diff --git a/third_party/nixpkgs/.github/workflows/periodic-merge-24h.yml b/third_party/nixpkgs/.github/workflows/periodic-merge-24h.yml
index adc8fa1e3e..341656d939 100644
--- a/third_party/nixpkgs/.github/workflows/periodic-merge-24h.yml
+++ b/third_party/nixpkgs/.github/workflows/periodic-merge-24h.yml
@@ -11,7 +11,7 @@ name: "Periodic Merges (24h)"
on:
schedule:
# * is a special character in YAML so you have to quote this string
- # Merge every 6 hours
+ # Merge every 24 hours
- cron: '0 0 * * *'
jobs:
diff --git a/third_party/nixpkgs/doc/languages-frameworks/python.section.md b/third_party/nixpkgs/doc/languages-frameworks/python.section.md
index 54face47d1..847a41cf23 100644
--- a/third_party/nixpkgs/doc/languages-frameworks/python.section.md
+++ b/third_party/nixpkgs/doc/languages-frameworks/python.section.md
@@ -439,7 +439,7 @@ The following example shows which arguments are given to `buildPythonPackage` in
order to build [`datashape`](https://github.com/blaze/datashape).
```nix
-{ lib, buildPythonPackage, fetchPypi, numpy, multipledispatch, dateutil, pytest }:
+{ lib, buildPythonPackage, fetchPypi, numpy, multipledispatch, python-dateutil, pytest }:
buildPythonPackage rec {
pname = "datashape";
@@ -451,7 +451,7 @@ buildPythonPackage rec {
};
checkInputs = [ pytest ];
- propagatedBuildInputs = [ numpy multipledispatch dateutil ];
+ propagatedBuildInputs = [ numpy multipledispatch python-dateutil ];
meta = with lib; {
homepage = "https://github.com/ContinuumIO/datashape";
@@ -463,7 +463,7 @@ buildPythonPackage rec {
```
We can see several runtime dependencies, `numpy`, `multipledispatch`, and
-`dateutil`. Furthermore, we have one `checkInputs`, i.e. `pytest`. `pytest` is a
+`python-dateutil`. Furthermore, we have one `checkInputs`, i.e. `pytest`. `pytest` is a
test runner and is only used during the `checkPhase` and is therefore not added
to `propagatedBuildInputs`.
diff --git a/third_party/nixpkgs/maintainers/maintainer-list.nix b/third_party/nixpkgs/maintainers/maintainer-list.nix
index e436ce47ee..ff7df97e4b 100644
--- a/third_party/nixpkgs/maintainers/maintainer-list.nix
+++ b/third_party/nixpkgs/maintainers/maintainer-list.nix
@@ -10644,6 +10644,12 @@
github = "totoroot";
githubId = 39650930;
};
+ ToxicFrog = {
+ email = "toxicfrog@ancilla.ca";
+ github = "ToxicFrog";
+ githubId = 90456;
+ name = "Rebecca (Bex) Kelly";
+ };
travisbhartwell = {
email = "nafai@travishartwell.net";
github = "travisbhartwell";
diff --git a/third_party/nixpkgs/nixos/doc/manual/administration/boot-problems.section.md b/third_party/nixpkgs/nixos/doc/manual/administration/boot-problems.section.md
index eb9209602a..dee83e7ec2 100644
--- a/third_party/nixpkgs/nixos/doc/manual/administration/boot-problems.section.md
+++ b/third_party/nixpkgs/nixos/doc/manual/administration/boot-problems.section.md
@@ -30,6 +30,12 @@ If NixOS fails to boot, there are a number of kernel command line parameters tha
: Make systemd very verbose and send log messages to the console instead of the journal. For more parameters recognised by systemd, see systemd(1).
+In addition, these arguments are recognised by the live image only:
+
+`live.nixos.passwd=password`
+
+: Set the password for the `nixos` live user. This can be used for SSH access if there are issues using the terminal.
+
Notice that for `boot.shell_on_fail`, `boot.debug1`, `boot.debug1devices`, and `boot.debug1mounts`, if you did **not** select "start the new shell as pid 1", and you `exit` from the new shell, boot will proceed normally from the point where it failed, as if you'd chosen "ignore the error and continue".
If no login prompts or X11 login screens appear (e.g. due to hanging dependencies), you can press Alt+ArrowUp. If you’re lucky, this will start rescue mode (described above). (Also note that since most units have a 90-second timeout before systemd gives up on them, the `agetty` login prompts should appear eventually unless something is very wrong.)
diff --git a/third_party/nixpkgs/nixos/doc/manual/from_md/administration/boot-problems.section.xml b/third_party/nixpkgs/nixos/doc/manual/from_md/administration/boot-problems.section.xml
index b484d07581..4ea01e78f3 100644
--- a/third_party/nixpkgs/nixos/doc/manual/from_md/administration/boot-problems.section.xml
+++ b/third_party/nixpkgs/nixos/doc/manual/from_md/administration/boot-problems.section.xml
@@ -106,6 +106,23 @@
+
+ In addition, these arguments are recognised by the live image only:
+
+
+
+
+ live.nixos.passwd=password
+
+
+
+ Set the password for the nixos live user.
+ This can be used for SSH access if there are issues using the
+ terminal.
+
+
+
+
Notice that for boot.shell_on_fail,
boot.debug1,
diff --git a/third_party/nixpkgs/nixos/doc/manual/from_md/release-notes/rl-2105.section.xml b/third_party/nixpkgs/nixos/doc/manual/from_md/release-notes/rl-2105.section.xml
index e043bee776..f4155d6f8c 100644
--- a/third_party/nixpkgs/nixos/doc/manual/from_md/release-notes/rl-2105.section.xml
+++ b/third_party/nixpkgs/nixos/doc/manual/from_md/release-notes/rl-2105.section.xml
@@ -101,16 +101,18 @@
GNURadio
- 3.8 was
+ 3.8 and 3.9 were
finally
packaged, along with a rewrite to the Nix expressions,
allowing users to override the features upstream supports
selecting to compile or not to. Additionally, the attribute
- gnuradio and gnuradio3_7
- now point to an externally wrapped by default derivations,
- that allow you to also add `extraPythonPackages` to the Python
- interpreter used by GNURadio. Missing environmental variables
- needed for operational GUI were also added
+ gnuradio (3.9),
+ gnuradio3_8 and
+ gnuradio3_7 now point to an externally
+ wrapped by default derivations, that allow you to also add
+ `extraPythonPackages` to the Python interpreter used by
+ GNURadio. Missing environmental variables needed for
+ operational GUI were also added
(#75478).
@@ -1026,7 +1028,7 @@ self: super:
Kodi has been
updated to version 19.1 "Matrix". See the
- announcement
+ announcement
for further details.
diff --git a/third_party/nixpkgs/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml b/third_party/nixpkgs/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml
index abd10a6f9a..2a285669ef 100644
--- a/third_party/nixpkgs/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml
+++ b/third_party/nixpkgs/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml
@@ -25,6 +25,15 @@
New Services
+
+
+ btrbk,
+ a backup tool for btrfs subvolumes, taking advantage of btrfs
+ specific capabilities to create atomic snapshots and transfer
+ them incrementally to your backup locations. Available as
+ services.btrbk.
+
+
geoipupdate,
@@ -64,7 +73,7 @@
The staticjinja package has been upgraded
- from 1.0.4 to 2.0.0
+ from 1.0.4 to 3.0.1
@@ -339,6 +348,116 @@
release instead of the old 2.31.0 version.
+
+
+ The bitwarden_rs packages and modules were
+ renamed to vaultwarden
+ following
+ upstream. More specifically,
+
+
+
+
+ pkgs.bitwarden_rs,
+ pkgs.bitwarden_rs-sqlite,
+ pkgs.bitwarden_rs-mysql and
+ pkgs.bitwarden_rs-postgresql were
+ renamed to pkgs.vaultwarden,
+ pkgs.vaultwarden-sqlite,
+ pkgs.vaultwarden-mysql and
+ pkgs.vaultwarden-postgresql,
+ respectively.
+
+
+
+
+ Old names are preserved as aliases for backwards
+ compatibility, but may be removed in the future.
+
+
+
+
+ The bitwarden_rs executable was
+ also renamed to vaultwarden in all
+ packages.
+
+
+
+
+
+
+ pkgs.bitwarden_rs-vault was renamed to
+ pkgs.vaultwarden-vault.
+
+
+
+
+ pkgs.bitwarden_rs-vault is
+ preserved as an alias for backwards compatibility, but
+ may be removed in the future.
+
+
+
+
+ The static files were moved from
+ /usr/share/bitwarden_rs to
+ /usr/share/vaultwarden.
+
+
+
+
+
+
+ The services.bitwarden_rs config module
+ was renamed to services.vaultwarden.
+
+
+
+
+ services.bitwarden_rs is preserved
+ as an alias for backwards compatibility, but may be
+ removed in the future.
+
+
+
+
+
+
+ systemd.services.bitwarden_rs,
+ systemd.services.backup-bitwarden_rs
+ and systemd.timers.backup-bitwarden_rs
+ were renamed to
+ systemd.services.vaultwarden,
+ systemd.services.backup-vaultwarden and
+ systemd.timers.backup-vaultwarden,
+ respectively.
+
+
+
+
+ Old names are preserved as aliases for backwards
+ compatibility, but may be removed in the future.
+
+
+
+
+
+
+ users.users.bitwarden_rs and
+ users.groups.bitwarden_rs were renamed
+ to users.users.vaultwarden and
+ users.groups.vaultwarden, respectively.
+
+
+
+
+ The data directory remains located at
+ /var/lib/bitwarden_rs, for backwards
+ compatibility.
+
+
+
+
diff --git a/third_party/nixpkgs/nixos/doc/manual/release-notes/rl-2105.section.md b/third_party/nixpkgs/nixos/doc/manual/release-notes/rl-2105.section.md
index e4565b8ca6..49b97c203f 100644
--- a/third_party/nixpkgs/nixos/doc/manual/release-notes/rl-2105.section.md
+++ b/third_party/nixpkgs/nixos/doc/manual/release-notes/rl-2105.section.md
@@ -36,7 +36,7 @@ In addition to numerous new and upgraded packages, this release has the followin
The following new services were added since the last release:
-- [GNURadio](https://www.gnuradio.org/) 3.8 was [finally](https://github.com/NixOS/nixpkgs/issues/82263) packaged, along with a rewrite to the Nix expressions, allowing users to override the features upstream supports selecting to compile or not to. Additionally, the attribute `gnuradio` and `gnuradio3_7` now point to an externally wrapped by default derivations, that allow you to also add \`extraPythonPackages\` to the Python interpreter used by GNURadio. Missing environmental variables needed for operational GUI were also added ([\#75478](https://github.com/NixOS/nixpkgs/issues/75478)).
+- [GNURadio](https://www.gnuradio.org/) 3.8 and 3.9 were [finally](https://github.com/NixOS/nixpkgs/issues/82263) packaged, along with a rewrite to the Nix expressions, allowing users to override the features upstream supports selecting to compile or not to. Additionally, the attribute `gnuradio` (3.9), `gnuradio3_8` and `gnuradio3_7` now point to an externally wrapped by default derivations, that allow you to also add \`extraPythonPackages\` to the Python interpreter used by GNURadio. Missing environmental variables needed for operational GUI were also added ([\#75478](https://github.com/NixOS/nixpkgs/issues/75478)).
- [Keycloak](https://www.keycloak.org/), an open source identity and access management server with support for [OpenID Connect](https://openid.net/connect/), [OAUTH 2.0](https://oauth.net/2/) and [SAML 2.0](https://en.wikipedia.org/wiki/SAML_2.0).
@@ -300,7 +300,7 @@ When upgrading from a previous release, please be aware of the following incompa
Regarding the NixOS module, new options for HTTPS inspection have been added and `services.privoxy.extraConfig` has been replaced by the new [services.privoxy.settings](options.html#opt-services.privoxy.settings) (See [RFC 0042](https://github.com/NixOS/rfcs/blob/master/rfcs/0042-config-option.md) for the motivation).
-- [Kodi](https://kodi.tv/) has been updated to version 19.1 \"Matrix\". See the [announcement](https://kodi.tv/article/kodi-190-matrix-release) for further details.
+- [Kodi](https://kodi.tv/) has been updated to version 19.1 \"Matrix\". See the [announcement](https://kodi.tv/article/kodi-19-0-matrix-release) for further details.
- The `services.packagekit.backend` option has been removed as it only supported a single setting which would always be the default. Instead new [RFC 0042](https://github.com/NixOS/rfcs/blob/master/rfcs/0042-config-option.md) compliant [services.packagekit.settings](options.html#opt-services.packagekit.settings) and [services.packagekit.vendorSettings](options.html#opt-services.packagekit.vendorSettings) options have been introduced.
diff --git a/third_party/nixpkgs/nixos/doc/manual/release-notes/rl-2111.section.md b/third_party/nixpkgs/nixos/doc/manual/release-notes/rl-2111.section.md
index 1b7250a181..0de63a4619 100644
--- a/third_party/nixpkgs/nixos/doc/manual/release-notes/rl-2111.section.md
+++ b/third_party/nixpkgs/nixos/doc/manual/release-notes/rl-2111.section.md
@@ -10,6 +10,8 @@ In addition to numerous new and upgraded packages, this release has the followin
## New Services {#sec-release-21.11-new-services}
+- [btrbk](https://digint.ch/btrbk/index.html), a backup tool for btrfs subvolumes, taking advantage of btrfs specific capabilities to create atomic snapshots and transfer them incrementally to your backup locations. Available as [services.btrbk](options.html#opt-services.brtbk.instances).
+
- [geoipupdate](https://github.com/maxmind/geoipupdate), a GeoIP database updater from MaxMind. Available as [services.geoipupdate](options.html#opt-services.geoipupdate.enable).
- [sourcehut](https://sr.ht), a collection of tools useful for software development. Available as [services.sourcehut](options.html#opt-services.sourcehut.enable).
@@ -20,7 +22,7 @@ In addition to numerous new and upgraded packages, this release has the followin
## Backward Incompatibilities {#sec-release-21.11-incompatibilities}
-- The `staticjinja` package has been upgraded from 1.0.4 to 2.0.0
+- The `staticjinja` package has been upgraded from 1.0.4 to 3.0.1
- `services.geoip-updater` was broken and has been replaced by [services.geoipupdate](options.html#opt-services.geoipupdate.enable).
@@ -85,6 +87,32 @@ In addition to numerous new and upgraded packages, this release has the followin
* The `libwnck` package now defaults to the 3.x release instead of the
old 2.31.0 version.
+* The `bitwarden_rs` packages and modules were renamed to `vaultwarden`
+ [following upstream](https://github.com/dani-garcia/vaultwarden/discussions/1642). More specifically,
+
+ * `pkgs.bitwarden_rs`, `pkgs.bitwarden_rs-sqlite`, `pkgs.bitwarden_rs-mysql` and
+ `pkgs.bitwarden_rs-postgresql` were renamed to `pkgs.vaultwarden`, `pkgs.vaultwarden-sqlite`,
+ `pkgs.vaultwarden-mysql` and `pkgs.vaultwarden-postgresql`, respectively.
+ * Old names are preserved as aliases for backwards compatibility, but may be removed in the future.
+ * The `bitwarden_rs` executable was also renamed to `vaultwarden` in all packages.
+
+ * `pkgs.bitwarden_rs-vault` was renamed to `pkgs.vaultwarden-vault`.
+ * `pkgs.bitwarden_rs-vault` is preserved as an alias for backwards compatibility, but may be removed in the future.
+ * The static files were moved from `/usr/share/bitwarden_rs` to `/usr/share/vaultwarden`.
+
+ * The `services.bitwarden_rs` config module was renamed to `services.vaultwarden`.
+ * `services.bitwarden_rs` is preserved as an alias for backwards compatibility, but may be removed in the future.
+
+ * `systemd.services.bitwarden_rs`, `systemd.services.backup-bitwarden_rs` and `systemd.timers.backup-bitwarden_rs`
+ were renamed to `systemd.services.vaultwarden`, `systemd.services.backup-vaultwarden` and
+ `systemd.timers.backup-vaultwarden`, respectively.
+ * Old names are preserved as aliases for backwards compatibility, but may be removed in the future.
+
+ * `users.users.bitwarden_rs` and `users.groups.bitwarden_rs` were renamed to `users.users.vaultwarden` and
+ `users.groups.vaultwarden`, respectively.
+
+ * The data directory remains located at `/var/lib/bitwarden_rs`, for backwards compatibility.
+
## Other Notable Changes {#sec-release-21.11-notable-changes}
- The setting [`services.openssh.logLevel`](options.html#opt-services.openssh.logLevel) `"VERBOSE"` `"INFO"`. This brings NixOS in line with upstream and other Linux distributions, and reduces log spam on servers due to bruteforcing botnets.
diff --git a/third_party/nixpkgs/nixos/modules/installer/cd-dvd/installation-cd-base.nix b/third_party/nixpkgs/nixos/modules/installer/cd-dvd/installation-cd-base.nix
index 6c7ea293e8..aecb65b8c5 100644
--- a/third_party/nixpkgs/nixos/modules/installer/cd-dvd/installation-cd-base.nix
+++ b/third_party/nixpkgs/nixos/modules/installer/cd-dvd/installation-cd-base.nix
@@ -30,5 +30,16 @@ with lib;
# Add Memtest86+ to the CD.
boot.loader.grub.memtest86.enable = true;
+ boot.postBootCommands = ''
+ for o in $(&1 | grep $out);
+ then
+ echo btrbk configuration is invalid
+ cat $out
+ exit 1
+ fi;
+ '';
+in
+{
+ options = {
+ services.btrbk = {
+ extraPackages = lib.mkOption {
+ description = "Extra packages for btrbk, like compression utilities for stream_compress";
+ type = lib.types.listOf lib.types.package;
+ default = [ ];
+ example = lib.literalExample "[ pkgs.xz ]";
+ };
+ niceness = lib.mkOption {
+ description = "Niceness for local instances of btrbk. Also applies to remote ones connecting via ssh when positive.";
+ type = lib.types.ints.between (-20) 19;
+ default = 10;
+ };
+ ioSchedulingClass = lib.mkOption {
+ description = "IO scheduling class for btrbk (see ionice(1) for a quick description). Applies to local instances, and remote ones connecting by ssh if set to idle.";
+ type = lib.types.enum [ "idle" "best-effort" "realtime" ];
+ default = "best-effort";
+ };
+ instances = lib.mkOption {
+ description = "Set of btrbk instances. The instance named btrbk is the default one.";
+ type = with lib.types;
+ attrsOf (
+ submodule {
+ options = {
+ onCalendar = lib.mkOption {
+ type = lib.types.str;
+ default = "daily";
+ description = "How often this btrbk instance is started. See systemd.time(7) for more information about the format.";
+ };
+ settings = lib.mkOption {
+ type = let t = lib.types.attrsOf (lib.types.either lib.types.str (t // { description = "instances of this type recursively"; })); in t;
+ default = { };
+ example = {
+ snapshot_preserve_min = "2d";
+ snapshot_preserve = "14d";
+ volume = {
+ "/mnt/btr_pool" = {
+ target = "/mnt/btr_backup/mylaptop";
+ subvolume = {
+ "rootfs" = { };
+ "home" = { snapshot_create = "always"; };
+ };
+ };
+ };
+ };
+ description = "configuration options for btrbk. Nested attrsets translate to subsections.";
+ };
+ };
+ }
+ );
+ default = { };
+ };
+ sshAccess = lib.mkOption {
+ description = "SSH keys that should be able to make or push snapshots on this system remotely with btrbk";
+ type = with lib.types; listOf (
+ submodule {
+ options = {
+ key = lib.mkOption {
+ type = str;
+ description = "SSH public key allowed to login as user btrbk to run remote backups.";
+ };
+ roles = lib.mkOption {
+ type = listOf (enum [ "info" "source" "target" "delete" "snapshot" "send" "receive" ]);
+ example = [ "source" "info" "send" ];
+ description = "What actions can be performed with this SSH key. See ssh_filter_btrbk(1) for details";
+ };
+ };
+ }
+ );
+ default = [ ];
+ };
+ };
+
+ };
+ config = lib.mkIf (sshEnabled || serviceEnabled) {
+ environment.systemPackages = [ pkgs.btrbk ] ++ cfg.extraPackages;
+ security.sudo.extraRules = [
+ {
+ users = [ "btrbk" ];
+ commands = [
+ { command = "${pkgs.btrfs-progs}/bin/btrfs"; options = [ "NOPASSWD" ]; }
+ { command = "${pkgs.coreutils}/bin/mkdir"; options = [ "NOPASSWD" ]; }
+ { command = "${pkgs.coreutils}/bin/readlink"; options = [ "NOPASSWD" ]; }
+ # for ssh, they are not the same than the one hard coded in ${pkgs.btrbk}
+ { command = "/run/current-system/bin/btrfs"; options = [ "NOPASSWD" ]; }
+ { command = "/run/current-system/sw/bin/mkdir"; options = [ "NOPASSWD" ]; }
+ { command = "/run/current-system/sw/bin/readlink"; options = [ "NOPASSWD" ]; }
+ ];
+ }
+ ];
+ users.users.btrbk = {
+ isSystemUser = true;
+ # ssh needs a home directory
+ home = "/var/lib/btrbk";
+ createHome = true;
+ shell = "${pkgs.bash}/bin/bash";
+ group = "btrbk";
+ openssh.authorizedKeys.keys = map
+ (
+ v:
+ let
+ options = lib.concatMapStringsSep " " (x: "--" + x) v.roles;
+ ioniceClass = {
+ "idle" = 3;
+ "best-effort" = 2;
+ "realtime" = 1;
+ }.${cfg.ioSchedulingClass};
+ in
+ ''command="${pkgs.util-linux}/bin/ionice -t -c ${toString ioniceClass} ${lib.optionalString (cfg.niceness >= 1) "${pkgs.coreutils}/bin/nice -n ${toString cfg.niceness}"} ${pkgs.btrbk}/share/btrbk/scripts/ssh_filter_btrbk.sh --sudo ${options}" ${v.key}''
+ )
+ cfg.sshAccess;
+ };
+ users.groups.btrbk = { };
+ systemd.tmpfiles.rules = [
+ "d /var/lib/btrbk 0750 btrbk btrbk"
+ "d /var/lib/btrbk/.ssh 0700 btrbk btrbk"
+ "f /var/lib/btrbk/.ssh/config 0700 btrbk btrbk - StrictHostKeyChecking=accept-new"
+ ];
+ environment.etc = lib.mapAttrs'
+ (
+ name: instance: {
+ name = "btrbk/${name}.conf";
+ value.source = mkTestedConfigFile name instance.settings;
+ }
+ )
+ cfg.instances;
+ systemd.services = lib.mapAttrs'
+ (
+ name: _: {
+ name = "btrbk-${name}";
+ value = {
+ description = "Takes BTRFS snapshots and maintains retention policies.";
+ unitConfig.Documentation = "man:btrbk(1)";
+ path = [ "/run/wrappers" ] ++ cfg.extraPackages;
+ serviceConfig = {
+ User = "btrbk";
+ Group = "btrbk";
+ Type = "oneshot";
+ ExecStart = "${pkgs.btrbk}/bin/btrbk -c /etc/btrbk/${name}.conf run";
+ Nice = cfg.niceness;
+ IOSchedulingClass = cfg.ioSchedulingClass;
+ StateDirectory = "btrbk";
+ };
+ };
+ }
+ )
+ cfg.instances;
+
+ systemd.timers = lib.mapAttrs'
+ (
+ name: instance: {
+ name = "btrbk-${name}";
+ value = {
+ description = "Timer to take BTRFS snapshots and maintain retention policies.";
+ wantedBy = [ "timers.target" ];
+ timerConfig = {
+ OnCalendar = instance.onCalendar;
+ AccuracySec = "10min";
+ Persistent = true;
+ };
+ };
+ }
+ )
+ cfg.instances;
+ };
+
+}
diff --git a/third_party/nixpkgs/nixos/modules/services/networking/coturn.nix b/third_party/nixpkgs/nixos/modules/services/networking/coturn.nix
index 1bfbc307c5..5f7d2893ae 100644
--- a/third_party/nixpkgs/nixos/modules/services/networking/coturn.nix
+++ b/third_party/nixpkgs/nixos/modules/services/networking/coturn.nix
@@ -16,6 +16,7 @@ ${lib.optionalString cfg.lt-cred-mech "lt-cred-mech"}
${lib.optionalString cfg.no-auth "no-auth"}
${lib.optionalString cfg.use-auth-secret "use-auth-secret"}
${lib.optionalString (cfg.static-auth-secret != null) ("static-auth-secret=${cfg.static-auth-secret}")}
+${lib.optionalString (cfg.static-auth-secret-file != null) ("static-auth-secret=#static-auth-secret#")}
realm=${cfg.realm}
${lib.optionalString cfg.no-udp "no-udp"}
${lib.optionalString cfg.no-tcp "no-tcp"}
@@ -182,6 +183,13 @@ in {
by a separate program, so this is why that other mode is 'dynamic'.
'';
};
+ static-auth-secret-file = mkOption {
+ type = types.nullOr types.str;
+ default = null;
+ description = ''
+ Path to the file containing the static authentication secret.
+ '';
+ };
realm = mkOption {
type = types.str;
default = config.networking.hostName;
@@ -293,42 +301,63 @@ in {
};
};
- config = mkIf cfg.enable {
- users.users.turnserver =
- { uid = config.ids.uids.turnserver;
- description = "coturn TURN server user";
- };
- users.groups.turnserver =
- { gid = config.ids.gids.turnserver;
- members = [ "turnserver" ];
- };
+ config = mkIf cfg.enable (mkMerge ([
+ { assertions = [
+ { assertion = cfg.static-auth-secret != null -> cfg.static-auth-secret-file == null ;
+ message = "static-auth-secret and static-auth-secret-file cannot be set at the same time";
+ }
+ ];}
- systemd.services.coturn = {
- description = "coturn TURN server";
- after = [ "network-online.target" ];
- wants = [ "network-online.target" ];
- wantedBy = [ "multi-user.target" ];
+ {
+ users.users.turnserver =
+ { uid = config.ids.uids.turnserver;
+ description = "coturn TURN server user";
+ };
+ users.groups.turnserver =
+ { gid = config.ids.gids.turnserver;
+ members = [ "turnserver" ];
+ };
- unitConfig = {
- Documentation = "man:coturn(1) man:turnadmin(1) man:turnserver(1)";
- };
+ systemd.services.coturn = let
+ runConfig = "/run/coturn/turnserver.cfg";
+ in {
+ description = "coturn TURN server";
+ after = [ "network-online.target" ];
+ wants = [ "network-online.target" ];
+ wantedBy = [ "multi-user.target" ];
- serviceConfig = {
- Type = "simple";
- ExecStart = "${pkgs.coturn}/bin/turnserver -c ${configFile}";
- RuntimeDirectory = "turnserver";
- User = "turnserver";
- Group = "turnserver";
- AmbientCapabilities =
- mkIf (
- cfg.listening-port < 1024 ||
- cfg.alt-listening-port < 1024 ||
- cfg.tls-listening-port < 1024 ||
- cfg.alt-tls-listening-port < 1024 ||
- cfg.min-port < 1024
- ) "cap_net_bind_service";
- Restart = "on-abort";
+ unitConfig = {
+ Documentation = "man:coturn(1) man:turnadmin(1) man:turnserver(1)";
+ };
+
+ preStart = ''
+ cat ${configFile} > ${runConfig}
+ ${optionalString (cfg.static-auth-secret-file != null) ''
+ STATIC_AUTH_SECRET="$(head -n1 ${cfg.static-auth-secret-file} || :)"
+ sed -e "s,#static-auth-secret#,$STATIC_AUTH_SECRET,g" \
+ -i ${runConfig}
+ '' }
+ chmod 640 ${runConfig}
+ '';
+ serviceConfig = {
+ Type = "simple";
+ ExecStart = "${pkgs.coturn}/bin/turnserver -c ${runConfig}";
+ RuntimeDirectory = "turnserver";
+ User = "turnserver";
+ Group = "turnserver";
+ AmbientCapabilities =
+ mkIf (
+ cfg.listening-port < 1024 ||
+ cfg.alt-listening-port < 1024 ||
+ cfg.tls-listening-port < 1024 ||
+ cfg.alt-tls-listening-port < 1024 ||
+ cfg.min-port < 1024
+ ) "cap_net_bind_service";
+ Restart = "on-abort";
+ };
};
- };
- };
+ systemd.tmpfiles.rules = [
+ "d /run/coturn 0700 turnserver turnserver - -"
+ ];
+ }]));
}
diff --git a/third_party/nixpkgs/nixos/modules/services/security/bitwarden_rs/backup.sh b/third_party/nixpkgs/nixos/modules/services/security/vaultwarden/backup.sh
similarity index 85%
rename from third_party/nixpkgs/nixos/modules/services/security/bitwarden_rs/backup.sh
rename to third_party/nixpkgs/nixos/modules/services/security/vaultwarden/backup.sh
index 264a7da9cb..2a3de0ab1d 100644
--- a/third_party/nixpkgs/nixos/modules/services/security/bitwarden_rs/backup.sh
+++ b/third_party/nixpkgs/nixos/modules/services/security/vaultwarden/backup.sh
@@ -1,6 +1,6 @@
#!/usr/bin/env bash
-# Based on: https://github.com/dani-garcia/bitwarden_rs/wiki/Backing-up-your-vault
+# Based on: https://github.com/dani-garcia/vaultwarden/wiki/Backing-up-your-vault
if ! mkdir -p "$BACKUP_FOLDER"; then
echo "Could not create backup folder '$BACKUP_FOLDER'" >&2
exit 1
diff --git a/third_party/nixpkgs/nixos/modules/services/security/bitwarden_rs/default.nix b/third_party/nixpkgs/nixos/modules/services/security/vaultwarden/default.nix
similarity index 72%
rename from third_party/nixpkgs/nixos/modules/services/security/bitwarden_rs/default.nix
rename to third_party/nixpkgs/nixos/modules/services/security/vaultwarden/default.nix
index bed59dbf82..940ac7832d 100644
--- a/third_party/nixpkgs/nixos/modules/services/security/bitwarden_rs/default.nix
+++ b/third_party/nixpkgs/nixos/modules/services/security/vaultwarden/default.nix
@@ -3,9 +3,9 @@
with lib;
let
- cfg = config.services.bitwarden_rs;
- user = config.users.users.bitwarden_rs.name;
- group = config.users.groups.bitwarden_rs.name;
+ cfg = config.services.vaultwarden;
+ user = config.users.users.vaultwarden.name;
+ group = config.users.groups.vaultwarden.name;
# Convert name from camel case (e.g. disable2FARemember) to upper case snake case (e.g. DISABLE_2FA_REMEMBER).
nameToEnvVar = name:
@@ -26,22 +26,26 @@ let
if value != null then [ (nameValuePair (nameToEnvVar name) (if isBool value then boolToString value else toString value)) ] else []
) cfg.config));
in { DATA_FOLDER = "/var/lib/bitwarden_rs"; } // optionalAttrs (!(configEnv ? WEB_VAULT_ENABLED) || configEnv.WEB_VAULT_ENABLED == "true") {
- WEB_VAULT_FOLDER = "${pkgs.bitwarden_rs-vault}/share/bitwarden_rs/vault";
+ WEB_VAULT_FOLDER = "${pkgs.vaultwarden-vault}/share/vaultwarden/vault";
} // configEnv;
- configFile = pkgs.writeText "bitwarden_rs.env" (concatStrings (mapAttrsToList (name: value: "${name}=${value}\n") configEnv));
+ configFile = pkgs.writeText "vaultwarden.env" (concatStrings (mapAttrsToList (name: value: "${name}=${value}\n") configEnv));
- bitwarden_rs = pkgs.bitwarden_rs.override { inherit (cfg) dbBackend; };
+ vaultwarden = pkgs.vaultwarden.override { inherit (cfg) dbBackend; };
in {
- options.services.bitwarden_rs = with types; {
- enable = mkEnableOption "bitwarden_rs";
+ imports = [
+ (mkRenamedOptionModule [ "services" "bitwarden_rs" ] [ "services" "vaultwarden" ])
+ ];
+
+ options.services.vaultwarden = with types; {
+ enable = mkEnableOption "vaultwarden";
dbBackend = mkOption {
type = enum [ "sqlite" "mysql" "postgresql" ];
default = "sqlite";
description = ''
- Which database backend bitwarden_rs will be using.
+ Which database backend vaultwarden will be using.
'';
};
@@ -49,7 +53,7 @@ in {
type = nullOr str;
default = null;
description = ''
- The directory under which bitwarden_rs will backup its persistent data.
+ The directory under which vaultwarden will backup its persistent data.
'';
};
@@ -65,7 +69,7 @@ in {
}
'';
description = ''
- The configuration of bitwarden_rs is done through environment variables,
+ The configuration of vaultwarden is done through environment variables,
therefore the names are converted from camel case (e.g. disable2FARemember)
to upper case snake case (e.g. DISABLE_2FA_REMEMBER).
In this conversion digits (0-9) are handled just like upper case characters,
@@ -75,17 +79,17 @@ in {
This allows working around any potential future conflicting naming conventions.
Based on the attributes passed to this config option an environment file will be generated
- that is passed to bitwarden_rs's systemd service.
+ that is passed to vaultwarden's systemd service.
The available configuration options can be found in
- the environment template file.
+ the environment template file.
'';
};
environmentFile = mkOption {
type = with types; nullOr path;
default = null;
- example = "/root/bitwarden_rs.env";
+ example = "/root/vaultwarden.env";
description = ''
Additional environment file as defined in
systemd.exec5
@@ -95,7 +99,7 @@ in {
may be passed to the service without adding them to the world-readable Nix store.
Note that this file needs to be available on the host on which
- bitwarden_rs is running.
+ vaultwarden is running.
'';
};
};
@@ -106,20 +110,21 @@ in {
message = "Backups for database backends other than sqlite will need customization";
} ];
- users.users.bitwarden_rs = {
+ users.users.vaultwarden = {
inherit group;
isSystemUser = true;
};
- users.groups.bitwarden_rs = { };
+ users.groups.vaultwarden = { };
- systemd.services.bitwarden_rs = {
+ systemd.services.vaultwarden = {
+ aliases = [ "bitwarden_rs" ];
after = [ "network.target" ];
path = with pkgs; [ openssl ];
serviceConfig = {
User = user;
Group = group;
EnvironmentFile = [ configFile ] ++ optional (cfg.environmentFile != null) cfg.environmentFile;
- ExecStart = "${bitwarden_rs}/bin/bitwarden_rs";
+ ExecStart = "${vaultwarden}/bin/vaultwarden";
LimitNOFILE = "1048576";
PrivateTmp = "true";
PrivateDevices = "true";
@@ -131,15 +136,16 @@ in {
wantedBy = [ "multi-user.target" ];
};
- systemd.services.backup-bitwarden_rs = mkIf (cfg.backupDir != null) {
- description = "Backup bitwarden_rs";
+ systemd.services.backup-vaultwarden = mkIf (cfg.backupDir != null) {
+ aliases = [ "backup-bitwarden_rs" ];
+ description = "Backup vaultwarden";
environment = {
DATA_FOLDER = "/var/lib/bitwarden_rs";
BACKUP_FOLDER = cfg.backupDir;
};
path = with pkgs; [ sqlite ];
serviceConfig = {
- SyslogIdentifier = "backup-bitwarden_rs";
+ SyslogIdentifier = "backup-vaultwarden";
Type = "oneshot";
User = mkDefault user;
Group = mkDefault group;
@@ -148,12 +154,13 @@ in {
wantedBy = [ "multi-user.target" ];
};
- systemd.timers.backup-bitwarden_rs = mkIf (cfg.backupDir != null) {
- description = "Backup bitwarden_rs on time";
+ systemd.timers.backup-vaultwarden = mkIf (cfg.backupDir != null) {
+ aliases = [ "backup-bitwarden_rs" ];
+ description = "Backup vaultwarden on time";
timerConfig = {
OnCalendar = mkDefault "23:00";
Persistent = "true";
- Unit = "backup-bitwarden_rs.service";
+ Unit = "backup-vaultwarden.service";
};
wantedBy = [ "multi-user.target" ];
};
diff --git a/third_party/nixpkgs/nixos/modules/system/activation/top-level.nix b/third_party/nixpkgs/nixos/modules/system/activation/top-level.nix
index 6751ca3f2e..4e2f25cd27 100644
--- a/third_party/nixpkgs/nixos/modules/system/activation/top-level.nix
+++ b/third_party/nixpkgs/nixos/modules/system/activation/top-level.nix
@@ -13,7 +13,7 @@ let
# !!! fix this
children = mapAttrs (childName: childConfig:
(import ../../../lib/eval-config.nix {
- inherit baseModules specialArgs;
+ inherit lib baseModules specialArgs;
system = config.nixpkgs.initialSystem;
modules =
(optionals childConfig.inheritParentConfig modules)
diff --git a/third_party/nixpkgs/nixos/tests/all-tests.nix b/third_party/nixpkgs/nixos/tests/all-tests.nix
index b5126be8af..7416067321 100644
--- a/third_party/nixpkgs/nixos/tests/all-tests.nix
+++ b/third_party/nixpkgs/nixos/tests/all-tests.nix
@@ -42,12 +42,12 @@ in
bind = handleTest ./bind.nix {};
bitcoind = handleTest ./bitcoind.nix {};
bittorrent = handleTest ./bittorrent.nix {};
- bitwarden = handleTest ./bitwarden.nix {};
blockbook-frontend = handleTest ./blockbook-frontend.nix {};
boot = handleTestOn ["x86_64-linux"] ./boot.nix {}; # syslinux is unsupported on aarch64
boot-stage1 = handleTest ./boot-stage1.nix {};
borgbackup = handleTest ./borgbackup.nix {};
botamusique = handleTest ./botamusique.nix {};
+ btrbk = handleTest ./btrbk.nix {};
buildbot = handleTest ./buildbot.nix {};
buildkite-agents = handleTest ./buildkite-agents.nix {};
caddy = handleTest ./caddy.nix {};
@@ -88,6 +88,7 @@ in
containers-tmpfs = handleTest ./containers-tmpfs.nix {};
convos = handleTest ./convos.nix {};
corerad = handleTest ./corerad.nix {};
+ coturn = handleTest ./coturn.nix {};
couchdb = handleTest ./couchdb.nix {};
cri-o = handleTestOn ["x86_64-linux"] ./cri-o.nix {};
custom-ca = handleTest ./custom-ca.nix {};
@@ -446,6 +447,7 @@ in
v2ray = handleTest ./v2ray.nix {};
vault = handleTest ./vault.nix {};
vault-postgresql = handleTest ./vault-postgresql.nix {};
+ vaultwarden = handleTest ./vaultwarden.nix {};
vector = handleTest ./vector.nix {};
victoriametrics = handleTest ./victoriametrics.nix {};
virtualbox = handleTestOn ["x86_64-linux"] ./virtualbox.nix {};
diff --git a/third_party/nixpkgs/nixos/tests/btrbk.nix b/third_party/nixpkgs/nixos/tests/btrbk.nix
new file mode 100644
index 0000000000..2689bb66c6
--- /dev/null
+++ b/third_party/nixpkgs/nixos/tests/btrbk.nix
@@ -0,0 +1,110 @@
+import ./make-test-python.nix ({ pkgs, ... }:
+
+ let
+ privateKey = ''
+ -----BEGIN OPENSSH PRIVATE KEY-----
+ b3BlbnNzaC1rZXktdjEAAAAABG5vbmUAAAAEbm9uZQAAAAAAAAABAAAAMwAAAAtzc2gtZW
+ QyNTUxOQAAACBx8UB04Q6Q/fwDFjakHq904PYFzG9pU2TJ9KXpaPMcrwAAAJB+cF5HfnBe
+ RwAAAAtzc2gtZWQyNTUxOQAAACBx8UB04Q6Q/fwDFjakHq904PYFzG9pU2TJ9KXpaPMcrw
+ AAAEBN75NsJZSpt63faCuaD75Unko0JjlSDxMhYHAPJk2/xXHxQHThDpD9/AMWNqQer3Tg
+ 9gXMb2lTZMn0pelo8xyvAAAADXJzY2h1ZXR6QGt1cnQ=
+ -----END OPENSSH PRIVATE KEY-----
+ '';
+ publicKey = ''
+ ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIHHxQHThDpD9/AMWNqQer3Tg9gXMb2lTZMn0pelo8xyv
+ '';
+ in
+ {
+ name = "btrbk";
+ meta = with pkgs.lib; {
+ maintainers = with maintainers; [ symphorien ];
+ };
+
+ nodes = {
+ archive = { ... }: {
+ environment.systemPackages = with pkgs; [ btrfs-progs ];
+ # note: this makes the privateKey world readable.
+ # don't do it with real ssh keys.
+ environment.etc."btrbk_key".text = privateKey;
+ services.btrbk = {
+ extraPackages = [ pkgs.lz4 ];
+ instances = {
+ remote = {
+ onCalendar = "minutely";
+ settings = {
+ ssh_identity = "/etc/btrbk_key";
+ ssh_user = "btrbk";
+ stream_compress = "lz4";
+ volume = {
+ "ssh://main/mnt" = {
+ target = "/mnt";
+ snapshot_dir = "btrbk/remote";
+ subvolume = "to_backup";
+ };
+ };
+ };
+ };
+ };
+ };
+ };
+
+ main = { ... }: {
+ environment.systemPackages = with pkgs; [ btrfs-progs ];
+ services.openssh = {
+ enable = true;
+ passwordAuthentication = false;
+ challengeResponseAuthentication = false;
+ };
+ services.btrbk = {
+ extraPackages = [ pkgs.lz4 ];
+ sshAccess = [
+ {
+ key = publicKey;
+ roles = [ "source" "send" "info" "delete" ];
+ }
+ ];
+ instances = {
+ local = {
+ onCalendar = "minutely";
+ settings = {
+ volume = {
+ "/mnt" = {
+ snapshot_dir = "btrbk/local";
+ subvolume = "to_backup";
+ };
+ };
+ };
+ };
+ };
+ };
+ };
+ };
+
+ testScript = ''
+ start_all()
+
+ # create btrfs partition at /mnt
+ for machine in (archive, main):
+ machine.succeed("dd if=/dev/zero of=/data_fs bs=120M count=1")
+ machine.succeed("mkfs.btrfs /data_fs")
+ machine.succeed("mkdir /mnt")
+ machine.succeed("mount /data_fs /mnt")
+
+ # what to backup and where
+ main.succeed("btrfs subvolume create /mnt/to_backup")
+ main.succeed("mkdir -p /mnt/btrbk/{local,remote}")
+
+ # check that local snapshots work
+ with subtest("local"):
+ main.succeed("echo foo > /mnt/to_backup/bar")
+ main.wait_until_succeeds("cat /mnt/btrbk/local/*/bar | grep foo")
+ main.succeed("echo bar > /mnt/to_backup/bar")
+ main.succeed("cat /mnt/btrbk/local/*/bar | grep foo")
+
+ # check that btrfs send/receive works and ssh access works
+ with subtest("remote"):
+ archive.wait_until_succeeds("cat /mnt/*/bar | grep bar")
+ main.succeed("echo baz > /mnt/to_backup/bar")
+ archive.succeed("cat /mnt/*/bar | grep bar")
+ '';
+ })
diff --git a/third_party/nixpkgs/nixos/tests/coturn.nix b/third_party/nixpkgs/nixos/tests/coturn.nix
new file mode 100644
index 0000000000..dff832281c
--- /dev/null
+++ b/third_party/nixpkgs/nixos/tests/coturn.nix
@@ -0,0 +1,29 @@
+import ./make-test-python.nix ({ ... }: {
+ name = "coturn";
+ nodes = {
+ default = {
+ services.coturn.enable = true;
+ };
+ secretsfile = {
+ boot.postBootCommands = ''
+ echo "some-very-secret-string" > /run/coturn-secret
+ '';
+ services.coturn = {
+ enable = true;
+ static-auth-secret-file = "/run/coturn-secret";
+ };
+ };
+ };
+
+ testScript =
+ ''
+ start_all()
+
+ with subtest("by default works without configuration"):
+ default.wait_for_unit("coturn.service")
+
+ with subtest("works with static-auth-secret-file"):
+ secretsfile.wait_for_unit("coturn.service")
+ secretsfile.succeed("grep 'some-very-secret-string' /run/coturn/turnserver.cfg")
+ '';
+})
diff --git a/third_party/nixpkgs/nixos/tests/bitwarden.nix b/third_party/nixpkgs/nixos/tests/vaultwarden.nix
similarity index 90%
rename from third_party/nixpkgs/nixos/tests/bitwarden.nix
rename to third_party/nixpkgs/nixos/tests/vaultwarden.nix
index f64cf171f0..b5343f5cad 100644
--- a/third_party/nixpkgs/nixos/tests/bitwarden.nix
+++ b/third_party/nixpkgs/nixos/tests/vaultwarden.nix
@@ -4,7 +4,7 @@
}:
# These tests will:
-# * Set up a bitwarden-rs server
+# * Set up a vaultwarden server
# * Have Firefox use the web vault to create an account, log in, and save a password to the valut
# * Have the bw cli log in and read that password from the vault
#
@@ -24,8 +24,8 @@ let
storedPassword = "seeeecret";
- makeBitwardenTest = backend: makeTest {
- name = "bitwarden_rs-${backend}";
+ makeVaultwardenTest = backend: makeTest {
+ name = "vaultwarden-${backend}";
meta = {
maintainers = with pkgs.lib.maintainers; [ jjjollyjim ];
};
@@ -45,9 +45,9 @@ let
package = pkgs.mariadb;
};
- services.bitwarden_rs.config.databaseUrl = "mysql://bitwardenuser:${dbPassword}@localhost/bitwarden";
+ services.vaultwarden.config.databaseUrl = "mysql://bitwardenuser:${dbPassword}@localhost/bitwarden";
- systemd.services.bitwarden_rs.after = [ "mysql.service" ];
+ systemd.services.vaultwarden.after = [ "mysql.service" ];
};
postgresql = {
@@ -60,9 +60,9 @@ let
'';
};
- services.bitwarden_rs.config.databaseUrl = "postgresql://bitwardenuser:${dbPassword}@localhost/bitwarden";
+ services.vaultwarden.config.databaseUrl = "postgresql://bitwardenuser:${dbPassword}@localhost/bitwarden";
- systemd.services.bitwarden_rs.after = [ "postgresql.service" ];
+ systemd.services.vaultwarden.after = [ "postgresql.service" ];
};
sqlite = { };
@@ -71,7 +71,7 @@ let
mkMerge [
backendConfig.${backend}
{
- services.bitwarden_rs = {
+ services.vaultwarden = {
enable = true;
dbBackend = backend;
config.rocketPort = 80;
@@ -152,7 +152,7 @@ let
testScript = ''
start_all()
- server.wait_for_unit("bitwarden_rs.service")
+ server.wait_for_unit("vaultwarden.service")
server.wait_for_open_port(80)
with subtest("configure the cli"):
@@ -184,6 +184,6 @@ let
in
builtins.listToAttrs (
map
- (backend: { name = backend; value = makeBitwardenTest backend; })
+ (backend: { name = backend; value = makeVaultwardenTest backend; })
backends
)
diff --git a/third_party/nixpkgs/pkgs/applications/audio/picard/default.nix b/third_party/nixpkgs/pkgs/applications/audio/picard/default.nix
index 49aa0ba471..dc030cc708 100644
--- a/third_party/nixpkgs/pkgs/applications/audio/picard/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/audio/picard/default.nix
@@ -40,7 +40,7 @@ pythonPackages.buildPythonApplication rec {
propagatedBuildInputs = with pythonPackages; [
chromaprint
- dateutil
+ python-dateutil
discid
fasteners
mutagen
diff --git a/third_party/nixpkgs/pkgs/applications/editors/spacevim/default.nix b/third_party/nixpkgs/pkgs/applications/editors/spacevim/default.nix
index 661bec463a..9f6f895efa 100644
--- a/third_party/nixpkgs/pkgs/applications/editors/spacevim/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/editors/spacevim/default.nix
@@ -1,8 +1,19 @@
-{ ripgrep, git, fzf, makeWrapper, vim_configurable, vimPlugins, fetchFromGitHub
-, lib, stdenv, formats, runCommand, spacevim_config ? import ./init.nix }:
+{ ripgrep
+, git
+, fzf
+, makeWrapper
+, vim_configurable
+, vimPlugins
+, fetchFromGitHub
+, lib
+, stdenv
+, formats
+, runCommand
+, spacevim_config ? import ./init.nix
+}:
let
- format = formats.toml {};
+ format = formats.toml { };
vim-customized = vim_configurable.customize {
name = "vim";
# Not clear at the moment how to import plugins such that
@@ -14,17 +25,18 @@ let
mkdir -p $out
cp ${format.generate "init.toml" spacevim_config} $out/init.toml
'';
-in stdenv.mkDerivation rec {
+in
+stdenv.mkDerivation rec {
pname = "spacevim";
- version = "1.6.0";
+ version = "1.7.0";
src = fetchFromGitHub {
owner = "SpaceVim";
repo = "SpaceVim";
rev = "v${version}";
- sha256 = "sha256-QQdtjEdbuzmf0Rw+u2ZltLihnJt8LqkfTrLDWLAnCLE=";
+ sha256 = "sha256-TmfPeaGkH1Wq2b5lB29PUYDVddJVN3mBuPAmu9EtiGY=";
};
- nativeBuildInputs = [ makeWrapper vim-customized];
+ nativeBuildInputs = [ makeWrapper vim-customized ];
buildInputs = [ vim-customized ];
buildPhase = ''
diff --git a/third_party/nixpkgs/pkgs/applications/gis/grass/default.nix b/third_party/nixpkgs/pkgs/applications/gis/grass/default.nix
index ef7458d739..09c1fddbda 100644
--- a/third_party/nixpkgs/pkgs/applications/gis/grass/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/gis/grass/default.nix
@@ -18,7 +18,7 @@ stdenv.mkDerivation rec {
buildInputs = [ flex bison zlib proj gdal libtiff libpng fftw sqlite cairo proj
readline ffmpeg_3 makeWrapper wxGTK30 netcdf geos postgresql libmysqlclient blas
libLAS proj-datumgrid ]
- ++ (with python2Packages; [ python dateutil wxPython30 numpy ]);
+ ++ (with python2Packages; [ python python-dateutil wxPython30 numpy ]);
# On Darwin the installer tries to symlink the help files into a system
# directory
diff --git a/third_party/nixpkgs/pkgs/applications/gis/qgis/unwrapped.nix b/third_party/nixpkgs/pkgs/applications/gis/qgis/unwrapped.nix
index 2ebe0ac253..3ed11aa8b7 100644
--- a/third_party/nixpkgs/pkgs/applications/gis/qgis/unwrapped.nix
+++ b/third_party/nixpkgs/pkgs/applications/gis/qgis/unwrapped.nix
@@ -12,7 +12,7 @@ let
numpy
psycopg2
chardet
- dateutil
+ python-dateutil
pyyaml
pytz
requests
diff --git a/third_party/nixpkgs/pkgs/applications/graphics/darktable/default.nix b/third_party/nixpkgs/pkgs/applications/graphics/darktable/default.nix
index 469437c6c9..cc15b96b4b 100644
--- a/third_party/nixpkgs/pkgs/applications/graphics/darktable/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/graphics/darktable/default.nix
@@ -7,12 +7,12 @@
}:
stdenv.mkDerivation rec {
- version = "3.4.1";
+ version = "3.6.0";
pname = "darktable";
src = fetchurl {
url = "https://github.com/darktable-org/darktable/releases/download/release-${version}/darktable-${version}.tar.xz";
- sha256 = "sha256-f8P4UdqbzXxQU+zQnyGqPrYQO+mKbFj1IBC28iF0lB4=";
+ sha256 = "sha256:0f8aqwkgw4gs97b5i4ygiqk5zilwq7ax7zwdd31r72zk98cd1g46";
};
nativeBuildInputs = [ cmake ninja llvm pkg-config intltool perl desktop-file-utils wrapGAppsHook ];
diff --git a/third_party/nixpkgs/pkgs/applications/graphics/drawio/default.nix b/third_party/nixpkgs/pkgs/applications/graphics/drawio/default.nix
index 05e94bb164..5bb94baf76 100644
--- a/third_party/nixpkgs/pkgs/applications/graphics/drawio/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/graphics/drawio/default.nix
@@ -91,7 +91,7 @@ stdenv.mkDerivation rec {
homepage = "https://about.draw.io/";
license = licenses.asl20;
changelog = "https://github.com/jgraph/drawio-desktop/releases/tag/v${version}";
- maintainers = with maintainers; [ danieldk ];
+ maintainers = with maintainers; [ ];
platforms = [ "x86_64-linux" ];
};
}
diff --git a/third_party/nixpkgs/pkgs/applications/graphics/rapid-photo-downloader/default.nix b/third_party/nixpkgs/pkgs/applications/graphics/rapid-photo-downloader/default.nix
index 9fd629ca8e..f9120ca0ee 100644
--- a/third_party/nixpkgs/pkgs/applications/graphics/rapid-photo-downloader/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/graphics/rapid-photo-downloader/default.nix
@@ -55,7 +55,7 @@ mkDerivationWith python3Packages.buildPythonApplication rec {
psutil
pyxdg
arrow
- dateutil
+ python-dateutil
easygui
colour
pymediainfo
diff --git a/third_party/nixpkgs/pkgs/applications/misc/1password-gui/default.nix b/third_party/nixpkgs/pkgs/applications/misc/1password-gui/default.nix
index 436e4d7831..b4b55fa264 100644
--- a/third_party/nixpkgs/pkgs/applications/misc/1password-gui/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/misc/1password-gui/default.nix
@@ -107,7 +107,7 @@ stdenv.mkDerivation rec {
description = "Multi-platform password manager";
homepage = "https://1password.com/";
license = licenses.unfree;
- maintainers = with maintainers; [ danieldk timstott savannidgerinel ];
+ maintainers = with maintainers; [ timstott savannidgerinel ];
platforms = [ "x86_64-linux" ];
};
}
diff --git a/third_party/nixpkgs/pkgs/applications/misc/calibre/default.nix b/third_party/nixpkgs/pkgs/applications/misc/calibre/default.nix
index 0ee374ac69..d27c9c9af6 100644
--- a/third_party/nixpkgs/pkgs/applications/misc/calibre/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/misc/calibre/default.nix
@@ -77,7 +77,7 @@ mkDerivation rec {
cchardet
css-parser
cssselect
- dateutil
+ python-dateutil
dnspython
feedparser
html2text
diff --git a/third_party/nixpkgs/pkgs/applications/misc/curaengine/default.nix b/third_party/nixpkgs/pkgs/applications/misc/curaengine/default.nix
index 05f63c5480..d0dfde5b38 100644
--- a/third_party/nixpkgs/pkgs/applications/misc/curaengine/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/misc/curaengine/default.nix
@@ -2,13 +2,13 @@
stdenv.mkDerivation rec {
pname = "curaengine";
- version = "4.9.1";
+ version = "4.10.0";
src = fetchFromGitHub {
owner = "Ultimaker";
repo = "CuraEngine";
rev = version;
- sha256 = "sha256-1hCjtnI1EnfyQ0QfU8qZoSLIjE5pyDYpu8H4J91cWYM=";
+ sha256 = "sha256-t5i6s0KKcaoMqzDxZ6JL1NyKP33uxWdmyziK3xh8q88=";
};
nativeBuildInputs = [ cmake ];
diff --git a/third_party/nixpkgs/pkgs/applications/misc/gcalcli/default.nix b/third_party/nixpkgs/pkgs/applications/misc/gcalcli/default.nix
index 392e2c312f..23e42539d7 100644
--- a/third_party/nixpkgs/pkgs/applications/misc/gcalcli/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/misc/gcalcli/default.nix
@@ -20,7 +20,7 @@ buildPythonApplication rec {
'';
propagatedBuildInputs = [
- dateutil gflags httplib2 parsedatetime six vobject
+ python-dateutil gflags httplib2 parsedatetime six vobject
google-api-python-client oauth2client uritemplate
libnotify
];
diff --git a/third_party/nixpkgs/pkgs/applications/misc/gpxsee/default.nix b/third_party/nixpkgs/pkgs/applications/misc/gpxsee/default.nix
index 0eca08907e..a2280e8bb0 100644
--- a/third_party/nixpkgs/pkgs/applications/misc/gpxsee/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/misc/gpxsee/default.nix
@@ -2,13 +2,13 @@
mkDerivation rec {
pname = "gpxsee";
- version = "9.1";
+ version = "9.2";
src = fetchFromGitHub {
owner = "tumic0";
repo = "GPXSee";
rev = version;
- sha256 = "sha256-szq1i2/NEtMK4paSkxtkKXc8yY8qGj2U/p6CzNIecAY=";
+ sha256 = "sha256-pU02Eaq6tB7X6EPOo8YAyryJRbSV3KebQv8VELxXaBw=";
};
patches = (substituteAll {
diff --git a/third_party/nixpkgs/pkgs/applications/misc/hugo/default.nix b/third_party/nixpkgs/pkgs/applications/misc/hugo/default.nix
index c2e55be113..4268331884 100644
--- a/third_party/nixpkgs/pkgs/applications/misc/hugo/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/misc/hugo/default.nix
@@ -2,13 +2,13 @@
buildGoModule rec {
pname = "hugo";
- version = "0.84.3";
+ version = "0.84.4";
src = fetchFromGitHub {
owner = "gohugoio";
repo = pname;
rev = "v${version}";
- sha256 = "sha256-3SbF4JsanNup0JmtEoZlyu3SvMn01r+nhnPgIi/W8pA=";
+ sha256 = "sha256-nD2UBDSDG6OFfUvDBXCfhOCiJyFMP2pDXSlIESaEfqE=";
};
vendorSha256 = "sha256-ImXTOtN6kQL7Q8IBlmK7+i47cWtyZT0xcnQdCw3NvWM=";
diff --git a/third_party/nixpkgs/pkgs/applications/misc/khal/default.nix b/third_party/nixpkgs/pkgs/applications/misc/khal/default.nix
index 5c6b505dd6..a0b477e985 100644
--- a/third_party/nixpkgs/pkgs/applications/misc/khal/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/misc/khal/default.nix
@@ -18,7 +18,7 @@ with python3.pkgs; buildPythonApplication rec {
click
click-log
configobj
- dateutil
+ python-dateutil
icalendar
lxml
pkgs.vdirsyncer
diff --git a/third_party/nixpkgs/pkgs/applications/misc/masterpdfeditor/default.nix b/third_party/nixpkgs/pkgs/applications/misc/masterpdfeditor/default.nix
index 2fd217e3cd..72028478e6 100644
--- a/third_party/nixpkgs/pkgs/applications/misc/masterpdfeditor/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/misc/masterpdfeditor/default.nix
@@ -41,6 +41,7 @@ stdenv.mkDerivation rec {
homepage = "https://code-industry.net/free-pdf-editor/";
license = licenses.unfreeRedistributable;
platforms = with platforms; [ "x86_64-linux" ];
- maintainers = with maintainers; [ cmcdragonkai flokli ];
+ broken = true;
+ maintainers = with maintainers; [ cmcdragonkai ];
};
}
diff --git a/third_party/nixpkgs/pkgs/applications/misc/otpclient/default.nix b/third_party/nixpkgs/pkgs/applications/misc/otpclient/default.nix
new file mode 100644
index 0000000000..b15eb1a78b
--- /dev/null
+++ b/third_party/nixpkgs/pkgs/applications/misc/otpclient/default.nix
@@ -0,0 +1,36 @@
+{ stdenv
+, lib
+, fetchFromGitHub
+, cmake
+, pkg-config
+, gtk3
+, wrapGAppsHook
+, jansson
+, libgcrypt
+, libzip
+, libpng
+, libcotp
+, zbar
+}:
+
+stdenv.mkDerivation rec {
+ pname = "otpclient";
+ version = "2.4.4";
+
+ src = fetchFromGitHub {
+ owner = "paolostivanin";
+ repo = pname;
+ rev = "v${version}";
+ sha256 = "0zjvhcx9q8nsf97zikddxriky0kghi4j4i7312s94pl8c7kb4abr";
+ };
+
+ buildInputs = [ gtk3 jansson libgcrypt libzip libpng libcotp zbar ];
+ nativeBuildInputs = [ cmake pkg-config wrapGAppsHook ];
+
+ meta = with lib; {
+ description = "Highly secure and easy to use OTP client written in C/GTK that supports both TOTP and HOTP";
+ homepage = "https://github.com/paolostivanin/OTPClient";
+ license = licenses.gpl3Only;
+ maintainers = with maintainers; [ alexbakker ];
+ };
+}
diff --git a/third_party/nixpkgs/pkgs/applications/misc/pdfarranger/default.nix b/third_party/nixpkgs/pkgs/applications/misc/pdfarranger/default.nix
index 235d14b4cd..5657c7f7e1 100644
--- a/third_party/nixpkgs/pkgs/applications/misc/pdfarranger/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/misc/pdfarranger/default.nix
@@ -29,7 +29,7 @@ python3Packages.buildPythonApplication rec {
pikepdf
img2pdf
setuptools
- dateutil
+ python-dateutil
];
# incompatible with wrapGAppsHook
diff --git a/third_party/nixpkgs/pkgs/applications/misc/subsurface/default.nix b/third_party/nixpkgs/pkgs/applications/misc/subsurface/default.nix
index 7420267aa7..d5a7d6f0fd 100644
--- a/third_party/nixpkgs/pkgs/applications/misc/subsurface/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/misc/subsurface/default.nix
@@ -5,13 +5,13 @@
}:
let
- version = "5.0.1";
+ version = "5.0.2";
subsurfaceSrc = (fetchFromGitHub {
owner = "Subsurface";
repo = "subsurface";
rev = "v${version}";
- sha256 = "01r836ckvrmgprjf4cqxn2n3w5w4pa2fjrhspjndsspic8nwlrwg";
+ sha256 = "1yay06m8p9qp2ghrg8dxavdq55y09apcgdnb7rihgs3hq86k539n";
fetchSubmodules = true;
});
diff --git a/third_party/nixpkgs/pkgs/applications/misc/termdown/default.nix b/third_party/nixpkgs/pkgs/applications/misc/termdown/default.nix
index 562a0f0bdc..f28bd665a5 100644
--- a/third_party/nixpkgs/pkgs/applications/misc/termdown/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/misc/termdown/default.nix
@@ -3,7 +3,7 @@
, buildPythonApplication
, click
, pyfiglet
-, dateutil
+, python-dateutil
, setuptools
}:
@@ -18,7 +18,7 @@ buildPythonApplication rec {
owner = "trehn";
};
- propagatedBuildInputs = [ dateutil click pyfiglet setuptools ];
+ propagatedBuildInputs = [ python-dateutil click pyfiglet setuptools ];
meta = with lib; {
description = "Starts a countdown to or from TIMESPEC";
diff --git a/third_party/nixpkgs/pkgs/applications/misc/visidata/default.nix b/third_party/nixpkgs/pkgs/applications/misc/visidata/default.nix
index 9663d09304..7851000a7a 100644
--- a/third_party/nixpkgs/pkgs/applications/misc/visidata/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/misc/visidata/default.nix
@@ -2,7 +2,7 @@
, lib
, buildPythonApplication
, fetchFromGitHub
-, dateutil
+, python-dateutil
, pandas
, requests
, lxml
@@ -36,7 +36,7 @@ buildPythonApplication rec {
propagatedBuildInputs = [
# from visidata/requirements.txt
# packages not (yet) present in nixpkgs are commented
- dateutil
+ python-dateutil
pandas
requests
lxml
diff --git a/third_party/nixpkgs/pkgs/applications/misc/yokadi/default.nix b/third_party/nixpkgs/pkgs/applications/misc/yokadi/default.nix
index 20defe4198..10d519efa4 100644
--- a/third_party/nixpkgs/pkgs/applications/misc/yokadi/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/misc/yokadi/default.nix
@@ -1,4 +1,4 @@
-{ lib, fetchurl, buildPythonApplication, dateutil,
+{ lib, fetchurl, buildPythonApplication, python-dateutil,
sqlalchemy, setproctitle, icalendar }:
buildPythonApplication rec {
@@ -11,7 +11,7 @@ buildPythonApplication rec {
};
propagatedBuildInputs = [
- dateutil
+ python-dateutil
sqlalchemy
setproctitle
icalendar
diff --git a/third_party/nixpkgs/pkgs/applications/networking/3proxy/default.nix b/third_party/nixpkgs/pkgs/applications/networking/3proxy/default.nix
index f9221d06d0..b83f93b3b6 100644
--- a/third_party/nixpkgs/pkgs/applications/networking/3proxy/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/networking/3proxy/default.nix
@@ -2,13 +2,13 @@
stdenv.mkDerivation rec {
pname = "3proxy";
- version = "0.9.3";
+ version = "0.9.4";
src = fetchFromGitHub {
owner = "z3APA3A";
repo = pname;
rev = version;
- sha256 = "9aopwyz0U2bYTvx5YWLJo9EE8Xfb51IOguHRJodjpm8=";
+ sha256 = "sha256-4bLlQ/ULvpjs6fr19yBBln5mRRc+yj+zVLiTs1e/Ypc=";
};
makeFlags = [
diff --git a/third_party/nixpkgs/pkgs/applications/networking/browsers/brave/default.nix b/third_party/nixpkgs/pkgs/applications/networking/browsers/brave/default.nix
index 7d5b437b0a..7b2acbd6b3 100644
--- a/third_party/nixpkgs/pkgs/applications/networking/browsers/brave/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/networking/browsers/brave/default.nix
@@ -90,11 +90,11 @@ in
stdenv.mkDerivation rec {
pname = "brave";
- version = "1.26.67";
+ version = "1.26.74";
src = fetchurl {
url = "https://github.com/brave/brave-browser/releases/download/v${version}/brave-browser_${version}_amd64.deb";
- sha256 = "Kg6ExXZYdSkyBoivu9h4blytHN9hOc4bUSuFR+1YZOY=";
+ sha256 = "ULmoUXyPWHCewK4FPP7SX1Ena6n0aM/EWR7ZnMN1ztY=";
};
dontConfigure = true;
diff --git a/third_party/nixpkgs/pkgs/applications/networking/browsers/chromium/browser.nix b/third_party/nixpkgs/pkgs/applications/networking/browsers/chromium/browser.nix
index cc44376444..602e2e6a82 100644
--- a/third_party/nixpkgs/pkgs/applications/networking/browsers/chromium/browser.nix
+++ b/third_party/nixpkgs/pkgs/applications/networking/browsers/chromium/browser.nix
@@ -62,7 +62,7 @@ mkChromiumDerivation (base: rec {
-e '/\[Desktop Entry\]/a\' \
-e 'StartupWMClass=chromium-browser' \
$out/share/applications/chromium-browser.desktop
- '' + lib.optionalString (channel == "dev") ''
+ '' + lib.optionalString (channel != "stable") ''
cp -v "$buildPath/crashpad_handler" "$libExecPath/"
'';
diff --git a/third_party/nixpkgs/pkgs/applications/networking/cluster/luigi/default.nix b/third_party/nixpkgs/pkgs/applications/networking/cluster/luigi/default.nix
index ef85494bd1..2c839e84a4 100644
--- a/third_party/nixpkgs/pkgs/applications/networking/cluster/luigi/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/networking/cluster/luigi/default.nix
@@ -9,7 +9,7 @@ python3.pkgs.buildPythonApplication rec {
sha256 = "b4b1ccf086586d041d7e91e68515d495c550f30e4d179d63863fea9ccdbb78eb";
};
- propagatedBuildInputs = with python3.pkgs; [ dateutil tornado python-daemon boto3 ];
+ propagatedBuildInputs = with python3.pkgs; [ python-dateutil tornado python-daemon boto3 ];
# Requires tox, hadoop, and google cloud
doCheck = false;
diff --git a/third_party/nixpkgs/pkgs/applications/networking/dnscontrol/default.nix b/third_party/nixpkgs/pkgs/applications/networking/dnscontrol/default.nix
index 21c42ad786..69f71a7479 100644
--- a/third_party/nixpkgs/pkgs/applications/networking/dnscontrol/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/networking/dnscontrol/default.nix
@@ -2,16 +2,16 @@
buildGoModule rec {
pname = "dnscontrol";
- version = "3.10.0";
+ version = "3.10.1";
src = fetchFromGitHub {
owner = "StackExchange";
repo = pname;
rev = "v${version}";
- sha256 = "sha256-22wYc6W4a5P9+JW7NW+s85IlQ+tfLhYzDarN6PGkFk4=";
+ sha256 = "sha256-fYQqH/J027XJPML/qKMpuu2Nxuvb0cyjOu2czLH8SoM=";
};
- vendorSha256 = "sha256-TPvO/E/uOyVSMNRQ3zzt15+i0UK0uHvI4qM5PqmHY20=";
+ vendorSha256 = "sha256-225TR9jTZSGEJZz3csl/pR/v2unUK67l08x5ESQTJzA=";
subPackages = [ "." ];
diff --git a/third_party/nixpkgs/pkgs/applications/networking/feedreaders/gnome-feeds/default.nix b/third_party/nixpkgs/pkgs/applications/networking/feedreaders/gnome-feeds/default.nix
index 62ffe15e61..9b173e8568 100644
--- a/third_party/nixpkgs/pkgs/applications/networking/feedreaders/gnome-feeds/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/networking/feedreaders/gnome-feeds/default.nix
@@ -51,7 +51,7 @@ python3.pkgs.buildPythonApplication rec {
propagatedBuildInputs = with python3.pkgs; [
beautifulsoup4
- dateutil
+ python-dateutil
feedparser
html5lib
listparser
diff --git a/third_party/nixpkgs/pkgs/applications/networking/flexget/default.nix b/third_party/nixpkgs/pkgs/applications/networking/flexget/default.nix
index 228c6b4715..61e42ce22e 100644
--- a/third_party/nixpkgs/pkgs/applications/networking/flexget/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/networking/flexget/default.nix
@@ -46,7 +46,7 @@ python3Packages.buildPythonApplication rec {
pynzb
pyparsing
PyRSS2Gen
- dateutil
+ python-dateutil
pyyaml
rebulk
requests
diff --git a/third_party/nixpkgs/pkgs/applications/networking/giara/default.nix b/third_party/nixpkgs/pkgs/applications/networking/giara/default.nix
index 940756855b..1f4d2e0a2d 100644
--- a/third_party/nixpkgs/pkgs/applications/networking/giara/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/networking/giara/default.nix
@@ -48,7 +48,7 @@ python3.pkgs.buildPythonApplication rec {
pythonPath = with python3.pkgs; [
pygobject3
pycairo
- dateutil
+ python-dateutil
praw
pillow
mistune
diff --git a/third_party/nixpkgs/pkgs/applications/networking/instant-messengers/salut-a-toi/requirements.nix b/third_party/nixpkgs/pkgs/applications/networking/instant-messengers/salut-a-toi/requirements.nix
index 8277028ac7..a8e711c447 100644
--- a/third_party/nixpkgs/pkgs/applications/networking/instant-messengers/salut-a-toi/requirements.nix
+++ b/third_party/nixpkgs/pkgs/applications/networking/instant-messengers/salut-a-toi/requirements.nix
@@ -55,7 +55,7 @@ in {
sha256 = "0rnshrzw8605x05mpd8ndrx3ri8h6cx713mp8sl4f04f4gcrz8ml";
};
- propagatedBuildInputs = with pythonPackages; [twisted dateutil];
+ propagatedBuildInputs = with pythonPackages; [twisted python-dateutil];
meta = with lib; {
description = "Some (mainly XMPP-related) additions to twisted";
diff --git a/third_party/nixpkgs/pkgs/applications/networking/instant-messengers/telegram/tdesktop/default.nix b/third_party/nixpkgs/pkgs/applications/networking/instant-messengers/telegram/tdesktop/default.nix
index 76d149048a..47aa7c7330 100644
--- a/third_party/nixpkgs/pkgs/applications/networking/instant-messengers/telegram/tdesktop/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/networking/instant-messengers/telegram/tdesktop/default.nix
@@ -1,7 +1,7 @@
{ mkDerivation, lib, fetchFromGitHub, callPackage
, pkg-config, cmake, ninja, python3, wrapGAppsHook, wrapQtAppsHook, removeReferencesTo
-, qtbase, qtimageformats, gtk3, libsForQt5, enchant2, lz4, xxHash
-, dee, ffmpeg, openalSoft, minizip, libopus, alsa-lib, libpulseaudio, range-v3
+, qtbase, qtimageformats, gtk3, libsForQt5, lz4, xxHash
+, ffmpeg, openalSoft, minizip, libopus, alsa-lib, libpulseaudio, range-v3
, tl-expected, hunspell, glibmm, webkitgtk
, libtgvoip, rnnoise, abseil-cpp, extra-cmake-modules
# Transitive dependencies:
@@ -23,7 +23,7 @@ let
tg_owt = callPackage ./tg_owt.nix {};
in mkDerivation rec {
pname = "telegram-desktop";
- version = "2.8.3";
+ version = "2.8.4";
# Note: Update via pkgs/applications/networking/instant-messengers/telegram/tdesktop/update.py
# Telegram-Desktop with submodules
@@ -32,12 +32,10 @@ in mkDerivation rec {
repo = "tdesktop";
rev = "v${version}";
fetchSubmodules = true;
- sha256 = "1ywxsy3a99sdibipriblbzskmkqbnxwrz3lavfdr134wq8w8rjf7";
+ sha256 = "sha256-IN3GQgdNM66/GxKa5EGKB/LIkgBxS8Y4mkPBaSEphmw=";
};
postPatch = ''
- substituteInPlace Telegram/lib_spellcheck/spellcheck/platform/linux/linux_enchant.cpp \
- --replace '"libenchant-2.so.2"' '"${enchant2}/lib/libenchant-2.so.2"'
substituteInPlace Telegram/CMakeLists.txt \
--replace '"''${TDESKTOP_LAUNCHER_BASENAME}.appdata.xml"' '"''${TDESKTOP_LAUNCHER_BASENAME}.metainfo.xml"'
'';
@@ -49,8 +47,8 @@ in mkDerivation rec {
nativeBuildInputs = [ pkg-config cmake ninja python3 wrapGAppsHook wrapQtAppsHook removeReferencesTo ];
buildInputs = [
- qtbase qtimageformats gtk3 libsForQt5.kwayland libsForQt5.libdbusmenu enchant2 lz4 xxHash
- dee ffmpeg openalSoft minizip libopus alsa-lib libpulseaudio range-v3
+ qtbase qtimageformats gtk3 libsForQt5.kwayland libsForQt5.libdbusmenu lz4 xxHash
+ ffmpeg openalSoft minizip libopus alsa-lib libpulseaudio range-v3
tl-expected hunspell glibmm webkitgtk
libtgvoip rnnoise abseil-cpp extra-cmake-modules
tg_owt
diff --git a/third_party/nixpkgs/pkgs/applications/networking/seafile-client/default.nix b/third_party/nixpkgs/pkgs/applications/networking/seafile-client/default.nix
index f17d1fa3ae..446da4cdea 100644
--- a/third_party/nixpkgs/pkgs/applications/networking/seafile-client/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/networking/seafile-client/default.nix
@@ -10,7 +10,7 @@ mkDerivation rec {
owner = "haiwen";
repo = "seafile-client";
rev = "v${version}";
- sha256 = "lhdKbR19ScNeezICf7vwZaeJikPjwbqrz42bo4lhxJs=";
+ sha256 = "cG3OSqRhYnxlzfauQia6pM/1gu+iE5mtHTGk3kGMFH0=";
};
nativeBuildInputs = [ pkg-config cmake ];
diff --git a/third_party/nixpkgs/pkgs/applications/networking/sync/acd_cli/default.nix b/third_party/nixpkgs/pkgs/applications/networking/sync/acd_cli/default.nix
index 519242b887..f630cb4071 100644
--- a/third_party/nixpkgs/pkgs/applications/networking/sync/acd_cli/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/networking/sync/acd_cli/default.nix
@@ -1,5 +1,5 @@
{ lib, fetchFromGitHub, buildPythonApplication, fuse
-, appdirs, colorama, dateutil, requests, requests_toolbelt
+, appdirs, colorama, python-dateutil, requests, requests_toolbelt
, fusepy, sqlalchemy, setuptools }:
buildPythonApplication rec {
@@ -15,7 +15,7 @@ buildPythonApplication rec {
sha256 = "0a0fr632l24a3jmgla3b1vcm50ayfa9hdbp677ch1chwj5dq4zfp";
};
- propagatedBuildInputs = [ appdirs colorama dateutil fusepy requests
+ propagatedBuildInputs = [ appdirs colorama python-dateutil fusepy requests
requests_toolbelt setuptools sqlalchemy ];
makeWrapperArgs = [ "--prefix LIBFUSE_PATH : ${fuse}/lib/libfuse.so" ];
diff --git a/third_party/nixpkgs/pkgs/applications/networking/syncthing-gtk/default.nix b/third_party/nixpkgs/pkgs/applications/networking/syncthing-gtk/default.nix
index 158999f86f..caa46942ca 100644
--- a/third_party/nixpkgs/pkgs/applications/networking/syncthing-gtk/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/networking/syncthing-gtk/default.nix
@@ -1,6 +1,6 @@
{ lib, fetchFromGitHub, fetchpatch, libnotify, librsvg, killall
, gtk3, libappindicator-gtk3, substituteAll, syncthing, wrapGAppsHook
-, gnome, buildPythonApplication, dateutil, pyinotify, pygobject3
+, gnome, buildPythonApplication, python-dateutil, pyinotify, pygobject3
, bcrypt, gobject-introspection, gsettings-desktop-schemas
, pango, gdk-pixbuf, atk }:
@@ -30,7 +30,7 @@ buildPythonApplication rec {
];
propagatedBuildInputs = [
- dateutil pyinotify pygobject3 bcrypt
+ python-dateutil pyinotify pygobject3 bcrypt
];
patches = [
diff --git a/third_party/nixpkgs/pkgs/applications/office/paperless/default.nix b/third_party/nixpkgs/pkgs/applications/office/paperless/default.nix
index c2578696c6..68032ebe84 100644
--- a/third_party/nixpkgs/pkgs/applications/office/paperless/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/office/paperless/default.nix
@@ -122,7 +122,7 @@ let
runtimePackages = with python.pkgs; [
dateparser
- dateutil
+ python-dateutil
django
django-cors-headers
django-crispy-forms
diff --git a/third_party/nixpkgs/pkgs/applications/office/paperwork/paperwork-gtk.nix b/third_party/nixpkgs/pkgs/applications/office/paperwork/paperwork-gtk.nix
index 8f1278d992..16ee7733ed 100644
--- a/third_party/nixpkgs/pkgs/applications/office/paperwork/paperwork-gtk.nix
+++ b/third_party/nixpkgs/pkgs/applications/office/paperwork/paperwork-gtk.nix
@@ -122,7 +122,7 @@ python3Packages.buildPythonApplication rec {
openpaperwork-core
pypillowfight
pyxdg
- dateutil
+ python-dateutil
setuptools
];
diff --git a/third_party/nixpkgs/pkgs/applications/office/pyspread/default.nix b/third_party/nixpkgs/pkgs/applications/office/pyspread/default.nix
index 54d3b8f5c3..3c68c19aa9 100644
--- a/third_party/nixpkgs/pkgs/applications/office/pyspread/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/office/pyspread/default.nix
@@ -34,7 +34,7 @@ python3.pkgs.buildPythonApplication rec {
];
propagatedBuildInputs = with python3.pkgs; [
- dateutil
+ python-dateutil
markdown2
matplotlib
numpy
diff --git a/third_party/nixpkgs/pkgs/applications/office/softmaker/generic.nix b/third_party/nixpkgs/pkgs/applications/office/softmaker/generic.nix
index 56a951919e..3c139e1eea 100644
--- a/third_party/nixpkgs/pkgs/applications/office/softmaker/generic.nix
+++ b/third_party/nixpkgs/pkgs/applications/office/softmaker/generic.nix
@@ -123,7 +123,7 @@ in stdenv.mkDerivation {
description = "An office suite with a word processor, spreadsheet and presentation program";
homepage = "https://www.softmaker.com/";
license = licenses.unfree;
- maintainers = with maintainers; [ danieldk ];
+ maintainers = with maintainers; [ ];
platforms = [ "x86_64-linux" ];
};
}
diff --git a/third_party/nixpkgs/pkgs/applications/office/super-productivity/default.nix b/third_party/nixpkgs/pkgs/applications/office/super-productivity/default.nix
index 7793db2138..7cb9a9b7e9 100644
--- a/third_party/nixpkgs/pkgs/applications/office/super-productivity/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/office/super-productivity/default.nix
@@ -5,11 +5,11 @@ let
in
stdenv.mkDerivation rec {
pname = "super-productivity";
- version = "6.5.2";
+ version = "7.2.1";
src = fetchurl {
url = "https://github.com/johannesjo/super-productivity/releases/download/v${version}/superProductivity-${version}.AppImage";
- sha256 = "1ivl7chsv9axgk6nqkf580pav651hchi3di0mrp0pylpsqgk6f1f";
+ sha256 = "93eeb56fe923c48a9384cde0633e98a9d9dc5c0869fce63b9724ff74bb400049";
name = "${pname}-${version}.AppImage";
};
diff --git a/third_party/nixpkgs/pkgs/applications/office/tryton/default.nix b/third_party/nixpkgs/pkgs/applications/office/tryton/default.nix
index b3a5ae44c9..ff4835411e 100644
--- a/third_party/nixpkgs/pkgs/applications/office/tryton/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/office/tryton/default.nix
@@ -36,7 +36,7 @@ python3Packages.buildPythonApplication rec {
];
propagatedBuildInputs = with python3Packages; [
- dateutil
+ python-dateutil
pygobject3
goocalendar
pycairo
diff --git a/third_party/nixpkgs/pkgs/applications/science/chemistry/gwyddion/default.nix b/third_party/nixpkgs/pkgs/applications/science/chemistry/gwyddion/default.nix
index ca80262eb7..43007cb1f0 100644
--- a/third_party/nixpkgs/pkgs/applications/science/chemistry/gwyddion/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/science/chemistry/gwyddion/default.nix
@@ -35,10 +35,10 @@ in
stdenv.mkDerivation rec {
pname = "gwyddion";
- version = "2.58";
+ version = "2.59";
src = fetchurl {
url = "mirror://sourceforge/gwyddion/gwyddion-${version}.tar.xz";
- sha256 = "sha256-0xNnzYkuW3nEsO2o+0WEA+Z71XWoq6FYXm342OWO9Sw=";
+ sha256 = "sha256-APMOJeZt/zp8JvXghKZ5lQFRKWO/4TVDORok8qAgEBk=";
};
nativeBuildInputs = [ pkg-config file ];
diff --git a/third_party/nixpkgs/pkgs/applications/science/logic/tlaplus/toolbox.nix b/third_party/nixpkgs/pkgs/applications/science/logic/tlaplus/toolbox.nix
index defe218b11..ef2d97ef6b 100644
--- a/third_party/nixpkgs/pkgs/applications/science/logic/tlaplus/toolbox.nix
+++ b/third_party/nixpkgs/pkgs/applications/science/logic/tlaplus/toolbox.nix
@@ -1,5 +1,5 @@
{ lib, fetchzip, makeWrapper, makeDesktopItem, stdenv
-, gtk3, libXtst, glib, zlib
+, gtk3, libXtst, glib, zlib, wrapGAppsHook
}:
let
@@ -25,7 +25,11 @@ in stdenv.mkDerivation rec {
sha256 = "02a2y2mkfab5cczw8g604m61h4xr0apir49zbd1aq6mmgcgngw80";
};
- nativeBuildInputs = [ makeWrapper ];
+ buildInputs = [ gtk3 ];
+
+ nativeBuildInputs = [ makeWrapper wrapGAppsHook ];
+
+ dontWrapGApps = true;
phases = [ "installPhase" ];
@@ -36,6 +40,9 @@ in stdenv.mkDerivation rec {
cp -r "$src" "$out/toolbox"
chmod -R +w "$out/toolbox"
+ fixupPhase
+ gappsWrapperArgsHook
+
patchelf \
--set-interpreter $(cat $NIX_CC/nix-support/dynamic-linker) \
"$out/toolbox/toolbox"
@@ -52,7 +59,8 @@ in stdenv.mkDerivation rec {
makeWrapper $out/toolbox/toolbox $out/bin/tla-toolbox \
--run "set -x; cd $out/toolbox" \
--add-flags "-data ~/.tla-toolbox" \
- --prefix LD_LIBRARY_PATH : "${lib.makeLibraryPath [ gtk3 libXtst glib zlib ]}"
+ --prefix LD_LIBRARY_PATH : "${lib.makeLibraryPath [ gtk3 libXtst glib zlib ]}" \
+ "''${gappsWrapperArgs[@]}"
echo -e "\nCreating TLA Toolbox icons..."
pushd "$src"
diff --git a/third_party/nixpkgs/pkgs/applications/science/math/caffe/default.nix b/third_party/nixpkgs/pkgs/applications/science/math/caffe/default.nix
index 565c6a1767..08bf84be7c 100644
--- a/third_party/nixpkgs/pkgs/applications/science/math/caffe/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/science/math/caffe/default.nix
@@ -76,7 +76,7 @@ stdenv.mkDerivation rec {
let pp = python.pkgs; in ([
pp.numpy pp.scipy pp.scikitimage pp.h5py
pp.matplotlib pp.ipython pp.networkx pp.nose
- pp.pandas pp.dateutil pp.protobuf pp.gflags
+ pp.pandas pp.python-dateutil pp.protobuf pp.gflags
pp.pyyaml pp.pillow pp.six
] ++ lib.optional leveldbSupport pp.leveldb)
);
diff --git a/third_party/nixpkgs/pkgs/applications/system/glances/default.nix b/third_party/nixpkgs/pkgs/applications/system/glances/default.nix
index c142ba12bc..0fc85cea05 100644
--- a/third_party/nixpkgs/pkgs/applications/system/glances/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/system/glances/default.nix
@@ -9,14 +9,14 @@
buildPythonApplication rec {
pname = "glances";
- version = "3.1.7";
+ version = "3.2.0";
disabled = isPyPy;
src = fetchFromGitHub {
owner = "nicolargo";
repo = "glances";
rev = "v${version}";
- sha256 = "sha256-82ZD32dqRYGbGM/uyaJ5VqVZbhDZthiEcTihkV43JOU=";
+ sha256 = "126xpx8i85giy3hkhqh0qcln9i1qj5bfciaqh9486rkl54xm8zsr";
};
# Some tests fail in the sandbox (they e.g. require access to /sys/class/power_supply):
@@ -48,7 +48,7 @@ buildPythonApplication rec {
meta = with lib; {
homepage = "https://nicolargo.github.io/glances/";
description = "Cross-platform curses-based monitoring tool";
- changelog = "https://github.com/nicolargo/glances/releases/tag/v${version}";
+ changelog = "https://github.com/nicolargo/glances/blob/v${version}/NEWS.rst";
license = licenses.lgpl3Only;
maintainers = with maintainers; [ jonringer primeos koral ];
};
diff --git a/third_party/nixpkgs/pkgs/applications/version-management/mercurial/default.nix b/third_party/nixpkgs/pkgs/applications/version-management/mercurial/default.nix
index df58b2162f..3394d44a4b 100644
--- a/third_party/nixpkgs/pkgs/applications/version-management/mercurial/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/version-management/mercurial/default.nix
@@ -1,95 +1,158 @@
-{ lib, stdenv, fetchurl, fetchpatch, python3Packages, makeWrapper, gettext
+{ lib, stdenv, fetchurl, fetchpatch, python3Packages, makeWrapper, gettext, installShellFiles
, re2Support ? true
, rustSupport ? stdenv.hostPlatform.isLinux, rustPlatform
-, guiSupport ? false, tk ? null
+, fullBuild ? false
+, gitSupport ? fullBuild
+, guiSupport ? fullBuild, tk
+, highlightSupport ? fullBuild
, ApplicationServices
}:
let
- inherit (python3Packages) docutils python fb-re2;
+ inherit (python3Packages) docutils python fb-re2 pygit2 pygments;
-in python3Packages.buildPythonApplication rec {
- pname = "mercurial";
- version = "5.8";
+ self = python3Packages.buildPythonApplication rec {
+ pname = "mercurial";
+ version = "5.8";
- src = fetchurl {
- url = "https://mercurial-scm.org/release/mercurial-${version}.tar.gz";
- sha256 = "17rhlmmkqz5ll3k68jfzpcifg3nndbcbc2nx7kw8xn3qcj7nlpgw";
+ src = fetchurl {
+ url = "https://mercurial-scm.org/release/mercurial-${version}.tar.gz";
+ sha256 = "17rhlmmkqz5ll3k68jfzpcifg3nndbcbc2nx7kw8xn3qcj7nlpgw";
+ };
+
+ patches = [
+ # https://phab.mercurial-scm.org/D10638, needed for below patch to apply
+ (fetchpatch {
+ url = "https://www.mercurial-scm.org/repo/hg/raw-rev/c365850b611490a5fdb235eb1cea310a542c2f84";
+ sha256 = "1gn3xvahbjdhbglffqpmj559w1bkqqsk70wqcanwv7nh972aqy9g";
+ })
+ # https://phab.mercurial-scm.org/D10639, fixes https://bz.mercurial-scm.org/show_bug.cgi?id=6514
+ (fetchpatch {
+ url = "https://www.mercurial-scm.org/repo/hg/raw-rev/c8f62920f07a40af3403ba9aefa1dac8a97d53ea";
+ sha256 = "1kw0xjg2c4jby0ncarjvpa5qafsyl1wzbk6jxls4hnxlxdl53nmn";
+ })
+ ];
+
+ format = "other";
+
+ passthru = { inherit python; }; # pass it so that the same version can be used in hg2git
+
+ cargoDeps = if rustSupport then rustPlatform.fetchCargoTarball {
+ inherit src;
+ name = "${pname}-${version}";
+ sha256 = "1kc2giqvfwsdl5fb0qmz96ws1gdrs3skfdzvpiif2i8f7r4nqlhd";
+ sourceRoot = "${pname}-${version}/rust";
+ } else null;
+ cargoRoot = if rustSupport then "rust" else null;
+
+ propagatedBuildInputs = lib.optional re2Support fb-re2
+ ++ lib.optional gitSupport pygit2
+ ++ lib.optional highlightSupport pygments;
+ nativeBuildInputs = [ makeWrapper gettext installShellFiles ]
+ ++ lib.optionals rustSupport (with rustPlatform; [
+ cargoSetupHook
+ rust.cargo
+ rust.rustc
+ ]);
+ buildInputs = [ docutils ]
+ ++ lib.optionals stdenv.isDarwin [ ApplicationServices ];
+
+ makeFlags = [ "PREFIX=$(out)" ]
+ ++ lib.optional rustSupport "PURE=--rust";
+
+ postInstall = (lib.optionalString guiSupport ''
+ mkdir -p $out/etc/mercurial
+ cp contrib/hgk $out/bin
+ cat >> $out/etc/mercurial/hgrc << EOF
+ [extensions]
+ hgk=$out/lib/${python.libPrefix}/site-packages/hgext/hgk.py
+ EOF
+ # setting HG so that hgk can be run itself as well (not only hg view)
+ WRAP_TK=" --set TK_LIBRARY ${tk}/lib/${tk.libPrefix}
+ --set HG $out/bin/hg
+ --prefix PATH : ${tk}/bin "
+ '') + ''
+ for i in $(cd $out/bin && ls); do
+ wrapProgram $out/bin/$i \
+ $WRAP_TK
+ done
+
+ # copy hgweb.cgi to allow use in apache
+ mkdir -p $out/share/cgi-bin
+ cp -v hgweb.cgi contrib/hgweb.wsgi $out/share/cgi-bin
+ chmod u+x $out/share/cgi-bin/hgweb.cgi
+
+ installShellCompletion --cmd hg \
+ --bash contrib/bash_completion \
+ --zsh contrib/zsh_completion
+ '';
+
+ passthru.tests = {};
+
+ meta = with lib; {
+ inherit version;
+ description = "A fast, lightweight SCM system for very large distributed projects";
+ homepage = "https://www.mercurial-scm.org";
+ downloadPage = "https://www.mercurial-scm.org/release/";
+ license = licenses.gpl2Plus;
+ maintainers = with maintainers; [ eelco lukegb ];
+ updateWalker = true;
+ platforms = platforms.unix;
+ };
};
+in
+ self.overridePythonAttrs (origAttrs: {
+ passthru = origAttrs.passthru // rec {
+ # withExtensions takes a function which takes the python packages set and
+ # returns a list of extensions to install.
+ #
+ # for instance: mercurial.withExtension (pm: [ pm.hg-evolve ])
+ withExtensions = f: let
+ python = self.python;
+ mercurialHighPrio = ps: (ps.toPythonModule self).overrideAttrs (oldAttrs: {
+ meta = oldAttrs.meta // {
+ priority = 50;
+ };
+ });
+ plugins = (f python.pkgs) ++ [ (mercurialHighPrio python.pkgs) ];
+ env = python.withPackages (ps: plugins);
+ in stdenv.mkDerivation {
+ pname = "${self.pname}-with-extensions";
- patches = [
- # https://phab.mercurial-scm.org/D10638, needed for below patch to apply
- (fetchpatch {
- url = "https://phab.mercurial-scm.org/file/data/l7p2r4zcctcr3pzlybv2/PHID-FILE-bwjzxlz6sbegk3s4irik/D10638.diff";
- sha256 = "0mfi324is02l7cnd3j0gbmg5rpyyqn3afg3f73flnfwmz5njqa5f";
- })
- # https://phab.mercurial-scm.org/D10639, fixes https://bz.mercurial-scm.org/show_bug.cgi?id=6514
- (fetchpatch {
- url = "https://phab.mercurial-scm.org/file/data/v53nhburhtkhpccyecei/PHID-FILE-6v34oll6r2gkqo4ng5nt/D10639.diff";
- sha256 = "0h5ilrd2x1789fr6sf4k1mcvxdh0xdyr94yawdacw87v3x12c8cb";
- })
- ];
+ inherit (self) src version meta;
- format = "other";
+ buildInputs = self.buildInputs ++ self.propagatedBuildInputs;
+ nativeBuildInputs = self.nativeBuildInputs;
- passthru = { inherit python; }; # pass it so that the same version can be used in hg2git
+ phases = [ "installPhase" "installCheckPhase" ];
- cargoDeps = if rustSupport then rustPlatform.fetchCargoTarball {
- inherit src;
- name = "${pname}-${version}";
- sha256 = "1kc2giqvfwsdl5fb0qmz96ws1gdrs3skfdzvpiif2i8f7r4nqlhd";
- sourceRoot = "${pname}-${version}/rust";
- } else null;
- cargoRoot = if rustSupport then "rust" else null;
+ installPhase = ''
+ runHook preInstall
- propagatedBuildInputs = lib.optional re2Support fb-re2;
- nativeBuildInputs = [ makeWrapper gettext ]
- ++ lib.optionals rustSupport (with rustPlatform; [
- cargoSetupHook
- rust.cargo
- rust.rustc
- ]);
- buildInputs = [ docutils ]
- ++ lib.optionals stdenv.isDarwin [ ApplicationServices ];
+ mkdir -p $out/bin
- makeFlags = [ "PREFIX=$(out)" ]
- ++ lib.optional rustSupport "PURE=--rust";
+ for bindir in ${lib.concatStringsSep " " (map (d: "${lib.getBin d}/bin") plugins)}; do
+ for bin in $bindir/*; do
+ ln -s ${env}/bin/$(basename $bin) $out/bin/
+ done
+ done
- postInstall = (lib.optionalString guiSupport ''
- mkdir -p $out/etc/mercurial
- cp contrib/hgk $out/bin
- cat >> $out/etc/mercurial/hgrc << EOF
- [extensions]
- hgk=$out/lib/${python.libPrefix}/site-packages/hgext/hgk.py
- EOF
- # setting HG so that hgk can be run itself as well (not only hg view)
- WRAP_TK=" --set TK_LIBRARY ${tk}/lib/${tk.libPrefix}
- --set HG $out/bin/hg
- --prefix PATH : ${tk}/bin "
- '') + ''
- for i in $(cd $out/bin && ls); do
- wrapProgram $out/bin/$i \
- $WRAP_TK
- done
+ ln -s ${self}/share $out/share
- # copy hgweb.cgi to allow use in apache
- mkdir -p $out/share/cgi-bin
- cp -v hgweb.cgi contrib/hgweb.wsgi $out/share/cgi-bin
- chmod u+x $out/share/cgi-bin/hgweb.cgi
+ runHook postInstall
+ '';
- # install bash/zsh completions
- install -v -m644 -D contrib/bash_completion $out/share/bash-completion/completions/_hg
- install -v -m644 -D contrib/zsh_completion $out/share/zsh/site-functions/_hg
- '';
+ installCheckPhase = ''
+ runHook preInstallCheck
- meta = with lib; {
- inherit version;
- description = "A fast, lightweight SCM system for very large distributed projects";
- homepage = "https://www.mercurial-scm.org";
- downloadPage = "https://www.mercurial-scm.org/release/";
- license = licenses.gpl2Plus;
- maintainers = with maintainers; [ eelco lukegb ];
- updateWalker = true;
- platforms = platforms.unix;
- };
-}
+ $out/bin/hg help >/dev/null || exit 1
+
+ runHook postInstallCheck
+ '';
+ };
+
+ tests = origAttrs.passthru.tests // {
+ withExtensions = withExtensions (pm: [ pm.hg-evolve ]);
+ };
+ };
+ })
diff --git a/third_party/nixpkgs/pkgs/applications/version-management/tortoisehg/default.nix b/third_party/nixpkgs/pkgs/applications/version-management/tortoisehg/default.nix
index a0fa9318a1..17cde4c8a5 100644
--- a/third_party/nixpkgs/pkgs/applications/version-management/tortoisehg/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/version-management/tortoisehg/default.nix
@@ -1,25 +1,16 @@
{ lib, fetchurl, python3Packages
, mercurial, qt5
-}@args:
+}:
let
tortoisehgSrc = fetchurl rec {
meta.name = "tortoisehg-${meta.version}";
- meta.version = "5.6";
+ meta.version = "5.8";
url = "https://www.mercurial-scm.org/release/tortoisehg/targz/tortoisehg-${meta.version}.tar.gz";
- sha256 = "031bafj88wggpvw0lgvl0djhlbhs9nls9vzwvni8yn0m0bgzc9gr";
+ sha256 = "154q7kyrdk045wx7rsblzx41k3wbvp2f40kzkxmiiaa5n35srsm3";
};
- tortoiseMercurial = (mercurial.override {
- rustSupport = false;
- re2Support = lib.versionAtLeast tortoisehgSrc.meta.version "5.8";
- }).overridePythonAttrs (old: rec {
- inherit (tortoisehgSrc.meta) version;
- src = fetchurl {
- url = "https://mercurial-scm.org/release/mercurial-${version}.tar.gz";
- sha256 = "1hk2y30zzdnlv8f71kabvh0xi9c7qhp28ksh20vpd0r712sv79yz";
- };
- patches = [];
- });
+ # Extension point for when thg's mercurial is lagging behind mainline.
+ tortoiseMercurial = mercurial;
in python3Packages.buildPythonApplication {
inherit (tortoisehgSrc.meta) name version;
@@ -49,7 +40,7 @@ in python3Packages.buildPythonApplication {
meta = {
description = "Qt based graphical tool for working with Mercurial";
homepage = "https://tortoisehg.bitbucket.io/";
- license = lib.licenses.gpl2;
+ license = lib.licenses.gpl2Only;
platforms = lib.platforms.linux;
maintainers = with lib.maintainers; [ danbst ];
};
diff --git a/third_party/nixpkgs/pkgs/applications/video/makemkv/default.nix b/third_party/nixpkgs/pkgs/applications/video/makemkv/default.nix
index da18a8d7ab..9ab35b92a8 100644
--- a/third_party/nixpkgs/pkgs/applications/video/makemkv/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/video/makemkv/default.nix
@@ -72,6 +72,6 @@ in mkDerivation {
license = licenses.unfree;
homepage = "http://makemkv.com";
platforms = [ "x86_64-linux" ];
- maintainers = with maintainers; [ danieldk titanous ];
+ maintainers = with maintainers; [ titanous ];
};
}
diff --git a/third_party/nixpkgs/pkgs/applications/video/pyca/default.nix b/third_party/nixpkgs/pkgs/applications/video/pyca/default.nix
index df42bbec15..d7e1e03733 100644
--- a/third_party/nixpkgs/pkgs/applications/video/pyca/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/video/pyca/default.nix
@@ -1,4 +1,4 @@
-{ lib, buildPythonApplication, fetchFromGitHub, pycurl, dateutil, configobj, sqlalchemy, sdnotify, flask }:
+{ lib, buildPythonApplication, fetchFromGitHub, pycurl, python-dateutil, configobj, sqlalchemy, sdnotify, flask }:
buildPythonApplication rec {
pname = "pyca";
@@ -13,7 +13,7 @@ buildPythonApplication rec {
propagatedBuildInputs = [
pycurl
- dateutil
+ python-dateutil
configobj
sqlalchemy
sdnotify
diff --git a/third_party/nixpkgs/pkgs/applications/window-managers/qtile/default.nix b/third_party/nixpkgs/pkgs/applications/window-managers/qtile/default.nix
index ba7228f5b9..08b3a9834b 100644
--- a/third_party/nixpkgs/pkgs/applications/window-managers/qtile/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/window-managers/qtile/default.nix
@@ -39,7 +39,7 @@ python37Packages.buildPythonApplication rec {
cairocffi-xcffib
setuptools
setuptools-scm
- dateutil
+ python-dateutil
dbus-python
mpd2
psutil
diff --git a/third_party/nixpkgs/pkgs/applications/window-managers/sway/idle.nix b/third_party/nixpkgs/pkgs/applications/window-managers/sway/idle.nix
index acfbb1ad36..8c1ae0b359 100644
--- a/third_party/nixpkgs/pkgs/applications/window-managers/sway/idle.nix
+++ b/third_party/nixpkgs/pkgs/applications/window-managers/sway/idle.nix
@@ -1,5 +1,5 @@
{ lib, stdenv, fetchFromGitHub
-, meson, ninja, pkg-config, scdoc
+, meson, ninja, pkg-config, scdoc, wayland-scanner
, wayland, wayland-protocols, systemd
}:
@@ -19,7 +19,7 @@ stdenv.mkDerivation rec {
--replace "version: '1.5'" "version: '${version}'"
'';
- nativeBuildInputs = [ meson ninja pkg-config scdoc ];
+ nativeBuildInputs = [ meson ninja pkg-config scdoc wayland-scanner ];
buildInputs = [ wayland wayland-protocols systemd ];
mesonFlags = [ "-Dman-pages=enabled" "-Dlogind=enabled" ];
diff --git a/third_party/nixpkgs/pkgs/applications/window-managers/sway/lock.nix b/third_party/nixpkgs/pkgs/applications/window-managers/sway/lock.nix
index 9b1523421e..6dccedad82 100644
--- a/third_party/nixpkgs/pkgs/applications/window-managers/sway/lock.nix
+++ b/third_party/nixpkgs/pkgs/applications/window-managers/sway/lock.nix
@@ -1,5 +1,5 @@
{ lib, stdenv, fetchFromGitHub
-, meson, ninja, pkg-config, scdoc
+, meson, ninja, pkg-config, scdoc, wayland-scanner
, wayland, wayland-protocols, libxkbcommon, cairo, gdk-pixbuf, pam
}:
@@ -19,7 +19,7 @@ stdenv.mkDerivation rec {
--replace "version: '1.4'" "version: '${version}'"
'';
- nativeBuildInputs = [ meson ninja pkg-config scdoc ];
+ nativeBuildInputs = [ meson ninja pkg-config scdoc wayland-scanner ];
buildInputs = [ wayland wayland-protocols libxkbcommon cairo gdk-pixbuf pam ];
mesonFlags = [
diff --git a/third_party/nixpkgs/pkgs/build-support/docker/default.nix b/third_party/nixpkgs/pkgs/build-support/docker/default.nix
index 9369e7d315..ffe5d69ec9 100644
--- a/third_party/nixpkgs/pkgs/build-support/docker/default.nix
+++ b/third_party/nixpkgs/pkgs/build-support/docker/default.nix
@@ -117,7 +117,8 @@ rec {
--tmpdir=$TMPDIR \
--override-os ${os} \
--override-arch ${arch} \
- copy "$sourceURL" "docker-archive://$out:$destNameTag"
+ copy "$sourceURL" "docker-archive://$out:$destNameTag" \
+ | cat # pipe through cat to force-disable progress bar
'';
# We need to sum layer.tar, not a directory, hence tarsum instead of nix-hash.
diff --git a/third_party/nixpkgs/pkgs/data/fonts/charis-sil/default.nix b/third_party/nixpkgs/pkgs/data/fonts/charis-sil/default.nix
index 44b40c72b5..6639cb57d8 100644
--- a/third_party/nixpkgs/pkgs/data/fonts/charis-sil/default.nix
+++ b/third_party/nixpkgs/pkgs/data/fonts/charis-sil/default.nix
@@ -1,7 +1,7 @@
{ lib, fetchzip }:
let
- version = "5.000";
+ version = "6.000";
in
fetchzip rec {
name = "charis-sil-${version}";
@@ -14,7 +14,7 @@ in
unzip -j $downloadedFile \*OFL.txt \*OFL-FAQ.txt \*README.txt \*FONTLOG.txt -d "$out/share/doc/${name}"
'';
- sha256 = "1a220s8n0flvcdkazqf5g10v6r55s2an308slvvarynpj6l7x27n";
+ sha256 = "sha256-eMmC893rI42qzZVCI17i9XSAbQzXCK2fHVe5Pf1/VnM=";
meta = with lib; {
homepage = "https://software.sil.org/charis";
diff --git a/third_party/nixpkgs/pkgs/data/fonts/terminus-font-ttf/default.nix b/third_party/nixpkgs/pkgs/data/fonts/terminus-font-ttf/default.nix
index f9d25a0128..1a65798891 100644
--- a/third_party/nixpkgs/pkgs/data/fonts/terminus-font-ttf/default.nix
+++ b/third_party/nixpkgs/pkgs/data/fonts/terminus-font-ttf/default.nix
@@ -1,7 +1,7 @@
{ lib, fetchzip }:
let
- version = "4.47.0";
+ version = "4.49.1";
in fetchzip {
name = "terminus-font-ttf-${version}";
@@ -18,7 +18,7 @@ in fetchzip {
install -Dm 644 COPYING "$out/share/doc/terminus-font-ttf/COPYING"
'';
- sha256 = "1mnx3vlnl0r15yzsa4zb9qqab4hpi603gdwhlbw960wg03i3xn8z";
+ sha256 = "sha256-UaTnCamIRN/3xZsYt5nYzvykXQ3ri94a047sWOJ2RfU=";
meta = with lib; {
description = "A clean fixed width TTF font";
diff --git a/third_party/nixpkgs/pkgs/data/misc/fedora-backgrounds/generic.nix b/third_party/nixpkgs/pkgs/data/misc/fedora-backgrounds/generic.nix
index 3e2e0928c3..5ebc6ff367 100644
--- a/third_party/nixpkgs/pkgs/data/misc/fedora-backgrounds/generic.nix
+++ b/third_party/nixpkgs/pkgs/data/misc/fedora-backgrounds/generic.nix
@@ -38,6 +38,6 @@ stdenvNoCC.mkDerivation {
description = "A set of default and supplemental wallpapers for Fedora";
license = licenses.cc-by-sa-40;
platforms = platforms.unix;
- maintainers = with maintainers; [ danieldk ];
+ maintainers = with maintainers; [ ];
};
}
diff --git a/third_party/nixpkgs/pkgs/data/misc/rime-data/default.nix b/third_party/nixpkgs/pkgs/data/misc/rime-data/default.nix
new file mode 100644
index 0000000000..371a07d3ec
--- /dev/null
+++ b/third_party/nixpkgs/pkgs/data/misc/rime-data/default.nix
@@ -0,0 +1,66 @@
+{ lib, stdenv, fetchFromGitHub, librime }:
+
+stdenv.mkDerivation {
+ pname = "rime-data";
+ version = "0.38.20210628";
+
+ src = fetchFromGitHub {
+ owner = "rime";
+ repo = "plum";
+ rev = "0b835e347cad9c2d7038cfe82df5b5d1fe1c0327";
+ sha256 = "0mja4wyazxdc6fr7pzij5ah4rzwxv4s12s64vfn5ikx1ias1f8ib";
+ };
+
+ buildInputs = [ librime ];
+
+ buildFlags = [ "all" ];
+ makeFlags = [ "PREFIX=$(out)" ];
+
+ preBuild = import ./fetchSchema.nix fetchFromGitHub;
+
+ postPatch = ''
+ # Disable git operations.
+ sed -i /fetch_or_update_package$/d scripts/install-packages.sh
+ '';
+
+ meta = with lib; {
+ description = "Schema data of Rime Input Method Engine";
+ longDescription = ''
+ Rime-data provides schema data for Rime Input Method Engine.
+ '';
+ homepage = "https://rime.im";
+ license = with licenses; [
+ # rime-array
+ # rime-combo-pinyin
+ # rime-double-pinyin
+ # rime-middle-chinese
+ # rime-scj
+ # rime-soutzoe
+ # rime-stenotype
+ # rime-wugniu
+ gpl3Only
+
+ # plum
+ # rime-bopomofo
+ # rime-cangjie
+ # rime-emoji
+ # rime-essay
+ # rime-ipa
+ # rime-jyutping
+ # rime-luna-pinyin
+ # rime-prelude
+ # rime-quick
+ # rime-stroke
+ # rime-terra-pinyin
+ # rime-wubi
+ lgpl3Only
+
+ # rime-pinyin-simp
+ asl20
+
+ # rime-cantonese
+ cc-by-40
+ ];
+ maintainers = [ maintainers.pengmeiyu ];
+ };
+}
diff --git a/third_party/nixpkgs/pkgs/data/misc/rime-data/fetchSchema.nix b/third_party/nixpkgs/pkgs/data/misc/rime-data/fetchSchema.nix
new file mode 100644
index 0000000000..7bf7d8477c
--- /dev/null
+++ b/third_party/nixpkgs/pkgs/data/misc/rime-data/fetchSchema.nix
@@ -0,0 +1,137 @@
+# Generated using generateFetchSchema.sh
+fetchFromGitHub:
+''
+mkdir -p package/rime
+ln -sv ${fetchFromGitHub {
+ owner = "rime";
+ repo = "rime-array";
+ rev = "8514193da939bc8888ad6a744f5e5921d4baebc7";
+ sha256 = "1fy7pcq7d8m0wzkkhklmv6p370ms9lqc1zpndyy2xjamzrbb9l83";
+}} package/rime/array
+ln -sv ${fetchFromGitHub {
+ owner = "rime";
+ repo = "rime-bopomofo";
+ rev = "c7618f4f5728e1634417e9d02ea50d82b71956ab";
+ sha256 = "0g77nv0jrwqnbqqna0ib0kqcy6l5zl62kh49ny67d6bjwnwz9186";
+}} package/rime/bopomofo
+ln -sv ${fetchFromGitHub {
+ owner = "rime";
+ repo = "rime-cangjie";
+ rev = "8dfad9e537f18821b71ba28773315d9c670ae245";
+ sha256 = "029kw9nx6x0acg4f0m8wj1ziqffffhy9yyj51nlx17cnia0qcrby";
+}} package/rime/cangjie
+ln -sv ${fetchFromGitHub {
+ owner = "rime";
+ repo = "rime-cantonese";
+ rev = "b6f800c74eb639816d56d0d5601aaa96c8963178";
+ sha256 = "1a4ksacbz8l30y3y5c017d0hzwik8knplglb3yswy7l4hsvaanyh";
+}} package/rime/cantonese
+ln -sv ${fetchFromGitHub {
+ owner = "rime";
+ repo = "rime-combo-pinyin";
+ rev = "a84065a86b272c76215215bd6f03c506b6e7097c";
+ sha256 = "1f0b4kakw0x26gmx7xi4f94nbjlb8lvi9bks4f92jswa045vnd87";
+}} package/rime/combo-pinyin
+ln -sv ${fetchFromGitHub {
+ owner = "rime";
+ repo = "rime-double-pinyin";
+ rev = "69bf85d4dfe8bac139c36abbd68d530b8b6622ea";
+ sha256 = "093wif5avvvw45fqbwj5wkbxrychy4pagl4mwsmbrayc8jkp69ak";
+}} package/rime/double-pinyin
+ln -sv ${fetchFromGitHub {
+ owner = "rime";
+ repo = "rime-emoji";
+ rev = "4c8c51f4a3bc7298c99376eda9bbd86070fc4fa1";
+ sha256 = "0175jqh210fncafqckr9zzaw55qpswmqjrykwms1apmc68l43122";
+}} package/rime/emoji
+ln -sv ${fetchFromGitHub {
+ owner = "rime";
+ repo = "rime-essay";
+ rev = "9db2e77305e75798baf3ec8dcf1f82785b5e1be9";
+ sha256 = "03ypkkaadd5qmyg26n24a66cll90xvcimgbmiyv4d33jradiqg22";
+}} package/rime/essay
+ln -sv ${fetchFromGitHub {
+ owner = "rime";
+ repo = "rime-ipa";
+ rev = "22b71710e029bcb412e9197192a638ab11bc2abf";
+ sha256 = "0zdk4f9qkfj3q5hmjnairj1lv6f6y27mic12k886n6sxywwbwr2k";
+}} package/rime/ipa
+ln -sv ${fetchFromGitHub {
+ owner = "rime";
+ repo = "rime-jyutping";
+ rev = "1e24baa6998815c716c581effe8ec65ee87c4e8c";
+ sha256 = "0s2rckpwlrm3n7w1csnqyi5p9mkpp3z87s7mrm2vc9sv06rpv7zl";
+}} package/rime/jyutping
+ln -sv ${fetchFromGitHub {
+ owner = "rime";
+ repo = "rime-luna-pinyin";
+ rev = "623adb022b094d540218b287c2e601509eee3347";
+ sha256 = "06pcwp09l5wkqv7792gbsl31xnlb3gr9q6bgbp94vvq6m2ycahqz";
+}} package/rime/luna-pinyin
+ln -sv ${fetchFromGitHub {
+ owner = "rime";
+ repo = "rime-middle-chinese";
+ rev = "9fad7a7c0c26167d5e6e85db8df48a15c7f7d4f0";
+ sha256 = "0a0bqrlzg0k692xblqnh1rh1fwwqqb205xwxlihgji85n8ibcgph";
+}} package/rime/middle-chinese
+ln -sv ${fetchFromGitHub {
+ owner = "rime";
+ repo = "rime-pinyin-simp";
+ rev = "b0e84cda02c613ebdedc127a26131b3800f45a8e";
+ sha256 = "05v804qr3a9xvjzp9yid7231fi2l2yrl47ybbvql61z9k36ab094";
+}} package/rime/pinyin-simp
+ln -sv ${fetchFromGitHub {
+ owner = "rime";
+ repo = "rime-prelude";
+ rev = "3de303ffaa731dba07b0462ce59f4767e1219ad2";
+ sha256 = "0g7a0bla58rh1v3md59k6adk185pilb4z8i2i0pqdl4nwqp40n2p";
+}} package/rime/prelude
+ln -sv ${fetchFromGitHub {
+ owner = "rime";
+ repo = "rime-quick";
+ rev = "3fe5911ba608cb2df1b6301b76ad1573bd482a76";
+ sha256 = "08bh87ym5qvw55lyw20l3m7jd4c2z5rvil8h5q8790r7z6j6ijy9";
+}} package/rime/quick
+ln -sv ${fetchFromGitHub {
+ owner = "rime";
+ repo = "rime-scj";
+ rev = "cab5a0858765eff0553dd685a2d61d5536e9149c";
+ sha256 = "0ard2bjp4896a8dimmcwyjwgmp9kl4rz92yc92jnd3y4rgwl6fvk";
+}} package/rime/scj
+ln -sv ${fetchFromGitHub {
+ owner = "rime";
+ repo = "rime-soutzoe";
+ rev = "beeaeca72d8e17dfd1e9af58680439e9012987dc";
+ sha256 = "0jyqx0q9s0qxn168l5n8zav8jcl2g5ppr7pa8jm1vwrllf20slcc";
+}} package/rime/soutzoe
+ln -sv ${fetchFromGitHub {
+ owner = "rime";
+ repo = "rime-stenotype";
+ rev = "f3e9189d5ce33c55d3936cc58e39d0c88b3f0c88";
+ sha256 = "0dl6px7lrh3xa87knjzwzdcwjj1k1dg4l72q7lb48an4s9f1cy5d";
+}} package/rime/stenotype
+ln -sv ${fetchFromGitHub {
+ owner = "rime";
+ repo = "rime-stroke";
+ rev = "ea8576d1accd6fda339e96b415caadb56e2a07d1";
+ sha256 = "07h6nq9867hjrd2v3h1pnr940sdrw4mqrzj43siz1rzjxz3s904r";
+}} package/rime/stroke
+ln -sv ${fetchFromGitHub {
+ owner = "rime";
+ repo = "rime-terra-pinyin";
+ rev = "ce7b9249612f575d2f43d51fcacd31d1b4e0ef1b";
+ sha256 = "0vm303f4lrdmdmif5klrp6w29vn9z2vzw33cw0y83pcnz39wiads";
+}} package/rime/terra-pinyin
+ln -sv ${fetchFromGitHub {
+ owner = "rime";
+ repo = "rime-wubi";
+ rev = "f1876f08f1d4a9696395be0070c0e8e4353c44cb";
+ sha256 = "1d9y9rqssacria9d0hla96czsqv2wkfm6z926m1x269ryv96zxvk";
+}} package/rime/wubi
+ln -sv ${fetchFromGitHub {
+ owner = "rime";
+ repo = "rime-wugniu";
+ rev = "abd1ee98efbf170258fcf43875c21a4259e00b61";
+ sha256 = "0qn54d3cclny106ixdw08r5n6wn52ffs1hgrma3k0j4pv0kr9nlq";
+}} package/rime/wugniu
+''
diff --git a/third_party/nixpkgs/pkgs/data/misc/rime-data/generateFetchSchema.sh b/third_party/nixpkgs/pkgs/data/misc/rime-data/generateFetchSchema.sh
new file mode 100755
index 0000000000..e7c05c4102
--- /dev/null
+++ b/third_party/nixpkgs/pkgs/data/misc/rime-data/generateFetchSchema.sh
@@ -0,0 +1,43 @@
+#!/usr/bin/env nix-shell
+#!nix-shell -i bash -p nix-prefetch-git -p jq
+
+imlist=(
+ array
+ bopomofo
+ cangjie
+ cantonese
+ combo-pinyin
+ double-pinyin
+ emoji
+ essay
+ ipa
+ jyutping
+ luna-pinyin
+ middle-chinese
+ pinyin-simp
+ prelude
+ quick
+ scj
+ soutzoe
+ stenotype
+ stroke
+ terra-pinyin
+ wubi
+ wugniu
+)
+
+echo "# Generated using generateFetchSchema.sh"
+echo "fetchFromGitHub:"
+echo \'\'
+echo "mkdir -p package/rime"
+for im in ${imlist[@]}; do
+ tempFile=$(mktemp)
+ echo "ln -sv \${fetchFromGitHub {"
+ echo " owner = \"rime\";"
+ echo " repo = \"rime-$im\";"
+ nix-prefetch-git --quiet https://github.com/rime/rime-$im \
+ | jq '{ rev: .rev, sha256: .sha256 }' \
+ | jq -r 'to_entries | map(" \(.key) = \"\(.value)\";") | .[]'
+ echo "}} package/rime/$im"
+done
+echo \'\'
diff --git a/third_party/nixpkgs/pkgs/desktops/cinnamon/bulky/default.nix b/third_party/nixpkgs/pkgs/desktops/cinnamon/bulky/default.nix
index 16d4e1400e..511cb6a1c0 100644
--- a/third_party/nixpkgs/pkgs/desktops/cinnamon/bulky/default.nix
+++ b/third_party/nixpkgs/pkgs/desktops/cinnamon/bulky/default.nix
@@ -12,13 +12,13 @@
stdenv.mkDerivation rec {
pname = "bulky";
- version = "1.6";
+ version = "1.7";
src = fetchFromGitHub {
owner = "linuxmint";
repo = "bulky";
rev = version;
- sha256 = "sha256-cO6AhQ0g1N43du74fljfI1M68jb9N04FKUyzjbzC3K0=";
+ sha256 = "sha256-+3OoeuGuyiHWlUrxm5A7CmNR+ijxdlmecmvqk+i+h08=";
};
nativeBuildInputs = [
diff --git a/third_party/nixpkgs/pkgs/desktops/gnome/default.nix b/third_party/nixpkgs/pkgs/desktops/gnome/default.nix
index b529a65026..ae2255acb9 100644
--- a/third_party/nixpkgs/pkgs/desktops/gnome/default.nix
+++ b/third_party/nixpkgs/pkgs/desktops/gnome/default.nix
@@ -339,8 +339,6 @@ lib.makeScope pkgs.newScope (self: with self; {
inherit (pkgs) gnome-user-docs; # added 2019-11-20
- inherit (pkgs) gegl_0_4; # added 2019-10-31
-
inherit (pkgs) gjs; # added 2019-01-05
inherit (pkgs) yelp-tools; # added 2019-11-20
diff --git a/third_party/nixpkgs/pkgs/development/beam-modules/rebar3-nix/default.nix b/third_party/nixpkgs/pkgs/development/beam-modules/rebar3-nix/default.nix
index ff248700d7..50bd296583 100644
--- a/third_party/nixpkgs/pkgs/development/beam-modules/rebar3-nix/default.nix
+++ b/third_party/nixpkgs/pkgs/development/beam-modules/rebar3-nix/default.nix
@@ -1,12 +1,12 @@
{ lib, buildRebar3, fetchFromGitHub }:
buildRebar3 rec {
name = "rebar3_nix";
- version = "0.1.0";
+ version = "0.1.1";
src = fetchFromGitHub {
owner = "erlang-nix";
repo = name;
rev = "v${version}";
- sha256 = "17w8m4aqqgvhpx3xyc7x2qzsrd3ybzc83ay50zs1gyd1b8csh2wf";
+ sha256 = "10ijc06qvv5hqv0qy3w7mbv9pshdb8bvy0f3phr1vd5hksbk731y";
};
meta = {
diff --git a/third_party/nixpkgs/pkgs/development/compilers/llvm/rocm/clang.nix b/third_party/nixpkgs/pkgs/development/compilers/llvm/rocm/clang.nix
index 6ab0f894ca..45c0bfda19 100644
--- a/third_party/nixpkgs/pkgs/development/compilers/llvm/rocm/clang.nix
+++ b/third_party/nixpkgs/pkgs/development/compilers/llvm/rocm/clang.nix
@@ -65,7 +65,7 @@ stdenv.mkDerivation rec {
description = "ROCm fork of the clang C/C++/Objective-C/Objective-C++ LLVM compiler frontend";
homepage = "https://llvm.org/";
license = with licenses; [ ncsa ];
- maintainers = with maintainers; [ danieldk ];
+ maintainers = with maintainers; [ ];
platforms = platforms.linux;
};
}
diff --git a/third_party/nixpkgs/pkgs/development/compilers/llvm/rocm/lld/default.nix b/third_party/nixpkgs/pkgs/development/compilers/llvm/rocm/lld/default.nix
index ef60747b01..c8ca83f76c 100644
--- a/third_party/nixpkgs/pkgs/development/compilers/llvm/rocm/lld/default.nix
+++ b/third_party/nixpkgs/pkgs/development/compilers/llvm/rocm/lld/default.nix
@@ -39,7 +39,7 @@ stdenv.mkDerivation rec {
description = "ROCm fork of the LLVM Linker";
homepage = "https://github.com/RadeonOpenCompute/llvm-project";
license = licenses.ncsa;
- maintainers = with maintainers; [ danieldk ];
+ maintainers = with maintainers; [ ];
platforms = platforms.linux;
};
}
diff --git a/third_party/nixpkgs/pkgs/development/compilers/llvm/rocm/llvm/default.nix b/third_party/nixpkgs/pkgs/development/compilers/llvm/rocm/llvm/default.nix
index b3e8c06195..6d1ff66497 100644
--- a/third_party/nixpkgs/pkgs/development/compilers/llvm/rocm/llvm/default.nix
+++ b/third_party/nixpkgs/pkgs/development/compilers/llvm/rocm/llvm/default.nix
@@ -91,7 +91,7 @@ in stdenv.mkDerivation rec {
description = "ROCm fork of the LLVM compiler infrastructure";
homepage = "https://github.com/RadeonOpenCompute/llvm-project";
license = with licenses; [ ncsa ];
- maintainers = with maintainers; [ danieldk ];
+ maintainers = with maintainers; [ ];
platforms = platforms.linux;
};
}
diff --git a/third_party/nixpkgs/pkgs/development/haskell-modules/generic-builder.nix b/third_party/nixpkgs/pkgs/development/haskell-modules/generic-builder.nix
index 5bf9f460ac..e76f5012f9 100644
--- a/third_party/nixpkgs/pkgs/development/haskell-modules/generic-builder.nix
+++ b/third_party/nixpkgs/pkgs/development/haskell-modules/generic-builder.nix
@@ -53,6 +53,7 @@ in
, enableParallelBuilding ? true
, maintainers ? null
, changelog ? null
+, mainProgram ? null
, doCoverage ? false
, doHaddock ? !(ghc.isHaLVM or false)
, passthru ? {}
@@ -666,6 +667,7 @@ stdenv.mkDerivation ({
// optionalAttrs (args ? hydraPlatforms) { inherit hydraPlatforms; }
// optionalAttrs (args ? badPlatforms) { inherit badPlatforms; }
// optionalAttrs (args ? changelog) { inherit changelog; }
+ // optionalAttrs (args ? mainProgram) { inherit mainProgram; }
;
}
diff --git a/third_party/nixpkgs/pkgs/development/libraries/amdvlk/default.nix b/third_party/nixpkgs/pkgs/development/libraries/amdvlk/default.nix
index 5d5277afcd..2ef3f3d392 100644
--- a/third_party/nixpkgs/pkgs/development/libraries/amdvlk/default.nix
+++ b/third_party/nixpkgs/pkgs/development/libraries/amdvlk/default.nix
@@ -85,6 +85,6 @@ in stdenv.mkDerivation rec {
changelog = "https://github.com/GPUOpen-Drivers/AMDVLK/releases/tag/v-${version}";
license = licenses.mit;
platforms = [ "x86_64-linux" "i686-linux" ];
- maintainers = with maintainers; [ danieldk Flakebi ];
+ maintainers = with maintainers; [ Flakebi ];
};
}
diff --git a/third_party/nixpkgs/pkgs/development/libraries/armadillo/default.nix b/third_party/nixpkgs/pkgs/development/libraries/armadillo/default.nix
index 9fdccfb3fa..fcc6498960 100644
--- a/third_party/nixpkgs/pkgs/development/libraries/armadillo/default.nix
+++ b/third_party/nixpkgs/pkgs/development/libraries/armadillo/default.nix
@@ -2,11 +2,11 @@
stdenv.mkDerivation rec {
pname = "armadillo";
- version = "10.5.2";
+ version = "10.5.3";
src = fetchurl {
url = "mirror://sourceforge/arma/armadillo-${version}.tar.xz";
- sha256 = "sha256-Y/I87cVIpelASBblDPj4/MSSqxqtxsDO8wv8Kvzq2V8=";
+ sha256 = "sha256-5sUdjVKm94ucZFn2mGE1CT4O5wWmdDBxEPYXXyzV7jc=";
};
nativeBuildInputs = [ cmake ];
diff --git a/third_party/nixpkgs/pkgs/development/libraries/babl/default.nix b/third_party/nixpkgs/pkgs/development/libraries/babl/default.nix
index d6e1d75437..c0765922de 100644
--- a/third_party/nixpkgs/pkgs/development/libraries/babl/default.nix
+++ b/third_party/nixpkgs/pkgs/development/libraries/babl/default.nix
@@ -10,13 +10,13 @@
stdenv.mkDerivation rec {
pname = "babl";
- version = "0.1.86";
+ version = "0.1.88";
outputs = [ "out" "dev" ];
src = fetchurl {
url = "https://download.gimp.org/pub/babl/${lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
- sha256 = "sha256-Cz9ZUVmtGyFs1ynAUEw6X2z3gMZB9Nxj/BZPPAOCyPA=";
+ sha256 = "sha256-Tw1/SqoLsucl80mt97NRqVfZ+ybVVdmJWnr4FrQWcDk=";
};
nativeBuildInputs = [
diff --git a/third_party/nixpkgs/pkgs/development/libraries/duckdb/default.nix b/third_party/nixpkgs/pkgs/development/libraries/duckdb/default.nix
index 60ccf5aeeb..e63f2c3cfd 100644
--- a/third_party/nixpkgs/pkgs/development/libraries/duckdb/default.nix
+++ b/third_party/nixpkgs/pkgs/development/libraries/duckdb/default.nix
@@ -5,13 +5,13 @@
stdenv.mkDerivation rec {
pname = "duckdb";
- version = "0.2.2";
+ version = "0.2.7";
src = fetchFromGitHub {
owner = "cwida";
repo = "duckdb";
rev = "v${version}";
- sha256 = "1pzz2zjzpvji5am21vd9kjxj0pnxsjmrsfqrym9h2rk2mi7p2cx8";
+ sha256 = "0cnqq2n1424fqg7gfyvrwkk6nvjal2fm5n08xc8q28ynyhq4sfmj";
};
nativeBuildInputs = [ cmake ];
diff --git a/third_party/nixpkgs/pkgs/development/libraries/egl-wayland/default.nix b/third_party/nixpkgs/pkgs/development/libraries/egl-wayland/default.nix
index b3654087ff..9e7beb0a4f 100644
--- a/third_party/nixpkgs/pkgs/development/libraries/egl-wayland/default.nix
+++ b/third_party/nixpkgs/pkgs/development/libraries/egl-wayland/default.nix
@@ -4,6 +4,7 @@
, pkg-config
, meson
, ninja
+, wayland-scanner
, libX11
, mesa
, libGL
@@ -51,10 +52,15 @@ in stdenv.mkDerivation rec {
sha256 = "1n9lg8hpjgxlf7dpddkjhbslsfd0symla2wk6jjmnl9n9jv2gmzk";
};
+ depsBuildBuild = [
+ pkg-config
+ ];
+
nativeBuildInputs = [
meson
ninja
pkg-config
+ wayland-scanner
];
buildInputs = [
diff --git a/third_party/nixpkgs/pkgs/development/libraries/gegl/4.0.nix b/third_party/nixpkgs/pkgs/development/libraries/gegl/4.0.nix
deleted file mode 100644
index 11f4f070c0..0000000000
--- a/third_party/nixpkgs/pkgs/development/libraries/gegl/4.0.nix
+++ /dev/null
@@ -1,121 +0,0 @@
-{ lib
-, stdenv
-, fetchurl
-, pkg-config
-, vala
-, gobject-introspection
-, gtk-doc
-, docbook-xsl-nons
-, docbook_xml_dtd_43
-, glib
-, babl
-, libpng
-, cairo
-, libjpeg
-, librsvg
-, lensfun
-, libspiro
-, maxflow
-, netsurf
-, pango
-, poly2tri-c
-, poppler
-, bzip2
-, json-glib
-, gettext
-, meson
-, ninja
-, libraw
-, gexiv2
-, libwebp
-, luajit
-, openexr
-, OpenCL
-, suitesparse
-}:
-
-stdenv.mkDerivation rec {
- pname = "gegl";
- version = "0.4.30";
-
- outputs = [ "out" "dev" "devdoc" ];
- outputBin = "dev";
-
- src = fetchurl {
- url = "https://download.gimp.org/pub/gegl/${lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
- sha256 = "sha256-wRJ4LPQJaWniMhfM36vkIoTjXVQ1/wxD1A5McPrsqN0=";
- };
-
- nativeBuildInputs = [
- pkg-config
- gettext
- meson
- ninja
- vala
- gobject-introspection
- gtk-doc
- docbook-xsl-nons
- docbook_xml_dtd_43
- ];
-
- buildInputs = [
- libpng
- cairo
- libjpeg
- librsvg
- lensfun
- libspiro
- maxflow
- netsurf.libnsgif
- pango
- poly2tri-c
- poppler
- bzip2
- libraw
- libwebp
- gexiv2
- luajit
- openexr
- suitesparse
- ] ++ lib.optional stdenv.isDarwin OpenCL;
-
- # for gegl-4.0.pc
- propagatedBuildInputs = [
- glib
- json-glib
- babl
- ];
-
- mesonFlags = [
- "-Ddocs=true"
- "-Dmrg=disabled" # not sure what that is
- "-Dsdl2=disabled"
- "-Dpygobject=disabled"
- "-Dlibav=disabled"
- "-Dlibv4l=disabled"
- "-Dlibv4l2=disabled"
- # Disabled due to multiple vulnerabilities, see
- # https://github.com/NixOS/nixpkgs/pull/73586
- "-Djasper=disabled"
- ];
-
- # TODO: Fix missing math symbols in gegl seamless clone.
- # It only appears when we use packaged poly2tri-c instead of vendored one.
- NIX_CFLAGS_COMPILE = "-lm";
-
- postPatch = ''
- chmod +x tests/opencl/opencl_test.sh
- patchShebangs tests/ff-load-save/tests_ff_load_save.sh tests/opencl/opencl_test.sh tools/xml_insert.sh
- '';
-
- # tests fail to connect to the com.apple.fonts daemon in sandboxed mode
- doCheck = !stdenv.isDarwin;
-
- meta = with lib; {
- description = "Graph-based image processing framework";
- homepage = "https://www.gegl.org";
- license = licenses.lgpl3Plus;
- maintainers = with maintainers; [ jtojnar ];
- platforms = platforms.unix;
- };
-}
diff --git a/third_party/nixpkgs/pkgs/development/libraries/gegl/default.nix b/third_party/nixpkgs/pkgs/development/libraries/gegl/default.nix
index bd67f3e6b7..11f4f070c0 100644
--- a/third_party/nixpkgs/pkgs/development/libraries/gegl/default.nix
+++ b/third_party/nixpkgs/pkgs/development/libraries/gegl/default.nix
@@ -1,43 +1,115 @@
-{ lib, stdenv
+{ lib
+, stdenv
, fetchurl
, pkg-config
+, vala
+, gobject-introspection
+, gtk-doc
+, docbook-xsl-nons
+, docbook_xml_dtd_43
+, glib
, babl
, libpng
, cairo
, libjpeg
, librsvg
+, lensfun
+, libspiro
+, maxflow
+, netsurf
, pango
-, gtk2
+, poly2tri-c
+, poppler
, bzip2
-, intltool
-, libintl
-, OpenGL ? null }:
+, json-glib
+, gettext
+, meson
+, ninja
+, libraw
+, gexiv2
+, libwebp
+, luajit
+, openexr
+, OpenCL
+, suitesparse
+}:
stdenv.mkDerivation rec {
pname = "gegl";
- version = "0.2.0";
+ version = "0.4.30";
+
+ outputs = [ "out" "dev" "devdoc" ];
+ outputBin = "dev";
src = fetchurl {
- url = "ftp://ftp.gtk.org/pub/gegl/0.2/${pname}-${version}.tar.bz2";
- sha256 = "df2e6a0d9499afcbc4f9029c18d9d1e0dd5e8710a75e17c9b1d9a6480dd8d426";
+ url = "https://download.gimp.org/pub/gegl/${lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
+ sha256 = "sha256-wRJ4LPQJaWniMhfM36vkIoTjXVQ1/wxD1A5McPrsqN0=";
};
- patches = [( fetchurl {
- url = "https://projects.archlinux.org/svntogit/packages.git/plain/trunk/"
- + "gegl-0.2.0-CVE-2012-4433.patch?h=packages/gegl&id=57a60fbda5d7bbbd1cc4767cb0724baa80c5e3e9";
- sha256 = "0p8mxj3w09nn1cc6cbxrd9hx742c5y27903i608wx6ja3kdjis59";
- name = "CVE-2012-4433.patch";
- })];
+ nativeBuildInputs = [
+ pkg-config
+ gettext
+ meson
+ ninja
+ vala
+ gobject-introspection
+ gtk-doc
+ docbook-xsl-nons
+ docbook_xml_dtd_43
+ ];
- # needs fonts otherwise don't know how to pass them
- configureFlags = [ "--disable-docs" ];
+ buildInputs = [
+ libpng
+ cairo
+ libjpeg
+ librsvg
+ lensfun
+ libspiro
+ maxflow
+ netsurf.libnsgif
+ pango
+ poly2tri-c
+ poppler
+ bzip2
+ libraw
+ libwebp
+ gexiv2
+ luajit
+ openexr
+ suitesparse
+ ] ++ lib.optional stdenv.isDarwin OpenCL;
- buildInputs = [ babl libpng cairo libjpeg librsvg pango gtk2 bzip2 intltool libintl ]
- ++ lib.optional stdenv.isDarwin OpenGL;
+ # for gegl-4.0.pc
+ propagatedBuildInputs = [
+ glib
+ json-glib
+ babl
+ ];
- nativeBuildInputs = [ pkg-config ];
+ mesonFlags = [
+ "-Ddocs=true"
+ "-Dmrg=disabled" # not sure what that is
+ "-Dsdl2=disabled"
+ "-Dpygobject=disabled"
+ "-Dlibav=disabled"
+ "-Dlibv4l=disabled"
+ "-Dlibv4l2=disabled"
+ # Disabled due to multiple vulnerabilities, see
+ # https://github.com/NixOS/nixpkgs/pull/73586
+ "-Djasper=disabled"
+ ];
- doCheck = false; # fails 3 out of 19 tests
+ # TODO: Fix missing math symbols in gegl seamless clone.
+ # It only appears when we use packaged poly2tri-c instead of vendored one.
+ NIX_CFLAGS_COMPILE = "-lm";
+
+ postPatch = ''
+ chmod +x tests/opencl/opencl_test.sh
+ patchShebangs tests/ff-load-save/tests_ff_load_save.sh tests/opencl/opencl_test.sh tools/xml_insert.sh
+ '';
+
+ # tests fail to connect to the com.apple.fonts daemon in sandboxed mode
+ doCheck = !stdenv.isDarwin;
meta = with lib; {
description = "Graph-based image processing framework";
diff --git a/third_party/nixpkgs/pkgs/development/libraries/libbaseencode/default.nix b/third_party/nixpkgs/pkgs/development/libraries/libbaseencode/default.nix
new file mode 100644
index 0000000000..c40f9bafb4
--- /dev/null
+++ b/third_party/nixpkgs/pkgs/development/libraries/libbaseencode/default.nix
@@ -0,0 +1,22 @@
+{ stdenv, lib, fetchFromGitHub, cmake }:
+
+stdenv.mkDerivation rec {
+ pname = "libbaseencode";
+ version = "1.0.11";
+
+ src = fetchFromGitHub {
+ owner = "paolostivanin";
+ repo = pname;
+ rev = "v${version}";
+ sha256 = "1f52yh052z8k90d1ag6nk01p1gf4i1zxp1daw8mashs8avqr2m7g";
+ };
+
+ nativeBuildInputs = [ cmake ];
+
+ meta = with lib; {
+ description = "Library written in C for encoding and decoding data using base32 or base64 (RFC-4648)";
+ homepage = "https://github.com/paolostivanin/libbaseencode";
+ license = licenses.asl20;
+ maintainers = with maintainers; [ alexbakker ];
+ };
+}
diff --git a/third_party/nixpkgs/pkgs/development/libraries/libcotp/default.nix b/third_party/nixpkgs/pkgs/development/libraries/libcotp/default.nix
new file mode 100644
index 0000000000..986890102d
--- /dev/null
+++ b/third_party/nixpkgs/pkgs/development/libraries/libcotp/default.nix
@@ -0,0 +1,23 @@
+{ stdenv, lib, fetchFromGitHub, cmake, pkg-config, libgcrypt, libbaseencode }:
+
+stdenv.mkDerivation rec {
+ pname = "libcotp";
+ version = "1.2.3";
+
+ src = fetchFromGitHub {
+ owner = "paolostivanin";
+ repo = pname;
+ rev = "v${version}";
+ sha256 = "1qq4shwiz1if9vys052dnsbm4dfw1ynlj6nsb0v4zjly3ndspfsk";
+ };
+
+ buildInputs = [ libbaseencode libgcrypt ];
+ nativeBuildInputs = [ cmake pkg-config ];
+
+ meta = with lib; {
+ description = "C library that generates TOTP and HOTP";
+ homepage = "https://github.com/paolostivanin/libcotp";
+ license = licenses.asl20;
+ maintainers = with maintainers; [ alexbakker ];
+ };
+}
diff --git a/third_party/nixpkgs/pkgs/development/libraries/libvmaf/default.nix b/third_party/nixpkgs/pkgs/development/libraries/libvmaf/default.nix
index c4b945bed4..1410822a1c 100644
--- a/third_party/nixpkgs/pkgs/development/libraries/libvmaf/default.nix
+++ b/third_party/nixpkgs/pkgs/development/libraries/libvmaf/default.nix
@@ -2,13 +2,13 @@
stdenv.mkDerivation rec {
pname = "libvmaf";
- version = "2.1.1";
+ version = "2.2.0";
src = fetchFromGitHub {
owner = "netflix";
repo = "vmaf";
rev = "v${version}";
- sha256 = "0dynk1pmsyf23vfxljaazqkr27vfrvhj3dyjzm06zxpzsn59aif3";
+ sha256 = "1jlmivmdzlhizljbmsvqqxnhjfyjh8zxyf5xv6j040vbfj4mf14f";
};
sourceRoot = "source/libvmaf";
diff --git a/third_party/nixpkgs/pkgs/development/libraries/libxlsxwriter/default.nix b/third_party/nixpkgs/pkgs/development/libraries/libxlsxwriter/default.nix
index 4bb80cb04a..ce9a72f00c 100644
--- a/third_party/nixpkgs/pkgs/development/libraries/libxlsxwriter/default.nix
+++ b/third_party/nixpkgs/pkgs/development/libraries/libxlsxwriter/default.nix
@@ -8,13 +8,13 @@
stdenv.mkDerivation rec {
pname = "libxlsxwriter";
- version = "1.0.6";
+ version = "1.0.8";
src = fetchFromGitHub {
owner = "jmcnamara";
repo = "libxlsxwriter";
rev = "RELEASE_${version}";
- sha256 = "03fdcbm0xnkxwv6fir4yy4x9q2p5h08j099w9xh5gc2ni7ygjlyx";
+ sha256 = "1z9bkg0pfkzxbpj2rys4mx9wmcxyjjqsg0nbiaabsg455q00plki";
};
nativeBuildInputs = [
diff --git a/third_party/nixpkgs/pkgs/development/libraries/opencolorio/default.nix b/third_party/nixpkgs/pkgs/development/libraries/opencolorio/default.nix
index 522c8cfa4a..b93e517def 100644
--- a/third_party/nixpkgs/pkgs/development/libraries/opencolorio/default.nix
+++ b/third_party/nixpkgs/pkgs/development/libraries/opencolorio/default.nix
@@ -1,5 +1,5 @@
{
- stdenv, lib, fetchFromGitHub,
+ stdenv, lib, fetchFromGitHub, symlinkJoin,
cmake, expat, libyamlcpp, ilmbase, pystring, # Base dependencies
glew, freeglut, # Only required on Linux
@@ -25,8 +25,8 @@ stdenv.mkDerivation rec {
sha256 = "194j9jp5c8ws0fryiz936wyinphnpzwpqnzvw9ryx6rbiwrba487";
};
- nativeBuildInputs = [ cmake ];
- buildInputs = [ expat libyamlcpp ilmbase pystring ]
+ nativeBuildInputs = [ cmake (symlinkJoin { name = "expat"; paths = [ expat.out expat.dev ]; }) ];
+ buildInputs = [ expat.out libyamlcpp ilmbase pystring ]
++ lib.optionals stdenv.hostPlatform.isLinux [ glew freeglut ]
++ lib.optionals stdenv.hostPlatform.isDarwin [ Carbon GLUT Cocoa ]
++ lib.optionals pythonBindings [ python3Packages.python python3Packages.pybind11 ]
diff --git a/third_party/nixpkgs/pkgs/development/libraries/rocclr/default.nix b/third_party/nixpkgs/pkgs/development/libraries/rocclr/default.nix
index c93ea5ba78..cf085d50ed 100644
--- a/third_party/nixpkgs/pkgs/development/libraries/rocclr/default.nix
+++ b/third_party/nixpkgs/pkgs/development/libraries/rocclr/default.nix
@@ -55,7 +55,7 @@ stdenv.mkDerivation rec {
description = "Radeon Open Compute common language runtime";
homepage = "https://github.com/ROCm-Developer-Tools/ROCclr";
license = licenses.mit;
- maintainers = with maintainers; [ danieldk ];
+ maintainers = with maintainers; [ ];
# rocclr seems to have some AArch64 ifdefs, but does not seem
# to be supported yet by the build infrastructure. Recheck in
# the future.
diff --git a/third_party/nixpkgs/pkgs/development/libraries/rocm-comgr/default.nix b/third_party/nixpkgs/pkgs/development/libraries/rocm-comgr/default.nix
index b9a34b113e..95fe28ce9f 100644
--- a/third_party/nixpkgs/pkgs/development/libraries/rocm-comgr/default.nix
+++ b/third_party/nixpkgs/pkgs/development/libraries/rocm-comgr/default.nix
@@ -40,7 +40,7 @@ stdenv.mkDerivation rec {
description = "APIs for compiling and inspecting AMDGPU code objects";
homepage = "https://github.com/RadeonOpenCompute/ROCm-CompilerSupport/tree/amd-stg-open/lib/comgr";
license = licenses.ncsa;
- maintainers = with maintainers; [ danieldk ];
+ maintainers = with maintainers; [ ];
platforms = platforms.linux;
};
}
diff --git a/third_party/nixpkgs/pkgs/development/libraries/rocm-device-libs/default.nix b/third_party/nixpkgs/pkgs/development/libraries/rocm-device-libs/default.nix
index e62d6f0076..383d91bd08 100644
--- a/third_party/nixpkgs/pkgs/development/libraries/rocm-device-libs/default.nix
+++ b/third_party/nixpkgs/pkgs/development/libraries/rocm-device-libs/default.nix
@@ -34,7 +34,7 @@ stdenv.mkDerivation rec {
description = "Set of AMD-specific device-side language runtime libraries";
homepage = "https://github.com/RadeonOpenCompute/ROCm-Device-Libs";
license = licenses.ncsa;
- maintainers = with maintainers; [ danieldk ];
+ maintainers = with maintainers; [ ];
platforms = platforms.linux;
};
}
diff --git a/third_party/nixpkgs/pkgs/development/libraries/rocm-opencl-icd/default.nix b/third_party/nixpkgs/pkgs/development/libraries/rocm-opencl-icd/default.nix
index 903c238f45..0a9d124561 100644
--- a/third_party/nixpkgs/pkgs/development/libraries/rocm-opencl-icd/default.nix
+++ b/third_party/nixpkgs/pkgs/development/libraries/rocm-opencl-icd/default.nix
@@ -14,7 +14,7 @@ stdenv.mkDerivation rec {
meta = with lib; {
description = "OpenCL ICD definition for AMD GPUs using the ROCm stack";
license = licenses.mit;
- maintainers = with maintainers; [ danieldk ];
+ maintainers = with maintainers; [ ];
platforms = platforms.linux;
};
}
diff --git a/third_party/nixpkgs/pkgs/development/libraries/rocm-opencl-runtime/default.nix b/third_party/nixpkgs/pkgs/development/libraries/rocm-opencl-runtime/default.nix
index d721cfece9..40ffcae792 100644
--- a/third_party/nixpkgs/pkgs/development/libraries/rocm-opencl-runtime/default.nix
+++ b/third_party/nixpkgs/pkgs/development/libraries/rocm-opencl-runtime/default.nix
@@ -77,7 +77,7 @@ stdenv.mkDerivation rec {
description = "OpenCL runtime for AMD GPUs, part of the ROCm stack";
homepage = "https://github.com/RadeonOpenCompute/ROCm-OpenCL-Runtime";
license = with licenses; [ asl20 mit ];
- maintainers = with maintainers; [ danieldk ];
+ maintainers = with maintainers; [ ];
platforms = platforms.linux;
};
}
diff --git a/third_party/nixpkgs/pkgs/development/libraries/rocm-runtime/default.nix b/third_party/nixpkgs/pkgs/development/libraries/rocm-runtime/default.nix
index c63e8249cf..eb4ce3c19f 100644
--- a/third_party/nixpkgs/pkgs/development/libraries/rocm-runtime/default.nix
+++ b/third_party/nixpkgs/pkgs/development/libraries/rocm-runtime/default.nix
@@ -43,6 +43,6 @@ stdenv.mkDerivation rec {
description = "Platform runtime for ROCm";
homepage = "https://github.com/RadeonOpenCompute/ROCR-Runtime";
license = with licenses; [ ncsa ];
- maintainers = with maintainers; [ danieldk ];
+ maintainers = with maintainers; [ ];
};
}
diff --git a/third_party/nixpkgs/pkgs/development/libraries/rocm-thunk/default.nix b/third_party/nixpkgs/pkgs/development/libraries/rocm-thunk/default.nix
index 1339e035eb..770dd16740 100644
--- a/third_party/nixpkgs/pkgs/development/libraries/rocm-thunk/default.nix
+++ b/third_party/nixpkgs/pkgs/development/libraries/rocm-thunk/default.nix
@@ -32,6 +32,6 @@ stdenv.mkDerivation rec {
description = "Radeon open compute thunk interface";
homepage = "https://github.com/RadeonOpenCompute/ROCT-Thunk-Interface";
license = with licenses; [ bsd2 mit ];
- maintainers = with maintainers; [ danieldk ];
+ maintainers = with maintainers; [ ];
};
}
diff --git a/third_party/nixpkgs/pkgs/development/libraries/wlroots/default.nix b/third_party/nixpkgs/pkgs/development/libraries/wlroots/default.nix
index 45c2fd228f..9dc717c347 100644
--- a/third_party/nixpkgs/pkgs/development/libraries/wlroots/default.nix
+++ b/third_party/nixpkgs/pkgs/development/libraries/wlroots/default.nix
@@ -18,6 +18,8 @@ stdenv.mkDerivation rec {
# $out for the library and $examples for the example programs (in examples):
outputs = [ "out" "examples" ];
+ depsBuildBuild = [ pkg-config ];
+
nativeBuildInputs = [ meson ninja pkg-config wayland-scanner ];
buildInputs = [
diff --git a/third_party/nixpkgs/pkgs/development/node-packages/node-packages.json b/third_party/nixpkgs/pkgs/development/node-packages/node-packages.json
index ea8f2ef7a1..43274c3f3e 100644
--- a/third_party/nixpkgs/pkgs/development/node-packages/node-packages.json
+++ b/third_party/nixpkgs/pkgs/development/node-packages/node-packages.json
@@ -126,7 +126,7 @@
, "indium"
, "insect"
, "ionic"
-, {"iosevka": "https://github.com/be5invis/Iosevka/archive/v7.0.4.tar.gz"}
+, {"iosevka": "https://github.com/be5invis/Iosevka/archive/v7.2.4.tar.gz"}
, "jake"
, "javascript-typescript-langserver"
, "joplin"
diff --git a/third_party/nixpkgs/pkgs/development/ocaml-modules/alcotest/default.nix b/third_party/nixpkgs/pkgs/development/ocaml-modules/alcotest/default.nix
index 94626f3c17..abef3ef7ef 100644
--- a/third_party/nixpkgs/pkgs/development/ocaml-modules/alcotest/default.nix
+++ b/third_party/nixpkgs/pkgs/development/ocaml-modules/alcotest/default.nix
@@ -4,13 +4,13 @@
buildDunePackage rec {
pname = "alcotest";
- version = "1.2.3";
+ version = "1.3.0";
useDune2 = true;
src = fetchurl {
url = "https://github.com/mirage/alcotest/releases/download/${version}/alcotest-mirage-${version}.tbz";
- sha256 = "1bmjcivbmd4vib15v4chycgd1gl8js9dk94vzxkdg06zxqd4hp08";
+ sha256 = "sha256-efnevbyolTdNb91zr4pHDcvgaLQQSD01wEu2zMM+iaw=";
};
propagatedBuildInputs = [ astring cmdliner fmt uuidm re stdlib-shims uutf ];
diff --git a/third_party/nixpkgs/pkgs/development/ocaml-modules/alcotest/lwt.nix b/third_party/nixpkgs/pkgs/development/ocaml-modules/alcotest/lwt.nix
index 82efbe91a0..5a57dc0fcc 100644
--- a/third_party/nixpkgs/pkgs/development/ocaml-modules/alcotest/lwt.nix
+++ b/third_party/nixpkgs/pkgs/development/ocaml-modules/alcotest/lwt.nix
@@ -1,13 +1,16 @@
-{ lib, buildDunePackage, alcotest, logs, ocaml_lwt }:
+{ lib, buildDunePackage, alcotest, logs, ocaml_lwt, fmt
+, re, cmdliner
+}:
buildDunePackage {
pname = "alcotest-lwt";
inherit (alcotest) version src useDune2;
- propagatedBuildInputs = [ alcotest logs ocaml_lwt ];
+ propagatedBuildInputs = [ alcotest logs ocaml_lwt fmt ];
doCheck = true;
+ checkInputs = [ re cmdliner ];
meta = alcotest.meta // {
description = "Lwt-based helpers for Alcotest";
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/Nikola/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/Nikola/default.nix
index 17a6e4d6a8..ae18ce5dc3 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/Nikola/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/Nikola/default.nix
@@ -3,7 +3,7 @@
, Babel
, blinker
, buildPythonPackage
-, dateutil
+, python-dateutil
, docutils
, doit
, fetchPypi
@@ -53,7 +53,7 @@ buildPythonPackage rec {
aiohttp
Babel
blinker
- dateutil
+ python-dateutil
docutils
doit
ghp-import
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/adal/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/adal/default.nix
index 31e0e73016..b555188b4b 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/adal/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/adal/default.nix
@@ -1,5 +1,5 @@
{ lib, buildPythonPackage, fetchPypi
-, requests, pyjwt, dateutil }:
+, requests, pyjwt, python-dateutil }:
buildPythonPackage rec {
pname = "adal";
@@ -10,7 +10,7 @@ buildPythonPackage rec {
sha256 = "d74f45b81317454d96e982fd1c50e6fb5c99ac2223728aea8764433a39f566f1";
};
- propagatedBuildInputs = [ requests pyjwt dateutil ];
+ propagatedBuildInputs = [ requests pyjwt python-dateutil ];
meta = with lib; {
description = "Library to make it easy for python application to authenticate to Azure Active Directory (AAD) in order to access AAD protected web resources";
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/aiomusiccast/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/aiomusiccast/default.nix
index e77642f510..267ca5b4a5 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/aiomusiccast/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/aiomusiccast/default.nix
@@ -8,7 +8,7 @@
buildPythonPackage rec {
pname = "aiomusiccast";
- version = "0.8.1";
+ version = "0.8.2";
format = "pyproject";
@@ -18,7 +18,7 @@ buildPythonPackage rec {
owner = "vigonotion";
repo = "aiomusiccast";
rev = version;
- sha256 = "sha256-1k0ELXA8TgAyRYdzSFXp/BsPesC1WCiC4PqHfcPk0u8=";
+ sha256 = "sha256-XmDE704c9KJst8hrvdyQdS52Sd6RnprQZjBCIWAaiho=";
};
nativeBuildInputs = [
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/alembic/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/alembic/default.nix
index c820ee81ee..81502a470a 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/alembic/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/alembic/default.nix
@@ -1,6 +1,6 @@
{ lib, buildPythonPackage, fetchPypi
, pytest, pytestcov, mock, coverage, setuptools
-, Mako, sqlalchemy, python-editor, dateutil
+, Mako, sqlalchemy, python-editor, python-dateutil
}:
buildPythonPackage rec {
@@ -13,7 +13,7 @@ buildPythonPackage rec {
};
buildInputs = [ pytest pytestcov mock coverage ];
- propagatedBuildInputs = [ Mako sqlalchemy python-editor dateutil setuptools ];
+ propagatedBuildInputs = [ Mako sqlalchemy python-editor python-dateutil setuptools ];
# no traditional test suite
doCheck = false;
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/aniso8601/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/aniso8601/default.nix
index 9cc3fb8277..62db58d611 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/aniso8601/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/aniso8601/default.nix
@@ -1,6 +1,6 @@
{ lib
, buildPythonPackage
-, dateutil
+, python-dateutil
, fetchPypi
, isPy3k
, mock
@@ -17,7 +17,7 @@ buildPythonPackage rec {
};
propagatedBuildInputs = [
- dateutil
+ python-dateutil
];
checkInputs = [
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/azure-storage/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/azure-storage/default.nix
index 8afb9b751e..3bc6a73186 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/azure-storage/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/azure-storage/default.nix
@@ -5,7 +5,7 @@
, azure-common
, cryptography
, futures ? null
-, dateutil
+, python-dateutil
, requests
, isPy3k
}:
@@ -19,7 +19,7 @@ buildPythonPackage rec {
sha256 = "0pyasfxkin6j8j00qmky7d9cvpxgis4fi9bscgclj6yrpvf14qpv";
};
- propagatedBuildInputs = [ azure-common cryptography dateutil requests ]
+ propagatedBuildInputs = [ azure-common cryptography python-dateutil requests ]
++ pkgs.lib.optionals (!isPy3k) [ futures ];
postPatch = ''
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/bashlex/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/bashlex/default.nix
index 8e29eed2ac..0ee12c4148 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/bashlex/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/bashlex/default.nix
@@ -8,13 +8,13 @@
buildPythonPackage rec {
pname = "bashlex";
- version = "0.14";
+ version = "0.15";
src = fetchFromGitHub {
owner = "idank";
repo = pname;
rev = version;
- sha256 = "070spmbf53y18miky5chgky4x5h8kp9czkp7dm173klv9pi2cn0k";
+ sha256 = "sha256-kKVorAIKlyC9vUzLOlaZ/JrG1kBBRIvLwBmHNj9nx84=";
};
checkInputs = [ nose ];
@@ -29,9 +29,11 @@ buildPythonPackage rec {
${python.interpreter} -m nose --with-doctest
'';
+ pythonImportsCheck = [ "bashlex" ];
+
meta = with lib; {
description = "Python parser for bash";
- license = licenses.gpl3;
+ license = licenses.gpl3Plus;
homepage = "https://github.com/idank/bashlex";
maintainers = with maintainers; [ multun ];
};
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/beancount/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/beancount/default.nix
index ec864e7149..31f8a24d8b 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/beancount/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/beancount/default.nix
@@ -5,7 +5,7 @@
, beautifulsoup4
, bottle
, chardet
-, dateutil
+, python-dateutil
, google-api-python-client
, google-auth-oauthlib
, lxml
@@ -34,7 +34,7 @@ buildPythonPackage rec {
beautifulsoup4
bottle
chardet
- dateutil
+ python-dateutil
google-api-python-client
google-auth-oauthlib
lxml
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/bitcoin-price-api/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/bitcoin-price-api/default.nix
index 3e74c17f3b..c9d317a81c 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/bitcoin-price-api/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/bitcoin-price-api/default.nix
@@ -1,5 +1,5 @@
{ lib, buildPythonPackage, fetchPypi
-, dateutil, requests }:
+, python-dateutil, requests }:
buildPythonPackage rec {
pname = "bitcoin-price-api";
@@ -10,7 +10,7 @@ buildPythonPackage rec {
sha256 = "bc68076f9632aaa9a8009d916d67a709c1e045dd904cfc7a3e8be33960d32029";
};
- propagatedBuildInputs = [ dateutil requests ];
+ propagatedBuildInputs = [ python-dateutil requests ];
# No tests in archive
doCheck = false;
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/botocore/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/botocore/default.nix
index 8a21eb455e..d05c2decf4 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/botocore/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/botocore/default.nix
@@ -1,7 +1,7 @@
{ lib
, buildPythonPackage
, fetchPypi
-, dateutil
+, python-dateutil
, jmespath
, docutils
, ordereddict
@@ -21,7 +21,7 @@ buildPythonPackage rec {
};
propagatedBuildInputs = [
- dateutil
+ python-dateutil
jmespath
docutils
ordereddict
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/bravado-core/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/bravado-core/default.nix
index 8c65cca07b..24db42b7a7 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/bravado-core/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/bravado-core/default.nix
@@ -5,13 +5,13 @@
buildPythonPackage rec {
pname = "bravado-core";
- version = "5.16.1";
+ version = "5.17.0";
src = fetchFromGitHub {
owner = "Yelp";
repo = pname;
rev = "v${version}";
- sha256 = "0r9gk5vkjbc407fjydms3ik3hnzajq54znyz58d8rm6pvqcvjjpl";
+ sha256 = "sha256-okQA4YJq0lyVJuDzD8mMRlOS/K3gf1qRUpw/5M0LlZE=";
};
checkInputs = [
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/bugsnag/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/bugsnag/default.nix
index 65cfa74777..f23bc566ba 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/bugsnag/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/bugsnag/default.nix
@@ -8,12 +8,12 @@
buildPythonPackage rec {
pname = "bugsnag";
- version = "4.0.3";
+ version = "4.1.0";
disabled = pythonOlder "3.5";
src = fetchPypi {
inherit pname version;
- sha256 = "0b70bc95e4e4f98b2eef7a3dadfdc50c1a40da7f50446adf43be05574a4b9f7c";
+ sha256 = "sha256-3L1ZzZ7eomzJLvtlGK7YOi81b4G/1azHML/iAvsnwcE=";
};
propagatedBuildInputs = [ six webob ];
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/bugwarrior/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/bugwarrior/default.nix
index c59d2196d2..a29e7458d4 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/bugwarrior/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/bugwarrior/default.nix
@@ -1,5 +1,5 @@
{ lib, buildPythonPackage, fetchPypi, pythonOlder, setuptools
-, twiggy, requests, offtrac, bugzilla, taskw, dateutil, pytz, keyring, six
+, twiggy, requests, offtrac, bugzilla, taskw, python-dateutil, pytz, keyring, six
, jinja2, pycurl, dogpile_cache, lockfile, click, pyxdg, future, jira }:
buildPythonPackage rec {
@@ -14,7 +14,7 @@ buildPythonPackage rec {
propagatedBuildInputs = [
setuptools
- twiggy requests offtrac bugzilla taskw dateutil pytz keyring six
+ twiggy requests offtrac bugzilla taskw python-dateutil pytz keyring six
jinja2 pycurl dogpile_cache lockfile click pyxdg future jira
];
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/buildbot/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/buildbot/default.nix
index 043a1cd3e1..6591954205 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/buildbot/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/buildbot/default.nix
@@ -1,6 +1,6 @@
{ stdenv, lib, buildPythonPackage, fetchPypi, makeWrapper, isPy3k,
python, twisted, jinja2, zope_interface, sqlalchemy,
- sqlalchemy_migrate, dateutil, txaio, autobahn, pyjwt, pyyaml, unidiff, treq,
+ sqlalchemy_migrate, python-dateutil, txaio, autobahn, pyjwt, pyyaml, unidiff, treq,
txrequests, pypugjs, boto3, moto, mock, python-lz4, setuptoolsTrial,
isort, pylint, flake8, buildbot-worker, buildbot-pkg, buildbot-plugins,
parameterized, git, openssh, glibcLocales, ldap3, nixosTests }:
@@ -39,7 +39,7 @@ let
zope_interface
sqlalchemy
sqlalchemy_migrate
- dateutil
+ python-dateutil
txaio
autobahn
pyjwt
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/certbot/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/certbot/default.nix
index 0f6b5fa285..7c324e646a 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/certbot/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/certbot/default.nix
@@ -4,7 +4,7 @@
, fetchFromGitHub
, ConfigArgParse, acme, configobj, cryptography, distro, josepy, parsedatetime, pyRFC3339, pyopenssl, pytz, requests, six, zope_component, zope_interface
, dialog, gnureadline
-, pytest_xdist, pytestCheckHook, dateutil
+, pytest_xdist, pytestCheckHook, python-dateutil
}:
buildPythonPackage rec {
@@ -40,7 +40,7 @@ buildPythonPackage rec {
buildInputs = [ dialog gnureadline ];
checkInputs = [
- dateutil
+ python-dateutil
pytestCheckHook
pytest_xdist
];
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/clize/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/clize/default.nix
index 1418db69a3..0088acdb83 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/clize/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/clize/default.nix
@@ -1,7 +1,7 @@
{ lib
, buildPythonPackage
, fetchPypi
-, dateutil
+, python-dateutil
, sigtools
, six
, attrs
@@ -29,7 +29,7 @@ buildPythonPackage rec {
checkInputs = [
pytestCheckHook
- dateutil
+ python-dateutil
pygments
repeated_test
unittest2
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/clldutils/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/clldutils/default.nix
index 318354786b..563ad08381 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/clldutils/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/clldutils/default.nix
@@ -5,7 +5,7 @@
, attrs
, colorlog
, csvw
-, dateutil
+, python-dateutil
, tabulate
, mock
, postgresql
@@ -30,7 +30,7 @@ buildPythonPackage rec {
'';
propagatedBuildInputs = [
- dateutil
+ python-dateutil
tabulate
colorlog
attrs
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/cloudsmith-api/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/cloudsmith-api/default.nix
index 57316ae9d6..5c3b5f114f 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/cloudsmith-api/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/cloudsmith-api/default.nix
@@ -3,7 +3,7 @@
, fetchPypi
, certifi
, six
-, dateutil
+, python-dateutil
, urllib3
}:
@@ -22,7 +22,7 @@ buildPythonPackage rec {
propagatedBuildInputs = [
certifi
six
- dateutil
+ python-dateutil
urllib3
];
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/confuse/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/confuse/default.nix
index 8f1c175405..2b350be004 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/confuse/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/confuse/default.nix
@@ -1,25 +1,45 @@
{ buildPythonPackage
, enum34
-, fetchPypi
+, fetchFromGitHub
+, flit-core
, isPy27
, lib
, pathlib
, pyyaml
+, pytestCheckHook
}:
buildPythonPackage rec {
pname = "confuse";
- version = "1.4.0";
+ version = "1.5.0";
+ format = "flit";
- src = fetchPypi {
- inherit pname version;
- sha256 = "sha256-kvwEUcbiwnMqw2PQ9Z1+pgir3b7QYt2o6Y6ajJhs5GQ=";
+ src = fetchFromGitHub {
+ owner = "beetbox";
+ repo = pname;
+ rev = "v${version}";
+ sha256 = "1kvilxhjifvz6ra64jadf9jiwphrah5rcb9ryq0v7w1dywgn4qp7";
};
- propagatedBuildInputs = [ pyyaml ] ++ lib.optionals isPy27 [ enum34 pathlib ] ;
+ nativeBuildInputs = [
+ flit-core
+ ];
+
+ propagatedBuildInputs = [
+ pyyaml
+ ] ++ lib.optionals isPy27 [
+ enum34
+ pathlib
+ ] ;
+
+ checkInputs = [
+ pytestCheckHook
+ ];
+
+ pythonImportsCheck = [ "confuse" ];
meta = with lib; {
- description = "Confuse is a configuration library for Python that uses YAML.";
+ description = "Python configuration library for Python that uses YAML";
homepage = "https://github.com/beetbox/confuse";
license = licenses.mit;
maintainers = with maintainers; [ lovesegfault ];
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/crc32c/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/crc32c/default.nix
index dd2c9059ed..f4a85fba59 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/crc32c/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/crc32c/default.nix
@@ -1,14 +1,14 @@
{ lib, buildPythonPackage, fetchFromGitHub }:
buildPythonPackage rec {
- version = "2.0.1";
+ version = "2.2.post0";
pname = "crc32c";
src = fetchFromGitHub {
owner = "ICRAR";
repo = pname;
rev = "v${version}";
- sha256 = "0vyac7pchh083h5qdjwhhacfq77frkrq1bjzsn51qv1vwcdrpnrf";
+ sha256 = "sha256-0FgNOVpgJTxRALuufZ7Dt1TwuX+zqw35yCq8kmq4RTc=";
};
meta = {
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/csvw/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/csvw/default.nix
index 27f3f29111..67342d9ecc 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/csvw/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/csvw/default.nix
@@ -4,7 +4,7 @@
, pythonOlder
, attrs
, isodate
-, dateutil
+, python-dateutil
, rfc3986
, uritemplate
, mock
@@ -31,7 +31,7 @@ buildPythonPackage rec {
propagatedBuildInputs = [
attrs
isodate
- dateutil
+ python-dateutil
rfc3986
uritemplate
];
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/curio/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/curio/default.nix
index fb1eceda7f..1a0f4e2d9f 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/curio/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/curio/default.nix
@@ -1,7 +1,6 @@
{ lib
, buildPythonPackage
, fetchPypi
-, fetchpatch
, isPy3k
, pytestCheckHook
, sphinx
@@ -10,31 +9,19 @@
buildPythonPackage rec {
pname = "curio";
- version = "1.4";
+ version = "1.5";
+ disabled = !isPy3k;
src = fetchPypi {
inherit pname version;
- sha256 = "57edce81c837f3c2cf42fbb346dee26e537d1659e6605269fb13bd179e068744";
+ sha256 = "sha256-rwghLlkLt9qOTMOcQgEnEUlNwg1iLxYhVbopbMLjvBA=";
};
- patches = [
- # Fix the flaky test due to slow moving time on Apple Silicon chips.
- # Remove when https://github.com/dabeaz/curio/pull/339 is in the next release.
- (fetchpatch {
- url = "https://github.com/dabeaz/curio/commit/132376724bbfaa0a52d3d63d0791aa4ac1eb6f5f.patch";
- sha256 = "sha256-AxO0xRcR9l9/NKEJFwyZIoYcyZxpqOhpdNaeaYokVb4=";
- })
- # Same as above
- (fetchpatch {
- url = "https://github.com/dabeaz/curio/commit/8ac2f12a2cdacbc750b01fc7459cee8879bc1ee3.patch";
- sha256 = "sha256-2Si3fuDLrI09QuzJd1TrE0QY02G9e9m+1eHFTB/MrWU=";
- })
+ checkInputs = [
+ pytestCheckHook
+ sphinx
];
- disabled = !isPy3k;
-
- checkInputs = [ pytestCheckHook sphinx ];
-
__darwinAllowLocalNetworking = true;
disabledTests = [
@@ -46,9 +33,11 @@ buildPythonPackage rec {
"test_unix_ssl_server" # socket bind error on hydra when built with other packages
];
+ pythonImportsCheck = [ "curio" ];
+
meta = with lib; {
homepage = "https://github.com/dabeaz/curio";
- description = "Library for performing concurrent I/O with coroutines in Python 3";
+ description = "Library for performing concurrent I/O with coroutines in Python";
license = licenses.bsd3;
maintainers = [ maintainers.marsam ];
};
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/cvxpy/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/cvxpy/default.nix
index 359ee96f60..9068814ffd 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/cvxpy/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/cvxpy/default.nix
@@ -16,14 +16,14 @@
buildPythonPackage rec {
pname = "cvxpy";
- version = "1.1.12";
+ version = "1.1.13";
format = "pyproject";
disabled = pythonOlder "3.5";
src = fetchPypi {
inherit pname version;
- hash = "sha256-tJnr+uT8ZF6VI2IVc//LHFtoVKG1wM4dZqippFhgWAc=";
+ sha256 = "012avhf0a8n9xyy4g3xcr5z8z2a3m6rnqic6gfs9fq6p9bkq3ix9";
};
propagatedBuildInputs = [
@@ -42,8 +42,10 @@ buildPythonPackage rec {
'';
checkInputs = [ pytestCheckHook ];
+
pytestFlagsArray = [ "./cvxpy" ];
- # Disable the slowest benchmarking tests, cuts test time in half
+
+ # Disable the slowest benchmarking tests, cuts test time in half
disabledTests = [
"test_tv_inpainting"
"test_diffcp_sdp_example"
@@ -51,6 +53,8 @@ buildPythonPackage rec {
"test_ecos_bb_mi_lp_2" # https://github.com/cvxgrp/cvxpy/issues/1241#issuecomment-780912155
];
+ pythonImportsCheck = [ "cvxpy" ];
+
meta = with lib; {
description = "A domain-specific language for modeling convex optimization problems in Python";
homepage = "https://www.cvxpy.org/";
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/dask/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/dask/default.nix
index b51ac1701a..208856490b 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/dask/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/dask/default.nix
@@ -20,14 +20,14 @@
buildPythonPackage rec {
pname = "dask";
- version = "2021.06.1";
+ version = "2021.06.2";
disabled = pythonOlder "3.5";
src = fetchFromGitHub {
owner = "dask";
repo = pname;
rev = version;
- sha256 = "sha256-wrUqLSmlKhd0NSjWBwbow8aX53ZBTgl2n4lEmvxC3bs=";
+ sha256 = "sha256-qvfjdijzlqaJQrDztRAVr5PudTaVd3WOTBid2ElZQgg=";
};
propagatedBuildInputs = [
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/datashape/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/datashape/default.nix
index 6f11ae62c3..50bde25cf4 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/datashape/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/datashape/default.nix
@@ -5,7 +5,7 @@
, mock
, numpy
, multipledispatch
-, dateutil
+, python-dateutil
}:
let
@@ -29,7 +29,7 @@ in buildPythonPackage rec {
};
checkInputs = [ pytest mock ];
- propagatedBuildInputs = [ numpy multipledispatch dateutil ];
+ propagatedBuildInputs = [ numpy multipledispatch python-dateutil ];
# Disable several tests
# https://github.com/blaze/datashape/issues/232
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/dateparser/0.x.nix b/third_party/nixpkgs/pkgs/development/python-modules/dateparser/0.x.nix
index 49e2d1f279..2aab262e64 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/dateparser/0.x.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/dateparser/0.x.nix
@@ -4,7 +4,7 @@
, mock
, parameterized
, pytestCheckHook
-, dateutil
+, python-dateutil
, pytz
, regex
, tzlocal
@@ -39,7 +39,7 @@ buildPythonPackage rec {
propagatedBuildInputs = [
# install_requires
- dateutil pytz regex tzlocal
+ python-dateutil pytz regex tzlocal
# extra_requires
convertdate umalqurra jdatetime ruamel_yaml
];
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/dateparser/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/dateparser/default.nix
index 21dcffc4a8..6cbd1df32a 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/dateparser/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/dateparser/default.nix
@@ -2,7 +2,7 @@
, buildPythonPackage
, isPy3k
, fetchFromGitHub
-, dateutil
+, python-dateutil
, pytz
, regex
, tzlocal
@@ -29,7 +29,7 @@ buildPythonPackage rec {
propagatedBuildInputs = [
# install_requires
- dateutil pytz regex tzlocal
+ python-dateutil pytz regex tzlocal
# extra_requires
hijri-converter convertdate
];
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/dbutils/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/dbutils/default.nix
index 848e5038af..294456cc85 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/dbutils/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/dbutils/default.nix
@@ -1,13 +1,13 @@
{ lib, buildPythonPackage, fetchPypi, pytestCheckHook }:
buildPythonPackage rec {
- version = "2.0";
+ version = "2.0.1";
pname = "dbutils";
src = fetchPypi {
inherit version;
pname = "DBUtils";
- sha256 = "131ifm2c2a7bipij597i8fvjka0dk2qv1xr2ghcvbc30jlkvag2g";
+ sha256 = "sha256-Vw590TbBMRb+74vKGGCeP2a4ZoqcPV8hCdh0TERE2GE=";
};
checkInputs = [ pytestCheckHook ];
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/deezer-python/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/deezer-python/default.nix
index cd24ae0fd3..926dadd031 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/deezer-python/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/deezer-python/default.nix
@@ -12,7 +12,7 @@
buildPythonPackage rec {
pname = "deezer-python";
- version = "2.2.4";
+ version = "2.3.0";
disabled = pythonOlder "3.6";
format = "pyproject";
@@ -20,7 +20,7 @@ buildPythonPackage rec {
owner = "browniebroke";
repo = pname;
rev = "v${version}";
- sha256 = "11gqmyf350256gbppak2qv20lg2bmszand4kmks93wphq5yp2iiy";
+ sha256 = "sha256-pRYC0kJHJ5SKgDdGS1KkQEbv+DkF9oPw/A1GnB0AwfQ=";
};
nativeBuildInputs = [
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/devolo-home-control-api/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/devolo-home-control-api/default.nix
index 44a0165d6f..751ebaae29 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/devolo-home-control-api/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/devolo-home-control-api/default.nix
@@ -12,14 +12,14 @@
buildPythonPackage rec {
pname = "devolo-home-control-api";
- version = "0.17.3";
+ version = "0.17.4";
disabled = pythonOlder "3.6";
src = fetchFromGitHub {
owner = "2Fake";
repo = "devolo_home_control_api";
rev = "v${version}";
- sha256 = "1h7admqb1l28sxwhhkkhw0sfzgpn8zpczvmi3h28f68csflkv379";
+ sha256 = "sha256-N/48Q2IEL194vCzrPPuy+mRNejXfkoXy2t2oe0Y6ug4=";
};
propagatedBuildInputs = [
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/dftfit/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/dftfit/default.nix
deleted file mode 100644
index 778b8c3d98..0000000000
--- a/third_party/nixpkgs/pkgs/development/python-modules/dftfit/default.nix
+++ /dev/null
@@ -1,52 +0,0 @@
-{ lib
-, fetchPypi
-, buildPythonPackage
-, pymatgen
-, marshmallow
-, pyyaml
-, pygmo
-, pandas
-, scipy
-, numpy
-, scikit-learn
-, lammps-cython
-, pymatgen-lammps
-, pytestrunner
-, isPy3k
-}:
-
-buildPythonPackage rec {
- pname = "dftfit";
- version = "0.5.1";
- disabled = (!isPy3k);
-
- src = fetchPypi {
- inherit pname version;
- sha256 = "4dcbde48948835dcf2d49d6628c9df5747a8ec505d517e374b8d6c7fe95892df";
- };
-
- buildInputs = [ pytestrunner ];
- propagatedBuildInputs = [
- pymatgen
- marshmallow
- pyyaml
- pygmo
- pandas
- scipy
- numpy
- scikit-learn
- lammps-cython
- pymatgen-lammps
- ];
-
- # tests require git lfs download. and is quite large so skip tests
- doCheck = false;
- pythonImportsCheck = [ "dftfit" ];
-
- meta = {
- description = "Ab-Initio Molecular Dynamics Potential Development";
- homepage = "https://gitlab.com/costrouc/dftfit";
- license = lib.licenses.mit;
- maintainers = with lib.maintainers; [ costrouc ];
- };
-}
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/dicom2nifti/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/dicom2nifti/default.nix
index a9c2e4e823..dd43902949 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/dicom2nifti/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/dicom2nifti/default.nix
@@ -13,7 +13,7 @@
buildPythonPackage rec {
pname = "dicom2nifti";
- version = "2.2.12";
+ version = "2.3.0";
disabled = isPy27;
# no tests in PyPI dist
@@ -21,7 +21,7 @@ buildPythonPackage rec {
owner = "icometrix";
repo = pname;
rev = version;
- sha256 = "0ddzaw0yasyi2wsh7a6r73cdcmdfbb0nh0k0n4yxp9vnkw1ag5z4";
+ sha256 = "sha256-QSu9CGXFjDpI25Cy6QSbrwiQ2bwsVezCUxSovRLs6AI=";
};
propagatedBuildInputs = [ nibabel numpy pydicom scipy setuptools ];
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/diff-cover/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/diff-cover/default.nix
new file mode 100644
index 0000000000..7a9e120597
--- /dev/null
+++ b/third_party/nixpkgs/pkgs/development/python-modules/diff-cover/default.nix
@@ -0,0 +1,57 @@
+{ lib
+, buildPythonPackage
+, chardet
+, fetchPypi
+, inflect
+, jinja2
+, jinja2_pluralize
+, pycodestyle
+, pyflakes
+, pygments
+, pylint
+, pytest-mock
+, pytestCheckHook
+, pythonOlder
+}:
+
+buildPythonPackage rec {
+ pname = "diff-cover";
+ version = "5.4.0";
+ disabled = pythonOlder "3.6";
+
+ src = fetchPypi {
+ pname = "diff_cover";
+ inherit version;
+ sha256 = "sha256-4iQ9/QcXh/lW8HE6wFZWc6Y57xhAEWu2TQnIUZJNAMs=";
+ };
+
+ propagatedBuildInputs = [
+ chardet
+ inflect
+ jinja2
+ jinja2_pluralize
+ pygments
+ ];
+
+ checkInputs = [
+ pycodestyle
+ pyflakes
+ pylint
+ pytest-mock
+ pytestCheckHook
+ ];
+
+ disabledTests = [
+ "added_file_pylint_console"
+ "file_does_not_exist"
+ ];
+
+ pythonImportsCheck = [ "diff_cover" ];
+
+ meta = with lib; {
+ description = "Automatically find diff lines that need test coverage";
+ homepage = "https://github.com/Bachmann1234/diff-cover";
+ license = licenses.asl20;
+ maintainers = with maintainers; [ dzabraev ];
+ };
+}
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/diff_cover/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/diff_cover/default.nix
deleted file mode 100644
index 7eeb378ff4..0000000000
--- a/third_party/nixpkgs/pkgs/development/python-modules/diff_cover/default.nix
+++ /dev/null
@@ -1,46 +0,0 @@
-{ lib, buildPythonPackage, fetchPypi
-, chardet
-, inflect
-, jinja2
-, jinja2_pluralize
-, pygments
-, six
-# test dependencies
-, coverage
-, mock
-, nose
-, pycodestyle
-, pyflakes
-, pylint
-, pytest
-}:
-
-buildPythonPackage rec {
- pname = "diff_cover";
- version = "5.2.0";
-
- preCheck = ''
- export LC_ALL=en_US.UTF-8;
- '';
-
- src = fetchPypi {
- inherit pname version;
- sha256 = "a1cd54232d2e48bd4c1eabc96cfe4a8727a9a92fd2556b52ff8f65bb8adf8768";
- };
-
- propagatedBuildInputs = [ chardet jinja2 jinja2_pluralize pygments six inflect ];
-
- checkInputs = [ mock coverage pytest nose pylint pyflakes pycodestyle ];
-
- # ignore tests which try to write files
- checkPhase = ''
- pytest -k 'not added_file_pylint_console and not file_does_not_exist'
- '';
-
- meta = with lib; {
- description = "Automatically find diff lines that need test coverage";
- homepage = "https://github.com/Bachmann1234/diff-cover";
- license = licenses.asl20;
- maintainers = with maintainers; [ dzabraev ];
- };
-}
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/distributed/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/distributed/default.nix
index 605e905d4a..ce0cf13e9a 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/distributed/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/distributed/default.nix
@@ -6,7 +6,6 @@
, dask
, msgpack
, psutil
-, six
, sortedcontainers
, tblib
, toolz
@@ -20,27 +19,39 @@
buildPythonPackage rec {
pname = "distributed";
- version = "2021.6.1";
+ version = "2021.6.2";
disabled = pythonOlder "3.6";
# get full repository need conftest.py to run tests
src = fetchPypi {
inherit pname version;
- sha256 = "sha256-Z79h/WAio5diX2myChx8HPAWe2RB4Ajw7Ybch4XUYFc=";
+ sha256 = "sha256-19ESqGqwSdzvo7If0brqQhKiwD0iwkvVWtONIaf10Ug=";
};
propagatedBuildInputs = [
- click cloudpickle dask msgpack psutil six
- sortedcontainers tblib toolz tornado zict pyyaml mpi4py bokeh
+ bokeh
+ click
+ cloudpickle
+ dask
+ mpi4py
+ msgpack
+ psutil
+ pyyaml
+ sortedcontainers
+ tblib
+ toolz
+ tornado
+ zict
];
# when tested random tests would fail and not repeatably
doCheck = false;
+
pythonImportsCheck = [ "distributed" ];
meta = with lib; {
- description = "Distributed computation in Python.";
- homepage = "https://distributed.readthedocs.io/en/latest/";
+ description = "Distributed computation in Python";
+ homepage = "https://distributed.readthedocs.io/";
license = licenses.bsd3;
platforms = platforms.x86; # fails on aarch64
maintainers = with maintainers; [ teh costrouc ];
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/django-haystack/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/django-haystack/default.nix
index 2c678e672a..14e66a159c 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/django-haystack/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/django-haystack/default.nix
@@ -1,5 +1,5 @@
{ lib, buildPythonPackage, fetchPypi
-, setuptools, setuptools-scm, django, dateutil, whoosh, pysolr
+, setuptools, setuptools-scm, django, python-dateutil, whoosh, pysolr
, coverage, mock, nose, geopy, requests }:
buildPythonPackage rec {
@@ -11,7 +11,7 @@ buildPythonPackage rec {
sha256 = "d490f920afa85471dd1fa5000bc8eff4b704daacbe09aee1a64e75cbc426f3be";
};
- checkInputs = [ pysolr whoosh dateutil geopy coverage nose mock coverage requests ];
+ checkInputs = [ pysolr whoosh python-dateutil geopy coverage nose mock coverage requests ];
propagatedBuildInputs = [ django setuptools ];
nativeBuildInputs = [ setuptools-scm ];
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/django/3.nix b/third_party/nixpkgs/pkgs/development/python-modules/django/3.nix
index ae6187e207..7ee41a962c 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/django/3.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/django/3.nix
@@ -13,13 +13,13 @@
buildPythonPackage rec {
pname = "Django";
- version = "3.2.4";
+ version = "3.2.5";
disabled = pythonOlder "3.7";
src = fetchPypi {
inherit pname version;
- sha256 = "15pjwyvrx4n8gi8n51b14wp54bg4jqapr25p52597zn6ikdxijb6";
+ sha256 = "1kam3301jl53vm0mhflwwsqy5d7kb5dksmjanlaj7v7xakm5z81x";
};
patches = lib.optional withGdal
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/django_silk/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/django_silk/default.nix
index b1d4eaec5c..3af74be85b 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/django_silk/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/django_silk/default.nix
@@ -7,7 +7,7 @@
, django
, pygments
, simplejson
-, dateutil
+, python-dateutil
, requests
, setuptools-scm
, sqlparse
@@ -56,7 +56,7 @@ buildPythonPackage rec {
nativeBuildInputs = [ setuptools-scm ];
buildInputs = [ mock ];
propagatedBuildInputs = [
- django pygments simplejson dateutil requests
+ django pygments simplejson python-dateutil requests
sqlparse jinja2 autopep8 pytz pillow gprof2dot
];
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/drms/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/drms/default.nix
index 613d2444d7..1bc5d380b0 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/drms/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/drms/default.nix
@@ -7,16 +7,18 @@
, astropy
, pytestCheckHook
, pytest-doctestplus
+, pythonOlder
}:
buildPythonPackage rec {
pname = "drms";
- version = "0.6.0";
+ version = "0.6.2";
format = "pyproject";
+ disabled = pythonOlder "3.7";
src = fetchPypi {
inherit pname version;
- sha256 = "74efb903f42647ea536de0c5aea4f9a81efe027c95055ec4e72ef62479a04c89";
+ sha256 = "sha256-Id8rPK8qq71gHn5DKnEi7Lp081GFbcFtGU+v89Vlt9o=";
};
propagatedBuildInputs = [
@@ -31,10 +33,12 @@ buildPythonPackage rec {
pytest-doctestplus
];
+ pythonImportsCheck = [ "drms" ];
+
meta = with lib; {
description = "Access HMI, AIA and MDI data with Python";
homepage = "https://github.com/sunpy/drms";
- license = licenses.mit;
- maintainers = [ maintainers.costrouc ];
+ license = licenses.bsd2;
+ maintainers = with maintainers; [ costrouc ];
};
}
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/duckdb/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/duckdb/default.nix
index 4a4dd279a5..fd360bfbd1 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/duckdb/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/duckdb/default.nix
@@ -5,7 +5,7 @@
, pandas
, pybind11
, setuptools-scm
-, pytestrunner
+, pytest-runner
, pytestCheckHook
}:
@@ -28,18 +28,24 @@ buildPythonPackage rec {
nativeBuildInputs = [
pybind11
setuptools-scm
- pytestrunner
+ pytest-runner
];
- propagatedBuildInputs = [ numpy pandas ];
+ propagatedBuildInputs = [
+ numpy
+ pandas
+ ];
+
+ checkInputs = [
+ pytestCheckHook
+ ];
- checkInputs = [ pytestCheckHook ];
pythonImportsCheck = [ "duckdb" ];
meta = with lib; {
- description = "DuckDB is an embeddable SQL OLAP Database Management System";
- homepage = "https://pypi.python.org/pypi/duckdb";
+ description = "Python binding for DuckDB";
+ homepage = "https://duckdb.org/";
license = licenses.mit;
- maintainers = [ maintainers.costrouc ];
+ maintainers = with maintainers; [ costrouc ];
};
}
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/editorconfig/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/editorconfig/default.nix
index 4329db98c2..6449a3da76 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/editorconfig/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/editorconfig/default.nix
@@ -6,29 +6,33 @@
buildPythonPackage rec {
pname = "editorconfig";
- version = "0.12.2";
+ version = "0.12.3";
# fetchgit used to ensure test submodule is available
src = fetchgit {
url = "https://github.com/editorconfig/editorconfig-core-py";
- rev = "596da5e06ebee05bdbdc6224203c79c4d3c6486a"; # Not tagged
- sha256 = "05cbp971b0zix7kfxkk7ndxb4ax1l21frwc00d4g78mk4sdz6dig";
+ rev = "1a8fb62b9941fded9e4fb83a3d0599427f5484cb"; # Not tagged
+ sha256 = "0vx8rl7kii72965jsi01mdsz9rfi1q9bwy13x47iaqm6rmcwc1rb";
};
- nativeBuildInputs = [ cmake ];
+ nativeBuildInputs = [
+ cmake
+ ];
dontUseCmakeConfigure = true;
checkPhase = ''
cmake .
- # utf_8_char fails with python3
+ # utf_8_char fails with Python 3
ctest -E "utf_8_char" .
'';
- meta = with lib; {
- homepage = "https://editorconfig.org";
- description = "EditorConfig File Locator and Interpreter for Python";
- license = licenses.psfl;
- };
+ pythonImportsCheck = [ "editorconfig" ];
+ meta = with lib; {
+ description = "EditorConfig File Locator and Interpreter for Python";
+ homepage = "https://editorconfig.org";
+ license = licenses.psfl;
+ maintainers = with maintainers; [ ];
+ };
}
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/emailthreads/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/emailthreads/default.nix
index 36553daff5..c57e58368f 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/emailthreads/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/emailthreads/default.nix
@@ -3,7 +3,7 @@
buildPythonPackage rec {
pname = "emailthreads";
- version = "0.1.0";
+ version = "0.1.3";
disabled = !isPy3k;
# pypi is missing files for tests
@@ -11,7 +11,7 @@ buildPythonPackage rec {
owner = "emersion";
repo = "python-emailthreads";
rev = "v${version}";
- sha256 = "17pfal8kbxhs025apkijqbkppw2lljca8x1cwcx49jv60h05c3cn";
+ sha256 = "sha256-7BhYS1DQCW9QpG31asPCq5qPyJy+WW2onZpvEHhwQCs=";
};
PKGVER = version;
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/emcee/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/emcee/default.nix
index a4f2bece34..72cb9a64db 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/emcee/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/emcee/default.nix
@@ -1,20 +1,42 @@
-{ lib, buildPythonPackage, fetchPypi
-, numpy }:
+{ lib
+, buildPythonPackage
+, fetchFromGitHub
+, numpy
+, pytestCheckHook
+, setuptools-scm
+}:
buildPythonPackage rec {
pname = "emcee";
- version = "3.0.2";
+ version = "3.1.0";
- src = fetchPypi {
- inherit pname version;
- sha256 = "035a44d7594fdd03efd10a522558cdfaa080e046ad75594d0bf2aec80ec35388";
+ src = fetchFromGitHub {
+ owner = "dfm";
+ repo = pname;
+ rev = "v${version}";
+ sha256 = "1x9y4zwlv6hl7jms2knpa2qrh89ywsl847yb7d93n94gyx2s16p0";
};
- propagatedBuildInputs = [ numpy ];
+ SETUPTOOLS_SCM_PRETEND_VERSION = version;
+
+ nativeBuildInputs = [
+ setuptools-scm
+ ];
+
+ propagatedBuildInputs = [
+ numpy
+ ];
+
+ checkInputs = [
+ pytestCheckHook
+ ];
+
+ pythonImportsCheck = [ "emcee" ];
meta = with lib; {
description = "Kick ass affine-invariant ensemble MCMC sampling";
homepage = "https://emcee.readthedocs.io/";
license = licenses.mit;
+ maintainers = with maintainers; [ ];
};
}
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/emoji/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/emoji/default.nix
index ce2beb2351..67c9c7a1ab 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/emoji/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/emoji/default.nix
@@ -1,21 +1,33 @@
-{ lib, buildPythonPackage, fetchPypi, nose }:
+{ lib
+, buildPythonPackage
+, fetchFromGitHub
+, pytestCheckHook
+}:
buildPythonPackage rec {
pname = "emoji";
- version = "1.2.0";
+ version = "1.4.0";
- src = fetchPypi {
- inherit pname version;
- sha256 = "18siknldyqvxvjf0nv18m0a1c26ahkg7vmhkij1qayanb0h46vs9";
+ src = fetchFromGitHub {
+ owner = "carpedm20";
+ repo = pname;
+ rev = "v.${version}";
+ sha256 = "0xksxdld20sh3c2s6pry1fm2br9xq8ypdq5pf971fpg5pk2f4iy9";
};
- checkInputs = [ nose ];
+ checkInputs = [
+ pytestCheckHook
+ ];
- checkPhase = "nosetests";
+ disabledTests = [
+ "test_emojize_name_only"
+ ];
+
+ pythonImportsCheck = [ "emoji" ];
meta = with lib; {
description = "Emoji for Python";
- homepage = "https://pypi.python.org/pypi/emoji/";
+ homepage = "https://github.com/carpedm20/emoji/";
license = licenses.bsd3;
maintainers = with maintainers; [ joachifm ];
};
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/enaml/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/enaml/default.nix
index 8896c5c706..8257af2e45 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/enaml/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/enaml/default.nix
@@ -12,13 +12,13 @@
buildPythonPackage rec {
pname = "enaml";
- version = "0.11.2";
+ version = "0.13.0";
src = fetchFromGitHub {
owner = "nucleic";
repo = pname;
rev = version;
- sha256 = "1in5qa5j96qs3gsv8yaxs1l6dbm69xhzvc0pbzg0dd9kpqxfdy1j";
+ sha256 = "sha256-8ZahvFDYW7xUTSTZP1UXnQBCg9RVUywoO7EbqtTQPJI=";
};
# qt bindings cannot be found during tests
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/fabulous/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/fabulous/default.nix
index 6079f22020..b357eb0c01 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/fabulous/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/fabulous/default.nix
@@ -7,13 +7,13 @@
buildPythonPackage rec {
pname = "fabulous";
- version = "0.3.0";
+ version = "0.4.0";
src = fetchFromGitHub {
owner = "jart";
repo = pname;
rev = version;
- sha256 = "0yxdaz6yayp1a57kdb2i8q7kwwdlwy4a3d0lr012h2ji9m89c8q7";
+ sha256 = "sha256-hchlxuB5QP+VxCx+QZ2739/mR5SQmYyE+9kXLKJ2ij4=";
};
patches = [
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/fake_factory/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/fake_factory/default.nix
index 2e561a163a..002df15177 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/fake_factory/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/fake_factory/default.nix
@@ -3,7 +3,7 @@
, fetchPypi
, python
, six
-, dateutil
+, python-dateutil
, ipaddress
, mock
}:
@@ -17,7 +17,7 @@ buildPythonPackage rec {
sha256 = "f5bd18deb22ad8cb4402513c025877bc6b50de58902d686b6b21ba8981dce260";
};
- propagatedBuildInputs = [ six dateutil ipaddress mock ];
+ propagatedBuildInputs = [ six python-dateutil ipaddress mock ];
# fake-factory is depreciated and single test will always fail
doCheck = false;
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/faker/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/faker/default.nix
index 12f30b20a4..196c7e47b3 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/faker/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/faker/default.nix
@@ -1,7 +1,7 @@
{ lib
, buildPythonPackage
, fetchPypi
-, dateutil
+, python-dateutil
, text-unidecode
, freezegun
, pytestCheckHook
@@ -19,7 +19,7 @@ buildPythonPackage rec {
};
propagatedBuildInputs = [
- dateutil
+ python-dateutil
text-unidecode
];
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/fastimport/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/fastimport/default.nix
index c036f5cacb..fe46405eb3 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/fastimport/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/fastimport/default.nix
@@ -1,9 +1,16 @@
-{ lib, buildPythonPackage, python, fetchPypi}:
+{ lib
+, pythonOlder
+, buildPythonPackage
+, fetchPypi
+, python
+}:
buildPythonPackage rec {
pname = "fastimport";
version = "0.9.13";
+ disabled = pythonOlder "3.5";
+
src = fetchPypi {
inherit pname version;
sha256 = "486135a39edb85808fdbbe2c8009197978800a4544fca56cc2074df32e1304f3";
@@ -13,8 +20,10 @@ buildPythonPackage rec {
${python.interpreter} -m unittest discover
'';
+ pythonImportsCheck = [ "fastimport" ];
+
meta = with lib; {
- homepage = "https://launchpad.net/python-fastimport";
+ homepage = "https://github.com/jelmer/python-fastimport";
description = "VCS fastimport/fastexport parser";
maintainers = with maintainers; [ koral ];
license = licenses.gpl2Plus;
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/feedgen/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/feedgen/default.nix
index 59ca95a033..9ca3627e74 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/feedgen/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/feedgen/default.nix
@@ -1,4 +1,4 @@
-{ lib, buildPythonPackage, fetchPypi, dateutil, lxml }:
+{ lib, buildPythonPackage, fetchPypi, python-dateutil, lxml }:
buildPythonPackage rec {
pname = "feedgen";
@@ -9,7 +9,7 @@ buildPythonPackage rec {
sha256 = "0jl0b87l7v6c0f1nx6k81skjhdj5i11kmchdjls00mynpvdip0cf";
};
- propagatedBuildInputs = [ dateutil lxml ];
+ propagatedBuildInputs = [ python-dateutil lxml ];
# No tests in archive
doCheck = false;
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/fitbit/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/fitbit/default.nix
index 46c6ac78a6..b41ac0a498 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/fitbit/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/fitbit/default.nix
@@ -2,7 +2,7 @@
, buildPythonPackage
, fetchFromGitHub
, coverage
-, dateutil
+, python-dateutil
, freezegun
, mock
, requests-mock
@@ -15,7 +15,7 @@ buildPythonPackage rec {
version = "0.3.1";
checkInputs = [ coverage freezegun mock requests-mock sphinx ];
- propagatedBuildInputs = [ dateutil requests_oauthlib ];
+ propagatedBuildInputs = [ python-dateutil requests_oauthlib ];
# The source package on PyPi is missing files required for unit testing.
# https://github.com/orcasgit/python-fitbit/issues/148
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/flask-jwt-extended/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/flask-jwt-extended/default.nix
index d58ae43103..7057bb5875 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/flask-jwt-extended/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/flask-jwt-extended/default.nix
@@ -1,4 +1,4 @@
-{ lib, buildPythonPackage, fetchPypi, dateutil, flask, pyjwt, werkzeug, pytest }:
+{ lib, buildPythonPackage, fetchPypi, python-dateutil, flask, pyjwt, werkzeug, pytest }:
buildPythonPackage rec {
pname = "Flask-JWT-Extended";
@@ -9,7 +9,7 @@ buildPythonPackage rec {
sha256 = "76461f2dbdf502261c69ddecd858eaf4164fbcfbf05aa456f3927fc2ab0315de";
};
- propagatedBuildInputs = [ dateutil flask pyjwt werkzeug ];
+ propagatedBuildInputs = [ python-dateutil flask pyjwt werkzeug ];
checkInputs = [ pytest ];
checkPhase = ''
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/flask-restx/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/flask-restx/default.nix
index e1de7bf0d3..4d0d89d0f1 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/flask-restx/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/flask-restx/default.nix
@@ -20,16 +20,23 @@
buildPythonPackage rec {
pname = "flask-restx";
- version = "0.3.0";
+ version = "0.4.0";
# Tests not included in PyPI tarball
src = fetchFromGitHub {
owner = "python-restx";
repo = pname;
rev = version;
- sha256 = "0aj13nd3z71gb8c2kqiaz3f9k7jr0srlvrsx8hpz4nkpki8jiz2s";
+ sha256 = "sha256-jM0QJ/klbWh3qho6ZQOH2n1qaguK9C98QIuSfqpI8xA=";
};
+ postPatch = ''
+ # https://github.com/python-restx/flask-restx/pull/341
+ substituteInPlace requirements/install.pip \
+ --replace "Flask>=0.8, <2.0.0" "Flask>=0.8, !=2.0.0" \
+ --replace "werkzeug <2.0.0" "werkzeug !=2.0.0"
+ '';
+
propagatedBuildInputs = [ aniso8601 jsonschema flask werkzeug pytz six ]
++ lib.optionals isPy27 [ enum34 ];
@@ -42,6 +49,8 @@ buildPythonPackage rec {
"--deselect=tests/test_logging.py::LoggingTest::test_override_app_level"
];
+ pythonImportCheck = [ "flask_restx" ];
+
meta = with lib; {
homepage = "https://flask-restx.readthedocs.io/en/${version}/";
description = "Fully featured framework for fast, easy and documented API development with Flask";
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/freezegun/0.3.nix b/third_party/nixpkgs/pkgs/development/python-modules/freezegun/0.3.nix
index a83a432d89..c444480500 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/freezegun/0.3.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/freezegun/0.3.nix
@@ -2,7 +2,7 @@
, buildPythonPackage
, fetchPypi
, isPy27
-, dateutil
+, python-dateutil
, six
, mock
, nose
@@ -18,7 +18,7 @@ buildPythonPackage rec {
sha256 = "e2062f2c7f95cc276a834c22f1a17179467176b624cc6f936e8bc3be5535ad1b";
};
- propagatedBuildInputs = [ dateutil six ];
+ propagatedBuildInputs = [ python-dateutil six ];
checkInputs = [ mock nose pytest ];
meta = with lib; {
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/freezegun/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/freezegun/default.nix
index 00d03435de..742506b608 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/freezegun/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/freezegun/default.nix
@@ -2,7 +2,7 @@
, buildPythonPackage
, pythonOlder
, fetchPypi
-, dateutil
+, python-dateutil
, pytestCheckHook
}:
@@ -16,7 +16,7 @@ buildPythonPackage rec {
sha256 = "177f9dd59861d871e27a484c3332f35a6e3f5d14626f2bf91be37891f18927f3";
};
- propagatedBuildInputs = [ dateutil ];
+ propagatedBuildInputs = [ python-dateutil ];
checkInputs = [ pytestCheckHook ];
meta = with lib; {
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/gdrivefs/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/gdrivefs/default.nix
index 836fdee4be..41b6a6a87f 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/gdrivefs/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/gdrivefs/default.nix
@@ -6,7 +6,7 @@
, greenlet
, httplib2
, six
-, dateutil
+, python-dateutil
, fusepy
, google-api-python-client
}:
@@ -22,7 +22,7 @@ buildPythonPackage rec {
};
buildInputs = [ gipc greenlet httplib2 six ];
- propagatedBuildInputs = [ dateutil fusepy google-api-python-client ];
+ propagatedBuildInputs = [ python-dateutil fusepy google-api-python-client ];
patchPhase = ''
substituteInPlace gdrivefs/resources/requirements.txt \
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/georss-ign-sismologia-client/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/georss-ign-sismologia-client/default.nix
index 3fada45d0c..e87c766c0c 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/georss-ign-sismologia-client/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/georss-ign-sismologia-client/default.nix
@@ -8,14 +8,14 @@
buildPythonPackage rec {
pname = "georss-ign-sismologia-client";
- version = "0.3";
+ version = "0.4";
disabled = pythonOlder "3.7";
src = fetchFromGitHub {
owner = "exxamalte";
repo = "python-georss-ign-sismologia-client";
rev = "v${version}";
- sha256 = "sha256-7Jj6uWb4HyPAh3/XtVTy0N23bk33mlIiqlt9z/PW+4Y=";
+ sha256 = "sha256-g7lZC5ZiJV8dNZJceLROqyBRZSuqaivGFhaQrKe4B7g=";
};
propagatedBuildInputs = [
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/ghp-import/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/ghp-import/default.nix
index 37a35febdf..0d5506009a 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/ghp-import/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/ghp-import/default.nix
@@ -1,7 +1,7 @@
{ lib
, buildPythonPackage
, fetchPypi
-, dateutil
+, python-dateutil
}:
buildPythonPackage rec {
@@ -13,7 +13,7 @@ buildPythonPackage rec {
hash = "sha256-wiqc4Qw3dT4miNFk12WnANrkuNefptsKLDEyuniBiU8=";
};
- propagatedBuildInputs = [ dateutil ];
+ propagatedBuildInputs = [ python-dateutil ];
# Does not include any unit tests
doCheck = false;
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/github3_py/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/github3_py/default.nix
index 8a1eea40c6..68e277d0b1 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/github3_py/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/github3_py/default.nix
@@ -9,7 +9,7 @@
, mock
, requests
, uritemplate
-, dateutil
+, python-dateutil
, jwcrypto
, pyopenssl
, ndg-httpsclient
@@ -28,7 +28,7 @@ buildPythonPackage rec {
checkInputs = [ betamax pytest betamax-matchers ]
++ lib.optional (pythonOlder "3") unittest2
++ lib.optional (pythonOlder "3.3") mock;
- propagatedBuildInputs = [ requests uritemplate dateutil jwcrypto pyopenssl ndg-httpsclient pyasn1 ];
+ propagatedBuildInputs = [ requests uritemplate python-dateutil jwcrypto pyopenssl ndg-httpsclient pyasn1 ];
postPatch = ''
sed -i -e 's/unittest2 ==0.5.1/unittest2>=0.5.1/' setup.py
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/google-apputils/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/google-apputils/default.nix
index 321837f56a..225adf348d 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/google-apputils/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/google-apputils/default.nix
@@ -4,7 +4,7 @@
, isPy3k
, pytz
, gflags
-, dateutil
+, python-dateutil
, mox
, python
}:
@@ -23,7 +23,7 @@ buildPythonPackage rec {
sed -i '/ez_setup/d' setup.py
'';
- propagatedBuildInputs = [ pytz gflags dateutil mox ];
+ propagatedBuildInputs = [ pytz gflags python-dateutil mox ];
checkPhase = ''
${python.executable} setup.py google_test
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/guessit/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/guessit/default.nix
index 0450dfd07e..adb131868c 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/guessit/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/guessit/default.nix
@@ -2,7 +2,7 @@
, buildPythonPackage
, fetchPypi
, pytestrunner
-, dateutil
+, python-dateutil
, babelfish
, rebulk
}:
@@ -20,7 +20,7 @@ buildPythonPackage rec {
doCheck = false;
buildInputs = [ pytestrunner ];
propagatedBuildInputs = [
- dateutil babelfish rebulk
+ python-dateutil babelfish rebulk
];
meta = {
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/hijri-converter/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/hijri-converter/default.nix
index d7ae17ed61..e9ce708b2c 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/hijri-converter/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/hijri-converter/default.nix
@@ -6,11 +6,11 @@
buildPythonPackage rec {
pname = "hijri-converter";
- version = "2.1.2";
+ version = "2.1.3";
src = fetchPypi {
inherit pname version;
- sha256 = "43b5ac566e7a7deeab364a2397e94405a65fd24ea786073eb3d4c740ebda7b9b";
+ sha256 = "1cq67v0fjk7cd8kbppg2kl31a5i6jm8qrkcdqxx6vxwmx65l68ks";
};
checkInputs = [ pytestCheckHook ];
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/holidays/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/holidays/default.nix
index fe362fa86d..e09b957425 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/holidays/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/holidays/default.nix
@@ -1,7 +1,7 @@
{ lib
, buildPythonPackage
, convertdate
-, dateutil
+, python-dateutil
, fetchPypi
, hijri-converter
, korean-lunar-calendar
@@ -22,7 +22,7 @@ buildPythonPackage rec {
propagatedBuildInputs = [
convertdate
- dateutil
+ python-dateutil
hijri-converter
korean-lunar-calendar
six
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/hypchat/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/hypchat/default.nix
index 8337fd2230..1f69dfe210 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/hypchat/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/hypchat/default.nix
@@ -1,5 +1,5 @@
{ buildPythonPackage, fetchPypi
-, requests, six, dateutil }:
+, requests, six, python-dateutil }:
buildPythonPackage rec {
pname = "hypchat";
@@ -10,5 +10,5 @@ buildPythonPackage rec {
sha256 = "1sd8f3gihagaqd848dqy6xw457fa4f9bla1bfyni7fq3h76sjdzg";
};
- propagatedBuildInputs = [ requests six dateutil ];
+ propagatedBuildInputs = [ requests six python-dateutil ];
}
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/icalendar/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/icalendar/default.nix
index 8e75a945d1..fdf490e7cb 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/icalendar/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/icalendar/default.nix
@@ -2,7 +2,7 @@
, buildPythonPackage
, fetchPypi
, setuptools
-, dateutil
+, python-dateutil
, pytz
}:
@@ -16,7 +16,7 @@ buildPythonPackage rec {
};
buildInputs = [ setuptools ];
- propagatedBuildInputs = [ dateutil pytz ];
+ propagatedBuildInputs = [ python-dateutil pytz ];
meta = with lib; {
description = "A parser/generator of iCalendar files";
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/influxdb/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/influxdb/default.nix
index 6b3a46ea39..3b96727018 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/influxdb/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/influxdb/default.nix
@@ -1,6 +1,6 @@
{ lib
, buildPythonPackage
-, dateutil
+, python-dateutil
, fetchFromGitHub
, fetchpatch
, mock
@@ -27,7 +27,7 @@ buildPythonPackage rec {
propagatedBuildInputs = [
requests
- dateutil
+ python-dateutil
pytz
six
msgpack
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/ipyparallel/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/ipyparallel/default.nix
index 2c5692bf26..cc5957d297 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/ipyparallel/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/ipyparallel/default.nix
@@ -2,7 +2,7 @@
, buildPythonPackage
, fetchPypi
, nose
-, dateutil
+, python-dateutil
, ipython_genutils
, decorator
, pyzmq
@@ -25,7 +25,7 @@ buildPythonPackage rec {
buildInputs = [ nose ];
- propagatedBuildInputs = [ dateutil ipython_genutils decorator pyzmq ipython jupyter_client ipykernel tornado
+ propagatedBuildInputs = [ python-dateutil ipython_genutils decorator pyzmq ipython jupyter_client ipykernel tornado
] ++ lib.optionals (!isPy3k) [ futures ];
# Requires access to cluster
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/javaproperties/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/javaproperties/default.nix
index dd3c027bca..348d83e110 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/javaproperties/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/javaproperties/default.nix
@@ -1,7 +1,7 @@
{ lib, buildPythonPackage, fetchFromGitHub
, six
, pytest
-, dateutil
+, python-dateutil
}:
buildPythonPackage rec {
@@ -18,7 +18,7 @@ buildPythonPackage rec {
propagatedBuildInputs = [ six ];
- checkInputs = [ dateutil pytest ];
+ checkInputs = [ python-dateutil pytest ];
checkPhase = ''
rm tox.ini
pytest -k 'not dumps and not time' --ignore=test/test_propclass.py
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/jupyter_client/5.nix b/third_party/nixpkgs/pkgs/development/python-modules/jupyter_client/5.nix
index 201fbec02c..e4e77cf475 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/jupyter_client/5.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/jupyter_client/5.nix
@@ -4,7 +4,7 @@
, traitlets
, jupyter_core
, pyzmq
-, dateutil
+, python-dateutil
, isPyPy
, py
, tornado
@@ -23,7 +23,7 @@ buildPythonPackage rec {
traitlets
jupyter_core
pyzmq
- dateutil
+ python-dateutil
tornado
] ++ lib.optional isPyPy py;
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/jupyter_client/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/jupyter_client/default.nix
index 5f534557a9..fbc37c3f58 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/jupyter_client/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/jupyter_client/default.nix
@@ -4,7 +4,7 @@
, traitlets
, jupyter_core
, pyzmq
-, dateutil
+, python-dateutil
, isPyPy
, py
, tornado
@@ -23,7 +23,7 @@ buildPythonPackage rec {
traitlets
jupyter_core
pyzmq
- dateutil
+ python-dateutil
tornado
] ++ lib.optional isPyPy py;
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/jupyterhub/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/jupyterhub/default.nix
index 108d11853f..904cd7df0c 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/jupyterhub/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/jupyterhub/default.nix
@@ -7,7 +7,7 @@
, alembic
, async_generator
, certipy
-, dateutil
+, python-dateutil
, entrypoints
, jinja2
, jupyter-telemetry
@@ -115,7 +115,7 @@ buildPythonPackage rec {
alembic
async_generator
certipy
- dateutil
+ python-dateutil
entrypoints
jinja2
jupyter-telemetry
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/koji/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/koji/default.nix
index 5f560be4e8..cd3b5ff62c 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/koji/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/koji/default.nix
@@ -1,4 +1,4 @@
-{ lib, fetchurl, buildPythonPackage, isPy3k, pycurl, six, rpm, dateutil }:
+{ lib, fetchurl, buildPythonPackage, isPy3k, pycurl, six, rpm, python-dateutil }:
buildPythonPackage rec {
pname = "koji";
@@ -10,7 +10,7 @@ buildPythonPackage rec {
sha256 = "0a3kn3qvspvx15imgzzzjsbvw6bqmbk29apbliqwifa9cj7pvb40";
};
- propagatedBuildInputs = [ pycurl six rpm dateutil ];
+ propagatedBuildInputs = [ pycurl six rpm python-dateutil ];
# Judging from SyntaxError
disabled = isPy3k;
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/lammps-cython/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/lammps-cython/default.nix
deleted file mode 100644
index cf6bdc38ff..0000000000
--- a/third_party/nixpkgs/pkgs/development/python-modules/lammps-cython/default.nix
+++ /dev/null
@@ -1,53 +0,0 @@
-{ lib
-, fetchurl
-, buildPythonPackage
-, lammps-mpi
-, mpi
-, mpi4py
-, numpy
-, cython
-, pymatgen
-, ase
-, pytestrunner
-, isPy3k
-}:
-
-buildPythonPackage rec {
- pname = "lammps-cython";
- version = "0.5.7";
- disabled = (!isPy3k);
-
- src = fetchurl {
- url = "https://gitlab.com/costrouc/${pname}/-/archive/v${version}/${pname}-v${version}.tar.gz";
- sha256 = "1wj9scmjdl00af13b5ihfccrjpikrdgkzd88ialam1nkxvxi42bl";
- };
-
- buildInputs = [ cython pytestrunner ];
- propagatedBuildInputs = [ mpi4py pymatgen ase numpy ];
-
- preBuild = ''
- echo "Creating lammps.cfg file..."
- cat << EOF > lammps.cfg
- [lammps]
- lammps_include_dir = ${lammps-mpi}/include
- lammps_library_dir = ${lammps-mpi}/lib
- lammps_library = lammps_mpi
-
- [mpi]
- mpi_include_dir = ${mpi}/include
- mpi_library_dir = ${mpi}/lib
- mpi_library = mpi
- EOF
- '';
-
- pythonImportsCheck = [ "lammps" ];
-
- meta = {
- description = "Pythonic Wrapper to LAMMPS using cython";
- homepage = "https://gitlab.com/costrouc/lammps-cython";
- license = lib.licenses.mit;
- maintainers = with lib.maintainers; [ costrouc ];
- # fails import check
- broken = true;
- };
-}
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/mailman-rss/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/mailman-rss/default.nix
index e2043b0d6d..f71b62c67f 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/mailman-rss/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/mailman-rss/default.nix
@@ -9,7 +9,7 @@ python3Packages.buildPythonApplication rec {
sha256 = "1brrik70jyagxa9l0cfmlxvqpilwj1q655bphxnvjxyganxf4c00";
};
- propagatedBuildInputs = with python3Packages; [ dateutil future requests beautifulsoup4 ]
+ propagatedBuildInputs = with python3Packages; [ python-dateutil future requests beautifulsoup4 ]
++ lib.optional withTwitter python3Packages.twitter
;
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/matplotlib/2.nix b/third_party/nixpkgs/pkgs/development/python-modules/matplotlib/2.nix
index a6ee1a3bad..96d33b681e 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/matplotlib/2.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/matplotlib/2.nix
@@ -1,5 +1,5 @@
{ lib, stdenv, fetchPypi, writeText, python, buildPythonPackage, pycairo, backports_functools_lru_cache
-, which, cycler, dateutil, nose, numpy, pyparsing, sphinx, tornado, kiwisolver
+, which, cycler, python-dateutil, nose, numpy, pyparsing, sphinx, tornado, kiwisolver
, freetype, libpng, pkg-config, mock, pytz, pygobject3, gobject-introspection, functools32, subprocess32
, fetchpatch
, enableGhostscript ? false, ghostscript, gtk3
@@ -38,7 +38,7 @@ buildPythonPackage rec {
++ lib.optional stdenv.isDarwin [ Cocoa ];
propagatedBuildInputs =
- [ cycler dateutil nose numpy pyparsing tornado freetype kiwisolver
+ [ cycler python-dateutil nose numpy pyparsing tornado freetype kiwisolver
libpng mock pytz ]
++ lib.optional (pythonOlder "3.3") backports_functools_lru_cache
++ lib.optionals enableGtk3 [ cairo pycairo gtk3 gobject-introspection pygobject3 ]
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/matplotlib/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/matplotlib/default.nix
index 75f75e981c..beddaf6810 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/matplotlib/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/matplotlib/default.nix
@@ -1,5 +1,5 @@
{ lib, stdenv, fetchPypi, writeText, buildPythonPackage, isPy3k, pycairo
-, which, cycler, dateutil, numpy, pyparsing, sphinx, tornado, kiwisolver
+, which, cycler, python-dateutil, numpy, pyparsing, sphinx, tornado, kiwisolver
, freetype, qhull, libpng, pkg-config, mock, pytz, pygobject3, gobject-introspection
, certifi, pillow
, enableGhostscript ? true, ghostscript, gtk3
@@ -36,7 +36,7 @@ buildPythonPackage rec {
++ lib.optional stdenv.isDarwin [ Cocoa ];
propagatedBuildInputs =
- [ cycler dateutil numpy pyparsing tornado freetype qhull
+ [ cycler python-dateutil numpy pyparsing tornado freetype qhull
kiwisolver certifi libpng mock pytz pillow ]
++ lib.optionals enableGtk3 [ cairo pycairo gtk3 gobject-introspection pygobject3 ]
++ lib.optionals enableTk [ tcl tk tkinter libX11 ]
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/micloud/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/micloud/default.nix
new file mode 100644
index 0000000000..3b3bf44844
--- /dev/null
+++ b/third_party/nixpkgs/pkgs/development/python-modules/micloud/default.nix
@@ -0,0 +1,37 @@
+{ lib
+, buildPythonPackage
+, fetchFromGitHub
+, click
+, requests
+, tzlocal
+}:
+
+buildPythonPackage rec {
+ pname = "micloud";
+ version = "0.3";
+
+ src = fetchFromGitHub {
+ owner = "Squachen";
+ repo = "micloud";
+ rev = "v_${version}";
+ sha256 = "0267zyr79nfb5f9rwdwq3ym258yrpxx1b71xiqmszyz5s83mcixm";
+ };
+
+ propagatedBuildInputs = [
+ click
+ requests
+ tzlocal
+ ];
+
+ # tests require credentials
+ doCheck = false;
+
+ pythonImportsCheck = [ "micloud" ];
+
+ meta = with lib; {
+ description = "Xiaomi cloud connect library";
+ homepage = "https://github.com/Squachen/micloud";
+ license = licenses.mit;
+ maintainers = with maintainers; [ dotlambda ];
+ };
+}
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/nipype/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/nipype/default.nix
index 3d72748a1e..078c455a63 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/nipype/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/nipype/default.nix
@@ -4,7 +4,7 @@
, isPy27
# python dependencies
, click
-, dateutil
+, python-dateutil
, etelemetry
, filelock
, funcsigs
@@ -68,7 +68,7 @@ buildPythonPackage rec {
propagatedBuildInputs = [
click
- dateutil
+ python-dateutil
etelemetry
filelock
funcsigs
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/oci/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/oci/default.nix
index 41c6ffb722..793e23d711 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/oci/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/oci/default.nix
@@ -5,7 +5,7 @@
, configparser
, cryptography
, pyopenssl
-, dateutil
+, python-dateutil
, pytz
}:
@@ -28,7 +28,7 @@ buildPythonPackage rec {
'';
propagatedBuildInputs = [
- certifi configparser cryptography pyopenssl dateutil pytz
+ certifi configparser cryptography pyopenssl python-dateutil pytz
];
# Tests fail: https://github.com/oracle/oci-python-sdk/issues/164
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/owslib/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/owslib/default.nix
index 3ccd3d916b..ea80fade14 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/owslib/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/owslib/default.nix
@@ -1,4 +1,4 @@
-{ lib, buildPythonPackage, fetchPypi, dateutil, requests, pytz, pyproj , pytest, pyyaml } :
+{ lib, buildPythonPackage, fetchPypi, python-dateutil, requests, pytz, pyproj , pytest, pyyaml } :
buildPythonPackage rec {
pname = "OWSLib";
version = "0.24.1";
@@ -9,7 +9,7 @@ buildPythonPackage rec {
};
buildInputs = [ pytest ];
- propagatedBuildInputs = [ dateutil pyproj pytz requests pyyaml ];
+ propagatedBuildInputs = [ python-dateutil pyproj pytz requests pyyaml ];
# 'tests' dir not included in pypy distribution archive.
doCheck = false;
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/pandas/2.nix b/third_party/nixpkgs/pkgs/development/python-modules/pandas/2.nix
index 8af4094b0c..9b29a84426 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/pandas/2.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/pandas/2.nix
@@ -8,7 +8,7 @@
, pytest
, glibcLocales
, cython
-, dateutil
+, python-dateutil
, scipy
, moto
, numexpr
@@ -41,7 +41,7 @@ buildPythonPackage rec {
nativeBuildInputs = [ cython ];
buildInputs = lib.optional stdenv.isDarwin libcxx;
propagatedBuildInputs = [
- dateutil
+ python-dateutil
scipy
numexpr
pytz
@@ -68,7 +68,7 @@ buildPythonPackage rec {
disabledTests = lib.concatMapStringsSep " and " (s: "not " + s) ([
- # since dateutil 0.6.0 the following fails: test_fallback_plural, test_ambiguous_flags, test_ambiguous_compat
+ # since python-dateutil 0.6.0 the following fails: test_fallback_plural, test_ambiguous_flags, test_ambiguous_compat
# was supposed to be solved by https://github.com/dateutil/dateutil/issues/321, but is not the case
"test_fallback_plural"
"test_ambiguous_flags"
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/pandas/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/pandas/default.nix
index 2d50201682..b7e237a3e3 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/pandas/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/pandas/default.nix
@@ -7,7 +7,7 @@
, beautifulsoup4
, bottleneck
, cython
-, dateutil
+, python-dateutil
, html5lib
, jinja2
, lxml
@@ -47,7 +47,7 @@ buildPythonPackage rec {
propagatedBuildInputs = [
beautifulsoup4
bottleneck
- dateutil
+ python-dateutil
html5lib
numexpr
lxml
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/pelican/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/pelican/default.nix
index 1ae27b5ecf..5419407d61 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/pelican/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/pelican/default.nix
@@ -1,7 +1,7 @@
{ lib, buildPythonPackage, fetchFromGitHub, isPy27
, glibcLocales, git
, mock, nose, markdown, lxml, typogrify
-, jinja2, pygments, docutils, pytz, unidecode, six, dateutil, feedgenerator
+, jinja2, pygments, docutils, pytz, unidecode, six, python-dateutil, feedgenerator
, blinker, pillow, beautifulsoup4, markupsafe, pandoc }:
buildPythonPackage rec {
@@ -44,7 +44,7 @@ buildPythonPackage rec {
];
propagatedBuildInputs = [
- jinja2 pygments docutils pytz unidecode six dateutil feedgenerator
+ jinja2 pygments docutils pytz unidecode six python-dateutil feedgenerator
blinker pillow beautifulsoup4 markupsafe lxml
];
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/pendulum/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/pendulum/default.nix
index 5688090b09..d432ca271d 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/pendulum/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/pendulum/default.nix
@@ -1,5 +1,5 @@
{ lib, fetchPypi, buildPythonPackage, pythonOlder
-, dateutil
+, python-dateutil
, importlib-metadata
, poetry
, poetry-core
@@ -22,7 +22,7 @@ buildPythonPackage rec {
'';
nativeBuildInputs = [ poetry-core ];
- propagatedBuildInputs = [ dateutil pytzdata ]
+ propagatedBuildInputs = [ python-dateutil pytzdata ]
++ lib.optional (pythonOlder "3.5") typing
++ lib.optionals (pythonOlder "3.8") [ importlib-metadata ];
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/pillow-simd/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/pillow-simd/default.nix
index d7b2ff8d6b..e2ea4c7138 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/pillow-simd/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/pillow-simd/default.nix
@@ -6,15 +6,16 @@
import ../pillow/generic.nix (rec {
pname = "Pillow-SIMD";
- version = "8.1.2";
-
+ # check for release version on https://pypi.org/project/Pillow-SIMD/#history
+ # does not match the latest pillow release version!
+ version = "7.0.0.post3";
disabled = !isPy3k;
src = fetchFromGitHub {
owner = "uploadcare";
repo = "pillow-simd";
- rev = version;
- sha256 = "1z0c1qpx7l1bhj71ww7za7kl29j5wdraqr2pdhv4dp1q74kgrr0m";
+ rev = "v${version}";
+ sha256 = "1h832xp1bzf951hr4dmjmxqfsv28sx9lr2cq96qdz1c72k40zj1h";
};
meta = with lib; {
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/prov/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/prov/default.nix
index acee0f09b8..9844b01851 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/prov/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/prov/default.nix
@@ -3,7 +3,7 @@
, fetchPypi
, lxml
, networkx
-, dateutil
+, python-dateutil
, rdflib
, pydot
}:
@@ -20,7 +20,7 @@ buildPythonPackage rec {
propagatedBuildInputs = [
lxml
networkx
- dateutil
+ python-dateutil
rdflib
];
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/pwntools/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/pwntools/default.nix
index e6ee7d4f98..e3422aff02 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/pwntools/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/pwntools/default.nix
@@ -14,7 +14,7 @@
, psutil
, pyelftools
, pyserial
-, dateutil
+, python-dateutil
, requests
, rpyc
, tox
@@ -63,7 +63,7 @@ buildPythonPackage rec {
psutil
pyelftools
pyserial
- dateutil
+ python-dateutil
requests
rpyc
tox
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/pycollada/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/pycollada/default.nix
index e8e0809c02..49dfbf0309 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/pycollada/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/pycollada/default.nix
@@ -1,4 +1,4 @@
-{ lib, fetchPypi, buildPythonPackage, numpy, dateutil }:
+{ lib, fetchPypi, buildPythonPackage, numpy, python-dateutil }:
buildPythonPackage rec {
pname = "pycollada";
@@ -9,7 +9,7 @@ buildPythonPackage rec {
sha256 = "1rp4wlvfywgk3v6l3hnhjx61x9yqawvvivpq4dig2jj71k3mpsyj";
};
- propagatedBuildInputs = [ numpy dateutil ];
+ propagatedBuildInputs = [ numpy python-dateutil ];
# Some tests fail because they refer to test data files that don't exist
# (upstream packaging issue)
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/pyflick/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/pyflick/default.nix
index b1f39353c1..b6a9c2cf96 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/pyflick/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/pyflick/default.nix
@@ -3,7 +3,7 @@
, pythonOlder
, fetchPypi
, aiohttp
-, dateutil
+, python-dateutil
}:
buildPythonPackage rec {
@@ -20,7 +20,7 @@ buildPythonPackage rec {
propagatedBuildInputs = [
aiohttp
- dateutil
+ python-dateutil
];
# no tests implemented
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/pykeepass/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/pykeepass/default.nix
index e54a9c6fa2..5d23949eba 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/pykeepass/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/pykeepass/default.nix
@@ -1,6 +1,6 @@
{ lib, fetchFromGitHub, buildPythonPackage
, lxml, pycryptodomex, construct
-, argon2_cffi, dateutil, future
+, argon2_cffi, python-dateutil, future
, python
}:
@@ -21,7 +21,7 @@ buildPythonPackage rec {
propagatedBuildInputs = [
lxml pycryptodomex construct
- argon2_cffi dateutil future
+ argon2_cffi python-dateutil future
];
checkPhase = ''
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/pykwalify/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/pykwalify/default.nix
index b65c0fd467..cf42c98457 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/pykwalify/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/pykwalify/default.nix
@@ -1,6 +1,6 @@
{ lib
, buildPythonPackage
-, dateutil
+, python-dateutil
, docopt
, fetchPypi
, pytestCheckHook
@@ -19,7 +19,7 @@ buildPythonPackage rec {
};
propagatedBuildInputs = [
- dateutil
+ python-dateutil
docopt
pyyaml
ruamel-yaml
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/pyls-black/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/pyls-black/default.nix
index d10e4930ac..128c8cbd0d 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/pyls-black/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/pyls-black/default.nix
@@ -29,6 +29,6 @@ buildPythonPackage rec {
homepage = "https://github.com/rupert/pyls-black";
description = "Black plugin for the Python Language Server";
license = licenses.mit;
- maintainers = [ maintainers.mic92 ];
+ maintainers = [ ];
};
}
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/pyls-isort/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/pyls-isort/default.nix
index 9dc614035e..35b43969e5 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/pyls-isort/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/pyls-isort/default.nix
@@ -24,6 +24,6 @@ buildPythonPackage rec {
homepage = "https://github.com/paradoxxxzero/pyls-isort";
description = "Isort plugin for python-language-server";
license = licenses.mit;
- maintainers = [ maintainers.mic92 ];
+ maintainers = [ ];
};
}
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/pyls-mypy/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/pyls-mypy/default.nix
index eaf069c8cc..f919ac21cb 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/pyls-mypy/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/pyls-mypy/default.nix
@@ -46,6 +46,6 @@ buildPythonPackage rec {
homepage = "https://github.com/tomv564/pyls-mypy";
description = "Mypy plugin for the Python Language Server";
license = licenses.mit;
- maintainers = [ maintainers.mic92 ];
+ maintainers = [ ];
};
}
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/pyls-spyder/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/pyls-spyder/default.nix
index 4e0029783e..61b0fa7449 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/pyls-spyder/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/pyls-spyder/default.nix
@@ -1,18 +1,29 @@
-{ lib, buildPythonPackage, fetchPypi, python-language-server }:
+{ lib
+, buildPythonPackage
+, fetchFromGitHub
+, python-lsp-server
+, pytestCheckHook
+}:
buildPythonPackage rec {
pname = "pyls-spyder";
version = "0.4.0";
- src = fetchPypi {
- inherit pname version;
- sha256 = "45a321c83f64267d82907492c55199fccabda45bc872dd23bf1efd08edac1b0b";
+ src = fetchFromGitHub {
+ owner = "spyder-ide";
+ repo = pname;
+ rev = "v${version}";
+ sha256 = "11ajbsia60d4c9s6m6rbvaqp1d69fcdbq6a98lkzkkzv2b9pdhkk";
};
- propagatedBuildInputs = [ python-language-server ];
+ propagatedBuildInputs = [
+ python-lsp-server
+ ];
+
+ checkInputs = [
+ pytestCheckHook
+ ];
- # no tests
- doCheck = false;
pythonImportsCheck = [ "pyls_spyder" ];
meta = with lib; {
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/pync/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/pync/default.nix
index 9506b8bae9..0eb13c732d 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/pync/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/pync/default.nix
@@ -2,7 +2,7 @@
, buildPythonPackage
, fetchPypi
, isPy27
-, dateutil
+, python-dateutil
, pkgs
}:
@@ -17,7 +17,7 @@ buildPythonPackage rec {
};
buildInputs = [ pkgs.coreutils ];
- propagatedBuildInputs = [ dateutil ];
+ propagatedBuildInputs = [ python-dateutil ];
preInstall = lib.optionalString stdenv.isDarwin ''
sed -i 's|^\([ ]*\)self.bin_path.*$|\1self.bin_path = "${pkgs.terminal-notifier}/bin/terminal-notifier"|' build/lib/pync/TerminalNotifier.py
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/pysaml2/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/pysaml2/default.nix
index 30fcfc52cb..5de5ad3a0d 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/pysaml2/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/pysaml2/default.nix
@@ -4,7 +4,7 @@
, fetchFromGitHub
, substituteAll
, xmlsec
-, cryptography, defusedxml, pyopenssl, dateutil, pytz, requests, six
+, cryptography, defusedxml, pyopenssl, python-dateutil, pytz, requests, six
, mock, pyasn1, pymongo, pytest, responses, xmlschema, importlib-resources
}:
@@ -36,7 +36,7 @@ buildPythonPackage rec {
propagatedBuildInputs = [
cryptography
- dateutil
+ python-dateutil
defusedxml
importlib-resources
pyopenssl
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/python-language-server/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/python-language-server/default.nix
index daab437c97..3ed9b75ef9 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/python-language-server/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/python-language-server/default.nix
@@ -84,6 +84,6 @@ buildPythonPackage rec {
homepage = "https://github.com/palantir/python-language-server";
description = "An implementation of the Language Server Protocol for Python";
license = licenses.mit;
- maintainers = [ maintainers.mic92 ];
+ maintainers = [ ];
};
}
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/python-lsp-jsonrpc/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/python-lsp-jsonrpc/default.nix
new file mode 100644
index 0000000000..6938bc282f
--- /dev/null
+++ b/third_party/nixpkgs/pkgs/development/python-modules/python-lsp-jsonrpc/default.nix
@@ -0,0 +1,41 @@
+{ lib
+, buildPythonPackage
+, fetchFromGitHub
+, pytestCheckHook
+, ujson
+}:
+
+buildPythonPackage rec {
+ pname = "python-lsp-jsonrpc";
+ version = "1.0.0";
+
+ src = fetchFromGitHub {
+ owner = "python-lsp";
+ repo = pname;
+ rev = "v${version}";
+ sha256 = "0h4bs8s4axcm0p02v59amz9sq3nr4zhzdgwq7iaw6awl27v1hd0i";
+ };
+
+ propagatedBuildInputs = [
+ ujson
+ ];
+
+ checkInputs = [
+ pytestCheckHook
+ ];
+
+ postPatch = ''
+ substituteInPlace setup.cfg \
+ --replace "--cov-report html --cov-report term --junitxml=pytest.xml" "" \
+ --replace "--cov pylsp_jsonrpc --cov test" ""
+ '';
+
+ pythonImportsCheck = [ "pylsp_jsonrpc" ];
+
+ meta = with lib; {
+ description = "Python server implementation of the JSON RPC 2.0 protocol.";
+ homepage = "https://github.com/python-lsp/python-lsp-jsonrpc";
+ license = licenses.mit;
+ maintainers = with maintainers; [ fab ];
+ };
+}
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/python-lsp-server/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/python-lsp-server/default.nix
new file mode 100644
index 0000000000..6a2c396ecf
--- /dev/null
+++ b/third_party/nixpkgs/pkgs/development/python-modules/python-lsp-server/default.nix
@@ -0,0 +1,81 @@
+{ lib
+, autopep8
+, buildPythonPackage
+, fetchFromGitHub
+, flake8
+, flaky
+, jedi
+, matplotlib
+, mccabe
+, numpy
+, pandas
+, pluggy
+, pycodestyle
+, pydocstyle
+, pyflakes
+, pylint
+, pyqt5
+, pytestCheckHook
+, python-lsp-jsonrpc
+, pythonOlder
+, rope
+, ujson
+, yapf
+}:
+
+buildPythonPackage rec {
+ pname = "python-lsp-server";
+ version = "1.1.0";
+ disabled = pythonOlder "3.6";
+
+ src = fetchFromGitHub {
+ owner = "python-lsp";
+ repo = pname;
+ rev = "v${version}";
+ sha256 = "1akdpfnylqg2mcwpkqmdwcg6j6hab23slp5rfjfidhphig2f2yjv";
+ };
+
+ propagatedBuildInputs = [
+ autopep8
+ flake8
+ jedi
+ mccabe
+ pluggy
+ pycodestyle
+ pydocstyle
+ pyflakes
+ pylint
+ python-lsp-jsonrpc
+ rope
+ ujson
+ yapf
+ ];
+
+ checkInputs = [
+ flaky
+ matplotlib
+ numpy
+ pandas
+ pyqt5
+ pytestCheckHook
+ ];
+
+ postPatch = ''
+ substituteInPlace setup.cfg \
+ --replace "--cov-report html --cov-report term --junitxml=pytest.xml" "" \
+ --replace "--cov pylsp --cov test" ""
+ '';
+
+ preCheck = ''
+ export HOME=$(mktemp -d);
+ '';
+
+ pythonImportsCheck = [ "pylsp" ];
+
+ meta = with lib; {
+ description = "Python implementation of the Language Server Protocol";
+ homepage = "https://github.com/python-lsp/python-lsp-server";
+ license = licenses.mit;
+ maintainers = with maintainers; [ fab ];
+ };
+}
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/pytomlpp/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/pytomlpp/default.nix
index 19edd7057e..d2fc8470d4 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/pytomlpp/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/pytomlpp/default.nix
@@ -4,7 +4,7 @@
, pythonOlder
, pybind11
, pytestCheckHook
-, dateutil
+, python-dateutil
, doxygen
, python
, pelican
@@ -28,7 +28,7 @@ buildPythonPackage rec {
checkInputs = [
pytestCheckHook
- dateutil
+ python-dateutil
doxygen
python
pelican
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/rainbowstream/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/rainbowstream/default.nix
index e484c07f31..02c948fd40 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/rainbowstream/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/rainbowstream/default.nix
@@ -8,7 +8,7 @@
, pyfiglet
, requests
, arrow
-, dateutil
+, python-dateutil
, pysocks
, pocket
}:
@@ -42,7 +42,7 @@ buildPythonPackage rec {
done
'';
- buildInputs = [ pkgs.libjpeg pkgs.freetype pkgs.zlib pkgs.glibcLocales pillow twitter pyfiglet requests arrow dateutil pysocks pocket ];
+ buildInputs = [ pkgs.libjpeg pkgs.freetype pkgs.zlib pkgs.glibcLocales pillow twitter pyfiglet requests arrow python-dateutil pysocks pocket ];
meta = with lib; {
description = "Streaming command-line twitter client";
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/selenium/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/selenium/default.nix
index 370d254898..7a1d1439c1 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/selenium/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/selenium/default.nix
@@ -49,7 +49,7 @@ buildPythonPackage rec {
'';
passthru.tests = {
- testing-bitwarden = nixosTests.bitwarden;
+ testing-vaultwarden = nixosTests.vaultwarden;
};
meta = with lib; {
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/simber/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/simber/default.nix
index d1471286bb..331f84252c 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/simber/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/simber/default.nix
@@ -2,13 +2,13 @@
buildPythonPackage rec {
pname = "simber";
- version = "0.2.2";
+ version = "0.2.3";
src = fetchFromGitHub {
owner = "deepjyoti30";
repo = pname;
rev = version;
- sha256 = "0ksc2m61j5ijj0sq6kkc0hhkmfy9f51h9z3cl2sf8g6wbr9vc47h";
+ sha256 = "04dp9b4s7zb166vlacsaypc6iw1p75azqas1wf0flp570qqf3rkx";
};
propagatedBuildInputs = [ colorama ];
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/sipsimple/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/sipsimple/default.nix
index 838ffd4718..34b95fe781 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/sipsimple/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/sipsimple/default.nix
@@ -5,7 +5,7 @@
, pkgs
, cython
, dnspython
-, dateutil
+, python-dateutil
, xcaplib
, msrplib
, lxml
@@ -34,7 +34,7 @@ buildPythonPackage rec {
nativeBuildInputs = [ pkgs.pkg-config ];
buildInputs = with pkgs; [ alsa-lib ffmpeg_3 libv4l sqlite libvpx ];
- propagatedBuildInputs = [ cython pkgs.openssl dnspython dateutil xcaplib msrplib lxml python-otr ];
+ propagatedBuildInputs = [ cython pkgs.openssl dnspython python-dateutil xcaplib msrplib lxml python-otr ];
meta = with lib; {
description = "SIP SIMPLE implementation for Python";
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/sqlalchemy-utils/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/sqlalchemy-utils/default.nix
index b59209f429..dc983e20ce 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/sqlalchemy-utils/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/sqlalchemy-utils/default.nix
@@ -1,6 +1,6 @@
{ lib, fetchPypi, buildPythonPackage
, six, sqlalchemy
-, mock, pytz, isort, flake8, jinja2, pg8000, pyodbc, pytest, pymysql, dateutil
+, mock, pytz, isort, flake8, jinja2, pg8000, pyodbc, pytest, pymysql, python-dateutil
, docutils, flexmock, psycopg2, pygments }:
buildPythonPackage rec {
@@ -30,7 +30,7 @@ buildPythonPackage rec {
pyodbc
pytest
pymysql
- dateutil
+ python-dateutil
docutils
flexmock
psycopg2
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/staticjinja/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/staticjinja/default.nix
index 0681218cd0..dc36066ec3 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/staticjinja/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/staticjinja/default.nix
@@ -14,7 +14,7 @@
buildPythonPackage rec {
pname = "staticjinja";
- version = "2.1.0";
+ version = "3.0.1";
format = "pyproject";
# No tests in pypi
@@ -22,7 +22,7 @@ buildPythonPackage rec {
owner = "staticjinja";
repo = pname;
rev = version;
- sha256 = "sha256-VKsDvWEurBdckWbPG5hQLK3dzdM7XVbrp23fR5wp1xk=";
+ sha256 = "sha256-W4q0vG8Kl2gCmA8UnUbdiGRtghhdnWxIJXFIIa6BogA=";
};
nativeBuildInputs = [
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/suseapi/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/suseapi/default.nix
index 1c36f45090..bcf35d1f5f 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/suseapi/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/suseapi/default.nix
@@ -7,7 +7,7 @@
, mechanize
, beautifulsoup4
, pyxdg
-, dateutil
+, python-dateutil
, requests
, httpretty
}:
@@ -24,7 +24,7 @@ buildPythonPackage rec {
};
propagatedBuildInputs = [
- django suds-jurko ldap mechanize beautifulsoup4 pyxdg dateutil requests
+ django suds-jurko ldap mechanize beautifulsoup4 pyxdg python-dateutil requests
];
buildInputs = [ httpretty ];
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/taskw/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/taskw/default.nix
index 523d3e303b..80d86c3edb 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/taskw/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/taskw/default.nix
@@ -4,7 +4,7 @@
, nose
, tox
, six
-, dateutil
+, python-dateutil
, kitchen
, pytz
, pkgs
@@ -29,7 +29,7 @@ buildPythonPackage rec {
doCheck = false;
buildInputs = [ nose pkgs.taskwarrior tox ];
- propagatedBuildInputs = [ six dateutil kitchen pytz ];
+ propagatedBuildInputs = [ six python-dateutil kitchen pytz ];
meta = with lib; {
homepage = "https://github.com/ralphbean/taskw";
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/textfsm/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/textfsm/default.nix
index 04bc47913d..fed2f7c3e3 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/textfsm/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/textfsm/default.nix
@@ -9,26 +9,25 @@
buildPythonPackage rec {
pname = "textfsm";
- version = "1.1.1";
+ version = "1.1.2";
+ format = "setuptools";
+
src = fetchFromGitHub {
owner = "google";
repo = pname;
rev = "v${version}";
- sha256 = "0fq2hphd89hns11nh0yifcp6brg6yy4n4hbvfk6avbjd7s40789a";
+ sha256 = "1cbczg3h2841v1xk2s2xg540c69vsrkwxljm758fyr65kshrzlhm";
};
- patches = [
- (fetchpatch {
- # remove pytest-runner dependency
- url = "https://github.com/google/textfsm/commit/212db75fea4a79aca0f8f85a78954ffbc5667096.patch";
- sha256 = "0n6qh3sz9wy5gdpq9jjxx8firis48ypr20yacs5bqri59sziwjp0";
- })
+ propagatedBuildInputs = [
+ six
+ future
];
- propagatedBuildInputs = [ six future ];
-
- checkInputs = [ pytestCheckHook ];
+ checkInputs = [
+ pytestCheckHook
+ ];
meta = with lib; {
description = "Python module for parsing semi-structured text into python tables";
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/token-bucket/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/token-bucket/default.nix
index ac614d53fd..f1e90114ac 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/token-bucket/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/token-bucket/default.nix
@@ -7,14 +7,14 @@
buildPythonPackage rec {
pname = "token-bucket";
- version = "0.2.0";
+ version = "0.3.0";
format = "setuptools";
src = fetchFromGitHub {
owner = "falconry";
repo = pname;
rev = version;
- sha256 = "0kv8j2ab4knvzik2di66bgjwjxdslm2i0hjy35kn9z0dazni585s";
+ sha256 = "0a703y2d09kvv2l9vq7vc97l4pi2wwq1f2hq783mbw2238jymb3m";
};
nativeBuildInputs = [
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/trytond/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/trytond/default.nix
index f0cb79b0a8..d5ddf8f588 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/trytond/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/trytond/default.nix
@@ -6,7 +6,7 @@
, lxml
, relatorio
, genshi
-, dateutil
+, python-dateutil
, polib
, python-sql
, werkzeug
@@ -41,7 +41,7 @@ buildPythonApplication rec {
lxml
relatorio
genshi
- dateutil
+ python-dateutil
polib
python-sql
werkzeug
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/urllib3/2.nix b/third_party/nixpkgs/pkgs/development/python-modules/urllib3/2.nix
index 3fc90fe5d8..f1eea4c31d 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/urllib3/2.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/urllib3/2.nix
@@ -3,7 +3,7 @@
, buildPythonPackage
, certifi
, cryptography
-, dateutil
+, python-dateutil
, fetchpatch
, fetchPypi
, idna
@@ -45,7 +45,7 @@ buildPythonPackage rec {
];
checkInputs = [
- dateutil
+ python-dateutil
mock
pytest-freezegun
pytest-timeout
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/urllib3/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/urllib3/default.nix
index eec8e284c0..6d73357e3b 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/urllib3/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/urllib3/default.nix
@@ -2,7 +2,7 @@
, brotli
, buildPythonPackage
, cryptography
-, dateutil
+, python-dateutil
, fetchPypi
, idna
, isPy27
@@ -36,7 +36,7 @@ buildPythonPackage rec {
];
checkInputs = [
- dateutil
+ python-dateutil
mock
pytest-freezegun
pytest-timeout
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/vertica-python/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/vertica-python/default.nix
index 823d2820e1..dc12234192 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/vertica-python/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/vertica-python/default.nix
@@ -1,4 +1,4 @@
-{ lib, buildPythonPackage, fetchPypi, future, dateutil, six, pytest, mock, parameterized }:
+{ lib, buildPythonPackage, fetchPypi, future, python-dateutil, six, pytest, mock, parameterized }:
buildPythonPackage rec {
pname = "vertica-python";
@@ -9,7 +9,7 @@ buildPythonPackage rec {
sha256 = "94cff37e03f89fc4c5e4b2d4c913c7d5d7450f5a205d14f709b39e0a4202be95";
};
- propagatedBuildInputs = [ future dateutil six ];
+ propagatedBuildInputs = [ future python-dateutil six ];
checkInputs = [ pytest mock parameterized ];
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/vobject/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/vobject/default.nix
index 1bb87d9d12..30f8415028 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/vobject/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/vobject/default.nix
@@ -1,4 +1,4 @@
-{ lib, buildPythonPackage, fetchPypi, isPyPy, python, dateutil }:
+{ lib, buildPythonPackage, fetchPypi, isPyPy, python, python-dateutil }:
buildPythonPackage rec {
version = "0.9.6.1";
@@ -11,7 +11,7 @@ buildPythonPackage rec {
disabled = isPyPy;
- propagatedBuildInputs = [ dateutil ];
+ propagatedBuildInputs = [ python-dateutil ];
checkPhase = "${python.interpreter} tests.py";
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/webdavclient3/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/webdavclient3/default.nix
index eb13cd6b9b..fc63c1913d 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/webdavclient3/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/webdavclient3/default.nix
@@ -1,4 +1,4 @@
-{ buildPythonPackage, fetchPypi, isPy27, lib, dateutil, lxml, requests
+{ buildPythonPackage, fetchPypi, isPy27, lib, python-dateutil, lxml, requests
, pytestCheckHook }:
buildPythonPackage rec {
@@ -12,7 +12,7 @@ buildPythonPackage rec {
sha256 = "0yw3n5m70ysjn1ch48znpn4zr4a1bd0lsm7q2grqz7q5hfjzjwk0";
};
- propagatedBuildInputs = [ dateutil lxml requests ];
+ propagatedBuildInputs = [ python-dateutil lxml requests ];
checkInputs = [ pytestCheckHook ];
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/weboob/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/weboob/default.nix
index 3ce15a3fdc..b1afa24210 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/weboob/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/weboob/default.nix
@@ -1,7 +1,7 @@
{ lib, buildPythonPackage, fetchPypi, isPy27
, Babel
, cssselect
-, dateutil
+, python-dateutil
, feedparser
, futures ? null
, gdata
@@ -52,7 +52,7 @@ buildPythonPackage rec {
propagatedBuildInputs = [
Babel
cssselect
- dateutil
+ python-dateutil
feedparser
gdata
gnupg
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/woob/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/woob/default.nix
index 4794843a66..fc5e6e9dc6 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/woob/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/woob/default.nix
@@ -5,7 +5,7 @@
, Babel
, colorama
, cssselect
-, dateutil
+, python-dateutil
, feedparser
, gdata
, gnupg
@@ -49,7 +49,7 @@ buildPythonPackage rec {
Babel
colorama
cssselect
- dateutil
+ python-dateutil
feedparser
gdata
gnupg
diff --git a/third_party/nixpkgs/pkgs/development/python-modules/zha-quirks/default.nix b/third_party/nixpkgs/pkgs/development/python-modules/zha-quirks/default.nix
index 34335c65e1..37fbc87f3f 100644
--- a/third_party/nixpkgs/pkgs/development/python-modules/zha-quirks/default.nix
+++ b/third_party/nixpkgs/pkgs/development/python-modules/zha-quirks/default.nix
@@ -9,13 +9,13 @@
buildPythonPackage rec {
pname = "zha-quirks";
- version = "0.0.57";
+ version = "0.0.58";
src = fetchFromGitHub {
owner = "zigpy";
repo = "zha-device-handlers";
rev = version;
- sha256 = "sha256-ajdluj6UIzjJUK30GtoM+e5lsMQRKnn3FPNEg+RS/DM=";
+ sha256 = "sha256-QU5ssbnT3/gioQ3vM9zvlbwxqSWyKIylsV9NuFkNe+Q=";
};
propagatedBuildInputs = [
diff --git a/third_party/nixpkgs/pkgs/development/scheme-modules/scheme-bytestructures/default.nix b/third_party/nixpkgs/pkgs/development/scheme-modules/scheme-bytestructures/default.nix
index 67d9e39af6..5be2fca96f 100644
--- a/third_party/nixpkgs/pkgs/development/scheme-modules/scheme-bytestructures/default.nix
+++ b/third_party/nixpkgs/pkgs/development/scheme-modules/scheme-bytestructures/default.nix
@@ -34,6 +34,6 @@ stdenv.mkDerivation rec {
homepage = "https://github.com/TaylanUB/scheme-bytestructures";
license = licenses.gpl3Plus;
maintainers = with maintainers; [ ethancedwards8 ];
- platforms = platforms.linux;
+ platforms = platforms.unix;
};
}
diff --git a/third_party/nixpkgs/pkgs/development/tools/analysis/codeql/default.nix b/third_party/nixpkgs/pkgs/development/tools/analysis/codeql/default.nix
index 25d61d2393..a239631438 100644
--- a/third_party/nixpkgs/pkgs/development/tools/analysis/codeql/default.nix
+++ b/third_party/nixpkgs/pkgs/development/tools/analysis/codeql/default.nix
@@ -12,7 +12,7 @@
stdenv.mkDerivation rec {
pname = "codeql";
- version = "2.5.5";
+ version = "2.5.6";
dontConfigure = true;
dontBuild = true;
@@ -20,7 +20,7 @@ stdenv.mkDerivation rec {
src = fetchzip {
url = "https://github.com/github/codeql-cli-binaries/releases/download/v${version}/codeql.zip";
- sha256 = "sha256-M5O2NEGIVPWYKl11yxMMVreEtDO1VqcMkiGGrjNmk3A=";
+ sha256 = "sha256-YBGKIfBTU7MRm1Om4Jknd5Nu77qJftCgjuohcO/9X/w=";
};
nativeBuildInputs = [
diff --git a/third_party/nixpkgs/pkgs/development/tools/analysis/tflint/default.nix b/third_party/nixpkgs/pkgs/development/tools/analysis/tflint/default.nix
index 9666bf006d..a5798c6ad5 100644
--- a/third_party/nixpkgs/pkgs/development/tools/analysis/tflint/default.nix
+++ b/third_party/nixpkgs/pkgs/development/tools/analysis/tflint/default.nix
@@ -2,16 +2,16 @@
buildGoModule rec {
pname = "tflint";
- version = "0.29.1";
+ version = "0.30.0";
src = fetchFromGitHub {
owner = "terraform-linters";
repo = pname;
rev = "v${version}";
- sha256 = "1pkz8y3da7i4a3nm79a0640xjj4wfkx3dz6614c4hynqn5svji82";
+ sha256 = "0xdn8xakywms8gcacmjvx0ivv37i3vj1d41c8sjlnf1s13q3zv7k";
};
- vendorSha256 = "0k8v49sr0jmljfl4fa5pnvzd5k3pg865h201114l6cs257sdkczk";
+ vendorSha256 = "18w0wz3raysba99cxcc8pk4md9j438g4y2d2v2pk2l6qri9apscw";
doCheck = false;
diff --git a/third_party/nixpkgs/pkgs/development/tools/build-managers/conan/default.nix b/third_party/nixpkgs/pkgs/development/tools/build-managers/conan/default.nix
index 9c3e99e23a..8c150e114f 100644
--- a/third_party/nixpkgs/pkgs/development/tools/build-managers/conan/default.nix
+++ b/third_party/nixpkgs/pkgs/development/tools/build-managers/conan/default.nix
@@ -56,7 +56,7 @@ in newPython.pkgs.buildPythonApplication rec {
propagatedBuildInputs = with newPython.pkgs; [
bottle
colorama
- dateutil
+ python-dateutil
deprecation
distro
fasteners
diff --git a/third_party/nixpkgs/pkgs/development/tools/build-managers/mill/default.nix b/third_party/nixpkgs/pkgs/development/tools/build-managers/mill/default.nix
index 4fbd0365af..4682fab41d 100644
--- a/third_party/nixpkgs/pkgs/development/tools/build-managers/mill/default.nix
+++ b/third_party/nixpkgs/pkgs/development/tools/build-managers/mill/default.nix
@@ -2,11 +2,11 @@
stdenv.mkDerivation rec {
pname = "mill";
- version = "0.9.6";
+ version = "0.9.8";
src = fetchurl {
url = "https://github.com/com-lihaoyi/mill/releases/download/${version}/${version}";
- sha256 = "sha256-cAhcTmSPkV5z5ryuCNrpxy9/1iWvvminiVYul9c/DwM=";
+ sha256 = "sha256-vWCzjit7MPrKqEYgJfQHAkam9J9NgMObOQ/A+OQr24o=";
};
nativeBuildInputs = [ makeWrapper ];
diff --git a/third_party/nixpkgs/pkgs/development/tools/build-managers/rocm-cmake/default.nix b/third_party/nixpkgs/pkgs/development/tools/build-managers/rocm-cmake/default.nix
index 16ea0dc283..68cd3d449c 100644
--- a/third_party/nixpkgs/pkgs/development/tools/build-managers/rocm-cmake/default.nix
+++ b/third_party/nixpkgs/pkgs/development/tools/build-managers/rocm-cmake/default.nix
@@ -17,7 +17,7 @@ stdenv.mkDerivation rec {
description = "CMake modules for common build tasks for the ROCm stack";
homepage = "https://github.com/RadeonOpenCompute/rocm-cmake";
license = licenses.mit;
- maintainers = with maintainers; [ danieldk ];
+ maintainers = with maintainers; [ ];
platforms = platforms.unix;
};
}
diff --git a/third_party/nixpkgs/pkgs/development/tools/cloud-nuke/default.nix b/third_party/nixpkgs/pkgs/development/tools/cloud-nuke/default.nix
index b947fc1ebf..ecb6991d3d 100644
--- a/third_party/nixpkgs/pkgs/development/tools/cloud-nuke/default.nix
+++ b/third_party/nixpkgs/pkgs/development/tools/cloud-nuke/default.nix
@@ -2,16 +2,16 @@
buildGoModule rec {
pname = "cloud-nuke";
- version = "0.1.30";
+ version = "0.2.0";
src = fetchFromGitHub {
owner = "gruntwork-io";
repo = pname;
rev = "v${version}";
- sha256 = "sha256-uQj14arxDPc8/k1Cvp3T6hqjln30NFk9MzvYy8tAiJ8=";
+ sha256 = "sha256-FQx5k6HuOf3gKa71LteNGhH2KILUQ+aeKmtQXRwTNYI=";
};
- vendorSha256 = "sha256-pl3dLisu4Oc77kgfuteKbsZaDzrHo1wUigZEkM4081Q=";
+ vendorSha256 = "sha256-VsP1YWvszux7qiRVLRF40NX3qoNOa9yrfRhQAaw7aKI=";
buildFlagsArray = [ "-ldflags=-s -w -X main.VERSION=${version}" ];
diff --git a/third_party/nixpkgs/pkgs/development/tools/database/sqlitebrowser/default.nix b/third_party/nixpkgs/pkgs/development/tools/database/sqlitebrowser/default.nix
index 45b5f18588..9ff5c1b01b 100644
--- a/third_party/nixpkgs/pkgs/development/tools/database/sqlitebrowser/default.nix
+++ b/third_party/nixpkgs/pkgs/development/tools/database/sqlitebrowser/default.nix
@@ -1,5 +1,5 @@
{ mkDerivation, lib, fetchFromGitHub, cmake
-, qtbase, qttools, sqlite }:
+, qtbase, qttools, sqlite, wrapGAppsHook }:
mkDerivation rec {
pname = "sqlitebrowser";
@@ -18,7 +18,7 @@ mkDerivation rec {
# We *really* should get that cleaned up.
buildInputs = [ qtbase sqlite ];
- nativeBuildInputs = [ cmake qttools ];
+ nativeBuildInputs = [ cmake qttools wrapGAppsHook ];
meta = with lib; {
description = "DB Browser for SQLite";
diff --git a/third_party/nixpkgs/pkgs/development/tools/gops/default.nix b/third_party/nixpkgs/pkgs/development/tools/gops/default.nix
index d23aa71a8a..bc9cba9df5 100644
--- a/third_party/nixpkgs/pkgs/development/tools/gops/default.nix
+++ b/third_party/nixpkgs/pkgs/development/tools/gops/default.nix
@@ -2,13 +2,13 @@
buildGoModule rec {
pname = "gops";
- version = "0.3.18";
+ version = "0.3.19";
src = fetchFromGitHub {
owner = "google";
repo = "gops";
rev = "v${version}";
- sha256 = "0534jyravpsj73lgdmw6fns1qaqiw401jlfk04wa0as5sv09rfhy";
+ sha256 = "sha256-9QEhc0OVCrIdIY220PDn2+CjUsCF84l6QRQS0HjDEZY=";
};
vendorSha256 = null;
diff --git a/third_party/nixpkgs/pkgs/development/tools/literate-programming/noweb/default.nix b/third_party/nixpkgs/pkgs/development/tools/literate-programming/noweb/default.nix
index c027640351..6847aff097 100644
--- a/third_party/nixpkgs/pkgs/development/tools/literate-programming/noweb/default.nix
+++ b/third_party/nixpkgs/pkgs/development/tools/literate-programming/noweb/default.nix
@@ -57,7 +57,7 @@ lib.fix (noweb: stdenv.mkDerivation rec {
# NOTE: substituteInPlace breaks Icon binaries, so make sure the script
# uses (n)awk before calling.
if grep -q nawk "$f"; then
- substituteInPlace "$f" --replace "nawk" "${nawk}/bin/awk"
+ substituteInPlace "$f" --replace "nawk" "${nawk}/bin/nawk"
fi
done
diff --git a/third_party/nixpkgs/pkgs/development/tools/misc/global/default.nix b/third_party/nixpkgs/pkgs/development/tools/misc/global/default.nix
index 739615a841..70ec9278ae 100644
--- a/third_party/nixpkgs/pkgs/development/tools/misc/global/default.nix
+++ b/third_party/nixpkgs/pkgs/development/tools/misc/global/default.nix
@@ -6,11 +6,11 @@ let
pygments = python3Packages.pygments;
in stdenv.mkDerivation rec {
pname = "global";
- version = "6.6.6";
+ version = "6.6.7";
src = fetchurl {
url = "mirror://gnu/global/${pname}-${version}.tar.gz";
- sha256 = "sha256-dYB4r/+Y1MBRxYeFx62j7Rl3+rt3+Il/9le3HMYtTV0=";
+ sha256 = "sha256-aaD3f1OCfFVoF2wdOCFm3zYedCY6BH8LMFiqLyrVijw=";
};
nativeBuildInputs = [ libtool makeWrapper ];
diff --git a/third_party/nixpkgs/pkgs/development/tools/open-policy-agent/default.nix b/third_party/nixpkgs/pkgs/development/tools/open-policy-agent/default.nix
index 739a562227..6737f16175 100644
--- a/third_party/nixpkgs/pkgs/development/tools/open-policy-agent/default.nix
+++ b/third_party/nixpkgs/pkgs/development/tools/open-policy-agent/default.nix
@@ -2,7 +2,7 @@
buildGoModule rec {
pname = "open-policy-agent";
- version = "0.29.4";
+ version = "0.30.0";
src = fetchFromGitHub {
owner = "open-policy-agent";
@@ -10,14 +10,11 @@ buildGoModule rec {
rev = "v${version}";
sha256 = "sha256-AjNr+t30ftF92+cEfvt8iHBDVD/SO52ojJRLAkYF9l4=";
};
-
vendorSha256 = null;
subPackages = [ "." ];
- preBuild = ''
- buildFlagsArray+=("-ldflags" "-s -w -X github.com/open-policy-agent/opa/version.Version=${version}")
- '';
+ ldflags = [ "-s" "-w" "-X github.com/open-policy-agent/opa/version.Version=${version}" ];
doInstallCheck = true;
installCheckPhase = ''
diff --git a/third_party/nixpkgs/pkgs/development/tools/remarshal/default.nix b/third_party/nixpkgs/pkgs/development/tools/remarshal/default.nix
index 385db11d7f..67137fb1ed 100644
--- a/third_party/nixpkgs/pkgs/development/tools/remarshal/default.nix
+++ b/third_party/nixpkgs/pkgs/development/tools/remarshal/default.nix
@@ -10,7 +10,7 @@ python3Packages.buildPythonApplication rec {
};
propagatedBuildInputs = with python3Packages; [
- pyyaml cbor2 dateutil tomlkit u-msgpack-python
+ pyyaml cbor2 python-dateutil tomlkit u-msgpack-python
];
meta = with lib; {
diff --git a/third_party/nixpkgs/pkgs/development/tools/rust/crate2nix/default.nix b/third_party/nixpkgs/pkgs/development/tools/rust/crate2nix/default.nix
index e68eea50ff..a86e531e7f 100644
--- a/third_party/nixpkgs/pkgs/development/tools/rust/crate2nix/default.nix
+++ b/third_party/nixpkgs/pkgs/development/tools/rust/crate2nix/default.nix
@@ -10,18 +10,18 @@
rustPlatform.buildRustPackage rec {
pname = "crate2nix";
- version = "0.9.0";
+ version = "0.10.0";
src = fetchFromGitHub {
owner = "kolloch";
repo = pname;
rev = version;
- sha256 = "sha256-dB8wa3CQFw8ckD420zpBGw4TnsLrHqXf+ff/WuhPsVM=";
+ sha256 = "sha256-JaF9/H3m4Wrc5MtXcONkOAgKVkswLVw0yZe0dBr2e4Y=";
};
sourceRoot = "source/crate2nix";
- cargoSha256 = "sha256-shWhzCaH8ZttUcq82tA7T1hwNl6F1XJy7ansA5lt+Mw=";
+ cargoSha256 = "sha256-PD7R1vcb3FKd4hfpViKyvfCExJ5H1Xo2HPYden5zpxQ=";
nativeBuildInputs = [ makeWrapper ];
diff --git a/third_party/nixpkgs/pkgs/development/tools/tapview/default.nix b/third_party/nixpkgs/pkgs/development/tools/tapview/default.nix
new file mode 100644
index 0000000000..966df4bed6
--- /dev/null
+++ b/third_party/nixpkgs/pkgs/development/tools/tapview/default.nix
@@ -0,0 +1,32 @@
+{ asciidoctor
+, fetchFromGitLab
+, lib
+, stdenv
+}:
+
+stdenv.mkDerivation rec {
+ pname = "tapview";
+ version = "1.1";
+
+ nativeBuildInputs = [ asciidoctor ];
+
+ src = fetchFromGitLab {
+ owner = "esr";
+ repo = pname;
+ rev = version;
+ sha256 = "sha256-inrxICNglZU/tup+YnHaDiVss32K2OXht/7f8lOZI4g=";
+ };
+
+ # Remove unecessary `echo` checks: `/bin/echo` fails, and `echo -n` works as expected.
+ patches = [ ./dont_check_echo.patch ];
+
+ makeFlags = [ "prefix=$(out)" ];
+
+ meta = with lib; {
+ description = "A minimalist pure consumer for TAP (Test Anything Protocol)";
+ homepage = "https://gitlab.com/esr/tapview";
+ license = licenses.bsd2;
+ platforms = platforms.all;
+ maintainers = with maintainers; [ pamplemousse ];
+ };
+}
diff --git a/third_party/nixpkgs/pkgs/development/tools/tapview/dont_check_echo.patch b/third_party/nixpkgs/pkgs/development/tools/tapview/dont_check_echo.patch
new file mode 100644
index 0000000000..3b12adb84c
--- /dev/null
+++ b/third_party/nixpkgs/pkgs/development/tools/tapview/dont_check_echo.patch
@@ -0,0 +1,44 @@
+diff --git a/tapview b/tapview
+index ad6a33a66d1..4cf9545d42f 100644
+--- a/tapview
++++ b/tapview
+@@ -13,21 +13,6 @@
+ #
+ # This is version 1.1
+ # A newer version may be available at https://gitlab.com/esr/tapview
+-#
+-# POSIX allows but does not mandate that -n suppresses emission of a
+-# trailing newline in echo. Thus, some shell builtin echos don't do
+-# that. Cope gracefully.
+-# shellcheck disable=SC2039
+-if [ "$(echo -n "a"; echo "b")" != "ab" ]
+-then
+- ECHO="echo"
+-elif [ "$(/bin/echo -n "a"; /bin/echo "b")" = "ab" ]
+-then
+- ECHO="/bin/echo"
+-else
+- echo "tapview: bailing out, your echo lacks -n support."
+- exit 3
+-fi
+
+ OK="."
+ FAIL="F"
+@@ -37,7 +22,7 @@ TODO_OK="u"
+
+ ship_char() {
+ # shellcheck disable=SC2039
+- "${ECHO}" -n "$1"
++ echo -n "$1"
+ }
+
+ ship_line() {
+@@ -155,7 +140,7 @@ do
+ fi
+ done
+
+-/bin/echo ""
++echo ""
+
+ if [ -z "$expect" ]
+ then
diff --git a/third_party/nixpkgs/pkgs/development/web/flyctl/default.nix b/third_party/nixpkgs/pkgs/development/web/flyctl/default.nix
index 130ff9c9bc..3c61121b03 100644
--- a/third_party/nixpkgs/pkgs/development/web/flyctl/default.nix
+++ b/third_party/nixpkgs/pkgs/development/web/flyctl/default.nix
@@ -2,13 +2,13 @@
buildGoModule rec {
pname = "flyctl";
- version = "0.0.227";
+ version = "0.0.228";
src = fetchFromGitHub {
owner = "superfly";
repo = "flyctl";
rev = "v${version}";
- sha256 = "sha256-nql0zK2H0FDQMsnSJSNzC7YmvUZfITHH5p1efFHsj58=";
+ sha256 = "sha256-h8ZiAabB0IIJoeQMMvOO1lQNMdFYAoTXKcTAPmLP5Sw=";
};
preBuild = ''
diff --git a/third_party/nixpkgs/pkgs/games/katago/default.nix b/third_party/nixpkgs/pkgs/games/katago/default.nix
index 1dffd3864d..2457cd1cf9 100644
--- a/third_party/nixpkgs/pkgs/games/katago/default.nix
+++ b/third_party/nixpkgs/pkgs/games/katago/default.nix
@@ -33,14 +33,14 @@ let
in env.mkDerivation rec {
pname = "katago";
- version = "1.9.0";
+ version = "1.9.1";
githash = "b846bddd88fbc5353e4a93fa514f6cbf45358362";
src = fetchFromGitHub {
owner = "lightvector";
repo = "katago";
rev = "v${version}";
- sha256 = "sha256-6J1UY05NweXLw8D4kOXG3KkCxJRsrQ9NBYWu2Xzu9JI=";
+ sha256 = "sha256-sAtPOqGe6fZ9mAtLdp80fTALXVkP9WdWQU2iTFGXe24=";
};
fakegit = writeShellScriptBin "git" "echo ${githash}";
diff --git a/third_party/nixpkgs/pkgs/games/openttd/grfcodec.nix b/third_party/nixpkgs/pkgs/games/openttd/grfcodec.nix
new file mode 100644
index 0000000000..544cf4f06c
--- /dev/null
+++ b/third_party/nixpkgs/pkgs/games/openttd/grfcodec.nix
@@ -0,0 +1,28 @@
+{ stdenv, lib, fetchFromGitHub, boost, cmake, git }:
+
+stdenv.mkDerivation rec {
+ pname = "openttd-grfcodec";
+ version = "unstable-2021-03-10";
+
+ src = fetchFromGitHub {
+ owner = "OpenTTD";
+ repo = "grfcodec";
+ rev = "045774dee7cab1a618a3e0d9b39bff78a12b6efa";
+ sha256 = "0b4xnnkqc01d3r834lhkq744ymar6c8iyxk51wc4c7hvz0vp9vmy";
+ };
+
+ buildInputs = [boost];
+ nativeBuildInputs = [cmake git];
+
+ installPhase = ''
+ mkdir -p $out/bin
+ cp -a grfcodec grfid grfstrip nforenum $out/bin/
+ '';
+
+ meta = with lib; {
+ description = "Low-level (dis)assembler and linter for OpenTTD GRF files";
+ homepage = "http://openttd.org/";
+ license = licenses.gpl2;
+ maintainers = with maintainers; [ ToxicFrog ];
+ };
+}
diff --git a/third_party/nixpkgs/pkgs/games/openttd/nml.nix b/third_party/nixpkgs/pkgs/games/openttd/nml.nix
new file mode 100644
index 0000000000..094330faff
--- /dev/null
+++ b/third_party/nixpkgs/pkgs/games/openttd/nml.nix
@@ -0,0 +1,22 @@
+{ stdenv, lib, fetchFromGitHub, python3Packages }:
+
+python3Packages.buildPythonApplication rec {
+ pname = "openttd-nml";
+ version = "0.5.3";
+
+ src = fetchFromGitHub {
+ owner = "OpenTTD";
+ repo = "nml";
+ rev = version;
+ sha256 = "0kfnkshff3wrxsj1wpfbbw2mmgww2q80v63p5d2pp1f38x8j33w9";
+ };
+
+ propagatedBuildInputs = with python3Packages; [ply pillow];
+
+ meta = with lib; {
+ description = "Compiler for OpenTTD NML files";
+ homepage = "http://openttdcoop.org/";
+ license = licenses.gpl2;
+ maintainers = with maintainers; [ ToxicFrog ];
+ };
+}
diff --git a/third_party/nixpkgs/pkgs/games/warzone2100/default.nix b/third_party/nixpkgs/pkgs/games/warzone2100/default.nix
index 7f2ad875d8..c3eebf203c 100644
--- a/third_party/nixpkgs/pkgs/games/warzone2100/default.nix
+++ b/third_party/nixpkgs/pkgs/games/warzone2100/default.nix
@@ -84,10 +84,15 @@ stdenv.mkDerivation rec {
cmakeFlags = [
"-DWZ_DISTRIBUTOR=NixOS"
# The cmake builder automatically sets CMAKE_INSTALL_BINDIR to an absolute
- # path, but this results in an error.
- # By resetting it, we let the CMakeLists set it to an accepted value
- # based on prefix.
- "-DCMAKE_INSTALL_BINDIR="
+ # path, but this results in an error:
+ #
+ # > An absolute CMAKE_INSTALL_BINDIR path cannot be used if the following
+ # > are not also absolute paths: WZ_DATADIR
+ #
+ # WZ_DATADIR is based on CMAKE_INSTALL_DATAROOTDIR, so we set that.
+ #
+ # Alternatively, we could have set CMAKE_INSTALL_BINDIR to "bin".
+ "-DCMAKE_INSTALL_DATAROOTDIR=${placeholder "out"}/share"
];
postInstall = lib.optionalString withVideos ''
diff --git a/third_party/nixpkgs/pkgs/misc/pylode/default.nix b/third_party/nixpkgs/pkgs/misc/pylode/default.nix
index fb90815176..33e78bc152 100644
--- a/third_party/nixpkgs/pkgs/misc/pylode/default.nix
+++ b/third_party/nixpkgs/pkgs/misc/pylode/default.nix
@@ -15,7 +15,7 @@ python3Packages.buildPythonApplication rec {
};
propagatedBuildInputs = with python3Packages; [
- dateutil
+ python-dateutil
falcon
gunicorn
isodate
diff --git a/third_party/nixpkgs/pkgs/misc/seafile-shared/default.nix b/third_party/nixpkgs/pkgs/misc/seafile-shared/default.nix
index a94964d888..cc6d0ced6d 100644
--- a/third_party/nixpkgs/pkgs/misc/seafile-shared/default.nix
+++ b/third_party/nixpkgs/pkgs/misc/seafile-shared/default.nix
@@ -19,7 +19,7 @@ stdenv.mkDerivation rec {
owner = "haiwen";
repo = "seafile";
rev = "v${version}";
- sha256 = "F6kLPWZb7FttyAP7pNEn+aRcAjvZlMNXrmuHMYa0Xig=";
+ sha256 = "QflLh3fj+jOq/8etr9aG8LGrvtIlB/htVkWbdO+GIbM=";
};
nativeBuildInputs = [
diff --git a/third_party/nixpkgs/pkgs/os-specific/linux/bpftools/default.nix b/third_party/nixpkgs/pkgs/os-specific/linux/bpftools/default.nix
index 3e20efa9f0..f2ca8d8747 100644
--- a/third_party/nixpkgs/pkgs/os-specific/linux/bpftools/default.nix
+++ b/third_party/nixpkgs/pkgs/os-specific/linux/bpftools/default.nix
@@ -12,7 +12,7 @@ stdenv.mkDerivation {
buildInputs = [ libopcodes libbfd libelf zlib readline ];
preConfigure = ''
- patchShebangs scripts/bpf_helpers_doc.py
+ patchShebangs scripts/bpf_doc.py
cd tools/bpf
substituteInPlace ./bpftool/Makefile \
diff --git a/third_party/nixpkgs/pkgs/os-specific/linux/bpftrace/default.nix b/third_party/nixpkgs/pkgs/os-specific/linux/bpftrace/default.nix
index 650e85df51..4d2f29491f 100644
--- a/third_party/nixpkgs/pkgs/os-specific/linux/bpftrace/default.nix
+++ b/third_party/nixpkgs/pkgs/os-specific/linux/bpftrace/default.nix
@@ -6,13 +6,13 @@
stdenv.mkDerivation rec {
pname = "bpftrace";
- version = "0.12.1";
+ version = "0.13.0";
src = fetchFromGitHub {
owner = "iovisor";
repo = "bpftrace";
rev = "v${version}";
- sha256 = "sha256-DZO47AH506DBVH/AuvOF3JfpRxv/D/lmzVg8WOH9Dqo=";
+ sha256 = "sha256-BKWBdFzj0j7rAfG30A0fwyYCpOG/5NFRPODW46EP1u0=";
};
buildInputs = with llvmPackages;
diff --git a/third_party/nixpkgs/pkgs/os-specific/linux/kernel/perf.nix b/third_party/nixpkgs/pkgs/os-specific/linux/kernel/perf.nix
index cc335aec4c..b58bca352e 100644
--- a/third_party/nixpkgs/pkgs/os-specific/linux/kernel/perf.nix
+++ b/third_party/nixpkgs/pkgs/os-specific/linux/kernel/perf.nix
@@ -1,12 +1,14 @@
{ lib, stdenv, kernel, elfutils, python2, python3, perl, newt, slang, asciidoc, xmlto, makeWrapper
, docbook_xsl, docbook_xml_dtd_45, libxslt, flex, bison, pkg-config, libunwind, binutils
, libiberty, audit, libbfd, libopcodes, openssl, systemtap, numactl
-, zlib, withGtk ? false, gtk2 ? null
+, zlib
+, withGtk ? false, gtk2
+, withZstd ? true, zstd
+, withLibcap ? true, libcap
}:
with lib;
-assert withGtk -> gtk2 != null;
assert versionAtLeast kernel.version "3.12";
stdenv.mkDerivation {
@@ -42,7 +44,9 @@ stdenv.mkDerivation {
elfutils newt slang libunwind libbfd zlib openssl systemtap.stapBuild numactl
libopcodes python3 perl
] ++ lib.optional withGtk gtk2
- ++ (if (versionAtLeast kernel.version "4.19") then [ python3 ] else [ python2 ]);
+ ++ (if (versionAtLeast kernel.version "4.19") then [ python3 ] else [ python2 ])
+ ++ lib.optional withZstd zstd
+ ++ lib.optional withLibcap libcap;
# Note: we don't add elfutils to buildInputs, since it provides a
# bad `ld' and other stuff.
@@ -55,8 +59,7 @@ stdenv.mkDerivation {
];
postPatch = ''
- patchShebangs scripts/bpf_helpers_doc.py
- patchShebangs scripts/bpf_doc.py
+ patchShebangs scripts
'';
doCheck = false; # requires "sparse"
diff --git a/third_party/nixpkgs/pkgs/os-specific/linux/zfs/default.nix b/third_party/nixpkgs/pkgs/os-specific/linux/zfs/default.nix
index 7d715cc3c0..7784aa8e03 100644
--- a/third_party/nixpkgs/pkgs/os-specific/linux/zfs/default.nix
+++ b/third_party/nixpkgs/pkgs/os-specific/linux/zfs/default.nix
@@ -195,12 +195,12 @@ in {
# to be adapted
zfsStable = common {
# check the release notes for compatible kernels
- kernelCompatible = kernel.kernelAtLeast "3.10" && kernel.kernelOlder "5.13";
+ kernelCompatible = kernel.kernelAtLeast "3.10" && kernel.kernelOlder "5.14";
# this package should point to the latest release.
- version = "2.0.5";
+ version = "2.1.0";
- sha256 = "0n0d8ab7ibxxa8znfsprh7jxwgighx5g291v7hi8272vfjrmk1mj";
+ sha256 = "sha256-YdY4SStXZGBBdAHdM3R/unco7ztxI3s0/buPSNSeh5o=";
};
zfsUnstable = common {
@@ -208,9 +208,9 @@ in {
kernelCompatible = kernel.kernelAtLeast "3.10" && kernel.kernelOlder "5.14";
# this package should point to a version / git revision compatible with the latest kernel release
- version = "2.1.0-rc8";
+ version = "2.1.0";
- sha256 = "0c53ca6xd59c30h3b2hmvyy63yqyk745x1kdfypnfqj3lnsj1pac";
+ sha256 = "sha256-YdY4SStXZGBBdAHdM3R/unco7ztxI3s0/buPSNSeh5o=";
isUnstable = true;
};
diff --git a/third_party/nixpkgs/pkgs/servers/coturn/default.nix b/third_party/nixpkgs/pkgs/servers/coturn/default.nix
index 73b1ba0184..d076f763bf 100644
--- a/third_party/nixpkgs/pkgs/servers/coturn/default.nix
+++ b/third_party/nixpkgs/pkgs/servers/coturn/default.nix
@@ -8,6 +8,7 @@
, libprom
, libpromhttp
, libmicrohttpd
+, nixosTests
}:
stdenv.mkDerivation rec {
@@ -34,6 +35,8 @@ stdenv.mkDerivation rec {
./pure-configure.patch
];
+ passthru.tests.coturn = nixosTests.coturn;
+
meta = with lib; {
homepage = "https://coturn.net/";
license = with licenses; [ bsd3 ];
diff --git a/third_party/nixpkgs/pkgs/servers/http/gitlab-pages/default.nix b/third_party/nixpkgs/pkgs/servers/http/gitlab-pages/default.nix
index a26dd47e02..c62ad8b75c 100644
--- a/third_party/nixpkgs/pkgs/servers/http/gitlab-pages/default.nix
+++ b/third_party/nixpkgs/pkgs/servers/http/gitlab-pages/default.nix
@@ -2,16 +2,16 @@
buildGoModule rec {
pname = "gitlab-pages";
- version = "1.39.0";
+ version = "1.40.0";
src = fetchFromGitLab {
owner = "gitlab-org";
repo = "gitlab-pages";
rev = "v${version}";
- sha256 = "sha256-eyg2o/5k7/zagYjkYJOnJrHeoszbRkmdl7UgO+rmKyc=";
+ sha256 = "sha256-RgWDAvuxqZeFCU+Q2s+FDIM/AroIdnfVq/D5lG4XN7U=";
};
- vendorSha256 = "sha256-aedJ7vsv70aybjqBfUnSr4qhlFdY7jUUOSas3vXskpM=";
+ vendorSha256 = "sha256-HbMM0IHw1DMDlNN1m2EHaG9CXnj9j9xROPQiT2xTGlM=";
subPackages = [ "." ];
meta = with lib; {
diff --git a/third_party/nixpkgs/pkgs/servers/ldap/389/default.nix b/third_party/nixpkgs/pkgs/servers/ldap/389/default.nix
index 2e825dc961..34bb901f67 100644
--- a/third_party/nixpkgs/pkgs/servers/ldap/389/default.nix
+++ b/third_party/nixpkgs/pkgs/servers/ldap/389/default.nix
@@ -85,7 +85,7 @@ stdenv.mkDerivation rec {
six
pyasn1
pyasn1-modules
- dateutil
+ python-dateutil
argcomplete
libselinux
]))
diff --git a/third_party/nixpkgs/pkgs/servers/mail/mailman/hyperkitty.nix b/third_party/nixpkgs/pkgs/servers/mail/mailman/hyperkitty.nix
index 99eae786cb..33d31fb8e7 100644
--- a/third_party/nixpkgs/pkgs/servers/mail/mailman/hyperkitty.nix
+++ b/third_party/nixpkgs/pkgs/servers/mail/mailman/hyperkitty.nix
@@ -1,6 +1,6 @@
{ lib, buildPythonPackage, fetchPypi, isPy3k, isort, coverage, mock
, robot-detection, django_extensions, rjsmin, cssmin, django-mailman3
-, django-haystack, flufl_lock, networkx, dateutil, defusedxml
+, django-haystack, flufl_lock, networkx, python-dateutil, defusedxml
, django-paintstore, djangorestframework, django, django-q
, django_compressor, beautifulsoup4, six, psycopg2, whoosh, elasticsearch
}:
@@ -20,7 +20,7 @@ buildPythonPackage rec {
nativeBuildInputs = [ isort ];
propagatedBuildInputs = [
robot-detection django_extensions rjsmin cssmin django-mailman3
- django-haystack flufl_lock networkx dateutil defusedxml
+ django-haystack flufl_lock networkx python-dateutil defusedxml
django-paintstore djangorestframework django django-q
django_compressor six psycopg2 isort
];
diff --git a/third_party/nixpkgs/pkgs/servers/pinnwand/default.nix b/third_party/nixpkgs/pkgs/servers/pinnwand/default.nix
index 3962ce9711..f8e3dfbc01 100644
--- a/third_party/nixpkgs/pkgs/servers/pinnwand/default.nix
+++ b/third_party/nixpkgs/pkgs/servers/pinnwand/default.nix
@@ -21,7 +21,8 @@ with python3.pkgs; buildPythonApplication rec {
substituteInPlace pyproject.toml \
--replace 'click = "^7.0"' 'click = "*"' \
--replace 'docutils = "^0.16"' 'docutils = "*"' \
- --replace 'sqlalchemy = "^1.3"' 'sqlalchemy = "*"'
+ --replace 'sqlalchemy = "^1.3"' 'sqlalchemy = "*"' \
+ --replace 'token-bucket = "^0.2.0"' 'token-bucket = "*"'
'';
nativeBuildInputs = [
diff --git a/third_party/nixpkgs/pkgs/servers/sip/freeswitch/default.nix b/third_party/nixpkgs/pkgs/servers/sip/freeswitch/default.nix
index d7611baad1..98a1223d27 100644
--- a/third_party/nixpkgs/pkgs/servers/sip/freeswitch/default.nix
+++ b/third_party/nixpkgs/pkgs/servers/sip/freeswitch/default.nix
@@ -1,4 +1,4 @@
-{ fetchFromGitHub, fetchpatch, stdenv, lib, pkg-config, autoreconfHook
+{ fetchFromGitHub, stdenv, lib, pkg-config, autoreconfHook
, ncurses, gnutls, readline
, openssl, perl, sqlite, libjpeg, speex, pcre, libuuid
, ldns, libedit, yasm, which, libsndfile, libtiff
@@ -88,21 +88,14 @@ in
stdenv.mkDerivation rec {
pname = "freeswitch";
- version = "1.10.5";
+ version = "1.10.6";
src = fetchFromGitHub {
owner = "signalwire";
repo = pname;
rev = "v${version}";
- sha256 = "18dhyb19k28dcm1i8mhqvvgm2phsrmrwyjmfn79glk8pdlalvcha";
+ sha256 = "1i5n06pds3kvzhhzfwvhwxnvcb2p2fcr8k52157aplm2i7prl4q2";
};
- patches = [
- # https://github.com/signalwire/freeswitch/pull/812 fix mod_spandsp, mod_gsmopen build, drop when updating from 1.10.5
- (fetchpatch {
- url = "https://github.com/signalwire/freeswitch/commit/51fba83ed3ed2d9753d8e6b13e13001aca50b493.patch";
- sha256 = "0h2bmifsyyasxjka3pczbmqym1chvz91fmb589njrdbwpkjyvqh3";
- })
- ];
postPatch = ''
patchShebangs libs/libvpx/build/make/rtcd.pl
substituteInPlace libs/libvpx/build/make/configure.sh \
@@ -117,10 +110,11 @@ stdenv.mkDerivation rec {
done
'';
- nativeBuildInputs = [ pkg-config autoreconfHook ];
+ strictDeps = true;
+ nativeBuildInputs = [ pkg-config autoreconfHook perl which yasm ];
buildInputs = [
- openssl ncurses gnutls readline perl libjpeg
- sqlite pcre speex ldns libedit yasm which
+ openssl ncurses gnutls readline libjpeg
+ sqlite pcre speex ldns libedit
libsndfile libtiff
libuuid
]
diff --git a/third_party/nixpkgs/pkgs/servers/sql/postgresql/ext/postgis.nix b/third_party/nixpkgs/pkgs/servers/sql/postgresql/ext/postgis.nix
index 81f3f4fee2..4b69aca710 100644
--- a/third_party/nixpkgs/pkgs/servers/sql/postgresql/ext/postgis.nix
+++ b/third_party/nixpkgs/pkgs/servers/sql/postgresql/ext/postgis.nix
@@ -15,13 +15,13 @@
}:
stdenv.mkDerivation rec {
pname = "postgis";
- version = "3.1.2";
+ version = "3.1.3";
outputs = [ "out" "doc" ];
src = fetchurl {
url = "https://download.osgeo.org/postgis/source/postgis-${version}.tar.gz";
- sha256 = "0ch7gry8a1i9114mlhklxryn7ja3flsz6pxj9r5p09k92xh3gp9c";
+ sha256 = "1jwz6hdrym837b7dvn00qmwnbb40a7gr43va409h8fmp7dajksbi";
};
buildInputs = [ libxml2 postgresql geos proj gdal json_c protobufc ]
diff --git a/third_party/nixpkgs/pkgs/servers/teleport/default.nix b/third_party/nixpkgs/pkgs/servers/teleport/default.nix
index d898cc9bcc..ad96798133 100644
--- a/third_party/nixpkgs/pkgs/servers/teleport/default.nix
+++ b/third_party/nixpkgs/pkgs/servers/teleport/default.nix
@@ -11,14 +11,14 @@ in
buildGoModule rec {
pname = "teleport";
- version = "6.2.5";
+ version = "6.2.7";
# This repo has a private submodule "e" which fetchgit cannot handle without failing.
src = fetchFromGitHub {
owner = "gravitational";
repo = "teleport";
rev = "v${version}";
- sha256 = "sha256-OBo1TWN7KxI7DAUcRLwXXQjErhhgpLBrJBR55ewKiYw=";
+ sha256 = "0ychs2pqi3awbr0vraz0ksddwk5hihrd1d9raq8mxyw5dz5124ki";
};
vendorSha256 = null;
diff --git a/third_party/nixpkgs/pkgs/servers/web-apps/searx/default.nix b/third_party/nixpkgs/pkgs/servers/web-apps/searx/default.nix
index 3ba6f32704..afcded3111 100644
--- a/third_party/nixpkgs/pkgs/servers/web-apps/searx/default.nix
+++ b/third_party/nixpkgs/pkgs/servers/web-apps/searx/default.nix
@@ -33,7 +33,7 @@ toPythonModule (buildPythonApplication rec {
propagatedBuildInputs = [
Babel
certifi
- dateutil
+ python-dateutil
flask
flaskbabel
gevent
diff --git a/third_party/nixpkgs/pkgs/servers/x11/xorg/xwayland.nix b/third_party/nixpkgs/pkgs/servers/x11/xorg/xwayland.nix
index 46d7ebfd85..c16391a3c5 100644
--- a/third_party/nixpkgs/pkgs/servers/x11/xorg/xwayland.nix
+++ b/third_party/nixpkgs/pkgs/servers/x11/xorg/xwayland.nix
@@ -32,6 +32,7 @@
, stdenv
, wayland
, wayland-protocols
+, wayland-scanner
, xkbcomp
, xkeyboard_config
, xorgproto
@@ -47,7 +48,16 @@ stdenv.mkDerivation rec {
url = "mirror://xorg/individual/xserver/${pname}-${version}.tar.xz";
sha256 = "sha256-MfJhzlG77namyj7AKqNn/6K176K5hBLfV8zv16GQA84=";
};
- nativeBuildInputs = [ pkg-config meson ninja ];
+
+ depsBuildBuild = [
+ pkg-config
+ ];
+ nativeBuildInputs = [
+ pkg-config
+ meson
+ ninja
+ wayland-scanner
+ ];
buildInputs = [
egl-wayland
epoxy
diff --git a/third_party/nixpkgs/pkgs/tools/admin/awslogs/default.nix b/third_party/nixpkgs/pkgs/tools/admin/awslogs/default.nix
index d9fd55f32c..5b61e4828e 100644
--- a/third_party/nixpkgs/pkgs/tools/admin/awslogs/default.nix
+++ b/third_party/nixpkgs/pkgs/tools/admin/awslogs/default.nix
@@ -12,7 +12,7 @@ python3Packages.buildPythonApplication rec {
};
propagatedBuildInputs = with python3Packages; [
- boto3 termcolor dateutil docutils setuptools jmespath
+ boto3 termcolor python-dateutil docutils setuptools jmespath
];
checkInputs = [ python3Packages.pytestCheckHook ];
diff --git a/third_party/nixpkgs/pkgs/tools/admin/eksctl/default.nix b/third_party/nixpkgs/pkgs/tools/admin/eksctl/default.nix
index 32049fd11b..9af721f02e 100644
--- a/third_party/nixpkgs/pkgs/tools/admin/eksctl/default.nix
+++ b/third_party/nixpkgs/pkgs/tools/admin/eksctl/default.nix
@@ -2,16 +2,16 @@
buildGoModule rec {
pname = "eksctl";
- version = "0.54.0";
+ version = "0.55.0";
src = fetchFromGitHub {
owner = "weaveworks";
repo = pname;
rev = version;
- sha256 = "sha256-hWrSjkEdhb0F5lwFGwjkR2G6gQ8T8HommH2lxJE+0bk=";
+ sha256 = "sha256-5PrwOR70pSmNPHFSDHRvXNn0pksIQun5jJkcCFsYhCE=";
};
- vendorSha256 = "sha256-499c3Y9IUV8lc+O9qcEeFKQDT4QDvOPmu0rmps7M47w=";
+ vendorSha256 = "sha256-N2jdaz0lb4Ut8P+FgNNjgyUeJ731fTQ5XSQgOF8KCQs=";
doCheck = false;
diff --git a/third_party/nixpkgs/pkgs/tools/admin/exoscale-cli/default.nix b/third_party/nixpkgs/pkgs/tools/admin/exoscale-cli/default.nix
index d6b264a4aa..7136fecf43 100644
--- a/third_party/nixpkgs/pkgs/tools/admin/exoscale-cli/default.nix
+++ b/third_party/nixpkgs/pkgs/tools/admin/exoscale-cli/default.nix
@@ -2,13 +2,13 @@
buildGoPackage rec {
pname = "exoscale-cli";
- version = "1.32.2";
+ version = "1.34.0";
src = fetchFromGitHub {
owner = "exoscale";
repo = "cli";
rev = "v${version}";
- sha256 = "sha256-Yx+GA959AB6m62hDlZKYjsuT9Y9TJbIdzUVBMM8OgTg=";
+ sha256 = "sha256-Gu9o1aUDlhcEZPZZsfVF0FnlzT1DvbEXMXjnOxhY8tY=";
};
goPackagePath = "github.com/exoscale/cli";
diff --git a/third_party/nixpkgs/pkgs/tools/admin/oci-cli/default.nix b/third_party/nixpkgs/pkgs/tools/admin/oci-cli/default.nix
index 8996ef5069..729f0aa8fd 100644
--- a/third_party/nixpkgs/pkgs/tools/admin/oci-cli/default.nix
+++ b/third_party/nixpkgs/pkgs/tools/admin/oci-cli/default.nix
@@ -33,7 +33,7 @@ python3Packages.buildPythonApplication rec {
};
propagatedBuildInputs = with python3Packages; [
- oci arrow certifi pinned_click configparser cryptography jmespath dateutil
+ oci arrow certifi pinned_click configparser cryptography jmespath python-dateutil
pytz retrying six terminaltables pyopenssl pyyaml
];
diff --git a/third_party/nixpkgs/pkgs/tools/backup/btrbk/default.nix b/third_party/nixpkgs/pkgs/tools/backup/btrbk/default.nix
index c619a69c11..4b4dadd4fa 100644
--- a/third_party/nixpkgs/pkgs/tools/backup/btrbk/default.nix
+++ b/third_party/nixpkgs/pkgs/tools/backup/btrbk/default.nix
@@ -1,5 +1,5 @@
{ lib, stdenv, fetchurl, bash, btrfs-progs, openssh, perl, perlPackages
-, util-linux, asciidoc, asciidoctor, mbuffer, makeWrapper }:
+, util-linux, asciidoc, asciidoctor, mbuffer, makeWrapper, nixosTests }:
stdenv.mkDerivation rec {
pname = "btrbk";
@@ -35,6 +35,8 @@ stdenv.mkDerivation rec {
--prefix PATH ':' "${lib.makeBinPath [ btrfs-progs bash mbuffer openssh ]}"
'';
+ passthru.tests.btrbk = nixosTests.btrbk;
+
meta = with lib; {
description = "A backup tool for btrfs subvolumes";
homepage = "https://digint.ch/btrbk";
diff --git a/third_party/nixpkgs/pkgs/tools/backup/tarsnapper/default.nix b/third_party/nixpkgs/pkgs/tools/backup/tarsnapper/default.nix
index b02ce82291..a5ad2c3625 100644
--- a/third_party/nixpkgs/pkgs/tools/backup/tarsnapper/default.nix
+++ b/third_party/nixpkgs/pkgs/tools/backup/tarsnapper/default.nix
@@ -17,7 +17,7 @@ python3Packages.buildPythonApplication rec {
py.test .
'';
- propagatedBuildInputs = with python3Packages; [ pyyaml dateutil pexpect ];
+ propagatedBuildInputs = with python3Packages; [ pyyaml python-dateutil pexpect ];
patches = [ ./remove-argparse.patch ];
diff --git a/third_party/nixpkgs/pkgs/tools/filesystems/ceph/default.nix b/third_party/nixpkgs/pkgs/tools/filesystems/ceph/default.nix
index 72de0295c7..0ccc96ce18 100644
--- a/third_party/nixpkgs/pkgs/tools/filesystems/ceph/default.nix
+++ b/third_party/nixpkgs/pkgs/tools/filesystems/ceph/default.nix
@@ -132,7 +132,7 @@ let
ps.cherrypy
ps.cmd2
ps.colorama
- ps.dateutil
+ ps.python-dateutil
ps.jsonpatch
ps.pecan
ps.prettytable
diff --git a/third_party/nixpkgs/pkgs/tools/graphics/gifsicle/default.nix b/third_party/nixpkgs/pkgs/tools/graphics/gifsicle/default.nix
index c05a552f20..b200f487b2 100644
--- a/third_party/nixpkgs/pkgs/tools/graphics/gifsicle/default.nix
+++ b/third_party/nixpkgs/pkgs/tools/graphics/gifsicle/default.nix
@@ -7,11 +7,11 @@ with lib;
stdenv.mkDerivation rec {
pname = "gifsicle";
- version = "1.92";
+ version = "1.93";
src = fetchurl {
url = "https://www.lcdf.org/gifsicle/${pname}-${version}.tar.gz";
- sha256 = "0rffpzxcak19k6cngpxn73khvm3z1gswrqs90ycdzzb53p05ddas";
+ sha256 = "sha256-kvZweXMr9MHaCH5q4JBSBYRuWsd3ulyqZtEqc6qUNEc=";
};
buildInputs = optionals gifview [ xorgproto libXt libX11 ];
diff --git a/third_party/nixpkgs/pkgs/tools/inputmethods/ibus-engines/ibus-rime/default.nix b/third_party/nixpkgs/pkgs/tools/inputmethods/ibus-engines/ibus-rime/default.nix
index d444d44f23..af3fcbe4e2 100644
--- a/third_party/nixpkgs/pkgs/tools/inputmethods/ibus-engines/ibus-rime/default.nix
+++ b/third_party/nixpkgs/pkgs/tools/inputmethods/ibus-engines/ibus-rime/default.nix
@@ -1,36 +1,36 @@
-{ lib, stdenv, fetchFromGitHub, cmake, pkg-config, gdk-pixbuf, glib, ibus, libnotify
-, librime, brise }:
+{ lib
+, stdenv
+, fetchFromGitHub
+, cmake
+, gdk-pixbuf
+, glib
+, ibus
+, libnotify
+, librime
+, pkg-config
+, rime-data
+}:
stdenv.mkDerivation rec {
pname = "ibus-rime";
- version = "1.4.0";
+ version = "1.5.0";
src = fetchFromGitHub {
owner = "rime";
repo = "ibus-rime";
rev = version;
- sha256 = "0zbajz7i18vrqwdyclzywvsjg6qzaih64jhi3pkxp7mbw8jc5vhy";
+ sha256 = "0gdxg6ia0i31jn3cvh1nrsjga1j31hf8a2zfgg8rzn25chrfr319";
};
- buildInputs = [ gdk-pixbuf glib ibus libnotify librime brise ];
+ buildInputs = [ gdk-pixbuf glib ibus libnotify librime rime-data ];
nativeBuildInputs = [ cmake pkg-config ];
- makeFlags = [ "PREFIX=$(out)" ];
- dontUseCmakeConfigure = true;
+ cmakeFlags = [ "-DRIME_DATA_DIR=${rime-data}/share/rime-data" ];
prePatch = ''
- substituteInPlace Makefile \
- --replace 'cmake' 'cmake -DRIME_DATA_DIR=${brise}/share/rime-data'
-
- substituteInPlace rime_config.h \
- --replace '/usr' $out
-
- substituteInPlace rime_config.h \
- --replace 'IBUS_RIME_SHARED_DATA_DIR IBUS_RIME_INSTALL_PREFIX' \
- 'IBUS_RIME_SHARED_DATA_DIR "${brise}"'
-
- substituteInPlace rime.xml \
- --replace '/usr' $out
+ substituteInPlace CMakeLists.txt \
+ --replace 'DESTINATION "''${RIME_DATA_DIR}"' \
+ 'DESTINATION "''${CMAKE_INSTALL_DATADIR}/rime-data"'
'';
meta = with lib; {
diff --git a/third_party/nixpkgs/pkgs/tools/misc/apt-offline/default.nix b/third_party/nixpkgs/pkgs/tools/misc/apt-offline/default.nix
index 9c952cc7c3..3dc3fa1bbe 100644
--- a/third_party/nixpkgs/pkgs/tools/misc/apt-offline/default.nix
+++ b/third_party/nixpkgs/pkgs/tools/misc/apt-offline/default.nix
@@ -1,22 +1,39 @@
-{ lib, fetchFromGitHub, python3Packages }:
+{ lib, fetchFromGitHub, python3Packages, unstableGitUpdater, gnupg }:
python3Packages.buildPythonApplication rec {
- version = "1.8.1";
pname = "apt-offline";
+ version = "unstable-2021-04-11";
src = fetchFromGitHub {
owner = "rickysarraf";
repo = pname;
- rev = "v${version}";
- sha256 = "0k79d1d8jiwg1s684r05njmk1dz8gsb8a9bl4agz7m31snc11j84";
+ rev = "4e4b3281d004d1ece4833b7680e2b5b091402a03";
+ sha256 = "1lk4186h2wc8fphd592rhq7yj4kgc7jjawx4pjrs6pg4n0q32pl6";
};
+ postPatch = ''
+ substituteInPlace org.debian.apt.aptoffline.policy \
+ --replace /usr/bin/ "$out/bin"
+
+ substituteInPlace apt_offline_core/AptOfflineCoreLib.py \
+ --replace /usr/bin/gpgv "${gnupg}/bin/gpgv"
+ '';
+
+ preFixup = ''
+ rm "$out/bin/apt-offline-gui"
+ rm "$out/bin/apt-offline-gui-pkexec"
+ '';
+
doCheck = false;
- # Requires python-qt4 (feel free to get it working).
- preFixup = ''rm "$out/bin/apt-offline-gui"'';
+ pythonimportsCheck = [ "apt-offline" ];
+
+ passthru.updateScript = unstableGitUpdater {
+ url = "https://github.com/rickysarraf/apt-offline.git";
+ };
meta = with lib; {
+ homepage = "https://github.com/rickysarraf/apt-offline";
description = "Offline APT package manager";
license = licenses.gpl3;
maintainers = [ ];
diff --git a/third_party/nixpkgs/pkgs/tools/misc/barman/default.nix b/third_party/nixpkgs/pkgs/tools/misc/barman/default.nix
index da79110f9a..ef84981a9d 100644
--- a/third_party/nixpkgs/pkgs/tools/misc/barman/default.nix
+++ b/third_party/nixpkgs/pkgs/tools/misc/barman/default.nix
@@ -1,5 +1,5 @@
{ buildPythonApplication, fetchurl, lib
-, dateutil, argcomplete, argh, psycopg2, boto3
+, python-dateutil, argcomplete, argh, psycopg2, boto3
}:
buildPythonApplication rec {
@@ -12,7 +12,7 @@ buildPythonApplication rec {
sha256 = "Ts8I6tlP2GRp90OIIKXy+cRWWvUO3Sm86zq2dtVP5YE=";
};
- propagatedBuildInputs = [ dateutil argh psycopg2 boto3 argcomplete ];
+ propagatedBuildInputs = [ python-dateutil argh psycopg2 boto3 argcomplete ];
# Tests are not present in tarball
checkPhase = ''
diff --git a/third_party/nixpkgs/pkgs/tools/misc/broot/default.nix b/third_party/nixpkgs/pkgs/tools/misc/broot/default.nix
index d1f9ca80f7..a5c456c005 100644
--- a/third_party/nixpkgs/pkgs/tools/misc/broot/default.nix
+++ b/third_party/nixpkgs/pkgs/tools/misc/broot/default.nix
@@ -75,7 +75,7 @@ rustPlatform.buildRustPackage rec {
meta = with lib; {
description = "An interactive tree view, a fuzzy search, a balanced BFS descent and customizable commands";
homepage = "https://dystroy.org/broot/";
- maintainers = with maintainers; [ danieldk ];
+ maintainers = with maintainers; [ ];
license = with licenses; [ mit ];
};
}
diff --git a/third_party/nixpkgs/pkgs/tools/misc/goreleaser/default.nix b/third_party/nixpkgs/pkgs/tools/misc/goreleaser/default.nix
index f5ed58f84f..18c936befb 100644
--- a/third_party/nixpkgs/pkgs/tools/misc/goreleaser/default.nix
+++ b/third_party/nixpkgs/pkgs/tools/misc/goreleaser/default.nix
@@ -2,13 +2,13 @@
buildGoModule rec {
pname = "goreleaser";
- version = "0.172.0";
+ version = "0.172.1";
src = fetchFromGitHub {
owner = "goreleaser";
repo = pname;
rev = "v${version}";
- sha256 = "sha256-QHtxrdmtmvnyMmtpvbEw5VjGz2XN1iqHu+5dHS9yiNo=";
+ sha256 = "sha256-xTLNAcqvk5GDs9HsNvL+4SPeT8baFMg7J0yW+E8x+Gc=";
};
vendorSha256 = "sha256-Zd48I7e5zCbSXz5RVckMXQMpqvf6gAoajx5yLk2ODmU=";
diff --git a/third_party/nixpkgs/pkgs/tools/misc/infracost/default.nix b/third_party/nixpkgs/pkgs/tools/misc/infracost/default.nix
index 286bc4cbca..abe1872c67 100644
--- a/third_party/nixpkgs/pkgs/tools/misc/infracost/default.nix
+++ b/third_party/nixpkgs/pkgs/tools/misc/infracost/default.nix
@@ -2,16 +2,16 @@
buildGoModule rec {
pname = "infracost";
- version = "0.9.1";
+ version = "0.9.2";
src = fetchFromGitHub {
owner = "infracost";
rev = "v${version}";
repo = "infracost";
- sha256 = "sha256-3dR4NZ1PiMuHNO+xl3zxeBLPOZTLAbJ0VtYJNYpJuXI=";
+ sha256 = "sha256-TM+7Am5hoiRk/StAwCh5yAN1GKv3oPun38pvhArBoJg=";
};
- vendorSha256 = "sha256-YHewZsIiDPsgJVYwQX/FovlD+UzJflXy/0oglk8ZkKk=";
+ vendorSha256 = "sha256-6sMtM7MTFTDXwH8AKr5Dxq8rPqE92xzcWqBTixcPi+8=";
checkInputs = [ terraform ];
checkPhase = "make test";
diff --git a/third_party/nixpkgs/pkgs/tools/misc/mslink/default.nix b/third_party/nixpkgs/pkgs/tools/misc/mslink/default.nix
index 56354ff252..6db1ae3275 100644
--- a/third_party/nixpkgs/pkgs/tools/misc/mslink/default.nix
+++ b/third_party/nixpkgs/pkgs/tools/misc/mslink/default.nix
@@ -1,9 +1,9 @@
-{ stdenv
+{ gccStdenv
, lib
, fetchurl
}:
-stdenv.mkDerivation rec {
+gccStdenv.mkDerivation rec {
pname = "mslink";
version = "1.3";
@@ -17,6 +17,9 @@ stdenv.mkDerivation rec {
'';
installPhase = ''
+ if [[ "$(uname)" == "Darwin" ]]; then
+ mv mslink.exe mslink
+ fi
install -D mslink $out/bin/mslink
'';
diff --git a/third_party/nixpkgs/pkgs/tools/misc/onefetch/default.nix b/third_party/nixpkgs/pkgs/tools/misc/onefetch/default.nix
index a80fdd5686..6e7484a7e4 100644
--- a/third_party/nixpkgs/pkgs/tools/misc/onefetch/default.nix
+++ b/third_party/nixpkgs/pkgs/tools/misc/onefetch/default.nix
@@ -1,18 +1,26 @@
-{ fetchFromGitHub, rustPlatform, lib, stdenv, fetchpatch
-, CoreFoundation, libiconv, libresolv, Security }:
+{ fetchFromGitHub
+, rustPlatform
+, lib
+, stdenv
+, fetchpatch
+, CoreFoundation
+, libiconv
+, libresolv
+, Security
+}:
rustPlatform.buildRustPackage rec {
pname = "onefetch";
- version = "2.9.1";
+ version = "2.10.2";
src = fetchFromGitHub {
owner = "o2sh";
repo = pname;
rev = "v${version}";
- sha256 = "sha256-owa+HmzMXpLR7H1FssW4gQiVAQGJRXhcitgJj6pxJRc=";
+ sha256 = "sha256-lrRp01ZeK9bGn7L7SqAxJAU9qugpHnC06CWChhVPGGQ=";
};
- cargoSha256 = "sha256-Bn2FlRESuW83ouGPiBwvGkIB0uCDDG0hdhRfRBks/0Q=";
+ cargoSha256 = "sha256-vNa1OF1x/MCTo9B4DTDZNWyHTsOl7Za3EgjnpsL/gWg=";
buildInputs = lib.optionals stdenv.isDarwin [ CoreFoundation libiconv libresolv Security ];
@@ -20,6 +28,6 @@ rustPlatform.buildRustPackage rec {
description = "Git repository summary on your terminal";
homepage = "https://github.com/o2sh/onefetch";
license = licenses.mit;
- maintainers = with maintainers; [ Br1ght0ne kloenk ];
+ maintainers = with maintainers; [ Br1ght0ne kloenk SuperSandro2000 ];
};
}
diff --git a/third_party/nixpkgs/pkgs/tools/misc/pdd/default.nix b/third_party/nixpkgs/pkgs/tools/misc/pdd/default.nix
index 916f15c94c..8403a6c257 100644
--- a/third_party/nixpkgs/pkgs/tools/misc/pdd/default.nix
+++ b/third_party/nixpkgs/pkgs/tools/misc/pdd/default.nix
@@ -1,4 +1,4 @@
-{ lib, fetchFromGitHub, buildPythonApplication, dateutil }:
+{ lib, fetchFromGitHub, buildPythonApplication, python-dateutil }:
buildPythonApplication rec {
pname = "pdd";
@@ -13,7 +13,7 @@ buildPythonApplication rec {
format = "other";
- propagatedBuildInputs = [ dateutil ];
+ propagatedBuildInputs = [ python-dateutil ];
installFlags = [ "PREFIX=$(out)" ];
diff --git a/third_party/nixpkgs/pkgs/tools/misc/piston-cli/default.nix b/third_party/nixpkgs/pkgs/tools/misc/piston-cli/default.nix
index ec77007804..5e1ca0242b 100644
--- a/third_party/nixpkgs/pkgs/tools/misc/piston-cli/default.nix
+++ b/third_party/nixpkgs/pkgs/tools/misc/piston-cli/default.nix
@@ -9,7 +9,7 @@ python3Packages.buildPythonApplication rec {
sha256 = "qvDGVJcaMXUajdUQWl4W1dost8k0PsS9XX/o8uQrtfY=";
};
- propagatedBuildInputs = with python3Packages; [ rich prompt_toolkit requests pygments pyyaml ];
+ propagatedBuildInputs = with python3Packages; [ rich prompt_toolkit requests pygments pyyaml more-itertools ];
checkPhase = ''
$out/bin/piston --help > /dev/null
diff --git a/third_party/nixpkgs/pkgs/tools/misc/pubs/default.nix b/third_party/nixpkgs/pkgs/tools/misc/pubs/default.nix
index 3b6df828fd..36afc1d4cb 100644
--- a/third_party/nixpkgs/pkgs/tools/misc/pubs/default.nix
+++ b/third_party/nixpkgs/pkgs/tools/misc/pubs/default.nix
@@ -12,7 +12,7 @@ python3Packages.buildPythonApplication rec {
};
propagatedBuildInputs = with python3Packages; [
- argcomplete dateutil configobj feedparser bibtexparser pyyaml requests six
+ argcomplete python-dateutil configobj feedparser bibtexparser pyyaml requests six
beautifulsoup4
];
diff --git a/third_party/nixpkgs/pkgs/tools/networking/boundary/default.nix b/third_party/nixpkgs/pkgs/tools/networking/boundary/default.nix
index ab26a39035..5c9abf5789 100644
--- a/third_party/nixpkgs/pkgs/tools/networking/boundary/default.nix
+++ b/third_party/nixpkgs/pkgs/tools/networking/boundary/default.nix
@@ -2,7 +2,7 @@
stdenv.mkDerivation rec {
pname = "boundary";
- version = "0.3.0";
+ version = "0.4.0";
src =
let
@@ -14,9 +14,9 @@ stdenv.mkDerivation rec {
x86_64-darwin = "darwin_amd64";
};
sha256 = selectSystem {
- x86_64-linux = "sha256-vBXNDd9p9g1joBMcwt87uI/EIAeKa+QrndCh1kTwZyM=";
- aarch64-linux = "sha256-Xompe1Q8Q3gAqpQQT04CWDx/f0Yc8HbnkZQbN+faB0g=";
- x86_64-darwin = "sha256-cE4YrZPNAldCR31O3gI4W/y4RgV7+64yL15obb5uRcY=";
+ x86_64-linux = "sha256-xHvg2Kdm7hoJ7Dwh4pLXJE+EPcl9Zta/00IN3wRnOzU=";
+ aarch64-linux = "sha256-Kbr7tZjVcYiejy1CB9r10mqG+0serRx+mjPXds2/TJQ=";
+ x86_64-darwin = "sha256-a8e3gKTTsK5QRAYrB4/DtrFFGM2In73wKEcEMcbeUTI=";
};
in
fetchzip {
diff --git a/third_party/nixpkgs/pkgs/tools/networking/cloud-custodian/default.nix b/third_party/nixpkgs/pkgs/tools/networking/cloud-custodian/default.nix
index a57d9f13d7..c5e1f7527d 100644
--- a/third_party/nixpkgs/pkgs/tools/networking/cloud-custodian/default.nix
+++ b/third_party/nixpkgs/pkgs/tools/networking/cloud-custodian/default.nix
@@ -3,7 +3,7 @@
, boto3
, botocore
, certifi
-, dateutil
+, python-dateutil
, jsonpatch
, jsonschema
, pyyaml
@@ -26,7 +26,7 @@ buildPythonApplication rec {
boto3
botocore
certifi
- dateutil
+ python-dateutil
jsonpatch
jsonschema
pyyaml
diff --git a/third_party/nixpkgs/pkgs/tools/networking/s3cmd/default.nix b/third_party/nixpkgs/pkgs/tools/networking/s3cmd/default.nix
index 15f6ff3dfa..888d6a05c6 100644
--- a/third_party/nixpkgs/pkgs/tools/networking/s3cmd/default.nix
+++ b/third_party/nixpkgs/pkgs/tools/networking/s3cmd/default.nix
@@ -1,4 +1,4 @@
-{ lib, buildPythonApplication, fetchFromGitHub, python_magic, dateutil }:
+{ lib, buildPythonApplication, fetchFromGitHub, python_magic, python-dateutil }:
buildPythonApplication rec {
pname = "s3cmd";
@@ -11,7 +11,7 @@ buildPythonApplication rec {
sha256 = "0p6mbgai7f0c12pkw4s7d649gj1f8hywj60pscxvj9jsna3iifhs";
};
- propagatedBuildInputs = [ python_magic dateutil ];
+ propagatedBuildInputs = [ python_magic python-dateutil ];
dontUseSetuptoolsCheck = true;
diff --git a/third_party/nixpkgs/pkgs/tools/networking/stunnel/default.nix b/third_party/nixpkgs/pkgs/tools/networking/stunnel/default.nix
index f8b6c845a5..befc1c3c3e 100644
--- a/third_party/nixpkgs/pkgs/tools/networking/stunnel/default.nix
+++ b/third_party/nixpkgs/pkgs/tools/networking/stunnel/default.nix
@@ -2,11 +2,11 @@
stdenv.mkDerivation rec {
pname = "stunnel";
- version = "5.58";
+ version = "5.59";
src = fetchurl {
url = "https://www.stunnel.org/downloads/${pname}-${version}.tar.gz";
- sha256 = "d4c14cc096577edca3f6a2a59c2f51869e35350b3988018ddf808c88e5973b79";
+ sha256 = "sha256-E3d232vo8XAfHNWQt3eZMuEjR5+5HlGSFxwWeYgVzp8=";
# please use the contents of "https://www.stunnel.org/downloads/${name}.tar.gz.sha256",
# not the output of `nix-prefetch-url`
};
diff --git a/third_party/nixpkgs/pkgs/tools/package-management/cargo-outdated/default.nix b/third_party/nixpkgs/pkgs/tools/package-management/cargo-outdated/default.nix
index fe8f743c71..beb0404186 100644
--- a/third_party/nixpkgs/pkgs/tools/package-management/cargo-outdated/default.nix
+++ b/third_party/nixpkgs/pkgs/tools/package-management/cargo-outdated/default.nix
@@ -2,16 +2,16 @@
rustPlatform.buildRustPackage rec {
pname = "cargo-outdated";
- version = "0.9.15";
+ version = "0.9.17";
src = fetchFromGitHub {
owner = "kbknapp";
repo = pname;
rev = "v${version}";
- sha256 = "sha256-Cd0QWFeAAHSkeCVQvb+Fsg5nBoutV1k1kQpMkWpci2E=";
+ sha256 = "sha256-Ian/vXGoPHecguQUp2IUgdLW6Ll8OdCA2W0WmoYPDrI=";
};
- cargoSha256 = "sha256-VngJMDVKIV8+ODHia2U2gKKPKskyKiuKhSnO6NJsJHI=";
+ cargoSha256 = "sha256-eDu1dAs543AryUEsCY9COHrvuamQocCk0nBXDIdFmYs=";
nativeBuildInputs = [ pkg-config ];
buildInputs = [ openssl ]
diff --git a/third_party/nixpkgs/pkgs/tools/package-management/cargo-release/default.nix b/third_party/nixpkgs/pkgs/tools/package-management/cargo-release/default.nix
index bfe003c489..a8fc479570 100644
--- a/third_party/nixpkgs/pkgs/tools/package-management/cargo-release/default.nix
+++ b/third_party/nixpkgs/pkgs/tools/package-management/cargo-release/default.nix
@@ -2,16 +2,16 @@
rustPlatform.buildRustPackage rec {
pname = "cargo-release";
- version = "0.15.0";
+ version = "0.15.1";
src = fetchFromGitHub {
owner = "sunng87";
repo = "cargo-release";
rev = "v${version}";
- sha256 = "sha256-hEpPRAUPHz9lDTJLyDMUAS+dH6hlppvi3Bb3ahnYW9U=";
+ sha256 = "sha256-bCxfZFFmk1Y1Rs41yZXogIjsnZhS/TzkZNXOixbvONU=";
};
- cargoSha256 = "sha256-tOiralZWA21HBTxYWVB1LZH2ArfgY7HB45dVqHoXe/Q=";
+ cargoSha256 = "sha256-3wSy5WGBLC44Iy3yw2M1f1KpB8KHei+hHuqCGXutgi0=";
nativeBuildInputs = [ pkg-config ];
buildInputs = [ openssl ]
diff --git a/third_party/nixpkgs/pkgs/tools/package-management/nixops/azure-storage/default.nix b/third_party/nixpkgs/pkgs/tools/package-management/nixops/azure-storage/default.nix
index 6693a7464d..c6f3d71e98 100644
--- a/third_party/nixpkgs/pkgs/tools/package-management/nixops/azure-storage/default.nix
+++ b/third_party/nixpkgs/pkgs/tools/package-management/nixops/azure-storage/default.nix
@@ -4,7 +4,7 @@
, python
, azure-common
, futures
-, dateutil
+, python-dateutil
, requests
, isPy3k
}:
@@ -19,7 +19,7 @@ buildPythonPackage rec {
sha256 = "06bmw6k2000kln5jwk5r9bgcalqbyvqirmdh9gq4s6nb4fv3c0jb";
};
- propagatedBuildInputs = [ azure-common dateutil requests ]
+ propagatedBuildInputs = [ azure-common python-dateutil requests ]
++ pkgs.lib.optionals (!isPy3k) [ futures ];
postInstall = ''
diff --git a/third_party/nixpkgs/pkgs/tools/security/cfssl/default.nix b/third_party/nixpkgs/pkgs/tools/security/cfssl/default.nix
index e92fe7b951..6ef07c2c35 100644
--- a/third_party/nixpkgs/pkgs/tools/security/cfssl/default.nix
+++ b/third_party/nixpkgs/pkgs/tools/security/cfssl/default.nix
@@ -2,13 +2,13 @@
buildGoModule rec {
pname = "cfssl";
- version = "1.5.0";
+ version = "1.6.0";
src = fetchFromGitHub {
owner = "cloudflare";
repo = "cfssl";
rev = "v${version}";
- sha256 = "1yzxz2l7h2d3f8j6l9xlm7g9659gsa17zf4q0883s0jh3l3xgs5n";
+ sha256 = "sha256-29HEaW5LCoHcuJrfVUN2hnsRtaSTrvIBo8ok2UJbfuQ=";
};
subPackages = [
diff --git a/third_party/nixpkgs/pkgs/tools/security/lynis/default.nix b/third_party/nixpkgs/pkgs/tools/security/lynis/default.nix
index b2ef8d8354..094aab1e86 100644
--- a/third_party/nixpkgs/pkgs/tools/security/lynis/default.nix
+++ b/third_party/nixpkgs/pkgs/tools/security/lynis/default.nix
@@ -2,13 +2,13 @@
stdenv.mkDerivation rec {
pname = "lynis";
- version = "3.0.4";
+ version = "3.0.5";
src = fetchFromGitHub {
owner = "CISOfy";
repo = pname;
rev = version;
- sha256 = "sha256-/pF1V8ZsylQOCW7K/O0R3HYYDdsdNDVmmUar21EzpcQ=";
+ sha256 = "sha256-IJCLj3iSPkfkYOqTu7adtU26jTgKfRmiwIfKvSApdIY=";
};
nativeBuildInputs = [ installShellFiles makeWrapper ];
diff --git a/third_party/nixpkgs/pkgs/tools/security/sn0int/default.nix b/third_party/nixpkgs/pkgs/tools/security/sn0int/default.nix
index 5d1244e861..43a3901044 100644
--- a/third_party/nixpkgs/pkgs/tools/security/sn0int/default.nix
+++ b/third_party/nixpkgs/pkgs/tools/security/sn0int/default.nix
@@ -9,16 +9,16 @@
rustPlatform.buildRustPackage rec {
pname = "sn0int";
- version = "0.21.1";
+ version = "0.21.2";
src = fetchFromGitHub {
owner = "kpcyrd";
repo = pname;
rev = "v${version}";
- sha256 = "sha256-LjNOaqYGlhF0U+YxoLLmmXgxPa8f+t9BSm+qO23waaI=";
+ sha256 = "sha256-BKdi/o/A0fJBlcKTDTCX7uGkK6QR0S9hIn0DI3CN5Gg=";
};
- cargoSha256 = "sha256-ruK+qDIqrltNcErBnrcHdPfVKmwPwiPfq42A/el206c=";
+ cargoSha256 = "sha256-MeMTXwb5v4iUJQSViOraXAck7n6VlIW2Qa0qNUZWu1g=";
nativeBuildInputs = [
pkg-config
diff --git a/third_party/nixpkgs/pkgs/tools/security/sslscan/default.nix b/third_party/nixpkgs/pkgs/tools/security/sslscan/default.nix
index 29762fc527..4bd7a3ff22 100644
--- a/third_party/nixpkgs/pkgs/tools/security/sslscan/default.nix
+++ b/third_party/nixpkgs/pkgs/tools/security/sslscan/default.nix
@@ -6,13 +6,13 @@
stdenv.mkDerivation rec {
pname = "sslscan";
- version = "2.0.9";
+ version = "2.0.10";
src = fetchFromGitHub {
owner = "rbsec";
repo = "sslscan";
rev = version;
- sha256 = "0594svwz4pya0syibar0ahmi5zdjbwd5kg6hrlhfpmmslrsyli6m";
+ sha256 = "sha256-L6cNmvR6zy2tkMHh+LBsQ3VZDUr0tD5AlOEj+dTLV5k=";
};
buildInputs = [ openssl ];
diff --git a/third_party/nixpkgs/pkgs/tools/security/terrascan/default.nix b/third_party/nixpkgs/pkgs/tools/security/terrascan/default.nix
index 36ccb89dcf..5fd0578bc8 100644
--- a/third_party/nixpkgs/pkgs/tools/security/terrascan/default.nix
+++ b/third_party/nixpkgs/pkgs/tools/security/terrascan/default.nix
@@ -1,22 +1,22 @@
-{ buildGoModule
+{ lib
+, buildGoModule
, fetchFromGitHub
-, lib
}:
buildGoModule rec {
pname = "terrascan";
- version = "1.7.0";
+ version = "1.8.0";
src = fetchFromGitHub {
owner = "accurics";
repo = pname;
rev = "v${version}";
- sha256 = "sha256-P16CS1W42Q/glsB9G0kagB5oSgwLb5cGMvKFc9jzd8s=";
+ sha256 = "sha256-eCkinYJtZNf5Fo+LXu01cHRInA9CfDONvt1OIs3XJSk=";
};
- vendorSha256 = "sha256-22T7C4/ph3z+O1c9uC1p2xzg0JFV+TEdfy4iiIS4Y40=";
+ vendorSha256 = "sha256-eez/g0Np/vnSO6uvUA8vtqR3DEaKlBo6lyd9t25LE7s=";
- # tests want to download a vulnerable Terraform project
+ # Tests want to download a vulnerable Terraform project
doCheck = false;
meta = with lib; {
diff --git a/third_party/nixpkgs/pkgs/tools/security/traitor/default.nix b/third_party/nixpkgs/pkgs/tools/security/traitor/default.nix
index 2da9262709..e056b556aa 100644
--- a/third_party/nixpkgs/pkgs/tools/security/traitor/default.nix
+++ b/third_party/nixpkgs/pkgs/tools/security/traitor/default.nix
@@ -5,13 +5,13 @@
buildGoModule rec {
pname = "traitor";
- version = "0.0.7";
+ version = "0.0.8";
src = fetchFromGitHub {
owner = "liamg";
repo = pname;
rev = "v${version}";
- sha256 = "sha256-UuWJe4nVr87ab3yskqKxnclMg9EywlcgaM/WOREXD/c=";
+ sha256 = "sha256-eUeKkjSpKel6XH3/VVw/WPCG/Nq8BcZwMNFG9z9FUuU=";
};
vendorSha256 = null;
diff --git a/third_party/nixpkgs/pkgs/tools/security/bitwarden_rs/default.nix b/third_party/nixpkgs/pkgs/tools/security/vaultwarden/default.nix
similarity index 75%
rename from third_party/nixpkgs/pkgs/tools/security/bitwarden_rs/default.nix
rename to third_party/nixpkgs/pkgs/tools/security/vaultwarden/default.nix
index 2790a64349..4342c8f3ac 100644
--- a/third_party/nixpkgs/pkgs/tools/security/bitwarden_rs/default.nix
+++ b/third_party/nixpkgs/pkgs/tools/security/vaultwarden/default.nix
@@ -1,4 +1,4 @@
-{ lib, stdenv, rustPlatform, fetchFromGitHub, nixosTests
+{ lib, stdenv, rustPlatform, fetchFromGitHub, fetchurl, nixosTests
, pkg-config, openssl
, libiconv, Security, CoreServices
, dbBackend ? "sqlite", libmysqlclient, postgresql }:
@@ -7,16 +7,18 @@ let
featuresFlag = "--features ${dbBackend}";
in rustPlatform.buildRustPackage rec {
- pname = "bitwarden_rs";
- version = "1.20.0";
+ pname = "vaultwarden";
+ version = "1.22.1";
src = fetchFromGitHub {
owner = "dani-garcia";
repo = pname;
rev = version;
- sha256 = "1ncy4iwmdzdp8rv1gc5i4s1rp97d94n4l4bh08v6w4zdpx0zn8b9";
+ sha256 = "sha256-aXbnNO3mTAgE1yNx7YVDo1vPpO8ACZpBGHQ633fNZ3k=";
};
+ cargoSha256 = "sha256-SFzq3OU0a0s3zlEzUkqGdZb/knYafqDamLy4ghH4i8I=";
+
nativeBuildInputs = [ pkg-config ];
buildInputs = with lib; [ openssl ]
++ optionals stdenv.isDarwin [ libiconv Security CoreServices ]
@@ -25,7 +27,6 @@ in rustPlatform.buildRustPackage rec {
RUSTC_BOOTSTRAP = 1;
- cargoSha256 = "0vdi792bzqxj8g215r9r5anzs4qhqsm6sjzwpj1l9861bn7j4xsz";
cargoBuildFlags = [ featuresFlag ];
checkPhase = ''
@@ -35,11 +36,11 @@ in rustPlatform.buildRustPackage rec {
runHook postCheck
'';
- passthru.tests = nixosTests.bitwarden;
+ passthru.tests = nixosTests.vaultwarden;
meta = with lib; {
description = "Unofficial Bitwarden compatible server written in Rust";
- homepage = "https://github.com/dani-garcia/bitwarden_rs";
+ homepage = "https://github.com/dani-garcia/vaultwarden";
license = licenses.gpl3Only;
maintainers = with maintainers; [ msteen ];
};
diff --git a/third_party/nixpkgs/pkgs/tools/security/bitwarden_rs/vault.nix b/third_party/nixpkgs/pkgs/tools/security/vaultwarden/vault.nix
similarity index 73%
rename from third_party/nixpkgs/pkgs/tools/security/bitwarden_rs/vault.nix
rename to third_party/nixpkgs/pkgs/tools/security/vaultwarden/vault.nix
index 2b0855b821..49e7cc4f3b 100644
--- a/third_party/nixpkgs/pkgs/tools/security/bitwarden_rs/vault.nix
+++ b/third_party/nixpkgs/pkgs/tools/security/vaultwarden/vault.nix
@@ -1,7 +1,7 @@
{ lib, stdenv, fetchurl, nixosTests }:
stdenv.mkDerivation rec {
- pname = "bitwarden_rs-vault";
+ pname = "vaultwarden-vault";
version = "2.19.0";
src = fetchurl {
@@ -10,16 +10,16 @@ stdenv.mkDerivation rec {
};
buildCommand = ''
- mkdir -p $out/share/bitwarden_rs/
- cd $out/share/bitwarden_rs/
+ mkdir -p $out/share/vaultwarden/
+ cd $out/share/vaultwarden/
tar xf $src
mv web-vault vault
'';
- passthru.tests = nixosTests.bitwarden;
+ passthru.tests = nixosTests.vaultwarden;
meta = with lib; {
- description = "Integrates the web vault into bitwarden_rs";
+ description = "Integrates the web vault into vaultwarden";
homepage = "https://github.com/dani-garcia/bw_web_builds";
platforms = platforms.all;
license = licenses.gpl3Plus;
diff --git a/third_party/nixpkgs/pkgs/tools/system/rocm-smi/default.nix b/third_party/nixpkgs/pkgs/tools/system/rocm-smi/default.nix
index ac980e6c36..de9afdae29 100644
--- a/third_party/nixpkgs/pkgs/tools/system/rocm-smi/default.nix
+++ b/third_party/nixpkgs/pkgs/tools/system/rocm-smi/default.nix
@@ -46,7 +46,7 @@ stdenv.mkDerivation rec {
description = "System management interface for AMD GPUs supported by ROCm";
homepage = "https://github.com/RadeonOpenCompute/ROC-smi";
license = with licenses; [ mit ];
- maintainers = with maintainers; [ danieldk ];
+ maintainers = with maintainers; [ ];
platforms = [ "x86_64-linux" ];
};
}
diff --git a/third_party/nixpkgs/pkgs/tools/text/hottext/default.nix b/third_party/nixpkgs/pkgs/tools/text/hottext/default.nix
index 6d361f50f3..2e9d0a909a 100644
--- a/third_party/nixpkgs/pkgs/tools/text/hottext/default.nix
+++ b/third_party/nixpkgs/pkgs/tools/text/hottext/default.nix
@@ -67,7 +67,7 @@ in stdenv.mkDerivation rec {
nimFlags = [ "-d:release" ] ++ map (lib: "--path:${lib}/src") nimLibs;
- HOTTEXT_FONT_PATH = "${gentium}/share/fonts/truetype/GentiumPlus-R.ttf";
+ HOTTEXT_FONT_PATH = "${gentium}/share/fonts/truetype/GentiumPlus-Regular.ttf";
buildPhase = ''
runHook preBuild
diff --git a/third_party/nixpkgs/pkgs/tools/text/languagetool/default.nix b/third_party/nixpkgs/pkgs/tools/text/languagetool/default.nix
index 810e3feaa2..791d779bf8 100644
--- a/third_party/nixpkgs/pkgs/tools/text/languagetool/default.nix
+++ b/third_party/nixpkgs/pkgs/tools/text/languagetool/default.nix
@@ -2,11 +2,11 @@
stdenv.mkDerivation rec {
pname = "LanguageTool";
- version = "5.3";
+ version = "5.4";
src = fetchzip {
url = "https://www.languagetool.org/download/${pname}-${version}.zip";
- sha256 = "1km20ajqb65vkhkrf94zy5srcss66ix8padp7ng59pa8pj11wmi2";
+ sha256 = "sha256-2khadADfzwkW+J0uafPWJ6xUQRSQDm8seiBHueQGmKI=";
};
nativeBuildInputs = [ makeWrapper ];
buildInputs = [ jre ];
diff --git a/third_party/nixpkgs/pkgs/tools/wayland/wayland-proxy-virtwl/default.nix b/third_party/nixpkgs/pkgs/tools/wayland/wayland-proxy-virtwl/default.nix
new file mode 100644
index 0000000000..8673200172
--- /dev/null
+++ b/third_party/nixpkgs/pkgs/tools/wayland/wayland-proxy-virtwl/default.nix
@@ -0,0 +1,37 @@
+{ lib
+, fetchFromGitHub
+, ocamlPackages
+}:
+
+ocamlPackages.buildDunePackage rec {
+ pname = "wayland-proxy-virtwl";
+ version = "unstable-2021-04-15";
+
+ src = fetchFromGitHub {
+ owner = "talex5";
+ repo = pname;
+ rev = "09321a28f3d4c0fa7e41ebb3014106b62090b649";
+ sha256 = "03rc2jp5d2y9y7mfis6kk9gchd49gvq0jg6fq5gi9r21ckb4k5v4";
+ };
+
+ postPatch = ''
+ # no need to vendor
+ rm -r ocaml-wayland
+ '';
+
+ useDune2 = true;
+ minimumOCamlVersion = "4.08";
+
+ buildInputs = with ocamlPackages; [
+ wayland
+ cmdliner
+ logs
+ ];
+
+ meta = {
+ homepage = "https://github.com/talex5/wayland-virtwl-proxy";
+ description = "Proxy Wayland connections across a VM boundary";
+ license = lib.licenses.asl20;
+ maintainers = [ lib.maintainers.sternenseemann ];
+ };
+}
diff --git a/third_party/nixpkgs/pkgs/top-level/aliases.nix b/third_party/nixpkgs/pkgs/top-level/aliases.nix
index 5bfaed5ac4..d36f7e9719 100644
--- a/third_party/nixpkgs/pkgs/top-level/aliases.nix
+++ b/third_party/nixpkgs/pkgs/top-level/aliases.nix
@@ -88,6 +88,14 @@ mapAliases ({
bittorrentSync = throw "bittorrentSync has been deprecated by resilio-sync."; # added 2019-06-03
bittorrentSync14 = throw "bittorrentSync14 has been deprecated by resilio-sync."; # added 2019-06-03
bittorrentSync20 = throw "bittorrentSync20 has been deprecated by resilio-sync."; # added 2019-06-03
+
+ # bitwarden_rs renamed to vaultwarden with release 1.21.0 (2021-04-30)
+ bitwarden_rs = vaultwarden;
+ bitwarden_rs-sqlite = vaultwarden-sqlite;
+ bitwarden_rs-mysql = vaultwarden-mysql;
+ bitwarden_rs-postgresql = vaultwarden-postgresql;
+ bitwarden_rs-vault = vaultwarden-vault;
+
bs1770gain = throw "bs1770gain has been removed from nixpkgs, as it had no maintainer or reverse dependencies."; # added 2021-01-02
btc1 = throw "btc1 has been removed, it was abandoned by upstream"; # added 2020-11-03
buildPerlPackage = perlPackages.buildPerlPackage; # added 2018-10-12
diff --git a/third_party/nixpkgs/pkgs/top-level/all-packages.nix b/third_party/nixpkgs/pkgs/top-level/all-packages.nix
index 0143659d53..09340a575f 100644
--- a/third_party/nixpkgs/pkgs/top-level/all-packages.nix
+++ b/third_party/nixpkgs/pkgs/top-level/all-packages.nix
@@ -474,6 +474,8 @@ in
pkger = callPackage ../development/libraries/pkger { };
+ tapview = callPackage ../development/tools/tapview { };
+
run = callPackage ../development/tools/run { };
mod = callPackage ../development/tools/mod { };
@@ -1310,15 +1312,6 @@ in
inherit (nodePackages) bitwarden-cli;
- bitwarden_rs = callPackage ../tools/security/bitwarden_rs {
- inherit (darwin.apple_sdk.frameworks) Security CoreServices;
- };
- bitwarden_rs-sqlite = bitwarden_rs;
- bitwarden_rs-mysql = bitwarden_rs.override { dbBackend = "mysql"; };
- bitwarden_rs-postgresql = bitwarden_rs.override { dbBackend = "postgresql"; };
-
- bitwarden_rs-vault = callPackage ../tools/security/bitwarden_rs/vault.nix { };
-
bkyml = callPackage ../tools/misc/bkyml { };
blockbench-electron = callPackage ../applications/graphics/blockbench-electron { };
@@ -2301,6 +2294,8 @@ in
wayland-utils = callPackage ../tools/wayland/wayland-utils { };
+ wayland-proxy-virtwl = callPackage ../tools/wayland/wayland-proxy-virtwl { };
+
wev = callPackage ../tools/wayland/wev { };
wdomirror = callPackage ../tools/wayland/wdomirror { };
@@ -5307,9 +5302,7 @@ in
gnome-podcasts = callPackage ../applications/audio/gnome-podcasts { };
- gnome-photos = callPackage ../applications/graphics/gnome-photos {
- gegl = gegl_0_4;
- };
+ gnome-photos = callPackage ../applications/graphics/gnome-photos { };
gnokii = callPackage ../tools/misc/gnokii { };
@@ -7672,6 +7665,8 @@ in
otfcc = callPackage ../tools/misc/otfcc { };
+ otpclient = callPackage ../applications/misc/otpclient { };
+
otpw = callPackage ../os-specific/linux/otpw { };
ovftool = callPackage ../tools/virtualization/ovftool { };
@@ -15134,10 +15129,6 @@ in
};
gegl = callPackage ../development/libraries/gegl {
- inherit (darwin.apple_sdk.frameworks) OpenGL;
- };
-
- gegl_0_4 = callPackage ../development/libraries/gegl/4.0.nix {
inherit (darwin.apple_sdk.frameworks) OpenCL;
};
@@ -16040,6 +16031,8 @@ in
inherit (ocaml-ng.ocamlPackages) bap ocaml findlib ctypes;
};
+ libbaseencode = callPackage ../development/libraries/libbaseencode { };
+
libbass = (callPackage ../development/libraries/audio/libbass { }).bass;
libbass_fx = (callPackage ../development/libraries/audio/libbass { }).bass_fx;
@@ -16153,6 +16146,8 @@ in
libctemplate = callPackage ../development/libraries/libctemplate { };
+ libcotp = callPackage ../development/libraries/libcotp { };
+
libcouchbase = callPackage ../development/libraries/libcouchbase { };
libcue = callPackage ../development/libraries/libcue { };
@@ -20914,8 +20909,6 @@ in
dpdk-kmods = callPackage ../os-specific/linux/dpdk-kmods { };
- dpdk = throw "The dpdk driver has been renamed to dpdk-kmods.";
-
exfat-nofuse = callPackage ../os-specific/linux/exfat { };
evdi = callPackage ../os-specific/linux/evdi { };
@@ -22496,6 +22489,8 @@ in
redhat-official-fonts = callPackage ../data/fonts/redhat-official { };
+ rime-data = callPackage ../data/misc/rime-data { };
+
route159 = callPackage ../data/fonts/route159 { };
sampradaya = callPackage ../data/fonts/sampradaya { };
@@ -22802,7 +22797,7 @@ in
acd-cli = callPackage ../applications/networking/sync/acd_cli {
inherit (python3Packages)
- buildPythonApplication appdirs colorama dateutil
+ buildPythonApplication appdirs colorama python-dateutil
requests requests_toolbelt setuptools sqlalchemy fusepy;
};
@@ -24167,7 +24162,6 @@ in
gimp = callPackage ../applications/graphics/gimp {
autoreconfHook = buildPackages.autoreconfHook269;
- gegl = gegl_0_4;
lcms = lcms2;
inherit (darwin.apple_sdk.frameworks) AppKit Cocoa;
};
@@ -24180,7 +24174,6 @@ in
glimpse = callPackage ../applications/graphics/glimpse {
autoreconfHook = buildPackages.autoreconfHook269;
- gegl = gegl_0_4;
lcms = lcms2;
inherit (darwin.apple_sdk.frameworks) AppKit Cocoa;
};
@@ -25425,7 +25418,7 @@ in
inherit (darwin.apple_sdk.frameworks) ApplicationServices;
};
- mercurialFull = appendToName "full" (pkgs.mercurial.override { guiSupport = true; });
+ mercurialFull = appendToName "full" (pkgs.mercurial.override { fullBuild = true; });
merkaartor = libsForQt5.callPackage ../applications/misc/merkaartor { };
@@ -28980,6 +28973,8 @@ in
static = true;
};
};
+ openttd-grfcodec = callPackage ../games/openttd/grfcodec.nix {};
+ openttd-nml = callPackage ../games/openttd/nml.nix {};
opentyrian = callPackage ../games/opentyrian { };
@@ -31577,6 +31572,15 @@ in
vazir-code-font = callPackage ../data/fonts/vazir-code-font { };
+ vaultwarden = callPackage ../tools/security/vaultwarden {
+ inherit (darwin.apple_sdk.frameworks) Security CoreServices;
+ };
+ vaultwarden-sqlite = vaultwarden;
+ vaultwarden-mysql = vaultwarden.override { dbBackend = "mysql"; };
+ vaultwarden-postgresql = vaultwarden.override { dbBackend = "postgresql"; };
+
+ vaultwarden-vault = callPackage ../tools/security/vaultwarden/vault.nix { };
+
vazir-fonts = callPackage ../data/fonts/vazir-fonts { };
vbam = callPackage ../misc/emulators/vbam { };
diff --git a/third_party/nixpkgs/pkgs/top-level/python-aliases.nix b/third_party/nixpkgs/pkgs/top-level/python-aliases.nix
index 7ea3571162..124a9533dc 100644
--- a/third_party/nixpkgs/pkgs/top-level/python-aliases.nix
+++ b/third_party/nixpkgs/pkgs/top-level/python-aliases.nix
@@ -35,7 +35,9 @@ in
mapAliases ({
blockdiagcontrib-cisco = throw "blockdiagcontrib-cisco is not compatible with blockdiag 2.0.0 and has been removed."; # Added 2020-11-29
bugseverywhere = throw "bugseverywhere has been removed: Abandoned by upstream."; # Added 2019-11-27
+ dateutil = python-dateutil; # added 2021-07-03
detox = throw "detox is no longer maintained, and was broken since may 2019"; # added 2020-07-04
+ diff_cover = diff-cover; # added 2021-07-02
dns = dnspython; # Alias for compatibility, 2017-12-10
faulthandler = throw "faulthandler is built into ${python.executable}";
gitdb2 = throw "gitdb2 has been deprecated, use gitdb instead."; # added 2020-03-14
diff --git a/third_party/nixpkgs/pkgs/top-level/python-packages.nix b/third_party/nixpkgs/pkgs/top-level/python-packages.nix
index 5eac97ab18..0e804a5413 100644
--- a/third_party/nixpkgs/pkgs/top-level/python-packages.nix
+++ b/third_party/nixpkgs/pkgs/top-level/python-packages.nix
@@ -1905,8 +1905,6 @@ in {
devpi-common = callPackage ../development/python-modules/devpi-common { };
- dftfit = callPackage ../development/python-modules/dftfit { };
-
diagrams = callPackage ../development/python-modules/diagrams { };
diceware = callPackage ../development/python-modules/diceware { };
@@ -1921,7 +1919,7 @@ in {
dicttoxml = callPackage ../development/python-modules/dicttoxml { };
- diff_cover = callPackage ../development/python-modules/diff_cover { };
+ diff-cover = callPackage ../development/python-modules/diff-cover { };
diff-match-patch = callPackage ../development/python-modules/diff-match-patch { };
@@ -3914,8 +3912,6 @@ in {
labmath = callPackage ../development/python-modules/labmath { };
- lammps-cython = callPackage ../development/python-modules/lammps-cython { };
-
langcodes = callPackage ../development/python-modules/langcodes { };
langdetect = callPackage ../development/python-modules/langdetect { };
@@ -5235,6 +5231,8 @@ in {
phonenumbers = callPackage ../development/python-modules/phonenumbers { };
+ micloud = callPackage ../development/python-modules/micloud { };
+
netmap = callPackage ../development/python-modules/netmap { };
openapi-core = callPackage ../development/python-modules/openapi-core { };
@@ -6921,8 +6919,6 @@ in {
python-daemon = callPackage ../development/python-modules/python-daemon { };
python-dateutil = callPackage ../development/python-modules/dateutil { };
- # Alias that we should deprecate
- dateutil = self.python-dateutil;
python-dbusmock = callPackage ../development/python-modules/python-dbusmock { };
@@ -6998,6 +6994,10 @@ in {
python-louvain = callPackage ../development/python-modules/python-louvain { };
+ python-lsp-jsonrpc = callPackage ../development/python-modules/python-lsp-jsonrpc { };
+
+ python-lsp-server = callPackage ../development/python-modules/python-lsp-server { };
+
python-ly = callPackage ../development/python-modules/python-ly { };
python-lz4 = callPackage ../development/python-modules/python-lz4 { };