vwfh05ixw3";
+ sha256 = "1pgdajbphqfn430jwm052czz1d4ynl6n4z2wjzmblv7lwkbh9j3d";
};
- vendorSha256 = "032l0xrf4ny4ildinxlfjy8sslhcl2krmgnm07dnx999jxlswxym";
+ vendorSha256 = "0x7r7qn4852q57fx5mcrw3aqdydmidk9g0hvj6apj81q77k5svqs";
doCheck = false;
diff --git a/third_party/nixpkgs/pkgs/tools/security/aws-okta/default.nix b/third_party/nixpkgs/pkgs/tools/security/aws-okta/default.nix
index d4abe12d66..340c2cd971 100644
--- a/third_party/nixpkgs/pkgs/tools/security/aws-okta/default.nix
+++ b/third_party/nixpkgs/pkgs/tools/security/aws-okta/default.nix
@@ -2,7 +2,7 @@
buildGoPackage rec {
pname = "aws-okta";
- version = "1.0.6";
+ version = "1.0.8";
goPackagePath = "github.com/segmentio/aws-okta";
@@ -10,7 +10,7 @@ buildGoPackage rec {
owner = "segmentio";
repo = "aws-okta";
rev = "v${version}";
- sha256 = "1nhcqj3vhdgk0a0smmyqphjw2slcvqbb8xd8bx506j8h8x84p6yf";
+ sha256 = "14bg9rdfxkpw00phc8faz4ghiyb0j7a9qai74lidrzplzl139bzf";
};
buildFlags = [ "--tags" "release" ];
diff --git a/third_party/nixpkgs/pkgs/tools/security/doppler/default.nix b/third_party/nixpkgs/pkgs/tools/security/doppler/default.nix
index 2492390bdd..d31ad30ff6 100644
--- a/third_party/nixpkgs/pkgs/tools/security/doppler/default.nix
+++ b/third_party/nixpkgs/pkgs/tools/security/doppler/default.nix
@@ -2,13 +2,13 @@
buildGoModule rec {
pname = "doppler";
- version = "3.16.0";
+ version = "3.16.1";
src = fetchFromGitHub {
owner = "dopplerhq";
repo = "cli";
rev = version;
- sha256 = "1hypi62bzdpa55bd9z9lvisw7ybcn8jlk0kyck9h7wc2ll59jzwx";
+ sha256 = "141ic9vgkqv3hdcpj1dlb4lawzd2rm7h2np21x28mmsd0hlg6v7y";
};
vendorSha256 = "1s8zwjfk9kcddn8cywr7llh9v5m140kvmi5lmy2glvwh3rwccgxf";
diff --git a/third_party/nixpkgs/pkgs/tools/security/gnupg/22.nix b/third_party/nixpkgs/pkgs/tools/security/gnupg/22.nix
index 48271a2f5b..605947e3ab 100644
--- a/third_party/nixpkgs/pkgs/tools/security/gnupg/22.nix
+++ b/third_party/nixpkgs/pkgs/tools/security/gnupg/22.nix
@@ -71,6 +71,9 @@ stdenv.mkDerivation rec {
# add gpg2 symlink to make sure git does not break when signing commits
ln -s $out/bin/gpg $out/bin/gpg2
+
+ # Make libexec tools available in PATH
+ ln -s -t $out/bin $out/libexec/*
'';
meta = with stdenv.lib; {
diff --git a/third_party/nixpkgs/pkgs/tools/security/onioncircuits/default.nix b/third_party/nixpkgs/pkgs/tools/security/onioncircuits/default.nix
index 0eb0f7b401..92888a8de2 100644
--- a/third_party/nixpkgs/pkgs/tools/security/onioncircuits/default.nix
+++ b/third_party/nixpkgs/pkgs/tools/security/onioncircuits/default.nix
@@ -1,6 +1,6 @@
-{ stdenv, fetchgit, pythonPackages, intltool, gtk3, gobject-introspection, gnome3 }:
+{ stdenv, fetchgit, python3, intltool, gtk3, gobject-introspection, gnome3 }:
-pythonPackages.buildPythonApplication rec {
+python3.pkgs.buildPythonApplication rec {
pname = "onioncircuits";
version = "0.5";
@@ -12,7 +12,7 @@ pythonPackages.buildPythonApplication rec {
nativeBuildInputs = [ intltool ];
buildInputs = [ intltool gtk3 gobject-introspection ];
- propagatedBuildInputs = with pythonPackages; [ stem distutils_extra pygobject3 ];
+ propagatedBuildInputs = with python3.pkgs; [ stem distutils_extra pygobject3 ];
postFixup = ''
wrapProgram "$out/bin/onioncircuits" \
diff --git a/third_party/nixpkgs/pkgs/tools/security/saml2aws/default.nix b/third_party/nixpkgs/pkgs/tools/security/saml2aws/default.nix
index fc52662e53..68721bbdeb 100644
--- a/third_party/nixpkgs/pkgs/tools/security/saml2aws/default.nix
+++ b/third_party/nixpkgs/pkgs/tools/security/saml2aws/default.nix
@@ -2,13 +2,13 @@
buildGoModule rec {
pname = "saml2aws";
- version = "2.27.0";
+ version = "2.27.1";
src = fetchFromGitHub {
owner = "Versent";
repo = "saml2aws";
rev = "v${version}";
- sha256 = "15ddzab93iqwbvxnaw5wp4dzwlxjqxvyy1c4w37jm69zkczylrmc";
+ sha256 = "1ffq7jh14cj45wn5rx9awh5k8hqbfwm4fjz0a0rq22yqfwbbkkj2";
};
runVend = true;
diff --git a/third_party/nixpkgs/pkgs/tools/security/sudolikeaboss/default.nix b/third_party/nixpkgs/pkgs/tools/security/sudolikeaboss/default.nix
index 97db4a28c4..639926578c 100644
--- a/third_party/nixpkgs/pkgs/tools/security/sudolikeaboss/default.nix
+++ b/third_party/nixpkgs/pkgs/tools/security/sudolikeaboss/default.nix
@@ -1,5 +1,5 @@
# This file was generated by go2nix, then modified by hand for Darwin support.
-{ stdenv, buildGoPackage, fetchFromGitHub, fixDarwinDylibNames, darwin }:
+{ stdenv, buildGoPackage, fetchFromGitHub, darwin }:
buildGoPackage rec {
pname = "sudolikeaboss-unstable";
@@ -17,9 +17,8 @@ buildGoPackage rec {
goDeps = ./deps.nix;
- propagatedBuildInputs = with darwin.apple_sdk.frameworks; [
+ buildInputs = with darwin.apple_sdk.frameworks; [
Cocoa
- fixDarwinDylibNames
];
meta = with stdenv.lib; {
diff --git a/third_party/nixpkgs/pkgs/tools/system/ctop/default.nix b/third_party/nixpkgs/pkgs/tools/system/ctop/default.nix
index 68e7562975..2b538d6632 100644
--- a/third_party/nixpkgs/pkgs/tools/system/ctop/default.nix
+++ b/third_party/nixpkgs/pkgs/tools/system/ctop/default.nix
@@ -2,13 +2,13 @@
buildGoModule rec {
pname = "ctop";
- version = "0.7.4";
+ version = "0.7.5";
src = fetchFromGitHub {
owner = "bcicen";
repo = pname;
rev = "v${version}";
- sha256 = "0zslxd00pypn6ri7r420mqxjqy3i6qv944f7899saapsb2m08w7j";
+ sha256 = "0mm1gapnz67mwc346jr530xwpiajq1b2f295s8gz5nrb2a23mqln";
};
vendorSha256 = "0a5rwnf251jbp7jz2ln8z9hqp0112c6kx0y09nncvlcki35qq9sh";
diff --git a/third_party/nixpkgs/pkgs/tools/text/amber/default.nix b/third_party/nixpkgs/pkgs/tools/text/amber/default.nix
index 22a18b1cff..c6ba6f98da 100644
--- a/third_party/nixpkgs/pkgs/tools/text/amber/default.nix
+++ b/third_party/nixpkgs/pkgs/tools/text/amber/default.nix
@@ -4,16 +4,16 @@
rustPlatform.buildRustPackage rec {
pname = "amber";
- version = "0.5.4";
+ version = "0.5.5";
src = fetchFromGitHub {
owner = "dalance";
repo = pname;
rev = "v${version}";
- sha256 = "0pqz3spb5lmrj7w8hynmah9nrcfjsb1s0bmrr0cng9a9jx8amwzn";
+ sha256 = "083gpssnhjxp1gr5rn27k9j4pm42wqz76llrn5yh91rwcwvlg1l8";
};
- cargoSha256 = "1ps70swh96xbfn4hng5krlmwvw2bwrl2liqvx9v9vy6pr86643s6";
+ cargoSha256 = "199wfc98vq6vgrz8xqqh8lz4j3ig7w66mrk1am9x0viyhj92fvx0";
buildInputs = stdenv.lib.optional stdenv.isDarwin Security;
diff --git a/third_party/nixpkgs/pkgs/tools/text/asciigraph/default.nix b/third_party/nixpkgs/pkgs/tools/text/asciigraph/default.nix
new file mode 100644
index 0000000000..79d8c9079c
--- /dev/null
+++ b/third_party/nixpkgs/pkgs/tools/text/asciigraph/default.nix
@@ -0,0 +1,22 @@
+{ lib, buildGoPackage, fetchFromGitHub }:
+
+buildGoPackage rec {
+ pname = "asciigraph";
+ version = "0.5.1";
+
+ goPackagePath = "github.com/guptarohit/asciigraph";
+
+ src = fetchFromGitHub {
+ owner = "guptarohit";
+ repo = pname;
+ rev = "v${version}";
+ sha256 = "0aqf64b5d5lf9scvxdx5f3p0vvx5s59mrvr6hcjljg1prksah9ns";
+ };
+
+ meta = with lib; {
+ homepage = "https://github.com/guptarohit/asciigraph";
+ description = "Lightweight ASCII line graph ╭┈╯ command line app";
+ license = licenses.bsd3;
+ maintainers = [ maintainers.mmahut ];
+ };
+}
diff --git a/third_party/nixpkgs/pkgs/tools/text/groff/site.tmac b/third_party/nixpkgs/pkgs/tools/text/groff/site.tmac
index 8ef1040ca4..776a7abb1d 100644
--- a/third_party/nixpkgs/pkgs/tools/text/groff/site.tmac
+++ b/third_party/nixpkgs/pkgs/tools/text/groff/site.tmac
@@ -14,3 +14,6 @@
. if '\V[GROFF_SGR]'' \
. output x X tty: sgr 0
.\}
+.
+.ds doc-default-operating-system Nixpkgs
+.ds doc-volume-operating-system Nixpkgs
diff --git a/third_party/nixpkgs/pkgs/tools/text/gtranslator/default.nix b/third_party/nixpkgs/pkgs/tools/text/gtranslator/default.nix
index 5f217e69ea..f091d86750 100644
--- a/third_party/nixpkgs/pkgs/tools/text/gtranslator/default.nix
+++ b/third_party/nixpkgs/pkgs/tools/text/gtranslator/default.nix
@@ -22,11 +22,11 @@
stdenv.mkDerivation rec {
pname = "gtranslator";
- version = "3.36.0";
+ version = "3.38.0";
src = fetchurl {
url = "mirror://gnome/sources/${pname}/${stdenv.lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
- sha256 = "1lxd2nkji4jk8g2xmyc1a1r3ww710ddk91zh9psmx8xlb4xivaid";
+ sha256 = "282puBoi2SM74Y6Z/VxEj2qwV1nR6UwQWAu4McotdjU=";
};
nativeBuildInputs = [
diff --git a/third_party/nixpkgs/pkgs/tools/text/ocrmypdf/default.nix b/third_party/nixpkgs/pkgs/tools/text/ocrmypdf/default.nix
index bfa22a4fd1..1e2b76c008 100644
--- a/third_party/nixpkgs/pkgs/tools/text/ocrmypdf/default.nix
+++ b/third_party/nixpkgs/pkgs/tools/text/ocrmypdf/default.nix
@@ -29,14 +29,14 @@ let
in
buildPythonApplication rec {
pname = "ocrmypdf";
- version = "11.0.1";
+ version = "11.3.3";
disabled = ! python3Packages.isPy3k;
src = fetchFromGitHub {
owner = "jbarlow83";
repo = "OCRmyPDF";
rev = "v${version}";
- sha256 = "194ds9i1zd80ynzwgv7kprax0crh7bbchayawdcvg2lyr64a82xn";
+ sha256 = "0qv34clid65p11dgqalyk7b7myn5ibiz8i9xxhxkmjblw297p6ak";
};
nativeBuildInputs = with python3Packages; [
diff --git a/third_party/nixpkgs/pkgs/top-level/all-packages.nix b/third_party/nixpkgs/pkgs/top-level/all-packages.nix
index 8cb08bce06..551b285d41 100644
--- a/third_party/nixpkgs/pkgs/top-level/all-packages.nix
+++ b/third_party/nixpkgs/pkgs/top-level/all-packages.nix
@@ -192,6 +192,8 @@ in
comedilib = callPackage ../development/libraries/comedilib { };
+ cp437 = callPackage ../tools/misc/cp437 { };
+
cpu-x = callPackage ../applications/misc/cpu-x { };
dhallToNix = callPackage ../build-support/dhall-to-nix.nix {
@@ -1064,6 +1066,8 @@ in
cloud-custodian = python3Packages.callPackage ../tools/networking/cloud-custodian { };
+ coconut = with python3Packages; toPythonApplication coconut;
+
cod = callPackage ../tools/misc/cod { };
codespell = with python3Packages; toPythonApplication codespell;
@@ -2145,6 +2149,8 @@ in
gdrive = callPackage ../applications/networking/gdrive { };
+ go-chromecast = callPackage ../applications/video/go-chromecast { };
+
go-rice = callPackage ../tools/misc/go.rice {};
go-2fa = callPackage ../tools/security/2fa {};
@@ -2991,6 +2997,8 @@ in
libpinyin = callPackage ../tools/inputmethods/ibus-engines/ibus-libpinyin { };
+ libthai = callPackage ../tools/inputmethods/ibus-engines/ibus-libthai { };
+
m17n = callPackage ../tools/inputmethods/ibus-engines/ibus-m17n { };
mozc = callPackage ../tools/inputmethods/ibus-engines/ibus-mozc {
@@ -3794,6 +3802,8 @@ in
feedreader = callPackage ../applications/networking/feedreaders/feedreader {};
+ fend = callPackage ../tools/misc/fend { };
+
ferm = callPackage ../tools/networking/ferm { };
ffsend = callPackage ../tools/misc/ffsend { };
@@ -4131,6 +4141,8 @@ in
gitlab-shell = callPackage ../applications/version-management/gitlab/gitlab-shell { };
+ gitlab-triage = callPackage ../applications/version-management/gitlab-triage { };
+
gitlab-workhorse = callPackage ../applications/version-management/gitlab/gitlab-workhorse { };
gitaly = callPackage ../applications/version-management/gitlab/gitaly { };
@@ -5321,6 +5333,9 @@ in
libhandy = callPackage ../development/libraries/libhandy { };
+ # Needed for apps that still depend on the unstable verison of the library (not libhandy-1)
+ libhandy_0 = callPackage ../development/libraries/libhandy/0.x.nix { };
+
libgumath = callPackage ../development/libraries/libgumath { };
libinsane = callPackage ../development/libraries/libinsane { };
@@ -7560,6 +7575,8 @@ in
timetable = callPackage ../applications/office/timetable { };
+ timekeeper = callPackage ../applications/office/timekeeper { };
+
timezonemap = callPackage ../development/libraries/timezonemap { };
tzupdate = callPackage ../applications/misc/tzupdate { };
@@ -8565,6 +8582,8 @@ in
### DEVELOPMENT / COMPILERS
+ _4th = callPackage ../development/compilers/4th { };
+
abcl = callPackage ../development/compilers/abcl {
jre = jre8; # TODO: remove override https://github.com/NixOS/nixpkgs/pull/89731
jdk = jdk8; # TODO: remove override https://github.com/NixOS/nixpkgs/pull/89731
@@ -8637,6 +8656,8 @@ in
arachne-pnr = callPackage ../development/compilers/arachne-pnr { };
+ asciigraph = callPackage ../tools/text/asciigraph { };
+
asn1c = callPackage ../development/compilers/asn1c { };
aspectj = callPackage ../development/compilers/aspectj { };
@@ -9624,7 +9645,7 @@ in
stdenv = gcc7Stdenv;
});
- llvmPackages_latest = llvmPackages_10;
+ llvmPackages_latest = llvmPackages_11;
llvmPackages_rocm = callPackage ../development/compilers/llvm/rocm { };
@@ -10891,6 +10912,8 @@ in
};
});
+ bisoncpp = callPackage ../development/tools/parsing/bisonc++ { };
+
black = with python3Packages; toPythonApplication black;
blackfire = callPackage ../development/tools/misc/blackfire { };
@@ -11937,7 +11960,9 @@ in
travis = callPackage ../development/tools/misc/travis { };
- tree-sitter = callPackage ../development/tools/parsing/tree-sitter { };
+ tree-sitter = callPackage ../development/tools/parsing/tree-sitter {
+ inherit (darwin.apple_sdk.frameworks) Security;
+ };
trellis = callPackage ../development/tools/trellis { };
@@ -13179,7 +13204,10 @@ in
herqq = libsForQt514.callPackage ../development/libraries/herqq { };
- hidapi = callPackage ../development/libraries/hidapi { };
+ hidapi = callPackage ../development/libraries/hidapi {
+ # TODO: remove once `udev` is `systemdMinimal` everywhere.
+ udev = systemdMinimal;
+ };
highfive = callPackage ../development/libraries/highfive { };
@@ -13653,6 +13681,8 @@ in
libdap = callPackage ../development/libraries/libdap { };
+ libdatrie = callPackage ../development/libraries/libdatrie { };
+
libdazzle = callPackage ../development/libraries/libdazzle { };
libdbi = callPackage ../development/libraries/libdbi { };
@@ -13754,7 +13784,9 @@ in
libfakekey = callPackage ../development/libraries/libfakekey { };
- libfido2 = callPackage ../development/libraries/libfido2 { };
+ libfido2 = callPackage ../development/libraries/libfido2 {
+ udev = systemdMinimal;
+ };
libfilezilla = callPackage ../development/libraries/libfilezilla {
inherit (darwin.apple_sdk.frameworks) ApplicationServices;
@@ -14369,6 +14401,8 @@ in
libtcod = callPackage ../development/libraries/libtcod { };
+ libthai = callPackage ../development/libraries/libthai { };
+
libtheora = callPackage ../development/libraries/libtheora { };
libthreadar = callPackage ../development/libraries/libthreadar { };
@@ -14443,6 +14477,8 @@ in
libusb1 = callPackage ../development/libraries/libusb1 {
inherit (darwin) libobjc;
inherit (darwin.apple_sdk.frameworks) IOKit;
+ # TODO: remove once `udev` is `systemdMinimal` everywhere.
+ udev = systemdMinimal;
};
libusbmuxd = callPackage ../development/libraries/libusbmuxd { };
@@ -15279,7 +15315,7 @@ in
kde-cli-tools kde-gtk-config kdeplasma-addons kgamma5 kinfocenter kmenuedit
kscreen kscreenlocker ksshaskpass ksysguard kwallet-pam kwayland-integration
kwin kwrited milou oxygen plasma-browser-integration plasma-desktop
- plasma-integration plasma-nm plasma-pa plasma-vault plasma-workspace
+ plasma-integration plasma-nm plasma-pa plasma-thunderbolt plasma-vault plasma-workspace
plasma-workspace-wallpapers polkit-kde-agent powerdevil sddm-kcm
systemsettings user-manager xdg-desktop-portal-kde
;
@@ -15768,6 +15804,8 @@ in
spice-up = callPackage ../applications/office/spice-up { };
+ spicetify-cli = callPackage ../applications/misc/spicetify-cli { };
+
spirv-cross = callPackage ../tools/graphics/spirv-cross { };
sratom = callPackage ../development/libraries/audio/sratom { };
@@ -16842,6 +16880,8 @@ in
labelImg = callPackage ../applications/science/machine-learning/labelimg { };
+ mackerel-agent = callPackage ../servers/monitoring/mackerel-agent { };
+
mailman = callPackage ../servers/mail/mailman/wrapped.nix { };
mailman-rss = callPackage ../development/python-modules/mailman-rss { };
@@ -17007,6 +17047,12 @@ in
# PulseAudio daemons
+ hsphfpd = callPackage ../servers/pulseaudio/hsphfpd.nix { };
+
+ pulseaudio-hsphfpd = callPackage ../servers/pulseaudio/pali.nix {
+ inherit (darwin.apple_sdk.frameworks) CoreServices AudioUnit Cocoa;
+ };
+
pulseaudio = callPackage ../servers/pulseaudio {
inherit (darwin.apple_sdk.frameworks) CoreServices AudioUnit Cocoa;
};
@@ -18365,7 +18411,7 @@ in
# Hardened Linux
hardenedLinuxPackagesFor = kernel': overrides:
let # Note: We use this hack since the hardened patches can lag behind and we don't want to delay updates:
- linux_latest_for_hardened = pkgs.linux_5_8;
+ linux_latest_for_hardened = pkgs.linux_5_9;
kernel = (if kernel' == pkgs.linux_latest then linux_latest_for_hardened else kernel').override overrides;
in linuxPackagesFor (kernel.override {
structuredExtraConfig = import ../os-specific/linux/kernel/hardened/config.nix {
@@ -18825,6 +18871,8 @@ in
sysprof = callPackage ../development/tools/profiling/sysprof { };
+ libsysprof-capture = callPackage ../development/tools/profiling/sysprof/capture.nix { };
+
sysklogd = callPackage ../os-specific/linux/sysklogd { };
syslinux = callPackage ../os-specific/linux/syslinux { };
@@ -18852,17 +18900,34 @@ in
};
systemdMinimal = systemd.override {
pname = "systemd-minimal";
- withResolved = false;
- withLogind = false;
- withHostnamed = false;
- withLocaled = false;
- withTimedated = false;
- withHwdb = false;
- withEfi = false;
- withImportd = false;
+ withAnalyze = false;
+ withApparmor = false;
+ withCompression = false;
+ withCoredump = false;
withCryptsetup = false;
- cryptsetup = null;
+ withDocumentation = false;
+ withEfi = false;
+ withHostnamed = false;
+ withHwdb = false;
+ withImportd = false;
+ withLocaled = false;
+ withLogind = false;
+ withMachined = false;
+ withNetworkd = false;
+ withNss = false;
+ withPCRE2 = false;
+ withPolkit = false;
+ withRemote = false;
+ withResolved = false;
+ withShellCompletions = false;
+ withTimedated = false;
+ withTimesyncd = false;
+ withUserDb = false;
+ glib = null;
+ libgcrypt = null;
lvm2 = null;
+ libfido2 = null;
+ p11-kit = null;
};
@@ -21136,7 +21201,6 @@ in
xrdp = callPackage ../applications/networking/remote/xrdp { };
freerdp = callPackage ../applications/networking/remote/freerdp {
- inherit libpulseaudio;
inherit (gst_all_1) gstreamer gst-plugins-base gst-plugins-good;
};
@@ -22672,6 +22736,7 @@ in
pdfsam-basic = callPackage ../applications/misc/pdfsam-basic { };
mupdf = callPackage ../applications/misc/mupdf { };
+ mupdf_1_17 = callPackage ../applications/misc/mupdf/1.17.nix { };
mystem = callPackage ../applications/misc/mystem { };
@@ -23240,6 +23305,8 @@ in
quilter = callPackage ../applications/editors/quilter { };
+ quisk = python38Packages.callPackage ../applications/radio/quisk { };
+
quiterss = libsForQt514.callPackage ../applications/networking/newsreaders/quiterss {};
falkon = libsForQt514.callPackage ../applications/networking/browsers/falkon { };
@@ -24326,6 +24393,7 @@ in
windowlab = callPackage ../applications/window-managers/windowlab { };
windowmaker = callPackage ../applications/window-managers/windowmaker { };
+ dockapps = callPackage ../applications/window-managers/windowmaker/dockapps { };
wily = callPackage ../applications/editors/wily { };
@@ -24335,16 +24403,8 @@ in
write_stylus = libsForQt5.callPackage ../applications/graphics/write_stylus { };
- alsamixer.app = callPackage ../applications/window-managers/windowmaker/dockapps/alsamixer.app.nix { };
-
wllvm = callPackage ../development/tools/wllvm { };
- wmcalclock = callPackage ../applications/window-managers/windowmaker/dockapps/wmcalclock.nix { };
-
- wmsm.app = callPackage ../applications/window-managers/windowmaker/dockapps/wmsm.app.nix { };
-
- wmsystemtray = callPackage ../applications/window-managers/windowmaker/dockapps/wmsystemtray.nix { };
-
wmname = callPackage ../applications/misc/wmname { };
wmctrl = callPackage ../tools/X11/wmctrl { };
@@ -24895,7 +24955,6 @@ in
exodus = callPackage ../applications/blockchains/exodus { };
- freicoin = callPackage ../applications/blockchains/freicoin.nix { boost = boost155; };
go-ethereum = callPackage ../applications/blockchains/go-ethereum.nix {
inherit (darwin) libobjc;
inherit (darwin.apple_sdk.frameworks) IOKit;
@@ -24941,6 +25000,8 @@ in
tessera = callPackage ../applications/blockchains/tessera.nix { };
+ turbo-geth = callPackage ../applications/blockchains/turbo-geth.nix { };
+
vertcoin = libsForQt514.callPackage ../applications/blockchains/vertcoin.nix { boost = boost165; withGui = true; };
vertcoind = callPackage ../applications/blockchains/vertcoin.nix { boost = boost165; withGui = false; };
@@ -25991,6 +26052,8 @@ in
mediaplayer = throw "gnomeExtensions.mediaplayer deprecated since 2019-09-23: retired upstream https://github.com/JasonLG1979/gnome-shell-extensions-mediaplayer/blob/master/README.md";
};
+ gnome-connections = callPackage ../desktops/gnome-3/apps/gnome-connections { };
+
gnome-tour = callPackage ../desktops/gnome-3/core/gnome-tour { };
hsetroot = callPackage ../tools/X11/hsetroot { };
diff --git a/third_party/nixpkgs/pkgs/top-level/dhall-packages.nix b/third_party/nixpkgs/pkgs/top-level/dhall-packages.nix
index 9d4801e9dc..c1c2c5f0e3 100644
--- a/third_party/nixpkgs/pkgs/top-level/dhall-packages.nix
+++ b/third_party/nixpkgs/pkgs/top-level/dhall-packages.nix
@@ -8,16 +8,6 @@ let
let
callPackage = newScope self;
- prefer = version: path:
- let
- packages = callPackage path { };
-
- in
- packages."${version}".overrideAttrs (_: {
- passthru = packages;
- }
- );
-
buildDhallPackage =
callPackage ../development/interpreters/dhall/build-dhall-package.nix { };
@@ -34,14 +24,16 @@ let
buildDhallDirectoryPackage
;
+ lib = import ../development/dhall-modules/lib.nix { inherit lib; };
+
dhall-kubernetes =
- prefer "3.0.0" ../development/dhall-modules/dhall-kubernetes.nix;
+ callPackage ../development/dhall-modules/dhall-kubernetes.nix { };
dhall-packages =
- prefer "0.11.1" ../development/dhall-modules/dhall-packages.nix;
+ callPackage ../development/dhall-modules/dhall-packages.nix { };
Prelude =
- prefer "13.0.0" ../development/dhall-modules/Prelude.nix;
+ callPackage ../development/dhall-modules/Prelude.nix { };
};
in
diff --git a/third_party/nixpkgs/pkgs/top-level/python-packages.nix b/third_party/nixpkgs/pkgs/top-level/python-packages.nix
index e803e50c84..044f30e761 100644
--- a/third_party/nixpkgs/pkgs/top-level/python-packages.nix
+++ b/third_party/nixpkgs/pkgs/top-level/python-packages.nix
@@ -1250,6 +1250,8 @@ in {
cnvkit = callPackage ../development/python-modules/cnvkit { };
+ coconut = callPackage ../development/python-modules/coconut { };
+
cocotb = callPackage ../development/python-modules/cocotb { };
codecov = callPackage ../development/python-modules/codecov { };
@@ -1351,6 +1353,8 @@ in {
cppy = callPackage ../development/python-modules/cppy { };
+ cpyparsing = callPackage ../development/python-modules/cpyparsing { };
+
cram = callPackage ../development/python-modules/cram { };
crashtest = callPackage ../development/python-modules/crashtest { };
@@ -7685,6 +7689,14 @@ in {
};
};
+ wxPython_4_1 = callPackage ../development/python-modules/wxPython/4.1.nix {
+ inherit (pkgs) pkgconfig;
+ wxGTK = pkgs.wxGTK31.override {
+ withGtk2 = false;
+ withWebKit = true;
+ };
+ };
+
wxPython = self.wxPython30;
x11_hash = callPackage ../development/python-modules/x11_hash { };
@@ -7833,7 +7845,7 @@ in {
zeep = callPackage ../development/python-modules/zeep { };
- zeitgeist = disabledIf isPy3k (toPythonModule (pkgs.zeitgeist.override { python2Packages = self; })).py;
+ zeitgeist = (toPythonModule (pkgs.zeitgeist.override { python3 = python; })).py;
zerobin = callPackage ../development/python-modules/zerobin { };
diff --git a/third_party/nixpkgs/pkgs/top-level/static.nix b/third_party/nixpkgs/pkgs/top-level/static.nix
index 865e5cf290..b3851ba20f 100644
--- a/third_party/nixpkgs/pkgs/top-level/static.nix
+++ b/third_party/nixpkgs/pkgs/top-level/static.nix
@@ -286,6 +286,11 @@ in {
libexecinfo = super.libexecinfo.override { enableShared = false; };
+ tree-sitter = super.tree-sitter.override {
+ enableShared = false;
+ enableStatic = true;
+ };
+
xorg = super.xorg.overrideScope' (xorgself: xorgsuper: {
libX11 = xorgsuper.libX11.overrideAttrs (attrs: {
depsBuildBuild = attrs.depsBuildBuild ++ [ (self.buildPackages.stdenv.cc.libc.static or null) ];