Merge remote-tracking branch 'upstream/master' into staging
This commit is contained in:
commit
61f3d46fcf
@ -200,11 +200,9 @@ meta-attributes</title>
|
||||
meta.platforms = stdenv.lib.platforms.linux;
|
||||
</programlisting>
|
||||
|
||||
Attribute Set <varname>stdenv.lib.platforms</varname> in
|
||||
<link xlink:href="https://github.com/NixOS/nixpkgs/blob/master/lib/platforms.nix">
|
||||
<filename>nixpkgs/lib/platforms.nix</filename></link> defines various common
|
||||
lists of platforms types.
|
||||
</para></listitem>
|
||||
Attribute Set <varname>stdenv.lib.platforms</varname> defines
|
||||
<link xlink:href="https://github.com/NixOS/nixpkgs/blob/master/lib/systems/doubles.nix">
|
||||
various common lists</link> of platforms types.</para></listitem>
|
||||
</varlistentry>
|
||||
|
||||
<varlistentry>
|
||||
|
@ -90,6 +90,14 @@ following incompatible changes:</para>
|
||||
That means that old configuration is not overwritten by default when update to the znc options are made.
|
||||
</para>
|
||||
</listitem>
|
||||
<listitem>
|
||||
<para>
|
||||
The option <option>services.xserver.desktopManager.default</option> is now <literal>none</literal> by default.
|
||||
An assertion failure is thrown if WM's and DM's default are <literal>none</literal>.
|
||||
To explicitly run a plain X session without and DM or WM, the newly introduced option <option>services.xserver.plainX</option>
|
||||
must be set to true.
|
||||
</para>
|
||||
</listitem>
|
||||
</itemizedlist>
|
||||
|
||||
</section>
|
||||
|
@ -87,8 +87,8 @@ in
|
||||
|
||||
default = mkOption {
|
||||
type = types.str;
|
||||
default = "";
|
||||
example = "none";
|
||||
default = "none";
|
||||
example = "plasma5";
|
||||
description = "Default desktop manager loaded if none have been chosen.";
|
||||
apply = defaultDM:
|
||||
if defaultDM == "" && cfg.session.list != [] then
|
||||
|
@ -161,6 +161,15 @@ in
|
||||
'';
|
||||
};
|
||||
|
||||
plainX = mkOption {
|
||||
type = types.bool;
|
||||
default = false;
|
||||
description = ''
|
||||
Whether the X11 session can be plain (without DM/WM) and
|
||||
the Xsession script will be used as fallback or not.
|
||||
'';
|
||||
};
|
||||
|
||||
autorun = mkOption {
|
||||
type = types.bool;
|
||||
default = true;
|
||||
@ -552,6 +561,9 @@ in
|
||||
+ "${toString (length primaryHeads)} heads set to primary: "
|
||||
+ concatMapStringsSep ", " (x: x.output) primaryHeads;
|
||||
})
|
||||
{ assertion = cfg.desktopManager.default == "none" && cfg.windowManager.default == "none" -> cfg.plainX;
|
||||
message = "Either the desktop manager or the window manager shouldn't be `none`! To explicitly allow this, you can also set `services.xserver.plainX` to `true`.";
|
||||
}
|
||||
];
|
||||
|
||||
environment.etc =
|
||||
|
@ -270,6 +270,10 @@ in rec {
|
||||
tests.plasma5 = callTest tests/plasma5.nix {};
|
||||
tests.keymap = callSubTests tests/keymap.nix {};
|
||||
tests.initrdNetwork = callTest tests/initrd-network.nix {};
|
||||
tests.kafka_0_9 = callTest tests/kafka_0_9.nix {};
|
||||
tests.kafka_0_10 = callTest tests/kafka_0_10.nix {};
|
||||
tests.kafka_0_11 = callTest tests/kafka_0_11.nix {};
|
||||
tests.kafka_1_0 = callTest tests/kafka_1_0.nix {};
|
||||
tests.kernel-copperhead = callTest tests/kernel-copperhead.nix {};
|
||||
tests.kernel-latest = callTest tests/kernel-latest.nix {};
|
||||
tests.kernel-lts = callTest tests/kernel-lts.nix {};
|
||||
@ -330,7 +334,7 @@ in rec {
|
||||
tests.wordpress = callTest tests/wordpress.nix {};
|
||||
tests.xfce = callTest tests/xfce.nix {};
|
||||
tests.xmonad = callTest tests/xmonad.nix {};
|
||||
|
||||
tests.zookeeper = callTest tests/zookeeper.nix {};
|
||||
|
||||
/* Build a bunch of typical closures so that Hydra can keep track of
|
||||
the evolution of closure sizes. */
|
||||
|
48
nixos/tests/kafka_0_10.nix
Normal file
48
nixos/tests/kafka_0_10.nix
Normal file
@ -0,0 +1,48 @@
|
||||
import ./make-test.nix ({ pkgs, lib, ... } :
|
||||
let
|
||||
kafkaPackage = pkgs.apacheKafka_0_10;
|
||||
in {
|
||||
name = "kafka_0_10";
|
||||
meta = with pkgs.stdenv.lib.maintainers; {
|
||||
maintainers = [ nequissimus ];
|
||||
};
|
||||
|
||||
nodes = {
|
||||
zookeeper1 = { config, ... }: {
|
||||
services.zookeeper = {
|
||||
enable = true;
|
||||
};
|
||||
|
||||
networking.firewall.allowedTCPPorts = [ 2181 ];
|
||||
};
|
||||
kafka = { config, ... }: {
|
||||
services.apache-kafka = {
|
||||
enable = true;
|
||||
extraProperties = ''
|
||||
offsets.topic.replication.factor = 1
|
||||
'';
|
||||
package = kafkaPackage;
|
||||
zookeeper = "zookeeper1:2181";
|
||||
};
|
||||
|
||||
networking.firewall.allowedTCPPorts = [ 9092 ];
|
||||
virtualisation.memorySize = 2048;
|
||||
};
|
||||
};
|
||||
|
||||
testScript = ''
|
||||
startAll;
|
||||
|
||||
$zookeeper1->waitForUnit("zookeeper");
|
||||
$zookeeper1->waitForUnit("network.target");
|
||||
$zookeeper1->waitForOpenPort(2181);
|
||||
|
||||
$kafka->waitForUnit("apache-kafka");
|
||||
$kafka->waitForUnit("network.target");
|
||||
$kafka->waitForOpenPort(9092);
|
||||
|
||||
$kafka->waitUntilSucceeds("${kafkaPackage}/bin/kafka-topics.sh --create --zookeeper zookeeper1:2181 --partitions 1 --replication-factor 1 --topic testtopic");
|
||||
$kafka->mustSucceed("echo 'test 1' | ${kafkaPackage}/bin/kafka-console-producer.sh --broker-list localhost:9092 --topic testtopic");
|
||||
$kafka->mustSucceed("${kafkaPackage}/bin/kafka-console-consumer.sh --bootstrap-server localhost:9092 --topic testtopic --from-beginning --max-messages 1 | grep 'test 1'");
|
||||
'';
|
||||
})
|
48
nixos/tests/kafka_0_11.nix
Normal file
48
nixos/tests/kafka_0_11.nix
Normal file
@ -0,0 +1,48 @@
|
||||
import ./make-test.nix ({ pkgs, lib, ... } :
|
||||
let
|
||||
kafkaPackage = pkgs.apacheKafka_0_11;
|
||||
in {
|
||||
name = "kafka_0_11";
|
||||
meta = with pkgs.stdenv.lib.maintainers; {
|
||||
maintainers = [ nequissimus ];
|
||||
};
|
||||
|
||||
nodes = {
|
||||
zookeeper1 = { config, ... }: {
|
||||
services.zookeeper = {
|
||||
enable = true;
|
||||
};
|
||||
|
||||
networking.firewall.allowedTCPPorts = [ 2181 ];
|
||||
};
|
||||
kafka = { config, ... }: {
|
||||
services.apache-kafka = {
|
||||
enable = true;
|
||||
extraProperties = ''
|
||||
offsets.topic.replication.factor = 1
|
||||
'';
|
||||
package = kafkaPackage;
|
||||
zookeeper = "zookeeper1:2181";
|
||||
};
|
||||
|
||||
networking.firewall.allowedTCPPorts = [ 9092 ];
|
||||
virtualisation.memorySize = 2048;
|
||||
};
|
||||
};
|
||||
|
||||
testScript = ''
|
||||
startAll;
|
||||
|
||||
$zookeeper1->waitForUnit("zookeeper");
|
||||
$zookeeper1->waitForUnit("network.target");
|
||||
$zookeeper1->waitForOpenPort(2181);
|
||||
|
||||
$kafka->waitForUnit("apache-kafka");
|
||||
$kafka->waitForUnit("network.target");
|
||||
$kafka->waitForOpenPort(9092);
|
||||
|
||||
$kafka->waitUntilSucceeds("${kafkaPackage}/bin/kafka-topics.sh --create --zookeeper zookeeper1:2181 --partitions 1 --replication-factor 1 --topic testtopic");
|
||||
$kafka->mustSucceed("echo 'test 1' | ${kafkaPackage}/bin/kafka-console-producer.sh --broker-list localhost:9092 --topic testtopic");
|
||||
$kafka->mustSucceed("${kafkaPackage}/bin/kafka-console-consumer.sh --bootstrap-server localhost:9092 --topic testtopic --from-beginning --max-messages 1 | grep 'test 1'");
|
||||
'';
|
||||
})
|
48
nixos/tests/kafka_0_9.nix
Normal file
48
nixos/tests/kafka_0_9.nix
Normal file
@ -0,0 +1,48 @@
|
||||
import ./make-test.nix ({ pkgs, lib, ... } :
|
||||
let
|
||||
kafkaPackage = pkgs.apacheKafka_0_9;
|
||||
in {
|
||||
name = "kafka_0_9";
|
||||
meta = with pkgs.stdenv.lib.maintainers; {
|
||||
maintainers = [ nequissimus ];
|
||||
};
|
||||
|
||||
nodes = {
|
||||
zookeeper1 = { config, ... }: {
|
||||
services.zookeeper = {
|
||||
enable = true;
|
||||
};
|
||||
|
||||
networking.firewall.allowedTCPPorts = [ 2181 ];
|
||||
};
|
||||
kafka = { config, ... }: {
|
||||
services.apache-kafka = {
|
||||
enable = true;
|
||||
extraProperties = ''
|
||||
offsets.topic.replication.factor = 1
|
||||
'';
|
||||
package = kafkaPackage;
|
||||
zookeeper = "zookeeper1:2181";
|
||||
};
|
||||
|
||||
networking.firewall.allowedTCPPorts = [ 9092 ];
|
||||
virtualisation.memorySize = 2048;
|
||||
};
|
||||
};
|
||||
|
||||
testScript = ''
|
||||
startAll;
|
||||
|
||||
$zookeeper1->waitForUnit("zookeeper");
|
||||
$zookeeper1->waitForUnit("network.target");
|
||||
$zookeeper1->waitForOpenPort(2181);
|
||||
|
||||
$kafka->waitForUnit("apache-kafka");
|
||||
$kafka->waitForUnit("network.target");
|
||||
$kafka->waitForOpenPort(9092);
|
||||
|
||||
$kafka->waitUntilSucceeds("${kafkaPackage}/bin/kafka-topics.sh --create --zookeeper zookeeper1:2181 --partitions 1 --replication-factor 1 --topic testtopic");
|
||||
$kafka->mustSucceed("echo 'test 1' | ${kafkaPackage}/bin/kafka-console-producer.sh --broker-list localhost:9092 --topic testtopic");
|
||||
$kafka->mustSucceed("${kafkaPackage}/bin/kafka-console-consumer.sh --zookeeper zookeeper1:2181 --topic testtopic --from-beginning --max-messages 1 | grep 'test 1'");
|
||||
'';
|
||||
})
|
48
nixos/tests/kafka_1_0.nix
Normal file
48
nixos/tests/kafka_1_0.nix
Normal file
@ -0,0 +1,48 @@
|
||||
import ./make-test.nix ({ pkgs, lib, ... } :
|
||||
let
|
||||
kafkaPackage = pkgs.apacheKafka_1_0;
|
||||
in {
|
||||
name = "kafka_1_0";
|
||||
meta = with pkgs.stdenv.lib.maintainers; {
|
||||
maintainers = [ nequissimus ];
|
||||
};
|
||||
|
||||
nodes = {
|
||||
zookeeper1 = { config, ... }: {
|
||||
services.zookeeper = {
|
||||
enable = true;
|
||||
};
|
||||
|
||||
networking.firewall.allowedTCPPorts = [ 2181 ];
|
||||
};
|
||||
kafka = { config, ... }: {
|
||||
services.apache-kafka = {
|
||||
enable = true;
|
||||
extraProperties = ''
|
||||
offsets.topic.replication.factor = 1
|
||||
'';
|
||||
package = kafkaPackage;
|
||||
zookeeper = "zookeeper1:2181";
|
||||
};
|
||||
|
||||
networking.firewall.allowedTCPPorts = [ 9092 ];
|
||||
virtualisation.memorySize = 2048;
|
||||
};
|
||||
};
|
||||
|
||||
testScript = ''
|
||||
startAll;
|
||||
|
||||
$zookeeper1->waitForUnit("zookeeper");
|
||||
$zookeeper1->waitForUnit("network.target");
|
||||
$zookeeper1->waitForOpenPort(2181);
|
||||
|
||||
$kafka->waitForUnit("apache-kafka");
|
||||
$kafka->waitForUnit("network.target");
|
||||
$kafka->waitForOpenPort(9092);
|
||||
|
||||
$kafka->waitUntilSucceeds("${kafkaPackage}/bin/kafka-topics.sh --create --zookeeper zookeeper1:2181 --partitions 1 --replication-factor 1 --topic testtopic");
|
||||
$kafka->mustSucceed("echo 'test 1' | ${kafkaPackage}/bin/kafka-console-producer.sh --broker-list localhost:9092 --topic testtopic");
|
||||
$kafka->mustSucceed("${kafkaPackage}/bin/kafka-console-consumer.sh --bootstrap-server localhost:9092 --topic testtopic --from-beginning --max-messages 1 | grep 'test 1'");
|
||||
'';
|
||||
})
|
28
nixos/tests/zookeeper.nix
Normal file
28
nixos/tests/zookeeper.nix
Normal file
@ -0,0 +1,28 @@
|
||||
import ./make-test.nix ({ pkgs, ...} : {
|
||||
name = "zookeeper";
|
||||
meta = with pkgs.stdenv.lib.maintainers; {
|
||||
maintainers = [ nequissimus ];
|
||||
};
|
||||
|
||||
nodes = {
|
||||
server = { pkgs, config, ... }: {
|
||||
services.zookeeper = {
|
||||
enable = true;
|
||||
};
|
||||
|
||||
networking.firewall.allowedTCPPorts = [ 2181 ];
|
||||
};
|
||||
};
|
||||
|
||||
testScript = ''
|
||||
startAll;
|
||||
|
||||
$server->waitForUnit("zookeeper");
|
||||
$server->waitForUnit("network.target");
|
||||
$server->waitForOpenPort(2181);
|
||||
|
||||
$server->waitUntilSucceeds("${pkgs.zookeeper}/bin/zkCli.sh -server localhost:2181 create /foo bar");
|
||||
$server->waitUntilSucceeds("${pkgs.zookeeper}/bin/zkCli.sh -server localhost:2181 set /foo hello");
|
||||
$server->waitUntilSucceeds("${pkgs.zookeeper}/bin/zkCli.sh -server localhost:2181 get /foo | grep hello");
|
||||
'';
|
||||
})
|
@ -32,7 +32,7 @@ let
|
||||
build_dir=$PWD
|
||||
cd $TMPDIR
|
||||
|
||||
local_path=$(basename ${store_path} .zip | sed -e 's/^[a-z0-9]*-//')
|
||||
local_path=$(basename ${url} .zip)
|
||||
|
||||
cp -r ${store_path} $local_path
|
||||
chmod u+rwX -R $local_path
|
||||
|
@ -9,7 +9,7 @@ stdenv.mkDerivation rec {
|
||||
|
||||
src = fetchFromGitHub {
|
||||
owner = "symless";
|
||||
repo = "synergy";
|
||||
repo = "synergy-core";
|
||||
rev = "v${version}-stable";
|
||||
sha256 = "0ksgr9hkf09h54572p7k7b9zkfhcdb2g2d5x7ixxn028y8i3jyp3";
|
||||
};
|
||||
|
@ -4,13 +4,13 @@
|
||||
|
||||
stdenv.mkDerivation rec {
|
||||
name = "tilix-${version}";
|
||||
version = "1.6.4";
|
||||
version = "1.7.1";
|
||||
|
||||
src = fetchFromGitHub {
|
||||
owner = "gnunn1";
|
||||
repo = "tilix";
|
||||
rev = "${version}";
|
||||
sha256 = "1vqi68jlbbaky1569kd4lr6p02zsiv7v2rfb8j1pzwj7gydblaac";
|
||||
sha256 = "0x0bnb26hjvxmvvd7c9k8fw97gcm3z5ssr6r8x90xbyyw6h58hhh";
|
||||
};
|
||||
|
||||
nativeBuildInputs = [
|
||||
|
File diff suppressed because it is too large
Load Diff
@ -98,7 +98,7 @@ let
|
||||
fteLibPath = makeLibraryPath [ stdenv.cc.cc gmp ];
|
||||
|
||||
# Upstream source
|
||||
version = "7.0.8";
|
||||
version = "7.0.9";
|
||||
|
||||
lang = "en-US";
|
||||
|
||||
@ -108,7 +108,7 @@ let
|
||||
"https://github.com/TheTorProject/gettorbrowser/releases/download/v${version}/tor-browser-linux64-${version}_${lang}.tar.xz"
|
||||
"https://dist.torproject.org/torbrowser/${version}/tor-browser-linux64-${version}_${lang}.tar.xz"
|
||||
];
|
||||
sha256 = "0bi4l4ma40ifsajvjpwv6ixphijqvb7yrci2jcyykh3j41ndfjf2";
|
||||
sha256 = "0ykbpp0qr3glygmnnc6ac41kkvrxn52472z6kbpf7i6qzvk4ba0d";
|
||||
};
|
||||
|
||||
"i686-linux" = fetchurl {
|
||||
@ -116,7 +116,7 @@ let
|
||||
"https://github.com/TheTorProject/gettorbrowser/releases/download/v${version}/tor-browser-linux32-${version}_${lang}.tar.xz"
|
||||
"https://dist.torproject.org/torbrowser/${version}/tor-browser-linux32-${version}_${lang}.tar.xz"
|
||||
];
|
||||
sha256 = "182q1gb8jnk92wxr7m977yxcksa8d3zg90qbsja1raym2vhqaf73";
|
||||
sha256 = "02alpzmvm3ldlp51sqppz41d12lx93n5qj6i3gqz6din96swm7j8";
|
||||
};
|
||||
};
|
||||
in
|
||||
|
@ -2,11 +2,11 @@
|
||||
|
||||
python2Packages.buildPythonApplication rec {
|
||||
name = "tortoisehg-${version}";
|
||||
version = "4.1.1";
|
||||
version = "4.3.1";
|
||||
|
||||
src = fetchurl {
|
||||
url = "https://bitbucket.org/tortoisehg/targz/downloads/${name}.tar.gz";
|
||||
sha256 = "14fy5p5hx4iij5kyma9679nrprd9lsjr6j047bfyfrwa3l4knj2g";
|
||||
sha256 = "0lxppjdqjmwl5y8fmp2am0my7a3mks811yg4fff7cx0569hdp62n";
|
||||
};
|
||||
|
||||
pythonPath = with python2Packages; [ pyqt4 mercurial qscintilla iniparse ];
|
||||
|
@ -8,13 +8,13 @@ let
|
||||
|
||||
pkg = self: stdenv.mkDerivation rec {
|
||||
name = "hex";
|
||||
version = "v0.14.0";
|
||||
version = "v0.17.1";
|
||||
|
||||
src = fetchFromGitHub {
|
||||
owner = "hexpm";
|
||||
repo = "hex";
|
||||
rev = "${version}";
|
||||
sha256 = "042rcwznb6cf9khn4l969axf7vhk53gy3rp23y6c8fhfp1472pai";
|
||||
sha256 = "1s4asar1mcavzj3w37jcz243ka0z5jm0r42yws3h4aagawxxg02z";
|
||||
};
|
||||
|
||||
setupHook = writeText "setupHook.sh" ''
|
||||
|
@ -6,11 +6,11 @@ rubyVersion = callPackage ../ruby/ruby-version.nix {} "2" "3" "3" "";
|
||||
jruby = stdenv.mkDerivation rec {
|
||||
name = "jruby-${version}";
|
||||
|
||||
version = "9.1.12.0";
|
||||
version = "9.1.13.0";
|
||||
|
||||
src = fetchurl {
|
||||
url = "https://s3.amazonaws.com/jruby.org/downloads/${version}/jruby-bin-${version}.tar.gz";
|
||||
sha256 = "15x5w4awy8h6xfkbj0p4xnb68xzfrss1rf2prk0kzk5kyjakrcnx";
|
||||
sha256 = "021rmm5c18js569i4z6vj1bb193j4nska43jfiqz5hisc936c5cx";
|
||||
};
|
||||
|
||||
buildInputs = [ makeWrapper ];
|
||||
|
@ -55,6 +55,12 @@ stdenv.mkDerivation rec {
|
||||
(if debugSupport then "--enable-debug=alot" else "")
|
||||
];
|
||||
|
||||
preConfigure = ''
|
||||
# Prevent a build failure for 3.100 due to using outdated symbol list
|
||||
# https://hydrogenaud.io/index.php/topic,114777.msg946373.html#msg946373
|
||||
sed -i '/lame_init_old/d' include/libmp3lame.sym
|
||||
'';
|
||||
|
||||
meta = {
|
||||
description = "A high quality MPEG Audio Layer III (MP3) encoder";
|
||||
homepage = http://lame.sourceforge.net;
|
||||
|
@ -11,6 +11,7 @@ stdenv.mkDerivation {
|
||||
substituteAll ${./common-lisp.sh} "$out"/bin/common-lisp.sh
|
||||
substituteAll "${./build-with-lisp.sh}" "$out/bin/build-with-lisp.sh"
|
||||
substituteAll "${./cl-wrapper.sh}" "$out/bin/cl-wrapper.sh"
|
||||
patchShebangs "$out/bin"
|
||||
chmod a+x "$out"/bin/*
|
||||
|
||||
substituteAll "${./setup-hook.sh}" "setup-hook-parsed"
|
||||
|
@ -7,6 +7,9 @@
|
||||
, cudaSupport ? false, nvidia_x11 ? null, cudatoolkit ? null, cudnn ? null
|
||||
# Default from ./configure script
|
||||
, cudaCapabilities ? [ "3.5" "5.2" ]
|
||||
, sse42Support ? false
|
||||
, avx2Support ? false
|
||||
, fmaSupport ? false
|
||||
}:
|
||||
|
||||
assert cudaSupport -> cudatoolkit != null
|
||||
@ -77,6 +80,9 @@ let
|
||||
hardeningDisable = [ "all" ];
|
||||
|
||||
bazelFlags = [ "--config=opt" ]
|
||||
++ lib.optional sse42Support "--copt=-msse4.2"
|
||||
++ lib.optional avx2Support "--copt=-mavx2"
|
||||
++ lib.optional fmaSupport "--copt=-mfma"
|
||||
++ lib.optional cudaSupport "--config=cuda";
|
||||
|
||||
bazelTarget = "//tensorflow/tools/pip_package:build_pip_package";
|
||||
|
@ -24,8 +24,7 @@ in
|
||||
stdenv.mkDerivation rec {
|
||||
inherit name;
|
||||
|
||||
srcs = [ openrct2-src title-sequences-src ];
|
||||
sourceRoot = ".";
|
||||
src = openrct2-src;
|
||||
|
||||
buildInputs = [
|
||||
SDL2
|
||||
@ -46,11 +45,7 @@ stdenv.mkDerivation rec {
|
||||
];
|
||||
|
||||
postUnpack = ''
|
||||
cp -r ${openrct2-src}/* ${sourceRoot}
|
||||
cp -r ${title-sequences-src} ${sourceRoot}/title
|
||||
|
||||
# creating temporary files in fixCmakeFiles fails otherwise
|
||||
chmod -R u+w ${sourceRoot}
|
||||
cp -r ${title-sequences-src} $sourceRoot/title
|
||||
'';
|
||||
|
||||
cmakeFlags = [
|
||||
|
@ -1,20 +1,28 @@
|
||||
{ stdenv, fetchurl, jre, makeWrapper, bash,
|
||||
majorVersion ? "0.9" }:
|
||||
majorVersion ? "1.0" }:
|
||||
|
||||
let
|
||||
versionMap = {
|
||||
"0.8" = { kafkaVersion = "0.8.2.2";
|
||||
scalaVersion = "2.10";
|
||||
sha256 = "1azccf1k0nr8y1sfpjgqf9swyp87ypvgva68ci4kczwcx1z9d89v";
|
||||
};
|
||||
"0.9" = { kafkaVersion = "0.9.0.1";
|
||||
scalaVersion = "2.11";
|
||||
sha256 = "0ykcjv5dz9i5bws9my2d60pww1g9v2p2nqr67h0i2xrjm7az8a6v";
|
||||
};
|
||||
"0.10" = { kafkaVersion = "0.10.2.0";
|
||||
scalaVersion = "2.12";
|
||||
sha256 = "0py43s6zv8z7wr2lk8403k07xxckl11gla3vs4gr99lixc4whis1";
|
||||
};
|
||||
"0.9" = {
|
||||
kafkaVersion = "0.9.0.1";
|
||||
scalaVersion = "2.11";
|
||||
sha256 = "0ykcjv5dz9i5bws9my2d60pww1g9v2p2nqr67h0i2xrjm7az8a6v";
|
||||
};
|
||||
"0.10" = {
|
||||
kafkaVersion = "0.10.2.1";
|
||||
scalaVersion = "2.12";
|
||||
sha256 = "0iszr6r0n9yjgq7kcp1hf00fg754m86gs4jzqc18542an94b88z5";
|
||||
};
|
||||
"0.11" = {
|
||||
kafkaVersion = "0.11.0.1";
|
||||
scalaVersion = "2.12";
|
||||
sha256 = "1wj639h95aq5n132fq1rbyzqh5rsa4mlhbg3c5mszqglnzdz4xn7";
|
||||
};
|
||||
"1.0" = {
|
||||
kafkaVersion = "1.0.0";
|
||||
scalaVersion = "2.12";
|
||||
sha256 = "1cs4nmp39m99gqjpy5klsffqksc0h9pz514jkq99qb95a83x1cfm";
|
||||
};
|
||||
};
|
||||
in
|
||||
|
||||
|
@ -2,7 +2,7 @@
|
||||
|
||||
buildGoPackage rec {
|
||||
name = "fzf-${version}";
|
||||
version = "0.17.0-2";
|
||||
version = "0.17.1";
|
||||
rev = "${version}";
|
||||
|
||||
goPackagePath = "github.com/junegunn/fzf";
|
||||
@ -11,7 +11,7 @@ buildGoPackage rec {
|
||||
inherit rev;
|
||||
owner = "junegunn";
|
||||
repo = "fzf";
|
||||
sha256 = "0j4m3xf6qxfymfq6y5ml5rgz2rr1glh54k3b5xa9zi4cl5wg43qv";
|
||||
sha256 = "0zxav6kfifppj49kif8917djq1vqjznqzmviqj4iiar8jmyrn2fy";
|
||||
};
|
||||
|
||||
outputs = [ "bin" "out" "man" ];
|
||||
|
@ -1,11 +1,12 @@
|
||||
{ stdenv, fetchurl, readline }:
|
||||
|
||||
stdenv.mkDerivation rec {
|
||||
name = "rlwrap-0.42";
|
||||
name = "rlwrap-${version}";
|
||||
version = "0.43";
|
||||
|
||||
src = fetchurl {
|
||||
url = "http://utopia.knoware.nl/~hlub/uck/rlwrap/${name}.tar.gz";
|
||||
sha256 = "0i3yz303wscrysyzpdq04h4nrl9ajz9dbwi80risdl5rkm3dhw2s";
|
||||
url = "https://github.com/hanslub42/rlwrap/releases/download/v${version}/${name}.tar.gz";
|
||||
sha256 = "0bzb7ylk2770iv59v2d0gypb21y2xn87m299s9rqm6rdi2vx11lf";
|
||||
};
|
||||
|
||||
buildInputs = [ readline ];
|
||||
@ -17,7 +18,7 @@ stdenv.mkDerivation rec {
|
||||
|
||||
meta = {
|
||||
description = "Readline wrapper for console programs";
|
||||
homepage = http://utopia.knoware.nl/~hlub/uck/rlwrap/;
|
||||
homepage = https://github.com/hanslub42/rlwrap;
|
||||
license = stdenv.lib.licenses.gpl2Plus;
|
||||
platforms = stdenv.lib.platforms.unix;
|
||||
maintainers = with stdenv.lib.maintainers; [ fuuzetsu ];
|
||||
|
@ -2,13 +2,13 @@
|
||||
|
||||
pythonPackages.buildPythonApplication rec {
|
||||
name = "tmuxp-${version}";
|
||||
version = "1.3.1";
|
||||
version = "1.3.4";
|
||||
|
||||
namePrefix = "";
|
||||
|
||||
src = fetchurl {
|
||||
url = "mirror://pypi/t/tmuxp/${name}.tar.gz";
|
||||
sha256 = "189mxnb2pxj3wjijn56j8y5x1r23fil00fn2q7d6bd13vgr0f85s";
|
||||
sha256 = "149n35rr27n2c6yna1bla20x3w1zz9gxnjj3m3xxdfp4fbsd2y31";
|
||||
};
|
||||
|
||||
patchPhase = ''
|
||||
|
@ -1,45 +1,31 @@
|
||||
{ stdenv, fetchurl
|
||||
, openssl, tdb, zlib, flex, bison
|
||||
}:
|
||||
let
|
||||
buildInputs = [ openssl tdb zlib flex bison ];
|
||||
sourceInfo = rec {
|
||||
baseName="fdm";
|
||||
version = "1.8";
|
||||
name="${baseName}-${version}";
|
||||
url="mirror://sourceforge/${baseName}/${baseName}/${name}.tar.gz";
|
||||
sha256 = "0hi39f31ipv8f9wxb41pajvl61w6vaapl39wq8v1kl9c7q6h0k2g";
|
||||
};
|
||||
{ stdenv, fetchFromGitHub, autoreconfHook, openssl, tdb, zlib, flex, bison }:
|
||||
|
||||
let
|
||||
|
||||
baseName = "fdm";
|
||||
version = "1.9.0.20170124";
|
||||
|
||||
in
|
||||
stdenv.mkDerivation {
|
||||
src = fetchurl {
|
||||
inherit (sourceInfo) url sha256;
|
||||
|
||||
stdenv.mkDerivation rec {
|
||||
name = "${baseName}-${version}";
|
||||
|
||||
src = fetchFromGitHub {
|
||||
owner = "nicm";
|
||||
repo = baseName;
|
||||
rev = "cae4ea37b6b296d1b2e48f62934ea3a7f6085e33";
|
||||
sha256 = "048191wdv1yprwinipmx2152gvd2iq1ssv7xfb1bzh6zirh1ya3n";
|
||||
};
|
||||
|
||||
inherit (sourceInfo) name version;
|
||||
inherit buildInputs;
|
||||
nativeBuildInputs = [ autoreconfHook ];
|
||||
buildInputs = [ openssl tdb zlib flex bison ];
|
||||
|
||||
preBuild = ''
|
||||
export makeFlags="$makeFlags PREFIX=$out"
|
||||
export NIX_CFLAGS_COMPILE="$NIX_CFLAGS_COMPILE -Dbool=int"
|
||||
|
||||
sed -i */Makefile -i Makefile -e 's@ -g bin @ @'
|
||||
sed -i */Makefile -i Makefile -e 's@ -o root @ @'
|
||||
sed -i GNUmakefile -e 's@ -g $(BIN_OWNER) @ @'
|
||||
sed -i GNUmakefile -e 's@ -o $(BIN_GROUP) @ @'
|
||||
sed -i */Makefile -i Makefile -i GNUmakefile -e 's@-I-@@g'
|
||||
'';
|
||||
|
||||
meta = {
|
||||
meta = with stdenv.lib; {
|
||||
description = "Mail fetching and delivery tool - should do the job of getmail and procmail";
|
||||
maintainers = with stdenv.lib.maintainers;
|
||||
[
|
||||
raskin
|
||||
];
|
||||
platforms = with stdenv.lib.platforms;
|
||||
linux;
|
||||
homepage = http://fdm.sourceforge.net/;
|
||||
inherit (sourceInfo) version;
|
||||
updateWalker = true;
|
||||
maintainers = with maintainers; [ raskin ];
|
||||
platforms = with platforms; linux;
|
||||
homepage = https://github.com/nicm/fdm;
|
||||
downloadPage = https://github.com/nicm/fdm/releases;
|
||||
};
|
||||
}
|
||||
|
@ -36,7 +36,7 @@ stdenv.mkDerivation rec {
|
||||
buildInputs = [ openssl zlib libpcap boost automake autoconf ] ++ lib.optional useCairo cairo;
|
||||
|
||||
postUnpack = ''
|
||||
pushd tcpflow-*-src/src
|
||||
pushd "$sourceRoot/src"
|
||||
cp -rv ${be13_api}/* be13_api/
|
||||
cp -rv ${dfxml}/* dfxml/
|
||||
cp -rv ${httpparser}/* http-parser/
|
||||
|
@ -4,13 +4,13 @@
|
||||
|
||||
stdenv.mkDerivation rec {
|
||||
name = "rofi-pass-${version}";
|
||||
version = "1.5.2";
|
||||
version = "1.5.3";
|
||||
|
||||
src = fetchFromGitHub {
|
||||
owner = "carnager";
|
||||
repo = "rofi-pass";
|
||||
rev = version;
|
||||
sha256 = "1sc4b1g2z7402akk96rqbnwjd66n6qn046ihpwxdb03bv2qahiap";
|
||||
sha256 = "1fn1j2rf3abc5qb44zfc8z8ffw6rva4xfp7597hwr1g3szacazpq";
|
||||
};
|
||||
|
||||
buildInputs = [ makeWrapper ];
|
||||
|
@ -1,11 +1,14 @@
|
||||
{ stdenv, fetchurl }:
|
||||
|
||||
stdenv.mkDerivation rec {
|
||||
name = "mawk-1.3.4-20161120";
|
||||
name = "mawk-1.3.4-20171017";
|
||||
|
||||
src = fetchurl {
|
||||
url = "ftp://invisible-island.net/mawk/${name}.tgz";
|
||||
sha256 = "07hc33g2ip7463dravsiz0zwfc8vy4y4jxqvp7rz3hb896xw27in";
|
||||
urls = [
|
||||
"https://invisible-mirror.net/archives/mawk/${name}.tgz"
|
||||
"ftp://invisible-island.net/mawk/${name}.tgz"
|
||||
];
|
||||
sha256 = "0nwyxhipn4jx7j695lih1xggxm6cp4fjk4wbgihd33ni3rfi25yv";
|
||||
};
|
||||
|
||||
meta = with stdenv.lib; {
|
||||
|
@ -6871,10 +6871,11 @@ with pkgs;
|
||||
|
||||
apacheAnt = callPackage ../development/tools/build-managers/apache-ant { };
|
||||
|
||||
apacheKafka = apacheKafka_0_10;
|
||||
apacheKafka_0_8 = callPackage ../servers/apache-kafka { majorVersion = "0.8"; };
|
||||
apacheKafka = apacheKafka_1_0;
|
||||
apacheKafka_0_9 = callPackage ../servers/apache-kafka { majorVersion = "0.9"; };
|
||||
apacheKafka_0_10 = callPackage ../servers/apache-kafka { majorVersion = "0.10"; };
|
||||
apacheKafka_0_11 = callPackage ../servers/apache-kafka { majorVersion = "0.11"; };
|
||||
apacheKafka_1_0 = callPackage ../servers/apache-kafka { majorVersion = "1.0"; };
|
||||
|
||||
kt = callPackage ../tools/misc/kt {};
|
||||
|
||||
|
Loading…
Reference in New Issue
Block a user