Merge staging-next into staging

This commit is contained in:
Frederik Rietdijk 2020-12-01 14:23:10 +01:00
commit ff90abd5dd
81 changed files with 1328 additions and 634 deletions

View file

@ -15,11 +15,11 @@
<xi:include href="linux.xml" /> <xi:include href="linux.xml" />
<xi:include href="locales.xml" /> <xi:include href="locales.xml" />
<xi:include href="nginx.xml" /> <xi:include href="nginx.xml" />
<xi:include href="opengl.xml" /> <xi:include href="opengl.section.xml" />
<xi:include href="shell-helpers.xml" /> <xi:include href="shell-helpers.xml" />
<xi:include href="steam.xml" /> <xi:include href="steam.xml" />
<xi:include href="cataclysm-dda.section.xml" /> <xi:include href="cataclysm-dda.section.xml" />
<xi:include href="urxvt.xml" /> <xi:include href="urxvt.xml" />
<xi:include href="weechat.xml" /> <xi:include href="weechat.section.xml" />
<xi:include href="xorg.xml" /> <xi:include href="xorg.section.xml" />
</chapter> </chapter>

View file

@ -0,0 +1,15 @@
# OpenGL {#sec-opengl}
OpenGL support varies depending on which hardware is used and which drivers are available and loaded.
Broadly, we support both GL vendors: Mesa and NVIDIA.
## NixOS Desktop
The NixOS desktop or other non-headless configurations are the primary target for OpenGL libraries and applications. The current solution for discovering which drivers are available is based on [libglvnd](https://gitlab.freedesktop.org/glvnd/libglvnd). `libglvnd` performs "vendor-neutral dispatch", trying a variety of techniques to find the system's GL implementation. In practice, this will be either via standard GLX for X11 users or EGL for Wayland users, and supporting either NVIDIA or Mesa extensions.
## Nix on GNU/Linux
If you are using a non-NixOS GNU/Linux/X11 desktop with free software video drivers, consider launching OpenGL-dependent programs from Nixpkgs with Nixpkgs versions of `libglvnd` and `mesa.drivers` in `LD_LIBRARY_PATH`. For Mesa drivers, the Linux kernel version doesn't have to match nixpkgs.
For proprietary video drivers you might have luck with also adding the corresponding video driver package.

View file

@ -1,9 +0,0 @@
<section xmlns="http://docbook.org/ns/docbook"
xmlns:xlink="http://www.w3.org/1999/xlink"
xml:id="sec-opengl">
<title>OpenGL</title>
<para>
Packages that use OpenGL have NixOS desktop as their primary target. The current solution for loading the GPU-specific drivers is based on <literal>libglvnd</literal> and looks for the driver implementation in <literal>LD_LIBRARY_PATH</literal>. If you are using a non-NixOS GNU/Linux/X11 desktop with free software video drivers, consider launching OpenGL-dependent programs from Nixpkgs with Nixpkgs versions of <literal>libglvnd</literal> and <literal>mesa.drivers</literal> in <literal>LD_LIBRARY_PATH</literal>. For proprietary video drivers you might have luck with also adding the corresponding video driver package.
</para>
</section>

View file

@ -0,0 +1,85 @@
# Weechat {#sec-weechat}
Weechat can be configured to include your choice of plugins, reducing its closure size from the default configuration which includes all available plugins. To make use of this functionality, install an expression that overrides its configuration such as
```nix
weechat.override {configure = {availablePlugins, ...}: {
plugins = with availablePlugins; [ python perl ];
}
}
```
If the `configure` function returns an attrset without the `plugins` attribute, `availablePlugins` will be used automatically.
The plugins currently available are `python`, `perl`, `ruby`, `guile`, `tcl` and `lua`.
The python and perl plugins allows the addition of extra libraries. For instance, the `inotify.py` script in `weechat-scripts` requires D-Bus or libnotify, and the `fish.py` script requires `pycrypto`. To use these scripts, use the plugin's `withPackages` attribute:
```nix
weechat.override { configure = {availablePlugins, ...}: {
plugins = with availablePlugins; [
(python.withPackages (ps: with ps; [ pycrypto python-dbus ]))
];
};
}
```
In order to also keep all default plugins installed, it is possible to use the following method:
```nix
weechat.override { configure = { availablePlugins, ... }: {
plugins = builtins.attrValues (availablePlugins // {
python = availablePlugins.python.withPackages (ps: with ps; [ pycrypto python-dbus ]);
});
}; }
```
WeeChat allows to set defaults on startup using the `--run-command`. The `configure` method can be used to pass commands to the program:
```nix
weechat.override {
configure = { availablePlugins, ... }: {
init = ''
/set foo bar
/server add freenode chat.freenode.org
'';
};
}
```
Further values can be added to the list of commands when running `weechat --run-command "your-commands"`.
Additionally it's possible to specify scripts to be loaded when starting `weechat`. These will be loaded before the commands from `init`:
```nix
weechat.override {
configure = { availablePlugins, ... }: {
scripts = with pkgs.weechatScripts; [
weechat-xmpp weechat-matrix-bridge wee-slack
];
init = ''
/set plugins.var.python.jabber.key "val"
'':
};
}
```
In `nixpkgs` there's a subpackage which contains derivations for WeeChat scripts. Such derivations expect a `passthru.scripts` attribute which contains a list of all scripts inside the store path. Furthermore all scripts have to live in `$out/share`. An exemplary derivation looks like this:
```nix
{ stdenv, fetchurl }:
stdenv.mkDerivation {
name = "exemplary-weechat-script";
src = fetchurl {
url = "https://scripts.tld/your-scripts.tar.gz";
sha256 = "...";
};
passthru.scripts = [ "foo.py" "bar.lua" ];
installPhase = ''
mkdir $out/share
cp foo.py $out/share
cp bar.lua $out/share
'';
}
```

View file

@ -1,85 +0,0 @@
<section xmlns="http://docbook.org/ns/docbook"
xmlns:xlink="http://www.w3.org/1999/xlink"
xml:id="sec-weechat">
<title>Weechat</title>
<para>
Weechat can be configured to include your choice of plugins, reducing its closure size from the default configuration which includes all available plugins. To make use of this functionality, install an expression that overrides its configuration such as
<programlisting>weechat.override {configure = {availablePlugins, ...}: {
plugins = with availablePlugins; [ python perl ];
}
}</programlisting>
If the <literal>configure</literal> function returns an attrset without the <literal>plugins</literal> attribute, <literal>availablePlugins</literal> will be used automatically.
</para>
<para>
The plugins currently available are <literal>python</literal>, <literal>perl</literal>, <literal>ruby</literal>, <literal>guile</literal>, <literal>tcl</literal> and <literal>lua</literal>.
</para>
<para>
The python and perl plugins allows the addition of extra libraries. For instance, the <literal>inotify.py</literal> script in weechat-scripts requires D-Bus or libnotify, and the <literal>fish.py</literal> script requires pycrypto. To use these scripts, use the plugin's <literal>withPackages</literal> attribute:
<programlisting>weechat.override { configure = {availablePlugins, ...}: {
plugins = with availablePlugins; [
(python.withPackages (ps: with ps; [ pycrypto python-dbus ]))
];
};
}
</programlisting>
</para>
<para>
In order to also keep all default plugins installed, it is possible to use the following method:
<programlisting>weechat.override { configure = { availablePlugins, ... }: {
plugins = builtins.attrValues (availablePlugins // {
python = availablePlugins.python.withPackages (ps: with ps; [ pycrypto python-dbus ]);
});
}; }
</programlisting>
</para>
<para>
WeeChat allows to set defaults on startup using the <literal>--run-command</literal>. The <literal>configure</literal> method can be used to pass commands to the program:
<programlisting>weechat.override {
configure = { availablePlugins, ... }: {
init = ''
/set foo bar
/server add freenode chat.freenode.org
'';
};
}</programlisting>
Further values can be added to the list of commands when running <literal>weechat --run-command "your-commands"</literal>.
</para>
<para>
Additionally it's possible to specify scripts to be loaded when starting <literal>weechat</literal>. These will be loaded before the commands from <literal>init</literal>:
<programlisting>weechat.override {
configure = { availablePlugins, ... }: {
scripts = with pkgs.weechatScripts; [
weechat-xmpp weechat-matrix-bridge wee-slack
];
init = ''
/set plugins.var.python.jabber.key "val"
'':
};
}</programlisting>
</para>
<para>
In <literal>nixpkgs</literal> there's a subpackage which contains derivations for WeeChat scripts. Such derivations expect a <literal>passthru.scripts</literal> attribute which contains a list of all scripts inside the store path. Furthermore all scripts have to live in <literal>$out/share</literal>. An exemplary derivation looks like this:
<programlisting>{ stdenv, fetchurl }:
stdenv.mkDerivation {
name = "exemplary-weechat-script";
src = fetchurl {
url = "https://scripts.tld/your-scripts.tar.gz";
sha256 = "...";
};
passthru.scripts = [ "foo.py" "bar.lua" ];
installPhase = ''
mkdir $out/share
cp foo.py $out/share
cp bar.lua $out/share
'';
}</programlisting>
</para>
</section>

View file

@ -0,0 +1,34 @@
# X.org {#sec-xorg}
The Nix expressions for the X.org packages reside in `pkgs/servers/x11/xorg/default.nix`. This file is automatically generated from lists of tarballs in an X.org release. As such it should not be modified directly; rather, you should modify the lists, the generator script or the file `pkgs/servers/x11/xorg/overrides.nix`, in which you can override or add to the derivations produced by the generator.
## Katamari Tarballs
X.org upstream releases used to include [katamari](https://en.wiktionary.org/wiki/%E3%81%8B%E3%81%9F%E3%81%BE%E3%82%8A) releases, which included a holistic recommended version for each tarball, up until 7.7. To create a list of tarballs in a katamari release:
```ShellSession
export release="X11R7.7"
export url="mirror://xorg/$release/src/everything/"
cat $(PRINT_PATH=1 nix-prefetch-url $url | tail -n 1) \
| perl -e 'while (<>) { if (/(href|HREF)="([^"]*.bz2)"/) { print "$ENV{'url'}$2\n"; }; }' \
| sort > "tarballs-$release.list"
```
## Individual Tarballs
The upstream release process for [X11R7.8](https://x.org/wiki/Releases/7.8/) does not include a planned katamari. Instead, each component of X.org is released as its own tarball. We maintain `pkgs/servers/x11/xorg/tarballs.list` as a list of tarballs for each individual package. This list includes X.org core libraries and protocol descriptions, extra newer X11 interface libraries, like `xorg.libxcb`, and classic utilities which are largely unused but still available if needed, like `xorg.imake`.
## Generating Nix Expressions
The generator is invoked as follows:
```ShellSession
cd pkgs/servers/x11/xorg
<tarballs.list perl ./generate-expr-from-tarballs.pl
```
For each of the tarballs in the `.list` files, the script downloads it, unpacks it, and searches its `configure.ac` and `*.pc.in` files for dependencies. This information is used to generate `default.nix`. The generator caches downloaded tarballs between runs. Pay close attention to the `NOT FOUND: $NAME` messages at the end of the run, since they may indicate missing dependencies. (Some might be optional dependencies, however.)
## Overriding the Generator
If the expression for a package requires derivation attributes that the generator cannot figure out automatically (say, `patches` or a `postInstall` hook), you should modify `pkgs/servers/x11/xorg/overrides.nix`.

View file

@ -1,34 +0,0 @@
<section xmlns="http://docbook.org/ns/docbook"
xmlns:xlink="http://www.w3.org/1999/xlink"
xml:id="sec-xorg">
<title>X.org</title>
<para>
The Nix expressions for the X.org packages reside in <filename>pkgs/servers/x11/xorg/default.nix</filename>. This file is automatically generated from lists of tarballs in an X.org release. As such it should not be modified directly; rather, you should modify the lists, the generator script or the file <filename>pkgs/servers/x11/xorg/overrides.nix</filename>, in which you can override or add to the derivations produced by the generator.
</para>
<para>
The generator is invoked as follows:
<screen>
<prompt>$ </prompt>cd pkgs/servers/x11/xorg
<prompt>$ </prompt>cat tarballs-7.5.list extra.list old.list \
| perl ./generate-expr-from-tarballs.pl
</screen>
For each of the tarballs in the <filename>.list</filename> files, the script downloads it, unpacks it, and searches its <filename>configure.ac</filename> and <filename>*.pc.in</filename> files for dependencies. This information is used to generate <filename>default.nix</filename>. The generator caches downloaded tarballs between runs. Pay close attention to the <literal>NOT FOUND: <replaceable>name</replaceable></literal> messages at the end of the run, since they may indicate missing dependencies. (Some might be optional dependencies, however.)
</para>
<para>
A file like <filename>tarballs-7.5.list</filename> contains all tarballs in a X.org release. It can be generated like this:
<screen>
<prompt>$ </prompt>export i="mirror://xorg/X11R7.4/src/everything/"
<prompt>$ </prompt>cat $(PRINT_PATH=1 nix-prefetch-url $i | tail -n 1) \
| perl -e 'while (&lt;>) { if (/(href|HREF)="([^"]*.bz2)"/) { print "$ENV{'i'}$2\n"; }; }' \
| sort > tarballs-7.4.list
</screen>
<filename>extra.list</filename> contains libraries that arent part of X.org proper, but are closely related to it, such as <literal>libxcb</literal>. <filename>old.list</filename> contains some packages that were removed from X.org, but are still needed by some people or by other packages (such as <varname>imake</varname>).
</para>
<para>
If the expression for a package requires derivation attributes that the generator cannot figure out automatically (say, <varname>patches</varname> or a <varname>postInstall</varname> hook), you should modify <filename>pkgs/servers/x11/xorg/overrides.nix</filename>.
</para>
</section>

View file

@ -0,0 +1,40 @@
# Coq {#sec-language-coq}
Coq libraries should be installed in `$(out)/lib/coq/${coq.coq-version}/user-contrib/`. Such directories are automatically added to the `$COQPATH` environment variable by the hook defined in the Coq derivation.
Some extensions (plugins) might require OCaml and sometimes other OCaml packages. The `coq.ocamlPackages` attribute can be used to depend on the same package set Coq was built against.
Coq libraries may be compatible with some specific versions of Coq only. The `compatibleCoqVersions` attribute is used to precisely select those versions of Coq that are compatible with this derivation.
Here is a simple package example. It is a pure Coq library, thus it depends on Coq. It builds on the Mathematical Components library, thus it also takes `mathcomp` as `buildInputs`. Its `Makefile` has been generated using `coq_makefile` so we only have to set the `$COQLIB` variable at install time.
```nix
{ stdenv, fetchFromGitHub, coq, mathcomp }:
stdenv.mkDerivation rec {
name = "coq${coq.coq-version}-multinomials-${version}";
version = "1.0";
src = fetchFromGitHub {
owner = "math-comp";
repo = "multinomials";
rev = version;
sha256 = "1qmbxp1h81cy3imh627pznmng0kvv37k4hrwi2faa101s6bcx55m";
};
buildInputs = [ coq ];
propagatedBuildInputs = [ mathcomp ];
installFlags = "COQLIB=$(out)/lib/coq/${coq.coq-version}/";
meta = {
description = "A Coq/SSReflect Library for Monoidal Rings and Multinomials";
inherit (src.meta) homepage;
license = stdenv.lib.licenses.cecill-b;
inherit (coq.meta) platforms;
};
passthru = {
compatibleCoqVersions = v: builtins.elem v [ "8.5" "8.6" "8.7" ];
};
}
```

View file

@ -1,52 +0,0 @@
<section xmlns="http://docbook.org/ns/docbook"
xmlns:xlink="http://www.w3.org/1999/xlink"
xml:id="sec-language-coq">
<title>Coq</title>
<para>
Coq libraries should be installed in <literal>$(out)/lib/coq/${coq.coq-version}/user-contrib/</literal>. Such directories are automatically added to the <literal>$COQPATH</literal> environment variable by the hook defined in the Coq derivation.
</para>
<para>
Some extensions (plugins) might require OCaml and sometimes other OCaml packages. The <literal>coq.ocamlPackages</literal> attribute can be used to depend on the same package set Coq was built against.
</para>
<para>
Coq libraries may be compatible with some specific versions of Coq only. The <literal>compatibleCoqVersions</literal> attribute is used to precisely select those versions of Coq that are compatible with this derivation.
</para>
<para>
Here is a simple package example. It is a pure Coq library, thus it depends on Coq. It builds on the Mathematical Components library, thus it also takes <literal>mathcomp</literal> as <literal>buildInputs</literal>. Its <literal>Makefile</literal> has been generated using <literal>coq_makefile</literal> so we only have to set the <literal>$COQLIB</literal> variable at install time.
</para>
<programlisting>
{ stdenv, fetchFromGitHub, coq, mathcomp }:
stdenv.mkDerivation rec {
name = "coq${coq.coq-version}-multinomials-${version}";
version = "1.0";
src = fetchFromGitHub {
owner = "math-comp";
repo = "multinomials";
rev = version;
sha256 = "1qmbxp1h81cy3imh627pznmng0kvv37k4hrwi2faa101s6bcx55m";
};
buildInputs = [ coq ];
propagatedBuildInputs = [ mathcomp ];
installFlags = "COQLIB=$(out)/lib/coq/${coq.coq-version}/";
meta = {
description = "A Coq/SSReflect Library for Monoidal Rings and Multinomials";
inherit (src.meta) homepage;
license = stdenv.lib.licenses.cecill-b;
inherit (coq.meta) platforms;
};
passthru = {
compatibleCoqVersions = v: builtins.elem v [ "8.5" "8.6" "8.7" ];
};
}
</programlisting>
</section>

View file

@ -9,7 +9,7 @@
<xi:include href="android.section.xml" /> <xi:include href="android.section.xml" />
<xi:include href="beam.section.xml" /> <xi:include href="beam.section.xml" />
<xi:include href="bower.xml" /> <xi:include href="bower.xml" />
<xi:include href="coq.xml" /> <xi:include href="coq.section.xml" />
<xi:include href="crystal.section.xml" /> <xi:include href="crystal.section.xml" />
<xi:include href="emscripten.section.xml" /> <xi:include href="emscripten.section.xml" />
<xi:include href="gnome.xml" /> <xi:include href="gnome.xml" />
@ -17,7 +17,7 @@
<xi:include href="haskell.section.xml" /> <xi:include href="haskell.section.xml" />
<xi:include href="idris.section.xml" /> <xi:include href="idris.section.xml" />
<xi:include href="ios.section.xml" /> <xi:include href="ios.section.xml" />
<xi:include href="java.xml" /> <xi:include href="java.section.xml" />
<xi:include href="lua.section.xml" /> <xi:include href="lua.section.xml" />
<xi:include href="maven.section.xml" /> <xi:include href="maven.section.xml" />
<xi:include href="node.section.xml" /> <xi:include href="node.section.xml" />

View file

@ -0,0 +1,91 @@
# Java {#sec-language-java}
Ant-based Java packages are typically built from source as follows:
```nix
stdenv.mkDerivation {
name = "...";
src = fetchurl { ... };
nativeBuildInputs = [ jdk ant ];
buildPhase = "ant";
}
```
Note that `jdk` is an alias for the OpenJDK (self-built where available,
or pre-built via Zulu). Platforms with OpenJDK not (yet) in Nixpkgs
(`Aarch32`, `Aarch64`) point to the (unfree) `oraclejdk`.
JAR files that are intended to be used by other packages should be
installed in `$out/share/java`. JDKs have a stdenv setup hook that add
any JARs in the `share/java` directories of the build inputs to the
`CLASSPATH` environment variable. For instance, if the package `libfoo`
installs a JAR named `foo.jar` in its `share/java` directory, and
another package declares the attribute
```nix
buildInputs = [ libfoo ];
nativeBuildInputs = [ jdk ];
```
then `CLASSPATH` will be set to
`/nix/store/...-libfoo/share/java/foo.jar`.
Private JARs should be installed in a location like
`$out/share/package-name`.
If your Java package provides a program, you need to generate a wrapper
script to run it using a JRE. You can use `makeWrapper` for this:
```nix
nativeBuildInputs = [ makeWrapper ];
installPhase = ''
mkdir -p $out/bin
makeWrapper ${jre}/bin/java $out/bin/foo \
--add-flags "-cp $out/share/java/foo.jar org.foo.Main"
'';
```
Since the introduction of the Java Platform Module System in Java 9,
Java distributions typically no longer ship with a general-purpose JRE:
instead, they allow generating a JRE with only the modules required for
your application(s). Because we can't predict what modules will be
needed on a general-purpose system, the default jre package is the full
JDK. When building a minimal system/image, you can override the
`modules` parameter on `jre_minimal` to build a JRE with only the
modules relevant for you:
```nix
let
my_jre = pkgs.jre_minimal.override {
modules = [
# The modules used by 'something' and 'other' combined:
"java.base"
"java.logging"
];
};
something = (pkgs.something.override { jre = my_jre; });
other = (pkgs.other.override { jre = my_jre; });
in
...
```
Note all JDKs passthru `home`, so if your application requires
environment variables like `JAVA_HOME` being set, that can be done in a
generic fashion with the `--set` argument of `makeWrapper`:
```bash
--set JAVA_HOME ${jdk.home}
```
It is possible to use a different Java compiler than `javac` from the
OpenJDK. For instance, to use the GNU Java Compiler:
```nix
nativeBuildInputs = [ gcj ant ];
```
Here, Ant will automatically use `gij` (the GNU Java Runtime) instead of
the OpenJRE.

View file

@ -1,77 +0,0 @@
<section xmlns="http://docbook.org/ns/docbook"
xmlns:xlink="http://www.w3.org/1999/xlink"
xml:id="sec-language-java">
<title>Java</title>
<para>
Ant-based Java packages are typically built from source as follows:
<programlisting>
stdenv.mkDerivation {
name = "...";
src = fetchurl { ... };
nativeBuildInputs = [ jdk ant ];
buildPhase = "ant";
}
</programlisting>
Note that <varname>jdk</varname> is an alias for the OpenJDK (self-built where available, or pre-built via Zulu). Platforms with OpenJDK not (yet) in Nixpkgs (<literal>Aarch32</literal>, <literal>Aarch64</literal>) point to the (unfree) <literal>oraclejdk</literal>.
</para>
<para>
JAR files that are intended to be used by other packages should be installed in <filename>$out/share/java</filename>. JDKs have a stdenv setup hook that add any JARs in the <filename>share/java</filename> directories of the build inputs to the <envar>CLASSPATH</envar> environment variable. For instance, if the package <literal>libfoo</literal> installs a JAR named <filename>foo.jar</filename> in its <filename>share/java</filename> directory, and another package declares the attribute
<programlisting>
buildInputs = [ libfoo ];
nativeBuildInputs = [ jdk ];
</programlisting>
then <envar>CLASSPATH</envar> will be set to <filename>/nix/store/...-libfoo/share/java/foo.jar</filename>.
</para>
<para>
Private JARs should be installed in a location like <filename>$out/share/<replaceable>package-name</replaceable></filename>.
</para>
<para>
If your Java package provides a program, you need to generate a wrapper script to run it using a JRE. You can use <literal>makeWrapper</literal> for this:
<programlisting>
nativeBuildInputs = [ makeWrapper ];
installPhase =
''
mkdir -p $out/bin
makeWrapper ${jre}/bin/java $out/bin/foo \
--add-flags "-cp $out/share/java/foo.jar org.foo.Main"
'';
</programlisting>
Since the introduction of the Java Platform Module System in Java 9, Java distributions typically no longer ship with a general-purpose JRE: instead, they allow generating a JRE with only the modules required for your application(s). Because we can't predict what modules will be needed on a general-purpose system, the default <package>jre</package> package is the full JDK. When building a minimal system/image, you can override the <literal>modules</literal> parameter on <literal>jre_minimal</literal> to build a JRE with only the modules relevant for you:
<programlisting>
let
my_jre = pkgs.jre_minimal.override {
modules = [
# The modules used by 'something' and 'other' combined:
"java.base"
"java.logging"
];
};
something = (pkgs.something.override { jre = my_jre; });
other = (pkgs.other.override { jre = my_jre; });
in
...
</programlisting>
</para>
<para>
Note all JDKs passthru <literal>home</literal>, so if your application requires environment variables like <envar>JAVA_HOME</envar> being set, that can be done in a generic fashion with the <literal>--set</literal> argument of <literal>makeWrapper</literal>:
<programlisting>
--set JAVA_HOME ${jdk.home}
</programlisting>
</para>
<para>
It is possible to use a different Java compiler than <command>javac</command> from the OpenJDK. For instance, to use the GNU Java Compiler:
<programlisting>
nativeBuildInputs = [ gcj ant ];
</programlisting>
Here, Ant will automatically use <command>gij</command> (the GNU Java Runtime) instead of the OpenJRE.
</para>
</section>

View file

@ -480,13 +480,8 @@ Retype new UNIX password: ***</screen>
<prompt>$ </prompt>passwd eelco</screen> <prompt>$ </prompt>passwd eelco</screen>
</para> </para>
<para> <para>
You may also want to install some software. For instance, You may also want to install some software. This will be covered
<screen> in <xref linkend="sec-package-management" />.
<prompt>$ </prompt>nix-env -qaP \*</screen>
shows what packages are available, and
<screen>
<prompt>$ </prompt>nix-env -f '&lt;nixpkgs&gt;' -iA w3m</screen>
installs the <literal>w3m</literal> browser.
</para> </para>
</listitem> </listitem>
</orderedlist> </orderedlist>

View file

@ -371,6 +371,9 @@ in
}; };
services.postfix.config = mkIf cfg.postfix.enable cfg.postfix.config; services.postfix.config = mkIf cfg.postfix.enable cfg.postfix.config;
systemd.services.postfix.serviceConfig.SupplementaryGroups =
mkIf cfg.postfix.enable [ postfixCfg.group ];
# Allow users to run 'rspamc' and 'rspamadm'. # Allow users to run 'rspamc' and 'rspamadm'.
environment.systemPackages = [ pkgs.rspamd ]; environment.systemPackages = [ pkgs.rspamd ];
@ -394,16 +397,45 @@ in
restartTriggers = [ rspamdDir ]; restartTriggers = [ rspamdDir ];
serviceConfig = { serviceConfig = {
ExecStart = "${pkgs.rspamd}/bin/rspamd ${optionalString cfg.debug "-d"} --user=${cfg.user} --group=${cfg.group} --pid=/run/rspamd.pid -c /etc/rspamd/rspamd.conf -f"; ExecStart = "${pkgs.rspamd}/bin/rspamd ${optionalString cfg.debug "-d"} -c /etc/rspamd/rspamd.conf -f";
Restart = "always"; Restart = "always";
RuntimeDirectory = "rspamd";
PrivateTmp = true;
};
preStart = '' User = "${cfg.user}";
${pkgs.coreutils}/bin/mkdir -p /var/lib/rspamd Group = "${cfg.group}";
${pkgs.coreutils}/bin/chown ${cfg.user}:${cfg.group} /var/lib/rspamd SupplementaryGroups = mkIf cfg.postfix.enable [ postfixCfg.group ];
'';
RuntimeDirectory = "rspamd";
RuntimeDirectoryMode = "0755";
StateDirectory = "rspamd";
StateDirectoryMode = "0700";
AmbientCapabilities = [];
CapabilityBoundingSet = [];
DevicePolicy = "closed";
LockPersonality = true;
NoNewPrivileges = true;
PrivateDevices = true;
PrivateMounts = true;
PrivateTmp = true;
# we need to chown socket to rspamd-milter
PrivateUsers = !cfg.postfix.enable;
ProtectClock = true;
ProtectControlGroups = true;
ProtectHome = true;
ProtectHostname = true;
ProtectKernelLogs = true;
ProtectKernelModules = true;
ProtectKernelTunables = true;
ProtectSystem = "strict";
RemoveIPC = true;
RestrictAddressFamilies = [ "AF_INET" "AF_INET6" "AF_UNIX" ];
RestrictNamespaces = true;
RestrictRealtime = true;
RestrictSUIDSGID = true;
SystemCallArchitectures = "native";
SystemCallFilter = "@system-service";
UMask = "0077";
};
}; };
}; };
imports = [ imports = [

View file

@ -9,7 +9,14 @@ with lib;
let let
cfg = config.networking.nat; cfg = config.networking.nat;
dest = if cfg.externalIP == null then "-j MASQUERADE" else "-j SNAT --to-source ${cfg.externalIP}"; mkDest = externalIP: if externalIP == null
then "-j MASQUERADE"
else "-j SNAT --to-source ${externalIP}";
dest = mkDest cfg.externalIP;
destIPv6 = mkDest cfg.externalIPv6;
# Whether given IP (plus optional port) is an IPv6.
isIPv6 = ip: builtins.length (lib.splitString ":" ip) > 2;
helpers = import ./helpers.nix { inherit config lib; }; helpers = import ./helpers.nix { inherit config lib; };
@ -28,63 +35,80 @@ let
${cfg.extraStopCommands} ${cfg.extraStopCommands}
''; '';
setupNat = '' mkSetupNat = { iptables, dest, internalIPs, forwardPorts }: ''
${helpers}
# Create subchain where we store rules
ip46tables -w -t nat -N nixos-nat-pre
ip46tables -w -t nat -N nixos-nat-post
ip46tables -w -t nat -N nixos-nat-out
# We can't match on incoming interface in POSTROUTING, so # We can't match on incoming interface in POSTROUTING, so
# mark packets coming from the internal interfaces. # mark packets coming from the internal interfaces.
${concatMapStrings (iface: '' ${concatMapStrings (iface: ''
iptables -w -t nat -A nixos-nat-pre \ ${iptables} -w -t nat -A nixos-nat-pre \
-i '${iface}' -j MARK --set-mark 1 -i '${iface}' -j MARK --set-mark 1
'') cfg.internalInterfaces} '') cfg.internalInterfaces}
# NAT the marked packets. # NAT the marked packets.
${optionalString (cfg.internalInterfaces != []) '' ${optionalString (cfg.internalInterfaces != []) ''
iptables -w -t nat -A nixos-nat-post -m mark --mark 1 \ ${iptables} -w -t nat -A nixos-nat-post -m mark --mark 1 \
${optionalString (cfg.externalInterface != null) "-o ${cfg.externalInterface}"} ${dest} ${optionalString (cfg.externalInterface != null) "-o ${cfg.externalInterface}"} ${dest}
''} ''}
# NAT packets coming from the internal IPs. # NAT packets coming from the internal IPs.
${concatMapStrings (range: '' ${concatMapStrings (range: ''
iptables -w -t nat -A nixos-nat-post \ ${iptables} -w -t nat -A nixos-nat-post \
-s '${range}' ${optionalString (cfg.externalInterface != null) "-o ${cfg.externalInterface}"} ${dest} -s '${range}' ${optionalString (cfg.externalInterface != null) "-o ${cfg.externalInterface}"} ${dest}
'') cfg.internalIPs} '') internalIPs}
# NAT from external ports to internal ports. # NAT from external ports to internal ports.
${concatMapStrings (fwd: '' ${concatMapStrings (fwd: ''
iptables -w -t nat -A nixos-nat-pre \ ${iptables} -w -t nat -A nixos-nat-pre \
-i ${toString cfg.externalInterface} -p ${fwd.proto} \ -i ${toString cfg.externalInterface} -p ${fwd.proto} \
--dport ${builtins.toString fwd.sourcePort} \ --dport ${builtins.toString fwd.sourcePort} \
-j DNAT --to-destination ${fwd.destination} -j DNAT --to-destination ${fwd.destination}
${concatMapStrings (loopbackip: ${concatMapStrings (loopbackip:
let let
m = builtins.match "([0-9.]+):([0-9-]+)" fwd.destination; matchIP = if isIPv6 fwd.destination then "[[]([0-9a-fA-F:]+)[]]" else "([0-9.]+)";
destinationIP = if (m == null) then throw "bad ip:ports `${fwd.destination}'" else elemAt m 0; m = builtins.match "${matchIP}:([0-9-]+)" fwd.destination;
destinationPorts = if (m == null) then throw "bad ip:ports `${fwd.destination}'" else builtins.replaceStrings ["-"] [":"] (elemAt m 1); destinationIP = if m == null then throw "bad ip:ports `${fwd.destination}'" else elemAt m 0;
destinationPorts = if m == null then throw "bad ip:ports `${fwd.destination}'" else builtins.replaceStrings ["-"] [":"] (elemAt m 1);
in '' in ''
# Allow connections to ${loopbackip}:${toString fwd.sourcePort} from the host itself # Allow connections to ${loopbackip}:${toString fwd.sourcePort} from the host itself
iptables -w -t nat -A nixos-nat-out \ ${iptables} -w -t nat -A nixos-nat-out \
-d ${loopbackip} -p ${fwd.proto} \ -d ${loopbackip} -p ${fwd.proto} \
--dport ${builtins.toString fwd.sourcePort} \ --dport ${builtins.toString fwd.sourcePort} \
-j DNAT --to-destination ${fwd.destination} -j DNAT --to-destination ${fwd.destination}
# Allow connections to ${loopbackip}:${toString fwd.sourcePort} from other hosts behind NAT # Allow connections to ${loopbackip}:${toString fwd.sourcePort} from other hosts behind NAT
iptables -w -t nat -A nixos-nat-pre \ ${iptables} -w -t nat -A nixos-nat-pre \
-d ${loopbackip} -p ${fwd.proto} \ -d ${loopbackip} -p ${fwd.proto} \
--dport ${builtins.toString fwd.sourcePort} \ --dport ${builtins.toString fwd.sourcePort} \
-j DNAT --to-destination ${fwd.destination} -j DNAT --to-destination ${fwd.destination}
iptables -w -t nat -A nixos-nat-post \ ${iptables} -w -t nat -A nixos-nat-post \
-d ${destinationIP} -p ${fwd.proto} \ -d ${destinationIP} -p ${fwd.proto} \
--dport ${destinationPorts} \ --dport ${destinationPorts} \
-j SNAT --to-source ${loopbackip} -j SNAT --to-source ${loopbackip}
'') fwd.loopbackIPs} '') fwd.loopbackIPs}
'') cfg.forwardPorts} '') forwardPorts}
'';
setupNat = ''
${helpers}
# Create subchains where we store rules
ip46tables -w -t nat -N nixos-nat-pre
ip46tables -w -t nat -N nixos-nat-post
ip46tables -w -t nat -N nixos-nat-out
${mkSetupNat {
iptables = "iptables";
inherit dest;
inherit (cfg) internalIPs;
forwardPorts = filter (x: !(isIPv6 x.destination)) cfg.forwardPorts;
}}
${optionalString cfg.enableIPv6 (mkSetupNat {
iptables = "ip6tables";
dest = destIPv6;
internalIPs = cfg.internalIPv6s;
forwardPorts = filter (x: isIPv6 x.destination) cfg.forwardPorts;
})}
${optionalString (cfg.dmzHost != null) '' ${optionalString (cfg.dmzHost != null) ''
iptables -w -t nat -A nixos-nat-pre \ iptables -w -t nat -A nixos-nat-pre \
@ -117,6 +141,15 @@ in
''; '';
}; };
networking.nat.enableIPv6 = mkOption {
type = types.bool;
default = false;
description =
''
Whether to enable IPv6 NAT.
'';
};
networking.nat.internalInterfaces = mkOption { networking.nat.internalInterfaces = mkOption {
type = types.listOf types.str; type = types.listOf types.str;
default = []; default = [];
@ -141,6 +174,18 @@ in
''; '';
}; };
networking.nat.internalIPv6s = mkOption {
type = types.listOf types.str;
default = [];
example = [ "fc00::/64" ];
description =
''
The IPv6 address ranges for which to perform NAT. Packets
coming from these addresses (on any interface) and destined
for the external interface will be rewritten.
'';
};
networking.nat.externalInterface = mkOption { networking.nat.externalInterface = mkOption {
type = types.nullOr types.str; type = types.nullOr types.str;
default = null; default = null;
@ -164,6 +209,19 @@ in
''; '';
}; };
networking.nat.externalIPv6 = mkOption {
type = types.nullOr types.str;
default = null;
example = "2001:dc0:2001:11::175";
description =
''
The public IPv6 address to which packets from the local
network are to be rewritten. If this is left empty, the
IP address associated with the external interface will be
used.
'';
};
networking.nat.forwardPorts = mkOption { networking.nat.forwardPorts = mkOption {
type = with types; listOf (submodule { type = with types; listOf (submodule {
options = { options = {
@ -176,7 +234,7 @@ in
destination = mkOption { destination = mkOption {
type = types.str; type = types.str;
example = "10.0.0.1:80"; example = "10.0.0.1:80";
description = "Forward connection to destination ip:port; to specify a port range, use ip:start-end"; description = "Forward connection to destination ip:port (or [ipv6]:port); to specify a port range, use ip:start-end";
}; };
proto = mkOption { proto = mkOption {
@ -195,11 +253,15 @@ in
}; };
}); });
default = []; default = [];
example = [ { sourcePort = 8080; destination = "10.0.0.1:80"; proto = "tcp"; } ]; example = [
{ sourcePort = 8080; destination = "10.0.0.1:80"; proto = "tcp"; }
{ sourcePort = 8080; destination = "[fc00::2]:80"; proto = "tcp"; }
];
description = description =
'' ''
List of forwarded ports from the external interface to List of forwarded ports from the external interface to
internal destinations by using DNAT. internal destinations by using DNAT. Destination can be
IPv6 if IPv6 NAT is enabled.
''; '';
}; };
@ -246,6 +308,9 @@ in
(mkIf config.networking.nat.enable { (mkIf config.networking.nat.enable {
assertions = [ assertions = [
{ assertion = cfg.enableIPv6 -> config.networking.enableIPv6;
message = "networking.nat.enableIPv6 requires networking.enableIPv6";
}
{ assertion = (cfg.dmzHost != null) -> (cfg.externalInterface != null); { assertion = (cfg.dmzHost != null) -> (cfg.externalInterface != null);
message = "networking.nat.dmzHost requires networking.nat.externalInterface"; message = "networking.nat.dmzHost requires networking.nat.externalInterface";
} }
@ -261,6 +326,15 @@ in
kernel.sysctl = { kernel.sysctl = {
"net.ipv4.conf.all.forwarding" = mkOverride 99 true; "net.ipv4.conf.all.forwarding" = mkOverride 99 true;
"net.ipv4.conf.default.forwarding" = mkOverride 99 true; "net.ipv4.conf.default.forwarding" = mkOverride 99 true;
} // optionalAttrs cfg.enableIPv6 {
# Do not prevent IPv6 autoconfiguration.
# See <http://strugglers.net/~andy/blog/2011/09/04/linux-ipv6-router-advertisements-and-forwarding/>.
"net.ipv6.conf.all.accept_ra" = mkOverride 99 2;
"net.ipv6.conf.default.accept_ra" = mkOverride 99 2;
# Forward IPv6 packets.
"net.ipv6.conf.all.forwarding" = mkOverride 99 true;
"net.ipv6.conf.default.forwarding" = mkOverride 99 true;
}; };
}; };

View file

@ -14,11 +14,18 @@ in {
default = 41641; default = 41641;
description = "The port to listen on for tunnel traffic (0=autoselect)."; description = "The port to listen on for tunnel traffic (0=autoselect).";
}; };
package = mkOption {
type = types.package;
default = pkgs.tailscale;
defaultText = "pkgs.tailscale";
description = "The package to use for tailscale";
};
}; };
config = mkIf cfg.enable { config = mkIf cfg.enable {
environment.systemPackages = [ pkgs.tailscale ]; # for the CLI environment.systemPackages = [ cfg.package ]; # for the CLI
systemd.packages = [ pkgs.tailscale ]; systemd.packages = [ cfg.package ];
systemd.services.tailscaled = { systemd.services.tailscaled = {
wantedBy = [ "multi-user.target" ]; wantedBy = [ "multi-user.target" ];
serviceConfig.Environment = "PORT=${toString cfg.port}"; serviceConfig.Environment = "PORT=${toString cfg.port}";

View file

@ -61,6 +61,12 @@ import ./make-test-python.nix (
podman.succeed("podman stop sleeping") podman.succeed("podman stop sleeping")
podman.succeed("podman rm sleeping") podman.succeed("podman rm sleeping")
podman.succeed(
"mkdir -p /tmp/podman-run-1000/libpod && chown alice -R /tmp/podman-run-1000"
)
with subtest("Run container rootless with crun"): with subtest("Run container rootless with crun"):
podman.succeed(su_cmd("tar cv --files-from /dev/null | podman import - scratchimg")) podman.succeed(su_cmd("tar cv --files-from /dev/null | podman import - scratchimg"))
podman.succeed( podman.succeed(

View file

@ -13,10 +13,12 @@ let
machine.succeed("id rspamd >/dev/null") machine.succeed("id rspamd >/dev/null")
''; '';
checkSocket = socket: user: group: mode: '' checkSocket = socket: user: group: mode: ''
machine.succeed("ls ${socket} >/dev/null") machine.succeed(
machine.succeed('[[ "$(stat -c %U ${socket})" == "${user}" ]]') "ls ${socket} >/dev/null",
machine.succeed('[[ "$(stat -c %G ${socket})" == "${group}" ]]') '[[ "$(stat -c %U ${socket})" == "${user}" ]]',
machine.succeed('[[ "$(stat -c %a ${socket})" == "${mode}" ]]') '[[ "$(stat -c %G ${socket})" == "${group}" ]]',
'[[ "$(stat -c %a ${socket})" == "${mode}" ]]',
)
''; '';
simple = name: enableIPv6: makeTest { simple = name: enableIPv6: makeTest {
name = "rspamd-${name}"; name = "rspamd-${name}";
@ -54,33 +56,35 @@ in
services.rspamd = { services.rspamd = {
enable = true; enable = true;
workers.normal.bindSockets = [{ workers.normal.bindSockets = [{
socket = "/run/rspamd.sock"; socket = "/run/rspamd/rspamd.sock";
mode = "0600"; mode = "0600";
owner = "root"; owner = "rspamd";
group = "root"; group = "rspamd";
}]; }];
workers.controller.bindSockets = [{ workers.controller.bindSockets = [{
socket = "/run/rspamd-worker.sock"; socket = "/run/rspamd/rspamd-worker.sock";
mode = "0666"; mode = "0666";
owner = "root"; owner = "rspamd";
group = "root"; group = "rspamd";
}]; }];
}; };
}; };
testScript = '' testScript = ''
${initMachine} ${initMachine}
machine.wait_for_file("/run/rspamd.sock") machine.wait_for_file("/run/rspamd/rspamd.sock")
${checkSocket "/run/rspamd.sock" "root" "root" "600" } ${checkSocket "/run/rspamd/rspamd.sock" "rspamd" "rspamd" "600" }
${checkSocket "/run/rspamd-worker.sock" "root" "root" "666" } ${checkSocket "/run/rspamd/rspamd-worker.sock" "rspamd" "rspamd" "666" }
machine.log(machine.succeed("cat /etc/rspamd/rspamd.conf")) machine.log(machine.succeed("cat /etc/rspamd/rspamd.conf"))
machine.log( machine.log(
machine.succeed("grep 'CONFDIR/worker-controller.inc' /etc/rspamd/rspamd.conf") machine.succeed("grep 'CONFDIR/worker-controller.inc' /etc/rspamd/rspamd.conf")
) )
machine.log(machine.succeed("grep 'CONFDIR/worker-normal.inc' /etc/rspamd/rspamd.conf")) machine.log(machine.succeed("grep 'CONFDIR/worker-normal.inc' /etc/rspamd/rspamd.conf"))
machine.log(machine.succeed("rspamc -h /run/rspamd-worker.sock stat")) machine.log(machine.succeed("rspamc -h /run/rspamd/rspamd-worker.sock stat"))
machine.log( machine.log(
machine.succeed("curl --unix-socket /run/rspamd-worker.sock http://localhost/ping") machine.succeed(
"curl --unix-socket /run/rspamd/rspamd-worker.sock http://localhost/ping"
)
) )
''; '';
}; };
@ -91,16 +95,16 @@ in
services.rspamd = { services.rspamd = {
enable = true; enable = true;
workers.normal.bindSockets = [{ workers.normal.bindSockets = [{
socket = "/run/rspamd.sock"; socket = "/run/rspamd/rspamd.sock";
mode = "0600"; mode = "0600";
owner = "root"; owner = "rspamd";
group = "root"; group = "rspamd";
}]; }];
workers.controller.bindSockets = [{ workers.controller.bindSockets = [{
socket = "/run/rspamd-worker.sock"; socket = "/run/rspamd/rspamd-worker.sock";
mode = "0666"; mode = "0666";
owner = "root"; owner = "rspamd";
group = "root"; group = "rspamd";
}]; }];
workers.controller2 = { workers.controller2 = {
type = "controller"; type = "controller";
@ -116,9 +120,9 @@ in
testScript = '' testScript = ''
${initMachine} ${initMachine}
machine.wait_for_file("/run/rspamd.sock") machine.wait_for_file("/run/rspamd/rspamd.sock")
${checkSocket "/run/rspamd.sock" "root" "root" "600" } ${checkSocket "/run/rspamd/rspamd.sock" "rspamd" "rspamd" "600" }
${checkSocket "/run/rspamd-worker.sock" "root" "root" "666" } ${checkSocket "/run/rspamd/rspamd-worker.sock" "rspamd" "rspamd" "666" }
machine.log(machine.succeed("cat /etc/rspamd/rspamd.conf")) machine.log(machine.succeed("cat /etc/rspamd/rspamd.conf"))
machine.log( machine.log(
machine.succeed("grep 'CONFDIR/worker-controller.inc' /etc/rspamd/rspamd.conf") machine.succeed("grep 'CONFDIR/worker-controller.inc' /etc/rspamd/rspamd.conf")
@ -137,9 +141,11 @@ in
machine.wait_until_succeeds( machine.wait_until_succeeds(
"journalctl -u rspamd | grep -i 'starting controller process' >&2" "journalctl -u rspamd | grep -i 'starting controller process' >&2"
) )
machine.log(machine.succeed("rspamc -h /run/rspamd-worker.sock stat")) machine.log(machine.succeed("rspamc -h /run/rspamd/rspamd-worker.sock stat"))
machine.log( machine.log(
machine.succeed("curl --unix-socket /run/rspamd-worker.sock http://localhost/ping") machine.succeed(
"curl --unix-socket /run/rspamd/rspamd-worker.sock http://localhost/ping"
)
) )
machine.log(machine.succeed("curl http://localhost:11335/ping")) machine.log(machine.succeed("curl http://localhost:11335/ping"))
''; '';

View file

@ -4,13 +4,13 @@
stdenv.mkDerivation (rec { stdenv.mkDerivation (rec {
pname = "pqiv"; pname = "pqiv";
version = "2.11"; version = "2.12";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "phillipberndt"; owner = "phillipberndt";
repo = "pqiv"; repo = "pqiv";
rev = version; rev = version;
sha256 = "06cwm28b7j1skwp21s5snmj1pqh3xh6y2i5v4w3pz0b8k3053h9i"; sha256 = "18nvrqmlifh4m8nfs0d19sb9d1l3a95xc89qxqdr881jcxdsgflw";
}; };
nativeBuildInputs = [ pkgconfig ]; nativeBuildInputs = [ pkgconfig ];

View file

@ -7,7 +7,7 @@
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
pname = "dbeaver-ce"; pname = "dbeaver-ce";
version = "7.2.5"; version = "7.3.0";
desktopItem = makeDesktopItem { desktopItem = makeDesktopItem {
name = "dbeaver"; name = "dbeaver";
@ -30,7 +30,7 @@ stdenv.mkDerivation rec {
src = fetchurl { src = fetchurl {
url = "https://dbeaver.io/files/${version}/dbeaver-ce-${version}-linux.gtk.x86_64.tar.gz"; url = "https://dbeaver.io/files/${version}/dbeaver-ce-${version}-linux.gtk.x86_64.tar.gz";
sha256 = "sha256-CRyAeizhaSDmVFGRhrYIW0Ofli9HnkgItiAGRJAETQM="; sha256 = "sha256-JhEF2/97vo2FgzpCFkuc31aLl9qjKHV8RYXO5oBU1no=";
}; };
installPhase = '' installPhase = ''

View file

@ -2,16 +2,16 @@
rustPlatform.buildRustPackage rec { rustPlatform.buildRustPackage rec {
pname = "navi"; pname = "navi";
version = "2.12.1"; version = "2.13.0";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "denisidoro"; owner = "denisidoro";
repo = "navi"; repo = "navi";
rev = "v${version}"; rev = "v${version}";
sha256 = "1vrj8ad004h6jgmcb56f3f19s4xk6gvcpwysj78bxzgpa1998r3r"; sha256 = "04ks38s6d3nkdj0arhxw8f3sfw796l97fbqxsm7b9g5d2953a6cs";
}; };
cargoSha256 = "0yifgcf2pfszzny523ax7pb9a5r3012nynbnhdqg0j1ia1pdymf3"; cargoSha256 = "1zwar1l793809bsgqnwrgi50y76bd78qd4s8lw6d64f4z72dh80g";
nativeBuildInputs = [ makeWrapper ]; nativeBuildInputs = [ makeWrapper ];

View file

@ -30,12 +30,12 @@ let
in stdenv.mkDerivation rec { in stdenv.mkDerivation rec {
pname = "obsidian"; pname = "obsidian";
version = "0.9.15"; version = "0.9.17";
src = fetchurl { src = fetchurl {
url = url =
"https://github.com/obsidianmd/obsidian-releases/releases/download/v${version}/obsidian-${version}.asar.gz"; "https://github.com/obsidianmd/obsidian-releases/releases/download/v${version}/obsidian-${version}.asar.gz";
sha256 = "0cfzci2l1bbjc5mqs3hjyy3grz5jk3qbna57vfcvxz36kcd5djv5"; sha256 = "0spa5zsipd456dcsp7ww24ab5vk4vmwyvrdmraw3hcsbnj9vcnwa";
}; };
nativeBuildInputs = [ makeWrapper graphicsmagick ]; nativeBuildInputs = [ makeWrapper graphicsmagick ];

View file

@ -2,16 +2,16 @@
rustPlatform.buildRustPackage rec { rustPlatform.buildRustPackage rec {
pname = "pueue"; pname = "pueue";
version = "0.8.1"; version = "0.8.2";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "Nukesor"; owner = "Nukesor";
repo = pname; repo = pname;
rev = "v${version}"; rev = "v${version}";
sha256 = "0rqnbils0r98qglhm2jafw5d119fqdzszmk825yc0bma4icm7xzp"; sha256 = "1vdlsfnqnyri0ny2g695lhivs9m25v9lsqf1valwbjv9l9vjxfqa";
}; };
cargoSha256 = "1f3g5i0yh82qll1hyihrvv08pbd4h9vzs6jy6bf94bzabyjsgnzv"; cargoSha256 = "0qziwb69qpbziz772np8dcb1dvxg6m506k5kl63m75z4zicgykcv";
nativeBuildInputs = [ installShellFiles ]; nativeBuildInputs = [ installShellFiles ];

View file

@ -1,42 +1,94 @@
#!/usr/bin/env nix-shell #!/usr/bin/env nix-shell
#! nix-shell -i bash -p coreutils curl jq #! nix-shell -i bash -p coreutils curl jq moreutils
# shellcheck shell=bash # shellcheck shell=bash
# vim: ft=sh
#
# Update a terraform provider to the latest version advertised at the
# provider source address.
# #
# Update a terraform provider to the latest version advertised at
# the provider source address.
set -euo pipefail set -euo pipefail
USAGE=$(cat<<DOC show_usage() {
Specify the terraform provider name to update. cat <<DOC
Usage: ./update-provider [--force] [--vendor] [<owner>/]<provider>
Update a single provider in the providers.json inventory file.
For example to update 'terraform-providers.aws' run:
Example:
To update nixpkgs.terraform-providers.aws run:
./update-provider aws ./update-provider aws
If the provider is not in the list already, use the form '<owner>/<provider>'
to add the provider to the list:
./update-provider hetznercloud/hcloud
Options:
* --force: Force the update even if the version matches.
* --vendor: Switch from go package to go modules with vendor.
* --vendor-sha256 <sha256>: Override the SHA256 or "null".
DOC DOC
) }
provider_name="${1:-}" force=
if [ -z "$provider_name" ]; then provider=
echo "No providers specified!" vendor=
vendorSha256=
while [[ $# -gt 0 ]]; do
case "$1" in
-h | --help)
show_usage
exit
;;
--force)
force=1
shift
;;
--vendor)
force=1
vendor=1
shift
;;
--vendor-sha256)
force=1
vendorSha256=$2
shift 2
;;
*)
if [[ -n "$provider" ]]; then
echo "ERROR: provider name was passed two times: '$provider' and '$1'"
echo "Use --help for more info"
exit 1
fi
provider=$1
shift
esac
done
if [[ -z "$provider" ]]; then
echo "ERROR: No providers specified!"
echo echo
echo "$USAGE" show_usage
exit 1 exit 1
fi fi
provider_source_address="$(jq -r ".$provider_name.\"provider-source-address\"" providers.json)" provider_name=$(basename "$provider")
if [ "$provider_source_address" == "null" ]; then # Usage: read_attr <key>
echo "No provider source address specified with provider: $provider_name" read_attr() {
exit 1 jq -r ".\"$provider_name\".\"$1\"" providers.json
}
# Usage: update_attr <key> <value>
update_attr() {
if [[ "$2" == "null" ]]; then
jq -S ".\"$provider_name\".\"$1\" = null" providers.json | sponge providers.json
else
jq -S ".\"$provider_name\".\"$1\" = \"$2\"" providers.json | sponge providers.json
fi fi
}
# The provider source address (used inside Terraform `required_providers` block) is
# used to compute the registry API endpoint
#
# registry.terraform.io/hashicorp/aws (provider source address)
# registry.terraform.io/providers/hashicorp/aws (provider URL for the website)
# registry.terraform.io/v1/providers/hashicorp/aws (provider URL for the JSON API)
registry_response=$(curl -s https://"${provider_source_address/\///v1/providers/}")
prefetch_github() { prefetch_github() {
# of a given owner, repo and rev, fetch the tarball and return the output of # of a given owner, repo and rev, fetch the tarball and return the output of
@ -47,31 +99,80 @@ prefetch_github() {
nix-prefetch-url --unpack "https://github.com/$owner/$repo/archive/$rev.tar.gz" nix-prefetch-url --unpack "https://github.com/$owner/$repo/archive/$rev.tar.gz"
} }
old_source_address="$(read_attr provider-source-address)"
old_vendor_sha256=$(read_attr vendorSha256)
old_version=$(read_attr version)
if [[ $provider =~ ^[^/]+/[^/]+$ ]]; then
source_address=registry.terraform.io/$provider
else
source_address=$old_source_address
fi
if [[ "$source_address" == "null" ]]; then
echo "Could not find the source address for provider: $provider"
exit 1
fi
update_attr "provider-source-address" "$source_address"
# The provider source address (used inside Terraform `required_providers` block) is
# used to compute the registry API endpoint
#
# registry.terraform.io/hashicorp/aws (provider source address)
# registry.terraform.io/providers/hashicorp/aws (provider URL for the website)
# registry.terraform.io/v1/providers/hashicorp/aws (provider URL for the JSON API)
registry_response=$(curl -s https://"${source_address/\///v1/providers/}")
version="$(jq -r '.version' <<< "$registry_response")"
if [[ "$old_version" = "$version" && "$force" != 1 && -z "$vendorSha256" && "$old_vendor_sha256" != "$vendorSha256" ]]; then
echo "$provider_name is already at version $version"
exit
fi
update_attr version "$version"
provider_source_url="$(jq -r '.source' <<< "$registry_response")" provider_source_url="$(jq -r '.source' <<< "$registry_response")"
org="$(echo "$provider_source_url" | cut -d '/' -f 4)" org="$(echo "$provider_source_url" | cut -d '/' -f 4)"
update_attr owner "$org"
repo="$(echo "$provider_source_url" | cut -d '/' -f 5)" repo="$(echo "$provider_source_url" | cut -d '/' -f 5)"
update_attr repo "$repo"
rev="$(jq -r '.tag' <<< "$registry_response")" rev="$(jq -r '.tag' <<< "$registry_response")"
update_attr rev "$rev"
sha256=$(prefetch_github "$org" "$repo" "$rev") sha256=$(prefetch_github "$org" "$repo" "$rev")
update_attr sha256 "$sha256"
version="$(jq -r '.version' <<< "$registry_response")" repo_root=$(git rev-parse --show-toplevel)
updated_provider="$(mktemp)" if [[ -z "$vendorSha256" ]]; then
cat <<EOF >> "$updated_provider" if [[ "$old_vendor_sha256" == null ]]; then
{ vendorSha256=null
"$provider_name": { elif [[ -n "$old_vendor_sha256" || "$vendor" = 1 ]]; then
"owner": "$org", echo "=== Calculating vendorSha256 ==="
"repo": "$repo", update_attr vendorSha256 "0000000000000000000000000000000000000000000000000000000000000000"
"rev": "$rev", # Hackish way to find out the desired sha256. First build, then extract the
"sha256": "$sha256", # error message from the logs.
"version": "$version", set +e
"provider-source-address": "$provider_source_address" nix-build --no-out-link "$repo_root" -A "terraform-providers.$provider_name.go-modules" 2>vendor_log.txt
} set -e
} logs=$(< vendor_log.txt)
EOF if ! [[ $logs =~ got:\ +([^\ ]+) ]]; then
echo "ERROR: could not find new hash in output:"
cat vendor_log.txt
rm -f vendor_log.txt
exit 1
fi
rm -f vendor_log.txt
vendorSha256=${BASH_REMATCH[1]}
# Deal with nix unstable
if [[ $vendorSha256 = sha256-* ]]; then
vendorSha256=$(nix to-base32 "$vendorSha256")
fi
fi
fi
original_provider_list="$(mktemp)" if [[ -n "$vendorSha256" ]]; then
cat providers.json > "$original_provider_list" update_attr vendorSha256 "$vendorSha256"
fi
jq --sort-keys --slurp '.[0] * .[1]' "$original_provider_list" "$updated_provider" > providers.json # Check that the provider builds
echo "=== Building terraform-providers.$provider_name ==="
nix-build "$repo_root" -A "terraform-providers.$provider_name"

View file

@ -2,13 +2,13 @@
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
pname = "rssguard"; pname = "rssguard";
version = "3.8.2"; version = "3.8.3";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "martinrotter"; owner = "martinrotter";
repo = pname; repo = pname;
rev = version; rev = version;
sha256 = "0vy89ih586s89s29dzzggk7bkaz70mzrc9islirk01s1jal1jn0v"; sha256 = "1704nj77h6s88l4by3wxl5l770gaig90mv3ix80r00nh8mhzq44q";
}; };
buildInputs = [ qtwebengine qttools ]; buildInputs = [ qtwebengine qttools ];

View file

@ -4,13 +4,13 @@
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
pname = "toxic"; pname = "toxic";
version = "0.9.0"; version = "0.9.1";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "Tox"; owner = "Tox";
repo = "toxic"; repo = "toxic";
rev = "v${version}"; rev = "v${version}";
sha256 = "1y0k9vfb4818b3s313jlxbpjwdxd62cc4kc1vpxdjvs8mx543vrv"; sha256 = "1j0yd33sm824dy4mhwfxqkywa46yhqy5hd5wq4lp7lgl6m6mypar";
}; };
makeFlags = [ "PREFIX=$(out)"]; makeFlags = [ "PREFIX=$(out)"];

View file

@ -2,13 +2,13 @@
buildGoModule rec { buildGoModule rec {
pname = "seaweedfs"; pname = "seaweedfs";
version = "2.12"; version = "2.13";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "chrislusf"; owner = "chrislusf";
repo = "seaweedfs"; repo = "seaweedfs";
rev = version; rev = version;
sha256 = "08jv8dbvdygcm6wzvncx89p8cn9mbjn4lj8rf5svq8lr7zk1rvpw"; sha256 = "0w41p2fm26ml5dvdg2cnxcw0xzsbjq26chpa3bkn1adpazlpivp4";
}; };
vendorSha256 = "0g344dj325d35i0myrzhg5chspqnly40qp910ml6zrmp7iszc1mw"; vendorSha256 = "0g344dj325d35i0myrzhg5chspqnly40qp910ml6zrmp7iszc1mw";

View file

@ -15,14 +15,14 @@
rustPlatform.buildRustPackage rec { rustPlatform.buildRustPackage rec {
pname = "pijul"; pname = "pijul";
version = "1.0.0-alpha.8"; version = "1.0.0-alpha.11";
src = fetchCrate { src = fetchCrate {
inherit version pname; inherit version pname;
sha256 = "01wag3ckqsa7r6zc7cla428w8hr49n2ybp31s42dqmsbak3xbc14"; sha256 = "1y2xgbzclmk0i98iydmqgvf6acx0v326dmj9j2hiwrld193fc4dx";
}; };
cargoSha256 = "1hh4xmkhbbbkag3v25vh6zpn0r4fmipxmkcr8ahgrxf71dvyxj8x"; cargoSha256 = "0i1rr8jg34g4b8i2lvh9gy2rpfa01ma9jpcpyp5zklrzk5f1ksvf";
cargoBuildFlags = stdenv.lib.optional gitImportSupport "--features=git"; cargoBuildFlags = stdenv.lib.optional gitImportSupport "--features=git";
LIBCLANG_PATH = "${libclang}/lib"; LIBCLANG_PATH = "${libclang}/lib";

View file

@ -23,13 +23,13 @@
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
pname = "sparkleshare"; pname = "sparkleshare";
version = "3.28"; version = "3.38";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "hbons"; owner = "hbons";
repo = "SparkleShare"; repo = "SparkleShare";
rev = version; rev = version;
sha256 = "sha256:1x5nv2f3mrsr4a336bz5kc2lzkzilfh43bxy2yqhhjp2dgb20497"; sha256 = "1a9csflmj96iyr1l0mdm3ziv1bljfcjnzm9xb2y4qqk7ha2p6fbq";
}; };
nativeBuildInputs = [ nativeBuildInputs = [

View file

@ -25,13 +25,13 @@ assert stdenv.lib.versionAtLeast mlt.version "6.22.1";
mkDerivation rec { mkDerivation rec {
pname = "shotcut"; pname = "shotcut";
version = "20.11.25"; version = "20.11.28";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "mltframework"; owner = "mltframework";
repo = "shotcut"; repo = "shotcut";
rev = "v${version}"; rev = "v${version}";
sha256 = "1nm71gnjd082m7bxlmrkngn079m3fdrb059f7wy23qj7khgpi3iz"; sha256 = "1yr71ihml9wnm7y5pv0gz41l1k6ybd16dk78zxf96kn9b838mzhq";
}; };
enableParallelBuilding = true; enableParallelBuilding = true;

View file

@ -16,13 +16,13 @@
buildGoModule rec { buildGoModule rec {
pname = "podman"; pname = "podman";
version = "2.1.1"; version = "2.2.0";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "containers"; owner = "containers";
repo = "podman"; repo = "podman";
rev = "v${version}"; rev = "v${version}";
sha256 = "0cy842wlyasxlxnwxkwhwgj148s30kfxnhgxa6ar26fly432aa68"; sha256 = "13na6ms0dapcmfb4pg8z3sds9nprr1lyyjs0v2izqifcyb1r1c00";
}; };
vendorSha256 = null; vendorSha256 = null;

View file

@ -2,13 +2,13 @@
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
pname = "spdx-license-list-data"; pname = "spdx-license-list-data";
version = "3.10"; version = "3.11";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "spdx"; owner = "spdx";
repo = "license-list-data"; repo = "license-list-data";
rev = "v${version}"; rev = "v${version}";
sha256 = "1zza0jrs82112dcjqgkyck2b7hv4kg9s10pmlripi6c1rs37av14"; sha256 = "1iwyqhh6lh51a47mhfy98zvjan8yjsvlym8qz0isx2i1zzxlj47a";
}; };
phases = [ "unpackPhase" "installPhase" ]; phases = [ "unpackPhase" "installPhase" ];

View file

@ -2,13 +2,13 @@
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
pname = "vimix-gtk-themes"; pname = "vimix-gtk-themes";
version = "2020-02-24"; version = "2020-11-28";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "vinceliuice"; owner = "vinceliuice";
repo = pname; repo = pname;
rev = version; rev = version;
sha256 = "18v7yhwzachjgy276rdhj5cg353f0qysa2kxk9gyc6s71q2gjzcv"; sha256 = "1m84p4cs9dfwc27zfjnwgkfdnfmlzbimq3g5z4mhz23cijm178rf";
}; };
buildInputs = [ gtk_engines ]; buildInputs = [ gtk_engines ];

View file

@ -54,11 +54,11 @@
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
pname = "gnome-boxes"; pname = "gnome-boxes";
version = "3.38.1"; version = "3.38.2";
src = fetchurl { src = fetchurl {
url = "mirror://gnome/sources/${pname}/${stdenv.lib.versions.majorMinor version}/${pname}-${version}.tar.xz"; url = "mirror://gnome/sources/${pname}/${stdenv.lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
sha256 = "0zrm4mihkx5i42h3pvk9lmsqf983dqz4rnfcbccwhx4ml2s4w3qv"; sha256 = "1zjvng0izbws3506998l3dwsxjbm7wnhqipb8nmqzvi096czvajl";
}; };
doCheck = true; doCheck = true;

View file

@ -1,42 +1,69 @@
{ stdenv, meson, ninja, gettext, fetchurl { lib
, pkgconfig, gtk3, glib, libsoup, gsettings-desktop-schemas , meson
, itstool, libxml2, python3Packages, libhandy_0 , ninja
, gnome3, gdk-pixbuf, libnotify, gobject-introspection, wrapGAppsHook }: , fetchurl
, gdk-pixbuf
, gettext
, glib
, gnome3
, gobject-introspection
, gsettings-desktop-schemas
, gtk3
, itstool
, libhandy_0
, libnotify
, libsoup
, libxml2
, pkg-config
, python3Packages
, wrapGAppsHook }:
let python3Packages.buildPythonApplication rec {
pname = "gnome-tweaks"; pname = "gnome-tweaks";
version = "3.34.0"; version = "3.34.0";
in stdenv.mkDerivation rec { format = "other";
name = "${pname}-${version}"; strictDeps = false; # https://github.com/NixOS/nixpkgs/issues/56943
src = fetchurl { src = fetchurl {
url = "mirror://gnome/sources/${pname}/${stdenv.lib.versions.majorMinor version}/${name}.tar.xz"; url = "mirror://gnome/sources/${pname}/${lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
sha256 = "0l2j42ba7v866iknygamnkiq7igh0fjvq92r93cslvvfnkx2ccq0"; sha256 = "0l2j42ba7v866iknygamnkiq7igh0fjvq92r93cslvvfnkx2ccq0";
}; };
nativeBuildInputs = [ nativeBuildInputs = [
meson ninja pkgconfig gettext itstool libxml2 wrapGAppsHook python3Packages.python gettext
gobject-introspection
itstool
libxml2
meson
ninja
pkg-config
wrapGAppsHook
]; ];
buildInputs = [ buildInputs = [
gtk3 glib gsettings-desktop-schemas gdk-pixbuf
gdk-pixbuf gnome3.adwaita-icon-theme glib
libnotify gnome3.gnome-shell python3Packages.pygobject3 gnome3.gnome-desktop
libsoup gnome3.gnome-settings-daemon gnome3.nautilus gnome3.gnome-settings-daemon
gnome3.mutter gnome3.gnome-desktop gobject-introspection gnome3.gnome-shell
gnome3.nautilus libhandy_0
# Makes it possible to select user themes through the `user-theme` extension # Makes it possible to select user themes through the `user-theme` extension
gnome3.gnome-shell-extensions gnome3.gnome-shell-extensions
gnome3.mutter
gsettings-desktop-schemas
gtk3
libhandy_0
libnotify
libsoup
];
propagatedBuildInputs = with python3Packages; [
pygobject3
]; ];
postPatch = '' postPatch = ''
patchShebangs meson-postinstall.py patchShebangs meson-postinstall.py
''; '';
preFixup = ''
gappsWrapperArgs+=(
--prefix PYTHONPATH : "$out/${python3Packages.python.sitePackages}:$PYTHONPATH")
'';
passthru = { passthru = {
updateScript = gnome3.updateScript { updateScript = gnome3.updateScript {
packageName = pname; packageName = pname;
@ -44,7 +71,7 @@ in stdenv.mkDerivation rec {
}; };
}; };
meta = with stdenv.lib; { meta = with lib; {
homepage = "https://wiki.gnome.org/action/show/Apps/GnomeTweakTool"; homepage = "https://wiki.gnome.org/action/show/Apps/GnomeTweakTool";
description = "A tool to customize advanced GNOME 3 options"; description = "A tool to customize advanced GNOME 3 options";
maintainers = teams.gnome.members; maintainers = teams.gnome.members;

View file

@ -0,0 +1,17 @@
{ callPackage, lib, stdenv, nixosTests, ... }@_args:
let
generic = (import ./generic.nix) _args;
base = callPackage generic (_args // {
version = "8.0.0";
sha256 = "02cx3gvxqvkllp54jfvs83kl8bmpcqyzp9jf1d0l9x5bgv1jv0sy";
});
in base.withExtensions ({ all, ... }: with all; ([
bcmath calendar curl ctype dom exif fileinfo filter ftp gd
gettext gmp iconv intl ldap mbstring mysqli mysqlnd opcache
openssl pcntl pdo pdo_mysql pdo_odbc pdo_pgsql pdo_sqlite pgsql
posix readline session simplexml sockets soap sodium sqlite3
tokenizer xmlreader xmlwriter zip zlib
] ++ lib.optionals (!stdenv.isDarwin) [ imap ]))

View file

@ -0,0 +1,81 @@
diff --git a/Zend/Zend.m4 b/Zend/Zend.m4
index 726188597496..781e51d3e44c 100644
--- a/Zend/Zend.m4
+++ b/Zend/Zend.m4
@@ -190,12 +190,6 @@ dnl LIBZEND_OTHER_CHECKS
dnl
AC_DEFUN([LIBZEND_OTHER_CHECKS],[
-AC_ARG_ENABLE([zts],
- [AS_HELP_STRING([--enable-zts],
- [Enable thread safety])],
- [ZEND_ZTS=$enableval],
- [ZEND_ZTS=no])
-
AC_MSG_CHECKING(whether to enable thread-safety)
AC_MSG_RESULT($ZEND_ZTS)
diff --git a/configure.ac b/configure.ac
index 8d6e922fa9bf..e07a75d19ac7 100644
--- a/configure.ac
+++ b/configure.ac
@@ -797,6 +797,19 @@ if test "$PHP_DEBUG_ASSERTIONS" = "yes"; then
ZEND_DEBUG=yes
fi
+AC_ARG_ENABLE([zts],
+ [AS_HELP_STRING([--enable-zts],
+ [Enable thread safety])],
+ [ZEND_ZTS=$enableval],
+ [ZEND_ZTS=no])
+
+if test "$ZEND_ZTS" = "yes"; then
+ AC_DEFINE(ZTS, 1,[ ])
+ PHP_THREAD_SAFETY=yes
+else
+ PHP_THREAD_SAFETY=no
+fi
+
PHP_ARG_ENABLE([rtld-now],
[whether to dlopen extensions with RTLD_NOW instead of RTLD_LAZY],
[AS_HELP_STRING([--enable-rtld-now],
@@ -1136,13 +1149,6 @@ LIBZEND_BASIC_CHECKS
LIBZEND_DLSYM_CHECK
LIBZEND_OTHER_CHECKS
-if test "$ZEND_ZTS" = "yes"; then
- AC_DEFINE(ZTS,1,[ ])
- PHP_THREAD_SAFETY=yes
-else
- PHP_THREAD_SAFETY=no
-fi
-
INCLUDES="$INCLUDES -I\$(top_builddir)/TSRM"
INCLUDES="$INCLUDES -I\$(top_builddir)/Zend"
diff --git a/ext/opcache/config.m4 b/ext/opcache/config.m4
index 054cd28c0247..93d72fb73d19 100644
--- a/ext/opcache/config.m4
+++ b/ext/opcache/config.m4
@@ -66,7 +66,7 @@ if test "$PHP_OPCACHE" != "no"; then
esac
fi
- if test "$enable_zts" = "yes"; then
+ if test "$PHP_THREAD_SAFETY" = "yes"; then
DASM_FLAGS="$DASM_FLAGS -D ZTS=1"
fi
diff --git a/ext/session/config.m4 b/ext/session/config.m4
index 7abc8813b72a..da31bbde86cc 100644
--- a/ext/session/config.m4
+++ b/ext/session/config.m4
@@ -31,7 +31,7 @@ if test "$PHP_MM" != "no"; then
AC_MSG_ERROR(cannot find mm library)
fi
- if test "$enable_zts" = "yes"; then
+ if test "$PHP_THREAD_SAFETY" = "yes"; then
dnl The mm library is not thread-safe, and mod_mm.c refuses to compile.
AC_MSG_ERROR(--with-mm cannot be combined with --enable-zts)
fi

View file

@ -198,7 +198,8 @@ let
++ lib.optional (!ipv6Support) "--disable-ipv6" ++ lib.optional (!ipv6Support) "--disable-ipv6"
++ lib.optional systemdSupport "--with-fpm-systemd" ++ lib.optional systemdSupport "--with-fpm-systemd"
++ lib.optional valgrindSupport "--with-valgrind=${valgrind.dev}" ++ lib.optional valgrindSupport "--with-valgrind=${valgrind.dev}"
++ lib.optional ztsSupport "--enable-maintainer-zts" ++ lib.optional (ztsSupport && (lib.versionOlder version "8.0")) "--enable-maintainer-zts"
++ lib.optional (ztsSupport && (lib.versionAtLeast version "8.0")) "--enable-zts"
# Sendmail # Sendmail

View file

@ -2,13 +2,13 @@
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
pname = "openxr-loader"; pname = "openxr-loader";
version = "1.0.12"; version = "1.0.13";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "KhronosGroup"; owner = "KhronosGroup";
repo = "OpenXR-SDK-Source"; repo = "OpenXR-SDK-Source";
rev = "release-${version}"; rev = "release-${version}";
sha256 = "0xcra2hcsm88rfd7zf52hccx3nvg9j65a595z7c0lrzv6jz04676"; sha256 = "0znhv7x81bvqijk5xhc5w760d5yy6vr5c2y271wpk9lkmxbbcpl1";
}; };
nativeBuildInputs = [ cmake python3 ]; nativeBuildInputs = [ cmake python3 ];

View file

@ -1,16 +1,18 @@
{ stdenv, fetchurl, buildDunePackage, alcotest, cmdliner { lib, fetchurl, buildDunePackage, alcotest, cmdliner
, rresult, astring, fmt, ocamlgraph, logs, bos, fpath, ptime , rresult, astring, fmt, ocamlgraph, logs, bos, fpath, ptime
}: }:
buildDunePackage rec { buildDunePackage rec {
pname = "functoria"; pname = "functoria";
version = "3.1.0"; version = "3.1.1";
useDune2 = true;
minimumOCamlVersion = "4.04"; minimumOCamlVersion = "4.04";
src = fetchurl { src = fetchurl {
url = "https://github.com/mirage/${pname}/releases/download/v${version}/${pname}-v${version}.tbz"; url = "https://github.com/mirage/${pname}/releases/download/v${version}/${pname}-v${version}.tbz";
sha256 = "15jdqdj1vfi0x9gjydrrnbwzwbzw34w1iir032jrji820xlblky2"; sha256 = "0bihxbq16zwsi7frk4b8wz8993mvy2ym3n6288jhv0n0gb7c2f7m";
}; };
propagatedBuildInputs = [ cmdliner rresult astring fmt ocamlgraph logs bos fpath ptime ]; propagatedBuildInputs = [ cmdliner rresult astring fmt ocamlgraph logs bos fpath ptime ];
@ -18,7 +20,7 @@ buildDunePackage rec {
doCheck = true; doCheck = true;
meta = with stdenv.lib; { meta = with lib; {
description = "A DSL to organize functor applications"; description = "A DSL to organize functor applications";
homepage = "https://github.com/mirage/functoria"; homepage = "https://github.com/mirage/functoria";
license = licenses.isc; license = licenses.isc;

View file

@ -3,7 +3,7 @@
buildDunePackage { buildDunePackage {
pname = "functoria-runtime"; pname = "functoria-runtime";
inherit (functoria) version src; inherit (functoria) version useDune2 src;
propagatedBuildInputs = [ cmdliner fmt ]; propagatedBuildInputs = [ cmdliner fmt ];
checkInputs = [ alcotest functoria]; checkInputs = [ alcotest functoria];

View file

@ -14,9 +14,10 @@ buildPecl {
}; };
configureFlags = [ "--with-couchbase" ]; configureFlags = [ "--with-couchbase" ];
broken = lib.versionAtLeast php.version "8.0";
buildInputs = with pkgs; [ libcouchbase zlib ]; buildInputs = with pkgs; [ libcouchbase zlib ];
internalDeps = [ php.extensions.json ]; internalDeps = [] ++ lib.optionals (lib.versionOlder php.version "8.0") [ php.extensions.json ];
peclDeps = [ php.extensions.igbinary ]; peclDeps = [ php.extensions.igbinary ];
patches = [ patches = [

View file

@ -1,4 +1,4 @@
{ buildPecl, lib, pkgs, pcre' }: { buildPecl, fetchpatch, lib, pkgs, pcre' }:
buildPecl { buildPecl {
pname = "imagick"; pname = "imagick";
@ -6,6 +6,14 @@ buildPecl {
version = "3.4.4"; version = "3.4.4";
sha256 = "0xvhaqny1v796ywx83w7jyjyd0nrxkxf34w9zi8qc8aw8qbammcd"; sha256 = "0xvhaqny1v796ywx83w7jyjyd0nrxkxf34w9zi8qc8aw8qbammcd";
patches = [
# Fix compatibility with PHP 8.
(fetchpatch {
url = "https://github.com/Imagick/imagick/pull/336.patch";
sha256 = "nuRdh02qaMx0s/5OzlfWjyYgZG1zgrYnAjsZ/UVIrUM=";
})
];
configureFlags = [ "--with-imagick=${pkgs.imagemagick.dev}" ]; configureFlags = [ "--with-imagick=${pkgs.imagemagick.dev}" ];
nativeBuildInputs = [ pkgs.pkgconfig ]; nativeBuildInputs = [ pkgs.pkgconfig ];
buildInputs = [ pcre' ]; buildInputs = [ pcre' ];

View file

@ -7,8 +7,9 @@ buildPecl {
sha256 = "1cfsbxf3q3im0cmalgk76jpz581zr92z03c1viy93jxb53k2vsgl"; sha256 = "1cfsbxf3q3im0cmalgk76jpz581zr92z03c1viy93jxb53k2vsgl";
internalDeps = with php.extensions; [ internalDeps = with php.extensions; [
json
session session
] ++ lib.optionals (lib.versionOlder php.version "8.0") [
json
] ++ lib.optionals (lib.versionOlder php.version "7.4") [ ] ++ lib.optionals (lib.versionOlder php.version "7.4") [
hash hash
]; ];

View file

@ -9,12 +9,12 @@
buildPythonPackage rec { buildPythonPackage rec {
pname = "docplex"; pname = "docplex";
version = "2.15.194"; version = "2.16.196";
# No source available from official repo # No source available from official repo
src = fetchPypi { src = fetchPypi {
inherit pname version; inherit pname version;
sha256 = "976e9b4e18bccbabae04149c33247a795edb1f00110f1b511c5517ac6ac353bb"; sha256 = "8fd96e3586444e577b356c0ac62511414e76027ff159ebe0d0b3e44b881406d1";
}; };
propagatedBuildInputs = [ propagatedBuildInputs = [

View file

@ -8,7 +8,7 @@
buildPythonPackage rec { buildPythonPackage rec {
pname = "fastjsonschema"; pname = "fastjsonschema";
version = "2.14.4"; version = "2.14.5";
disabled = pythonOlder "3.3"; disabled = pythonOlder "3.3";
@ -17,7 +17,7 @@ buildPythonPackage rec {
repo = "python-fastjsonschema"; repo = "python-fastjsonschema";
rev = "v${version}"; rev = "v${version}";
fetchSubmodules = true; fetchSubmodules = true;
sha256 = "0c3q31lqzrc52gacnqc271k5952qbyl0z4kagsqvl7fiwk84hqlz"; sha256 = "1hgzafswdw5zqrd8qhdxa43crzfy7lrlifdn90133a0h3psr7qs1";
}; };
checkInputs = [ pytestCheckHook ]; checkInputs = [ pytestCheckHook ];

View file

@ -1,20 +1,22 @@
{ lib, buildPythonPackage, fetchPypi { lib, buildPythonPackage, fetchPypi
, grpc_google_iam_v1, google_api_core , grpc_google_iam_v1, google_api_core, libcst, proto-plus
, pytest, mock , pytest, mock
}: }:
buildPythonPackage rec { buildPythonPackage rec {
pname = "google-cloud-secret-manager"; pname = "google-cloud-secret-manager";
version = "1.0.0"; version = "2.0.0";
src = fetchPypi { src = fetchPypi {
inherit pname version; inherit pname version;
sha256 = "1cm3xqacxnbpv2706bd2jl86mvcsphpjlvhzngz2k2p48a0jjx8r"; sha256 = "1w2q602ww8s3n714l2gnaklqzbczshrspxvmvjr6wfwwalxwkc62";
}; };
propagatedBuildInputs = [ propagatedBuildInputs = [
google_api_core google_api_core
grpc_google_iam_v1 grpc_google_iam_v1
libcst
proto-plus
]; ];
checkInputs = [ checkInputs = [

View file

@ -8,7 +8,7 @@
buildPythonPackage rec { buildPythonPackage rec {
pname = "pproxy"; pname = "pproxy";
version = "2.3.2"; version = "2.3.7";
disabled = isPy27; disabled = isPy27;
@ -16,8 +16,8 @@ buildPythonPackage rec {
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "qwj"; owner = "qwj";
repo = "python-proxy"; repo = "python-proxy";
rev = "818ab9cc10565789fe429a7be50ddefb9c583781"; rev = "7fccf8dd62204f34b0aa3a70fc568fd6ddff7728";
sha256 = "0g3cyi5lzakhs5p3fpwywbl8jpapnr8890zw9w45dqg8k0svc1fi"; sha256 = "1sl2i0kymnbsk49ina81yjnkxjy09541f7pmic8r6rwsv1s87skc";
}; };
propagatedBuildInputs = [ propagatedBuildInputs = [

View file

@ -6,23 +6,23 @@
buildPythonPackage rec { buildPythonPackage rec {
pname = "pylatexenc"; pname = "pylatexenc";
version = "2.7"; version = "2.8";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "phfaist"; owner = "phfaist";
repo = "pylatexenc"; repo = "pylatexenc";
rev = "v${version}"; rev = "v${version}";
sha256 = "1hpcwbknfah3mky2m4asw15b9qdvv4k5ni0js764n1jpi83m1zgk"; sha256 = "0m9vrbh1gmbgq6dqm7xzklar3accadw0pn896rqsdi5jbgd3w0mh";
}; };
pythonImportsCheck = [ "pylatexenc" ]; pythonImportsCheck = [ "pylatexenc" ];
dontUseSetuptoolsCheck = true;
checkInputs = [ pytestCheckHook ]; checkInputs = [ pytestCheckHook ];
meta = with lib; { meta = with lib; {
description = "Simple LaTeX parser providing latex-to-unicode and unicode-to-latex conversion"; description = "Simple LaTeX parser providing latex-to-unicode and unicode-to-latex conversion";
homepage = "https://pylatexenc.readthedocs.io"; homepage = "https://pylatexenc.readthedocs.io";
downloadPage = "https://www.github.com/phfaist/pylatexenc/releases"; downloadPage = "https://www.github.com/phfaist/pylatexenc/releases";
changelog = "https://pylatexenc.readthedocs.io/en/latest/changes/";
license = licenses.mit; license = licenses.mit;
maintainers = with maintainers; [ drewrisinger ]; maintainers = with maintainers; [ drewrisinger ];
}; };

View file

@ -0,0 +1,31 @@
{ lib
, buildPythonPackage
, fetchPypi
, pythonOlder
, tqdm
, spacy
}:
buildPythonPackage rec {
pname = "pysbd";
version = "0.3.3";
disabled = pythonOlder "3.5";
src = fetchPypi {
inherit pname version;
sha256 = "56ab48a28a8470f0042a4cb7c9da8a6dde8621ecf87a86d75f201cbf1837e77f";
};
checkInputs = [ tqdm spacy ];
doCheck = false; # requires pyconll and blingfire
pythonImportsCheck = [ "pysbd" ];
meta = with lib; {
description = "Pysbd (Python Sentence Boundary Disambiguation) is a rule-based sentence boundary detection that works out-of-the-box across many languages";
homepage = "https://github.com/nipunsadvilkar/pySBD";
license = licenses.mit;
maintainers = [ maintainers.mic92 ];
};
}

View file

@ -3,34 +3,39 @@
, buildPythonPackage , buildPythonPackage
, fetchFromGitHub , fetchFromGitHub
, fetchpatch , fetchpatch
# C Inputs
, blas
, catch2
, cmake , cmake
, cvxpy
, cython , cython
, muparserx , muparserx
, ninja , ninja
, nlohmann_json , nlohmann_json
, spdlog
# Python Inputs
, cvxpy
, numpy , numpy
, openblas
, pybind11 , pybind11
, scikit-build , scikit-build
, spdlog
# Check Inputs # Check Inputs
, qiskit-terra
, pytestCheckHook , pytestCheckHook
, python , ddt
, fixtures
, pytest-timeout
, qiskit-terra
}: }:
buildPythonPackage rec { buildPythonPackage rec {
pname = "qiskit-aer"; pname = "qiskit-aer";
version = "0.6.1"; version = "0.7.1";
disabled = pythonOlder "3.5"; disabled = pythonOlder "3.6";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "Qiskit"; owner = "Qiskit";
repo = "qiskit-aer"; repo = "qiskit-aer";
rev = version; rev = version;
sha256 = "1fnv11diis0as8zcc57mamz0gbjd6vj7nw3arxzvwa77ja803sr4"; sha256 = "07l0wavdknx0y4vy0hwgw24365sg4nb6ygl3lpa098np85qgyn4y";
}; };
nativeBuildInputs = [ nativeBuildInputs = [
@ -40,10 +45,11 @@ buildPythonPackage rec {
]; ];
buildInputs = [ buildInputs = [
openblas blas
spdlog catch2
nlohmann_json
muparserx muparserx
nlohmann_json
spdlog
]; ];
propagatedBuildInputs = [ propagatedBuildInputs = [
@ -60,11 +66,6 @@ buildPythonPackage rec {
dontUseCmakeConfigure = true; dontUseCmakeConfigure = true;
cmakeFlags = [
"-DBUILD_TESTS=True"
"-DAER_THRUST_BACKEND=OMP"
];
# *** Testing *** # *** Testing ***
pythonImportsCheck = [ pythonImportsCheck = [
@ -72,11 +73,22 @@ buildPythonPackage rec {
"qiskit.providers.aer.backends.qasm_simulator" "qiskit.providers.aer.backends.qasm_simulator"
"qiskit.providers.aer.backends.controller_wrappers" # Checks C++ files built correctly. Only exists if built & moved to output "qiskit.providers.aer.backends.controller_wrappers" # Checks C++ files built correctly. Only exists if built & moved to output
]; ];
checkInputs = [ # Slow tests
qiskit-terra disabledTests = [
pytestCheckHook "test_paulis_1_and_2_qubits"
"test_3d_oscillator"
];
checkInputs = [
pytestCheckHook
ddt
fixtures
pytest-timeout
qiskit-terra
];
pytestFlagsArray = [
"--timeout=30"
"--durations=10"
]; ];
dontUseSetuptoolsCheck = true; # Otherwise runs tests twice
preCheck = '' preCheck = ''
# Tests include a compiled "circuit" which is auto-built in $HOME # Tests include a compiled "circuit" which is auto-built in $HOME
@ -87,9 +99,7 @@ buildPythonPackage rec {
# Add qiskit-aer compiled files to cython include search # Add qiskit-aer compiled files to cython include search
pushd $HOME pushd $HOME
''; '';
postCheck = '' postCheck = "popd";
popd
'';
meta = with lib; { meta = with lib; {
description = "High performance simulators for Qiskit"; description = "High performance simulators for Qiskit";

View file

@ -2,8 +2,6 @@
, pythonOlder , pythonOlder
, buildPythonPackage , buildPythonPackage
, fetchFromGitHub , fetchFromGitHub
, fetchpatch
# , cplex
, cvxpy , cvxpy
, dlx , dlx
, docplex , docplex
@ -18,38 +16,38 @@
, quandl , quandl
, scikitlearn , scikitlearn
, yfinance , yfinance
# Optional inputs
, withTorch ? false
, pytorch
, withPyscf ? false
, pyscf ? null
, withScikitQuant ? false
, scikit-quant ? null
, withCplex ? false
, cplex ? null
# Check Inputs # Check Inputs
, ddt , ddt
, pytestCheckHook , pytestCheckHook
, pytest-timeout
, qiskit-aer , qiskit-aer
}: }:
buildPythonPackage rec { buildPythonPackage rec {
pname = "qiskit-aqua"; pname = "qiskit-aqua";
version = "0.7.5"; version = "0.8.1";
disabled = pythonOlder "3.5"; disabled = pythonOlder "3.6";
# Pypi's tarball doesn't contain tests # Pypi's tarball doesn't contain tests
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "Qiskit"; owner = "Qiskit";
repo = "qiskit-aqua"; repo = "qiskit-aqua";
rev = version; rev = version;
sha256 = "19sdv7lnc4b1c86rd1dv7pjpi8cmrpzbv7nav0fb899ki8ldqdwq"; sha256 = "11qyya3vyq50wpzrzzl8v46yx5p72rhpqhybwn47qgazxgg82r1b";
}; };
# TODO: remove in next release
patches = [
(fetchpatch {
name = "qiskit-aqua-fix-test-issue-1214.patch";
url = "https://github.com/Qiskit/qiskit-aqua/commit/284a4323192ac85787b22cbe5f344996fae16f7d.patch";
sha256 = "0zl8hqa2fq9ng793x4dhh0ny67nnbjcd8l1cdsaaab4ca1y0xcfr";
})
];
# Optional packages: pyscf (see below NOTE) & pytorch. Can install via pip/nix if needed. # Optional packages: pyscf (see below NOTE) & pytorch. Can install via pip/nix if needed.
propagatedBuildInputs = [ propagatedBuildInputs = [
# cplex
cvxpy cvxpy
docplex docplex
dlx # Python Dancing Links package dlx # Python Dancing Links package
@ -63,7 +61,10 @@ buildPythonPackage rec {
quandl quandl
scikitlearn scikitlearn
yfinance yfinance
]; ] ++ lib.optionals (withTorch) [ pytorch ]
++ lib.optionals (withPyscf) [ pyscf ]
++ lib.optionals (withScikitQuant) [ scikit-quant ]
++ lib.optionals (withCplex) [ cplex ];
# *** NOTE *** # *** NOTE ***
# We make pyscf optional in this package, due to difficulties packaging it in Nix (test failures, complicated flags, etc). # We make pyscf optional in this package, due to difficulties packaging it in Nix (test failures, complicated flags, etc).
@ -97,8 +98,12 @@ buildPythonPackage rec {
postInstall = "rm -rf $out/${python.sitePackages}/docs"; # Remove docs dir b/c it can cause conflicts. postInstall = "rm -rf $out/${python.sitePackages}/docs"; # Remove docs dir b/c it can cause conflicts.
checkInputs = [ ddt qiskit-aer pytestCheckHook ]; checkInputs = [
dontUseSetuptoolsCheck = true; pytestCheckHook
ddt
pytest-timeout
qiskit-aer
];
pythonImportsCheck = [ pythonImportsCheck = [
"qiskit.aqua" "qiskit.aqua"
"qiskit.aqua.algorithms" "qiskit.aqua.algorithms"
@ -108,10 +113,13 @@ buildPythonPackage rec {
"qiskit.optimization" "qiskit.optimization"
]; ];
pytestFlagsArray = [ pytestFlagsArray = [
# Disabled b/c missing pyscf "--timeout=30"
"--durations=10"
] ++ lib.optionals (!withPyscf) [
"--ignore=test/chemistry/test_qeom_ee.py" "--ignore=test/chemistry/test_qeom_ee.py"
"--ignore=test/chemistry/test_qeom_vqe.py" "--ignore=test/chemistry/test_qeom_vqe.py"
"--ignore=test/chemistry/test_vqe_uccsd_adapt.py" "--ignore=test/chemistry/test_vqe_uccsd_adapt.py"
"--ignore=test/chemistry/test_bopes_sampler.py"
]; ];
disabledTests = [ disabledTests = [
# Disabled due to missing pyscf # Disabled due to missing pyscf
@ -123,8 +131,10 @@ buildPythonPackage rec {
# Disabling slow tests > 10 seconds # Disabling slow tests > 10 seconds
"TestVQE" "TestVQE"
"TestOOVQE"
"TestVQC" "TestVQC"
"TestQSVM" "TestQSVM"
"TestOptimizerAQGD"
"test_graph_partition_vqe" "test_graph_partition_vqe"
"TestLookupRotation" "TestLookupRotation"
"_vqe" "_vqe"
@ -151,6 +161,7 @@ buildPythonPackage rec {
"test_confidence_intervals_00001" "test_confidence_intervals_00001"
"test_eoh" "test_eoh"
"test_qasm_5" "test_qasm_5"
"test_uccsd_hf"
]; ];
meta = with lib; { meta = with lib; {

View file

@ -9,24 +9,36 @@
, requests_ntlm , requests_ntlm
, websockets , websockets
# Visualization inputs # Visualization inputs
, ipykernel , withVisualization ? false
, ipython
, ipyvuetify , ipyvuetify
, ipywidgets , ipywidgets
, matplotlib , matplotlib
, nbconvert
, nbformat
, plotly , plotly
, pyperclip , pyperclip
, seaborn , seaborn
# check inputs # check inputs
, pytestCheckHook , pytestCheckHook
, nbconvert
, nbformat
, pproxy , pproxy
, vcrpy , vcrpy
}: }:
let
visualizationPackages = [
ipython
ipyvuetify
ipywidgets
matplotlib
plotly
pyperclip
seaborn
];
in
buildPythonPackage rec { buildPythonPackage rec {
pname = "qiskit-ibmq-provider"; pname = "qiskit-ibmq-provider";
version = "0.8.0"; version = "0.11.1";
disabled = pythonOlder "3.6"; disabled = pythonOlder "3.6";
@ -34,7 +46,7 @@ buildPythonPackage rec {
owner = "Qiskit"; owner = "Qiskit";
repo = pname; repo = pname;
rev = version; rev = version;
sha256 = "0rrpwr4a82j69j5ibl2g0nw8wbpg201cfz6f234k2v6pj500x9nl"; sha256 = "0b5mnq8f5844idnsmp84lpkvlpszfwwi998yvggcgaayw1dbk53h";
}; };
propagatedBuildInputs = [ propagatedBuildInputs = [
@ -44,31 +56,16 @@ buildPythonPackage rec {
requests requests
requests_ntlm requests_ntlm
websockets websockets
# Visualization/Jupyter inputs ] ++ lib.optionals withVisualization visualizationPackages;
ipykernel
ipyvuetify
ipywidgets
matplotlib
nbconvert
nbformat
plotly
pyperclip
seaborn
];
# websockets seems to be pinned b/c in v8+ it drops py3.5 support. Not an issue here (usually py3.7+, and disabled for older py3.6)
postPatch = ''
substituteInPlace requirements.txt --replace "websockets>=7,<8" "websockets"
substituteInPlace setup.py --replace "websockets>=7,<8" "websockets"
'';
# Most tests require credentials to run on IBMQ # Most tests require credentials to run on IBMQ
checkInputs = [ checkInputs = [
pytestCheckHook pytestCheckHook
nbconvert
nbformat
pproxy pproxy
vcrpy vcrpy
]; ] ++ lib.optionals (!withVisualization) visualizationPackages;
dontUseSetuptoolsCheck = true;
pythonImportsCheck = [ "qiskit.providers.ibmq" ]; pythonImportsCheck = [ "qiskit.providers.ibmq" ];
# These disabled tests require internet connection, aren't skipped elsewhere # These disabled tests require internet connection, aren't skipped elsewhere
@ -76,6 +73,10 @@ buildPythonPackage rec {
"test_old_api_url" "test_old_api_url"
"test_non_auth_url" "test_non_auth_url"
"test_non_auth_url_with_hub" "test_non_auth_url_with_hub"
# slow tests
"test_websocket_retry_failure"
"test_invalid_url"
]; ];
# Skip tests that rely on internet access (mostly to IBM Quantum Experience cloud). # Skip tests that rely on internet access (mostly to IBM Quantum Experience cloud).

View file

@ -8,6 +8,13 @@
, qiskit-terra , qiskit-terra
, scikitlearn , scikitlearn
, scipy , scipy
# Optional package inputs
, withVisualization ? false
, matplotlib
, withCvx ? false
, cvxpy
, withJit ? false
, numba
# Check Inputs # Check Inputs
, pytestCheckHook , pytestCheckHook
, ddt , ddt
@ -17,7 +24,7 @@
buildPythonPackage rec { buildPythonPackage rec {
pname = "qiskit-ignis"; pname = "qiskit-ignis";
version = "0.4.0"; version = "0.5.1";
disabled = pythonOlder "3.6"; disabled = pythonOlder "3.6";
@ -26,15 +33,23 @@ buildPythonPackage rec {
owner = "Qiskit"; owner = "Qiskit";
repo = "qiskit-ignis"; repo = "qiskit-ignis";
rev = version; rev = version;
sha256 = "07mxhaknkp121xm6mgrpcrbj9qw6j924ra3k0s6vr8qgvfcxvh0y"; sha256 = "17kplmi17axcbbgw35dzfr3d5bzfymxfni9sf6v14223c5674p4y";
}; };
# hacky, fix https://github.com/Qiskit/qiskit-ignis/issues/532.
# TODO: remove on qiskit-ignis v0.5.1
postPatch = ''
substituteInPlace qiskit/ignis/mitigation/expval/base_meas_mitigator.py --replace "plt.axes" "'plt.axes'"
'';
propagatedBuildInputs = [ propagatedBuildInputs = [
numpy numpy
qiskit-terra qiskit-terra
scikitlearn scikitlearn
scipy scipy
]; ] ++ lib.optionals (withCvx) [ cvxpy ]
++ lib.optionals (withVisualization) [ matplotlib ]
++ lib.optionals (withJit) [ numba ];
postInstall = "rm -rf $out/${python.sitePackages}/docs"; # this dir can create conflicts postInstall = "rm -rf $out/${python.sitePackages}/docs"; # this dir can create conflicts
# Tests # Tests

View file

@ -16,7 +16,8 @@
, retworkx , retworkx
, scipy , scipy
, sympy , sympy
# Python visualization requirements, semi-optional , withVisualization ? false
# Python visualization requirements, optional
, ipywidgets , ipywidgets
, matplotlib , matplotlib
, pillow , pillow
@ -24,6 +25,12 @@
, pygments , pygments
, pylatexenc , pylatexenc
, seaborn , seaborn
# Crosstalk-adaptive layout pass
, withCrosstalkPass ? false
, z3
# Classical function -> Quantum Circuit compiler
, withClassicalFunctionCompiler ? false
, tweedledum ? null
# test requirements # test requirements
, ddt , ddt
, hypothesis , hypothesis
@ -33,17 +40,31 @@
, python , python
}: }:
let
visualizationPackages = [
ipywidgets
matplotlib
pillow
pydot
pygments
pylatexenc
seaborn
];
crosstalkPackages = [ z3 ];
classicalCompilerPackages = [ tweedledum ];
in
buildPythonPackage rec { buildPythonPackage rec {
pname = "qiskit-terra"; pname = "qiskit-terra";
version = "0.15.1"; version = "0.16.1";
disabled = pythonOlder "3.5"; disabled = pythonOlder "3.6";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "Qiskit"; owner = "Qiskit";
repo = pname; repo = pname;
rev = version; rev = version;
sha256 = "1p7y36gj3675dmp05nwi0m9nc7h0bwyimir3ncf9wbkx3crrh99c"; sha256 = "0007glsbrvq9swamvz8r76z9nzh46b388y0ds1dypczxpwlp9xcq";
}; };
nativeBuildInputs = [ cython ]; nativeBuildInputs = [ cython ];
@ -53,7 +74,6 @@ buildPythonPackage rec {
fastjsonschema fastjsonschema
jsonschema jsonschema
numpy numpy
matplotlib
networkx networkx
ply ply
psutil psutil
@ -62,26 +82,18 @@ buildPythonPackage rec {
retworkx retworkx
scipy scipy
sympy sympy
# Optional/visualization inputs ] ++ lib.optionals withVisualization visualizationPackages
ipywidgets ++ lib.optionals withCrosstalkPass crosstalkPackages
matplotlib ++ lib.optionals withClassicalFunctionCompiler classicalCompilerPackages;
pillow
pydot
pygments
pylatexenc
seaborn
];
# *** Tests *** # *** Tests ***
checkInputs = [ checkInputs = [
pytestCheckHook
ddt ddt
hypothesis hypothesis
nbformat nbformat
nbconvert nbconvert
pytestCheckHook ] ++ lib.optionals (!withVisualization) visualizationPackages;
];
dontUseSetuptoolsCheck = true; # can't find setup.py, so fails. tested by pytest
pythonImportsCheck = [ pythonImportsCheck = [
"qiskit" "qiskit"
@ -90,6 +102,34 @@ buildPythonPackage rec {
pytestFlagsArray = [ pytestFlagsArray = [
"--ignore=test/randomized/test_transpiler_equivalence.py" # collection requires qiskit-aer, which would cause circular dependency "--ignore=test/randomized/test_transpiler_equivalence.py" # collection requires qiskit-aer, which would cause circular dependency
] ++ lib.optionals (!withClassicalFunctionCompiler ) [
"--ignore=test/python/classical_function_compiler/"
];
disabledTests = [
# Flaky tests
"test_cx_equivalence"
"test_pulse_limits"
]
# Disabling slow tests for build constraints
++ [
"test_all_examples"
"test_controlled_random_unitary"
"test_controlled_standard_gates_1"
"test_jupyter_jobs_pbars"
"test_lookahead_swap_higher_depth_width_is_better"
"test_move_measurements"
"test_job_monitor"
"test_wait_for_final_state"
"test_multi_controlled_y_rotation_matrix_basic_mode"
"test_two_qubit_weyl_decomposition_abc"
"test_isometry"
"test_parallel"
"test_random_state"
"test_random_clifford_valid"
"test_to_matrix"
"test_block_collection_reduces_1q_gate"
"test_multi_controlled_rotation_gate_matrices"
"test_block_collection_runs_for_non_cx_bases"
]; ];
# Moves tests to $PACKAGEDIR/test. They can't be run from /build because of finding # Moves tests to $PACKAGEDIR/test. They can't be run from /build because of finding

View file

@ -15,15 +15,15 @@
buildPythonPackage rec { buildPythonPackage rec {
pname = "qiskit"; pname = "qiskit";
# NOTE: This version denotes a specific set of subpackages. See https://qiskit.org/documentation/release_notes.html#version-history # NOTE: This version denotes a specific set of subpackages. See https://qiskit.org/documentation/release_notes.html#version-history
version = "0.20.0"; version = "0.23.1";
disabled = pythonOlder "3.5"; disabled = pythonOlder "3.6";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "Qiskit"; owner = "qiskit";
repo = "qiskit"; repo = "qiskit";
rev = version; rev = version;
sha256 = "1r23pjnql49gczf4k4m6ir5rr95gqdxjrks60p8a93d243mxx3c9"; sha256 = "0x4cqx1wqqj7h5g3vdag694qjzsmvhpw25yrlcs70mh5ywdp28x1";
}; };
propagatedBuildInputs = [ propagatedBuildInputs = [
@ -35,7 +35,6 @@ buildPythonPackage rec {
]; ];
checkInputs = [ pytestCheckHook ]; checkInputs = [ pytestCheckHook ];
dontUseSetuptoolsCheck = true;
pythonImportsCheck = [ pythonImportsCheck = [
"qiskit" "qiskit"
@ -43,6 +42,7 @@ buildPythonPackage rec {
"qiskit.circuit" "qiskit.circuit"
"qiskit.ignis" "qiskit.ignis"
"qiskit.providers.aer" "qiskit.providers.aer"
"qiskit.providers.ibmq"
]; ];
meta = with lib; { meta = with lib; {

View file

@ -1,7 +1,6 @@
{ lib { lib
, rustPlatform , rustPlatform
, python , python
, fetchpatch
, fetchFromGitHub , fetchFromGitHub
, pipInstallHook , pipInstallHook
, maturin , maturin
@ -13,35 +12,30 @@
rustPlatform.buildRustPackage rec { rustPlatform.buildRustPackage rec {
pname = "retworkx"; pname = "retworkx";
version = "0.4.0"; version = "0.6.0";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "Qiskit"; owner = "Qiskit";
repo = "retworkx"; repo = "retworkx";
rev = version; rev = version;
sha256 = "1xqp6d39apkjvd0ad9vw81cp2iqzhpagfa4p171xqm3bwfn2imdc"; sha256 = "11n30ldg3y3y6qxg3hbj837pnbwjkqw3nxq6frds647mmmprrd20";
}; };
cargoSha256 = "0bma0l14jv5qhcsxck7vw3ak1w3c8v84cq4hii86i4iqk523zns5"; cargoSha256 = "1vg4yf0k6yypqf9z46zz818mz7fdrgxj7zl6zjf7pnm2r8mq3qw5";
cargoPatches = [
( fetchpatch {
name = "retworkx-cargo-lock.patch";
url = "https://github.com/Qiskit/retworkx/commit/a02fd33d357a92dbe9530696a6d85aa59fe8a5b9.patch";
sha256 = "0gvxr1nqp9ll4skfks4p4d964pshal25kb1nbfzhpyipnzddizr5";
} )
];
propagatedBuildInputs = [ python ]; propagatedBuildInputs = [ python ];
nativeBuildInputs = [ pipInstallHook maturin pip ]; nativeBuildInputs = [ pipInstallHook maturin pip ];
# Need to check AFTER python wheel is installed (b/c using Rust Build, not buildPythonPackage) # Needed b/c need to check AFTER python wheel is installed (using Rust Build, not buildPythonPackage)
doCheck = false; doCheck = false;
doInstallCheck = true; doInstallCheck = true;
installCheckInputs = [ pytestCheckHook numpy ];
buildPhase = '' buildPhase = ''
runHook preBuild runHook preBuild
maturin build --release --manylinux off --strip --interpreter ${python.interpreter} maturin build --release --manylinux off --strip
runHook postBuild runHook postBuild
''; '';
@ -50,10 +44,9 @@ rustPlatform.buildRustPackage rec {
pipInstallPhase pipInstallPhase
''; '';
installCheckInputs = [ pytestCheckHook numpy ];
preCheck = '' preCheck = ''
export TESTDIR=$(mktemp -d) export TESTDIR=$(mktemp -d)
cp -r $TMP/$sourceRoot/tests $TESTDIR cp -r tests/ $TESTDIR
pushd $TESTDIR pushd $TESTDIR
''; '';
postCheck = "popd"; postCheck = "popd";

View file

@ -14,14 +14,15 @@ let
soFile = { soFile = {
"7.3" = "blackfire-20180731"; "7.3" = "blackfire-20180731";
"7.4" = "blackfire-20190902"; "7.4" = "blackfire-20190902";
"8.0" = "blackfire-20200930";
}.${lib.versions.majorMinor php.version} or (throw "Unsupported PHP version."); }.${lib.versions.majorMinor php.version} or (throw "Unsupported PHP version.");
in stdenv.mkDerivation rec { in stdenv.mkDerivation rec {
pname = "php-blackfire"; pname = "php-blackfire";
version = "1.44.0"; version = "1.46.4";
src = fetchurl { src = fetchurl {
url = "https://packages.blackfire.io/debian/pool/any/main/b/blackfire-php/blackfire-php_${version}_amd64.deb"; url = "https://packages.blackfire.io/debian/pool/any/main/b/blackfire-php/blackfire-php_${version}_amd64.deb";
sha256 = "15y1244bbs07i7rg6cy8kynp1may4mbkmmwbxgq8q5zma3ldc8ci"; sha256 = "1p46zi1hh9calkcfgqz60c6rdi9i7i16ylj84iibi6k0pc690fjy";
}; };
nativeBuildInputs = [ nativeBuildInputs = [

View file

@ -2,20 +2,20 @@
rustPlatform.buildRustPackage rec { rustPlatform.buildRustPackage rec {
pname = "the-way"; pname = "the-way";
version = "0.7.0"; version = "0.12.1";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "out-of-cheese-error"; owner = "out-of-cheese-error";
repo = pname; repo = pname;
rev = "v${version}"; rev = "v${version}";
sha256 = "1whmvzpqm8x1q45mzrp4p40nj251drcryj9z4qjxgjlfsd5d1fxq"; sha256 = "0lvkrfszmn594n9qkf518c38c0fwzm32y997wlf28l3hpj6yqddq";
}; };
nativeBuildInputs = [ installShellFiles ]; nativeBuildInputs = [ installShellFiles ];
buildInputs = stdenv.lib.optionals stdenv.isDarwin [ AppKit Security ]; buildInputs = stdenv.lib.optionals stdenv.isDarwin [ AppKit Security ];
cargoSha256 = "0adhgp6blwx7s1hlwqzzsgkzc43q9avxx8a9ykvvv2s1w7m9ql78"; cargoSha256 = "1aiyfsvmrqcmlw0z1944i9s5g3yxc39na5mf16pb9a4bhw8zcwjr";
checkFlagsArray = stdenv.lib.optionals stdenv.isDarwin [ "--skip=copy" ]; checkFlagsArray = stdenv.lib.optionals stdenv.isDarwin [ "--skip=copy" ];
cargoParallelTestThreads = false; cargoParallelTestThreads = false;

View file

@ -13,13 +13,13 @@ let
in stdenv.mkDerivation rec { in stdenv.mkDerivation rec {
pname = "osu-lazer"; pname = "osu-lazer";
version = "2020.1121.0"; version = "2020.1128.0";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "ppy"; owner = "ppy";
repo = "osu"; repo = "osu";
rev = version; rev = version;
sha256 = "54AP3NZv5Nov3CAJoxn5E5tO9HhtlEY36x8OHAV8YVE="; sha256 = "0qf1lvzd668zd405ll3bdbk91xdyr2l9qg42ph93vjcnmrs2jqic";
}; };
patches = [ ./bypass-tamper-detection.patch ]; patches = [ ./bypass-tamper-detection.patch ];

View file

@ -334,6 +334,11 @@
version = "1.1.0"; version = "1.1.0";
sha256 = "1dq5yw7cy6s42193yl4iqscfw5vzkjkgv0zyy32scr4jza6ni1a1"; sha256 = "1dq5yw7cy6s42193yl4iqscfw5vzkjkgv0zyy32scr4jza6ni1a1";
}) })
(fetchNuGet {
name = "Microsoft.Bcl.AsyncInterfaces";
version = "1.1.1";
sha256 = "0a1ahssqds2ympr7s4xcxv5y8jgxs7ahd6ah6fbgglj4rki1f1vw";
})
(fetchNuGet { (fetchNuGet {
name = "Microsoft.Build.Framework"; name = "Microsoft.Build.Framework";
version = "15.3.409"; version = "15.3.409";
@ -356,18 +361,18 @@
}) })
(fetchNuGet { (fetchNuGet {
name = "Microsoft.CodeAnalysis.Common"; name = "Microsoft.CodeAnalysis.Common";
version = "3.7.0"; version = "3.8.0";
sha256 = "0882492nx6x68b0pkh3q5xaawz0b2l5x35r40722ignyjnvjydph"; sha256 = "12n7rvr39bzkf2maw7zplw8rwpxpxss4ich3bb2pw770rx4nyvyw";
}) })
(fetchNuGet { (fetchNuGet {
name = "Microsoft.CodeAnalysis.CSharp"; name = "Microsoft.CodeAnalysis.CSharp";
version = "3.7.0"; version = "3.8.0";
sha256 = "0adw6rcag8wxydzyiyhls2mxaqkay5qlz25z1fxrlv5qnchqn0n5"; sha256 = "1kmry65csvfn72zzc16vj1nfbfwam28wcmlrk3m5rzb8ydbzgylb";
}) })
(fetchNuGet { (fetchNuGet {
name = "Microsoft.CodeAnalysis.CSharp.Workspaces"; name = "Microsoft.CodeAnalysis.CSharp.Workspaces";
version = "3.7.0"; version = "3.8.0";
sha256 = "15rlz65wbky0yq7b9s8xwk68dgrhgsk4rj88q9pyjxbm5938vrav"; sha256 = "1jfbqfngwwjx3x1cyqaamf26s7j6wag86ig1n7bh99ny85gd78wb";
}) })
(fetchNuGet { (fetchNuGet {
name = "Microsoft.CodeAnalysis.FxCopAnalyzers"; name = "Microsoft.CodeAnalysis.FxCopAnalyzers";
@ -381,13 +386,13 @@
}) })
(fetchNuGet { (fetchNuGet {
name = "Microsoft.CodeAnalysis.Workspaces.Common"; name = "Microsoft.CodeAnalysis.Workspaces.Common";
version = "3.7.0"; version = "3.8.0";
sha256 = "00nm453w4n6kjsicmz5izvkf1ki9rp3xnc9n3y7a9b1g5sxg36fs"; sha256 = "0qbirv7wxllzw5120pfa42wailfgzvl10373yhacankmfmbz2gnw";
}) })
(fetchNuGet { (fetchNuGet {
name = "Microsoft.CodeAnalysis.Workspaces.MSBuild"; name = "Microsoft.CodeAnalysis.Workspaces.MSBuild";
version = "3.7.0"; version = "3.8.0";
sha256 = "1sh8s7b16j06p3gmzsgwd8690vagah4908bpa3gyz2fxgfnj46ax"; sha256 = "1ag78ls51s88znv4v004sbklrx3qnbphpdngjq196188a3vljww7";
}) })
(fetchNuGet { (fetchNuGet {
name = "Microsoft.CodeQuality.Analyzers"; name = "Microsoft.CodeQuality.Analyzers";
@ -416,8 +421,8 @@
}) })
(fetchNuGet { (fetchNuGet {
name = "Microsoft.Diagnostics.Runtime"; name = "Microsoft.Diagnostics.Runtime";
version = "2.0.151903"; version = "2.0.156101";
sha256 = "1y7hsgzjs6b3323fcq5km515knykfgvdx4x8l1g03sy5h3lwwhak"; sha256 = "1k9f6x95mscq484f4sywpb84016v9yb9bz6ha77wsjbsarl96my0";
}) })
(fetchNuGet { (fetchNuGet {
name = "Microsoft.DotNet.PlatformAbstractions"; name = "Microsoft.DotNet.PlatformAbstractions";
@ -546,8 +551,8 @@
}) })
(fetchNuGet { (fetchNuGet {
name = "Microsoft.Extensions.ObjectPool"; name = "Microsoft.Extensions.ObjectPool";
version = "3.1.9"; version = "5.0.0";
sha256 = "1gq1i7rb50dzj9hp07q0w9siyqy3hl0zqpk8na37s4jq6ikb5q82"; sha256 = "0m0r7avz4ygxa1pyj5sai25y0n42y7kz9iznl7m3146csxi1paf0";
}) })
(fetchNuGet { (fetchNuGet {
name = "Microsoft.Extensions.Options"; name = "Microsoft.Extensions.Options";
@ -676,8 +681,8 @@
}) })
(fetchNuGet { (fetchNuGet {
name = "ppy.osu.Framework"; name = "ppy.osu.Framework";
version = "2020.1120.0"; version = "2020.1127.0";
sha256 = "13vm6qly09f9b9bnf8r4wkypbxz673x852fjllj33sz55qh6957m"; sha256 = "05vxdkw5z7bylj8dyw52lxf3g12mmvdifwvwlgz00v6ybkxr455j";
}) })
(fetchNuGet { (fetchNuGet {
name = "ppy.osu.Framework.NativeLibs"; name = "ppy.osu.Framework.NativeLibs";
@ -954,6 +959,11 @@
version = "1.7.1"; version = "1.7.1";
sha256 = "1nh4nlxfc7lbnbl86wwk1a3jwl6myz5j6hvgh5sp4krim9901hsq"; sha256 = "1nh4nlxfc7lbnbl86wwk1a3jwl6myz5j6hvgh5sp4krim9901hsq";
}) })
(fetchNuGet {
name = "System.Collections.Immutable";
version = "5.0.0";
sha256 = "1kvcllagxz2q92g81zkz81djkn2lid25ayjfgjalncyc68i15p0r";
})
(fetchNuGet { (fetchNuGet {
name = "System.ComponentModel.Annotations"; name = "System.ComponentModel.Annotations";
version = "4.5.0"; version = "4.5.0";
@ -1301,13 +1311,13 @@
}) })
(fetchNuGet { (fetchNuGet {
name = "System.Reflection.Metadata"; name = "System.Reflection.Metadata";
version = "1.6.0"; version = "1.8.1";
sha256 = "1wdbavrrkajy7qbdblpbpbalbdl48q3h34cchz24gvdgyrlf15r4"; sha256 = "17xxl3m99wa4hcpqy42vl8qb1jk2jfq32rj3sfjc1a46hi2si5jj";
}) })
(fetchNuGet { (fetchNuGet {
name = "System.Reflection.Metadata"; name = "System.Reflection.Metadata";
version = "1.8.1"; version = "5.0.0";
sha256 = "17xxl3m99wa4hcpqy42vl8qb1jk2jfq32rj3sfjc1a46hi2si5jj"; sha256 = "17qsl5nanlqk9iz0l5wijdn6ka632fs1m1fvx18dfgswm258r3ss";
}) })
(fetchNuGet { (fetchNuGet {
name = "System.Reflection.Primitives"; name = "System.Reflection.Primitives";
@ -1364,11 +1374,6 @@
version = "4.5.3"; version = "4.5.3";
sha256 = "1afi6s2r1mh1kygbjmfba6l4f87pi5sg13p4a48idqafli94qxln"; sha256 = "1afi6s2r1mh1kygbjmfba6l4f87pi5sg13p4a48idqafli94qxln";
}) })
(fetchNuGet {
name = "System.Runtime.CompilerServices.Unsafe";
version = "4.7.0";
sha256 = "16r6sn4czfjk8qhnz7bnqlyiaaszr0ihinb7mq9zzr1wba257r54";
})
(fetchNuGet { (fetchNuGet {
name = "System.Runtime.CompilerServices.Unsafe"; name = "System.Runtime.CompilerServices.Unsafe";
version = "4.7.1"; version = "4.7.1";
@ -1594,11 +1599,6 @@
version = "4.3.0"; version = "4.3.0";
sha256 = "1xxcx2xh8jin360yjwm4x4cf5y3a2bwpn2ygkfkwkicz7zk50s2z"; sha256 = "1xxcx2xh8jin360yjwm4x4cf5y3a2bwpn2ygkfkwkicz7zk50s2z";
}) })
(fetchNuGet {
name = "System.Threading.Tasks.Extensions";
version = "4.5.3";
sha256 = "0g7r6hm572ax8v28axrdxz1gnsblg6kszq17g51pj14a5rn2af7i";
})
(fetchNuGet { (fetchNuGet {
name = "System.Threading.Tasks.Extensions"; name = "System.Threading.Tasks.Extensions";
version = "4.5.4"; version = "4.5.4";

View file

@ -6,13 +6,13 @@
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
pname = "tpm2-pkcs11"; pname = "tpm2-pkcs11";
version = "1.3.0"; version = "1.5.0";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "tpm2-software"; owner = "tpm2-software";
repo = pname; repo = pname;
rev = version; rev = version;
sha256 = "12zj8jfm8jrwbqm3cnay8gx28ladmpyv5d29lp8qlfjqgflvhkwh"; sha256 = "0sm73a762c7qd6x3f052m00d7daprifimsfa17dfdf4jvy9fqy56";
}; };
patches = lib.singleton ( patches = lib.singleton (

View file

@ -1,14 +1,14 @@
{ stdenv, fetchFromGitHub }: { stdenv, fetchFromGitHub }:
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
version = "202010"; version = "202011";
pname = "pcm"; pname = "pcm";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "opcm"; owner = "opcm";
repo = "pcm"; repo = "pcm";
rev = version; rev = version;
sha256 = "00i7bp7hqwnphh7qyjydvz5s14ydj8rwivz995bdnd37582dyij9"; sha256 = "09p8drp9xvvs5bahgnr9xx6987fryz27xs2zaf1mr7a9wsh5j912";
}; };
installPhase = '' installPhase = ''

View file

@ -1,13 +1,13 @@
{ stdenv, buildGoModule, fetchFromGitHub }: { stdenv, buildGoModule, fetchFromGitHub }:
buildGoModule rec { buildGoModule rec {
pname = "thanos"; pname = "thanos";
version = "0.17.0"; version = "0.17.1";
src = fetchFromGitHub { src = fetchFromGitHub {
rev = "v${version}"; rev = "v${version}";
owner = "thanos-io"; owner = "thanos-io";
repo = "thanos"; repo = "thanos";
sha256 = "06pr9zqfd7nq13pgg02px2d9rp7phxlmnirpkdfgbw799zrfvpag"; sha256 = "07814hk6nmvvkf7xklrin24vp17wm6nby358gk20ri4man822q8c";
}; };
vendorSha256 = "1j3gnzas0hpb5dljf5m97nw2v4r1bp3l99z36gbqkm6lqzr6hqk8"; vendorSha256 = "1j3gnzas0hpb5dljf5m97nw2v4r1bp3l99z36gbqkm6lqzr6hqk8";

View file

@ -4,14 +4,14 @@ with lib;
buildGoPackage rec { buildGoPackage rec {
pname = "nats-streaming-server"; pname = "nats-streaming-server";
version = "0.17.0"; version = "0.19.0";
goPackagePath = "github.com/nats-io/${pname}"; goPackagePath = "github.com/nats-io/${pname}";
src = fetchFromGitHub { src = fetchFromGitHub {
rev = "v${version}"; rev = "v${version}";
owner = "nats-io"; owner = "nats-io";
repo = pname; repo = pname;
sha256 = "1dla70k6rxg34qzspq0j12zcjk654jrf3gm7gd45w4qdg8h2fyyg"; sha256 = "1wa2xby7v45f9idnhbkglknipm24wqx7mxmkyqz3amq17j4xfy7c";
}; };
meta = { meta = {

View file

@ -0,0 +1,22 @@
{ lib, buildGoModule, fetchFromGitHub }:
buildGoModule rec {
pname = "peach";
version = "0.9.8";
src = fetchFromGitHub {
owner = "peachdocs";
repo = "peach";
rev = "v${version}";
sha256 = "1pzk3sah39hz8n1kswxl35djh6wm0qcfcwrbfi50nd4k3bdgz7xl";
};
vendorSha256 = "0f215hd5a9d4fyvdirp2j14ghap5vwv12i28jmzm6wxjihj8nn1g";
meta = with lib; {
description = "Web server for multi-language, real-time synchronization and searchable documentation";
homepage = "https://peachdocs.org/";
license = licenses.asl20;
maintainers = [ maintainers.ivar ];
};
}

View file

@ -1,6 +1,10 @@
{ stdenv { stdenv
, fetchurl , fetchurl
, dpkg , dpkg
, writeScript
, curl
, jq
, common-updater-scripts
}: }:
# The raw package that fetches and extracts the Plex RPM. Override the source # The raw package that fetches and extracts the Plex RPM. Override the source
@ -52,6 +56,27 @@ stdenv.mkDerivation rec {
dontPatchELF = true; dontPatchELF = true;
dontAutoPatchelf = true; dontAutoPatchelf = true;
passthru.updateScript = writeScript "${pname}-updater" ''
#!${stdenv.shell}
set -eu -o pipefail
PATH=${stdenv.lib.makeBinPath [curl jq common-updater-scripts]}:$PATH
plexApiJson=$(curl -sS https://plex.tv/api/downloads/5.json)
latestVersion="$(echo $plexApiJson | jq .computer.Linux.version | tr -d '"\n')"
for platform in ${stdenv.lib.concatStringsSep " " meta.platforms}; do
arch=$(echo $platform | cut -d '-' -f1)
dlUrl="$(echo $plexApiJson | jq --arg arch "$arch" -c '.computer.Linux.releases[] | select(.distro == "debian") | select(.build | contains($arch)) .url' | tr -d '"\n')"
latestSha="$(nix-prefetch-url $dlUrl)"
# The script will not perform an update when the version attribute is up to date from previous platform run
# We need to clear it before each run
update-source-version plexRaw 0 $(yes 0 | head -64 | tr -d "\n") --system=$platform
update-source-version plexRaw "$latestVersion" "$latestSha" --system=$platform
done
'';
meta = with stdenv.lib; { meta = with stdenv.lib; {
homepage = "https://plex.tv/"; homepage = "https://plex.tv/";
license = licenses.unfree; license = licenses.unfree;

View file

@ -5,16 +5,16 @@
buildGoModule rec { buildGoModule rec {
pname = "rtsp-simple-server"; pname = "rtsp-simple-server";
version = "0.12.1"; version = "0.12.2";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "aler9"; owner = "aler9";
repo = pname; repo = pname;
rev = "v${version}"; rev = "v${version}";
sha256 = "0x8di6zkbn7v77awlybp3m722a27kw20vrpjgalifv8p87238x24"; sha256 = "094brxiiapm7402q0ysaha2xk3wymc2kz8vqisjyiswz7wf4wsx0";
}; };
vendorSha256 = "0p7d0c6zgbzj7wd2qdz578cgamydl6mp5sc8jmvnwb50h10n45af"; vendorSha256 = "007dyw825jsfma7sq5llxllhrzbkhqxr985s1nhg5cdd803gz42p";
# Tests need docker # Tests need docker
doCheck = false; doCheck = false;

View file

@ -20,14 +20,14 @@ let
]); ]);
path = stdenv.lib.makeBinPath [ par2cmdline unrar unzip p7zip ]; path = stdenv.lib.makeBinPath [ par2cmdline unrar unzip p7zip ];
in stdenv.mkDerivation rec { in stdenv.mkDerivation rec {
version = "3.0.1"; version = "3.1.1";
pname = "sabnzbd"; pname = "sabnzbd";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = pname; owner = pname;
repo = pname; repo = pname;
rev = version; rev = version;
sha256 = "1zp8cxz56qmai1z6xcscnq85gxhv64dv1s5zqsqdn0zpbxyqqdlr"; sha256 = "0m39r2il7d014kf2p6v28lw2hzshm6bhhdchqa8wzyvvmygqmwf2";
}; };
buildInputs = [ pythonEnv makeWrapper ]; buildInputs = [ pythonEnv makeWrapper ];

View file

@ -4,16 +4,16 @@ with rustPlatform;
buildRustPackage rec { buildRustPackage rec {
pname = "tarssh"; pname = "tarssh";
version = "0.4.0"; version = "0.5.0";
src = fetchFromGitHub { src = fetchFromGitHub {
rev = "v${version}"; rev = "v${version}";
owner = "Freaky"; owner = "Freaky";
repo = pname; repo = pname;
sha256 = "0fm0rwknhm39nhd6g0pnxby34i5gpmi5ri795d9ylsw0pqwz6kd0"; sha256 = "1waxfbw9lqbqv8igb291pjqg22324lzv4p7fsdfrkvxf95jd2i03";
}; };
cargoSha256 = "108xdpgfgfd4z455snif0mzbla0rv8gjqxci5qgwjzfyshwkprgv"; cargoSha256 = "1f3anrh2y8yg7l4nilwk0a7c7kq5yvg07cqh75igjdb5a7p9di0j";
meta = with stdenv.lib; { meta = with stdenv.lib; {
description = "A simple SSH tarpit inspired by endlessh"; description = "A simple SSH tarpit inspired by endlessh";

View file

@ -2,16 +2,16 @@
rustPlatform.buildRustPackage rec { rustPlatform.buildRustPackage rec {
pname = "procs"; pname = "procs";
version = "0.10.9"; version = "0.10.10";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "dalance"; owner = "dalance";
repo = pname; repo = pname;
rev = "v${version}"; rev = "v${version}";
sha256 = "1bxzwcj7jxv1hkbq84wigshni1ivdga7g77k3h9fxzn7c223yccd"; sha256 = "12p95nybsisqpji01qgkp5wfg7fwk814xdsz338q9wac8nvqw9w3";
}; };
cargoSha256 = "1bf0r9kymc1w1rxpc0bjgj5faagmad9vh404n9860rpganrdjvkx"; cargoSha256 = "13wfz0ig9dsl0h085rzlrx0dg9la957c50xyzjfxq1ybw2qr266b";
buildInputs = stdenv.lib.optional stdenv.isDarwin Security; buildInputs = stdenv.lib.optional stdenv.isDarwin Security;

View file

@ -0,0 +1,123 @@
{ lib
, python3Packages
, fetchFromGitHub
, fetchpatch
, python3
}:
#
# Tested in the following setup:
#
# TTS model:
# Tacotron2 DDC
# https://drive.google.com/drive/folders/1Y_0PcB7W6apQChXtbt6v3fAiNwVf4ER5
# Vocoder model:
# Multi-Band MelGAN
# https://drive.google.com/drive/folders/1XeRT0q4zm5gjERJqwmX5w84pMrD00cKD
#
# Arrange /tmp/tts like this:
# scale_stats.npy
# tts
# tts/checkpoint_130000.pth.tar
# tts/checkpoint_130000_tf.pkl
# tts/checkpoint_130000_tf_2.3rc0.tflite
# tts/config.json
# tts/scale_stats.npy
# vocoder
# vocoder/checkpoint_1450000.pth.tar
# vocoder/checkpoint_2750000_tf.pkl
# vocoder/checkpoint_2750000_tf_v2.3rc.tflite
# vocoder/config.json
# vocoder/scale_stats.npy
#
# Start like this:
# cd /tmp/tts
# tts-server \
# --vocoder_config ./tts/vocoder/config.json \
# --vocoder_checkpoint ./tts/vocoder/checkpoint_1450000.pth.tar \
# --tts_config ./tts/config.json \
# --tts_checkpoint ./tts/checkpoint_130000.pth.tar
#
# For now, for deployment check the systemd unit in the pull request:
# https://github.com/NixOS/nixpkgs/pull/103851#issue-521121136
#
python3Packages.buildPythonApplication rec {
pname = "tts";
# until https://github.com/mozilla/TTS/issues/424 is resolved
# we treat released models as released versions:
# https://github.com/mozilla/TTS/wiki/Released-Models
version = "unstable-2020-06-17";
src = fetchFromGitHub {
owner = "mozilla";
repo = "TTS";
rev = "72a6ac54c8cfaa407fc64b660248c6a788bdd381";
sha256 = "1wvs264if9n5xzwi7ryxvwj1j513szp6sfj6n587xk1fphi0921f";
};
patches = [
(fetchpatch {
url = "https://github.com/mozilla/TTS/commit/36fee428b9f3f4ec1914b090a2ec9d785314d9aa.patch";
sha256 = "sha256-pP0NxiyrsvQ0A7GEleTdT87XO08o7WxPEpb6Bmj66dc=";
})
];
preBuild = ''
# numba jit tries to write to its cache directory
export HOME=$TMPDIR
sed -i -e 's!tensorflow==.*!tensorflow!' requirements.txt
sed -i -e 's!librosa==[^"]*!librosa!' requirements.txt setup.py
sed -i -e 's!unidecode==[^"]*!unidecode!' requirements.txt setup.py
sed -i -e 's!bokeh==[^"]*!bokeh!' requirements.txt setup.py
sed -i -e 's!numba==[^"]*!numba!' requirements.txt setup.py
# Not required for building/installation but for their development/ci workflow
sed -i -e '/pylint/d' requirements.txt setup.py
sed -i -e '/cardboardlint/d' requirements.txt setup.py
'';
propagatedBuildInputs = with python3Packages; [
matplotlib
scipy
pytorch
flask
attrdict
bokeh
soundfile
tqdm
librosa
unidecode
phonemizer
tensorboardx
fuzzywuzzy
tensorflow_2
inflect
gdown
pysbd
];
postInstall = ''
cp -r TTS/server/templates/ $out/${python3.sitePackages}/TTS/server
'';
checkInputs = with python3Packages; [ pytestCheckHook ];
disabledTests = [
# RuntimeError: fft: ATen not compiled with MKL support
"test_torch_stft"
"test_stft_loss"
"test_multiscale_stft_loss"
# AssertionErrors that I feel incapable of debugging
"test_phoneme_to_sequence"
"test_text2phone"
"test_parametrized_gan_dataset"
];
meta = with lib; {
homepage = "https://github.com/mozilla/TTS";
description = "Deep learning for Text to Speech";
license = licenses.mpl20;
maintainers = with maintainers; [ hexa mic92 ];
};
}

View file

@ -0,0 +1,35 @@
{ stdenv
, fetchFromGitHub
, upx
}:
let
version = "20202807";
pname = "hdl-dump";
in stdenv.mkDerivation {
inherit pname version;
# Using AkuHAK's repo because playstation2's repo is outdated
src = fetchFromGitHub {
owner = "AKuHAK";
repo = pname;
rev = "be37e112a44772a1341c867dc3dfee7381ce9e59";
sha256 = "0akxak6hm11h8z6jczxgr795s4a8czspwnhl3swqxp803dvjdx41";
};
buildInputs = [ upx ];
makeFlags = [ "RELEASE=yes" ];
installPhase = ''
install -Dm755 hdl_dump -t $out/bin
'';
meta = with stdenv.lib; {
homepage = "https://github.com/AKuHAK/hdl-dump";
description = "PlayStation 2 HDLoader image dump/install utility";
platforms = platforms.linux;
license = licenses.gpl2Only;
maintainers = with maintainers; [ makefu ];
};
}

View file

@ -3,13 +3,13 @@
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
pname = "rmtrash"; pname = "rmtrash";
version = "1.13"; version = "1.14";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "PhrozenByte"; owner = "PhrozenByte";
repo = pname; repo = pname;
rev = "v${version}"; rev = "v${version}";
sha256 = "04a9c65wnkq1fj8qhdsdbps88xjbp7rn6p27y25v47kaysvrw01j"; sha256 = "0wfb2ykzlsxyqn9krfsis9jxhaxy3pxl71a4f15an1ngfndai694";
}; };
dontConfigure = true; dontConfigure = true;

View file

@ -2,16 +2,16 @@
buildGoModule rec { buildGoModule rec {
pname = "nfpm"; pname = "nfpm";
version = "1.10.1"; version = "1.10.2";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "goreleaser"; owner = "goreleaser";
repo = pname; repo = pname;
rev = "v${version}"; rev = "v${version}";
sha256 = "1j9b6kkhlw2sx6qwnxkhsk7bj9vm2vr0z1hj1jf257fxw9m2q6mz"; sha256 = "08qz9zfk19iwf8qfv7vmzvbl8w1vpjrry25w3pxsg93gyjw8v7mi";
}; };
vendorSha256 = "0x7r7qn4852q57fx5mcrw3aqdydmidk9g0hvj6apj81q77k5svqs"; vendorSha256 = "0qnfd47ykb6g28d3mnfncgmkvqd1myx47x563sxx4lcsq542q83n";
doCheck = false; doCheck = false;

View file

@ -3,13 +3,13 @@
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
pname = "miller"; pname = "miller";
version = "5.9.1"; version = "5.10.0";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "johnkerl"; owner = "johnkerl";
repo = "miller"; repo = "miller";
rev = "v${version}"; rev = "v${version}";
sha256 = "1i9bcpfjnl2yjnfmf0ar1l62zwq01ph0yylz0dby8k2l7cvq5ci6"; sha256 = "02jqbxnchljyqnmlbxjaf5zpdi03gxapfy38dfikl5j4f7yyxvjs";
}; };
nativeBuildInputs = [ autoreconfHook flex libtool ]; nativeBuildInputs = [ autoreconfHook flex libtool ];

View file

@ -2,7 +2,7 @@
buildGoModule rec { buildGoModule rec {
pname = "vale"; pname = "vale";
version = "2.6.3"; version = "2.6.4";
subPackages = [ "." ]; subPackages = [ "." ];
outputs = [ "out" "data" ]; outputs = [ "out" "data" ];
@ -11,7 +11,7 @@ buildGoModule rec {
owner = "errata-ai"; owner = "errata-ai";
repo = "vale"; repo = "vale";
rev = "v${version}"; rev = "v${version}";
sha256 = "1svzsm40jm694s5gxg807k0jib8pl5vk2rb2ih8qr9bb23a4h95x"; sha256 = "192w98ghfldxamkx717wqa4v3lsr2imlf8xd6ygjpgx78b5zvvcx";
}; };
vendorSha256 = null; vendorSha256 = null;

View file

@ -10494,6 +10494,12 @@ in
phpExtensions = php74Extensions; phpExtensions = php74Extensions;
phpPackages = php74Packages; phpPackages = php74Packages;
php80 = callPackage ../development/interpreters/php/8.0.nix {
stdenv = if stdenv.cc.isClang then llvmPackages_6.stdenv else stdenv;
};
php80Extensions = recurseIntoAttrs php80.extensions;
php80Packages = recurseIntoAttrs php80.packages;
# Import PHP74 interpreter, extensions and packages # Import PHP74 interpreter, extensions and packages
php74 = callPackage ../development/interpreters/php/7.4.nix { php74 = callPackage ../development/interpreters/php/7.4.nix {
stdenv = if stdenv.cc.isClang then llvmPackages_6.stdenv else stdenv; stdenv = if stdenv.cc.isClang then llvmPackages_6.stdenv else stdenv;
@ -21666,6 +21672,8 @@ in
howl = callPackage ../applications/editors/howl { }; howl = callPackage ../applications/editors/howl { };
hdl-dump = callPackage ../tools/misc/hdl-dump { };
hpcg = callPackage ../tools/misc/hpcg/default.nix { }; hpcg = callPackage ../tools/misc/hpcg/default.nix { };
hpl = callPackage ../tools/misc/hpl { mpi = openmpi; }; hpl = callPackage ../tools/misc/hpl { mpi = openmpi; };
@ -23163,6 +23171,8 @@ in
inherit (gst_all_1) gstreamer gst-plugins-base gst-plugins-good gst-libav; inherit (gst_all_1) gstreamer gst-plugins-base gst-plugins-good gst-libav;
}; };
peach = callPackage ../servers/peach { };
peaclock = callPackage ../applications/misc/peaclock { peaclock = callPackage ../applications/misc/peaclock {
stdenv = gccStdenv; stdenv = gccStdenv;
}; };
@ -25982,6 +25992,8 @@ in
tremulous = callPackage ../games/tremulous { }; tremulous = callPackage ../games/tremulous { };
tts = callPackage ../tools/audio/tts { };
tuxpaint = callPackage ../games/tuxpaint { }; tuxpaint = callPackage ../games/tuxpaint { };
tuxtype = callPackage ../games/tuxtype { }; tuxtype = callPackage ../games/tuxtype { };

View file

@ -598,10 +598,10 @@ let
Appcpm = buildPerlModule { Appcpm = buildPerlModule {
pname = "App-cpm"; pname = "App-cpm";
version = "0.994"; version = "0.995";
src = fetchurl { src = fetchurl {
url = "mirror://cpan/authors/id/S/SK/SKAJI/App-cpm-0.994.tar.gz"; url = "mirror://cpan/authors/id/S/SK/SKAJI/App-cpm-0.995.tar.gz";
sha256 = "4242ecb64aaae09034eddb1b338e005567ace29f2ac2d1bca4d4bcf4e15d21c4"; sha256 = "b17fb0b7f97eb86430952bf387b6f08b5252413cb97474d1bf26e3376a4cc496";
}; };
buildInputs = [ ModuleBuildTiny ]; buildInputs = [ ModuleBuildTiny ];
propagatedBuildInputs = [ CPANCommonIndex CPANDistnameInfo ClassTiny CommandRunner ExtUtilsInstallPaths FileCopyRecursive Filepushd HTTPTinyish MenloLegacy ModuleCPANfile ParallelPipes locallib ]; propagatedBuildInputs = [ CPANCommonIndex CPANDistnameInfo ClassTiny CommandRunner ExtUtilsInstallPaths FileCopyRecursive Filepushd HTTPTinyish MenloLegacy ModuleCPANfile ParallelPipes locallib ];
@ -8429,10 +8429,10 @@ let
FutureAsyncAwait = buildPerlModule rec { FutureAsyncAwait = buildPerlModule rec {
pname = "Future-AsyncAwait"; pname = "Future-AsyncAwait";
version = "0.46"; version = "0.47";
src = fetchurl { src = fetchurl {
url = "mirror://cpan/authors/id/P/PE/PEVANS/Future-AsyncAwait-${version}.tar.gz"; url = "mirror://cpan/authors/id/P/PE/PEVANS/Future-AsyncAwait-${version}.tar.gz";
sha256 = "1iqbs7n8923xjkai51hiczn5an8cskddl7qrfi30axjl1d56h6r0"; sha256 = "1ja85hzzl36sjikcyavjqy4m41f2yyrsr1ipypzi5mlw7clhmdi3";
}; };
buildInputs = [ TestRefcount ]; buildInputs = [ TestRefcount ];
propagatedBuildInputs = [ Future XSParseSublike ]; propagatedBuildInputs = [ Future XSParseSublike ];

View file

@ -3,7 +3,7 @@
, html-tidy, libzip, zlib, pcre, pcre2, libxslt, aspell, openldap, cyrus_sasl , html-tidy, libzip, zlib, pcre, pcre2, libxslt, aspell, openldap, cyrus_sasl
, uwimap, pam, libiconv, enchant1, libXpm, gd, libwebp, libjpeg, libpng , uwimap, pam, libiconv, enchant1, libXpm, gd, libwebp, libjpeg, libpng
, freetype, libffi, freetds, postgresql, sqlite, net-snmp, unixODBC, libedit , freetype, libffi, freetds, postgresql, sqlite, net-snmp, unixODBC, libedit
, readline, rsync, fetchpatch , readline, rsync, fetchpatch, valgrind
}: }:
let let
@ -331,7 +331,7 @@ in
sha256 = "055l40lpyhb0rbjn6y23qkzdhvpp7inbnn6x13cpn4inmhjqfpg4"; sha256 = "055l40lpyhb0rbjn6y23qkzdhvpp7inbnn6x13cpn4inmhjqfpg4";
}); });
} }
{ name = "json"; } { name = "json"; enable = lib.versionOlder php.version "8.0"; }
{ name = "ldap"; { name = "ldap";
buildInputs = [ openldap cyrus_sasl ]; buildInputs = [ openldap cyrus_sasl ];
configureFlags = [ configureFlags = [
@ -341,7 +341,9 @@ in
"LDAP_LIBDIR=${openldap.out}/lib" "LDAP_LIBDIR=${openldap.out}/lib"
] ++ lib.optional stdenv.isLinux "--with-ldap-sasl=${cyrus_sasl.dev}"; ] ++ lib.optional stdenv.isLinux "--with-ldap-sasl=${cyrus_sasl.dev}";
doCheck = false; } doCheck = false; }
{ name = "mbstring"; buildInputs = [ oniguruma ]; doCheck = false; } { name = "mbstring"; buildInputs = [ oniguruma ] ++ lib.optionals (lib.versionAtLeast php.version "8.0") [
pcre'
]; doCheck = false; }
{ name = "mysqli"; { name = "mysqli";
internalDeps = [ php.extensions.mysqlnd ]; internalDeps = [ php.extensions.mysqlnd ];
configureFlags = [ "--with-mysqli=mysqlnd" "--with-mysql-sock=/run/mysqld/mysqld.sock" ]; configureFlags = [ "--with-mysqli=mysqlnd" "--with-mysql-sock=/run/mysqld/mysqld.sock" ];
@ -388,11 +390,13 @@ in
# oci8 (7.4, 7.3, 7.2) # oci8 (7.4, 7.3, 7.2)
# odbc (7.4, 7.3, 7.2) # odbc (7.4, 7.3, 7.2)
{ name = "opcache"; { name = "opcache";
buildInputs = [ pcre' ]; buildInputs = [ pcre' ] ++ lib.optionals (lib.versionAtLeast php.version "8.0") [
valgrind.dev
];
# HAVE_OPCACHE_FILE_CACHE is defined in config.h, which is # HAVE_OPCACHE_FILE_CACHE is defined in config.h, which is
# included from ZendAccelerator.h, but ZendAccelerator.h is # included from ZendAccelerator.h, but ZendAccelerator.h is
# included after the ifdef... # included after the ifdef...
patches = lib.optional (lib.versionOlder php.version "7.4") [ patches = [] ++ lib.optional (lib.versionAtLeast php.version "8.0") [ ../development/interpreters/php/fix-opcache-configure.patch ] ++lib.optional (lib.versionOlder php.version "7.4") [
(pkgs.writeText "zend_file_cache_config.patch" '' (pkgs.writeText "zend_file_cache_config.patch" ''
--- a/ext/opcache/zend_file_cache.c --- a/ext/opcache/zend_file_cache.c
+++ b/ext/opcache/zend_file_cache.c +++ b/ext/opcache/zend_file_cache.c
@ -456,7 +460,7 @@ in
doCheck = false; doCheck = false;
} }
# recode (7.3, 7.2) # recode (7.3, 7.2)
{ name = "session"; } { name = "session"; doCheck = !(lib.versionAtLeast php.version "8.0"); }
{ name = "shmop"; } { name = "shmop"; }
{ name = "simplexml"; { name = "simplexml";
buildInputs = [ libxml2 pcre' ]; buildInputs = [ libxml2 pcre' ];

View file

@ -4611,6 +4611,8 @@ in {
pkuseg = callPackage ../development/python-modules/pkuseg { }; pkuseg = callPackage ../development/python-modules/pkuseg { };
pysbd = callPackage ../development/python-modules/pysbd { };
python-csxcad = callPackage ../development/python-modules/python-csxcad { }; python-csxcad = callPackage ../development/python-modules/python-csxcad { };
python-openems = callPackage ../development/python-modules/python-openems { }; python-openems = callPackage ../development/python-modules/python-openems { };