Merge staging-next into staging

This commit is contained in:
github-actions[bot] 2022-02-22 00:02:51 +00:00 committed by GitHub
commit f8210665fc
No known key found for this signature in database
GPG key ID: 4AEE18F83AFDEB23
48 changed files with 815 additions and 408 deletions

View file

@ -13164,7 +13164,7 @@
name = "Wayne Scott";
};
wucke13 = {
email = "info@wucke13.de";
email = "wucke13@gmail.com";
github = "wucke13";
githubId = 20400405;
name = "Wucke";

View file

@ -444,6 +444,13 @@
support due to python2 deprecation in nixpkgs
</para>
</listitem>
<listitem>
<para>
<literal>services.miniflux.adminCredentialFiles</literal> is
now required, instead of defaulting to
<literal>admin</literal> and <literal>password</literal>.
</para>
</listitem>
<listitem>
<para>
The <literal>autorestic</literal> package has been upgraded
@ -558,6 +565,15 @@
<literal>~/.local/share/polymc/polymc.cfg</literal>.
</para>
</listitem>
<listitem>
<para>
<literal>systemd-nspawn@.service</literal> settings have been
reverted to the default systemd behaviour. User namespaces are
now activated by default. If you want to keep running nspawn
containers without user namespaces you need to set
<literal>systemd.nspawn.&lt;name&gt;.execConfig.PrivateUsers = false</literal>
</para>
</listitem>
<listitem>
<para>
The terraform 0.12 compatibility has been removed and the

View file

@ -147,6 +147,8 @@ In addition to numerous new and upgraded packages, this release has the followin
- opensmtpd-extras is no longer build with python2 scripting support due to python2 deprecation in nixpkgs
- `services.miniflux.adminCredentialFiles` is now required, instead of defaulting to `admin` and `password`.
- The `autorestic` package has been upgraded from 1.3.0 to 1.5.0 which introduces breaking changes in config file, check [their migration guide](https://autorestic.vercel.app/migration/1.4_1.5) for more details.
- For `pkgs.python3.pkgs.ipython`, its direct dependency `pkgs.python3.pkgs.matplotlib-inline`
@ -178,6 +180,7 @@ In addition to numerous new and upgraded packages, this release has the followin
- MultiMC has been replaced with the fork PolyMC due to upstream developers being hostile to 3rd party package maintainers. PolyMC removes all MultiMC branding and is aimed at providing proper 3rd party packages like the one contained in Nixpkgs. This change affects the data folder where game instances and other save and configuration files are stored. Users with existing installations should rename `~/.local/share/multimc` to `~/.local/share/polymc`. The main config file's path has also moved from `~/.local/share/multimc/multimc.cfg` to `~/.local/share/polymc/polymc.cfg`.
- `systemd-nspawn@.service` settings have been reverted to the default systemd behaviour. User namespaces are now activated by default. If you want to keep running nspawn containers without user namespaces you need to set `systemd.nspawn.<name>.execConfig.PrivateUsers = false`
- The terraform 0.12 compatibility has been removed and the `terraform.withPlugins` and `terraform-providers.mkProvider` implementations simplified. Providers now need to be stored under
`$out/libexec/terraform-providers/<registry>/<owner>/<name>/<version>/<os>_<arch>/terraform-provider-<name>_v<version>` (which mkProvider does).

View file

@ -7,26 +7,12 @@ let
defaultAddress = "localhost:8080";
dbUser = "miniflux";
dbPassword = "miniflux";
dbHost = "localhost";
dbName = "miniflux";
defaultCredentials = pkgs.writeText "miniflux-admin-credentials" ''
ADMIN_USERNAME=admin
ADMIN_PASSWORD=password
'';
pgbin = "${config.services.postgresql.package}/bin";
preStart = pkgs.writeScript "miniflux-pre-start" ''
#!${pkgs.runtimeShell}
db_exists() {
[ "$(${pgbin}/psql -Atc "select 1 from pg_database where datname='$1'")" == "1" ]
}
if ! db_exists "${dbName}"; then
${pgbin}/psql postgres -c "CREATE ROLE ${dbUser} WITH LOGIN NOCREATEDB NOCREATEROLE ENCRYPTED PASSWORD '${dbPassword}'"
${pgbin}/createdb --owner "${dbUser}" "${dbName}"
${pgbin}/psql "${dbName}" -c "CREATE EXTENSION IF NOT EXISTS hstore"
fi
${pgbin}/psql "${dbName}" -c "CREATE EXTENSION IF NOT EXISTS hstore"
'';
in
@ -54,11 +40,10 @@ in
};
adminCredentialsFile = mkOption {
type = types.nullOr types.path;
default = null;
type = types.path;
description = ''
File containing the ADMIN_USERNAME, default is "admin", and
ADMIN_PASSWORD (length >= 6), default is "password"; in the format of
File containing the ADMIN_USERNAME and
ADMIN_PASSWORD (length >= 6) in the format of
an EnvironmentFile=, as described by systemd.exec(5).
'';
example = "/etc/nixos/miniflux-admin-credentials";
@ -70,16 +55,24 @@ in
services.miniflux.config = {
LISTEN_ADDR = mkDefault defaultAddress;
DATABASE_URL = "postgresql://${dbUser}:${dbPassword}@${dbHost}/${dbName}?sslmode=disable";
DATABASE_URL = "user=${dbUser} host=/run/postgresql dbname=${dbName}";
RUN_MIGRATIONS = "1";
CREATE_ADMIN = "1";
};
services.postgresql.enable = true;
services.postgresql = {
enable = true;
ensureUsers = [ {
name = dbUser;
ensurePermissions = {
"DATABASE ${dbName}" = "ALL PRIVILEGES";
};
} ];
ensureDatabases = [ dbName ];
};
systemd.services.miniflux-dbsetup = {
description = "Miniflux database setup";
wantedBy = [ "multi-user.target" ];
requires = [ "postgresql.service" ];
after = [ "network.target" "postgresql.service" ];
serviceConfig = {
@ -92,17 +85,16 @@ in
systemd.services.miniflux = {
description = "Miniflux service";
wantedBy = [ "multi-user.target" ];
requires = [ "postgresql.service" ];
requires = [ "miniflux-dbsetup.service" ];
after = [ "network.target" "postgresql.service" "miniflux-dbsetup.service" ];
serviceConfig = {
ExecStart = "${pkgs.miniflux}/bin/miniflux";
User = dbUser;
DynamicUser = true;
RuntimeDirectory = "miniflux";
RuntimeDirectoryMode = "0700";
EnvironmentFile = if cfg.adminCredentialsFile == null
then defaultCredentials
else cfg.adminCredentialsFile;
EnvironmentFile = cfg.adminCredentialsFile;
# Hardening
CapabilityBoundingSet = [ "" ];
DeviceAllow = [ "" ];
@ -119,7 +111,7 @@ in
ProtectKernelModules = true;
ProtectKernelTunables = true;
ProtectProc = "invisible";
RestrictAddressFamilies = [ "AF_INET" "AF_INET6" ];
RestrictAddressFamilies = [ "AF_INET" "AF_INET6" "AF_UNIX" ];
RestrictNamespaces = true;
RestrictRealtime = true;
RestrictSUIDSGID = true;

View file

@ -120,14 +120,6 @@ in {
})
{
systemd.targets.multi-user.wants = [ "machines.target" ];
# Workaround for https://github.com/NixOS/nixpkgs/pull/67232#issuecomment-531315437 and https://github.com/systemd/systemd/issues/13622
# Once systemd fixes this upstream, we can re-enable -U
systemd.services."systemd-nspawn@".serviceConfig.ExecStart = [
"" # deliberately empty. signals systemd to override the ExecStart
# Only difference between upstream is that we do not pass the -U flag
"${config.systemd.package}/bin/systemd-nspawn --quiet --keep-unit --boot --link-journal=try-guest --network-veth --settings=override --machine=%i"
];
}
];
}

View file

@ -499,6 +499,7 @@ in
systemd-confinement = handleTest ./systemd-confinement.nix {};
systemd-cryptenroll = handleTest ./systemd-cryptenroll.nix {};
systemd-journal = handleTest ./systemd-journal.nix {};
systemd-machinectl = handleTest ./systemd-machinectl.nix {};
systemd-networkd = handleTest ./systemd-networkd.nix {};
systemd-networkd-dhcpserver = handleTest ./systemd-networkd-dhcpserver.nix {};
systemd-networkd-dhcpserver-static-leases = handleTest ./systemd-networkd-dhcpserver-static-leases.nix {};

View file

@ -7,6 +7,15 @@ let
defaultPort = 8080;
defaultUsername = "admin";
defaultPassword = "password";
adminCredentialsFile = pkgs.writeText "admin-credentials" ''
ADMIN_USERNAME=${defaultUsername}
ADMIN_PASSWORD=${defaultPassword}
'';
customAdminCredentialsFile = pkgs.writeText "admin-credentials" ''
ADMIN_USERNAME=${username}
ADMIN_PASSWORD=${password}
'';
in
with lib;
{
@ -17,13 +26,19 @@ with lib;
default =
{ ... }:
{
services.miniflux.enable = true;
services.miniflux = {
enable = true;
inherit adminCredentialsFile;
};
};
withoutSudo =
{ ... }:
{
services.miniflux.enable = true;
services.miniflux = {
enable = true;
inherit adminCredentialsFile;
};
security.sudo.enable = false;
};
@ -36,10 +51,7 @@ with lib;
CLEANUP_FREQUENCY = "48";
LISTEN_ADDR = "localhost:${toString port}";
};
adminCredentialsFile = pkgs.writeText "admin-credentials" ''
ADMIN_USERNAME=${username}
ADMIN_PASSWORD=${password}
'';
adminCredentialsFile = customAdminCredentialsFile;
};
};
};

View file

@ -0,0 +1,85 @@
import ./make-test-python.nix (
let
container = {
# We re-use the NixOS container option ...
boot.isContainer = true;
# ... and revert unwanted defaults
networking.useHostResolvConf = false;
# use networkd to obtain systemd network setup
networking.useNetworkd = true;
networking.useDHCP = false;
# systemd-nspawn expects /sbin/init
boot.loader.initScript.enable = true;
imports = [ ../modules/profiles/minimal.nix ];
};
containerSystem = (import ../lib/eval-config.nix {
modules = [ container ];
}).config.system.build.toplevel;
containerName = "container";
containerRoot = "/var/lib/machines/${containerName}";
in
{
name = "systemd-machinectl";
machine = { lib, ... }: {
# use networkd to obtain systemd network setup
networking.useNetworkd = true;
networking.useDHCP = false;
services.resolved.enable = false;
# open DHCP server on interface to container
networking.firewall.trustedInterfaces = [ "ve-+" ];
# do not try to access cache.nixos.org
nix.settings.substituters = lib.mkForce [ ];
virtualisation.additionalPaths = [ containerSystem ];
};
testScript = ''
start_all()
machine.wait_for_unit("default.target");
# Install container
machine.succeed("mkdir -p ${containerRoot}");
# Workaround for nixos-install
machine.succeed("chmod o+rx /var/lib/machines");
machine.succeed("nixos-install --root ${containerRoot} --system ${containerSystem} --no-channel-copy --no-root-passwd");
# Allow systemd-nspawn to apply user namespace on immutable files
machine.succeed("chattr -i ${containerRoot}/var/empty");
# Test machinectl start
machine.succeed("machinectl start ${containerName}");
machine.wait_until_succeeds("systemctl -M ${containerName} is-active default.target");
# Test systemd-nspawn network configuration
machine.succeed("ping -n -c 1 ${containerName}");
# Test systemd-nspawn uses a user namespace
machine.succeed("test `stat ${containerRoot}/var/empty -c %u%g` != 00");
# Test systemd-nspawn reboot
machine.succeed("machinectl shell ${containerName} /run/current-system/sw/bin/reboot");
machine.wait_until_succeeds("systemctl -M ${containerName} is-active default.target");
# Test machinectl reboot
machine.succeed("machinectl reboot ${containerName}");
machine.wait_until_succeeds("systemctl -M ${containerName} is-active default.target");
# Test machinectl stop
machine.succeed("machinectl stop ${containerName}");
# Show to to delete the container
machine.succeed("chattr -i ${containerRoot}/var/empty");
machine.succeed("rm -rf ${containerRoot}");
'';
}
)

View file

@ -0,0 +1,28 @@
{ lib
, stdenv
, fetchCrate
, rustPlatform
, pkg-config
, alsa-lib }:
rustPlatform.buildRustPackage rec {
pname = "termusic";
version = "0.6.10";
src = fetchCrate {
inherit pname version;
sha256 = "sha256-i+XxEPkLZK+JKDl88P8Nd7XBhsGhEzvUGovJtSWvRtg=";
};
cargoHash = "sha256-7nQzU1VvRDrtltVAXTX268vl9AbQhMOilPG4nNAJ+Xk=";
nativeBuildInputs = [ pkg-config ];
buildInputs = [ alsa-lib ];
meta = with lib; {
description = "Terminal Music Player TUI written in Rust";
homepage = "https://github.com/tramhao/termusic";
license = with licenses; [ gpl3Only ];
maintainers = with maintainers; [ devhell ];
};
}

View file

@ -72,7 +72,7 @@ stdenv.mkDerivation rec {
'';
license = licenses.mit;
homepage = "https://pivx.org";
maintainers = with maintainers; [ wucke13 ];
maintainers = with maintainers; [ ];
platforms = platforms.unix;
};
}

View file

@ -18,13 +18,13 @@ in
stdenv.mkDerivation rec {
pname = "imagemagick";
version = "7.1.0-25";
version = "7.1.0-26";
src = fetchFromGitHub {
owner = "ImageMagick";
repo = "ImageMagick";
rev = version;
hash = "sha256-zSbngA56YnJ1W+ZlA6Q850NTtZovjue51zEgbKI3iqc=";
hash = "sha256-q1CL64cfyb5fN9aVYJfls+v0XRFd4jH+B8n+UJqPE1I=";
};
outputs = [ "out" "dev" "doc" ]; # bin/ isn't really big

View file

@ -0,0 +1,20 @@
{ lib, stdenv, rustPlatform, fetchCrate }:
rustPlatform.buildRustPackage rec {
pname = "globe-cli";
version = "0.2.0";
src = fetchCrate {
inherit pname version;
sha256 = "sha256-Np1f/mSMIMZU3hE0Fur8bOHhOH3rZyroGiVAqfiIs7g=";
};
cargoHash = "sha256-qoCOYk7hyjMx07l48IkxE6zsG58NkF72E3OvoZHz5d0=";
meta = with lib; {
description = "Display an interactive ASCII globe in your terminal";
homepage = "https://github.com/adamsky/globe";
license = licenses.gpl3Only;
maintainers = with maintainers; [ devhell ];
};
}

View file

@ -2,13 +2,13 @@
python3Packages.buildPythonApplication rec {
pname = "rmview";
version = "3.1";
version = "3.1.1";
src = fetchFromGitHub {
owner = "bordaigorl";
repo = pname;
rev = "v${version}";
sha256 = "11p62dglxnvml3x95mi2sfai1k0gmvzwixzijr3gls2ss73maffw";
sha256 = "sha256-lUzmOayMHftvCukXSxXr6tBzrr2vaua1ey9gsuCKOBc=";
};
nativeBuildInputs = with python3Packages; [ pyqt5 wrapQtAppsHook ];
@ -18,10 +18,6 @@ python3Packages.buildPythonApplication rec {
pyrcc5 -o src/rmview/resources.py resources.qrc
'';
preFixup = ''
wrapQtApp "$out/bin/rmview"
'';
meta = with lib; {
description = "Fast live viewer for reMarkable 1 and 2";
homepage = "https://github.com/bordaigorl/rmview";

View file

@ -0,0 +1,27 @@
{ buildGoModule, lib, fetchFromGitHub }:
buildGoModule rec {
pname = "argo-rollouts";
version = "1.1.1";
src = fetchFromGitHub {
owner = "argoproj";
repo = "argo-rollouts";
rev = "v${version}";
sha256 = "0qb1wbv3razwhqsv972ywfazaq73y83iw6f6qdjcbwwfwsybig21";
};
vendorSha256 = "00ic1nn3wgg495x2170ik1d1cha20b4w89j9jclq8p0b3nndv0c0";
# Disable tests since some test fail because of missing test data
doCheck = false;
subPackages = [ "cmd/rollouts-controller" "cmd/kubectl-argo-rollouts" ];
meta = with lib; {
description = "Kubernetes Progressive Delivery Controller";
homepage = "https://github.com/argoproj/argo-rollouts/";
license = licenses.asl20;
maintainers = with maintainers; [ psibi ];
};
}

View file

@ -26,7 +26,7 @@ stdenv.mkDerivation rec {
'';
homepage = "http://getdp.info/";
license = licenses.gpl2Plus;
maintainers = with maintainers; [ wucke13 ];
maintainers = with maintainers; [ ];
platforms = platforms.linux;
};
}

View file

@ -21,13 +21,13 @@ assert lib.assertMsg (unknownTweaks == [ ]) ''
stdenvNoCC.mkDerivation
rec {
pname = "orchis-theme";
version = "2021-12-13";
version = "2022-02-18";
src = fetchFromGitHub {
repo = "Orchis-theme";
owner = "vinceliuice";
rev = version;
sha256 = "sha256-PN2ucGMDzRv4v86X1zVIs9+GkbMWuja2WaSQLFvJYd0=";
sha256 = "sha256-SqptW8DEDCB6LMHalRlf71TWK93gW+blbu6Q1Oommes=";
};
nativeBuildInputs = [ gtk3 sassc ];

View file

@ -2,10 +2,10 @@
stdenv.mkDerivation rec {
pname = "duktape";
version = "2.6.0";
version = "2.7.0";
src = fetchurl {
url = "http://duktape.org/duktape-${version}.tar.xz";
sha256 = "19szwxzvl2g65fw95ggvb8h0ma5bd9vvnnccn59hwnc4dida1x4n";
sha256 = "sha256-kPjS+otVZ8aJmDDd7ywD88J5YLEayiIvoXqnrGE8KJA=";
};
nativeBuildInputs = [ validatePkgConfig ];

View file

@ -2,11 +2,11 @@
stdenv.mkDerivation rec {
pname = "avro-c++";
version = "1.8.2";
version = "1.10.2";
src = fetchurl {
url = "mirror://apache/avro/avro-${version}/cpp/avro-cpp-${version}.tar.gz";
sha256 = "1ars58bfw83s8f1iqbhnqp4n9wc9cxsph0gs2a8k7r9fi09vja2k";
sha256 = "1qv2wxh5q2iq48m5g3xci9p05znzcl0v3314bhcsyr5bkpdjvzs1";
};
nativeBuildInputs = [ cmake python3 ];

View file

@ -33,7 +33,7 @@ stdenv.mkDerivation rec {
'';
homepage = "https://dqlite.io/";
license = licenses.asl20;
maintainers = with maintainers; [ joko wucke13 ];
maintainers = with maintainers; [ joko ];
platforms = platforms.linux;
};
}

View file

@ -1,6 +1,7 @@
{ stdenv
, lib
, fetchFromGitHub
, fetchpatch
, perl
, boost
, rdkafka
@ -28,6 +29,14 @@ stdenv.mkDerivation rec {
makeFlags = [ "GEN_PKG_CONFIG=y" ];
patches = [
# Fix compatibility with Avro master branch
(fetchpatch {
url = "https://github.com/confluentinc/libserdes/commit/d7a355e712ab63ec77f6722fb5a9e8056e7416a2.patch";
sha256 = "14bdx075n4lxah63kp7phld9xqlz3pzs03yf3wbq4nmkgwac10dh";
})
];
postPatch = ''
patchShebangs configure lds-gen.pl
'';

View file

@ -28,8 +28,9 @@ stdenv.mkDerivation rec {
doCheck = true;
meta = {
description = "Implementation of the Sender Policy Framework for SMTP authorization";
homepage = "https://www.libspf2.org";
description = "Implementation of the Sender Policy Framework for SMTP " +
"authorization (Helsinki Systems fork)";
homepage = "https://github.com/helsinki-systems/libspf2";
license = with licenses; [ lgpl21Plus bsd2 ];
maintainers = with maintainers; [ pacien ajs124 das_j ];
platforms = platforms.all;

View file

@ -5,14 +5,14 @@
}:
stdenv.mkDerivation rec {
version = "1.02r5";
version = "1.02r6";
pname = "libhomfly";
src = fetchFromGitHub {
owner = "miguelmarco";
repo = "libhomfly";
rev = version;
sha256 = "1szv8iwlhvmy3saigi15xz8vgch92p2lbsm6440v5s8vxj455bvd";
sha256 = "sha256-s1Hgy6S9+uREKsgjOVQdQfnds6oSLo5UWTrt5DJnY2s=";
};
buildInputs = [

View file

@ -74,6 +74,6 @@ stdenv.mkDerivation rec {
description = "Portable Extensible Toolkit for Scientific computation";
homepage = "https://www.mcs.anl.gov/petsc/index.html";
license = licenses.bsd2;
maintainers = with maintainers; [ wucke13 cburstedde ];
maintainers = with maintainers; [ cburstedde ];
};
}

View file

@ -200,7 +200,7 @@ let
};
manta = super.manta.override {
nativeBuildInputs = with pkgs; [ nodejs-12_x installShellFiles ];
nativeBuildInputs = with pkgs; [ nodejs-14_x installShellFiles ];
postInstall = ''
# create completions, following upstream procedure https://github.com/joyent/node-manta/blob/v5.2.3/Makefile#L85-L91
completion_cmds=$(find ./bin -type f -printf "%f\n")

View file

@ -164,7 +164,7 @@
, "insect"
, "intelephense"
, "ionic"
, {"iosevka": "https://github.com/be5invis/Iosevka/archive/v11.0.1.tar.gz"}
, {"iosevka": "https://github.com/be5invis/Iosevka/archive/v14.0.1.tar.gz"}
, "jake"
, "javascript-typescript-langserver"
, "joplin"

File diff suppressed because it is too large Load diff

View file

@ -0,0 +1,36 @@
{ buildPythonPackage
, einops
, fetchFromGitHub
, jax
, jaxlib
, lib
}:
buildPythonPackage rec {
pname = "augmax";
version = "unstable-2022-02-19";
format = "setuptools";
src = fetchFromGitHub {
owner = "khdlr";
repo = pname;
# augmax does not have releases tagged. See https://github.com/khdlr/augmax/issues/5.
rev = "3e5d85d6921a1e519987d33f226bc13f61e04d04";
sha256 = "046n43v7161w7najzlbi0443q60436xv24nh1mv23yw6psqqhx5i";
};
propagatedBuildInputs = [ einops jax ];
# augmax does not have any tests at the time of writing (2022-02-19), but
# jaxlib is necessary for the pythonImportsCheckPhase.
checkInputs = [ jaxlib ];
pythonImportsCheck = [ "augmax" ];
meta = with lib; {
description = "Efficiently Composable Data Augmentation on the GPU with Jax";
homepage = "https://github.com/khdlr/augmax";
license = licenses.asl20;
maintainers = with maintainers; [ samuela ];
};
}

View file

@ -10,11 +10,11 @@
buildPythonPackage rec {
pname = "pywayland";
version = "0.4.10";
version = "0.4.11";
src = fetchPypi {
inherit pname version;
sha256 = "sha256-3fVAJXiIS6sFUj8riHg7LJ4VLLpjZEK8qTJNYSaXtOw=";
sha256 = "coUNrPcHLBDamgKiZ08ysg2maQ2wLRSijfNRblKMIZk=";
};
nativeBuildInputs = [ pkg-config ];

View file

@ -26,6 +26,11 @@ buildPythonApplication rec {
./disable-test-timeouts.patch
];
postPatch = ''
substituteInPlace pyproject.toml \
--replace 'pyparsing = "^2.4"' 'pyparsing = "^3.0.6"'
'';
nativeBuildInputs = [ poetry ];
propagatedBuildInputs = [ pygls pyparsing ];

View file

@ -1,17 +1,22 @@
{ lib, rustPlatform, fetchFromGitHub, stdenv, libiconv }:
{ lib
, stdenv
, rustPlatform
, fetchFromGitHub
, libiconv
}:
rustPlatform.buildRustPackage rec {
pname = "cargo-expand";
version = "1.0.14";
version = "1.0.16";
src = fetchFromGitHub {
owner = "dtolnay";
repo = pname;
rev = version;
sha256 = "sha256-6Wm/qnrSUswWnXt6CPUJUvqNj06eSYuYOmGhbpO1hvo=";
sha256 = "sha256-NhBUN+pf+j/4IozFDEb+XZ1ijSk6dNvCANyez823a0c=";
};
cargoSha256 = "sha256-1+3NMfUhL5sPu92r+B0DRmJ03ZREkFZHjMjvabLyFgs=";
cargoSha256 = "sha256-7rqtxyoo1SQ7Rae04+b+B0JgCKeW0p1j7bZzPpJ8+ks=";
buildInputs = lib.optional stdenv.isDarwin libiconv;

View file

@ -1,7 +1,7 @@
{ lib
, stdenv
, fetchFromGitHub
, sconsPackages
, scons
, libX11
, pkg-config
, libusb1
@ -22,10 +22,18 @@ stdenv.mkDerivation rec {
};
makeFlags = [ "PREFIX=$(out)" ];
nativeBuildInputs = [ pkg-config sconsPackages.scons_3_1_2 ];
nativeBuildInputs = [ pkg-config scons ];
buildInputs = [ libX11 libusb1 boost glib dbus-glib ];
enableParallelBuilding = true;
dontUseSconsInstall = true;
patches = [
./fix-60-sec-delay.patch
./scons-py3.patch
./scons-v4.2.0.patch
./xboxdrvctl-py3.patch
];
meta = with lib; {
homepage = "https://xboxdrv.gitlab.io/";
description = "Xbox/Xbox360 (and more) gamepad driver for Linux that works in userspace";

View file

@ -0,0 +1,27 @@
From 7326421eeaadbc2aeb3828628c2e65bb7be323a9 Mon Sep 17 00:00:00 2001
From: buxit <buti@bux.at>
Date: Wed, 2 Nov 2016 16:25:14 +0100
Subject: [PATCH] fix 60 seconds delay
use `libusb_handle_events_timeout_completed()` instead of `libusb_handle_events()`
should fix #144
---
src/usb_gsource.cpp | 5 ++++-
1 file changed, 4 insertions(+), 1 deletion(-)
diff --git a/src/usb_gsource.cpp b/src/usb_gsource.cpp
index 00bf1315..afb38f65 100644
--- a/src/usb_gsource.cpp
+++ b/src/usb_gsource.cpp
@@ -174,7 +174,10 @@ USBGSource::on_source_dispatch(GSource* source, GSourceFunc callback, gpointer u
gboolean
USBGSource::on_source()
{
- libusb_handle_events(NULL);
+ struct timeval to;
+ to.tv_sec = 0;
+ to.tv_usec = 0;
+ libusb_handle_events_timeout_completed(NULL, &to, NULL);
return TRUE;
}

View file

@ -0,0 +1,63 @@
From 17bd43a7d3ef86216abc36b42b4e6a1f70aa9979 Mon Sep 17 00:00:00 2001
From: xnick <xnick@users.noreply.github.com>
Date: Thu, 12 Oct 2017 20:34:35 +0300
Subject: [PATCH] Update SConstruct
python3 compatible
---
SConstruct | 16 ++++++++--------
1 file changed, 8 insertions(+), 8 deletions(-)
diff --git a/SConstruct b/SConstruct
index 4cd79704..c0007054 100644
--- a/SConstruct
+++ b/SConstruct
@@ -19,7 +19,7 @@ def build_dbus_glue(target, source, env):
xml = re.sub(r"callback = \(([A-Za-z_]+)\) \(marshal_data \? marshal_data : cc->callback\);",
r"union { \1 fn; void* obj; } conv;\n "
"conv.obj = (marshal_data ? marshal_data : cc->callback);\n "
- "callback = conv.fn;", xml)
+ "callback = conv.fn;", xml.decode('utf-8'))
with open(target[0].get_path(), "w") as f:
f.write(xml)
@@ -29,10 +29,10 @@ def build_bin2h(target, source, env):
Takes a list of files and converts them into a C source that can be included
"""
def c_escape(str):
- return str.translate(string.maketrans("/.-", "___"))
+ return str.translate(bytes.maketrans(b"/.-", b"___"))
- print target
- print source
+ print(target)
+ print(source)
with open(target[0].get_path(), "w") as fout:
fout.write("// autogenerated by scons Bin2H builder, do not edit by hand!\n\n")
@@ -45,8 +45,8 @@ def build_bin2h(target, source, env):
data = fin.read()
fout.write("// \"%s\"\n" % src.get_path())
fout.write("const char %s[] = {" % c_escape(src.get_path()))
- bytes_arr = ["0x%02x" % ord(c) for c in data]
- for i in xrange(len(bytes_arr)):
+ bytes_arr = ["0x%02x" % c for c in data]
+ for i in range(len(bytes_arr)):
if i % 13 == 0:
fout.write("\n ")
fout.write(bytes_arr[i])
@@ -131,12 +131,12 @@ env.Append(CPPDEFINES = { 'PACKAGE_VERSION': "'\"%s\"'" % package_version })
conf = Configure(env)
if not conf.env['CXX']:
- print "g++ must be installed!"
+ print('g++ must be installed!')
Exit(1)
# X11 checks
if not conf.CheckLibWithHeader('X11', 'X11/Xlib.h', 'C++'):
- print 'libx11-dev must be installed!'
+ print('libx11-dev must be installed!')
Exit(1)
env = conf.Finish()

View file

@ -0,0 +1,20 @@
--- a/SConstruct 2021-10-31 20:42:44.232084185 -0400
+++ b/SConstruct 2021-10-31 20:42:54.063024444 -0400
@@ -36,7 +36,7 @@
with open(target[0].get_path(), "w") as fout:
fout.write("// autogenerated by scons Bin2H builder, do not edit by hand!\n\n")
- if env.has_key("BIN2H_NAMESPACE"):
+ if "BIN2H_NAMESPACE" in env:
fout.write("namespace %s {\n\n" % env["BIN2H_NAMESPACE"])
# write down data
@@ -62,7 +62,7 @@
for src in source], ",\n"))
fout.write("\n}\n\n")
- if env.has_key("BIN2H_NAMESPACE"):
+ if "BIN2H_NAMESPACE" in env:
fout.write("} // namespace %s\n\n" % env["BIN2H_NAMESPACE"])
fout.write("/* EOF */\n")

View file

@ -0,0 +1,73 @@
--- a/xboxdrvctl 2021-06-21 19:39:51.000000000 -0400
+++ b/xboxdrvctl 19:43:27.467984928 -0400
@@ -1,4 +1,4 @@
-#!/usr/bin/env python2
+#!/usr/bin/env python3
## Xbox360 USB Gamepad Userspace Driver
## Copyright (C) 2011 Ingo Ruhnke <grumbel@gmail.com>
@@ -37,23 +37,23 @@
help="print controller status")
group.add_option("-s", "--slot", metavar="SLOT", type="int",
- dest="slot",
+ dest="slot",
help="use slot SLOT for actions")
group.add_option("-l", "--led", metavar="NUM", type="int",
- dest="led",
+ dest="led",
help="set LED")
-group.add_option("-r", "--rumble", metavar="L:R",
- dest="rumble",
+group.add_option("-r", "--rumble", metavar="L:R",
+ dest="rumble",
help="print controller status")
group.add_option("-c", "--config", metavar="NUM", type="int",
- dest="config",
+ dest="config",
help="switches to controller configuration NUM")
group.add_option("--shutdown", action="store_true",
- dest="shutdown",
+ dest="shutdown",
help="shuts down the daemon")
parser.add_option_group(group)
@@ -69,9 +69,9 @@
try:
bus.get_object("org.seul.Xboxdrv", '/org/seul/Xboxdrv/Daemon')
except dbus.exceptions.DBusException:
- bus = dbus.SystemBus()
+ bus = dbus.SystemBus()
else:
- print "Error: invalid argument to --bus. Must be 'auto', 'session, or 'system'"
+ print("Error: invalid argument to --bus. Must be 'auto', 'session, or 'system'")
exit()
if options.status:
@@ -82,19 +82,19 @@
daemon.Shutdown()
else:
if (options.led or options.rumble or options.config) and options.slot == None:
- print "Error: --slot argument required"
+ print("Error: --slot argument required")
exit()
else:
if options.slot != None:
slot = bus.get_object("org.seul.Xboxdrv", '/org/seul/Xboxdrv/ControllerSlots/%d' % options.slot)
-
+
if options.led != None:
slot.SetLed(options.led)
if options.rumble:
m = re.match('^(\d+):(\d+)$', options.rumble)
if not m:
- print "Error: invalid argument to --rumble"
+ print("Error: invalid argument to --rumble")
exit()
else:
left = int(m.group(1))

View file

@ -1,4 +1,4 @@
{ lib, stdenv, fetchurl, gnugrep, findutils }:
{ lib, stdenv, fetchurl }:
let
version = "28-1ubuntu4"; # impish 2021-06-24
@ -26,8 +26,8 @@ in stdenv.mkDerivation {
--replace /sbin/lsmod /run/booted-system/sw/bin/lsmod \
--replace /sbin/rmmod /run/booted-system/sw/bin/rmmod \
--replace /sbin/modprobe /run/booted-system/sw/bin/modprobe \
--replace " grep " " ${gnugrep}/bin/grep " \
--replace " xargs " " ${findutils}/bin/xargs "
--replace " grep " " /run/booted-system/sw/bin/grep " \
--replace " xargs " " /run/booted-system/sw/bin/xargs "
'';
meta = with lib; {

View file

@ -58,7 +58,7 @@ buildGoPackage rec {
description = "Daemon based on liblxc offering a REST API to manage containers";
homepage = "https://linuxcontainers.org/lxd/";
license = licenses.asl20;
maintainers = with maintainers; [ fpletz wucke13 marsam ];
maintainers = with maintainers; [ fpletz marsam ];
platforms = platforms.linux;
};
}

View file

@ -5,16 +5,16 @@
rustPlatform.buildRustPackage rec {
pname = "lfs";
version = "1.4.0";
version = "2.0.1";
src = fetchFromGitHub {
owner = "Canop";
repo = pname;
rev = "v${version}";
sha256 = "sha256-mTgJ2DbSQprKKy7wTMXwmUAvHS9tacs9Nk1cmEJW9Sg=";
sha256 = "sha256-UGeIY/wms4QxIzt+ctclUStuNNV6Hm3A4Wu+LfaKgbw=";
};
cargoSha256 = "sha256-Oiiz7I2eCtNMauvr0K2NtB49NJ/6XWVsJ0mMyEgFb7U=";
cargoSha256 = "sha256-c4rT6Y7XsmNrCtASkt6KWGTwGXwTM2berfdmSC61Z7s=";
meta = with lib; {
description = "Get information on your mounted disks";

View file

@ -3,13 +3,13 @@
stdenv.mkDerivation rec {
pname = "timg";
version = "1.4.3";
version = "1.4.4";
src = fetchFromGitHub {
owner = "hzeller";
repo = "timg";
rev = "v${version}";
sha256 = "1lanr2y9rchl0xmycsyl0bhnh9mrmr5dj46pglw4lykz4rxslzcx";
sha256 = "1gdwg15fywya6k6pajkx86kv2d8k85pmisnq53b02br5i01y4k41";
};
buildInputs = [ graphicsmagick ffmpeg libexif libjpeg openslide zlib ];

View file

@ -15,6 +15,7 @@
, javaSupport ? false
, jdk
, usev110Api ? false
, threadsafe ? false
}:
# cpp and mpi options are mutually exclusive
@ -25,9 +26,14 @@ let inherit (lib) optional optionals; in
stdenv.mkDerivation rec {
version = "1.12.1";
pname = "hdf5";
pname = "hdf5"
+ lib.optionalString cppSupport "-cpp"
+ lib.optionalString fortranSupport "-fortran"
+ lib.optionalString mpiSupport "-mpi"
+ lib.optionalString threadsafe "-threadsafe";
src = fetchurl {
url = "https://support.hdfgroup.org/ftp/HDF5/releases/hdf5-${lib.versions.majorMinor version}/${pname}-${version}/src/${pname}-${version}.tar.bz2";
url = "https://support.hdfgroup.org/ftp/HDF5/releases/hdf5-${lib.versions.majorMinor version}/hdf5-${version}/src/hdf5-${version}.tar.bz2";
sha256 = "sha256-qvn1MrPtqD09Otyfi0Cpt2MVIhj6RTScO8d1Asofjxw=";
};
@ -63,7 +69,9 @@ stdenv.mkDerivation rec {
++ optionals mpiSupport [ "--enable-parallel" "CC=${mpi}/bin/mpicc" ]
++ optional enableShared "--enable-shared"
++ optional javaSupport "--enable-java"
++ optional usev110Api "--with-default-api-version=v110";
++ optional usev110Api "--with-default-api-version=v110"
# hdf5 hl (High Level) library is not considered stable with thread safety and should be disabled.
++ optionals threadsafe [ "--enable-threadsafe" "--disable-hl" ];
patches = [
./bin-mv.patch

View file

@ -2,18 +2,18 @@
stdenv.mkDerivation rec {
pname = "vttest";
version = "20210210";
version = "20220215";
src = fetchurl {
urls = [
"https://invisible-mirror.net/archives/${pname}/${pname}-${version}.tgz"
"ftp://ftp.invisible-island.net/${pname}/${pname}-${version}.tgz"
];
sha256 = "sha256-D5ii4wWYKRXxUgmEw+hpjjrNUI7iEHEVKMifWn6n8EY=";
sha256 = "sha256-SmWZjF4SzwjO0s/OEZrbRPqEKsFJXQ8VDyHIpnhZFaE=";
};
meta = with lib; {
description = "Tests the compatibility so-called 'VT100-compatible' terminals";
description = "Tests the compatibility of so-called 'VT100-compatible' terminals";
homepage = "https://invisible-island.net/vttest/";
license = licenses.mit;
platforms = platforms.all;

View file

@ -20,8 +20,13 @@
, libX11
}:
# daemon and client are not build monolithic
assert monolithic || (!monolithic && (enableDaemon || client));
stdenv.mkDerivation rec {
pname = "amule";
pname = "amule"
+ lib.optionalString enableDaemon "-daemon"
+ lib.optionalString client "-gui";
version = "2.3.3";
src = fetchFromGitHub {
@ -34,9 +39,14 @@ stdenv.mkDerivation rec {
nativeBuildInputs = [ cmake gettext makeWrapper pkg-config ];
buildInputs = [
zlib wxGTK30-gtk3 perl cryptopp.dev libupnp boost
zlib
wxGTK30-gtk3
perl
cryptopp.dev
libupnp
boost
] ++ lib.optional httpServer libpng
++ lib.optional client libX11;
++ lib.optional client libX11;
cmakeFlags = [
"-DBUILD_MONOLITHIC=${if monolithic then "ON" else "OFF"}"

View file

@ -4,16 +4,16 @@ rustPlatform.buildRustPackage rec {
pname = "statix";
# also update version of the vim plugin in pkgs/misc/vim-plugins/overrides.nix
# the version can be found in flake.nix of the source code
version = "0.5.3";
version = "0.5.4";
src = fetchFromGitHub {
owner = "nerdypepper";
repo = pname;
rev = "v${version}";
sha256 = "sha256-ibz5b+amOTlLxDlCPrC7A6rSFac3JXwiq3HMyIJwdUw=";
sha256 = "sha256-9208bR3awxXR1MSh9HbsKeen5V4r4hPuJFkK/CMJRfg=";
};
cargoSha256 = "sha256-MKInDGBZcOp+90cus6X2GAgjZx6M1TbSJgpUQWx60sQ=";
cargoSha256 = "sha256-f1/PMbXUiqjFI8Y0mvgEyNqGGYqGq3nV094mg1aZIHM=";
buildFeatures = lib.optional withJson "json";

View file

@ -147,7 +147,9 @@ let
in
stdenv.mkDerivation rec {
pname = "asciidoc";
pname = "asciidoc"
+ lib.optionalString enableStandardFeatures "-full"
+ lib.optionalString enableExtraPlugins "-with-plugins";
version = "9.1.0";
# Note: a substitution to improve reproducibility should be updated once 10.0.0 is

View file

@ -1,65 +1,57 @@
{ lib, python3, glibcLocales }:
{ lib, python3, glibcLocales, docker-compose }:
let
docker_compose = changeVersion (with localPython.pkgs; docker-compose.override {
inherit colorama pyyaml six dockerpty docker jsonschema requests websocket-client paramiko;
}).overridePythonAttrs "1.25.5" "1ijhg93zs3lswkljnm0rhww7gdy0g94psvsya2741prz2zcbcbks";
localPython = python3.override {
packageOverrides = self: super: {
cement = super.cement.overridePythonAttrs (oldAttrs: rec {
version = "2.8.2";
src = oldAttrs.src.override {
inherit version;
sha256 = "1li2whjzfhbpg6fjb6r1r92fb3967p1xv6hqs3j787865h2ysrc7";
};
});
colorama = super.colorama.overridePythonAttrs (oldAttrs: rec {
version = "0.3.7";
src = oldAttrs.src.override {
inherit version;
sha256 = "0avqkn6362v7k2kg3afb35g4sfdvixjgy890clip4q174p9whhz0";
};
});
pathspec = super.pathspec.overridePythonAttrs (oldAttrs: rec {
name = "${oldAttrs.pname}-${version}";
version = "0.5.5";
src = oldAttrs.src.override {
inherit version;
sha256 = "72c495d1bbe76674219e307f6d1c6062f2e1b0b483a5e4886435127d0df3d0d3";
};
});
requests = super.requests.overridePythonAttrs (oldAttrs: rec {
version = "2.9.1";
src = oldAttrs.src.override {
inherit version;
sha256 = "0zsqrzlybf25xscgi7ja4s48y2abf9wvjkn47wh984qgs1fq2xy5";
};
});
semantic-version = super.semantic-version.overridePythonAttrs (oldAttrs: rec {
version = "2.5.0";
src = oldAttrs.src.override {
inherit version;
sha256 = "0p5n3d6blgkncxdz00yxqav0cis87fisdkirjm0ljjh7rdfx7aiv";
};
});
tabulate = super.tabulate.overridePythonAttrs (oldAttrs: rec {
version = "0.7.5";
src = oldAttrs.src.override {
inherit version;
sha256 = "03l1r7ddd1a0j2snv1yd0hlnghjad3fg1an1jr8936ksv75slwch";
};
});
changeVersion = overrideFunc: version: sha256: overrideFunc (oldAttrs: rec {
inherit version;
src = oldAttrs.src.override {
inherit version sha256;
};
};
in with localPython.pkgs; buildPythonApplication rec {
});
changeVersionHash = overrideFunc: version: hash: overrideFunc (oldAttrs: rec {
inherit version;
src = oldAttrs.src.override {
inherit version hash;
};
});
localPython = python3.override
{
self = localPython;
packageOverrides = self: super: {
cement = changeVersion super.cement.overridePythonAttrs "2.8.2" "1li2whjzfhbpg6fjb6r1r92fb3967p1xv6hqs3j787865h2ysrc7";
botocore = changeVersion super.botocore.overridePythonAttrs "1.23.54" "sha256-S7m6FszO5fWiYCBJvD4ttoZTRrJVBmfzATvfM7CgHOs=";
colorama = changeVersion super.colorama.overridePythonAttrs "0.4.3" "189n8hpijy14jfan4ha9f5n06mnl33cxz7ay92wjqgkr639s0vg9";
future = changeVersion super.future.overridePythonAttrs "0.16.0" "1nzy1k4m9966sikp0qka7lirh8sqrsyainyf8rk97db7nwdfv773";
requests = changeVersionHash super.requests.overridePythonAttrs "2.26.0" "sha256-uKpY+M95P/2HgtPYyxnmbvNverpDU+7IWedGeLAbB6c=";
six = changeVersion super.six.overridePythonAttrs "1.14.0" "02lw67hprv57hyg3cfy02y3ixjk3nzwc0dx3c4ynlvkfwkfdnsr3";
wcwidth = changeVersion super.wcwidth.overridePythonAttrs "0.1.9" "1wf5ycjx8s066rdvr0fgz4xds9a8zhs91c4jzxvvymm1c8l8cwzf";
pyyaml = super.pyyaml.overridePythonAttrs (oldAttrs: rec {
version = "5.4.1";
checkPhase = ''
runHook preCheck
PYTHONPATH="tests/lib3:$PYTHONPATH" ${localPython.interpreter} -m test_all
runHook postCheck
'';
src = localPython.pkgs.fetchPypi {
pname = "PyYAML";
inherit version;
sha256 = "sha256-YHd0y7oocyv6gCtUuqdIQhX1MJkQVbtWLvvtWy8gpF4=";
};
});
};
};
in
with localPython.pkgs; buildPythonApplication rec {
pname = "awsebcli";
version = "3.12.4";
version = "3.20.3";
src = fetchPypi {
inherit pname version;
sha256 = "128dgxyz2bgl3r4jdkbmjs280004bm0dwzln7p6ly3yjs2x37jl6";
sha256 = "sha256-W3nUXPAXoicDQNXigktR1+b/9W6qvi90fujrXAekxTU=";
};
buildInputs = [
@ -69,29 +61,38 @@ in with localPython.pkgs; buildPythonApplication rec {
LC_ALL = "en_US.UTF-8";
checkInputs = [
pytest mock nose pathspec colorama requests docutils
pytest
mock
nose
pathspec
colorama
requests
docutils
];
doCheck = false;
doCheck = true;
propagatedBuildInputs = [
# FIXME: Add optional docker dependency, which requires requests >= 2.14.2.
# Otherwise, awsebcli will try to install it using pip when using some
# commands (like "eb local run").
blessed botocore cement colorama dockerpty docopt pathspec pyyaml
requests semantic-version setuptools tabulate termcolor websocket-client
blessed
botocore
cement
colorama
pathspec
pyyaml
future
requests
semantic-version
setuptools
tabulate
termcolor
websocket-client
docker_compose
];
postInstall = ''
mkdir -p $out/share/bash-completion/completions
mv $out/bin/eb_completion.bash $out/share/bash-completion/completions/
'';
meta = with lib; {
homepage = "https://aws.amazon.com/elasticbeanstalk/";
description = "A command line interface for Elastic Beanstalk";
maintainers = with maintainers; [ eqyiel ];
license = licenses.asl20;
broken = true;
};
}

View file

@ -63,6 +63,8 @@ mapAliases ({
amazon-glacier-cmd-interface = throw "amazon-glacier-cmd-interface has been removed due to it being unmaintained."; # Added 2020-10-30
aminal = throw "aminal was renamed to darktile."; # Added 2021-09-28
ammonite-repl = ammonite; # Added 2017-05-02
amuleDaemon = throw "amuleDaemon was renamed to amule-daemon."; # Added 2022-02-11
amuleGui = throw "amuleGui was renamed to amule-gui."; # Added 2022-02-11
amsn = throw "amsn has been removed due to being unmaintained."; # Added 2020-12-09
angelfish = libsForQt5.plasmaMobileGear.angelfish; # Added 2021-10-06
antimicro = throw "antimicro has been removed as it was broken, see antimicrox instead."; # Added 2020-08-06

View file

@ -1075,6 +1075,8 @@ with pkgs;
tauon = callPackage ../applications/audio/tauon { };
termusic = callPackage ../applications/audio/termusic { };
tfk8s = callPackage ../tools/misc/tfk8s { };
tnat64 = callPackage ../tools/networking/tnat64 { };
@ -1539,15 +1541,15 @@ with pkgs;
amule = callPackage ../tools/networking/p2p/amule { };
amuleDaemon = appendToName "daemon" (amule.override {
amule-daemon = amule.override {
monolithic = false;
enableDaemon = true;
});
};
amuleGui = appendToName "gui" (amule.override {
amule-gui = amule.override {
monolithic = false;
client = true;
});
};
antennas = nodePackages.antennas;
@ -3889,20 +3891,20 @@ with pkgs;
enableStandardFeatures = false;
};
asciidoc-full = appendToName "full" (asciidoc.override {
asciidoc-full = asciidoc.override {
inherit (python3.pkgs) pygments;
texlive = texlive.combine { inherit (texlive) scheme-minimal dvipng; };
w3m = w3m-batch;
enableStandardFeatures = true;
});
};
asciidoc-full-with-plugins = appendToName "full-with-plugins" (asciidoc.override {
asciidoc-full-with-plugins = asciidoc.override {
inherit (python3.pkgs) pygments;
texlive = texlive.combine { inherit (texlive) scheme-minimal dvipng; };
w3m = w3m-batch;
enableStandardFeatures = true;
enableExtraPlugins = true;
});
};
asciidoctor = callPackage ../tools/typesetting/asciidoctor { };
@ -6437,24 +6439,13 @@ with pkgs;
hdf5_1_10 = callPackage ../tools/misc/hdf5/1.10.nix { };
hdf5-mpi = appendToName "mpi" (hdf5.override {
mpiSupport = true;
});
hdf5-mpi = hdf5.override { mpiSupport = true; };
hdf5-cpp = appendToName "cpp" (hdf5.override {
cppSupport = true;
});
hdf5-cpp = hdf5.override { cppSupport = true; };
hdf5-fortran = appendToName "fortran" (hdf5.override {
fortranSupport = true;
});
hdf5-fortran = hdf5.override { fortranSupport = true; };
hdf5-threadsafe = appendToName "threadsafe" (hdf5.overrideAttrs (oldAttrs: {
# Threadsafe hdf5
# However, hdf5 hl (High Level) library is not considered stable
# with thread safety and should be disabled.
configureFlags = oldAttrs.configureFlags ++ ["--enable-threadsafe" "--disable-hl" ];
}));
hdf5-threadsafe = hdf5.override { threadsafe = true; };
hdf5-blosc = callPackage ../development/libraries/hdf5-blosc { };
@ -24475,6 +24466,8 @@ with pkgs;
argocd = callPackage ../applications/networking/cluster/argocd { };
argo-rollouts = callPackage ../applications/networking/cluster/argo-rollouts { };
ario = callPackage ../applications/audio/ario { };
arion = callPackage ../applications/virtualization/arion { };
@ -25515,6 +25508,8 @@ with pkgs;
gitweb = callPackage ../applications/version-management/git-and-tools/gitweb { };
globe-cli = callPackage ../applications/misc/globe-cli { };
gnss-sdr = callPackage ../applications/radio/gnss-sdr { };
gnuradio = callPackage ../applications/radio/gnuradio/wrapper.nix {
@ -27900,7 +27895,9 @@ with pkgs;
oberon-risc-emu = callPackage ../applications/emulators/oberon-risc-emu { };
obs-studio = libsForQt5.callPackage ../applications/video/obs-studio {};
obs-studio = libsForQt5.callPackage ../applications/video/obs-studio {
ffmpeg_4 = ffmpeg-full;
};
obs-studio-plugins = recurseIntoAttrs (callPackage ../applications/video/obs-studio/plugins {});
wrapOBS = callPackage ../applications/video/obs-studio/wrapper.nix {};

View file

@ -750,6 +750,8 @@ in {
inherit (pkgs) augeas;
};
augmax = callPackage ../development/python-modules/augmax { };
auroranoaa = callPackage ../development/python-modules/auroranoaa { };
aurorapy = callPackage ../development/python-modules/aurorapy { };