Merge master into haskell-updates

This commit is contained in:
github-actions[bot] 2022-10-15 00:20:09 +00:00 committed by GitHub
commit b4b0b7d41b
No known key found for this signature in database
GPG key ID: 4AEE18F83AFDEB23
271 changed files with 5098 additions and 727 deletions

33
.github/workflows/ofborg-pending.yml vendored Normal file
View file

@ -0,0 +1,33 @@
name: "Set pending OfBorg status"
on:
pull_request_target:
# Sets the ofborg-eval status to "pending" to signal that we are waiting for
# OfBorg even if it is running late. The status will be overwritten by OfBorg
# once it starts evaluation.
# WARNING:
# When extending this action, be aware that $GITHUB_TOKEN allows (restricted) write access to
# the GitHub repository. This means that it should not evaluate user input in a
# way that allows code injection.
permissions:
contents: read
jobs:
action:
if: github.repository_owner == 'NixOS'
permissions:
statuses: write
runs-on: ubuntu-latest
steps:
- name: "Set pending OfBorg status"
env:
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
run: |
curl \
-X POST \
-H "Accept: application/vnd.github.v3+json" \
-H "Authorization: Bearer $GITHUB_TOKEN" \
-d '{"context": "ofborg-eval", "state": "pending", "description": "Waiting for OfBorg..."}' \
"https://api.github.com/repos/NixOS/nixpkgs/commits/${{ github.event.pull_request.head.sha }}/statuses"

View file

@ -1,26 +0,0 @@
name: "clear pending status"
on:
check_suite:
types: [ completed ]
permissions:
contents: read
jobs:
action:
permissions:
statuses: write
runs-on: ubuntu-latest
steps:
- name: clear pending status
if: github.repository_owner == 'NixOS' && github.event.check_suite.app.name == 'OfBorg'
env:
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
run: |
curl \
-X POST \
-H "Accept: application/vnd.github.v3+json" \
-H "Authorization: token $GITHUB_TOKEN" \
-d '{"state": "success", "target_url": " ", "description": " ", "context": "Wait for ofborg"}' \
"https://api.github.com/repos/NixOS/nixpkgs/statuses/${{ github.event.check_suite.head_sha }}"

View file

@ -1,30 +0,0 @@
name: "set pending status"
on:
pull_request_target:
# WARNING:
# When extending this action, be aware that $GITHUB_TOKEN allows write access to
# the GitHub repository. This means that it should not evaluate user input in a
# way that allows code injection.
permissions:
contents: read
jobs:
action:
permissions:
statuses: write
runs-on: ubuntu-latest
steps:
- name: set pending status
if: github.repository_owner == 'NixOS'
env:
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
run: |
curl \
-X POST \
-H "Accept: application/vnd.github.v3+json" \
-H "Authorization: token $GITHUB_TOKEN" \
-d '{"state": "pending", "target_url": " ", "description": "This pending status will be cleared when ofborg starts eval.", "context": "Wait for ofborg"}' \
"https://api.github.com/repos/NixOS/nixpkgs/statuses/${{ github.event.pull_request.head.sha }}"

View file

@ -34,6 +34,8 @@ jobs:
--argstr keep-going true \
--argstr max-workers 2 \
--argstr path terraform-providers
- name: clean repo
run: |
git clean -f
- name: create PR
uses: peter-evans/create-pull-request@v4
@ -41,6 +43,8 @@ jobs:
body: |
Automatic update by [update-terraform-providers](https://github.com/NixOS/nixpkgs/blob/master/.github/workflows/update-terraform-providers.yml) action.
https://github.com/NixOS/nixpkgs/actions/runs/${{ github.run_id }}
Check that all providers build with:
```
@ofborg build terraform.full

View file

@ -4404,6 +4404,12 @@
name = "Fedx sudo";
matrix = "fedx:matrix.org";
};
fee1-dead = {
email = "ent3rm4n@gmail.com";
github = "fee1-dead";
githubId = 43851243;
name = "Deadbeef";
};
fehnomenal = {
email = "fehnomenal@fehn.systems";
github = "fehnomenal";
@ -12169,6 +12175,15 @@
githubId = 1940568;
name = "Sebastian Ball";
};
seberm = {
email = "seberm@seberm.com";
github = "seberm";
githubId = 212597;
name = "Otto Sabart";
keys = [{
fingerprint = "0AF6 4C3B 1F12 14B3 8C8C 5786 1FA2 DBE6 7438 7CC3";
}];
};
sebtm = {
email = "mail@sebastian-sellmeier.de";
github = "SebTM";

View file

@ -200,6 +200,10 @@ with lib;
type = lines;
description = lib.mdDoc ''
Extra configuration. Contents will be added verbatim to the configuration file.
::: {.note}
`daemon` should not be added here because it does not work great with the systemd-timer approach the service uses.
:::
'';
};
};

View file

@ -16,7 +16,7 @@
certain packets anyway, you can insert rules at the start of
this chain.
- nixos-fw-rpfilter is used as the main chain in the raw table,
- nixos-fw-rpfilter is used as the main chain in the mangle table,
called from the built-in PREROUTING chain. If the kernel
supports it and `cfg.checkReversePath` is set this chain will
perform a reverse path filter test.
@ -109,28 +109,28 @@ let
ip46tables -N nixos-fw
# Clean up rpfilter rules
ip46tables -t raw -D PREROUTING -j nixos-fw-rpfilter 2> /dev/null || true
ip46tables -t raw -F nixos-fw-rpfilter 2> /dev/null || true
ip46tables -t raw -X nixos-fw-rpfilter 2> /dev/null || true
ip46tables -t mangle -D PREROUTING -j nixos-fw-rpfilter 2> /dev/null || true
ip46tables -t mangle -F nixos-fw-rpfilter 2> /dev/null || true
ip46tables -t mangle -X nixos-fw-rpfilter 2> /dev/null || true
${optionalString (kernelHasRPFilter && (cfg.checkReversePath != false)) ''
# Perform a reverse-path test to refuse spoofers
# For now, we just drop, as the raw table doesn't have a log-refuse yet
ip46tables -t raw -N nixos-fw-rpfilter 2> /dev/null || true
ip46tables -t raw -A nixos-fw-rpfilter -m rpfilter --validmark ${optionalString (cfg.checkReversePath == "loose") "--loose"} -j RETURN
# For now, we just drop, as the mangle table doesn't have a log-refuse yet
ip46tables -t mangle -N nixos-fw-rpfilter 2> /dev/null || true
ip46tables -t mangle -A nixos-fw-rpfilter -m rpfilter --validmark ${optionalString (cfg.checkReversePath == "loose") "--loose"} -j RETURN
# Allows this host to act as a DHCP4 client without first having to use APIPA
iptables -t raw -A nixos-fw-rpfilter -p udp --sport 67 --dport 68 -j RETURN
iptables -t mangle -A nixos-fw-rpfilter -p udp --sport 67 --dport 68 -j RETURN
# Allows this host to act as a DHCPv4 server
iptables -t raw -A nixos-fw-rpfilter -s 0.0.0.0 -d 255.255.255.255 -p udp --sport 68 --dport 67 -j RETURN
iptables -t mangle -A nixos-fw-rpfilter -s 0.0.0.0 -d 255.255.255.255 -p udp --sport 68 --dport 67 -j RETURN
${optionalString cfg.logReversePathDrops ''
ip46tables -t raw -A nixos-fw-rpfilter -j LOG --log-level info --log-prefix "rpfilter drop: "
ip46tables -t mangle -A nixos-fw-rpfilter -j LOG --log-level info --log-prefix "rpfilter drop: "
''}
ip46tables -t raw -A nixos-fw-rpfilter -j DROP
ip46tables -t mangle -A nixos-fw-rpfilter -j DROP
ip46tables -t raw -A PREROUTING -j nixos-fw-rpfilter
ip46tables -t mangle -A PREROUTING -j nixos-fw-rpfilter
''}
# Accept all traffic on the trusted interfaces.
@ -218,7 +218,7 @@ let
ip46tables -D INPUT -j nixos-fw 2>/dev/null || true
${optionalString (kernelHasRPFilter && (cfg.checkReversePath != false)) ''
ip46tables -t raw -D PREROUTING -j nixos-fw-rpfilter 2>/dev/null || true
ip46tables -t mangle -D PREROUTING -j nixos-fw-rpfilter 2>/dev/null || true
''}
${cfg.extraStopCommands}

View file

@ -328,9 +328,6 @@ in {
config = mkIf (cfg.interfaces != {}) {
boot.extraModulePackages = optional (versionOlder kernel.kernel.version "5.6") kernel.wireguard;
environment.systemPackages = [ pkgs.wireguard-tools ];
# This is forced to false for now because the default "--validmark" rpfilter we apply on reverse path filtering
# breaks the wg-quick routing because wireguard packets leave with a fwmark from wireguard.
networking.firewall.checkReversePath = false;
systemd.services = mapAttrs' generateUnit cfg.interfaces;
# Prevent networkd from clearing the rules set by wg-quick when restarted (e.g. when waking up from suspend).

View file

@ -441,6 +441,7 @@ in {
non-default-filesystems = handleTest ./non-default-filesystems.nix {};
noto-fonts = handleTest ./noto-fonts.nix {};
novacomd = handleTestOn ["x86_64-linux"] ./novacomd.nix {};
nscd = handleTest ./nscd.nix {};
nsd = handleTest ./nsd.nix {};
nzbget = handleTest ./nzbget.nix {};
nzbhydra2 = handleTest ./nzbhydra2.nix {};
@ -531,7 +532,6 @@ in {
rasdaemon = handleTest ./rasdaemon.nix {};
redis = handleTest ./redis.nix {};
redmine = handleTest ./redmine.nix {};
resolv = handleTest ./resolv.nix {};
restartByActivationScript = handleTest ./restart-by-activation-script.nix {};
restic = handleTest ./restic.nix {};
retroarch = handleTest ./retroarch.nix {};

107
nixos/tests/nscd.nix Normal file
View file

@ -0,0 +1,107 @@
import ./make-test-python.nix ({ pkgs, ... }:
let
# build a getent that itself doesn't see anything in /etc/hosts and
# /etc/nsswitch.conf, by using libredirect to steer its own requests to
# /dev/null.
# This means is /has/ to go via nscd to actuallly resolve any of the
# additionally configured hosts.
getent' = pkgs.writeScript "getent-without-etc-hosts" ''
export NIX_REDIRECTS=/etc/hosts=/dev/null:/etc/nsswitch.conf=/dev/null
export LD_PRELOAD=${pkgs.libredirect}/lib/libredirect.so
exec getent $@
'';
in
{
name = "nscd";
nodes.machine = { pkgs, ... }: {
imports = [ common/user-account.nix ];
networking.extraHosts = ''
2001:db8::1 somehost.test
192.0.2.1 somehost.test
'';
specialisation = {
withUnscd.configuration = { ... }: {
services.nscd.package = pkgs.unscd;
};
};
};
testScript = { nodes, ... }:
let
specialisations = "${nodes.machine.system.build.toplevel}/specialisation";
in
''
# Regression test for https://github.com/NixOS/nixpkgs/issues/50273
def test_dynamic_user():
with subtest("DynamicUser actually allocates a user"):
assert "iamatest" in machine.succeed(
"systemd-run --pty --property=Type=oneshot --property=DynamicUser=yes --property=User=iamatest whoami"
)
# Test resolution of somehost.test with getent', to make sure we go via nscd
def test_host_lookups():
with subtest("host lookups via nscd"):
# ahosts
output = machine.succeed("${getent'} ahosts somehost.test")
assert "192.0.2.1" in output
assert "2001:db8::1" in output
# ahostsv4
output = machine.succeed("${getent'} ahostsv4 somehost.test")
assert "192.0.2.1" in output
assert "2001:db8::1" not in output
# ahostsv6
output = machine.succeed("${getent'} ahostsv6 somehost.test")
assert "192.0.2.1" not in output
assert "2001:db8::1" in output
# reverse lookups (hosts)
assert "somehost.test" in machine.succeed("${getent'} hosts 2001:db8::1")
assert "somehost.test" in machine.succeed("${getent'} hosts 192.0.2.1")
# Test host resolution via nss modules works
# We rely on nss-myhostname in this case, which resolves *.localhost and
# _gateway.
# We don't need to use getent' here, as non-glibc nss modules can only be
# discovered via nscd.
def test_nss_myhostname():
with subtest("nss-myhostname provides hostnames (ahosts)"):
# ahosts
output = machine.succeed("getent ahosts foobar.localhost")
assert "::1" in output
assert "127.0.0.1" in output
# ahostsv4
output = machine.succeed("getent ahostsv4 foobar.localhost")
assert "::1" not in output
assert "127.0.0.1" in output
# ahostsv6
output = machine.succeed("getent ahostsv6 foobar.localhost")
assert "::1" in output
assert "127.0.0.1" not in output
start_all()
machine.wait_for_unit("default.target")
# Test all tests with glibc-nscd.
test_dynamic_user()
test_host_lookups()
test_nss_myhostname()
with subtest("unscd"):
machine.succeed('${specialisations}/withUnscd/bin/switch-to-configuration test')
machine.wait_for_unit("default.target")
# known to fail, unscd doesn't load external NSS modules
# test_dynamic_user()
test_host_lookups()
# known to fail, unscd doesn't load external NSS modules
# test_nss_myhostname()
'';
})

View file

@ -1,46 +0,0 @@
# Test whether DNS resolving returns multiple records and all address families.
import ./make-test-python.nix ({ pkgs, ... } : {
name = "resolv";
meta = with pkgs.lib.maintainers; {
maintainers = [ ckauhaus ];
};
nodes.resolv = { ... }: {
networking.extraHosts = ''
# IPv4 only
192.0.2.1 host-ipv4.example.net
192.0.2.2 host-ipv4.example.net
# IP6 only
2001:db8::2:1 host-ipv6.example.net
2001:db8::2:2 host-ipv6.example.net
# dual stack
192.0.2.1 host-dual.example.net
192.0.2.2 host-dual.example.net
2001:db8::2:1 host-dual.example.net
2001:db8::2:2 host-dual.example.net
'';
};
testScript = ''
def addrs_in(hostname, addrs):
res = resolv.succeed("getent ahosts {}".format(hostname))
for addr in addrs:
assert addr in res, "Expected output '{}' not found in\n{}".format(addr, res)
start_all()
resolv.wait_for_unit("nscd")
ipv4 = ["192.0.2.1", "192.0.2.2"]
ipv6 = ["2001:db8::2:1", "2001:db8::2:2"]
with subtest("IPv4 resolves"):
addrs_in("host-ipv4.example.net", ipv4)
with subtest("IPv6 resolves"):
addrs_in("host-ipv6.example.net", ipv6)
with subtest("Dual stack resolves"):
addrs_in("host-dual.example.net", ipv4 + ipv6)
'';
})

View file

@ -4,4 +4,5 @@
{
simple = import ./simple.nix { inherit system pkgs; };
encryption = import ./encryption.nix { inherit system pkgs; };
}

View file

@ -0,0 +1,33 @@
import ../make-test-python.nix ({ pkgs, ... }:
{
name = "stratis";
meta = with pkgs.lib.maintainers; {
maintainers = [ nickcao ];
};
nodes.machine = { pkgs, ... }: {
services.stratis.enable = true;
virtualisation.emptyDiskImages = [ 2048 ];
};
testScript =
let
testkey1 = pkgs.writeText "testkey1" "supersecret1";
testkey2 = pkgs.writeText "testkey2" "supersecret2";
in
''
machine.wait_for_unit("stratisd")
# test creation of encrypted pool and filesystem
machine.succeed("stratis key set testkey1 --keyfile-path ${testkey1}")
machine.succeed("stratis key set testkey2 --keyfile-path ${testkey2}")
machine.succeed("stratis pool create testpool /dev/vdb --key-desc testkey1")
machine.succeed("stratis fs create testpool testfs")
# test rebinding encrypted pool
machine.succeed("stratis pool rebind keyring testpool testkey2")
# test restarting encrypted pool
uuid = machine.succeed("stratis pool list | grep -oE '[0-9a-fA-F-]{36}'").rstrip('\n')
machine.succeed(" stratis pool stop testpool")
machine.succeed(f"stratis pool start {uuid} --unlock-method keyring")
'';
})

View file

@ -87,12 +87,6 @@ import ./make-test-python.nix ({ pkgs, ... }: {
machine.succeed("test -e /home/alice/user_conf_read")
machine.succeed("test -z $(ls -1 /var/log/journal)")
# Regression test for https://github.com/NixOS/nixpkgs/issues/50273
with subtest("DynamicUser actually allocates a user"):
assert "iamatest" in machine.succeed(
"systemd-run --pty --property=Type=oneshot --property=DynamicUser=yes --property=User=iamatest whoami"
)
with subtest("regression test for https://bugs.freedesktop.org/show_bug.cgi?id=77507"):
retcode, output = machine.execute("systemctl status testservice1.service")
assert retcode in [0, 3] # https://bugs.freedesktop.org/show_bug.cgi?id=77507

View file

@ -1,4 +1,4 @@
{ lib, stdenv, fetchFromGitHub, fetchpatch, makeWrapper, pkg-config, alsa-lib, dbus, libjack2
{ lib, stdenv, fetchFromGitHub, makeWrapper, pkg-config, alsa-lib, dbus, libjack2
, python3Packages , meson, ninja }:
stdenv.mkDerivation rec {

View file

@ -1,6 +1,5 @@
{ lib, stdenv
, fetchgit
, automake
, alsa-lib
, ladspaH
, libjack2

View file

@ -1,5 +1,4 @@
{ lib
, stdenv
, fetchFromGitHub
, meson
, ninja

View file

@ -1,6 +1,4 @@
{ lib
, a2jmidid
, coreutils
, libjack2
, fetchpatch
, fetchFromGitHub
@ -8,7 +6,6 @@
, pkg-config
, pulseaudioFull
, qtbase
, makeWrapper
, mkDerivation
, python3
}:

View file

@ -5,12 +5,12 @@
stdenv.mkDerivation rec {
pname = "faustlive";
version = "2.5.11";
version = "2.5.12";
src = fetchFromGitHub {
owner = "grame-cncm";
repo = "faustlive";
rev = version;
sha256 = "sha256-ldn6st3/iIABjEfAwodOnPrI97DygWbnYmvMktlOgrk=";
sha256 = "sha256-pq9zO4opCh9GEEtuQjrxKdNvOasDlcGGUsQD4je7Wyw=";
fetchSubmodules = true;
};

View file

@ -1,13 +1,13 @@
{ stdenv, lib, fetchFromGitHub, faust2jaqt, faust2lv2 }:
stdenv.mkDerivation rec {
pname = "faustPhysicalModeling";
version = "2.41.1";
version = "2.50.6";
src = fetchFromGitHub {
owner = "grame-cncm";
repo = "faust";
rev = version;
sha256 = "sha256-I5No9J7TLOf++B+lx1RfGY8LBoDAApq/EV8016wH9Hc=";
sha256 = "sha256-Q/vrm3WPsjkE3Xf/XEirsJPFXHNSW/Ve3Jbi/5nIrx8=";
};
buildInputs = [ faust2jaqt faust2lv2 ];

View file

@ -1,4 +1,4 @@
{ lib, stdenv, fetchsvn, cmake, gcc, pkg-config, fftwFloat, alsa-lib
{ lib, stdenv, fetchsvn, cmake, pkg-config, fftwFloat, alsa-lib
, zlib, wavpack, wxGTK31, udev, jackaudioSupport ? false, libjack2
, includeDemo ? true }:

View file

@ -1,5 +1,5 @@
{ lib, stdenv, fetchgit, boost, ganv, glibmm, gtkmm2, libjack2, lilv
, lv2, makeWrapper, pkg-config, python3, raul, serd, sord, sratom
, lv2, pkg-config, python3, raul, serd, sord, sratom
, wafHook
, suil
}:

View file

@ -1,5 +1,5 @@
{ lib, stdenv, fetchFromGitHub, faust, meson, ninja, pkg-config
, boost, cairo, fftw, gnome, ladspa-sdk, libxcb, lv2, xcbutilwm
, boost, cairo, fftw, ladspa-sdk, libxcb, lv2, xcbutilwm
, zita-convolver, zita-resampler
}:

View file

@ -1,7 +1,6 @@
{ lib
, stdenv
, mkDerivation
, fetchurl
, fetchFromGitHub
, chromaprint
, cmake

View file

@ -2,13 +2,13 @@
stdenv.mkDerivation rec {
pname = "new-session-manager";
version = "1.6.0";
version = "1.6.1";
src = fetchFromGitHub {
owner = "linuxaudio";
repo = "new-session-manager";
rev = "v${version}";
sha256 = "sha256-QVykRYXToeVXr7pYQy2afgEAlXrQnm68+xEUZhd+FkY=";
sha256 = "sha256-5G2GlBuKjC/r1SMm78JKia7bMA97YcvUR5l6zBucemw=";
};
nativeBuildInputs = [ meson pkg-config ninja ];

View file

@ -1,4 +1,4 @@
{ stdenv, lib, fetchFromGitHub, unzip, fetchzip, libX11 }:
{ stdenv, lib, fetchFromGitHub, fetchzip, libX11 }:
let

View file

@ -1,5 +1,4 @@
{ fetchurl
, fetchpatch
, lib
, stdenv
, pkg-config

View file

@ -1,6 +1,5 @@
{ lib, stdenv
, fetchFromGitHub
, fetchpatch
, autoreconfHook
, pkg-config
, puredata

View file

@ -1,4 +1,4 @@
{ lib, stdenv, curl, gnugrep, jq, xorg, alsa-lib, freetype, p7zip, autoPatchelfHook, writeShellScript, zlib, libjack2, makeWrapper }:
{ lib, stdenv, curl, jq, xorg, alsa-lib, freetype, p7zip, autoPatchelfHook, writeShellScript, zlib, libjack2, makeWrapper }:
let
versionForFile = v: builtins.replaceStrings ["."] [""] v;

View file

@ -1,6 +1,5 @@
{ lib, stdenv
, fetchgit
, automake
, autoreconfHook
, lv2
, pkg-config

View file

@ -39,13 +39,13 @@
stdenv.mkDerivation rec {
pname = "sonic-pi";
version = "4.2.0";
version = "4.3.0";
src = fetchFromGitHub {
owner = "sonic-pi-net";
repo = pname;
rev = "v${version}";
hash = "sha256-VRuNhS53okKsCHgKEsJgkpIe9yXFY6d2ghd0nsUQLLM=";
hash = "sha256-R+nmjIIDLoGOoCkDvJqejE1DaweHSAV8M2RvdwN5qAQ=";
};
mixFodDeps = beamPackages.fetchMixDeps {

View file

@ -1,4 +1,4 @@
{ lib, stdenv, fetchurl, ladspa-sdk, pkgs, ... }:
{ lib, stdenv, ladspa-sdk, pkgs, ... }:
stdenv.mkDerivation rec {
pname = "tap-plugins";

View file

@ -1,4 +1,4 @@
{ lib, stdenv, fetchzip, pkg-config, lvtk, lv2, fftw, lv2-cpp-tools, gtkmm2 }:
{ lib, stdenv, fetchzip, pkg-config, lv2, fftw, lv2-cpp-tools, gtkmm2 }:
stdenv.mkDerivation rec {
pname = "vocproc";

View file

@ -4,7 +4,6 @@
, SDL2
, alsa-lib
, libaudec
, bash
, bash-completion
, breeze-icons
, carla

View file

@ -1,5 +1,4 @@
{ lib, stdenv, fetchFromGitHub, fetchpatch
, cmake, pkg-config
{ lib, stdenv, fetchFromGitHub, cmake, pkg-config
, boost, miniupnpc, openssl, unbound
, zeromq, pcsclite, readline, libsodium, hidapi
, randomx, rapidjson

View file

@ -2,7 +2,6 @@
, fetchFromGitHub
, rustPlatform
, cmake
, llvmPackages
, openssl
, pkg-config
, stdenv

View file

@ -1,5 +1,4 @@
{ stdenv, lib, fetchurl, fetchFromGitHub, fetchpatch
, cmake, pkg-config
{ stdenv, lib, fetchurl, fetchFromGitHub, cmake, pkg-config
, boost, openssl, unbound
, pcsclite, readline, libsodium, hidapi
, rapidjson

File diff suppressed because it is too large Load diff

View file

@ -0,0 +1,80 @@
{ lib
, stdenv
, rustPlatform
, fetchFromGitHub
, llvmPackages
, openssl
, perl
, protobuf
, rustfmt
, Security
, SystemConfiguration
}:
let
version = "0.1.2";
src = fetchFromGitHub {
owner = "talaia-labs";
repo = "rust-teos";
rev = "v${version}";
hash = "sha256-N+srREYsADMTqz3uDXpeCuXrZZ62FopXO7DClGfyk9U=";
};
common.meta = with lib; {
homepage = "https://github.com/talaia-labs/rust-teos";
license = licenses.mit;
maintainers = with maintainers; [ seberm ];
platforms = platforms.unix;
};
cargoPatches = [ ./add-cargo-lock.patch ];
buildInputs = [
openssl
] ++ lib.optionals stdenv.isDarwin [ Security SystemConfiguration ];
nativeBuildInputs = [
perl # used by openssl-sys to configure
protobuf
rustfmt
llvmPackages.clang
];
LIBCLANG_PATH = "${llvmPackages.libclang.lib}/lib";
in
{
teos = rustPlatform.buildRustPackage {
pname = "teos";
cargoSha256 = "sha256-7VYYYSMJ2JP1KuA8sD0X3wInubH/jbA/sgzsTsomyEc=";
buildAndTestSubdir = "teos";
inherit version src cargoPatches buildInputs nativeBuildInputs LIBCLANG_PATH;
meta = common.meta // {
description = "A Lightning watchtower compliant with BOLT13, written in Rust";
};
cargoTestFlags = [
"--workspace"
];
};
teos-watchtower-plugin = rustPlatform.buildRustPackage {
pname = "teos-watchtower-plugin";
cargoSha256 = "sha256-xL+DiEfgBYJQ1UJm7LAr1/f34pkU8FRl4Seic8MFAlM=";
buildAndTestSubdir = "watchtower-plugin";
inherit version src cargoPatches buildInputs nativeBuildInputs LIBCLANG_PATH;
meta = common.meta // {
description = "A Lightning watchtower plugin for clightning";
};
# The test is skipped due to following error:
# thread 'retrier::tests::test_manage_retry_unreachable' panicked at 'assertion failed:
# wt_client.lock().unwrap().towers.get(&tower_id).unwrap().status.is_unreachable()', watchtower-plugin/src/retrier.rs:518:9
checkFlags = lib.optionals (stdenv.isDarwin && stdenv.isAarch64) [ "--skip=retrier::tests::test_manage_retry_unreachable" ];
};
}

View file

@ -1,7 +1,6 @@
{ trivialBuild
, lib
, fetchFromGitHub
, curl
, plz
, cl-lib
, ts

View file

@ -1,5 +1,4 @@
{ lib
, trivialBuild
{ trivialBuild
, fetchFromGitHub
, emacs
, popup

View file

@ -1,5 +1,4 @@
{ lib
, stdenv
, fetchFromGitHub
, emacs
, trivialBuild

View file

@ -1,5 +1,4 @@
{ lib
, stdenv
, fetchFromGitHub
, trivialBuild
, emacs

View file

@ -1,5 +1,4 @@
{ lib
, trivialBuild
{ trivialBuild
, fetchFromGitHub
, emacs
}:

View file

@ -1,5 +1,4 @@
{ lib
, trivialBuild
{ trivialBuild
, fetchFromGitHub
, emacs
}:

View file

@ -1,5 +1,4 @@
{ lib
, stdenv
, fetchFromGitHub
, trivialBuild
, emacs

View file

@ -1,7 +1,6 @@
{ symlinkJoin
, makeWrapper
, geany
, lndir
, vte
}:

View file

@ -1,6 +1,6 @@
{ avahiSupport ? false # build support for Avahi in libinfinity
, lib, stdenv, fetchFromGitHub, autoconf, automake, pkg-config, wrapGAppsHook, yelp-tools
, gtkmm3, gsasl, gtksourceview3, libxmlxx, libinfinity, intltool, itstool, gnome }:
, gtkmm3, gsasl, gtksourceview3, libxmlxx, libinfinity, intltool, itstool }:
let
libinf = libinfinity.override { gtkWidgets = true; inherit avahiSupport; };

View file

@ -1,5 +1,4 @@
{ lib
, stdenv
{ stdenv
, callPackage
, runCommand
, makeWrapper

View file

@ -1,4 +1,4 @@
{ lib, octave, python3Packages }:
{ lib, python3Packages }:
with python3Packages;

View file

@ -1,5 +1,5 @@
{ lib, stdenv, fetchFromGitHub, writeScript, nixosTests, common-updater-scripts
, coreutils, git, gnused, nix, nixfmt }:
{ lib, stdenv, fetchFromGitHub, writeScript, common-updater-scripts
, coreutils, git, gnused, nix }:
let
owner = "scopatz";

View file

@ -1,5 +1,4 @@
{ lib, mkDerivation, fetchFromGitHub, cmake, doxygen, makeWrapper
, msgpack, neovim, python3Packages, qtbase, qtsvg }:
{ lib, mkDerivation, fetchFromGitHub, cmake, doxygen, msgpack, neovim, python3Packages, qtbase, qtsvg }:
mkDerivation rec {
pname = "neovim-qt-unwrapped";

View file

@ -1,7 +1,5 @@
{ stdenv, symlinkJoin, lib, makeWrapper
, writeText
, bundlerEnv, ruby
, nodejs
, nodePackages
, python3
, python3Packages

View file

@ -1,6 +1,5 @@
{ lib, mkDerivation, fetchFromGitHub, cmake, pkg-config, makeWrapper
, boost, xercesc, hunspell, zlib, pcre16
, qtbase, qttools, qtwebengine, qtxmlpatterns
, boost, xercesc, qtbase, qttools, qtwebengine, qtxmlpatterns
, python3Packages
}:

View file

@ -2,7 +2,6 @@
, unzip, libsecret, libXScrnSaver, libxshmfence, wrapGAppsHook, makeWrapper
, atomEnv, at-spi2-atk, autoPatchelfHook
, systemd, fontconfig, libdbusmenu, glib, buildFHSUserEnvBubblewrap
, writeShellScriptBin
# Populate passthru.tests
, tests

View file

@ -3,12 +3,14 @@
, fetchFromGitHub
, SDL2
, cmake
, libepoxy
, ffmpeg_4
, copyDesktopItems
, ffmpeg
, imagemagick
, libedit
, libelf
, libepoxy
, libzip
, lua
, makeDesktopItem
, minizip
, pkg-config
@ -18,31 +20,33 @@
, wrapQtAppsHook
}:
stdenv.mkDerivation rec {
stdenv.mkDerivation (finalAttrs: {
pname = "mgba";
version = "0.9.3";
version = "0.10.0";
src = fetchFromGitHub {
owner = "mgba-emu";
repo = "mgba";
rev = version;
hash = "sha256-0ZtoyyoD+YjplJlPFpZgIg5119j/6X8ZaSZP+UpX5K0=";
rev = finalAttrs.version;
hash = "sha256-2thc2v3aD8t1PrREZIjzRuYfP7b3BA7uFb6R95zxsZI=";
};
nativeBuildInputs = [
cmake
copyDesktopItems
pkg-config
wrapQtAppsHook
];
buildInputs = [
SDL2
libepoxy
ffmpeg_4
ffmpeg
imagemagick
libedit
libelf
libepoxy
libzip
lua
minizip
qtbase
qtmultimedia
@ -79,9 +83,9 @@ stdenv.mkDerivation rec {
runners, and a modern feature set for emulators that older emulators may
not support.
'';
changelog = "https://github.com/mgba-emu/mgba/blob/${finalAttrs.version}/CHANGES";
license = licenses.mpl20;
maintainers = with maintainers; [ MP2E AndersonTorres ];
platforms = platforms.linux;
};
}
# TODO: use desktopItem functions
})

View file

@ -20,7 +20,6 @@
, Cocoa
, unixODBC
, poppler
, hdf4
, hdf5
, netcdf
, sqlite

View file

@ -3,14 +3,9 @@
, fetchFromGitHub
, desktop-file-utils
, ffmpeg
, gobject-introspection
, granite
, gtk
, imagemagick
, libgee
, libhandy
, libsecret
, libsoup
, meson
, ninja
, pkg-config

View file

@ -0,0 +1,42 @@
{ lib
, stdenv
, fetchFromGitHub
, qt5
, cmake
, pkg-config
, imagemagick
, nix-update-script
}:
stdenv.mkDerivation rec {
pname = "cyan";
version = "1.2.4";
src = fetchFromGitHub {
owner = "rodlie";
repo = pname;
rev = version;
hash = "sha256-R5sj8AN7UT9OIeUPNrdTIUQvtEitXp1A32l/Z2qRS94=";
};
nativeBuildInputs = [
cmake
pkg-config
qt5.wrapQtAppsHook
];
buildInputs = [ imagemagick ];
passthru.updateScript = nix-update-script {
attrPath = pname;
};
meta = with lib; {
description = "Image viewer and converter, designed for prepress (print) work";
homepage = "https://github.com/rodlie/cyan";
mainProgram = "Cyan";
license = licenses.cecill21;
platforms = platforms.linux;
maintainers = with maintainers; [ zendo ];
};
}

View file

@ -2,7 +2,6 @@
, stdenv
, mkDerivation
, fetchFromGitHub
, fetchpatch
, cmake
, ninja
, GitPython

View file

@ -1,7 +1,6 @@
{ lib, stdenv
, fetchFromGitHub
, nix-update-script
, fetchpatch
, vala
, pkg-config
, python3

View file

@ -4,12 +4,9 @@
, wrapQtAppsHook
, qtmultimedia
, qttools
, qtscript
, qtdeclarative
, qtnetworkauth
, qtbase
, autogen
, automake
, makeWrapper
, catch2
, nodejs

View file

@ -6,11 +6,9 @@
, openjpeg, opencolorio_1, xsimd, poppler, curl, ilmbase, libmypaint, libwebp
, qtmultimedia, qtx11extras, quazip
, python3Packages
, version
, kde-channel
, sha256
, callPackage
}:

View file

@ -1,4 +1,4 @@
{ lib, stdenv, patchelf, fetchurl, p7zip
{ lib, stdenv, fetchurl, p7zip
, nss, nspr, libusb1
, qtbase, qtmultimedia, qtserialport
, autoPatchelfHook, wrapQtAppsHook

View file

@ -1,4 +1,4 @@
{ lib, stdenv, fetchFromGitLab, fetchurl
{ lib, fetchFromGitLab, fetchurl
, boost, cmake, ffmpeg, qtbase, qtx11extras
, qttools, qtxmlpatterns, qtsvg, gdal, gfortran, libXt, makeWrapper
, mkDerivation, ninja, mpi, python3, tbb, libGLU, libGL

View file

@ -1,4 +1,4 @@
{lib, stdenv, fetchFromGitHub, flex, bison, cmake, git, zlib}:
{lib, stdenv, fetchFromGitHub, flex, bison, cmake, zlib}:
stdenv.mkDerivation {
version = "2018-08-15";

View file

@ -1,7 +1,6 @@
{ mkDerivation, lib, fetchurl, cmake, exiv2, graphicsmagick, libraw, fetchpatch
, qtbase, qtdeclarative, qtmultimedia, qtquickcontrols, qttools, qtgraphicaleffects
, extra-cmake-modules, poppler, kimageformats, libarchive, libdevil
}:
, extra-cmake-modules, poppler, kimageformats, libarchive}:
mkDerivation rec {
pname = "photoqt";

View file

@ -1,7 +1,6 @@
{ lib
, fetchurl
, gnustep
, gcc
, llvmPackages_9
}:

View file

@ -1,7 +1,6 @@
{ mkDerivation
, lib
, fetchFromGitHub
, fetchpatch
, cmake
, pkg-config

View file

@ -1,6 +1,5 @@
{ python3Packages
, qtbase
, ghostscript
, wrapQtAppsHook
, lib
}:

View file

@ -1,5 +1,4 @@
{ stdenv
, lib
{ lib
, fetchFromGitHub
, python3
, qt5

View file

@ -1,5 +1,5 @@
{
mkDerivation, lib, kdepimTeam, substituteAll,
mkDerivation, lib, kdepimTeam,
extra-cmake-modules, shared-mime-info, qtbase, accounts-qt,
boost, kaccounts-integration, kcompletion, kconfigwidgets, kcrash, kdbusaddons,
kdesignerplugin, ki18n, kiconthemes, kio, kitemmodels, kwindowsystem, mariadb, qttools,

View file

@ -1,5 +1,4 @@
{ mkDerivation, lib, config
, extra-cmake-modules, kdoctools
{ mkDerivation, lib, extra-cmake-modules, kdoctools
, breeze-icons, karchive, kconfig, kcrash, kdbusaddons, ki18n
, kiconthemes, kitemmodels, khtml, kio, kparts, kpty, kservice, kwidgetsaddons
, libarchive, libzip

View file

@ -1,5 +1,5 @@
{
mkDerivation, lib, kdepimTeam, fetchpatch,
mkDerivation, lib, kdepimTeam,
extra-cmake-modules, kdoctools,
akonadi, akonadi-calendar, akonadi-mime, akonadi-notes, kcalutils,
kholidays, kidentitymanagement, kmime, pimcommon, qttools,

View file

@ -1,5 +1,4 @@
{ mkDerivation
, fetchFromGitHub
, lib
, extra-cmake-modules
, kdoctools

View file

@ -1,5 +1,5 @@
{
mkDerivation, lib, kdepimTeam, fetchpatch,
mkDerivation, lib, kdepimTeam,
extra-cmake-modules, kdoctools,
akonadi, akonadi-search, grantlee, grantleetheme, kcmutils, kcompletion,
kcrash, kdbusaddons, ki18n, kontactinterface, kparts,

View file

@ -1,4 +1,4 @@
{ mkDerivation, lib, extra-cmake-modules, kdoctools, ki18n, kio, openbabel, avogadro, qtscript, kparts, kplotting, kunitconversion }:
{ mkDerivation, lib, extra-cmake-modules, kdoctools, ki18n, kio, openbabel, qtscript, kparts, kplotting, kunitconversion }:
mkDerivation {
pname = "kalzium";

View file

@ -1,6 +1,5 @@
{ lib
, mkDerivation
, fetchurl
, cmake
, extra-cmake-modules
, qtbase

View file

@ -1,6 +1,5 @@
{ mkDerivation
, extra-cmake-modules
, fetchpatch
, kcmutils
, kconfigwidgets
, kdbusaddons

View file

@ -2,7 +2,7 @@
, mkDerivation
, extra-cmake-modules
, kdoctools
, libkdegames, kconfig, kio, ktextwidgets
, libkdegames, kio, ktextwidgets
}:
mkDerivation {

View file

@ -2,7 +2,6 @@
mkDerivation, lib,
extra-cmake-modules, kdoctools,
kiconthemes, kparts, ktexteditor, kwidgetsaddons, libkomparediff2,
fetchpatch
}:
mkDerivation {

View file

@ -1,5 +1,5 @@
{
mkDerivation, lib, kdepimTeam,
mkDerivation, lib,
extra-cmake-modules, kdoctools,
kcompletion, kconfig, kconfigwidgets, kcoreaddons, ki18n,
kwidgetsaddons

View file

@ -1,7 +1,6 @@
{ lib
, stdenv
, fetchFromGitLab
, fetchpatch
, appstream-glib
, clang
, desktop-file-utils

View file

@ -8,7 +8,6 @@
, libXfixes
, libXtst
, qtx11extras
, git
, knotifications
, qtwayland
, wayland

View file

@ -1,4 +1,4 @@
{ lib, stdenv, fetchFromGitHub, fetchpatch, python3Packages, libspnav, jq }:
{ lib, stdenv, fetchFromGitHub, python3Packages, libspnav, jq }:
let

View file

@ -1,4 +1,4 @@
{ lib, stdenv, fetchFromGitHub, python3Packages, qtbase, fetchpatch, wrapQtAppsHook
{ lib, stdenv, fetchFromGitHub, python3Packages, wrapQtAppsHook
, secp256k1 }:
python3Packages.buildPythonApplication rec {

View file

@ -1,4 +1,4 @@
{ fetchFromGitHub, lib, stdenv, fetchpatch, pkg-config, exiv2, libxml2, gtk3
{ fetchFromGitHub, lib, stdenv, pkg-config, exiv2, libxml2, gtk3
, libxslt, docbook_xsl, docbook_xml_dtd_42, desktop-file-utils, wrapGAppsHook }:
stdenv.mkDerivation rec {

View file

@ -1,4 +1,4 @@
{ lib, stdenv, fetchurl, intltool, libxml2, pkg-config, gnome, libchamplain, gdl, shared-mime-info, desktop-file-utils, wrapGAppsHook }:
{ lib, stdenv, fetchurl, intltool, libxml2, pkg-config, gnome, libchamplain, gdl, wrapGAppsHook }:
stdenv.mkDerivation rec {
pname = "gpx-viewer";

View file

@ -4,13 +4,13 @@
stdenv.mkDerivation rec {
pname = "gpxsee";
version = "11.5";
version = "11.6";
src = fetchFromGitHub {
owner = "tumic0";
repo = "GPXSee";
rev = version;
hash = "sha256-bA5C+BFqeOS0oFgz/qlYOFMsuh3L/U6QJbzOcRQkNhY=";
hash = "sha256-kwEltkLcMCZlUJyE+nyy70WboVO1FgMw0cH1hxLVtKQ=";
};
patches = (substituteAll {

View file

@ -1,5 +1,5 @@
{ lib, stdenv, pkgs
, glib, gnome, gtk3, gtksourceview3, gtkspell3, poppler, texlive
, glib, gtk3, gtksourceview3, gtkspell3, poppler, texlive
, pkg-config, intltool, autoreconfHook, wrapGAppsHook
}:

View file

@ -1,4 +1,4 @@
{ lib, fetchFromGitHub, python3, fetchpatch }:
{ lib, fetchFromGitHub, python3 }:
let

View file

@ -1,4 +1,4 @@
{ lib, stdenv, writeScript, callPackage, buildFHSUserEnv, undaemonize, unwrapped ? callPackage ./runtime.nix {} }:
{ lib, stdenv, writeScript, callPackage, buildFHSUserEnv, unwrapped ? callPackage ./runtime.nix {} }:
buildFHSUserEnv rec {
name = "houdini-${unwrapped.version}";

View file

@ -1,4 +1,4 @@
{ lib, stdenv, runCommand, fetchzip, fetchurl, fetchpatch, fetchFromGitHub
{ lib, stdenv, runCommand, fetchzip, fetchurl, fetchFromGitHub
, cmake, pkg-config, zlib, libpng, makeWrapper
, enableGSL ? true, gsl
, enableGhostScript ? true, ghostscript

View file

@ -1,7 +1,6 @@
{ mkDerivation
, extra-cmake-modules
, fetchFromGitHub
, kdoctools
, kiconthemes
, kio
, kjobwidgets

View file

@ -1,7 +1,6 @@
{ lib, mkDerivation, fetchFromGitHub
, callPackage
, pkg-config
, makeWrapper
, qmake
, qtbase
, qtwebengine

View file

@ -1,4 +1,4 @@
{ stdenv, lib, fetchFromGitHub
{ stdenv, fetchFromGitHub
, meson, ninja, pkg-config
, python3
, curl
@ -11,7 +11,6 @@
, gtest
}:
stdenv.mkDerivation rec {
pname = "kiwix-lib";
version = "10.1.1";

View file

@ -1,4 +1,4 @@
{ stdenv, lib, fetchurl, fetchpatch, pkg-config, freetype, harfbuzz, openjpeg
{ stdenv, lib, fetchurl, pkg-config, freetype, harfbuzz, openjpeg
, jbig2dec, libjpeg , darwin
, enableX11 ? true, libX11, libXext, libXi, libXrandr
, enableCurl ? true, curl, openssl

View file

@ -12,7 +12,7 @@
let
inherit (stdenv.hostPlatform) system;
pname = "obsidian";
version = "0.15.9";
version = "1.0.0";
appname = "Obsidian";
meta = with lib; {
description = "A powerful knowledge base that works on top of a local folder of plain text Markdown files";
@ -25,7 +25,7 @@ let
filename = if stdenv.isDarwin then "Obsidian-${version}-universal.dmg" else "obsidian-${version}.tar.gz";
src = fetchurl {
url = "https://github.com/obsidianmd/obsidian-releases/releases/download/v${version}/${filename}";
sha256 = if stdenv.isDarwin then "1q9almr8k1i2wzksd09libgnvypj5k9j15y6cxg4rgnw32fa152n" else "sha256-Qz1Ic5FtxXIk8J/2spNZaqpPIgx3yNyXiAQllbVrGjw=";
sha256 = if stdenv.isDarwin then "sha256-KVWqdXzbQT93Dj4yesdnfFwAdYin1vfpPsj/ur1AGA0=" else "sha256-H1Cl9SBz/mwN8gezFkcV4KxI7+xVjQV2AtyLKyjVpI8=";
};
icon = fetchurl {

View file

@ -14,13 +14,13 @@ let
in
mkDerivation rec {
pname = "osmscout-server";
version = "2.1.2";
version = "2.2.2";
src = fetchFromGitHub {
owner = "rinigus";
repo = "osmscout-server";
rev = version;
sha256 = "sha256-I14nQL0H2rMga+RDdAjykqmf7QIZveA6oGWu5PfZ89s=";
sha256 = "sha256-ngB3c6rUQ/+AeaJHKAFRl9lCkUobLWSnsn030brB+Bw=";
fetchSubmodules = true;
};

View file

@ -0,0 +1,62 @@
{ lib
, stdenv
, fetchFromGitHub
, unzip
, jre
, jdk
, ant
, makeWrapper
, makeDesktopItem
, copyDesktopItems
, glib
, wrapGAppsHook
}:
stdenv.mkDerivation rec {
pname = "pattypan";
version = "22.03";
src = fetchFromGitHub {
owner = "yarl";
repo = "pattypan";
rev = "v${version}";
sha256 = "0qmvlcqhqw5k500v2xdakk340ymgv5amhbfqxib5s4db1w32pi60";
};
nativeBuildInputs = [ copyDesktopItems jdk ant makeWrapper wrapGAppsHook ];
buildInputs = [ glib jre ];
buildPhase = ''
runHook preBuild
export JAVA_TOOL_OPTIONS="-Dfile.encoding=UTF8"
ant
runHook postBuild
'';
installPhase = ''
runHook preInstall
mkdir -p $out/bin $out/share/java
cp pattypan.jar $out/share/java/pattypan.jar
makeWrapper ${jre}/bin/java $out/bin/pattypan \
--add-flags "-cp $out/share/java/pattypan.jar pattypan.Launcher"
runHook postInstall
'';
desktopItems = [
(makeDesktopItem {
desktopName = "Pattypan";
genericName = "An uploader for Wikimedia Commons";
categories = [ "Utility" ];
exec = "pattypan";
name = "pattypan";
})
];
meta = with lib; {
homepage = "https://commons.wikimedia.org/wiki/Commons:Pattypan";
description = "An uploader for Wikimedia Commons";
license = licenses.mit;
platforms = [ "x86_64-linux" ];
maintainers = with maintainers; [ fee1-dead ];
};
}

Some files were not shown because too many files have changed in this diff Show more