From 287a7e08f36ced7ba9d8372e4fbdac13e2c24d4e Mon Sep 17 00:00:00 2001 From: Emil Rangden Date: Fri, 24 Jan 2014 15:51:04 +0100 Subject: [PATCH 001/128] add glog 0.3.3 --- pkgs/development/libraries/glog/default.nix | 16 ++++++++++++++++ pkgs/top-level/all-packages.nix | 2 ++ 2 files changed, 18 insertions(+) create mode 100644 pkgs/development/libraries/glog/default.nix diff --git a/pkgs/development/libraries/glog/default.nix b/pkgs/development/libraries/glog/default.nix new file mode 100644 index 000000000000..098643ae70f0 --- /dev/null +++ b/pkgs/development/libraries/glog/default.nix @@ -0,0 +1,16 @@ +{ stdenv, fetchurl }: + +stdenv.mkDerivation rec { + name = "glog-0.3.3"; + + src = fetchurl { + url = "http://google-glog.googlecode.com/files/${name}.tar.gz"; + sha1 = "ed40c26ecffc5ad47c618684415799ebaaa30d65"; + }; + + meta = { + homepage = http://code.google.com/p/google-glog/; + license = "BSD"; + description = "The glog library implements application-level logging."; + }; +} diff --git a/pkgs/top-level/all-packages.nix b/pkgs/top-level/all-packages.nix index 6ee74ee90e1f..2f9b0c8ed9a7 100644 --- a/pkgs/top-level/all-packages.nix +++ b/pkgs/top-level/all-packages.nix @@ -4193,6 +4193,8 @@ let glm = callPackage ../development/libraries/glm { }; + glog = callPackage ../development/libraries/glog { }; + glpk = callPackage ../development/libraries/glpk { }; glsurf = callPackage ../applications/science/math/glsurf { From 1e3a151d3b620304875ddbe7460b6e955221fb63 Mon Sep 17 00:00:00 2001 From: Emil Rangden Date: Fri, 24 Jan 2014 19:23:23 +0100 Subject: [PATCH 002/128] hiphopvm: update to commit 1e23dec9f0 --- .../interpreters/hiphopvm/default.nix | 26 +++++++++---------- pkgs/top-level/all-packages.nix | 1 + 2 files changed, 13 insertions(+), 14 deletions(-) diff --git a/pkgs/development/interpreters/hiphopvm/default.nix b/pkgs/development/interpreters/hiphopvm/default.nix index c18c81caff05..ae30d169b507 100644 --- a/pkgs/development/interpreters/hiphopvm/default.nix +++ b/pkgs/development/interpreters/hiphopvm/default.nix @@ -1,14 +1,14 @@ { stdenv, fetchurl, fetchgit, cmake, boost, libunwind, mysql, libmemcached, pcre , libevent, gd, curl, libxml2, icu, flex, bison, openssl, zlib, php, re2c -, expat, libcap, oniguruma, libdwarf, libmcrypt, inteltbb, gperftools -, bzip2, openldap, readline, libelf, uwimap, binutils, cyrus_sasl, pam +, expat, libcap, oniguruma, libdwarf, libmcrypt, inteltbb, gperftools, glog +, bzip2, openldap, readline, libelf, uwimap, binutils, cyrus_sasl, pam, libpng }: assert stdenv.system == "x86_64-linux"; let src = fetchgit { url = "git://github.com/facebook/hiphop-php.git"; - rev = "73f1c0ebd9b313f6b3baecd8c8046e0b595b1157"; - sha256 = "104133c6054bc9ab0288eaa0cea168b6699e537b3ea76ecdc38ee833d93dca09"; + rev = "1e23dec9f0b1ce8aaa5833d0527a369c8e254ffd"; + sha256 = "0fblwgq8c3hmamw0m5d1mn8qhyqf14v2zf62cgrkvmbiz6jlrbr6"; }; libxml2_280 = stdenv.lib.overrideDerivation libxml2 (args: rec { @@ -21,37 +21,35 @@ let patches = []; }); - - curlFB = stdenv.lib.overrideDerivation curl (args: { patches = [ "${src}/src/third_party/libcurl-7.22.1.fb-changes.diff" ]; }); - fbPatch = "${src}/src/third_party/libevent-1.4.14.fb-changes.diff"; + fbPatch = "${src}/hphp/third_party/libevent-1.4.14.fb-changes.diff"; + libeventFB = stdenv.lib.overrideDerivation libevent (args: { patches = [fbPatch]; }); in stdenv.mkDerivation { - name = "hiphop-php-73f1c0ebd9"; + name = "hiphop-php-1e23dec9f0"; inherit src; dontUseCmakeBuildDir = true; dontUseCmakeConfigure = true; USE_HHVM=1; preConfigure = '' - export HPHP_HOME=$PWD export HPHP_LIB=$PWD/bin export TBB_INSTALL_DIR=${inteltbb} export TBB_ARCH_PLATFORM="intel64/cc4.1.0_libc2.4_kernel2.6.16.21" - sed -i 's| DEPRECATED | DEPRECATED_ |' src/runtime/base/runtime_error.h + sed 's=/bin/bash=/${stdenv.shell}=g' -i hphp/util/generate-buildinfo.sh ''; NIX_LDFLAGS = "-lpam -L${pam}/lib"; + MYSQL_INCLUDE_DIR="${mysql}/include/mysql"; MYSQL_DIR=mysql; buildInputs = [ - cmake boost libunwind mysql libmemcached pcre libeventFB gd curlFB + cmake boost libunwind mysql libmemcached pcre libeventFB gd curl libxml2_280 icu flex bison openssl zlib php expat libcap oniguruma libdwarf libmcrypt inteltbb gperftools bzip2 openldap readline - libelf uwimap binutils cyrus_sasl pam + libelf uwimap binutils cyrus_sasl pam glog libpng ]; installPhase = '' mkdir -p $out/bin - cp src/hhvm/hhvm $out/bin - cp bin/systemlib.php $out/bin + cp hphp/hhvm/hhvm $out/bin ''; patches = [./tbb.patch]; diff --git a/pkgs/top-level/all-packages.nix b/pkgs/top-level/all-packages.nix index 2f9b0c8ed9a7..f0ac33243876 100644 --- a/pkgs/top-level/all-packages.nix +++ b/pkgs/top-level/all-packages.nix @@ -2670,6 +2670,7 @@ let hiphopvm = callPackage ../development/interpreters/hiphopvm { libevent = libevent14; boost = boost149; + stdenv = overrideGCC stdenv gcc48; }; falcon = builderDefsPackage (import ../development/interpreters/falcon) { From 433774c6088501f53b36ddac5811ff63784ae75c Mon Sep 17 00:00:00 2001 From: Moritz Maxeiner Date: Sat, 25 Jan 2014 03:13:34 +0100 Subject: [PATCH 003/128] Add libyubikey (aka yubico-c) package --- .../libraries/libyubikey/default.nix | 20 +++++++++++++++++++ pkgs/top-level/all-packages.nix | 2 ++ 2 files changed, 22 insertions(+) create mode 100644 pkgs/development/libraries/libyubikey/default.nix diff --git a/pkgs/development/libraries/libyubikey/default.nix b/pkgs/development/libraries/libyubikey/default.nix new file mode 100644 index 000000000000..77bf60c4255e --- /dev/null +++ b/pkgs/development/libraries/libyubikey/default.nix @@ -0,0 +1,20 @@ +{stdenv, fetchurl}: + +stdenv.mkDerivation rec +{ + version = "1.11"; + name = "libyubikey-${version}"; + + src = fetchurl + { + url = "http://opensource.yubico.com/yubico-c/releases/${name}.tar.gz"; + sha256 = "19pm4rqsnm9r0n5j26bqkxa1jpimdavzcvg5g7p416vkjhxc6lw9"; + }; + + meta = + { + homepage = "http://opensource.yubico.com/yubico-c/"; + description = "C library for manipulating Yubico YubiKey One-Time Passwords (OTPs)"; + license = "bsd"; + }; +} diff --git a/pkgs/top-level/all-packages.nix b/pkgs/top-level/all-packages.nix index 6ee74ee90e1f..f16c5b7cd9e0 100644 --- a/pkgs/top-level/all-packages.nix +++ b/pkgs/top-level/all-packages.nix @@ -5036,6 +5036,8 @@ let libyamlcpp = callPackage ../development/libraries/libyaml-cpp { }; libyamlcpp03 = callPackage ../development/libraries/libyaml-cpp/0.3.x.nix { }; + libyubikey = callPackage ../development/libraries/libyubikey {}; + libzip = callPackage ../development/libraries/libzip { }; libzrtpcpp = callPackage ../development/libraries/libzrtpcpp { }; From 8f9300fb0ee63c2e0ebc0080346c15dbb26a72ee Mon Sep 17 00:00:00 2001 From: Moritz Maxeiner Date: Sat, 25 Jan 2014 03:17:06 +0100 Subject: [PATCH 004/128] Add ykpers (aka yubikey-personalization) package --- pkgs/applications/misc/ykpers/default.nix | 22 ++++++++++++++++++++++ pkgs/top-level/all-packages.nix | 2 ++ 2 files changed, 24 insertions(+) create mode 100644 pkgs/applications/misc/ykpers/default.nix diff --git a/pkgs/applications/misc/ykpers/default.nix b/pkgs/applications/misc/ykpers/default.nix new file mode 100644 index 000000000000..70ec351f71b7 --- /dev/null +++ b/pkgs/applications/misc/ykpers/default.nix @@ -0,0 +1,22 @@ +{stdenv, fetchurl, pkgconfig, libusb1, libyubikey}: + +stdenv.mkDerivation rec +{ + version = "1.15.0"; + name = "ykpers-${version}"; + + src = fetchurl + { + url = "http://opensource.yubico.com/yubikey-personalization/releases/${name}.tar.gz"; + sha256 = "1n4s8kk31q5zh2rm7sj9qmv86yl8ibimdnpvk9ny391a88qlypyd"; + }; + + buildInputs = [pkgconfig libusb1 libyubikey]; + + meta = + { + homepage = "http://opensource.yubico.com/yubikey-personalization/"; + description = "YubiKey Personalization cross-platform library and tool"; + license = "bsd"; + }; +} diff --git a/pkgs/top-level/all-packages.nix b/pkgs/top-level/all-packages.nix index f16c5b7cd9e0..a967115b5eed 100644 --- a/pkgs/top-level/all-packages.nix +++ b/pkgs/top-level/all-packages.nix @@ -9119,6 +9119,8 @@ let qgis = callPackage ../applications/misc/qgis {}; + ykpers = callPackage ../applications/misc/ykpers {}; + yoshimi = callPackage ../applications/audio/yoshimi { fltk = fltk13; }; From 333f5caaf91ce1c28586483774a60bf385e19a32 Mon Sep 17 00:00:00 2001 From: Moritz Maxeiner Date: Sat, 25 Jan 2014 03:27:12 +0100 Subject: [PATCH 005/128] Implement authentication for a LUKS device with a yubikey (HMAC-SHA1); supports simple challenge-response and two-factor authentication --- nixos/modules/system/boot/luksroot.nix | 220 ++++++++++++++++++++++++- 1 file changed, 218 insertions(+), 2 deletions(-) diff --git a/nixos/modules/system/boot/luksroot.nix b/nixos/modules/system/boot/luksroot.nix index ba357f5d2de3..ca4a8c480f80 100644 --- a/nixos/modules/system/boot/luksroot.nix +++ b/nixos/modules/system/boot/luksroot.nix @@ -5,7 +5,7 @@ with pkgs.lib; let luks = config.boot.initrd.luks; - openCommand = { name, device, keyFile, keyFileSize, allowDiscards, ... }: '' + openCommand = { name, device, keyFile, keyFileSize, allowDiscards, yubikey, ... }: '' # Wait for luksRoot to appear, e.g. if on a usb drive. # XXX: copied and adapted from stage-1-init.sh - should be # available as a function. @@ -31,9 +31,141 @@ let fi ''} + ${optionalString (luks.yubikeySupport && (yubikey != null)) '' + mkdir -p ${yubikey.challenge.mountPoint} + mount -t ${yubikey.challenge.fsType} ${toString yubikey.challenge.device} ${yubikey.challenge.mountPoint} + response="$(ykchalresp -${toString yubikey.yubikeySlot} "`cat ${yubikey.challenge.mountPoint}${yubikey.challenge.file}`" 2>/dev/null || true)" + if [ -z "$response" ]; then + echo -n "waiting 10 seconds for yubikey to appear..." + for try in $(seq 10); do + sleep 1 + response="$(ykchalresp -${toString yubikey.yubikeySlot} "`cat ${yubikey.challenge.mountPoint}${yubikey.challenge.file}`" 2>/dev/null || true)" + if [ ! -z "$response" ]; then break; fi + echo -n . + done + echo "ok" + fi + + ${optionalString yubikey.twoFactor '' + if [ ! -z "$response" ]; then + echo -n "Enter two-factor passphrase: " + read -s passphrase + current_key="$passphrase$response" + fi + ''} + + ${optionalString (!yubikey.twoFactor) '' + if [ ! -z "$response" ]; then + current_key="$response" + fi + ''} + ''} + # open luksRoot and scan for logical volumes + ${optionalString ((!luks.yubikeySupport) || (yubikey == null)) '' cryptsetup luksOpen ${device} ${name} ${optionalString allowDiscards "--allow-discards"} \ ${optionalString (keyFile != null) "--key-file=${keyFile} ${optionalString (keyFileSize != null) "--keyfile-size=${toString keyFileSize}"}"} + ''} + + ${optionalString (luks.yubikeySupport && (yubikey != null)) '' + if [ -z "$response" ]; then + cryptsetup luksOpen ${device} ${name} ${optionalString allowDiscards "--allow-discards"} \ + ${optionalString (keyFile != null) "--key-file=${keyFile} ${optionalString (keyFileSize != null) "--keyfile-size=${toString keyFileSize}"}"} + else + echo $current_key | cryptsetup luksOpen ${device} ${name} ${optionalString allowDiscards "--allow-discards"} --key-file=- + + if [ $? != "0" ]; then + for try in $(seq 3); do + + ${optionalString (!yubikey.twoFactor) '' + sleep 1 + ''} + + ${optionalString yubikey.twoFactor '' + echo -n "Enter two-factor passphrase: " + read -s passphrase + current_key="$passphrase$response" + ''} + + echo $current_key | cryptsetup luksOpen ${device} ${name} ${optionalString allowDiscards "--allow-discards"} --key-file=- + if [ $? == "0" ]; then break; fi + echo -n . + done + fi + + mkdir -p ${yubikey.ramfsMountPoint} + # A ramfs is used here to ensure that the file used to update + # the key slot with cryptsetup will never get swapped out. + # Warning: Do NOT replace with tmpfs! + mount -t ramfs none ${yubikey.ramfsMountPoint} + + update_failed=false + old_challenge=$(cat ${yubikey.challenge.mountPoint}${yubikey.challenge.file}) + + new_challenge=$(uuidgen) + if [ $? != "0" ]; then + for try in $(seq 10); do + sleep 1 + new_challenge=$(uuidgen) + if [ $? == "0" ]; then break; fi + if [ $try -eq 10 ]; then update_failed=true; fi + done + fi + + if [ "$update_failed" == false ]; then + echo $new_challenge > ${yubikey.challenge.mountPoint}${yubikey.challenge.file} + response="$(ykchalresp -${toString yubikey.yubikeySlot} "`cat ${yubikey.challenge.mountPoint}${yubikey.challenge.file}`" 2>/dev/null || true)" + if [ -z "$response" ]; then + echo -n "waiting 10 seconds for yubikey to appear..." + for try in $(seq 10); do + sleep 1 + response="$(ykchalresp -${toString yubikey.yubikeySlot} "`cat ${yubikey.challenge.mountPoint}${yubikey.challenge.file}`" 2>/dev/null || true)" + if [ ! -z "$response" ]; then break; fi + echo -n . + done + echo "ok"; + fi + + if [ ! -z "$response" ]; then + ${optionalString yubikey.twoFactor '' + new_key="$passphrase$response" + ''} + + ${optionalString (!yubikey.twoFactor) '' + new_key="$response" + ''} + + echo $new_key > ${yubikey.ramfsMountPoint}/new_key + + echo $current_key | cryptsetup luksChangeKey ${device} --key-file=- --key-slot ${toString yubikey.luksKeySlot} ${yubikey.ramfsMountPoint}/new_key + if [ $? != "0" ]; then + for try in $(seq 10); do + sleep 1 + echo $current_key | cryptsetup luksChangeKey ${device} --key-file=- --key-slot ${toString yubikey.luksKeySlot} ${yubikey.ramfsMountPoint}/new_key + if [ $? == "0" ]; then break; fi + if [ $try -eq 10 ]; then update_failed=true; fi + done + + fi + + rm -f ${yubikey.ramfsMountPoint}/new_key + + if [ "$update_failed" == true ]; then + echo $old_challenge > ${yubikey.challenge.mountPoint}${yubikey.challenge.file} + echo "Warning: Could not update luks header with new key for ${device}, old challenge restored!" + fi + else + echo $old_challenge > ${yubikey.challenge.mountPoint}${yubikey.challenge.file} + echo "Warning: No yubikey present to challenge for ${device}, old challenge restored!" + fi + else + echo "Warning: New challenge could not be obtained for ${device}, old challenge persists!" + fi + + umount ${yubikey.ramfsMountPoint} + umount ${yubikey.challenge.mountPoint} + fi + ''} ''; isPreLVM = f: f.preLVM; @@ -139,10 +271,77 @@ in ''; }; - }; + yubikey = mkOption { + default = null; + type = types.nullOr types.optionSet; + description = "TODO"; + options = { + twoFactor = mkOption { + default = false; + type = types.bool; + description = "TODO"; + }; + + yubikeySlot = mkOption { + default = 2; + type = types.int; + description = "TODO"; + }; + + luksKeySlot = mkOption { + default = 1; + type = types.int; + description = "TODO"; + }; + + challenge = mkOption { + type = types.optionSet; + description = "TODO"; + + options = { + device = mkOption { + default = /dev/sda1; + type = types.path; + description = "TODO"; + }; + + fsType = mkOption { + default = "vfat"; + type = types.string; + description = "TODO"; + }; + + mountPoint = mkOption { + default = "/crypt-challenge"; + type = types.string; + description = "TODO"; + }; + + file = mkOption { + default = "/crypt-challenge"; + type = types.string; + description = "TODO"; + }; + }; + }; + + ramfsMountPoint = mkOption { + default = "/crypt-update"; + type = types.string; + description = "TODO"; + }; + }; + }; + + }; }; + boot.initrd.luks.yubikeySupport = mkOption { + default = false; + type = types.bool; + description = "TODO"; + }; }; config = mkIf (luks.devices != []) { @@ -162,10 +361,27 @@ in cp -pdvn $lib $out/lib cp -pvn $(readlink -f $lib) $out/lib done + ${optionalString luks.yubikeySupport '' + cp -pdv ${pkgs.utillinux}/bin/uuidgen $out/bin + for lib in $(ldd $out/bin/uuidgen |grep '=>' |grep /nix/store/ |cut -d' ' -f3); do + cp -pdvn $lib $out/lib + cp -pvn $(readlink -f $lib) $out/lib + done + + cp -pdv ${pkgs.ykpers}/bin/ykchalresp $out/bin + for lib in $(ldd $out/bin/ykchalresp |grep '=>' |grep /nix/store/ |cut -d' ' -f3); do + cp -pdvn $lib $out/lib + cp -pvn $(readlink -f $lib) $out/lib + done + ''} ''; boot.initrd.extraUtilsCommandsTest = '' $out/bin/cryptsetup --version + ${optionalString luks.yubikeySupport '' + $out/bin/uuidgen --version + $out/bin/ykchalresp -V + ''} ''; boot.initrd.preLVMCommands = concatMapStrings openCommand preLVM; From c17e6d696882c3e639ec9cf9e25a9abc48317088 Mon Sep 17 00:00:00 2001 From: Thomas Bereknyei Date: Sat, 25 Jan 2014 13:46:48 -0500 Subject: [PATCH 006/128] Add #include for sleep and usleep --- pkgs/os-specific/linux/alienfx/default.nix | 3 ++- pkgs/os-specific/linux/alienfx/unistd.patch | 12 ++++++++++++ 2 files changed, 14 insertions(+), 1 deletion(-) create mode 100644 pkgs/os-specific/linux/alienfx/unistd.patch diff --git a/pkgs/os-specific/linux/alienfx/default.nix b/pkgs/os-specific/linux/alienfx/default.nix index 9924779d92ab..93d77819e57a 100644 --- a/pkgs/os-specific/linux/alienfx/default.nix +++ b/pkgs/os-specific/linux/alienfx/default.nix @@ -14,11 +14,12 @@ stdenv.mkDerivation { sha256 = "47501a3b4e08d39edee4cd829ae24259a7e740b9798db76b846fa872989f8fb1"; }; - patchPhase = '' + prePatch = '' substituteInPlace Makefile --replace /usr/ $out/ substituteInPlace Makefile --replace "install -o root -g root" "install" ''; + patches = [./unistd.patch]; buildInputs = [ libusb1 ]; makeFlags = "build"; preInstall = '' diff --git a/pkgs/os-specific/linux/alienfx/unistd.patch b/pkgs/os-specific/linux/alienfx/unistd.patch new file mode 100644 index 000000000000..546a27892f0d --- /dev/null +++ b/pkgs/os-specific/linux/alienfx/unistd.patch @@ -0,0 +1,12 @@ +diff --git a/alienfx.cpp b/alienfx.cpp +index 5981039..aea8992 100644 +--- a/alienfx.cpp ++++ b/alienfx.cpp +@@ -13,6 +13,7 @@ + #include + #include + #include ++#include + + using namespace std; + From bcd9f04226f779ff20bdf62de03c9943f9dfe559 Mon Sep 17 00:00:00 2001 From: Thomas Tuegel Date: Fri, 27 Dec 2013 14:14:42 -0600 Subject: [PATCH 007/128] add arpack-3.1.4 --- .../libraries/science/math/arpack/default.nix | 24 +++++++++++++++++++ pkgs/top-level/all-packages.nix | 2 ++ 2 files changed, 26 insertions(+) create mode 100644 pkgs/development/libraries/science/math/arpack/default.nix diff --git a/pkgs/development/libraries/science/math/arpack/default.nix b/pkgs/development/libraries/science/math/arpack/default.nix new file mode 100644 index 000000000000..48bbd3aa7853 --- /dev/null +++ b/pkgs/development/libraries/science/math/arpack/default.nix @@ -0,0 +1,24 @@ +{ stdenv, fetchurl, gfortran, openblas }: + +let version = "3.1.4"; +in +stdenv.mkDerivation { + name = "arpack-${version}"; + src = fetchurl { + url = "http://forge.scilab.org/index.php/p/arpack-ng/downloads/get/arpack-ng_${version}.tar.gz"; + sha256 = "0m4cqy3d7fpzx1nac3brhr298qj7vx3fchjdz5b7n0pp616cmcm1"; + }; + + buildInputs = [ gfortran ]; + propagatedBuildInputs = [ openblas ]; + + # Auto-detection fails because gfortran brings in BLAS by default + configureFlags="--with-blas=-lopenblas --with-lapack=-lopenblas"; + + meta = { + homepage = "http://forge.scilab.org/index.php/p/arpack-ng/"; + description = "A collection of Fortran77 subroutines to solve large scale eigenvalue problems"; + platforms = stdenv.lib.platforms.all; + license = stdenv.lib.licenses.bsd3; + }; +} diff --git a/pkgs/top-level/all-packages.nix b/pkgs/top-level/all-packages.nix index e61452e1f545..987c33efe0e8 100644 --- a/pkgs/top-level/all-packages.nix +++ b/pkgs/top-level/all-packages.nix @@ -9730,6 +9730,8 @@ let ### SCIENCE/MATH + arpack = callPackage ../development/libraries/science/math/arpack { }; + atlas = callPackage ../development/libraries/science/math/atlas { # The build process measures CPU capabilities and optimizes the # library to perform best on that particular machine. That is a From 407a77016162958c743bbf354465e0396c32ecc0 Mon Sep 17 00:00:00 2001 From: Moritz Maxeiner Date: Tue, 28 Jan 2014 04:02:51 +0100 Subject: [PATCH 008/128] Rewrite as a pre-boot authentication module (mostly) comforming to the design specification of 'YubiKey Integration for Full Disk Encryption Pre-Boot Authentication (Copyright) Yubico, 2011 Version: 1.1'. Used binaries: * uuidgen - for generation of random sequence numbers * ykchalresp - for challenging a Yubikey * ykinfo - to check if a Yubikey is plugged in at boot (fallback to passphrase authentication otherwise) * openssl - for calculation of SHA-1, HMAC-SHA-1, as well as AES-256-CTR (de/en)cryption Main differences to the specification mentioned above: * No user management (yet), only one password+yubikey per LUKS device * SHA-512 instead of CRC-16 for checksum Main differences to the previous implementation: * Instead of changing the key slot of the LUKS device each boot, the actual key for the LUKS device will be encrypted itself * Since the response for the new challenge is now calculated locally with openssl, the MITM-USB-attack with which previously an attacker could obtain the new response (that was used as the new encryption key for the LUKS device) by listening to the Yubikey has ideally become useless (as long as uuidgen can successfuly generate new random sequence numbers). Remarks: * This is not downwards compatible to the previous implementation --- nixos/modules/system/boot/luksroot.nix | 272 ++++++++++++++----------- 1 file changed, 148 insertions(+), 124 deletions(-) diff --git a/nixos/modules/system/boot/luksroot.nix b/nixos/modules/system/boot/luksroot.nix index ca4a8c480f80..52c91a0e20ce 100644 --- a/nixos/modules/system/boot/luksroot.nix +++ b/nixos/modules/system/boot/luksroot.nix @@ -31,140 +31,148 @@ let fi ''} - ${optionalString (luks.yubikeySupport && (yubikey != null)) '' - mkdir -p ${yubikey.challenge.mountPoint} - mount -t ${yubikey.challenge.fsType} ${toString yubikey.challenge.device} ${yubikey.challenge.mountPoint} - response="$(ykchalresp -${toString yubikey.yubikeySlot} "`cat ${yubikey.challenge.mountPoint}${yubikey.challenge.file}`" 2>/dev/null || true)" - if [ -z "$response" ]; then - echo -n "waiting 10 seconds for yubikey to appear..." - for try in $(seq 10); do - sleep 1 - response="$(ykchalresp -${toString yubikey.yubikeySlot} "`cat ${yubikey.challenge.mountPoint}${yubikey.challenge.file}`" 2>/dev/null || true)" - if [ ! -z "$response" ]; then break; fi - echo -n . - done - echo "ok" - fi - - ${optionalString yubikey.twoFactor '' - if [ ! -z "$response" ]; then - echo -n "Enter two-factor passphrase: " - read -s passphrase - current_key="$passphrase$response" - fi - ''} - - ${optionalString (!yubikey.twoFactor) '' - if [ ! -z "$response" ]; then - current_key="$response" - fi - ''} - ''} - - # open luksRoot and scan for logical volumes - ${optionalString ((!luks.yubikeySupport) || (yubikey == null)) '' - cryptsetup luksOpen ${device} ${name} ${optionalString allowDiscards "--allow-discards"} \ - ${optionalString (keyFile != null) "--key-file=${keyFile} ${optionalString (keyFileSize != null) "--keyfile-size=${toString keyFileSize}"}"} - ''} - - ${optionalString (luks.yubikeySupport && (yubikey != null)) '' - if [ -z "$response" ]; then + open_normally() { cryptsetup luksOpen ${device} ${name} ${optionalString allowDiscards "--allow-discards"} \ ${optionalString (keyFile != null) "--key-file=${keyFile} ${optionalString (keyFileSize != null) "--keyfile-size=${toString keyFileSize}"}"} - else - echo $current_key | cryptsetup luksOpen ${device} ${name} ${optionalString allowDiscards "--allow-discards"} --key-file=- + } - if [ $? != "0" ]; then - for try in $(seq 3); do + ${optionalString (luks.yubikeySupport && (yubikey != null)) '' - ${optionalString (!yubikey.twoFactor) '' - sleep 1 - ''} + rbtohex() { + od -An -vtx1 | tr -d ' \n' + } - ${optionalString yubikey.twoFactor '' - echo -n "Enter two-factor passphrase: " - read -s passphrase - current_key="$passphrase$response" - ''} + hextorb() { + tr '[:lower:]' '[:upper:]' | sed -e 's|\([0-9A-F]\{2\}\)|\\\\\\x\1|gI' | xargs printf + } - echo $current_key | cryptsetup luksOpen ${device} ${name} ${optionalString allowDiscards "--allow-discards"} --key-file=- - if [ $? == "0" ]; then break; fi - echo -n . - done + take() { + local c="$1" + shift + head -c $c "$@" + } + + drop() { + local c=$1 + shift + if [ -e "$1" ]; then + cat "$1" | ( dd of=/dev/null bs="$c" count=1 2>/dev/null ; dd 2>/dev/null ) + else + ( dd of=/dev/null bs="$c" count=1 2>/dev/null ; dd 2>/dev/null ) + fi + } + + open_yubikey() { + + mkdir -p ${yubikey.storage.mountPoint} + mount -t ${yubikey.storage.fsType} ${toString yubikey.storage.device} ${yubikey.storage.mountPoint} + + local uuid_r + uuid_r="$(take 16 ${yubikey.storage.mountPoint}${yubikey.storage.path} | rbtohex)" + + local uuid_luks + uuid_luks="$(cryptsetup luksUUID ${device} | take 36 | tr -d '-')" + + local k_user + local challenge + local k_blob + local aes_blob_decrypted + local checksum_correct + local checksum + + for try in $(seq 3); do + + ${optionalString yubikey.twoFactor '' + echo -n "Enter two-factor passphrase: " + read -s k_user + ''} + + challenge="$(echo -n $k_user$uuid_r$uuid_luks | openssl-wrap dgst -binary -sha1 | rbtohex)" + + k_blob="$(ykchalresp -${toString yubikey.slot} -x $challenge 2>/dev/null)" + + aes_blob_decrypted="$(drop 16 ${yubikey.storage.mountPoint}${yubikey.storage.path} | openssl-wrap enc -d -aes-256-ctr -K $k_blob -iv $uuid_r | rbtohex)" + + checksum="$(echo -n $aes_blob_decrypted | hextorb | drop 84 | rbtohex)" + if [ "$(echo -n $aes_blob_decrypted | hextorb | take 84 | openssl-wrap dgst -binary -sha512 | rbtohex)" == "$checksum" ]; then + checksum_correct=1 + break + else + checksum_correct=0 + echo "Authentication failed!" + fi + done + + if [ "$checksum_correct" != "1" ]; then + umount ${yubikey.storage.mountPoint} + echo "Maximum authentication errors reached" + exit 1 fi - mkdir -p ${yubikey.ramfsMountPoint} - # A ramfs is used here to ensure that the file used to update - # the key slot with cryptsetup will never get swapped out. - # Warning: Do NOT replace with tmpfs! - mount -t ramfs none ${yubikey.ramfsMountPoint} + local k_yubi + k_yubi="$(echo -n $aes_blob_decrypted | hextorb | take 20 | rbtohex)" + + local k_luks + k_luks="$(echo -n $aes_blob_decrypted | hextorb | drop 20 | take 64 | rbtohex)" + + echo -n "$k_luks" | hextorb | cryptsetup luksOpen ${device} ${name} ${optionalString allowDiscards "--allow-discards"} --key-file=- update_failed=false - old_challenge=$(cat ${yubikey.challenge.mountPoint}${yubikey.challenge.file}) - new_challenge=$(uuidgen) + local new_uuid_r + new_uuid_r="$(uuidgen)" if [ $? != "0" ]; then for try in $(seq 10); do sleep 1 - new_challenge=$(uuidgen) + new_uuid_r="$(uuidgen)" if [ $? == "0" ]; then break; fi if [ $try -eq 10 ]; then update_failed=true; fi done fi if [ "$update_failed" == false ]; then - echo $new_challenge > ${yubikey.challenge.mountPoint}${yubikey.challenge.file} - response="$(ykchalresp -${toString yubikey.yubikeySlot} "`cat ${yubikey.challenge.mountPoint}${yubikey.challenge.file}`" 2>/dev/null || true)" - if [ -z "$response" ]; then - echo -n "waiting 10 seconds for yubikey to appear..." - for try in $(seq 10); do - sleep 1 - response="$(ykchalresp -${toString yubikey.yubikeySlot} "`cat ${yubikey.challenge.mountPoint}${yubikey.challenge.file}`" 2>/dev/null || true)" - if [ ! -z "$response" ]; then break; fi - echo -n . - done - echo "ok"; - fi + new_uuid_r="$(echo -n $new_uuid_r | take 36 | tr -d '-')" - if [ ! -z "$response" ]; then - ${optionalString yubikey.twoFactor '' - new_key="$passphrase$response" - ''} + local new_challenge + new_challenge="$(echo -n $k_user$new_uuid_r$uuid_luks | openssl-wrap dgst -binary -sha1 | rbtohex)" - ${optionalString (!yubikey.twoFactor) '' - new_key="$response" - ''} + local new_k_blob + new_k_blob="$(echo -n $new_challenge | hextorb | openssl-wrap dgst -binary -sha1 -mac HMAC -macopt hexkey:$k_yubi | rbtohex)" - echo $new_key > ${yubikey.ramfsMountPoint}/new_key - - echo $current_key | cryptsetup luksChangeKey ${device} --key-file=- --key-slot ${toString yubikey.luksKeySlot} ${yubikey.ramfsMountPoint}/new_key - if [ $? != "0" ]; then - for try in $(seq 10); do - sleep 1 - echo $current_key | cryptsetup luksChangeKey ${device} --key-file=- --key-slot ${toString yubikey.luksKeySlot} ${yubikey.ramfsMountPoint}/new_key - if [ $? == "0" ]; then break; fi - if [ $try -eq 10 ]; then update_failed=true; fi - done - - fi - - rm -f ${yubikey.ramfsMountPoint}/new_key - - if [ "$update_failed" == true ]; then - echo $old_challenge > ${yubikey.challenge.mountPoint}${yubikey.challenge.file} - echo "Warning: Could not update luks header with new key for ${device}, old challenge restored!" - fi - else - echo $old_challenge > ${yubikey.challenge.mountPoint}${yubikey.challenge.file} - echo "Warning: No yubikey present to challenge for ${device}, old challenge restored!" - fi + echo -n "$new_uuid_r" | hextorb > ${yubikey.storage.mountPoint}${yubikey.storage.path} + echo -n "$k_yubi$k_luks$checksum" | hextorb | openssl-wrap enc -e -aes-256-ctr -K "$new_k_blob" -iv "$new_uuid_r" >> ${yubikey.storage.mountPoint}${yubikey.storage.path} else - echo "Warning: New challenge could not be obtained for ${device}, old challenge persists!" + echo "Warning: Could not obtain new UUID, current challenge persists!" fi - umount ${yubikey.ramfsMountPoint} - umount ${yubikey.challenge.mountPoint} + umount ${yubikey.storage.mountPoint} + } + + ykinfo -v + yubikey_missing="$(ykinfo -v 1>/dev/null 2>&1)$?" + if [ "$yubikey_missing" != "0" ]; then + echo -n "waiting 10 seconds for yubikey to appear..." + for try in $(seq 10); do + sleep 1 + ykinfo -v + yubikey_missing="$(ykinfo -v 1>/dev/null 2>&1)$?" + if [ "$yubikey_missing" == "0" ]; then break; fi + echo -n . + done + echo "ok" fi + + if [ "$yubikey_missing" != "0" ]; then + echo "no yubikey found, falling back to non-yubikey open procedure" + open_normally + else + open_yubikey + fi + ''} + + # open luksRoot and scan for logical volumes + ${optionalString ((!luks.yubikeySupport) || (yubikey == null)) '' + open_normally ''} ''; @@ -283,19 +291,13 @@ in description = "TODO"; }; - yubikeySlot = mkOption { + slot = mkOption { default = 2; type = types.int; description = "TODO"; }; - luksKeySlot = mkOption { - default = 1; - type = types.int; - description = "TODO"; - }; - - challenge = mkOption { + storage = mkOption { type = types.optionSet; description = "TODO"; @@ -313,24 +315,18 @@ in }; mountPoint = mkOption { - default = "/crypt-challenge"; + default = "/crypt-storage"; type = types.string; description = "TODO"; }; - file = mkOption { - default = "/crypt-challenge"; + path = mkOption { + default = "/crypt-storage/default"; type = types.string; description = "TODO"; }; }; }; - - ramfsMountPoint = mkOption { - default = "/crypt-update"; - type = types.string; - description = "TODO"; - }; }; }; @@ -361,6 +357,7 @@ in cp -pdvn $lib $out/lib cp -pvn $(readlink -f $lib) $out/lib done + ${optionalString luks.yubikeySupport '' cp -pdv ${pkgs.utillinux}/bin/uuidgen $out/bin for lib in $(ldd $out/bin/uuidgen |grep '=>' |grep /nix/store/ |cut -d' ' -f3); do @@ -373,6 +370,26 @@ in cp -pdvn $lib $out/lib cp -pvn $(readlink -f $lib) $out/lib done + + cp -pdv ${pkgs.ykpers}/bin/ykinfo $out/bin + for lib in $(ldd $out/bin/ykinfo |grep '=>' |grep /nix/store/ |cut -d' ' -f3); do + cp -pdvn $lib $out/lib + cp -pvn $(readlink -f $lib) $out/lib + done + + cp -pdv ${pkgs.openssl}/bin/openssl $out/bin + for lib in $(ldd $out/bin/openssl |grep '=>' |grep /nix/store/ |cut -d' ' -f3); do + cp -pdvn $lib $out/lib + cp -pvn $(readlink -f $lib) $out/lib + done + + mkdir -p $out/etc/ssl + cp -pdv ${pkgs.openssl}/etc/ssl/openssl.cnf $out/etc/ssl + + cat > $out/bin/openssl-wrap < $out/bin/openssl-wrap < Date: Tue, 28 Jan 2014 18:11:00 +0100 Subject: [PATCH 009/128] Adopt more packages. --- pkgs/applications/audio/flac/default.nix | 5 +++-- pkgs/applications/audio/monkeys-audio/default.nix | 5 +++++ pkgs/applications/misc/pstree/default.nix | 1 + pkgs/applications/misc/redshift/default.nix | 1 + pkgs/applications/misc/rxvt_unicode/default.nix | 1 + pkgs/data/documentation/pthread-man-pages/default.nix | 1 + pkgs/development/libraries/openldap/default.nix | 1 + pkgs/development/libraries/openmpi/default.nix | 1 + pkgs/development/tools/analysis/lcov/default.nix | 6 +++--- pkgs/development/tools/analysis/spin/default.nix | 1 + pkgs/development/tools/misc/strace/default.nix | 1 + pkgs/os-specific/linux/acpi/default.nix | 4 +++- pkgs/os-specific/linux/fuse/default.nix | 4 +++- pkgs/tools/networking/iftop/default.nix | 1 + pkgs/tools/networking/tcpdump/default.nix | 1 + pkgs/tools/package-management/dpkg/default.nix | 5 +++-- pkgs/tools/package-management/rpm/default.nix | 1 + pkgs/tools/security/nmap/default.nix | 5 +++++ pkgs/tools/typesetting/pdfjam/default.nix | 4 ++++ pkgs/tools/typesetting/tex/texlive/beamer.nix | 1 + 20 files changed, 41 insertions(+), 9 deletions(-) diff --git a/pkgs/applications/audio/flac/default.nix b/pkgs/applications/audio/flac/default.nix index 0383a1ce0ad5..1c8dc56de61c 100644 --- a/pkgs/applications/audio/flac/default.nix +++ b/pkgs/applications/audio/flac/default.nix @@ -12,9 +12,10 @@ stdenv.mkDerivation rec { doCheck = true; # takes lots of time but will be run rarely (small build-time closure) - meta = { + meta = with stdenv.lib; { homepage = http://xiph.org/flac/; description = "Library and tools for encoding and decoding the FLAC lossless audio file format"; - platforms = stdenv.lib.platforms.all; + platforms = platforms.all; + maintainers = maintainers.mornfall; }; } diff --git a/pkgs/applications/audio/monkeys-audio/default.nix b/pkgs/applications/audio/monkeys-audio/default.nix index 48b0b52c5ea7..08aa7e017b21 100644 --- a/pkgs/applications/audio/monkeys-audio/default.nix +++ b/pkgs/applications/audio/monkeys-audio/default.nix @@ -11,4 +11,9 @@ stdenv.mkDerivation rec { url = "http://deb-multimedia.org/pool/main/m/${pname}/${pname}_${version}.orig.tar.gz"; sha256 = "0kjfwzfxfx7f958b2b1kf8yj655lp0ppmn0sh57gbkjvj8lml7nz"; }; + + meta = with stdenv.lib; { + platforms = platforms.linux; + maintainers = maintainers.mornfall; + }; } diff --git a/pkgs/applications/misc/pstree/default.nix b/pkgs/applications/misc/pstree/default.nix index 0d61d3d74cfb..d4ffe2a4afd7 100644 --- a/pkgs/applications/misc/pstree/default.nix +++ b/pkgs/applications/misc/pstree/default.nix @@ -16,5 +16,6 @@ stdenv.mkDerivation rec { meta = { description = "Show the set of running processes as a tree"; license = "GPL"; + maintainers = stdenv.lib.maintainers.mornfall; }; } diff --git a/pkgs/applications/misc/redshift/default.nix b/pkgs/applications/misc/redshift/default.nix index ae983aedc679..88d6e7a7cf94 100644 --- a/pkgs/applications/misc/redshift/default.nix +++ b/pkgs/applications/misc/redshift/default.nix @@ -40,5 +40,6 @@ stdenv.mkDerivation rec { license = "GPLv3+"; homepage = "http://jonls.dk/redshift"; platforms = platforms.linux; + maintainers = maintainers.mornfall; }; } diff --git a/pkgs/applications/misc/rxvt_unicode/default.nix b/pkgs/applications/misc/rxvt_unicode/default.nix index 640ace40277d..e5d0ae95f996 100644 --- a/pkgs/applications/misc/rxvt_unicode/default.nix +++ b/pkgs/applications/misc/rxvt_unicode/default.nix @@ -41,5 +41,6 @@ stdenv.mkDerivation (rec { meta = { description = "A clone of the well-known terminal emulator rxvt"; homepage = "http://software.schmorp.de/pkg/rxvt-unicode.html"; + maintainers = stdenv.lib.maintainers.mornfall; }; }) diff --git a/pkgs/data/documentation/pthread-man-pages/default.nix b/pkgs/data/documentation/pthread-man-pages/default.nix index 296ba982b8a4..4cd5a5b8297b 100644 --- a/pkgs/data/documentation/pthread-man-pages/default.nix +++ b/pkgs/data/documentation/pthread-man-pages/default.nix @@ -43,5 +43,6 @@ in meta = { description = "POSIX threads (pthreads) manual pages from LinuxThreads"; homepage = http://www.gnu.org/software/libc/; + maintainers = stdenv.lib.maintainers.mornfall; }; } diff --git a/pkgs/development/libraries/openldap/default.nix b/pkgs/development/libraries/openldap/default.nix index 60b9c7738a0b..1273146c3429 100644 --- a/pkgs/development/libraries/openldap/default.nix +++ b/pkgs/development/libraries/openldap/default.nix @@ -20,5 +20,6 @@ stdenv.mkDerivation rec { meta = { homepage = "http://www.openldap.org/"; description = "An open source implementation of the Lightweight Directory Access Protocol"; + maintainers = stdenv.lib.maintainers.mornfall; }; } diff --git a/pkgs/development/libraries/openmpi/default.nix b/pkgs/development/libraries/openmpi/default.nix index 6e61b743a568..678a439fe0ac 100644 --- a/pkgs/development/libraries/openmpi/default.nix +++ b/pkgs/development/libraries/openmpi/default.nix @@ -11,6 +11,7 @@ stdenv.mkDerivation { homePage = http://www.open-mpi.org/; description = "Open source MPI-2 implementation"; longDescription = "The Open MPI Project is an open source MPI-2 implementation that is developed and maintained by a consortium of academic, research, and industry partners. Open MPI is therefore able to combine the expertise, technologies, and resources from all across the High Performance Computing community in order to build the best MPI library available. Open MPI offers advantages for system and software vendors, application developers and computer science researchers."; + maintainers = stdenv.lib.maintainers.mornfall; }; } diff --git a/pkgs/development/tools/analysis/lcov/default.nix b/pkgs/development/tools/analysis/lcov/default.nix index a8d376ef23c8..0a0974b886a1 100644 --- a/pkgs/development/tools/analysis/lcov/default.nix +++ b/pkgs/development/tools/analysis/lcov/default.nix @@ -25,7 +25,7 @@ stdenv.mkDerivation rec { done ''; - meta = { + meta = with stdenv.lib; { description = "LCOV, a code coverage tool that enhances GNU gcov"; longDescription = @@ -40,7 +40,7 @@ stdenv.mkDerivation rec { homepage = http://ltp.sourceforge.net/coverage/lcov.php; license = "GPLv2+"; - maintainers = [ ]; - platforms = stdenv.lib.platforms.all; + maintainers = [ maintainers.mornfall ]; + platforms = platforms.all; }; } diff --git a/pkgs/development/tools/analysis/spin/default.nix b/pkgs/development/tools/analysis/spin/default.nix index b4fdd4c09d4d..4be166f97682 100644 --- a/pkgs/development/tools/analysis/spin/default.nix +++ b/pkgs/development/tools/analysis/spin/default.nix @@ -26,5 +26,6 @@ stdenv.mkDerivation { description = "Formal verification tool for distributed software systems"; homepage = http://spinroot.com/; license = "free"; + maintainers = stdenv.lib.maintainers.mornfall; }; } diff --git a/pkgs/development/tools/misc/strace/default.nix b/pkgs/development/tools/misc/strace/default.nix index bdf3a7d05616..732423da5cd4 100644 --- a/pkgs/development/tools/misc/strace/default.nix +++ b/pkgs/development/tools/misc/strace/default.nix @@ -15,5 +15,6 @@ stdenv.mkDerivation rec { description = "A system call tracer for Linux"; license = licenses.bsd3; platforms = platforms.linux; + maintainers = maintainers.mornfall; }; } diff --git a/pkgs/os-specific/linux/acpi/default.nix b/pkgs/os-specific/linux/acpi/default.nix index 2a774949530d..a3400ee0823f 100644 --- a/pkgs/os-specific/linux/acpi/default.nix +++ b/pkgs/os-specific/linux/acpi/default.nix @@ -9,7 +9,7 @@ stdenv.mkDerivation rec { sha256 = "01ahldvf0gc29dmbd5zi4rrnrw2i1ajnf30sx2vyaski3jv099fp"; }; - meta = { + meta = with stdenv.lib; { description = "Show battery status and other ACPI information"; longDescription = '' Linux ACPI client is a small command-line @@ -19,5 +19,7 @@ stdenv.mkDerivation rec { ''; homepage = http://sourceforge.net/projects/acpiclient/; license = "GPLv2+"; + platforms = platforms.linux; + maintainers = maintainers.mornfall; }; } diff --git a/pkgs/os-specific/linux/fuse/default.nix b/pkgs/os-specific/linux/fuse/default.nix index 183d2d86d4c6..d6513f7ebb53 100644 --- a/pkgs/os-specific/linux/fuse/default.nix +++ b/pkgs/os-specific/linux/fuse/default.nix @@ -16,8 +16,10 @@ stdenv.mkDerivation rec { inherit utillinux; - meta = { + meta = with stdenv.lib; { homepage = http://fuse.sourceforge.net/; description = "Kernel module and library that allows filesystems to be implemented in user space"; + platforms = platforms.linux; + maintainers = maintainers.mornfall; }; } diff --git a/pkgs/tools/networking/iftop/default.nix b/pkgs/tools/networking/iftop/default.nix index a1f5026fb28b..c40764866eb5 100644 --- a/pkgs/tools/networking/iftop/default.nix +++ b/pkgs/tools/networking/iftop/default.nix @@ -28,5 +28,6 @@ stdenv.mkDerivation rec { license = licenses.gpl2Plus; homepage = http://ex-parrot.com/pdw/iftop/; platforms = platforms.linux; + maintainers = maintainers.mornfall; }; } diff --git a/pkgs/tools/networking/tcpdump/default.nix b/pkgs/tools/networking/tcpdump/default.nix index acea2d6da6a9..2e27c2b2dc33 100644 --- a/pkgs/tools/networking/tcpdump/default.nix +++ b/pkgs/tools/networking/tcpdump/default.nix @@ -20,5 +20,6 @@ stdenv.mkDerivation rec { description = "tcpdump, a famous network sniffer"; homepage = http://www.tcpdump.org/; license = "BSD-style"; + maintainers = stdenv.lib.maintainers.mornfall; }; } diff --git a/pkgs/tools/package-management/dpkg/default.nix b/pkgs/tools/package-management/dpkg/default.nix index e801bcfb2c29..01dea9c35e31 100644 --- a/pkgs/tools/package-management/dpkg/default.nix +++ b/pkgs/tools/package-management/dpkg/default.nix @@ -39,9 +39,10 @@ stdenv.mkDerivation { done # */ ''; - meta = { + meta = with stdenv.lib; { description = "The Debian package manager"; homepage = http://wiki.debian.org/Teams/Dpkg; - platforms = stdenv.lib.platforms.linux; + platforms = platforms.linux; + maintainers = maintainers.mornfall; }; } diff --git a/pkgs/tools/package-management/rpm/default.nix b/pkgs/tools/package-management/rpm/default.nix index b35d3b66ad83..73b0ca58828b 100644 --- a/pkgs/tools/package-management/rpm/default.nix +++ b/pkgs/tools/package-management/rpm/default.nix @@ -22,5 +22,6 @@ stdenv.mkDerivation rec { homepage = http://www.rpm.org/; license = "GPLv2"; description = "The RPM Package Manager"; + maintainers = stdenv.lib.maintainers.mornfall; }; } diff --git a/pkgs/tools/security/nmap/default.nix b/pkgs/tools/security/nmap/default.nix index 73b6f660bf94..1b2e940540d4 100644 --- a/pkgs/tools/security/nmap/default.nix +++ b/pkgs/tools/security/nmap/default.nix @@ -20,4 +20,9 @@ stdenv.mkDerivation rec { buildInputs = [ libpcap libX11 gtk pkgconfig openssl python pygtk makeWrapper pysqlite ]; + + meta = with stdenv.lib; { + platforms = platforms.linux; + maintainers = maintainers.mornfall; + }; } diff --git a/pkgs/tools/typesetting/pdfjam/default.nix b/pkgs/tools/typesetting/pdfjam/default.nix index e9b46eaa985b..426cef3c85d1 100644 --- a/pkgs/tools/typesetting/pdfjam/default.nix +++ b/pkgs/tools/typesetting/pdfjam/default.nix @@ -5,4 +5,8 @@ url = http://www.warwick.ac.uk/go/pdfjam/pdfjam_1.20.tgz; sha256 = "05g3mx7mb6h15ivbv0f53r369xphy8ad8a2xblpnk9mrnlrkaxy9"; }; + meta = with stdenv.lib; { + platforms = platforms.linux; + maintainers = maintainers.mornfall; + }; } diff --git a/pkgs/tools/typesetting/tex/texlive/beamer.nix b/pkgs/tools/typesetting/tex/texlive/beamer.nix index 4cb03e7d2c54..8b06cbb5a2bd 100644 --- a/pkgs/tools/typesetting/tex/texlive/beamer.nix +++ b/pkgs/tools/typesetting/tex/texlive/beamer.nix @@ -20,5 +20,6 @@ rec { meta = { description = "Extra components for TeXLive: beamer class"; + maintainers = stdenv.lib.maintainers.mornfall; }; } From 1f42b026247b657be72ee1867e9d2df84c588e8f Mon Sep 17 00:00:00 2001 From: Sander van der Burg Date: Tue, 28 Jan 2014 19:09:08 +0100 Subject: [PATCH 010/128] androidenv: also allow references to individual apk files --- pkgs/development/mobile/androidenv/emulate-app.nix | 10 +++++++++- 1 file changed, 9 insertions(+), 1 deletion(-) diff --git a/pkgs/development/mobile/androidenv/emulate-app.nix b/pkgs/development/mobile/androidenv/emulate-app.nix index 9c843fa8c373..536878681028 100644 --- a/pkgs/development/mobile/androidenv/emulate-app.nix +++ b/pkgs/development/mobile/androidenv/emulate-app.nix @@ -95,7 +95,15 @@ stdenv.mkDerivation { ${stdenv.lib.optionalString (app != null) '' # Install the App through the debugger - ${androidsdkComposition}/libexec/android-sdk-*/platform-tools/adb -s emulator-$port install ${app}/*.apk + + if [ -d "${app}" ] + then + appPath="$(echo ${app}/*.apk)" + else + appPath="${app}" + fi + + ${androidsdkComposition}/libexec/android-sdk-*/platform-tools/adb -s emulator-$port install "$appPath" # Start the application ${androidsdkComposition}/libexec/android-sdk-*/platform-tools/adb -s emulator-$port shell am start -a android.intent.action.MAIN -n ${package}/.${activity} From 45b1ffb8dba869b48b51daf72db5f73c960dd8f3 Mon Sep 17 00:00:00 2001 From: Moritz Maxeiner Date: Tue, 28 Jan 2014 20:39:25 +0100 Subject: [PATCH 011/128] Cosmetic change to yubikey detection --- nixos/modules/system/boot/luksroot.nix | 18 +++++++++++------- 1 file changed, 11 insertions(+), 7 deletions(-) diff --git a/nixos/modules/system/boot/luksroot.nix b/nixos/modules/system/boot/luksroot.nix index 52c91a0e20ce..46cd96e01674 100644 --- a/nixos/modules/system/boot/luksroot.nix +++ b/nixos/modules/system/boot/luksroot.nix @@ -148,21 +148,25 @@ let umount ${yubikey.storage.mountPoint} } - ykinfo -v - yubikey_missing="$(ykinfo -v 1>/dev/null 2>&1)$?" - if [ "$yubikey_missing" != "0" ]; then + yubikey_missing=true + ykinfo -v 1>/dev/null 2>&1 + if [ $? != "0" ]; then echo -n "waiting 10 seconds for yubikey to appear..." for try in $(seq 10); do sleep 1 - ykinfo -v - yubikey_missing="$(ykinfo -v 1>/dev/null 2>&1)$?" - if [ "$yubikey_missing" == "0" ]; then break; fi + ykinfo -v 1>/dev/null 2>&1 + if [ $? == "0" ]; then + yubikey_missing=false + break + fi echo -n . done echo "ok" + else + yubikey_missing=false fi - if [ "$yubikey_missing" != "0" ]; then + if [ "$yubikey_missing" == true ]; then echo "no yubikey found, falling back to non-yubikey open procedure" open_normally else From 5383e07e40d05ce0fb82e7dacfb81f2d83a78315 Mon Sep 17 00:00:00 2001 From: Petr Rockai Date: Tue, 28 Jan 2014 21:44:42 +0100 Subject: [PATCH 012/128] lua5: Add the lua-sockets extension. --- pkgs/development/interpreters/lua-5/5.1.nix | 1 + .../interpreters/lua-5/sockets.nix | 25 +++++++++++++++++++ pkgs/top-level/all-packages.nix | 2 ++ 3 files changed, 28 insertions(+) create mode 100644 pkgs/development/interpreters/lua-5/sockets.nix diff --git a/pkgs/development/interpreters/lua-5/5.1.nix b/pkgs/development/interpreters/lua-5/5.1.nix index 2923a8f960d1..27b1589d27fa 100644 --- a/pkgs/development/interpreters/lua-5/5.1.nix +++ b/pkgs/development/interpreters/lua-5/5.1.nix @@ -9,6 +9,7 @@ let in stdenv.mkDerivation rec { name = "lua-5.1.5"; + luaversion = "5.1"; src = fetchurl { url = "http://www.lua.org/ftp/${name}.tar.gz"; diff --git a/pkgs/development/interpreters/lua-5/sockets.nix b/pkgs/development/interpreters/lua-5/sockets.nix new file mode 100644 index 000000000000..a3f9adb09017 --- /dev/null +++ b/pkgs/development/interpreters/lua-5/sockets.nix @@ -0,0 +1,25 @@ +{stdenv, fetchurl, lua5}: + +stdenv.mkDerivation rec { + name = "lua-sockets-${version}"; + version = "2.0.2"; + src = fetchurl { + url = "http://files.luaforge.net/releases/luasocket/luasocket/luasocket-${version}/luasocket-${version}.tar.gz"; + sha256 = "19ichkbc4rxv00ggz8gyf29jibvc2wq9pqjik0ll326rrxswgnag"; + }; + + luaver = "5.1"; # TODO + patchPhase = '' + sed -e "s,^INSTALL_TOP_SHARE.*,INSTALL_TOP_SHARE=$out/share/lua/${lua5.luaversion}," \ + -e "s,^INSTALL_TOP_LIB.*,INSTALL_TOP_LIB=$out/lib/lua/${lua5.luaversion}," \ + -i config + ''; + + buildInputs = [ lua5 ]; + + meta = { + homepage = "http://w3.impa.br/~diego/software/luasocket/"; + platforms = stdenv.lib.platforms.linux; + maintainers = [ stdenv.lib.maintainers.mornfall ]; + }; +} diff --git a/pkgs/top-level/all-packages.nix b/pkgs/top-level/all-packages.nix index dbaddaca1956..1847540f8230 100644 --- a/pkgs/top-level/all-packages.nix +++ b/pkgs/top-level/all-packages.nix @@ -3126,6 +3126,8 @@ let }; lua5 = lua5_1; + lua5_sockets = callPackage ../development/interpreters/lua-5/sockets.nix {}; + luarocks = callPackage ../development/tools/misc/luarocks { lua = lua5; }; From 5878ffa55b31317e8284cad8d5bae0f240d406bd Mon Sep 17 00:00:00 2001 From: Petr Rockai Date: Tue, 28 Jan 2014 21:45:52 +0100 Subject: [PATCH 013/128] quvi: Update to current upstream (0.9.4). --- pkgs/applications/video/quvi/library.nix | 10 +++++----- pkgs/applications/video/quvi/scripts.nix | 6 +++--- pkgs/applications/video/quvi/tool.nix | 17 ++++++++++------- 3 files changed, 18 insertions(+), 15 deletions(-) diff --git a/pkgs/applications/video/quvi/library.nix b/pkgs/applications/video/quvi/library.nix index 49207ad06615..0fdd78fe1068 100644 --- a/pkgs/applications/video/quvi/library.nix +++ b/pkgs/applications/video/quvi/library.nix @@ -1,15 +1,15 @@ -{stdenv, fetchurl, pkgconfig, lua5, curl, quvi_scripts}: +{stdenv, fetchurl, pkgconfig, lua5, curl, quvi_scripts, libproxy, libgcrypt}: stdenv.mkDerivation rec { name = "libquvi-${version}"; - version="0.4.0"; + version="0.9.4"; src = fetchurl { - url = "mirror://sourceforge/quvi/libquvi-${version}.tar.gz"; - sha256 = "15cm9j8dssn2zhplqvlw49piwfw511lia6b635byiwfniqf6dnwp"; + url = "mirror://sourceforge/quvi/libquvi-${version}.tar.xz"; + sha256 = "1cl1kbgxl1jnx2nwx4z90l0lap09lnnj1fg7hxsxk3m6aj4y4grd"; }; - buildInputs = [ pkgconfig lua5 curl quvi_scripts ]; + buildInputs = [ pkgconfig lua5 curl quvi_scripts libproxy libgcrypt ]; meta = { description = "Web video downloader"; diff --git a/pkgs/applications/video/quvi/scripts.nix b/pkgs/applications/video/quvi/scripts.nix index cc82158ae829..68b61fc453de 100644 --- a/pkgs/applications/video/quvi/scripts.nix +++ b/pkgs/applications/video/quvi/scripts.nix @@ -2,11 +2,11 @@ stdenv.mkDerivation rec { name = "quvi-scripts-${version}"; - version="0.4.0"; + version="0.9.20131130"; src = fetchurl { - url = "mirror://sourceforge/quvi/libquvi-scripts-${version}.tar.gz"; - sha256 = "14p1sn7id4n35isaw3i3h8vsgfqlym09fih9k5xfqwsg6n7xdvq5"; + url = "mirror://sourceforge/quvi/libquvi-scripts-${version}.tar.xz"; + sha256 = "1qvp6z5k1qgcys7vf7jd6fm0g07xixmciwj14ypn1kqhmjgizwhp"; }; buildInputs = [ pkgconfig ]; diff --git a/pkgs/applications/video/quvi/tool.nix b/pkgs/applications/video/quvi/tool.nix index f8b6aad43106..89e24cff4de9 100644 --- a/pkgs/applications/video/quvi/tool.nix +++ b/pkgs/applications/video/quvi/tool.nix @@ -1,22 +1,25 @@ -{stdenv, fetchurl, pkgconfig, lua5, curl, quvi_scripts, libquvi}: +{stdenv, fetchurl, pkgconfig, lua5, curl, quvi_scripts, libquvi, lua5_sockets, glib, makeWrapper}: stdenv.mkDerivation rec { name = "quvi-${version}"; - version="0.4.0"; + version="0.9.4"; src = fetchurl { - url = "mirror://sourceforge/quvi/quvi-${version}.tar.gz"; - sha256 = "0qzyj55py4z7pg97794jjycq8nvrlr02072rgjzg8jgknw49hgfv"; + url = "mirror://sourceforge/quvi/quvi-${version}.tar.xz"; + sha256 = "047rrwnnp72624z2px5nzn5wxi5fyckkddh2pj8j5xs6kdim429m"; }; - buildInputs = [ pkgconfig lua5 curl quvi_scripts libquvi ]; + buildInputs = [ pkgconfig lua5 curl quvi_scripts libquvi glib makeWrapper ]; + postInstall = '' + wrapProgram $out/bin/quvi --set LUA_PATH "${lua5_sockets}/share/lua/${lua5.luaversion}/?.lua" + ''; - meta = { + meta = { description = "Web video downloader"; homepage = http://quvi.sf.net; license = "LGPLv2.1+"; platforms = stdenv.lib.platforms.linux; - maintainers = [ stdenv.lib.maintainers.mornfall ]; + maintainers = [ stdenv.lib.maintainers.mornfall ]; }; } From f88de3b0911bcd34bb4114c86e2adfc216b03ebb Mon Sep 17 00:00:00 2001 From: Petr Rockai Date: Tue, 28 Jan 2014 22:08:02 +0100 Subject: [PATCH 014/128] quvi: Update the CLI tool to version 0.9.5. --- pkgs/applications/video/quvi/tool.nix | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/pkgs/applications/video/quvi/tool.nix b/pkgs/applications/video/quvi/tool.nix index 89e24cff4de9..807e3954d6fe 100644 --- a/pkgs/applications/video/quvi/tool.nix +++ b/pkgs/applications/video/quvi/tool.nix @@ -2,11 +2,11 @@ stdenv.mkDerivation rec { name = "quvi-${version}"; - version="0.9.4"; + version="0.9.5"; src = fetchurl { url = "mirror://sourceforge/quvi/quvi-${version}.tar.xz"; - sha256 = "047rrwnnp72624z2px5nzn5wxi5fyckkddh2pj8j5xs6kdim429m"; + sha256 = "1h52s265rp3af16dvq1xlscp2926jqap2l4ah94vrfchv6m1hffb"; }; buildInputs = [ pkgconfig lua5 curl quvi_scripts libquvi glib makeWrapper ]; From 03857fe2ec54086243afd464d81e60e41632730f Mon Sep 17 00:00:00 2001 From: Arvin Moezzi Date: Wed, 29 Jan 2014 02:26:09 +0100 Subject: [PATCH 015/128] calibre: upgrade from 1.20.0 to 1.21.0 --- pkgs/applications/misc/calibre/default.nix | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/pkgs/applications/misc/calibre/default.nix b/pkgs/applications/misc/calibre/default.nix index 7925e865b4a0..686e327e2f7e 100644 --- a/pkgs/applications/misc/calibre/default.nix +++ b/pkgs/applications/misc/calibre/default.nix @@ -4,11 +4,11 @@ }: stdenv.mkDerivation rec { - name = "calibre-1.20.0"; + name = "calibre-1.21.0"; src = fetchurl { url = "mirror://sourceforge/calibre/${name}.tar.xz"; - sha256 = "1i7sybl6in0js8an1zp3mzqv394xnwx79rmv1hj7g6abpsqhjpj7"; + sha256 = "05hwny9zi32gkk3hadvigrqrnbgzw53vhjkjp60dq0lb545pscih"; }; inherit python; From de036bc10c03a20471d406d3f79c737b0ab25d0f Mon Sep 17 00:00:00 2001 From: Michael Raskin <7c6f434c@mail.ru> Date: Wed, 29 Jan 2014 09:27:21 +0400 Subject: [PATCH 016/128] Fix Xmoto build (missing include) --- pkgs/games/xmoto/default.nix | 6 +++++- 1 file changed, 5 insertions(+), 1 deletion(-) diff --git a/pkgs/games/xmoto/default.nix b/pkgs/games/xmoto/default.nix index ed37227bb039..5695bb5b4294 100644 --- a/pkgs/games/xmoto/default.nix +++ b/pkgs/games/xmoto/default.nix @@ -15,7 +15,11 @@ rec { configureFlags = []; /* doConfigure should be removed if not needed */ - phaseNames = [ "doConfigure" "doMakeInstall"]; + phaseNames = [ "patchIncludes" "doConfigure" "doMakeInstall"]; + patchIncludes = a.fullDepEntry '' + sed -e '1i#include ' -i src/helpers//System.cpp + sed -e '1i#include ' -i src/helpers//System.cpp + '' ["doUnpack" "minInit"]; meta = { description = "X-Moto - obstacled race game"; From 91ab5562363c2c28cb9127ce2982e2daa836253a Mon Sep 17 00:00:00 2001 From: Eelco Dolstra Date: Wed, 29 Jan 2014 11:53:39 +0100 Subject: [PATCH 017/128] amdadl-sdk: Don't build on Hydra Since it uses requireFile, it won't build. Likewise for cgminer which depends on amdadl-sdk. --- pkgs/applications/misc/cgminer/default.nix | 7 ++++--- pkgs/development/misc/amdadl-sdk/default.nix | 3 ++- 2 files changed, 6 insertions(+), 4 deletions(-) diff --git a/pkgs/applications/misc/cgminer/default.nix b/pkgs/applications/misc/cgminer/default.nix index 54650d395c2b..3247cb609fa6 100644 --- a/pkgs/applications/misc/cgminer/default.nix +++ b/pkgs/applications/misc/cgminer/default.nix @@ -1,5 +1,5 @@ -{ fetchgit, stdenv, pkgconfig, libtool, autoconf, automake, - curl, ncurses, amdappsdk, amdadlsdk, xorg, jansson }: +{ fetchgit, stdenv, pkgconfig, libtool, autoconf, automake +, curl, ncurses, amdappsdk, amdadlsdk, xorg, jansson }: stdenv.mkDerivation rec { version = "3.7.2"; @@ -42,6 +42,7 @@ stdenv.mkDerivation rec { homepage = "https://github.com/ckolivas/cgminer"; license = licenses.gpl3; maintainers = [ maintainers.offline ]; - platforms = [ "i686-linux" "x86_64-linux" ]; + platforms = stdenv.lib.platforms.linux; + hydraPlatforms = []; }; } diff --git a/pkgs/development/misc/amdadl-sdk/default.nix b/pkgs/development/misc/amdadl-sdk/default.nix index a77e477f5722..f131295bcba5 100644 --- a/pkgs/development/misc/amdadl-sdk/default.nix +++ b/pkgs/development/misc/amdadl-sdk/default.nix @@ -44,6 +44,7 @@ stdenv.mkDerivation rec { homepage = http://developer.amd.com/tools/graphics-development/display-library-adl-sdk/; license = licenses.amdadl; maintainers = [ maintainers.offline ]; - platforms = [ "i686-linux" "x86_64-linux" ]; + platforms = stdenv.lib.platforms.linux; + hydraPlatforms = []; }; } From 9c9c883cb921225272f82a6dd8b547a034f16bd1 Mon Sep 17 00:00:00 2001 From: Pascal Wittmann Date: Tue, 28 Jan 2014 22:50:16 +0100 Subject: [PATCH 018/128] Updated dwb to HEAD and used the current date as version number, because dwb has no version numbers. --- pkgs/applications/networking/browsers/dwb/default.nix | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/pkgs/applications/networking/browsers/dwb/default.nix b/pkgs/applications/networking/browsers/dwb/default.nix index 0421a8a6c6a8..e10acf294bf7 100644 --- a/pkgs/applications/networking/browsers/dwb/default.nix +++ b/pkgs/applications/networking/browsers/dwb/default.nix @@ -2,12 +2,12 @@ m4, glib_networking, gsettings_desktop_schemas }: stdenv.mkDerivation { - name = "dwb-0.1"; + name = "dwb-2014-01-29"; src = fetchgit { url = "https://bitbucket.org/portix/dwb.git"; - rev = "84a8621787baded72e84afdd5cdda278cb81e007"; - sha256 = "5a32f3c21ad59b43935a16108244f84d260fafaea9b93d41e8de9ba9089ee7b0"; + rev = "eaf090af9ad63341a846377cb9ce473feee8f032"; + sha256 = "1wqa5dry9p3x3y07zpq3km8ycr8wvz8c11754vf99pv1kzk8gq0n"; }; buildInputs = [ pkgconfig makeWrapper libsoup webkit gtk3 gnutls json_c m4 ]; From cce9712331e7470aa891dc66d0aa28255d582e97 Mon Sep 17 00:00:00 2001 From: Moritz Maxeiner Date: Tue, 28 Jan 2014 23:45:16 +0100 Subject: [PATCH 019/128] Enable two-factor authentication by default. Add proper descriptions to attributes. --- nixos/modules/system/boot/luksroot.nix | 35 ++++++++++++++++++-------- 1 file changed, 24 insertions(+), 11 deletions(-) diff --git a/nixos/modules/system/boot/luksroot.nix b/nixos/modules/system/boot/luksroot.nix index 46cd96e01674..ae684dd8977b 100644 --- a/nixos/modules/system/boot/luksroot.nix +++ b/nixos/modules/system/boot/luksroot.nix @@ -53,7 +53,7 @@ let } drop() { - local c=$1 + local c="$1" shift if [ -e "$1" ]; then cat "$1" | ( dd of=/dev/null bs="$c" count=1 2>/dev/null ; dd 2>/dev/null ) @@ -286,48 +286,57 @@ in yubikey = mkOption { default = null; type = types.nullOr types.optionSet; - description = "TODO"; + description = '' + The options to use for this LUKS device in Yubikey-PBA. + If null (the default), Yubikey-PBA will be disabled for this device. + ''; options = { twoFactor = mkOption { - default = false; + default = true; type = types.bool; - description = "TODO"; + description = "Whether to use a passphrase and a Yubikey (true), or only a Yubikey (false)"; }; slot = mkOption { default = 2; type = types.int; - description = "TODO"; + description = "Which slot on the Yubikey to challenge"; }; storage = mkOption { type = types.optionSet; - description = "TODO"; + description = "Options related to the authentication record"; options = { device = mkOption { default = /dev/sda1; type = types.path; - description = "TODO"; + description = '' + An unencrypted device that will temporarily be mounted in stage-1. + Must contain the authentication record for this LUKS device. + ''; }; fsType = mkOption { default = "vfat"; type = types.string; - description = "TODO"; + description = "The filesystem of the unencrypted device"; }; mountPoint = mkOption { default = "/crypt-storage"; type = types.string; - description = "TODO"; + description = "Path where the unencrypted device will be mounted in stage-1"; }; path = mkOption { default = "/crypt-storage/default"; type = types.string; - description = "TODO"; + description = '' + Absolute path of the authentication record on the unencrypted device with + that device's root directory as "/". + ''; }; }; }; @@ -340,7 +349,11 @@ in boot.initrd.luks.yubikeySupport = mkOption { default = false; type = types.bool; - description = "TODO"; + description = '' + Enables support for authenticating with a Yubikey on LUKS devices. + See the NixOS wiki for information on how to properly setup a LUKS device + and a Yubikey to work with this feature. + ''; }; }; From 1212d0be220393740766ca727689ebec9984cb0b Mon Sep 17 00:00:00 2001 From: aszlig Date: Mon, 6 Jan 2014 13:26:55 +0100 Subject: [PATCH 020/128] tkabber+plugins: Update to upstream version 1.0. After several years, Tkabber finally got a new release. The highlights are: * Completely rewritten Tkabber internals * Dropped Tcl/Tk 8.3 support. Now Tcl/Tk 8.4 is required * Partial IPv6 support (requires Tcl/Tk 8.6) * Switched from TclGPGME to TclGPG for encryption and signing * Added new connection method BOSH (XEP-0124 and XEP-0206) * Disabled SSLv2 and enabled TLSv1 TLS options * Added user nicknames (XEP-0172) support. * Updated the CAPTCHA forms (XEP-0158) support * Added metacontacts (XEP-0209) support * Implemented multiple proxy profiles * Implemented remote controlling from a locally executed script * Added new plugins: floatingcontact, poker * Rewritten most plugins to support disabling and unloading on the fly * A few interface enhancements (search in MUC affiliations lists, proxy management) * Many fixes and enhancements The detailed changelogs can be found at: http://svn.xmpp.ru/repos/tkabber/tags/1.0/tkabber/ChangeLog http://svn.xmpp.ru/repos/tkabber/tags/1.0/tkabber-plugins/ChangeLog Signed-off-by: aszlig --- .../instant-messengers/tkabber-plugins/default.nix | 6 +++--- .../networking/instant-messengers/tkabber/default.nix | 6 +++--- 2 files changed, 6 insertions(+), 6 deletions(-) diff --git a/pkgs/applications/networking/instant-messengers/tkabber-plugins/default.nix b/pkgs/applications/networking/instant-messengers/tkabber-plugins/default.nix index b46133e433e6..bb5d0b1c76bf 100644 --- a/pkgs/applications/networking/instant-messengers/tkabber-plugins/default.nix +++ b/pkgs/applications/networking/instant-messengers/tkabber-plugins/default.nix @@ -2,11 +2,11 @@ stdenv.mkDerivation rec { name = "tkabber-plugins-${version}"; - version = "0.11.1"; + version = "1.0"; src = fetchurl { - url = "http://files.jabber.ru/tkabber/tkabber-plugins-${version}.tar.gz"; - sha256 = "0jxriqvsckbih5a4lpisxy6wjw022wsz5j5n171gz0q3xw19dbgz"; + url = "http://files.jabber.ru/tkabber/tkabber-plugins-${version}.tar.xz"; + sha256 = "d61251dc664f0bfa8534e578096dede9a7bb7d4f2620489f8d2c43d36cd61ba9"; }; configurePhase = '' diff --git a/pkgs/applications/networking/instant-messengers/tkabber/default.nix b/pkgs/applications/networking/instant-messengers/tkabber/default.nix index fd989739c941..69c404f33b4c 100644 --- a/pkgs/applications/networking/instant-messengers/tkabber/default.nix +++ b/pkgs/applications/networking/instant-messengers/tkabber/default.nix @@ -10,11 +10,11 @@ let (map getTclLibPath tclLibraries); in stdenv.mkDerivation rec { - name = "tkabber-0.11.1"; + name = "tkabber-1.0"; src = fetchurl { - url = "http://files.jabber.ru/tkabber/tkabber-0.11.1.tar.gz"; - sha256 = "19xv555cm7a2gczdalf9srxm39hmsh0fbidhwxa74a89nqkbf4lv"; + url = "http://files.jabber.ru/tkabber/${name}.tar.xz"; + sha256 = "49ee6e897dfe52ebac256531b54955e6b39223f606a9b8ad63a52475389db206"; }; defaultTheme = "ocean-deep"; From aae2bab821a167ed53f020e53329c2073d1d2102 Mon Sep 17 00:00:00 2001 From: aszlig Date: Mon, 6 Jan 2014 13:33:52 +0100 Subject: [PATCH 021/128] tkabber: Don't set a default theme. If people still want the ocean-deep theme, it can still be set by using: tkabber.override { theme = "ocean-deep"; } But by default we should not set a theme, so the user will get the same result as everyone who installs the upstream version. Signed-off-by: aszlig --- .../networking/instant-messengers/tkabber/default.nix | 11 ++++++----- 1 file changed, 6 insertions(+), 5 deletions(-) diff --git a/pkgs/applications/networking/instant-messengers/tkabber/default.nix b/pkgs/applications/networking/instant-messengers/tkabber/default.nix index 69c404f33b4c..53a334f68693 100644 --- a/pkgs/applications/networking/instant-messengers/tkabber/default.nix +++ b/pkgs/applications/networking/instant-messengers/tkabber/default.nix @@ -1,5 +1,7 @@ { stdenv, fetchurl, tcl, tk, tcllib, tcltls, tclgpg -, bwidget, makeWrapper, x11 }: +, bwidget, makeWrapper, x11 +, theme ? null +}: let tclLibraries = [ bwidget tcllib tcltls tclgpg ]; @@ -17,15 +19,14 @@ in stdenv.mkDerivation rec { sha256 = "49ee6e897dfe52ebac256531b54955e6b39223f606a9b8ad63a52475389db206"; }; - defaultTheme = "ocean-deep"; - patchPhase = '' substituteInPlace login.tcl --replace \ "custom::defvar loginconf(sslcacertstore) \"\"" \ "custom::defvar loginconf(sslcacertstore) \$env(OPENSSL_X509_CERT_FILE)" - + '' + stdenv.lib.optionalString (theme != null) '' + themePath="$out/share/doc/tkabber/examples/xrdb/${theme}.xrdb" sed -i '/^if.*load_default_xrdb/,/^}$/ { - s@option readfile \(\[fullpath [^]]*\]\)@option readfile "'"$out/share/doc/tkabber/examples/xrdb/${defaultTheme}.xrdb"'"@ + s@option readfile \(\[fullpath [^]]*\]\)@option readfile "'"$themePath"'"@ }' tkabber.tcl ''; From 3a5334f853db5fb77466a93f6fc79dca6b4ed28b Mon Sep 17 00:00:00 2001 From: aszlig Date: Mon, 6 Jan 2014 14:15:58 +0100 Subject: [PATCH 022/128] tkabber: Properly wrap all scripts in $out/bin. Alongside "tkabber", there is also "tkabber-remote", which uses the same variables as the main script and thus needs to be wrapped the same way as well. Signed-off-by: aszlig --- .../networking/instant-messengers/tkabber/default.nix | 10 ++++++---- 1 file changed, 6 insertions(+), 4 deletions(-) diff --git a/pkgs/applications/networking/instant-messengers/tkabber/default.nix b/pkgs/applications/networking/instant-messengers/tkabber/default.nix index 53a334f68693..79c3d3d32ccd 100644 --- a/pkgs/applications/networking/instant-messengers/tkabber/default.nix +++ b/pkgs/applications/networking/instant-messengers/tkabber/default.nix @@ -36,10 +36,12 @@ in stdenv.mkDerivation rec { ''; postInstall = '' - wrapProgram $out/bin/tkabber \ - --prefix PATH : "${tk}/bin" \ - --set TCLLIBPATH '"${tclLibPaths}"' \ - --set TKABBER_SITE_PLUGINS '$HOME/.nix-profile/share/tkabber-plugins' + for prog in $out/bin/*; do + wrapProgram "$prog" \ + --prefix PATH : "${tk}/bin" \ + --set TCLLIBPATH '"${tclLibPaths}"' \ + --set TKABBER_SITE_PLUGINS '$HOME/.nix-profile/share/tkabber-plugins' + done ''; buildInputs = [ tcl tk x11 makeWrapper ] ++ tclLibraries; From e3cb9e5e5f343d13cbbdc87b6fd1abc1103156ae Mon Sep 17 00:00:00 2001 From: aszlig Date: Mon, 6 Jan 2014 14:36:53 +0100 Subject: [PATCH 023/128] tkabber: Merge main package with site plugins. The site plugins are released alongside the main Tkabber sources, so it makes no sense to have them in a separate package (which also introduces an impurity). In addition, both packages share the same makefile structure, so it really makes sense to merge them. Before people might get worried about my decision to enable those plugins by default: Since version 1.0, Tkabber is no longer loading _all_ available plugins, but gives you a menu (Plugins Management) to selectively enable plugins (whereas all plugins are disabled by default). Signed-off-by: aszlig --- .../tkabber-plugins/default.nix | 21 -------- .../instant-messengers/tkabber/default.nix | 50 +++++++++++++------ pkgs/top-level/all-packages.nix | 2 - 3 files changed, 34 insertions(+), 39 deletions(-) delete mode 100644 pkgs/applications/networking/instant-messengers/tkabber-plugins/default.nix diff --git a/pkgs/applications/networking/instant-messengers/tkabber-plugins/default.nix b/pkgs/applications/networking/instant-messengers/tkabber-plugins/default.nix deleted file mode 100644 index bb5d0b1c76bf..000000000000 --- a/pkgs/applications/networking/instant-messengers/tkabber-plugins/default.nix +++ /dev/null @@ -1,21 +0,0 @@ -{ stdenv, fetchurl }: - -stdenv.mkDerivation rec { - name = "tkabber-plugins-${version}"; - version = "1.0"; - - src = fetchurl { - url = "http://files.jabber.ru/tkabber/tkabber-plugins-${version}.tar.xz"; - sha256 = "d61251dc664f0bfa8534e578096dede9a7bb7d4f2620489f8d2c43d36cd61ba9"; - }; - - configurePhase = '' - sed -e "s@/usr/local@$out@" -i Makefile - ''; - - meta = { - homepage = "http://tkabber.jabber.ru/tkabber-plugins"; - description = "Plugins for the Tkabber instant messenger"; - license = stdenv.lib.licenses.gpl2; - }; -} diff --git a/pkgs/applications/networking/instant-messengers/tkabber/default.nix b/pkgs/applications/networking/instant-messengers/tkabber/default.nix index 79c3d3d32ccd..8b6b3893311e 100644 --- a/pkgs/applications/networking/instant-messengers/tkabber/default.nix +++ b/pkgs/applications/networking/instant-messengers/tkabber/default.nix @@ -1,9 +1,24 @@ { stdenv, fetchurl, tcl, tk, tcllib, tcltls, tclgpg , bwidget, makeWrapper, x11 +, withSitePlugins ? true , theme ? null }: +with stdenv.lib; + let + version = "1.0"; + + main = { + name = "tkabber"; + sha256 = "49ee6e897dfe52ebac256531b54955e6b39223f606a9b8ad63a52475389db206"; + }; + + plugins = { + name = "tkabber-plugins"; + sha256 = "d61251dc664f0bfa8534e578096dede9a7bb7d4f2620489f8d2c43d36cd61ba9"; + }; + tclLibraries = [ bwidget tcllib tcltls tclgpg ]; getTclLibPath = p: "${p}/lib/${p.libPrefix}"; @@ -11,36 +26,39 @@ let tclLibPaths = stdenv.lib.concatStringsSep " " (map getTclLibPath tclLibraries); -in stdenv.mkDerivation rec { - name = "tkabber-1.0"; + mkTkabber = attrs: stdenv.mkDerivation (rec { + name = "${attrs.name}-${version}"; - src = fetchurl { - url = "http://files.jabber.ru/tkabber/${name}.tar.xz"; - sha256 = "49ee6e897dfe52ebac256531b54955e6b39223f606a9b8ad63a52475389db206"; - }; + src = fetchurl { + url = "http://files.jabber.ru/tkabber/${name}.tar.xz"; + inherit (attrs) sha256; + }; - patchPhase = '' + prePatch = '' + sed -e "s@/usr/local@$out@" -i Makefile + ''; + } // removeAttrs attrs [ "name" "sha256" ]); + +in mkTkabber (main // { + postPatch = '' substituteInPlace login.tcl --replace \ "custom::defvar loginconf(sslcacertstore) \"\"" \ "custom::defvar loginconf(sslcacertstore) \$env(OPENSSL_X509_CERT_FILE)" - '' + stdenv.lib.optionalString (theme != null) '' + '' + optionalString (theme != null) '' themePath="$out/share/doc/tkabber/examples/xrdb/${theme}.xrdb" sed -i '/^if.*load_default_xrdb/,/^}$/ { s@option readfile \(\[fullpath [^]]*\]\)@option readfile "'"$themePath"'"@ }' tkabber.tcl ''; - configurePhase = '' - mkdir -p $out/bin - sed -e "s@/usr/local@$out@" -i Makefile - ''; - postInstall = '' for prog in $out/bin/*; do wrapProgram "$prog" \ --prefix PATH : "${tk}/bin" \ --set TCLLIBPATH '"${tclLibPaths}"' \ - --set TKABBER_SITE_PLUGINS '$HOME/.nix-profile/share/tkabber-plugins' + ${optionalString withSitePlugins '' + --set TKABBER_SITE_PLUGINS '${mkTkabber plugins}/share/tkabber-plugins' + ''} done ''; @@ -48,7 +66,7 @@ in stdenv.mkDerivation rec { meta = { homepage = "http://tkabber.jabber.ru/"; - description = "A GUI client for the XMPP (Jabber) instant messaging protocol"; + description = "A GUI XMPP (Jabber) client written in Tcl/Tk"; license = stdenv.lib.licenses.gpl2; }; -} +}) diff --git a/pkgs/top-level/all-packages.nix b/pkgs/top-level/all-packages.nix index 1847540f8230..e839833ee28c 100644 --- a/pkgs/top-level/all-packages.nix +++ b/pkgs/top-level/all-packages.nix @@ -2065,8 +2065,6 @@ let tkabber = callPackage ../applications/networking/instant-messengers/tkabber { }; - tkabber_plugins = callPackage ../applications/networking/instant-messengers/tkabber-plugins { }; - qfsm = callPackage ../applications/science/electronics/qfsm { }; tkgate = callPackage ../applications/science/electronics/tkgate/1.x.nix { From 795941261a88b7b6a89e549ed6e4ccff19381484 Mon Sep 17 00:00:00 2001 From: aszlig Date: Mon, 6 Jan 2014 15:30:44 +0100 Subject: [PATCH 024/128] nixos-generate-config: Fix reference to . IIUC, is going to be deprecated someday in the future, and as most of those references are already replaced I guess it's safe to replace it here as well, as it is only relevant on new/updated installations. Signed-off-by: aszlig --- nixos/modules/installer/tools/nixos-generate-config.pl | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/nixos/modules/installer/tools/nixos-generate-config.pl b/nixos/modules/installer/tools/nixos-generate-config.pl index 6b42058a8926..1365f3b93961 100644 --- a/nixos/modules/installer/tools/nixos-generate-config.pl +++ b/nixos/modules/installer/tools/nixos-generate-config.pl @@ -61,7 +61,7 @@ my @attrs = (); my @kernelModules = (); my @initrdKernelModules = (); my @modulePackages = (); -my @imports = (""); +my @imports = (""); sub debug { From a2a44f92ae18921c98d860a5bc9034423418d6fa Mon Sep 17 00:00:00 2001 From: aszlig Date: Wed, 29 Jan 2014 09:05:22 +0100 Subject: [PATCH 025/128] paramiko: Update to new upstream version 1.12.1. This release contains only minor fixes, which are: * Fix AttributeError bugs in known_hosts file (re)loading. * Note ecdsa requirement in README. Full changelog with credits and issue IDs can be found at: https://github.com/paramiko/paramiko/blob/master/NEWS Signed-off-by: aszlig --- pkgs/top-level/python-packages.nix | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/pkgs/top-level/python-packages.nix b/pkgs/top-level/python-packages.nix index 62c37e5d30bd..c9039ec09727 100644 --- a/pkgs/top-level/python-packages.nix +++ b/pkgs/top-level/python-packages.nix @@ -4296,11 +4296,11 @@ pythonPackages = modules // import ./python-packages-generated.nix { }; paramiko = buildPythonPackage rec { - name = "paramiko-1.12.0"; + name = "paramiko-1.12.1"; src = fetchurl { url = "http://pypi.python.org/packages/source/p/paramiko/${name}.tar.gz"; - md5 = "4187f77b1a5a313c899993930e30c321"; + md5 = "ae4544dc0a1419b141342af89fcf0dd9"; }; propagatedBuildInputs = [ pycrypto ecdsa ]; From e18cd2f8ae67088c24d0d9484ab5531598ca473c Mon Sep 17 00:00:00 2001 From: aszlig Date: Wed, 29 Jan 2014 09:21:07 +0100 Subject: [PATCH 026/128] chromium: Update all channels to latest versions. This closes #1623, and updates _all_ channels to the corresponding latest upstream versions. Thanks to @wizeman for opening the pull request noted above and for another update in between, @aristidb for fixing the patcheShebangs issue and @shlevy for notifying me about the build failure in stdenv-updates in the first place. Sorry to everyone for my inactivity lately. The following changes were needed in order to build those new releases: * Patch out /bin/echo to allow building with all options enabled. * Always use GN from the source tree. * Remove import of depot_tools for version 34. * Drop version 32 specific stuff. With this commit, the following new upstream versions are introduced: stable: 32.0.1700.77 -> 32.0.1700.102 (builds fine, tested) beta: 32.0.1700.19 -> 33.0.1750.46 (builds fine, tested) dev: 33.0.1712.4 -> 34.0.1809.0 (build broken with gnome_keyring) The dev version requires a more recent version gnome_keyring and thus won't build if gnomeKeyringSupport is set to true. I haven't tested this build without gnomeKeyringSupport yet, so it might be broken and will be fixed later. Signed-off-by: aszlig --- .../networking/browsers/chromium/default.nix | 13 ++++++++----- .../networking/browsers/chromium/sources.nix | 18 +++++++++--------- 2 files changed, 17 insertions(+), 14 deletions(-) diff --git a/pkgs/applications/networking/browsers/chromium/default.nix b/pkgs/applications/networking/browsers/chromium/default.nix index 908e54f3e433..eba32738e0b8 100644 --- a/pkgs/applications/networking/browsers/chromium/default.nix +++ b/pkgs/applications/networking/browsers/chromium/default.nix @@ -51,15 +51,18 @@ let patches = singleton ./sandbox_userns_31.patch; postPatch = '' - sed -i -r -e 's/-f(stack-protector)(-all)?/-fno-\1/' build/common.gypi - '' + (if versionOlder version "32.0.0.0" then '' - sed -i -e 's|/usr/bin/gcc|gcc|' third_party/WebKit/Source/core/core.gypi - '' else '' + sed -i -r \ + -e 's/-f(stack-protector)(-all)?/-fno-\1/' \ + -e 's|/bin/echo|echo|' \ + build/common.gypi + sed -i '/not RunGN/,+1d' build/gyp_chromium sed -i -e 's|/usr/bin/gcc|gcc|' \ third_party/WebKit/Source/build/scripts/scripts.gypi \ third_party/WebKit/Source/build/scripts/preprocessor.pm - '') + optionalString useOpenSSL '' + '' + optionalString useOpenSSL '' cat $opensslPatches | patch -p1 -d third_party/openssl/openssl + '' + optionalString (!versionOlder version "34.0.0.0") '' + sed -i '/import.*depot/d' build/gyp_chromium ''; outputs = [ "out" "sandbox" "bundled" "main" ]; diff --git a/pkgs/applications/networking/browsers/chromium/sources.nix b/pkgs/applications/networking/browsers/chromium/sources.nix index b7a30ef63f7d..6ad9d9090d5d 100644 --- a/pkgs/applications/networking/browsers/chromium/sources.nix +++ b/pkgs/applications/networking/browsers/chromium/sources.nix @@ -1,18 +1,18 @@ # This file is autogenerated from update.sh in the same directory. { dev = { - version = "33.0.1712.4"; - url = "http://commondatastorage.googleapis.com/chromium-browser-official/chromium-33.0.1712.4.tar.xz"; - sha256 = "1c1m0y3nnz2lclqi21j6hgqmb46p1hv7c22zz9fn7dax7jkimydk"; + version = "34.0.1809.0"; + url = "http://commondatastorage.googleapis.com/chromium-browser-official/chromium-34.0.1809.0.tar.xz"; + sha256 = "0hyqqqq2hzbzk325pk9bc70lsh0al2nqf1mlahybp5vigy5jzy88"; }; beta = { - version = "32.0.1700.19"; - url = "http://commondatastorage.googleapis.com/chromium-browser-official/chromium-32.0.1700.19.tar.xz"; - sha256 = "0d0kgy160pyg472ka43gxk7n09pqhhs9nd93jyxrp9qsyllfc425"; + version = "33.0.1750.46"; + url = "http://commondatastorage.googleapis.com/chromium-browser-official/chromium-33.0.1750.46.tar.xz"; + sha256 = "04n43c4vn8i7qhlybqb19c2c8kri8nc1wpa2l83vin4sqxkq519h"; }; stable = { - version = "32.0.1700.77"; - url = "http://commondatastorage.googleapis.com/chromium-browser-official/chromium-32.0.1700.77.tar.xz"; - sha256 = "1mwqa5k32d168swpw0bdcnhglxwcqdsx766fq0iz22h3hd4ccdwa"; + version = "32.0.1700.102"; + url = "http://commondatastorage.googleapis.com/chromium-browser-official/chromium-32.0.1700.102.tar.xz"; + sha256 = "0jxwhd7cd60ivisrnzcglqqnmy99np1vvjqa27y42d852xjx84ys"; }; } From 20cfaf0faaef3fe3115275aa64b26b634f0108f0 Mon Sep 17 00:00:00 2001 From: Moritz Maxeiner Date: Wed, 29 Jan 2014 13:57:12 +0100 Subject: [PATCH 027/128] Change the crypt-storage file to be hex encoded instead of raw binary. To update from the previous configuration, convert your crypt-storage file from raw binary to hex. --- nixos/modules/system/boot/luksroot.nix | 14 +++++++------- 1 file changed, 7 insertions(+), 7 deletions(-) diff --git a/nixos/modules/system/boot/luksroot.nix b/nixos/modules/system/boot/luksroot.nix index ae684dd8977b..b9dc6d7823e0 100644 --- a/nixos/modules/system/boot/luksroot.nix +++ b/nixos/modules/system/boot/luksroot.nix @@ -68,7 +68,7 @@ let mount -t ${yubikey.storage.fsType} ${toString yubikey.storage.device} ${yubikey.storage.mountPoint} local uuid_r - uuid_r="$(take 16 ${yubikey.storage.mountPoint}${yubikey.storage.path} | rbtohex)" + uuid_r="$(take 32 ${yubikey.storage.mountPoint}${yubikey.storage.path})" local uuid_luks uuid_luks="$(cryptsetup luksUUID ${device} | take 36 | tr -d '-')" @@ -91,9 +91,9 @@ let k_blob="$(ykchalresp -${toString yubikey.slot} -x $challenge 2>/dev/null)" - aes_blob_decrypted="$(drop 16 ${yubikey.storage.mountPoint}${yubikey.storage.path} | openssl-wrap enc -d -aes-256-ctr -K $k_blob -iv $uuid_r | rbtohex)" + aes_blob_decrypted="$(drop 32 ${yubikey.storage.mountPoint}${yubikey.storage.path} | hextorb | openssl-wrap enc -d -aes-256-ctr -K $k_blob -iv $uuid_r | rbtohex)" - checksum="$(echo -n $aes_blob_decrypted | hextorb | drop 84 | rbtohex)" + checksum="$(echo -n $aes_blob_decrypted | drop 168)" if [ "$(echo -n $aes_blob_decrypted | hextorb | take 84 | openssl-wrap dgst -binary -sha512 | rbtohex)" == "$checksum" ]; then checksum_correct=1 break @@ -110,10 +110,10 @@ let fi local k_yubi - k_yubi="$(echo -n $aes_blob_decrypted | hextorb | take 20 | rbtohex)" + k_yubi="$(echo -n $aes_blob_decrypted | take 40)" local k_luks - k_luks="$(echo -n $aes_blob_decrypted | hextorb | drop 20 | take 64 | rbtohex)" + k_luks="$(echo -n $aes_blob_decrypted | drop 40 | take 128)" echo -n "$k_luks" | hextorb | cryptsetup luksOpen ${device} ${name} ${optionalString allowDiscards "--allow-discards"} --key-file=- @@ -139,8 +139,8 @@ let local new_k_blob new_k_blob="$(echo -n $new_challenge | hextorb | openssl-wrap dgst -binary -sha1 -mac HMAC -macopt hexkey:$k_yubi | rbtohex)" - echo -n "$new_uuid_r" | hextorb > ${yubikey.storage.mountPoint}${yubikey.storage.path} - echo -n "$k_yubi$k_luks$checksum" | hextorb | openssl-wrap enc -e -aes-256-ctr -K "$new_k_blob" -iv "$new_uuid_r" >> ${yubikey.storage.mountPoint}${yubikey.storage.path} + echo -n "$new_uuid_r" > ${yubikey.storage.mountPoint}${yubikey.storage.path} + echo -n "$k_yubi$k_luks$checksum" | hextorb | openssl-wrap enc -e -aes-256-ctr -K "$new_k_blob" -iv "$new_uuid_r" | rbtohex >> ${yubikey.storage.mountPoint}${yubikey.storage.path} else echo "Warning: Could not obtain new UUID, current challenge persists!" fi From 42911b19033e6e2d95dd4d74f456927cdcf8bc73 Mon Sep 17 00:00:00 2001 From: David Guibert Date: Wed, 29 Jan 2014 15:46:22 +0100 Subject: [PATCH 028/128] cuda: install the SDK using multiple-outputs support --- pkgs/development/compilers/cudatoolkit/default.nix | 6 +++++- 1 file changed, 5 insertions(+), 1 deletion(-) diff --git a/pkgs/development/compilers/cudatoolkit/default.nix b/pkgs/development/compilers/cudatoolkit/default.nix index f68f918d5850..af93cb13d37a 100644 --- a/pkgs/development/compilers/cudatoolkit/default.nix +++ b/pkgs/development/compilers/cudatoolkit/default.nix @@ -16,6 +16,8 @@ stdenv.mkDerivation rec { } else throw "cudatoolkit does not support platform ${stdenv.system}"; + outputs = [ "out" "sdk" ]; + buildInputs = [ perl ]; runtimeDependencies = [ @@ -30,6 +32,7 @@ stdenv.mkDerivation rec { sh $src --keep --noexec cd pkg/run_files sh cuda-linux64-rel-5.5.22-16488124.run --keep --noexec + sh cuda-samples-linux-5.5.22-16488124.run --keep --noexec cd pkg ''; @@ -44,8 +47,9 @@ stdenv.mkDerivation rec { ''; installPhase = '' - mkdir $out + mkdir $out $sdk perl ./install-linux.pl --prefix="$out" + perl ./install-sdk-linux.pl --prefix="$sdk" --cudaprefix="$out" ''; meta = { From e96f58ef5cdbb28cd4efe1b5f7bc532b9ae55b58 Mon Sep 17 00:00:00 2001 From: Moritz Maxeiner Date: Wed, 29 Jan 2014 17:20:05 +0100 Subject: [PATCH 029/128] Implement muli-user authentication for yubikey pba, i.e. multiple users can now share a single luks keyslot. This is achieved by having multiple lines per storage file, one for each user (if the feature is enabled); each of these lines has the same format as would be the case for the userless authentication, except that they are prepended with a SHA-512 of the user's id. --- nixos/modules/system/boot/luksroot.nix | 76 ++++++++++++++++++++------ 1 file changed, 60 insertions(+), 16 deletions(-) diff --git a/nixos/modules/system/boot/luksroot.nix b/nixos/modules/system/boot/luksroot.nix index b9dc6d7823e0..3f4b703fa9cf 100644 --- a/nixos/modules/system/boot/luksroot.nix +++ b/nixos/modules/system/boot/luksroot.nix @@ -68,39 +68,69 @@ let mount -t ${yubikey.storage.fsType} ${toString yubikey.storage.device} ${yubikey.storage.mountPoint} local uuid_r - uuid_r="$(take 32 ${yubikey.storage.mountPoint}${yubikey.storage.path})" - - local uuid_luks - uuid_luks="$(cryptsetup luksUUID ${device} | take 36 | tr -d '-')" - local k_user local challenge local k_blob local aes_blob_decrypted local checksum_correct local checksum + local uuid_luks + local user_record + + uuid_luks="$(cryptsetup luksUUID ${device} | take 36 | tr -d '-')" + + ${optionalString (!yubikey.multiUser) '' + user_record="$(cat ${yubikey.storage.mountPoint}${yubikey.storage.path})" + uuid_r="$(echo -n $user_record | take 32)" + ''} for try in $(seq 3); do + ${optionalString yubikey.multiUser '' + local user_id + echo -n "Enter user id: " + read -s user_id + echo + ''} + ${optionalString yubikey.twoFactor '' echo -n "Enter two-factor passphrase: " read -s k_user + echo ''} - challenge="$(echo -n $k_user$uuid_r$uuid_luks | openssl-wrap dgst -binary -sha1 | rbtohex)" + ${optionalString yubikey.multiUser '' + local user_id_hash + user_id_hash="$(echo -n $user_id | openssl-wrap dgst -binary -sha512 | rbtohex)" - k_blob="$(ykchalresp -${toString yubikey.slot} -x $challenge 2>/dev/null)" + user_record="$(sed -n -e /^$user_id_hash[^$]*$/p ${yubikey.storage.mountPoint}${yubikey.storage.path} | tr -d '\n')" - aes_blob_decrypted="$(drop 32 ${yubikey.storage.mountPoint}${yubikey.storage.path} | hextorb | openssl-wrap enc -d -aes-256-ctr -K $k_blob -iv $uuid_r | rbtohex)" + if [ ! -z "$user_record" ]; then + user_record="$(echo -n $user_record | drop 128)" + uuid_r="$(echo -n $user_record | take 32)" + ''} - checksum="$(echo -n $aes_blob_decrypted | drop 168)" - if [ "$(echo -n $aes_blob_decrypted | hextorb | take 84 | openssl-wrap dgst -binary -sha512 | rbtohex)" == "$checksum" ]; then - checksum_correct=1 - break + challenge="$(echo -n $k_user$uuid_r$uuid_luks | openssl-wrap dgst -binary -sha1 | rbtohex)" + + k_blob="$(ykchalresp -${toString yubikey.slot} -x $challenge 2>/dev/null)" + + aes_blob_decrypted="$(echo -n $user_record | drop 32 | hextorb | openssl-wrap enc -d -aes-256-ctr -K $k_blob -iv $uuid_r | rbtohex)" + + checksum="$(echo -n $aes_blob_decrypted | drop 168)" + if [ "$(echo -n $aes_blob_decrypted | hextorb | take 84 | openssl-wrap dgst -binary -sha512 | rbtohex)" == "$checksum" ]; then + checksum_correct=1 + break + else + checksum_correct=0 + echo "Authentication failed!" + fi + + ${optionalString yubikey.multiUser '' else - checksum_correct=0 - echo "Authentication failed!" + checksum_correct=0 + echo "Authentication failed!" fi + ''} done if [ "$checksum_correct" != "1" ]; then @@ -139,8 +169,16 @@ let local new_k_blob new_k_blob="$(echo -n $new_challenge | hextorb | openssl-wrap dgst -binary -sha1 -mac HMAC -macopt hexkey:$k_yubi | rbtohex)" - echo -n "$new_uuid_r" > ${yubikey.storage.mountPoint}${yubikey.storage.path} - echo -n "$k_yubi$k_luks$checksum" | hextorb | openssl-wrap enc -e -aes-256-ctr -K "$new_k_blob" -iv "$new_uuid_r" | rbtohex >> ${yubikey.storage.mountPoint}${yubikey.storage.path} + local new_aes_blob + new_aes_blob=$(echo -n "$k_yubi$k_luks$checksum" | hextorb | openssl-wrap enc -e -aes-256-ctr -K "$new_k_blob" -iv "$new_uuid_r" | rbtohex) + + ${optionalString yubikey.multiUser '' + sed -i -e "s|^$user_id_hash$user_record|$user_id_hash$new_uuid_r$new_aes_blob|1" + ''} + + ${optionalString (!yubikey.multiUser) '' + echo -n "$new_uuid_r$new_aes_blob" > ${yubikey.storage.mountPoint}${yubikey.storage.path} + ''} else echo "Warning: Could not obtain new UUID, current challenge persists!" fi @@ -298,6 +336,12 @@ in description = "Whether to use a passphrase and a Yubikey (true), or only a Yubikey (false)"; }; + multiUser = mkOption { + default = false; + type = types.bool; + description = "Whether to allow multiple users to authenticate with a Yubikey"; + }; + slot = mkOption { default = 2; type = types.int; From b0d2f0e3f04a74e847dee898bf4c73767c986dfc Mon Sep 17 00:00:00 2001 From: Moritz Maxeiner Date: Wed, 29 Jan 2014 18:05:05 +0100 Subject: [PATCH 030/128] Add myself as a maintainer for ykpers and libyubikey --- lib/maintainers.nix | 1 + pkgs/applications/misc/ykpers/default.nix | 7 ++++--- pkgs/development/libraries/libyubikey/default.nix | 7 ++++--- 3 files changed, 9 insertions(+), 6 deletions(-) diff --git a/lib/maintainers.nix b/lib/maintainers.nix index 3c7a399623d5..5e55b64ffa9f 100644 --- a/lib/maintainers.nix +++ b/lib/maintainers.nix @@ -18,6 +18,7 @@ bjornfor = "Bjørn Forsman "; bluescreen303 = "Mathijs Kwik "; bodil = "Bodil Stokke "; + calrama = "Moritz Maxeiner "; chaoflow = "Florian Friesdorf "; coconnor = "Corey O'Connor "; coroa = "Jonas Hörsch "; diff --git a/pkgs/applications/misc/ykpers/default.nix b/pkgs/applications/misc/ykpers/default.nix index 70ec351f71b7..e7bfa8ded50e 100644 --- a/pkgs/applications/misc/ykpers/default.nix +++ b/pkgs/applications/misc/ykpers/default.nix @@ -8,7 +8,7 @@ stdenv.mkDerivation rec src = fetchurl { url = "http://opensource.yubico.com/yubikey-personalization/releases/${name}.tar.gz"; - sha256 = "1n4s8kk31q5zh2rm7sj9qmv86yl8ibimdnpvk9ny391a88qlypyd"; + sha256 = "1n4s8kk31q5zh2rm7sj9qmv86yl8ibimdnpvk9ny391a88qlypyd"; }; buildInputs = [pkgconfig libusb1 libyubikey]; @@ -16,7 +16,8 @@ stdenv.mkDerivation rec meta = { homepage = "http://opensource.yubico.com/yubikey-personalization/"; - description = "YubiKey Personalization cross-platform library and tool"; - license = "bsd"; + description = "YubiKey Personalization cross-platform library and tool"; + license = "bsd"; + maintainers = [ stdenv.lib.maintainers.calrama ]; }; } diff --git a/pkgs/development/libraries/libyubikey/default.nix b/pkgs/development/libraries/libyubikey/default.nix index 77bf60c4255e..25c2117b059d 100644 --- a/pkgs/development/libraries/libyubikey/default.nix +++ b/pkgs/development/libraries/libyubikey/default.nix @@ -8,13 +8,14 @@ stdenv.mkDerivation rec src = fetchurl { url = "http://opensource.yubico.com/yubico-c/releases/${name}.tar.gz"; - sha256 = "19pm4rqsnm9r0n5j26bqkxa1jpimdavzcvg5g7p416vkjhxc6lw9"; + sha256 = "19pm4rqsnm9r0n5j26bqkxa1jpimdavzcvg5g7p416vkjhxc6lw9"; }; meta = { homepage = "http://opensource.yubico.com/yubico-c/"; - description = "C library for manipulating Yubico YubiKey One-Time Passwords (OTPs)"; - license = "bsd"; + description = "C library for manipulating Yubico YubiKey One-Time Passwords (OTPs)"; + license = "bsd"; + maintainers = [ stdenv.lib.maintainers.calrama ]; }; } From c323f9eed4f88546fdcff6b506a44c8c0ce4168d Mon Sep 17 00:00:00 2001 From: Peter Simons Date: Wed, 29 Jan 2014 18:31:36 +0100 Subject: [PATCH 031/128] nbd: update to version 3.7 --- pkgs/tools/networking/nbd/default.nix | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/pkgs/tools/networking/nbd/default.nix b/pkgs/tools/networking/nbd/default.nix index 99793c139cbd..54f6689582dc 100644 --- a/pkgs/tools/networking/nbd/default.nix +++ b/pkgs/tools/networking/nbd/default.nix @@ -1,21 +1,21 @@ { stdenv, fetchurl, pkgconfig, glib }: let - name = "nbd-3.5"; + name = "nbd-3.7"; in stdenv.mkDerivation { inherit name; src = fetchurl { - url = "mirror://sourceforge/nbd/${name}.tar.bz2"; - sha256 = "0frnbmdcm1b0nmmpvpwjb9h1yabdpwwd2l95056mhl2zaafh8gqx"; + url = "mirror://sourceforge/nbd/${name}.tar.xz"; + sha256 = "1k4bvg5rg4q6b58y4kd9qwj07sznsfbknlpc6y1bk6c48rgr3d0b"; }; buildInputs = [ pkgconfig glib ] ++ stdenv.lib.optional (stdenv ? glibc) stdenv.glibc.kernelHeaders; postInstall = '' mkdir -p "$out/share/doc/${name}" - cp README "$out/share/doc/${name}/README" + cp README.md "$out/share/doc/${name}/" ''; # The test suite doesn't succeed in chroot builds. From 7bf94cadad5c416375c3e5dfd46f31a81b76ea05 Mon Sep 17 00:00:00 2001 From: Moritz Maxeiner Date: Wed, 29 Jan 2014 18:49:26 +0100 Subject: [PATCH 032/128] Add library dependencies explicitly --- nixos/modules/system/boot/luksroot.nix | 35 ++++++++------------------ 1 file changed, 11 insertions(+), 24 deletions(-) diff --git a/nixos/modules/system/boot/luksroot.nix b/nixos/modules/system/boot/luksroot.nix index 3f4b703fa9cf..8547682284f7 100644 --- a/nixos/modules/system/boot/luksroot.nix +++ b/nixos/modules/system/boot/luksroot.nix @@ -413,36 +413,23 @@ in # copy the cryptsetup binary and it's dependencies boot.initrd.extraUtilsCommands = '' cp -pdv ${pkgs.cryptsetup}/sbin/cryptsetup $out/bin - # XXX: do we have a function that does this? - for lib in $(ldd $out/bin/cryptsetup |grep '=>' |grep /nix/store/ |cut -d' ' -f3); do - cp -pdvn $lib $out/lib - cp -pvn $(readlink -f $lib) $out/lib - done + + cp -pdv ${pkgs.libgcrypt}/lib/libgcrypt*.so.* $out/lib + cp -pdv ${pkgs.libgpgerror}/lib/libgpg-error*.so.* $out/lib + cp -pdv ${pkgs.cryptsetup}/lib/libcryptsetup*.so.* $out/lib + cp -pdv ${pkgs.popt}/lib/libpopt*.so.* $out/lib ${optionalString luks.yubikeySupport '' cp -pdv ${pkgs.utillinux}/bin/uuidgen $out/bin - for lib in $(ldd $out/bin/uuidgen |grep '=>' |grep /nix/store/ |cut -d' ' -f3); do - cp -pdvn $lib $out/lib - cp -pvn $(readlink -f $lib) $out/lib - done - cp -pdv ${pkgs.ykpers}/bin/ykchalresp $out/bin - for lib in $(ldd $out/bin/ykchalresp |grep '=>' |grep /nix/store/ |cut -d' ' -f3); do - cp -pdvn $lib $out/lib - cp -pvn $(readlink -f $lib) $out/lib - done - cp -pdv ${pkgs.ykpers}/bin/ykinfo $out/bin - for lib in $(ldd $out/bin/ykinfo |grep '=>' |grep /nix/store/ |cut -d' ' -f3); do - cp -pdvn $lib $out/lib - cp -pvn $(readlink -f $lib) $out/lib - done - cp -pdv ${pkgs.openssl}/bin/openssl $out/bin - for lib in $(ldd $out/bin/openssl |grep '=>' |grep /nix/store/ |cut -d' ' -f3); do - cp -pdvn $lib $out/lib - cp -pvn $(readlink -f $lib) $out/lib - done + + cp -pdv ${pkgs.libusb1}/lib/libusb*.so.* $out/lib + cp -pdv ${pkgs.ykpers}/lib/libykpers*.so.* $out/lib + cp -pdv ${pkgs.libyubikey}/lib/libyubikey*.so.* $out/lib + cp -pdv ${pkgs.openssl}/lib/libssl*.so.* $out/lib + cp -pdv ${pkgs.openssl}/lib/libcrypto*.so.* $out/lib mkdir -p $out/etc/ssl cp -pdv ${pkgs.openssl}/etc/ssl/openssl.cnf $out/etc/ssl From 409677fbd2c1cb62a7a1f31f48d62a726b6a2985 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Domen=20Ko=C5=BEar?= Date: Wed, 29 Jan 2014 18:57:05 +0100 Subject: [PATCH 033/128] mailpile: update dev version --- pkgs/applications/networking/mailreaders/mailpile/default.nix | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/pkgs/applications/networking/mailreaders/mailpile/default.nix b/pkgs/applications/networking/mailreaders/mailpile/default.nix index bc38defe06cd..1e68d2e90b8d 100644 --- a/pkgs/applications/networking/mailreaders/mailpile/default.nix +++ b/pkgs/applications/networking/mailreaders/mailpile/default.nix @@ -5,8 +5,8 @@ buildPythonPackage rec { src = fetchgit { url = "https://github.com/pagekite/Mailpile.git"; - rev = "695a25061a5220d4f0fd6ec3de4ccd9ae4c05a92"; - sha256 = "0il9idfpnzb1a5cg3p9zrd6fnw2dhrqr6c3gzq1m06snw8jx9fpc"; + rev = "6e19c1942541dbdefb5155db5f2583bf3ed22aeb"; + sha256 = "04idlbjkasigq3vslcv33kg21rjyklm2yl8pyrf5h94lzabbl1fs"; }; propagatedBuildInputs = with pythonPackages; [ From 7275a580b0e0b092f9f08ae6b183e95b23794ac8 Mon Sep 17 00:00:00 2001 From: Peter Simons Date: Wed, 29 Jan 2014 11:45:06 +0100 Subject: [PATCH 034/128] haskell-connection: update to version 0.2.0 --- .../libraries/haskell/connection/default.nix | 11 ++++++----- 1 file changed, 6 insertions(+), 5 deletions(-) diff --git a/pkgs/development/libraries/haskell/connection/default.nix b/pkgs/development/libraries/haskell/connection/default.nix index 186557d81b07..69083520c182 100644 --- a/pkgs/development/libraries/haskell/connection/default.nix +++ b/pkgs/development/libraries/haskell/connection/default.nix @@ -1,13 +1,14 @@ -{ cabal, certificate, cprngAes, dataDefault, network, socks, tls -, tlsExtra +{ cabal, cprngAes, dataDefaultClass, network, socks, tls, x509 +, x509Store, x509System, x509Validation }: cabal.mkDerivation (self: { pname = "connection"; - version = "0.1.3.1"; - sha256 = "1z9vb20466lg7l8z4abfbsdzpix18hswpqcl7s2gv838s2wvd16w"; + version = "0.2.0"; + sha256 = "17fzkgrjavmcxhdjj7agkx16jwpf6ql31nw1ni8gczkbp7azd0kp"; buildDepends = [ - certificate cprngAes dataDefault network socks tls tlsExtra + cprngAes dataDefaultClass network socks tls x509 x509Store + x509System x509Validation ]; meta = { homepage = "http://github.com/vincenthz/hs-connection"; From adea1ded8a7b18d567cda7fc088bd0914ce0deaf Mon Sep 17 00:00:00 2001 From: Peter Simons Date: Wed, 29 Jan 2014 11:45:06 +0100 Subject: [PATCH 035/128] haskell-fay-base: update to version 0.19 --- pkgs/development/libraries/haskell/fay-base/default.nix | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/pkgs/development/libraries/haskell/fay-base/default.nix b/pkgs/development/libraries/haskell/fay-base/default.nix index 8e1212f5e5a0..53f6fdce41cb 100644 --- a/pkgs/development/libraries/haskell/fay-base/default.nix +++ b/pkgs/development/libraries/haskell/fay-base/default.nix @@ -2,8 +2,8 @@ cabal.mkDerivation (self: { pname = "fay-base"; - version = "0.18.0.0"; - sha256 = "010zjcs4y0zdb4gijrw10sjc56i271s35bkwg5c0lblyr62nml0s"; + version = "0.19"; + sha256 = "03jf1ig3s2dcdd26j3d3iwm9hbiq5f5q5hyg22jdvl7lmvigw36j"; buildDepends = [ fay ]; meta = { homepage = "https://github.com/faylang/fay-base"; From 9067bb3ef490807450e1213ea2e5a5b3c67a3771 Mon Sep 17 00:00:00 2001 From: Peter Simons Date: Wed, 29 Jan 2014 11:45:06 +0100 Subject: [PATCH 036/128] haskell-fay: update to version 0.19.0.1 --- pkgs/development/libraries/haskell/fay/default.nix | 12 ++++++------ 1 file changed, 6 insertions(+), 6 deletions(-) diff --git a/pkgs/development/libraries/haskell/fay/default.nix b/pkgs/development/libraries/haskell/fay/default.nix index d7c8ba5a4479..adc29231d621 100644 --- a/pkgs/development/libraries/haskell/fay/default.nix +++ b/pkgs/development/libraries/haskell/fay/default.nix @@ -1,22 +1,22 @@ { cabal, aeson, attoparsec, Cabal, cpphs, dataDefault, filepath , ghcPaths, haskellNames, haskellPackages, haskellSrcExts, HUnit , languageEcmascript, mtl, optparseApplicative, prettyShow, safe -, sourcemap, split, syb, testFramework, testFrameworkHunit -, testFrameworkTh, text, time, uniplate, unorderedContainers -, utf8String, vector +, scientific, sourcemap, split, syb, testFramework +, testFrameworkHunit, testFrameworkTh, text, time, uniplate +, unorderedContainers, utf8String, vector }: cabal.mkDerivation (self: { pname = "fay"; - version = "0.18.1.3"; - sha256 = "1m747l2555w1jkdwh8b851mxvngiy7l7sbkwvm2il6k5ygcz5gbv"; + version = "0.19.0.1"; + sha256 = "036z4wz7vziaczhx1ysbm7d2302n2sb6l1z48py8spai5awkbvh0"; isLibrary = true; isExecutable = true; buildDepends = [ aeson attoparsec Cabal cpphs dataDefault filepath ghcPaths haskellNames haskellPackages haskellSrcExts HUnit languageEcmascript mtl optparseApplicative prettyShow safe - sourcemap split syb testFramework testFrameworkHunit + scientific sourcemap split syb testFramework testFrameworkHunit testFrameworkTh text time uniplate unorderedContainers utf8String vector ]; From ef28a1a3956bdc8aad0ab13fafd7b7d30ef143d5 Mon Sep 17 00:00:00 2001 From: Peter Simons Date: Wed, 29 Jan 2014 11:45:07 +0100 Subject: [PATCH 037/128] haskell-lens: update to version 3.10.2 --- pkgs/development/libraries/haskell/lens/default.nix | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/pkgs/development/libraries/haskell/lens/default.nix b/pkgs/development/libraries/haskell/lens/default.nix index 704ec8db48e0..b0f6b6cd5053 100644 --- a/pkgs/development/libraries/haskell/lens/default.nix +++ b/pkgs/development/libraries/haskell/lens/default.nix @@ -9,8 +9,8 @@ cabal.mkDerivation (self: { pname = "lens"; - version = "3.10.1"; - sha256 = "0xjjld1ra1a0a739ia8swgbpw7r72hv0bs9akbqr9wyw8qdzibnh"; + version = "3.10.2"; + sha256 = "0hdj75sg8r1m2jdpfh81zdcwbhp6mb7xipp6q57pv6n90xc6dnxw"; buildDepends = [ bifunctors comonad contravariant distributive filepath genericDeriving hashable MonadCatchIOTransformers mtl parallel From 1d8fc24c2706c2a12155a266fa4bcac6f51693d6 Mon Sep 17 00:00:00 2001 From: Peter Simons Date: Wed, 29 Jan 2014 11:45:07 +0100 Subject: [PATCH 038/128] haskell-monadcryptorandom: update to version 0.6.1 --- .../libraries/haskell/monadcryptorandom/default.nix | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/pkgs/development/libraries/haskell/monadcryptorandom/default.nix b/pkgs/development/libraries/haskell/monadcryptorandom/default.nix index bd9261f901e8..87bd36503e18 100644 --- a/pkgs/development/libraries/haskell/monadcryptorandom/default.nix +++ b/pkgs/development/libraries/haskell/monadcryptorandom/default.nix @@ -2,8 +2,8 @@ cabal.mkDerivation (self: { pname = "monadcryptorandom"; - version = "0.6"; - sha256 = "0gms6xsnr6g5lk36z92yygwmyrl568y1h76ww676wb3qph42xx3x"; + version = "0.6.1"; + sha256 = "0j99j0f2qwhslimfgslsdlv0xihsddas3i69pfnjwnsd9zg5pgj2"; buildDepends = [ cryptoApi mtl tagged transformers ]; meta = { homepage = "https://github.com/TomMD/monadcryptorandom"; From e26fa930538d3e59e30b5f3231110d2fc718570c Mon Sep 17 00:00:00 2001 From: Peter Simons Date: Wed, 29 Jan 2014 11:45:07 +0100 Subject: [PATCH 039/128] haskell-network-conduit-tls: update to version 1.0.4.1 --- .../libraries/haskell/network-conduit-tls/default.nix | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/pkgs/development/libraries/haskell/network-conduit-tls/default.nix b/pkgs/development/libraries/haskell/network-conduit-tls/default.nix index 2cb5e5a5cfc8..28cf920cf284 100644 --- a/pkgs/development/libraries/haskell/network-conduit-tls/default.nix +++ b/pkgs/development/libraries/haskell/network-conduit-tls/default.nix @@ -1,17 +1,17 @@ { cabal, aeson, certificate, conduit, connection, cprngAes , cryptoApi, cryptoRandomApi, dataDefault, HUnit, monadControl, mtl , network, networkConduit, pem, systemFileio, systemFilepath, tls -, tlsExtra, transformers +, transformers }: cabal.mkDerivation (self: { pname = "network-conduit-tls"; - version = "1.0.3"; - sha256 = "0l8h9pfrrqzkf45cp5r8kxpzc2fi6m01s4zkrh0d226rbps3gmvc"; + version = "1.0.4.1"; + sha256 = "1l79v4ippyfw6pl4h3vqswh79vcif80phf6kq5fr4xmv3b6nbc06"; buildDepends = [ aeson certificate conduit connection cprngAes cryptoApi cryptoRandomApi dataDefault monadControl network networkConduit pem - systemFileio systemFilepath tls tlsExtra transformers + systemFileio systemFilepath tls transformers ]; testDepends = [ conduit connection HUnit mtl networkConduit ]; meta = { From 493be2d6afc6d492a9134999b5f66a9da2de4e4f Mon Sep 17 00:00:00 2001 From: Peter Simons Date: Wed, 29 Jan 2014 11:45:07 +0100 Subject: [PATCH 040/128] haskell-reactive-banana-wx: update to version 0.8.0.0 --- .../libraries/haskell/reactive-banana-wx/default.nix | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/pkgs/development/libraries/haskell/reactive-banana-wx/default.nix b/pkgs/development/libraries/haskell/reactive-banana-wx/default.nix index ee408fea4805..c224da3a339b 100644 --- a/pkgs/development/libraries/haskell/reactive-banana-wx/default.nix +++ b/pkgs/development/libraries/haskell/reactive-banana-wx/default.nix @@ -2,8 +2,8 @@ cabal.mkDerivation (self: { pname = "reactive-banana-wx"; - version = "0.7.1.0"; - sha256 = "06hkb8v6rjpw95vf16xh547igxxzddr6wpjiwhqwpwhz2alavk2v"; + version = "0.8.0.0"; + sha256 = "0qfd839nm2ppjhhhnn6s1hbx1mnrzjqx450p4jadsrs1y2403c9n"; isLibrary = true; isExecutable = true; buildDepends = [ cabalMacosx reactiveBanana wx wxcore ]; From 3edd56c7a8064f020541b3d429eb963d51c8b989 Mon Sep 17 00:00:00 2001 From: Peter Simons Date: Wed, 29 Jan 2014 11:45:07 +0100 Subject: [PATCH 041/128] haskell-reactive-banana: update to version 0.8.0.0 --- .../libraries/haskell/reactive-banana/default.nix | 14 ++++++++------ 1 file changed, 8 insertions(+), 6 deletions(-) diff --git a/pkgs/development/libraries/haskell/reactive-banana/default.nix b/pkgs/development/libraries/haskell/reactive-banana/default.nix index 0bf7747d46bf..535b289a389e 100644 --- a/pkgs/development/libraries/haskell/reactive-banana/default.nix +++ b/pkgs/development/libraries/haskell/reactive-banana/default.nix @@ -1,19 +1,21 @@ -{ cabal, hashable, HUnit, testFramework, testFrameworkHunit +{ cabal, hashable, HUnit, pqueue, testFramework, testFrameworkHunit , transformers, unorderedContainers, vault }: cabal.mkDerivation (self: { pname = "reactive-banana"; - version = "0.7.1.3"; - sha256 = "117y1sk97kpiq0cippq0ydl2zqb99q49y2m2m6pgg2nh6gz6a3zb"; - buildDepends = [ hashable transformers unorderedContainers vault ]; + version = "0.8.0.0"; + sha256 = "15dzvn7cbs9kg410lyd1kj6kf2r7ap2n9bc59byzkb0r8wzn9ra1"; + buildDepends = [ + hashable pqueue transformers unorderedContainers vault + ]; testDepends = [ - hashable HUnit testFramework testFrameworkHunit transformers + hashable HUnit pqueue testFramework testFrameworkHunit transformers unorderedContainers vault ]; meta = { homepage = "http://haskell.org/haskellwiki/Reactive-banana"; - description = "Practical library for functional reactive programming (FRP)"; + description = "Library for functional reactive programming (FRP)"; license = self.stdenv.lib.licenses.bsd3; platforms = self.ghc.meta.platforms; maintainers = [ From 5ea2be7a2a89c3148d3bb65d30f77a5e6e1d7828 Mon Sep 17 00:00:00 2001 From: Peter Simons Date: Wed, 29 Jan 2014 11:45:07 +0100 Subject: [PATCH 042/128] haskell-sourcemap: update to version 0.1.3.0 --- pkgs/development/libraries/haskell/sourcemap/default.nix | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/pkgs/development/libraries/haskell/sourcemap/default.nix b/pkgs/development/libraries/haskell/sourcemap/default.nix index 602654b0a01c..ce0c89d4596d 100644 --- a/pkgs/development/libraries/haskell/sourcemap/default.nix +++ b/pkgs/development/libraries/haskell/sourcemap/default.nix @@ -3,8 +3,8 @@ cabal.mkDerivation (self: { pname = "sourcemap"; - version = "0.1.2.0"; - sha256 = "040j2k1cwzlq5pybs6cg7wmf0x5i22zdidv2xvzdvgi5v7gf6kp1"; + version = "0.1.3.0"; + sha256 = "1flfsjs2z2zjzqwvmc2vcibvxh19s89ah4s560xr2s5mhdqwbkk5"; buildDepends = [ aeson attoparsec text unorderedContainers utf8String ]; From 4c14da1276a426241fd0d183ec40b244c8d179df Mon Sep 17 00:00:00 2001 From: Peter Simons Date: Wed, 29 Jan 2014 11:45:07 +0100 Subject: [PATCH 043/128] haskell-tls: update to version 1.2.2 --- .../libraries/haskell/tls/default.nix | 21 ++++++++++++------- 1 file changed, 13 insertions(+), 8 deletions(-) diff --git a/pkgs/development/libraries/haskell/tls/default.nix b/pkgs/development/libraries/haskell/tls/default.nix index 0f354d8b77e5..638299d4a426 100644 --- a/pkgs/development/libraries/haskell/tls/default.nix +++ b/pkgs/development/libraries/haskell/tls/default.nix @@ -1,18 +1,23 @@ -{ cabal, cereal, certificate, cprngAes, cryptohash, cryptoPubkey -, cryptoRandom, mtl, network, QuickCheck, testFramework -, testFrameworkQuickcheck2, time +{ cabal, asn1Encoding, asn1Types, cereal, cipherAes, cipherRc4 +, cprngAes, cryptohash, cryptoNumbers, cryptoPubkey +, cryptoPubkeyTypes, cryptoRandom, dataDefaultClass, mtl, network +, QuickCheck, testFramework, testFrameworkQuickcheck2, time, x509 +, x509Store, x509Validation }: cabal.mkDerivation (self: { pname = "tls"; - version = "1.1.5"; - sha256 = "1ja03x3i7dgjpy22h4shnni1xslph8i8q4accqq8njpqpz54c84c"; + version = "1.2.2"; + sha256 = "156l859mfpdax5rg1frwa5ms5bzggaja0mi795hh8i5c3ah7hfcp"; buildDepends = [ - cereal certificate cryptohash cryptoPubkey cryptoRandom mtl network + asn1Encoding asn1Types cereal cipherAes cipherRc4 cryptohash + cryptoNumbers cryptoPubkey cryptoPubkeyTypes cryptoRandom + dataDefaultClass mtl network x509 x509Store x509Validation ]; testDepends = [ - cereal certificate cprngAes cryptoPubkey cryptoRandom mtl - QuickCheck testFramework testFrameworkQuickcheck2 time + cereal cprngAes cryptoPubkey cryptoRandom dataDefaultClass mtl + QuickCheck testFramework testFrameworkQuickcheck2 time x509 + x509Validation ]; doCheck = false; meta = { From 3896a2ae0447a8f0f4d73c3869d8553fec819e4f Mon Sep 17 00:00:00 2001 From: Peter Simons Date: Wed, 29 Jan 2014 11:45:07 +0100 Subject: [PATCH 044/128] haskell-vector-th-unbox: update to version 0.2.0.2 --- .../libraries/haskell/vector-th-unbox/default.nix | 7 ++++--- 1 file changed, 4 insertions(+), 3 deletions(-) diff --git a/pkgs/development/libraries/haskell/vector-th-unbox/default.nix b/pkgs/development/libraries/haskell/vector-th-unbox/default.nix index 8f5ec4b52bf8..db3288366168 100644 --- a/pkgs/development/libraries/haskell/vector-th-unbox/default.nix +++ b/pkgs/development/libraries/haskell/vector-th-unbox/default.nix @@ -1,10 +1,11 @@ -{ cabal, vector }: +{ cabal, dataDefault, vector }: cabal.mkDerivation (self: { pname = "vector-th-unbox"; - version = "0.2.0.1"; - sha256 = "1q01yk6cyjxbdnmq31d5mfac09hbql43d7xiw1snc96nmkklfpjv"; + version = "0.2.0.2"; + sha256 = "1c8xy0rcl8il9ssclqshwi8dd2xx6bl1rfhrfm9h7wklw64db9xp"; buildDepends = [ vector ]; + testDepends = [ dataDefault vector ]; meta = { description = "Deriver for Data.Vector.Unboxed using Template Haskell"; license = self.stdenv.lib.licenses.bsd3; From c1b58647969eb7bd33b81bc9d8aa87026018f195 Mon Sep 17 00:00:00 2001 From: Peter Simons Date: Wed, 29 Jan 2014 11:45:07 +0100 Subject: [PATCH 045/128] haskell-warp-tls: update to version 2.0.2 --- .../libraries/haskell/warp-tls/default.nix | 13 ++++++------- 1 file changed, 6 insertions(+), 7 deletions(-) diff --git a/pkgs/development/libraries/haskell/warp-tls/default.nix b/pkgs/development/libraries/haskell/warp-tls/default.nix index 88e50b2488ef..c93352cf65c7 100644 --- a/pkgs/development/libraries/haskell/warp-tls/default.nix +++ b/pkgs/development/libraries/haskell/warp-tls/default.nix @@ -1,15 +1,14 @@ -{ cabal, certificate, conduit, cprngAes, cryptocipher -, cryptoRandomApi, network, networkConduit, pem, tls, tlsExtra -, transformers, wai, warp +{ cabal, conduit, cprngAes, dataDefaultClass, network +, networkConduit, tls, transformers, wai, warp }: cabal.mkDerivation (self: { pname = "warp-tls"; - version = "2.0.1"; - sha256 = "0qz02awxrfqmmckias21dh0irmf44vamv24jjjrbb6bjxbr4ldd0"; + version = "2.0.2"; + sha256 = "02wj9hwxd0x49g7kl68h3r4b9hc29yqfjagyybnr42xzwl6bdpyg"; buildDepends = [ - certificate conduit cprngAes cryptocipher cryptoRandomApi network - networkConduit pem tls tlsExtra transformers wai warp + conduit cprngAes dataDefaultClass network networkConduit tls + transformers wai warp ]; meta = { homepage = "http://github.com/yesodweb/wai"; From cc81e53ecba1138e430a5ae8a6a4a4d231d9122e Mon Sep 17 00:00:00 2001 From: Peter Simons Date: Wed, 29 Jan 2014 11:45:07 +0100 Subject: [PATCH 046/128] haskell-x509-store: update to version 1.4.4 --- pkgs/development/libraries/haskell/x509-store/default.nix | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/pkgs/development/libraries/haskell/x509-store/default.nix b/pkgs/development/libraries/haskell/x509-store/default.nix index bc1c0c47dc92..100b5ca28356 100644 --- a/pkgs/development/libraries/haskell/x509-store/default.nix +++ b/pkgs/development/libraries/haskell/x509-store/default.nix @@ -4,8 +4,8 @@ cabal.mkDerivation (self: { pname = "x509-store"; - version = "1.4.3"; - sha256 = "1px5r5y4vaxx479d4av333g1sc03mz1aalpvwwkbi5bwnxydvf01"; + version = "1.4.4"; + sha256 = "0i3hfrddr0wpfl75a76a1j24az08z4x7ya8l5qcdk7c1lr2c2bw8"; buildDepends = [ asn1Encoding asn1Types cryptoPubkeyTypes filepath mtl pem time x509 ]; From 557b14bc89faa6c673c994e637ac111a35d72fea Mon Sep 17 00:00:00 2001 From: Peter Simons Date: Wed, 29 Jan 2014 11:45:07 +0100 Subject: [PATCH 047/128] haskell-HaRe: update to version 0.7.1.2 --- pkgs/development/tools/haskell/HaRe/default.nix | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/pkgs/development/tools/haskell/HaRe/default.nix b/pkgs/development/tools/haskell/HaRe/default.nix index 92bb973b5586..33e5339a5f02 100644 --- a/pkgs/development/tools/haskell/HaRe/default.nix +++ b/pkgs/development/tools/haskell/HaRe/default.nix @@ -7,8 +7,8 @@ cabal.mkDerivation (self: { pname = "HaRe"; - version = "0.7.1.1"; - sha256 = "1gh0md8gfchniclck5ddbkdwf9dl01mkcdmdx3n3f59rx9qi8g0h"; + version = "0.7.1.2"; + sha256 = "1bplcjh0rx6m8ja8vpb18cfky349gmi27rlpsg0pw5nr3l4gcwyl"; isLibrary = true; isExecutable = true; buildDepends = [ From eae54a4b60cbe3b6deb569ef6adf47d82f5141a6 Mon Sep 17 00:00:00 2001 From: Peter Simons Date: Wed, 29 Jan 2014 12:00:31 +0100 Subject: [PATCH 048/128] haskell-pqueue: add version 1.2.1 --- .../libraries/haskell/pqueue/default.nix | 13 +++++++++++++ pkgs/top-level/haskell-packages.nix | 2 ++ 2 files changed, 15 insertions(+) create mode 100644 pkgs/development/libraries/haskell/pqueue/default.nix diff --git a/pkgs/development/libraries/haskell/pqueue/default.nix b/pkgs/development/libraries/haskell/pqueue/default.nix new file mode 100644 index 000000000000..8634c4143183 --- /dev/null +++ b/pkgs/development/libraries/haskell/pqueue/default.nix @@ -0,0 +1,13 @@ +{ cabal, deepseq }: + +cabal.mkDerivation (self: { + pname = "pqueue"; + version = "1.2.1"; + sha256 = "1fily60f4njby7zknmik7a2wxsm3y77ckr69w9bb3fgq22gbzky6"; + buildDepends = [ deepseq ]; + meta = { + description = "Reliable, persistent, fast priority queues"; + license = self.stdenv.lib.licenses.bsd3; + platforms = self.ghc.meta.platforms; + }; +}) diff --git a/pkgs/top-level/haskell-packages.nix b/pkgs/top-level/haskell-packages.nix index 0087aa59df3a..7de8c4ab8184 100644 --- a/pkgs/top-level/haskell-packages.nix +++ b/pkgs/top-level/haskell-packages.nix @@ -1888,6 +1888,8 @@ let result = let callPackage = x : y : modifyPrio (newScope result.finalReturn x ppm = callPackage ../development/libraries/haskell/ppm {}; + pqueue = callPackage ../development/libraries/haskell/pqueue {}; + prettyclass = callPackage ../development/libraries/haskell/prettyclass {}; prettyShow_1_2 = callPackage ../development/libraries/haskell/pretty-show/1.2.nix {}; From 2fce900513bbd89238c81cb7ed1aa9149a99ad28 Mon Sep 17 00:00:00 2001 From: Peter Simons Date: Wed, 29 Jan 2014 18:37:32 +0100 Subject: [PATCH 049/128] haskell-lens: jailbreak to fix build with recent MonadCatchIO-transformers --- pkgs/development/libraries/haskell/lens/default.nix | 3 +++ 1 file changed, 3 insertions(+) diff --git a/pkgs/development/libraries/haskell/lens/default.nix b/pkgs/development/libraries/haskell/lens/default.nix index b0f6b6cd5053..819902d61397 100644 --- a/pkgs/development/libraries/haskell/lens/default.nix +++ b/pkgs/development/libraries/haskell/lens/default.nix @@ -23,6 +23,9 @@ cabal.mkDerivation (self: { testFrameworkHunit testFrameworkQuickcheck2 testFrameworkTh text transformers unorderedContainers vector ]; + patchPhase = '' + sed -i lens.cabal -e 's|MonadCatchIO-transformers >=.*,|MonadCatchIO-transformers,|' + ''; doCheck = false; meta = { homepage = "http://github.com/ekmett/lens/"; From 5375237ba946fedd882a0dcbaf024b77b9437db6 Mon Sep 17 00:00:00 2001 From: Peter Simons Date: Wed, 29 Jan 2014 18:40:09 +0100 Subject: [PATCH 050/128] haskell-tls-extra: remove obsolete package --- .../libraries/haskell/tls-extra/default.nix | 23 ------------------- pkgs/top-level/haskell-packages.nix | 6 ++--- 2 files changed, 3 insertions(+), 26 deletions(-) delete mode 100644 pkgs/development/libraries/haskell/tls-extra/default.nix diff --git a/pkgs/development/libraries/haskell/tls-extra/default.nix b/pkgs/development/libraries/haskell/tls-extra/default.nix deleted file mode 100644 index 6d63c267c61c..000000000000 --- a/pkgs/development/libraries/haskell/tls-extra/default.nix +++ /dev/null @@ -1,23 +0,0 @@ -{ cabal, certificate, cipherAes, cipherRc4, cryptohash -, cryptoPubkey, cryptoRandom, mtl, network, pem, time, tls, vector -}: - -cabal.mkDerivation (self: { - pname = "tls-extra"; - version = "0.6.6"; - sha256 = "0k0sj3nq1lrvbmd582mjj8cxbxigivz1hm8hhij1ncl2pgnq5xyv"; - isLibrary = true; - isExecutable = true; - buildDepends = [ - certificate cipherAes cipherRc4 cryptohash cryptoPubkey - cryptoRandom mtl network pem time tls vector - ]; - jailbreak = true; - meta = { - homepage = "http://github.com/vincenthz/hs-tls"; - description = "TLS extra default values and helpers"; - license = self.stdenv.lib.licenses.bsd3; - platforms = self.ghc.meta.platforms; - maintainers = [ self.stdenv.lib.maintainers.andres ]; - }; -}) diff --git a/pkgs/top-level/haskell-packages.nix b/pkgs/top-level/haskell-packages.nix index 7de8c4ab8184..d2cb93deabb6 100644 --- a/pkgs/top-level/haskell-packages.nix +++ b/pkgs/top-level/haskell-packages.nix @@ -2330,8 +2330,6 @@ let result = let callPackage = x : y : modifyPrio (newScope result.finalReturn x tls = callPackage ../development/libraries/haskell/tls {}; - tlsExtra = callPackage ../development/libraries/haskell/tls-extra {}; - transformers_0_2_2_0 = callPackage ../development/libraries/haskell/transformers/0.2.2.0.nix {}; transformers_0_3_0_0 = if (pkgs.stdenv.lib.versionOlder ghc.version "7.7") then (callPackage ../development/libraries/haskell/transformers/0.3.0.0.nix {}) else null; @@ -2574,7 +2572,9 @@ let result = let callPackage = x : y : modifyPrio (newScope result.finalReturn x yesodPersistent = callPackage ../development/libraries/haskell/yesod-persistent {}; - yesodPlatform = callPackage ../development/libraries/haskell/yesod-platform {}; + yesodPlatform = callPackage ../development/libraries/haskell/yesod-platform { + tlsExtra = null; # obsolete package, now part of tls + }; yesodRoutes = callPackage ../development/libraries/haskell/yesod-routes {}; From 9109c4650cd8514fc6279fefb918ad00cee3433e Mon Sep 17 00:00:00 2001 From: Peter Simons Date: Wed, 29 Jan 2014 18:41:22 +0100 Subject: [PATCH 051/128] haskell-yesod-platform: remove broken (and unused) package --- .../haskell/yesod-platform/default.nix | 74 ------------------- pkgs/top-level/haskell-packages.nix | 4 - 2 files changed, 78 deletions(-) delete mode 100644 pkgs/development/libraries/haskell/yesod-platform/default.nix diff --git a/pkgs/development/libraries/haskell/yesod-platform/default.nix b/pkgs/development/libraries/haskell/yesod-platform/default.nix deleted file mode 100644 index ee9fa20c8de3..000000000000 --- a/pkgs/development/libraries/haskell/yesod-platform/default.nix +++ /dev/null @@ -1,74 +0,0 @@ -{ cabal, aeson, ansiTerminal, asn1Data, asn1Types, attoparsec -, attoparsecConduit, authenticate, base64Bytestring -, baseUnicodeSymbols, blazeBuilder, blazeBuilderConduit, blazeHtml -, blazeMarkup, byteable, byteorder, caseInsensitive, cereal -, certificate, cipherAes, cipherBlowfish, cipherCamellia, cipherDes -, cipherRc4, clientsession, conduit, connection, controlMonadLoop -, cookie, cprngAes, cryptoApi, cryptocipher, cryptoCipherTypes -, cryptoConduit, cryptohash, cryptohashCryptoapi, cryptoNumbers -, cryptoPubkey, cryptoPubkeyTypes, cryptoRandom, cryptoRandomApi -, cssText, dataDefault, dataDefaultClass, dataDefaultInstancesBase -, dataDefaultInstancesContainers, dataDefaultInstancesDlist -, dataDefaultInstancesOldLocale, dlist, emailValidate, entropy -, esqueleto, failure, fastLogger, fileEmbed, filesystemConduit -, hamlet, hjsmin, hspec, hspecExpectations, htmlConduit -, httpAttoparsec, httpClient, httpClientConduit, httpClientTls -, httpConduit, httpDate, httpTypes, languageJavascript, liftedBase -, mimeMail, mimeTypes, mmorph, monadControl, monadLogger -, monadLoops, networkConduit, pathPieces, pem, persistent -, persistentTemplate, poolConduit, primitive, processConduit -, publicsuffixlist, pureMD5, pwstoreFast, quickcheckIo -, resourcePool, resourcet, safe, scientific, securemem, semigroups -, setenv, SHA, shakespeare, shakespeareCss, shakespeareI18n -, shakespeareJs, shakespeareText, silently, simpleSendfile, skein -, socks, stmChans, stringsearch, systemFileio, systemFilepath -, tagged, tagsoup, tagstreamConduit, tls, tlsExtra -, transformersBase, unixCompat, unorderedContainers, utf8Light -, utf8String, vector, void, wai, waiAppStatic, waiExtra, waiLogger -, waiTest, warp, warpTls, word8, xmlConduit, xmlTypes, xssSanitize -, yaml, yesod, yesodAuth, yesodCore, yesodForm, yesodPersistent -, yesodRoutes, yesodStatic, yesodTest, zlibBindings, zlibConduit -}: - -cabal.mkDerivation (self: { - pname = "yesod-platform"; - version = "1.2.6.1"; - sha256 = "1hwvpyxwirv9maangw4q6nb2m2kqpqvvh1i095fr08f1a1qih77f"; - buildDepends = [ - aeson ansiTerminal asn1Data asn1Types attoparsec attoparsecConduit - authenticate base64Bytestring baseUnicodeSymbols blazeBuilder - blazeBuilderConduit blazeHtml blazeMarkup byteable byteorder - caseInsensitive cereal certificate cipherAes cipherBlowfish - cipherCamellia cipherDes cipherRc4 clientsession conduit connection - controlMonadLoop cookie cprngAes cryptoApi cryptocipher - cryptoCipherTypes cryptoConduit cryptohash cryptohashCryptoapi - cryptoNumbers cryptoPubkey cryptoPubkeyTypes cryptoRandom - cryptoRandomApi cssText dataDefault dataDefaultClass - dataDefaultInstancesBase dataDefaultInstancesContainers - dataDefaultInstancesDlist dataDefaultInstancesOldLocale dlist - emailValidate entropy esqueleto failure fastLogger fileEmbed - filesystemConduit hamlet hjsmin hspec hspecExpectations htmlConduit - httpAttoparsec httpClient httpClientConduit httpClientTls - httpConduit httpDate httpTypes languageJavascript liftedBase - mimeMail mimeTypes mmorph monadControl monadLogger monadLoops - networkConduit pathPieces pem persistent persistentTemplate - poolConduit primitive processConduit publicsuffixlist pureMD5 - pwstoreFast quickcheckIo resourcePool resourcet safe scientific - securemem semigroups setenv SHA shakespeare shakespeareCss - shakespeareI18n shakespeareJs shakespeareText silently - simpleSendfile skein socks stmChans stringsearch systemFileio - systemFilepath tagged tagsoup tagstreamConduit tls tlsExtra - transformersBase unixCompat unorderedContainers utf8Light - utf8String vector void wai waiAppStatic waiExtra waiLogger waiTest - warp warpTls word8 xmlConduit xmlTypes xssSanitize yaml yesod - yesodAuth yesodCore yesodForm yesodPersistent yesodRoutes - yesodStatic yesodTest zlibBindings zlibConduit - ]; - jailbreak = true; - meta = { - homepage = "http://www.yesodweb.com/"; - description = "Meta package for Yesod"; - license = self.stdenv.lib.licenses.mit; - platforms = self.ghc.meta.platforms; - }; -}) diff --git a/pkgs/top-level/haskell-packages.nix b/pkgs/top-level/haskell-packages.nix index d2cb93deabb6..35c063888668 100644 --- a/pkgs/top-level/haskell-packages.nix +++ b/pkgs/top-level/haskell-packages.nix @@ -2572,10 +2572,6 @@ let result = let callPackage = x : y : modifyPrio (newScope result.finalReturn x yesodPersistent = callPackage ../development/libraries/haskell/yesod-persistent {}; - yesodPlatform = callPackage ../development/libraries/haskell/yesod-platform { - tlsExtra = null; # obsolete package, now part of tls - }; - yesodRoutes = callPackage ../development/libraries/haskell/yesod-routes {}; yesodStatic = callPackage ../development/libraries/haskell/yesod-static {}; From 00765dccd832cb78f970d6aa53e94ba76a290805 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Edward=20Tj=C3=B6rnhammar?= Date: Sun, 26 Jan 2014 21:42:18 +0100 Subject: [PATCH 052/128] bully, a wpa/wpa2 passphrase retriever from wps enabled devices --- pkgs/tools/networking/bully/default.nix | 28 +++++++++++++++++++++++++ pkgs/top-level/all-packages.nix | 2 ++ 2 files changed, 30 insertions(+) create mode 100644 pkgs/tools/networking/bully/default.nix diff --git a/pkgs/tools/networking/bully/default.nix b/pkgs/tools/networking/bully/default.nix new file mode 100644 index 000000000000..f667d772ac44 --- /dev/null +++ b/pkgs/tools/networking/bully/default.nix @@ -0,0 +1,28 @@ +{stdenv, fetchurl, openssl, libpcap}: + +stdenv.mkDerivation rec { + name = "bully-${version}"; + version = "1.0-22"; + src = fetchurl { + url = "https://github.com/bdpurcell/bully/archive/v${version}.tar.gz"; + sha256 = "72f568f659fdcf70455a17f91f25dde65a53431c67c796517d3d3c4a4703ab68"; + }; + buildInputs = [ openssl libpcap ]; + + buildPhase = '' + cd src + make + ''; + + installPhase = '' + mkdir -p $out/bin + mv bully $out/bin + ''; + + meta = { + description = "Retrieve WPA/WPA2 passphrase from a WPS enabled access point."; + homepage = "https://github.com/bdpurcell/bully"; + maintainers = [ stdenv.lib.maintainers.edwtjo ]; + license = stdenv.lib.licenses.gpl3; + }; +} \ No newline at end of file diff --git a/pkgs/top-level/all-packages.nix b/pkgs/top-level/all-packages.nix index e076230672c0..de32281b89b7 100644 --- a/pkgs/top-level/all-packages.nix +++ b/pkgs/top-level/all-packages.nix @@ -1619,6 +1619,8 @@ let briss = callPackage ../tools/graphics/briss { }; + bully = callPackage ../tools/networking/bully { }; + pdnsd = callPackage ../tools/networking/pdnsd { }; pg_top = callPackage ../tools/misc/pg_top { }; From 83acdb6f8727290e7199a08cc22a05582932c989 Mon Sep 17 00:00:00 2001 From: Petr Rockai Date: Wed, 29 Jan 2014 22:11:35 +0100 Subject: [PATCH 053/128] dictd-wiktionary: Update to a more recent dump. --- pkgs/servers/dict/dictd-wiktionary.nix | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/pkgs/servers/dict/dictd-wiktionary.nix b/pkgs/servers/dict/dictd-wiktionary.nix index 48aaf187605e..9e9c05d2f915 100644 --- a/pkgs/servers/dict/dictd-wiktionary.nix +++ b/pkgs/servers/dict/dictd-wiktionary.nix @@ -1,11 +1,11 @@ {stdenv, fetchurl, python, dict, glibcLocales, writeScript}: stdenv.mkDerivation rec { - version = "20121021"; + version = "20140118"; name = "dict-db-wiktionary-${version}"; data = fetchurl { url = "http://dumps.wikimedia.org/enwiktionary/${version}/enwiktionary-${version}-pages-articles.xml.bz2"; - sha256 = "1i4xwdpc2bx58495iy62iz0kn50c3qmnh4qribi82f2rd4qkfjd2"; + sha256 = "892c9fc16b248a31e2d3e42590267161c1b899b31fe923eb1ede1deb6d24cfa8"; }; convert = ./wiktionary2dict.py; From 81622220713ca0871362703bc9e8c69ba5996e0e Mon Sep 17 00:00:00 2001 From: Petr Rockai Date: Wed, 29 Jan 2014 18:49:44 +0100 Subject: [PATCH 054/128] dictd: Update to latest upstream (0.12.1). --- pkgs/servers/dict/buildfix.diff | 11 +++++++++++ pkgs/servers/dict/default.nix | 21 ++++++++++++--------- pkgs/top-level/all-packages.nix | 4 +++- 3 files changed, 26 insertions(+), 10 deletions(-) create mode 100644 pkgs/servers/dict/buildfix.diff diff --git a/pkgs/servers/dict/buildfix.diff b/pkgs/servers/dict/buildfix.diff new file mode 100644 index 000000000000..e30fcb2b0380 --- /dev/null +++ b/pkgs/servers/dict/buildfix.diff @@ -0,0 +1,11 @@ +--- Makefile.in~ 2011-03-06 18:52:54.000000000 +0100 ++++ Makefile.in 2014-01-29 19:04:51.384844897 +0100 +@@ -123,7 +123,7 @@ + + %: %.o + $(LIBTOOL) --tag=CC --mode=link $(CC) -o $@ -static \ +- $^ $(OBJS) $(LDFLAGS) -lz ${LIBS} ++ $(^:.o=.lo) $(OBJS) $(LDFLAGS) -lz ${LIBS} + + include $(srcdir)/deps + diff --git a/pkgs/servers/dict/default.nix b/pkgs/servers/dict/default.nix index 51de674eb9f7..1fb7c24418f0 100644 --- a/pkgs/servers/dict/default.nix +++ b/pkgs/servers/dict/default.nix @@ -1,19 +1,22 @@ -{ stdenv, fetchurl, which, bison, flex }: +{ stdenv, fetchurl, which, bison, flex, libmaa, zlib, libtool }: -stdenv.mkDerivation { - name = "dictd-1.9.15"; +stdenv.mkDerivation rec { + version = "1.12.1"; + name = "dictd-${version}"; src = fetchurl { - url = mirror://sourceforge/dict/dictd-1.9.15.tar.gz; - sha256 = "0p41yf72l0igmshz6vxy3hm51z25600vrnb9j2jpgws4c03fqnac"; + url = "mirror://sourceforge/dict/dictd-${version}.tar.gz"; + sha256 = "0min6v60b6z5mrymyjfwzx8nv6rdm8pd8phlwl6v2jl5vkngcdx2"; }; - buildInputs = [ flex bison which ]; - + buildInputs = [ flex bison which libmaa zlib libtool ]; + + patchPhase = "patch -p0 < ${./buildfix.diff}"; configureFlags = "--datadir=/var/run/current-system/share/dictd"; - meta = { + meta = with stdenv.lib; { description = "Dict protocol server and client"; - maintainers = with stdenv.lib.maintainers; mornfall; + maintainers = maintainers.mornfall; + platforms = platforms.linux; }; } diff --git a/pkgs/top-level/all-packages.nix b/pkgs/top-level/all-packages.nix index de32281b89b7..22cf0c516807 100644 --- a/pkgs/top-level/all-packages.nix +++ b/pkgs/top-level/all-packages.nix @@ -6102,7 +6102,9 @@ let dico = callPackage ../servers/dico { }; - dict = callPackage ../servers/dict { }; + dict = callPackage ../servers/dict { + libmaa = callPackage ../servers/dict/libmaa.nix {}; + }; dictdDBs = recurseIntoAttrs (import ../servers/dict/dictd-db.nix { inherit builderDefs; From a412cdeb91fbb0862e343384679397a37fcf29da Mon Sep 17 00:00:00 2001 From: Pascal Wittmann Date: Wed, 29 Jan 2014 23:39:58 +0100 Subject: [PATCH 055/128] Disabled tests because a running CouchDB server is needed and they currently don't compile. The latter should be fixed with PR arjunguha/haskell-couchdb#13. --- pkgs/development/libraries/haskell/CouchDB/default.nix | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/pkgs/development/libraries/haskell/CouchDB/default.nix b/pkgs/development/libraries/haskell/CouchDB/default.nix index 4a413e2e7b85..d2e66c438e19 100644 --- a/pkgs/development/libraries/haskell/CouchDB/default.nix +++ b/pkgs/development/libraries/haskell/CouchDB/default.nix @@ -6,6 +6,10 @@ cabal.mkDerivation (self: { sha256 = "0a9g0iblfyqppcy1ni3ac8f3yv5km95bfblhwqlsk6khydi5ka98"; buildDepends = [ HTTP json mtl network utf8String ]; testDepends = [ HTTP HUnit json mtl network utf8String ]; + + # Disabled tests because a running CouchDB server is needed. + doCheck = false; + meta = { homepage = "http://github.com/arjunguha/haskell-couchdb/"; description = "CouchDB interface"; From f93acdf3acdeb202f66ddee3f912e666f31a122e Mon Sep 17 00:00:00 2001 From: Peter Simons Date: Thu, 30 Jan 2014 08:28:08 +0100 Subject: [PATCH 056/128] haskell-CouchDB: re-generate with cabal2nix --- pkgs/development/libraries/haskell/CouchDB/default.nix | 3 --- 1 file changed, 3 deletions(-) diff --git a/pkgs/development/libraries/haskell/CouchDB/default.nix b/pkgs/development/libraries/haskell/CouchDB/default.nix index d2e66c438e19..ac8ab3d77286 100644 --- a/pkgs/development/libraries/haskell/CouchDB/default.nix +++ b/pkgs/development/libraries/haskell/CouchDB/default.nix @@ -6,10 +6,7 @@ cabal.mkDerivation (self: { sha256 = "0a9g0iblfyqppcy1ni3ac8f3yv5km95bfblhwqlsk6khydi5ka98"; buildDepends = [ HTTP json mtl network utf8String ]; testDepends = [ HTTP HUnit json mtl network utf8String ]; - - # Disabled tests because a running CouchDB server is needed. doCheck = false; - meta = { homepage = "http://github.com/arjunguha/haskell-couchdb/"; description = "CouchDB interface"; From d2a2a2628e994d909cefd7e16c0bf2662dc15c36 Mon Sep 17 00:00:00 2001 From: Peter Simons Date: Thu, 30 Jan 2014 08:32:38 +0100 Subject: [PATCH 057/128] haskell-adjunctions: add version 4.0.1 --- .../libraries/haskell/adjunctions/default.nix | 19 +++++++++++++++++++ pkgs/top-level/haskell-packages.nix | 2 ++ 2 files changed, 21 insertions(+) create mode 100644 pkgs/development/libraries/haskell/adjunctions/default.nix diff --git a/pkgs/development/libraries/haskell/adjunctions/default.nix b/pkgs/development/libraries/haskell/adjunctions/default.nix new file mode 100644 index 000000000000..bdfec2f01d49 --- /dev/null +++ b/pkgs/development/libraries/haskell/adjunctions/default.nix @@ -0,0 +1,19 @@ +{ cabal, comonad, contravariant, distributive, free, mtl +, semigroupoids, semigroups, tagged, transformers, void +}: + +cabal.mkDerivation (self: { + pname = "adjunctions"; + version = "4.0.1"; + sha256 = "0z13rmh9yp8jg2jzj3bmysqc4h2nblshx125h2sx51wllnvxzh5l"; + buildDepends = [ + comonad contravariant distributive free mtl semigroupoids + semigroups tagged transformers void + ]; + meta = { + homepage = "http://github.com/ekmett/adjunctions/"; + description = "Adjunctions and representable functors"; + license = self.stdenv.lib.licenses.bsd3; + platforms = self.ghc.meta.platforms; + }; +}) diff --git a/pkgs/top-level/haskell-packages.nix b/pkgs/top-level/haskell-packages.nix index 35c063888668..26c7ec2aa303 100644 --- a/pkgs/top-level/haskell-packages.nix +++ b/pkgs/top-level/haskell-packages.nix @@ -522,6 +522,8 @@ let result = let callPackage = x : y : modifyPrio (newScope result.finalReturn x abstractPar = callPackage ../development/libraries/haskell/abstract-par {}; + adjunctions = callPackage ../development/libraries/haskell/adjunctions {}; + aeson_0_6_2_1 = callPackage ../development/libraries/haskell/aeson/0.6.2.1.nix {}; aeson_0_7_0_0 = callPackage ../development/libraries/haskell/aeson/0.7.0.0.nix {}; aeson = self.aeson_0_6_2_1; From 1124a4ab08644cb1cbd4c9738ebb75984d54c62b Mon Sep 17 00:00:00 2001 From: Peter Simons Date: Thu, 30 Jan 2014 08:32:41 +0100 Subject: [PATCH 058/128] haskell-git-annex: update to version 5.20140129 --- .../git-and-tools/git-annex/default.nix | 19 ++++++++++--------- 1 file changed, 10 insertions(+), 9 deletions(-) diff --git a/pkgs/applications/version-management/git-and-tools/git-annex/default.nix b/pkgs/applications/version-management/git-and-tools/git-annex/default.nix index 6a4272101b35..7a8d69952658 100644 --- a/pkgs/applications/version-management/git-and-tools/git-annex/default.nix +++ b/pkgs/applications/version-management/git-and-tools/git-annex/default.nix @@ -7,16 +7,16 @@ , network, networkConduit, networkInfo, networkMulticast , networkProtocolXmpp, openssh, optparseApplicative, perl , QuickCheck, random, regexTdfa, rsync, SafeSemaphore, SHA, stm -, tasty, tastyHunit, tastyQuickcheck, text, time, transformers -, unixCompat, utf8String, uuid, wai, waiLogger, warp, which -, xmlConduit, xmlTypes, yesod, yesodCore, yesodDefault, yesodForm -, yesodStatic +, tasty, tastyHunit, tastyQuickcheck, tastyRerun, text, time +, transformers, unixCompat, utf8String, uuid, wai, waiLogger, warp +, which, xmlConduit, xmlTypes, yesod, yesodCore, yesodDefault +, yesodForm, yesodStatic }: cabal.mkDerivation (self: { pname = "git-annex"; - version = "5.20140127"; - sha256 = "0aqqnv0faiva9vf0nb0d8xsd659y8cyrnyy6mfjdqjqdw8wha3yr"; + version = "5.20140129"; + sha256 = "0m1n3m16gvd0693i5xq5adki0hd0wdn7p5vqjxkqnc3imx9f11ng"; isLibrary = false; isExecutable = true; buildDepends = [ @@ -27,9 +27,10 @@ cabal.mkDerivation (self: { MissingH MonadCatchIOTransformers monadControl mtl network networkConduit networkInfo networkMulticast networkProtocolXmpp optparseApplicative QuickCheck random regexTdfa SafeSemaphore SHA - stm tasty tastyHunit tastyQuickcheck text time transformers - unixCompat utf8String uuid wai waiLogger warp xmlConduit xmlTypes - yesod yesodCore yesodDefault yesodForm yesodStatic + stm tasty tastyHunit tastyQuickcheck tastyRerun text time + transformers unixCompat utf8String uuid wai waiLogger warp + xmlConduit xmlTypes yesod yesodCore yesodDefault yesodForm + yesodStatic ]; buildTools = [ bup curl git gnupg1 lsof openssh perl rsync which ]; configureFlags = "-fS3 From f5578e8b8eb32dfed7d203a7f210bf2cb8deebd7 Mon Sep 17 00:00:00 2001 From: Peter Simons Date: Thu, 30 Jan 2014 08:32:43 +0100 Subject: [PATCH 059/128] haskell-HList: update to version 0.3.1.0 --- pkgs/development/libraries/haskell/HList/default.nix | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/pkgs/development/libraries/haskell/HList/default.nix b/pkgs/development/libraries/haskell/HList/default.nix index 99cb73dcf1f1..ae6f8e435f7e 100644 --- a/pkgs/development/libraries/haskell/HList/default.nix +++ b/pkgs/development/libraries/haskell/HList/default.nix @@ -4,8 +4,8 @@ cabal.mkDerivation (self: { pname = "HList"; - version = "0.3.0.1"; - sha256 = "03mp99pb8whh3whyffyj8wbld8lv8i930dyjdpyfwiaj13x05iy4"; + version = "0.3.1.0"; + sha256 = "1cq7l7cv62jf47s75ycsgxg75kkrgnnrpb6y22cskc97hkfsnjmk"; buildDepends = [ mtl ]; testDepends = [ cmdargs doctest filepath hspec lens mtl syb ]; buildTools = [ diffutils ]; From 969d4a3be2ecde79c34ec64e75a8d38efbed91de Mon Sep 17 00:00:00 2001 From: Peter Simons Date: Thu, 30 Jan 2014 08:32:44 +0100 Subject: [PATCH 060/128] haskell-ekg: update to version 0.3.1.4 --- pkgs/development/libraries/haskell/ekg/default.nix | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/pkgs/development/libraries/haskell/ekg/default.nix b/pkgs/development/libraries/haskell/ekg/default.nix index dd3c40a7d2c6..28ef546163a5 100644 --- a/pkgs/development/libraries/haskell/ekg/default.nix +++ b/pkgs/development/libraries/haskell/ekg/default.nix @@ -4,8 +4,8 @@ cabal.mkDerivation (self: { pname = "ekg"; - version = "0.3.1.3"; - sha256 = "1d8ly1lc92gh26bdqg3ql6n2iai3nyvwic6sj8pani58iv0p4ppc"; + version = "0.3.1.4"; + sha256 = "0hr9962yx463rq53xfqfm7vlv9izn47v3css3m6n4v694qlyz95i"; buildDepends = [ aeson filepath network snapCore snapServer text time transformers unorderedContainers From 3e51d2237a5377917ae12be904c2c5eefaa58e24 Mon Sep 17 00:00:00 2001 From: Peter Simons Date: Thu, 30 Jan 2014 08:32:46 +0100 Subject: [PATCH 061/128] haskell-free: update to version 4.4 --- pkgs/development/libraries/haskell/free/default.nix | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/pkgs/development/libraries/haskell/free/default.nix b/pkgs/development/libraries/haskell/free/default.nix index a481d4519734..4e679da1bdb0 100644 --- a/pkgs/development/libraries/haskell/free/default.nix +++ b/pkgs/development/libraries/haskell/free/default.nix @@ -4,8 +4,8 @@ cabal.mkDerivation (self: { pname = "free"; - version = "4.2"; - sha256 = "0g2k36xqma8r6shrih40w5xv0pgs5ldr9lhc5hjpwmh4n3hgdhfb"; + version = "4.4"; + sha256 = "19c6zy7gxsd121g1kny9y8rv33gsxv3kfsi37iyn6q0p8r38wbcy"; buildDepends = [ bifunctors comonad distributive mtl profunctors semigroupoids semigroups transformers From d82430a903243ae4e98e29d4cd4380461dd3978e Mon Sep 17 00:00:00 2001 From: Peter Simons Date: Thu, 30 Jan 2014 08:32:48 +0100 Subject: [PATCH 062/128] haskell-hit: update to version 0.5.4 --- pkgs/development/libraries/haskell/hit/default.nix | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/pkgs/development/libraries/haskell/hit/default.nix b/pkgs/development/libraries/haskell/hit/default.nix index 0c4020f746c3..4dc73996cd13 100644 --- a/pkgs/development/libraries/haskell/hit/default.nix +++ b/pkgs/development/libraries/haskell/hit/default.nix @@ -6,8 +6,8 @@ cabal.mkDerivation (self: { pname = "hit"; - version = "0.5.3"; - sha256 = "0s6nfjdasf62x28vzks809slnh0p6j3g101jzqlfh7nrnj5k6q1d"; + version = "0.5.4"; + sha256 = "1gr2f1bzncg8zlxk343p1ifnf2a2px000syzmr7hcf4yhhfavrhz"; isLibrary = true; isExecutable = true; buildDepends = [ From 3b21991fddb20d071c306a5b4c7ea98c0f846d16 Mon Sep 17 00:00:00 2001 From: Peter Simons Date: Thu, 30 Jan 2014 08:32:50 +0100 Subject: [PATCH 063/128] haskell-http-client-tls: update to version 0.2.0.3 --- .../development/libraries/haskell/http-client-tls/default.nix | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/pkgs/development/libraries/haskell/http-client-tls/default.nix b/pkgs/development/libraries/haskell/http-client-tls/default.nix index 82866abe9c35..201e1e115645 100644 --- a/pkgs/development/libraries/haskell/http-client-tls/default.nix +++ b/pkgs/development/libraries/haskell/http-client-tls/default.nix @@ -4,8 +4,8 @@ cabal.mkDerivation (self: { pname = "http-client-tls"; - version = "0.2.0.2"; - sha256 = "0v5730rssddc28f1q6ndkcjrfz8r5a1wmxk1azpmdxlq6nh4i9q9"; + version = "0.2.0.3"; + sha256 = "0v8zbwlvdmkap5qbw9aw75krvw8j4q90fn301al13azzgjp71gmb"; buildDepends = [ connection dataDefault httpClient network tls ]; testDepends = [ hspec httpClient httpTypes ]; doCheck = false; From ab713366f21a17384f7a0f1ebab5a12b734a2950 Mon Sep 17 00:00:00 2001 From: Peter Simons Date: Thu, 30 Jan 2014 08:32:53 +0100 Subject: [PATCH 064/128] haskell-linear: update to version 1.6 --- .../libraries/haskell/linear/default.nix | 17 +++++++++-------- 1 file changed, 9 insertions(+), 8 deletions(-) diff --git a/pkgs/development/libraries/haskell/linear/default.nix b/pkgs/development/libraries/haskell/linear/default.nix index a358528ee28c..a0d1e67ee6f3 100644 --- a/pkgs/development/libraries/haskell/linear/default.nix +++ b/pkgs/development/libraries/haskell/linear/default.nix @@ -1,16 +1,17 @@ -{ cabal, binary, distributive, doctest, filepath, hashable, HUnit -, lens, reflection, semigroupoids, semigroups, simpleReflect -, tagged, testFramework, testFrameworkHunit, transformers -, unorderedContainers, vector +{ cabal, adjunctions, binary, distributive, doctest, filepath +, hashable, HUnit, lens, reflection, semigroupoids, semigroups +, simpleReflect, tagged, testFramework, testFrameworkHunit +, transformers, unorderedContainers, vector, void }: cabal.mkDerivation (self: { pname = "linear"; - version = "1.4"; - sha256 = "1a2l68q0l2vlp4wpf5wqvpnag326s38k2ifh8hcfczjhsg9cq45a"; + version = "1.6"; + sha256 = "1aka0da4mwv9cdj76armlava0d4c5f8s2pv10fk6b5glyb0c1a7x"; buildDepends = [ - binary distributive hashable reflection semigroupoids semigroups - tagged transformers unorderedContainers vector + adjunctions binary distributive hashable lens reflection + semigroupoids semigroups tagged transformers unorderedContainers + vector void ]; testDepends = [ binary doctest filepath HUnit lens simpleReflect testFramework From e9dcfd8527d17227d7505bc5f8788c29794d7b87 Mon Sep 17 00:00:00 2001 From: Peter Simons Date: Thu, 30 Jan 2014 08:32:55 +0100 Subject: [PATCH 065/128] haskell-reflection: update to version 1.4 --- pkgs/development/libraries/haskell/reflection/default.nix | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/pkgs/development/libraries/haskell/reflection/default.nix b/pkgs/development/libraries/haskell/reflection/default.nix index 5f227d60ca80..a02a7ec69075 100644 --- a/pkgs/development/libraries/haskell/reflection/default.nix +++ b/pkgs/development/libraries/haskell/reflection/default.nix @@ -2,8 +2,8 @@ cabal.mkDerivation (self: { pname = "reflection"; - version = "1.3.2"; - sha256 = "0jmdygvmvhw20aqjk7k0jah93ggfgf2bgq5zpwnz9bwgi9gs17x6"; + version = "1.4"; + sha256 = "0i6yb3fa9wizyaz8x9b7yzkw9jf7zahdrkr2y0iw7igdxqn4n0k7"; buildDepends = [ tagged ]; meta = { homepage = "http://github.com/ekmett/reflection"; From 5f0fa99020c1ee567991c30d3d174ab6b8bf8849 Mon Sep 17 00:00:00 2001 From: Peter Simons Date: Thu, 30 Jan 2014 08:32:56 +0100 Subject: [PATCH 066/128] haskell-unbound: update to version 0.4.3 --- pkgs/development/libraries/haskell/unbound/default.nix | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/pkgs/development/libraries/haskell/unbound/default.nix b/pkgs/development/libraries/haskell/unbound/default.nix index df57bbbdac70..4667ed956f09 100644 --- a/pkgs/development/libraries/haskell/unbound/default.nix +++ b/pkgs/development/libraries/haskell/unbound/default.nix @@ -1,10 +1,10 @@ -{ cabal, mtl, RepLib, transformers }: +{ cabal, binary, mtl, RepLib, transformers }: cabal.mkDerivation (self: { pname = "unbound"; - version = "0.4.2"; - sha256 = "1bnnnv4rmzb0pw7i56nzr7k7pahr9rcmlfi4xkpsjhrxmizcfml9"; - buildDepends = [ mtl RepLib transformers ]; + version = "0.4.3"; + sha256 = "1lv60zpsvjfp9qnckwbphkfv0x9pz2qvaab3p4kj38fnlq2y20i4"; + buildDepends = [ binary mtl RepLib transformers ]; meta = { homepage = "http://code.google.com/p/replib/"; description = "Generic support for programming with names and binders"; From 98b2f63e71471bf4c22d6ee1846ef6bf7b1dfeb3 Mon Sep 17 00:00:00 2001 From: Peter Simons Date: Thu, 30 Jan 2014 08:32:58 +0100 Subject: [PATCH 067/128] haskell-wai-extra: update to version 2.0.3.3 --- pkgs/development/libraries/haskell/wai-extra/default.nix | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/pkgs/development/libraries/haskell/wai-extra/default.nix b/pkgs/development/libraries/haskell/wai-extra/default.nix index 3022b0565de2..f3d2dfbd0cdf 100644 --- a/pkgs/development/libraries/haskell/wai-extra/default.nix +++ b/pkgs/development/libraries/haskell/wai-extra/default.nix @@ -7,8 +7,8 @@ cabal.mkDerivation (self: { pname = "wai-extra"; - version = "2.0.3.2"; - sha256 = "0zhwk78ny7ak6sf974gqg3zjrrmivgb7dvxs5jbqghq0a6xs97zi"; + version = "2.0.3.3"; + sha256 = "11ma8pazvysvpiy8y7xfh7kpmsfiw94bd6vyyi3ji8q71rzjlf62"; buildDepends = [ ansiTerminal base64Bytestring blazeBuilder blazeBuilderConduit caseInsensitive conduit dataDefault fastLogger httpTypes liftedBase From e28c0da32e87f4c957d1e5312e56930686bc0d12 Mon Sep 17 00:00:00 2001 From: Rickard Nilsson Date: Thu, 30 Jan 2014 12:26:11 +0100 Subject: [PATCH 068/128] sane-backends: Add extra source url It seems alioth.debian.org has some problem (login needed for download), so I've added a pkgs.fedoraproject.org url. --- pkgs/applications/graphics/sane/backends.nix | 5 ++++- 1 file changed, 4 insertions(+), 1 deletion(-) diff --git a/pkgs/applications/graphics/sane/backends.nix b/pkgs/applications/graphics/sane/backends.nix index 3b5077a14e2a..3d95dcd81ee8 100644 --- a/pkgs/applications/graphics/sane/backends.nix +++ b/pkgs/applications/graphics/sane/backends.nix @@ -12,7 +12,10 @@ stdenv.mkDerivation rec { name = "sane-backends-${version}"; src = fetchurl { - url = "https://alioth.debian.org/frs/download.php/file/3958/${name}.tar.gz"; + urls = [ + "http://pkgs.fedoraproject.org/repo/pkgs/sane-backends/sane-backends-1.0.24.tar.gz/1ca68e536cd7c1852322822f5f6ac3a4/${name}.tar.gz" + "https://alioth.debian.org/frs/download.php/file/3958/${name}.tar.gz" + ]; curlOpts = "--insecure"; sha256 = "0ba68m6bzni54axjk15i51rya7hfsdliwvqyan5msl7iaid0iir7"; }; From b5e11465c9b9f62ca92d93d0cf4e8da641e6337e Mon Sep 17 00:00:00 2001 From: Rickard Nilsson Date: Thu, 30 Jan 2014 12:28:20 +0100 Subject: [PATCH 069/128] obnam: Update to 1.6.1 --- pkgs/tools/backup/obnam/default.nix | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/pkgs/tools/backup/obnam/default.nix b/pkgs/tools/backup/obnam/default.nix index f6a51eb31931..854801a3edd2 100644 --- a/pkgs/tools/backup/obnam/default.nix +++ b/pkgs/tools/backup/obnam/default.nix @@ -2,13 +2,13 @@ pythonPackages.buildPythonPackage rec { name = "obnam-${version}"; - version = "1.6"; + version = "1.6.1"; namePrefix = ""; src = fetchurl rec { url = "http://code.liw.fi/debian/pool/main/o/obnam/obnam_${version}.orig.tar.gz"; - sha256 = "1vg0kppbyngvm7wi2pbg3himixy9v3h8z66lcps6pclw43s1kgpm"; + sha256 = "0415njniqpy3xhvibpm82i9alrp2fw3lsnm15h7vqkkvgp8s5g39"; }; buildInputs = [ pythonPackages.sphinx attr ]; From 48fb891646dbce4ef0a4cc4c827e4bf3ff17bd0c Mon Sep 17 00:00:00 2001 From: Rickard Nilsson Date: Thu, 30 Jan 2014 12:28:57 +0100 Subject: [PATCH 070/128] mkpasswd: Update to 5.1.1 --- pkgs/tools/security/mkpasswd/default.nix | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/pkgs/tools/security/mkpasswd/default.nix b/pkgs/tools/security/mkpasswd/default.nix index b27707a00159..624fcdbe6c6a 100644 --- a/pkgs/tools/security/mkpasswd/default.nix +++ b/pkgs/tools/security/mkpasswd/default.nix @@ -4,11 +4,11 @@ stdenv.mkDerivation rec { name = "mkpasswd-${version}"; - version = "5.0.26"; + version = "5.1.1"; src = fetchurl { url = "http://ftp.debian.org/debian/pool/main/w/whois/whois_${version}.tar.xz"; - sha256 = "729625ef81425f4771e06492bb4f3e9f24bff75b8176044ce8d2f605f7ad6af5"; + sha256 = "0i06a9mb9qcq272782mg6dffv3k7bqkw4cdr31yrc0s6jqylryv9"; }; preConfigure = '' From 8893f10d6a60a6e9f8c86b3a6194154c9a7831f7 Mon Sep 17 00:00:00 2001 From: Eelco Dolstra Date: Thu, 30 Jan 2014 13:41:17 +0100 Subject: [PATCH 071/128] ghc: Fix building on Darwin http://hydra.nixos.org/build/8598783 --- pkgs/development/compilers/ghc/7.6.3.nix | 1 + 1 file changed, 1 insertion(+) diff --git a/pkgs/development/compilers/ghc/7.6.3.nix b/pkgs/development/compilers/ghc/7.6.3.nix index c0933b2a961e..1839c982e991 100644 --- a/pkgs/development/compilers/ghc/7.6.3.nix +++ b/pkgs/development/compilers/ghc/7.6.3.nix @@ -21,6 +21,7 @@ stdenv.mkDerivation rec { preConfigure = '' echo "${buildMK}" > mk/build.mk sed -i -e 's|-isysroot /Developer/SDKs/MacOSX10.5.sdk||' configure + '' + stdenv.lib.optionalString (!stdenv.isDarwin) '' export NIX_LDFLAGS="$NIX_LDFLAGS -rpath $out/lib/ghc-${version}" ''; From e8a401a0c9d062d3ade7e02272e7d06a1eda06ff Mon Sep 17 00:00:00 2001 From: Eelco Dolstra Date: Wed, 29 Jan 2014 11:57:08 +0100 Subject: [PATCH 072/128] llvm-3.4: Only build on Linux It doesn't build on Darwin because it depends on Valgrind: http://hydra.nixos.org/build/8616143/nixlog/1/raw --- pkgs/development/compilers/llvm/3.4/llvm.nix | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/pkgs/development/compilers/llvm/3.4/llvm.nix b/pkgs/development/compilers/llvm/3.4/llvm.nix index 4947bdca2a96..9ee63ee319f1 100644 --- a/pkgs/development/compilers/llvm/3.4/llvm.nix +++ b/pkgs/development/compilers/llvm/3.4/llvm.nix @@ -50,6 +50,6 @@ in stdenv.mkDerivation rec { homepage = http://llvm.org/; license = stdenv.lib.licenses.bsd3; maintainers = with stdenv.lib.maintainers; [ shlevy lovek323 raskin viric ]; - platforms = stdenv.lib.platforms.all; + platforms = stdenv.lib.platforms.linux; }; } From 82359bba65814a858c60aff5cdffdae3e76ff5c3 Mon Sep 17 00:00:00 2001 From: Eelco Dolstra Date: Thu, 30 Jan 2014 13:57:16 +0100 Subject: [PATCH 073/128] python-3.3: Only build on Linux It doesn't build on Darwin: http://hydra.nixos.org/build/8597946 --- pkgs/development/interpreters/python/3.3/default.nix | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/pkgs/development/interpreters/python/3.3/default.nix b/pkgs/development/interpreters/python/3.3/default.nix index 36cb8158506f..84cb9dd141ab 100644 --- a/pkgs/development/interpreters/python/3.3/default.nix +++ b/pkgs/development/interpreters/python/3.3/default.nix @@ -69,8 +69,8 @@ stdenv.mkDerivation { enableParallelBuilding = true; meta = { - homepage = "http://python.org"; - description = "a high-level dynamically-typed programming language"; + homepage = http://python.org; + description = "A high-level dynamically-typed programming language"; longDescription = '' Python is a remarkably powerful dynamic programming language that is used in a wide variety of application domains. Some of its key @@ -81,7 +81,7 @@ stdenv.mkDerivation { high level dynamic data types. ''; license = stdenv.lib.licenses.psfl; - platforms = stdenv.lib.platforms.all; + platforms = stdenv.lib.platforms.linux; maintainers = with stdenv.lib.maintainers; [ simons chaoflow ]; }; } From cdd86c7875c7e31b69d1a859c0f8c6a9deb3266f Mon Sep 17 00:00:00 2001 From: Shea Levy Date: Thu, 30 Jan 2014 09:54:54 -0500 Subject: [PATCH 074/128] Add annotated-wl-pprint haskellPackage Signed-off-by: Shea Levy --- .../haskell/annotated-wl-pprint/default.nix | 13 +++++++++++++ pkgs/top-level/haskell-packages.nix | 2 ++ 2 files changed, 15 insertions(+) create mode 100644 pkgs/development/libraries/haskell/annotated-wl-pprint/default.nix diff --git a/pkgs/development/libraries/haskell/annotated-wl-pprint/default.nix b/pkgs/development/libraries/haskell/annotated-wl-pprint/default.nix new file mode 100644 index 000000000000..f084fda35c57 --- /dev/null +++ b/pkgs/development/libraries/haskell/annotated-wl-pprint/default.nix @@ -0,0 +1,13 @@ +{ cabal }: + +cabal.mkDerivation (self: { + pname = "annotated-wl-pprint"; + version = "0.5.3"; + sha256 = "0g8b4hmgh7jhiknfrlaqr9sxr7a6sikkpaws15dy8mg4r792bbis"; + meta = { + homepage = "https://github.com/david-christiansen/annotated-wl-pprint"; + description = "The Wadler/Leijen Pretty Printer, with annotation support"; + license = self.stdenv.lib.licenses.bsd3; + platforms = self.ghc.meta.platforms; + }; +}) diff --git a/pkgs/top-level/haskell-packages.nix b/pkgs/top-level/haskell-packages.nix index 26c7ec2aa303..ae55febf893b 100644 --- a/pkgs/top-level/haskell-packages.nix +++ b/pkgs/top-level/haskell-packages.nix @@ -542,6 +542,8 @@ let result = let callPackage = x : y : modifyPrio (newScope result.finalReturn x amqp = callPackage ../development/libraries/haskell/amqp {}; + annotatedWlPprint = callPackage ../development/libraries/haskell/annotated-wl-pprint {}; + appar = callPackage ../development/libraries/haskell/appar {}; ansiTerminal = callPackage ../development/libraries/haskell/ansi-terminal {}; From c27148d65038ec3e661b88daf7c9e2da395e9a19 Mon Sep 17 00:00:00 2001 From: Linquize Date: Thu, 30 Jan 2014 15:38:34 +0100 Subject: [PATCH 075/128] Add libcangjie --- lib/maintainers.nix | 1 + .../libraries/libcangjie/default.nix | 32 +++++++++++++++++++ pkgs/top-level/all-packages.nix | 2 ++ 3 files changed, 35 insertions(+) create mode 100644 pkgs/development/libraries/libcangjie/default.nix diff --git a/lib/maintainers.nix b/lib/maintainers.nix index 5e55b64ffa9f..fa0d1d81e611 100644 --- a/lib/maintainers.nix +++ b/lib/maintainers.nix @@ -34,6 +34,7 @@ jcumming = "Jack Cummings "; kkallio = "Karn Kallio "; ktosiek = "Tomasz Kontusz "; + linquize = "Linquize "; lovek323 = "Jason O'Conal "; ludo = "Ludovic Courtès "; madjar = "Georges Dubus "; diff --git a/pkgs/development/libraries/libcangjie/default.nix b/pkgs/development/libraries/libcangjie/default.nix new file mode 100644 index 000000000000..695c0fa1a325 --- /dev/null +++ b/pkgs/development/libraries/libcangjie/default.nix @@ -0,0 +1,32 @@ +{ stdenv, autoconf, automake, libtool, m4, fetchurl, bash, pkgconfig, sqlite }: + +stdenv.mkDerivation rec { + name = "libcangjie-1.0"; + + src = fetchurl { + url = "https://github.com/Cangjians/libcangjie/archive/v1.0.tar.gz"; + sha256 = "15la1pxa2fvhznlbkl32qp2cgd602bvrx2zmahybypbfik0cgqk1"; + }; + + buildInputs = [ automake autoconf libtool m4 pkgconfig sqlite ]; + + configureScript = "./autogen.sh"; + + preConfigure = '' + find . -name '*.sh' -exec sed -e 's@#!/bin/bash@${bash}/bin/bash@' -i '{}' ';' + ''; + + doCheck = true; + + meta = { + description = "A C library implementing the Cangjie input method"; + longDescription = '' + libcangjie is a library implementing the Cangjie input method. + ''; + homepage = http://cangjians.github.io/projects/libcangjie/; + license = "LGPLv3+"; + + maintainers = [ stdenv.lib.maintainers.linquize ]; + platforms = stdenv.lib.platforms.all; + }; +} diff --git a/pkgs/top-level/all-packages.nix b/pkgs/top-level/all-packages.nix index 22cf0c516807..a1fb93285e03 100644 --- a/pkgs/top-level/all-packages.nix +++ b/pkgs/top-level/all-packages.nix @@ -4583,6 +4583,8 @@ let inherit (gnome3) libcroco; + libcangjie = callPackage ../development/libraries/libcangjie { }; + libctemplate = callPackage ../development/libraries/libctemplate { }; libcue = callPackage ../development/libraries/libcue { }; From e5af7f79d55afaf4fcb49f0447eaa48517742a13 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Benno=20F=C3=BCnfst=C3=BCck?= Date: Sat, 11 Jan 2014 13:28:12 +0100 Subject: [PATCH 076/128] gupnp-tools and releated packages: fix and update --- pkgs/development/libraries/gssdp/default.nix | 4 ++-- .../libraries/gupnp-av/default.nix | 20 +++++++++++++++++++ pkgs/development/libraries/gupnp/default.nix | 16 ++++++++++++--- .../development/libraries/libsoup/default.nix | 13 ++++++------ pkgs/tools/networking/gupnp-tools/default.nix | 13 ++++++++---- pkgs/top-level/all-packages.nix | 4 +++- 6 files changed, 54 insertions(+), 16 deletions(-) create mode 100644 pkgs/development/libraries/gupnp-av/default.nix diff --git a/pkgs/development/libraries/gssdp/default.nix b/pkgs/development/libraries/gssdp/default.nix index 2c14451ba784..466406fbe793 100644 --- a/pkgs/development/libraries/gssdp/default.nix +++ b/pkgs/development/libraries/gssdp/default.nix @@ -4,8 +4,8 @@ stdenv.mkDerivation { name = "gssdp-0.12.2.1"; src = fetchurl { - url = mirror://gnome/sources/gssdp/0.12/gssdp-0.12.2.1.tar.xz; - sha256 = "0544f9nv6dpnfd0qbmxm8xwqjh8dafcmf3vlzkdly12xh5bs52lj"; + url = mirror://gnome/sources/gssdp/0.14/gssdp-0.14.6.tar.xz; + sha256 = "1kgakr0rpdpm7nkp4ycka12nndga16wmzim79v1nbcc0j2wxxkws"; }; buildInputs = [pkgconfig libsoup glib libxml2]; diff --git a/pkgs/development/libraries/gupnp-av/default.nix b/pkgs/development/libraries/gupnp-av/default.nix new file mode 100644 index 000000000000..ef78b4d185d3 --- /dev/null +++ b/pkgs/development/libraries/gupnp-av/default.nix @@ -0,0 +1,20 @@ +{ stdenv, fetchurl, gupnp, pkgconfig }: + +stdenv.mkDerivation { + name = "gupnp-av"; + version = "0.12.4"; + src = fetchurl { + url = mirror://gnome/sources/gupnp-av/0.12/gupnp-av-0.12.4.tar.xz; + sha256 = "0nvsvpiyfslz54j4hjh2gsdjkbi2qj2f4k0aw8s7f05kibprr2jl"; + }; + + buildInputs = [ gupnp pkgconfig ]; + + meta = { + homepage = http://gupnp.org/; + description = "GUPnP-AV is a collection of helpers for building AV (audio/video) applications using GUPnP."; + longDescription = "GUPnP implements the UPnP specification: resource announcement and discovery, description, control, event notification, and presentation (GUPnP includes basic web server functionality through libsoup). GUPnP does not include helpers for construction or control of specific standardized resources (e.g. MediaServer); this is left for higher level libraries utilizing the GUPnP framework."; + license = stdenv.lib.licenses.gpl2; + platforms = stdenv.lib.platforms.linux; + }; +} \ No newline at end of file diff --git a/pkgs/development/libraries/gupnp/default.nix b/pkgs/development/libraries/gupnp/default.nix index ca92bb82a733..4bd4c1aee268 100644 --- a/pkgs/development/libraries/gupnp/default.nix +++ b/pkgs/development/libraries/gupnp/default.nix @@ -1,11 +1,12 @@ { stdenv, fetchurl, pkgconfig, glib, libxml2, gssdp, libsoup, libuuid }: stdenv.mkDerivation { - name = "gupnp-0.18.4"; + name = "gupnp"; + version = "0.20.9"; src = fetchurl { - url = mirror://gnome/sources/gupnp/0.18/gupnp-0.18.4.tar.xz; - sha256 = "18bqmy8r44fnga9wz9inlq6k2s0292bnnql0c0n2j4mj25bpshvb"; + url = mirror://gnome/sources/gupnp/0.20/gupnp-0.20.9.tar.xz; + sha256 = "0vicydn3f72x1rqql7857ans85mg7dfap7n7h8xrfyb9whxhlrb1"; }; propagatedBuildInputs = [ libxml2 libsoup gssdp ]; @@ -13,7 +14,16 @@ stdenv.mkDerivation { nativeBuildInputs = [ pkgconfig ]; + postInstall = '' + cp -r ${libsoup}/include/libsoup-2.4/libsoup $out/include + cp -r ${gssdp}/include/gssdp-1.0/libgssdp $out/include + cp -r ${libxml2}/include/libxml2/libxml $out/include + ''; + meta = { homepage = http://www.gupnp.org/; + description = "GUPnP is an implementation of the UPnP specification."; + license = stdenv.lib.licenses.gpl2; + platforms = stdenv.lib.platforms.linux; }; } diff --git a/pkgs/development/libraries/libsoup/default.nix b/pkgs/development/libraries/libsoup/default.nix index a5ce0fda2704..5e0cae657f88 100644 --- a/pkgs/development/libraries/libsoup/default.nix +++ b/pkgs/development/libraries/libsoup/default.nix @@ -1,17 +1,18 @@ { stdenv, fetchurl, glib, libxml2, pkgconfig , gnomeSupport ? true, libgnome_keyring, sqlite, glib_networking -, libintlOrEmpty }: +, libintlOrEmpty +, intltool, python }: stdenv.mkDerivation { - name = "libsoup-2.38.1"; + name = "libsoup"; + version = "2.45"; src = fetchurl { - url = mirror://gnome/sources/libsoup/2.38/libsoup-2.38.1.tar.xz; - sha256 = "16iza4y8pmc4sn90iid88fgminvgcqypy3s2qnmzkzm5qwzr5f3i"; + url = mirror://gnome/sources/libsoup/2.45/libsoup-2.45.3.tar.xz; + sha256 = "04ma47hcrrbjp90r8jjn686cngnbgac24wgarpwwzlpg66wighva"; }; - - buildInputs = libintlOrEmpty; + buildInputs = libintlOrEmpty ++ [ intltool python ]; nativeBuildInputs = [ pkgconfig ]; propagatedBuildInputs = [ glib libxml2 ] ++ stdenv.lib.optionals gnomeSupport [ libgnome_keyring sqlite ]; diff --git a/pkgs/tools/networking/gupnp-tools/default.nix b/pkgs/tools/networking/gupnp-tools/default.nix index 8346be2ceb57..f9583e223406 100644 --- a/pkgs/tools/networking/gupnp-tools/default.nix +++ b/pkgs/tools/networking/gupnp-tools/default.nix @@ -1,11 +1,16 @@ -{fetchurl, stdenv, gupnp, gssdp, pkgconfig, glib, libxml2, libsoup, gtk, libglade, gnomeicontheme, e2fsprogs}: +{fetchurl, stdenv, gupnp, gssdp, pkgconfig, gtk3, libuuid, intltool, gupnp_av, gnome3, makeWrapper}: stdenv.mkDerivation rec { name = "gupnp-tools-0.6"; src = fetchurl { - url = "http://www.gupnp.org/sources/gupnp-tools/gupnp-tools-0.6.tar.gz"; - sha256 = "08fnggk85zqdcvm4np53yxw15b3ck25c2rmyfrh04g8j25qf50dj"; + url = mirror://gnome/sources/gupnp-tools/0.8/gupnp-tools-0.8.8.tar.xz; + sha256 = "160dgh9pmlb85qfavwqz46lqawpshs8514bx2b57f9rbiny8kbij"; }; - buildInputs = [gupnp gssdp pkgconfig glib libxml2 libsoup gtk libglade gnomeicontheme e2fsprogs]; + buildInputs = [gupnp libuuid gssdp pkgconfig gtk3 intltool gupnp_av gnome3.gnome_icon_theme gnome3.gnome_themes_standard makeWrapper]; + + postInstall = '' + wrapProgram "$out/bin/gupnp-av-cp" --prefix XDG_DATA_DIRS : "${gtk3}/share:${gnome3.gnome_themes_standard}/share:${gnome3.gnome_icon_theme}/share:$out/share" + wrapProgram "$out/bin/gupnp-universal-cp" --prefix XDG_DATA_DIRS : "${gtk3}/share:${gnome3.gnome_themes_standard}/share:${gnome3.gnome_icon_theme}/share:$out/share" + ''; } diff --git a/pkgs/top-level/all-packages.nix b/pkgs/top-level/all-packages.nix index 22cf0c516807..145655011fe2 100644 --- a/pkgs/top-level/all-packages.nix +++ b/pkgs/top-level/all-packages.nix @@ -1101,10 +1101,12 @@ let inherit (gnome) libsoup; }; + gupnp_av = callPackage ../development/libraries/gupnp-av {}; + gupnp_igd = callPackage ../development/libraries/gupnp-igd {}; gupnptools = callPackage ../tools/networking/gupnp-tools { - inherit (gnome) libsoup libglade gnomeicontheme; +# inherit (gnome) libsoup libglade gnomeicontheme; }; gvpe = builderDefsPackage ../tools/networking/gvpe { From 9c4a58515d0a538776bc4cc0e5e3639f796e4001 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Benno=20F=C3=BCnfst=C3=BCck?= Date: Sat, 11 Jan 2014 21:26:05 +0100 Subject: [PATCH 077/128] Add version numbers to name and remove comment --- pkgs/development/libraries/gupnp-av/default.nix | 2 +- pkgs/development/libraries/gupnp/default.nix | 2 +- pkgs/development/libraries/libsoup/default.nix | 2 +- pkgs/top-level/all-packages.nix | 4 +--- 4 files changed, 4 insertions(+), 6 deletions(-) diff --git a/pkgs/development/libraries/gupnp-av/default.nix b/pkgs/development/libraries/gupnp-av/default.nix index ef78b4d185d3..0f4e783ff6e2 100644 --- a/pkgs/development/libraries/gupnp-av/default.nix +++ b/pkgs/development/libraries/gupnp-av/default.nix @@ -1,7 +1,7 @@ { stdenv, fetchurl, gupnp, pkgconfig }: stdenv.mkDerivation { - name = "gupnp-av"; + name = "gupnp-av-0.12.4"; version = "0.12.4"; src = fetchurl { url = mirror://gnome/sources/gupnp-av/0.12/gupnp-av-0.12.4.tar.xz; diff --git a/pkgs/development/libraries/gupnp/default.nix b/pkgs/development/libraries/gupnp/default.nix index 4bd4c1aee268..84c2df9b817c 100644 --- a/pkgs/development/libraries/gupnp/default.nix +++ b/pkgs/development/libraries/gupnp/default.nix @@ -1,7 +1,7 @@ { stdenv, fetchurl, pkgconfig, glib, libxml2, gssdp, libsoup, libuuid }: stdenv.mkDerivation { - name = "gupnp"; + name = "gupnp-0.20.9"; version = "0.20.9"; src = fetchurl { diff --git a/pkgs/development/libraries/libsoup/default.nix b/pkgs/development/libraries/libsoup/default.nix index 5e0cae657f88..c9203ec34c66 100644 --- a/pkgs/development/libraries/libsoup/default.nix +++ b/pkgs/development/libraries/libsoup/default.nix @@ -4,7 +4,7 @@ , intltool, python }: stdenv.mkDerivation { - name = "libsoup"; + name = "libsoup-2.45"; version = "2.45"; src = fetchurl { diff --git a/pkgs/top-level/all-packages.nix b/pkgs/top-level/all-packages.nix index 145655011fe2..8507fe0eed2a 100644 --- a/pkgs/top-level/all-packages.nix +++ b/pkgs/top-level/all-packages.nix @@ -1105,9 +1105,7 @@ let gupnp_igd = callPackage ../development/libraries/gupnp-igd {}; - gupnptools = callPackage ../tools/networking/gupnp-tools { -# inherit (gnome) libsoup libglade gnomeicontheme; - }; + gupnptools = callPackage ../tools/networking/gupnp-tools {}; gvpe = builderDefsPackage ../tools/networking/gvpe { inherit openssl gmp nettools iproute; From 9d6ab791af07f4baeb84e116c0eb972f8b64ecf2 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Benno=20F=C3=BCnfst=C3=BCck?= Date: Tue, 14 Jan 2014 21:33:11 +0100 Subject: [PATCH 078/128] Use version variables for easier upgrading --- pkgs/development/libraries/gupnp-av/default.nix | 9 +++++---- pkgs/development/libraries/gupnp/default.nix | 10 +++++----- pkgs/development/libraries/libsoup/default.nix | 9 +++++---- pkgs/tools/networking/gupnp-tools/default.nix | 6 ++++-- 4 files changed, 19 insertions(+), 15 deletions(-) diff --git a/pkgs/development/libraries/gupnp-av/default.nix b/pkgs/development/libraries/gupnp-av/default.nix index 0f4e783ff6e2..3cbb13972d35 100644 --- a/pkgs/development/libraries/gupnp-av/default.nix +++ b/pkgs/development/libraries/gupnp-av/default.nix @@ -1,10 +1,11 @@ { stdenv, fetchurl, gupnp, pkgconfig }: -stdenv.mkDerivation { - name = "gupnp-av-0.12.4"; - version = "0.12.4"; +stdenv.mkDerivation rec { + name = "gupnp-av-${version}"; + majorVersion = "0.12"; + version = "${majorVersion}.4"; src = fetchurl { - url = mirror://gnome/sources/gupnp-av/0.12/gupnp-av-0.12.4.tar.xz; + url = "mirror://gnome/sources/gupnp-av/${majorVersion}/gupnp-av-${version}.tar.xz"; sha256 = "0nvsvpiyfslz54j4hjh2gsdjkbi2qj2f4k0aw8s7f05kibprr2jl"; }; diff --git a/pkgs/development/libraries/gupnp/default.nix b/pkgs/development/libraries/gupnp/default.nix index 84c2df9b817c..bae0639a61c9 100644 --- a/pkgs/development/libraries/gupnp/default.nix +++ b/pkgs/development/libraries/gupnp/default.nix @@ -1,11 +1,11 @@ { stdenv, fetchurl, pkgconfig, glib, libxml2, gssdp, libsoup, libuuid }: -stdenv.mkDerivation { - name = "gupnp-0.20.9"; - version = "0.20.9"; - +stdenv.mkDerivation rec { + name = "gupnp-${version}"; + majorVersion = "0.20"; + version = "${majorVersion}.9"; src = fetchurl { - url = mirror://gnome/sources/gupnp/0.20/gupnp-0.20.9.tar.xz; + url = "mirror://gnome/sources/gupnp/${majorVersion}/gupnp-${version}.tar.xz"; sha256 = "0vicydn3f72x1rqql7857ans85mg7dfap7n7h8xrfyb9whxhlrb1"; }; diff --git a/pkgs/development/libraries/libsoup/default.nix b/pkgs/development/libraries/libsoup/default.nix index c9203ec34c66..99dc56722b90 100644 --- a/pkgs/development/libraries/libsoup/default.nix +++ b/pkgs/development/libraries/libsoup/default.nix @@ -3,12 +3,13 @@ , libintlOrEmpty , intltool, python }: -stdenv.mkDerivation { - name = "libsoup-2.45"; - version = "2.45"; +stdenv.mkDerivation rec { + name = "libsoup-${version}"; + majorVersion = "2.45"; + version = "${majorVersion}.3"; src = fetchurl { - url = mirror://gnome/sources/libsoup/2.45/libsoup-2.45.3.tar.xz; + url = "mirror://gnome/sources/libsoup/${majorVersion}/libsoup-${version}.tar.xz"; sha256 = "04ma47hcrrbjp90r8jjn686cngnbgac24wgarpwwzlpg66wighva"; }; diff --git a/pkgs/tools/networking/gupnp-tools/default.nix b/pkgs/tools/networking/gupnp-tools/default.nix index f9583e223406..54f3e860e0c7 100644 --- a/pkgs/tools/networking/gupnp-tools/default.nix +++ b/pkgs/tools/networking/gupnp-tools/default.nix @@ -1,9 +1,11 @@ {fetchurl, stdenv, gupnp, gssdp, pkgconfig, gtk3, libuuid, intltool, gupnp_av, gnome3, makeWrapper}: stdenv.mkDerivation rec { - name = "gupnp-tools-0.6"; + name = "gupnp-tools-${version}"; + majorVersion = "0.8"; + version = "${majorVersion}.8"; src = fetchurl { - url = mirror://gnome/sources/gupnp-tools/0.8/gupnp-tools-0.8.8.tar.xz; + url = "mirror://gnome/sources/gupnp-tools/${majorVersion}/gupnp-tools-${version}.tar.xz"; sha256 = "160dgh9pmlb85qfavwqz46lqawpshs8514bx2b57f9rbiny8kbij"; }; From 49b668f5d2b8d1104eb9f1764cc384024f5cf97a Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Benno=20F=C3=BCnfst=C3=BCck?= Date: Tue, 21 Jan 2014 16:33:10 +0100 Subject: [PATCH 079/128] libsoup: Run patchShebangs --- pkgs/development/libraries/libsoup/default.nix | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/pkgs/development/libraries/libsoup/default.nix b/pkgs/development/libraries/libsoup/default.nix index 99dc56722b90..121244745660 100644 --- a/pkgs/development/libraries/libsoup/default.nix +++ b/pkgs/development/libraries/libsoup/default.nix @@ -13,6 +13,10 @@ stdenv.mkDerivation rec { sha256 = "04ma47hcrrbjp90r8jjn686cngnbgac24wgarpwwzlpg66wighva"; }; + patchPhase = '' + patchShebangs libsoup/ + ''; + buildInputs = libintlOrEmpty ++ [ intltool python ]; nativeBuildInputs = [ pkgconfig ]; propagatedBuildInputs = [ glib libxml2 ] From e0b8a4cc5e3486e1b2009cbfdb9092947ea60319 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Benno=20F=C3=BCnfst=C3=BCck?= Date: Thu, 30 Jan 2014 18:48:16 +0100 Subject: [PATCH 080/128] Remove libsoup_2_44 --- pkgs/development/libraries/libsoup/2.44.nix | 35 --------------------- pkgs/top-level/all-packages.nix | 6 +--- 2 files changed, 1 insertion(+), 40 deletions(-) delete mode 100644 pkgs/development/libraries/libsoup/2.44.nix diff --git a/pkgs/development/libraries/libsoup/2.44.nix b/pkgs/development/libraries/libsoup/2.44.nix deleted file mode 100644 index 4bef93ff8cd7..000000000000 --- a/pkgs/development/libraries/libsoup/2.44.nix +++ /dev/null @@ -1,35 +0,0 @@ -{ stdenv, fetchurl, pkgconfig, intltool, python, gobjectIntrospection -, glib, libxml2, sqlite, glib_networking -, gnomeSupport ? true, libgnome_keyring -}: - -stdenv.mkDerivation { - name = "libsoup-2.44.2"; - - meta = { - description = "HTTP client/server library"; - license = stdenv.lib.licenses.lgpl2Plus; - }; - - src = fetchurl { - url = mirror://gnome/sources/libsoup/2.44/libsoup-2.44.2.tar.xz; - sha256 = "1wwqsmi1jvidiqwbdnjl66nmk1yja8w9dxf9cz10zh56fjmvbr77"; - }; - - preConfigure = '' - substituteInPlace libsoup/tld-parser.py \ - --replace "!/usr/bin/env python" "!${python}/bin/${python.executable}" - ''; - - nativeBuildInputs = [ pkgconfig intltool python gobjectIntrospection ]; - - propagatedBuildInputs = [ glib libxml2 sqlite ] - ++ stdenv.lib.optionals gnomeSupport [ libgnome_keyring ]; - - passthru.propagatedUserEnvPackages = [ glib_networking ]; - - # glib_networking is a runtime dependency, not a compile-time dependency - configureFlags = "--disable-tls-check"; - - NIX_CFLAGS_COMPILE = stdenv.lib.optionalString stdenv.isDarwin "-lintl"; -} diff --git a/pkgs/top-level/all-packages.nix b/pkgs/top-level/all-packages.nix index 8507fe0eed2a..6b28eb79073e 100644 --- a/pkgs/top-level/all-packages.nix +++ b/pkgs/top-level/all-packages.nix @@ -4120,9 +4120,7 @@ let geoclue = callPackage ../development/libraries/geoclue {}; - geoclue2 = callPackage ../development/libraries/geoclue/2.0.nix { - libsoup = libsoup_2_44; - }; + geoclue2 = callPackage ../development/libraries/geoclue/2.0.nix {}; geoip = builderDefsPackage ../development/libraries/geoip { inherit zlib; @@ -4928,7 +4926,6 @@ let libsodium = callPackage ../development/libraries/libsodium { }; libsoup = callPackage ../development/libraries/libsoup { }; - libsoup_2_44 = callPackage ../development/libraries/libsoup/2.44.nix { }; libssh = callPackage ../development/libraries/libssh { }; @@ -5734,7 +5731,6 @@ let }; webkitgtk = callPackage ../development/libraries/webkitgtk { - libsoup = libsoup_2_44; harfbuzz = harfbuzz.override { withIcu = true; }; From 13d11227f1e68f55b1365c39c0e91bcc4371735e Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Benno=20F=C3=BCnfst=C3=BCck?= Date: Thu, 30 Jan 2014 19:02:29 +0100 Subject: [PATCH 081/128] Remove left-over reference to libsoup_2_44 --- pkgs/desktops/gnome-3/default.nix | 4 ---- 1 file changed, 4 deletions(-) diff --git a/pkgs/desktops/gnome-3/default.nix b/pkgs/desktops/gnome-3/default.nix index 772aaf54e0a0..1b440be200ae 100644 --- a/pkgs/desktops/gnome-3/default.nix +++ b/pkgs/desktops/gnome-3/default.nix @@ -8,10 +8,6 @@ rec { orbit = ORBit2; -#### Overrides of libraries - - libsoup = pkgs.libsoup_2_44; - #### Core (http://ftp.acc.umu.se/pub/GNOME/core/) at_spi2_atk = callPackage ./core/at-spi2-atk { }; From 2ec67167d9ab418c8b748bf7d217e363fce45226 Mon Sep 17 00:00:00 2001 From: "William A. Kennington III" Date: Thu, 30 Jan 2014 19:01:22 -0600 Subject: [PATCH 082/128] mumble: Small Fixups and add support for disabling speechd This patch adds a collection of changes to clean up the mumble expression as well as add support for disabling the external speech dispatcher from being compiled in. --- .../networking/mumble/default.nix | 41 +++++++++++-------- pkgs/top-level/all-packages.nix | 1 + 2 files changed, 25 insertions(+), 17 deletions(-) diff --git a/pkgs/applications/networking/mumble/default.nix b/pkgs/applications/networking/mumble/default.nix index 8ed7c8d64d4d..43fbe952b182 100644 --- a/pkgs/applications/networking/mumble/default.nix +++ b/pkgs/applications/networking/mumble/default.nix @@ -1,9 +1,18 @@ -{ stdenv, fetchurl, qt4, boost, speechd, protobuf, libsndfile, - speex, libopus, avahi, pkgconfig, -jackSupport ? false, -jackaudio ? null }: +{ stdenv, fetchurl, qt4, boost, protobuf, libsndfile +, speex, libopus, avahi, pkgconfig +, jackSupport ? false +, jackaudio ? null +, speechdSupport ? false +, speechd ? null +}: +assert jackSupport -> jackaudio != null; +assert speechdSupport -> speechd != null; +let + optional = stdenv.lib.optional; + optionalString = stdenv.lib.optionalString; +in stdenv.mkDerivation rec { name = "mumble-" + version; version = "1.2.4"; @@ -13,35 +22,33 @@ stdenv.mkDerivation rec { sha256 = "16wwj6gwcnyjlnzh7wk0l255ldxmbwx0wi652sdp20lsv61q7kx1"; }; - patchPhase = '' - patch -p1 < ${ ./mumble-jack-support.patch } - ''; + patches = optional jackSupport ./mumble-jack-support.patch; configurePhase = '' qmake CONFIG+=no-g15 CONFIG+=no-update CONFIG+=no-server \ CONFIG+=no-embed-qt-translations CONFIG+=packaged \ CONFIG+=bundled-celt CONFIG+=no-bundled-opus \ + ${optionalString (!speechdSupport) "CONFIG+=no-speechd"} \ + ${optionalString jackSupport "CONFIG+=no-oss CONFIG+=no-alsa CONFIG+=jackaudio"} \ CONFIG+=no-bundled-speex - '' - + stdenv.lib.optionalString jackSupport '' - CONFIG+=no-oss CONFIG+=no-alsa CONFIG+=jackaudio ''; - buildInputs = [ qt4 boost speechd protobuf libsndfile speex + buildInputs = [ qt4 boost protobuf libsndfile speex libopus avahi pkgconfig ] - ++ (stdenv.lib.optional jackSupport jackaudio); + ++ (optional jackSupport jackaudio) + ++ (optional speechdSupport speechd); installPhase = '' mkdir -p $out cp -r ./release $out/bin ''; - meta = { - homepage = http://mumble.sourceforge.net/; + meta = with stdenv.lib; { + homepage = "http://mumble.sourceforge.net/"; description = "Low-latency, high quality voice chat software"; - license = "BSD"; - platforms = with stdenv.lib.platforms; linux; - maintainers = with stdenv.lib.maintainers; [viric]; + license = licenses.bsd3; + platforms = platforms.linux; + maintainers = with maintainers; [ viric ]; }; } diff --git a/pkgs/top-level/all-packages.nix b/pkgs/top-level/all-packages.nix index 929fd87e963c..b9dd8bd4b8d9 100644 --- a/pkgs/top-level/all-packages.nix +++ b/pkgs/top-level/all-packages.nix @@ -8371,6 +8371,7 @@ let withLibdnssdCompat = true; }; jackSupport = config.mumble.jackSupport or false; + speechdSupport = config.mumble.speechdSupport or false; }; murmur = callPackage ../applications/networking/mumble/murmur.nix { From 82f315cd7d91facd372f6f79046ae64c7d108ed2 Mon Sep 17 00:00:00 2001 From: "William A. Kennington III" Date: Thu, 30 Jan 2014 21:51:26 -0600 Subject: [PATCH 083/128] db5: Add package --- pkgs/development/libraries/db/db-5.3.nix | 32 ++++++++++++++++++++++++ pkgs/top-level/all-packages.nix | 4 +++ 2 files changed, 36 insertions(+) create mode 100644 pkgs/development/libraries/db/db-5.3.nix diff --git a/pkgs/development/libraries/db/db-5.3.nix b/pkgs/development/libraries/db/db-5.3.nix new file mode 100644 index 000000000000..a59d28ba9630 --- /dev/null +++ b/pkgs/development/libraries/db/db-5.3.nix @@ -0,0 +1,32 @@ +{ stdenv, fetchurl +, cxxSupport ? true +}: + +stdenv.mkDerivation rec { + name = "db-5.3.28"; + + src = fetchurl { + url = "http://download.oracle.com/berkeley-db/${name}.tar.gz"; + sha256 = "0a1n5hbl7027fbz5lm0vp0zzfp1hmxnz14wx3zl9563h83br5ag0"; + }; + + configureFlags = [ + (if cxxSupport then "--enable-cxx" else "--disable-cxx") + ]; + + preConfigure = '' + cd build_unix + configureScript=../dist/configure + ''; + + postInstall = '' + rm -rf $out/docs + ''; + + meta = with stdenv.lib; { + homepage = "http://www.oracle.com/technetwork/database/database-technologies/berkeleydb/index.html"; + description = "Berkeley DB"; + license = "Berkeley Database License"; + platforms = platforms.unix; + }; +} diff --git a/pkgs/top-level/all-packages.nix b/pkgs/top-level/all-packages.nix index b9dd8bd4b8d9..7738465d10fd 100644 --- a/pkgs/top-level/all-packages.nix +++ b/pkgs/top-level/all-packages.nix @@ -3940,6 +3940,10 @@ let db48 = callPackage ../development/libraries/db4/db4-4.8.nix { }; + db5 = db53; + + db53 = callPackage ../development/libraries/db/db-5.3.nix { }; + dbus = callPackage ../development/libraries/dbus { }; dbus_cplusplus = callPackage ../development/libraries/dbus-cplusplus { }; dbus_glib = callPackage ../development/libraries/dbus-glib { }; From 4dae2621e3c1a8e58aad9b34fccf40613828e60e Mon Sep 17 00:00:00 2001 From: "William A. Kennington III" Date: Thu, 30 Jan 2014 19:52:12 -0600 Subject: [PATCH 084/128] mcpp: Add package --- pkgs/development/compilers/mcpp/default.nix | 19 +++++++++++++++++++ pkgs/top-level/all-packages.nix | 2 ++ 2 files changed, 21 insertions(+) create mode 100644 pkgs/development/compilers/mcpp/default.nix diff --git a/pkgs/development/compilers/mcpp/default.nix b/pkgs/development/compilers/mcpp/default.nix new file mode 100644 index 000000000000..34cb63e783ec --- /dev/null +++ b/pkgs/development/compilers/mcpp/default.nix @@ -0,0 +1,19 @@ +{ stdenv, fetchurl, mcpp }: + +stdenv.mkDerivation rec { + name = "mcpp-2.7.2"; + + src = fetchurl { + url = "mirror://sourceforge/mcpp/${name}.tar.gz"; + sha256 = "0r48rfghjm90pkdyr4khxg783g9v98rdx2n69xn8f6c5i0hl96rv"; + }; + + configureFlags = [ "--enable-mcpplib" ]; + + meta = with stdenv.lib; { + homepage = "http://mcpp.sourceforge.net/"; + description = "A portable c preprocessor"; + license = licenses.bsd2; + platforms = platforms.unix; + }; +} diff --git a/pkgs/top-level/all-packages.nix b/pkgs/top-level/all-packages.nix index 7738465d10fd..fc9b61c93a54 100644 --- a/pkgs/top-level/all-packages.nix +++ b/pkgs/top-level/all-packages.nix @@ -8247,6 +8247,8 @@ let matchbox = callPackage ../applications/window-managers/matchbox { }; + mcpp = callPackage ../development/compilers/mcpp { }; + mda_lv2 = callPackage ../applications/audio/mda-lv2 { }; meld = callPackage ../applications/version-management/meld { From 18c718f04372a735381f0662347ad9078666e4a2 Mon Sep 17 00:00:00 2001 From: "William A. Kennington III" Date: Thu, 30 Jan 2014 19:41:58 -0600 Subject: [PATCH 085/128] zeroc-ice: Add package --- .../libraries/zeroc-ice/default.nix | 28 +++++++++++++++++++ pkgs/top-level/all-packages.nix | 2 ++ 2 files changed, 30 insertions(+) create mode 100644 pkgs/development/libraries/zeroc-ice/default.nix diff --git a/pkgs/development/libraries/zeroc-ice/default.nix b/pkgs/development/libraries/zeroc-ice/default.nix new file mode 100644 index 000000000000..29e92d0b6ece --- /dev/null +++ b/pkgs/development/libraries/zeroc-ice/default.nix @@ -0,0 +1,28 @@ +{ stdenv, fetchurl, mcpp, bzip2, expat, openssl, db5 }: + +stdenv.mkDerivation rec { + name = "zeroc-ice-3.5.1"; + + src = fetchurl { + url = "http://www.zeroc.com/download/Ice/3.5/Ice-3.5.1.tar.gz"; + sha256 = "14pk794p0fq3hcp50xmqnf9pp15dggiqhcnsav8xpnka9hcm37lq"; + }; + + buildInputs = [ mcpp bzip2 expat openssl db5 ]; + + buildPhase = '' + cd cpp + make OPTIMIZE=yes + ''; + + installPhase = '' + make prefix=$out install + ''; + + meta = with stdenv.lib; { + homepage = "http://www.zeroc.com/ice.html"; + description = "The internet communications engine"; + license = licenses.gpl2; + platforms = platforms.unix; + }; +} diff --git a/pkgs/top-level/all-packages.nix b/pkgs/top-level/all-packages.nix index fc9b61c93a54..b707f1cc6338 100644 --- a/pkgs/top-level/all-packages.nix +++ b/pkgs/top-level/all-packages.nix @@ -9136,6 +9136,8 @@ let zathura = zathuraCollection.zathuraWrapper; + zeroc_ice = callPackage ../development/libraries/zeroc-ice { }; + girara = callPackage ../applications/misc/girara { gtk = gtk3; }; From 9e8a6a24f06a0ed175b05198839376d4ce79f390 Mon Sep 17 00:00:00 2001 From: "William A. Kennington III" Date: Thu, 30 Jan 2014 22:34:21 -0600 Subject: [PATCH 086/128] murmur: Add ice support and small fixes This patch adds optional ICE support to murmur which is enabled by default. Additionally, it cleans up some of the expression similar to the fixes added the mumble. --- .../applications/networking/mumble/murmur.nix | 34 ++++++++++++++----- pkgs/top-level/all-packages.nix | 1 + 2 files changed, 26 insertions(+), 9 deletions(-) diff --git a/pkgs/applications/networking/mumble/murmur.nix b/pkgs/applications/networking/mumble/murmur.nix index b40632384c2b..4b074b0708e0 100644 --- a/pkgs/applications/networking/mumble/murmur.nix +++ b/pkgs/applications/networking/mumble/murmur.nix @@ -1,5 +1,15 @@ -{ stdenv, fetchurl, qt4, boost, protobuf, avahi, libcap, pkgconfig }: +{ stdenv, fetchurl, qt4, boost, protobuf +, avahi, libcap, pkgconfig +, iceSupport ? false +, zeroc_ice ? null +}: +assert iceSupport -> zeroc_ice != null; + +let + optional = stdenv.lib.optional; + optionalString = stdenv.lib.optionalString; +in stdenv.mkDerivation rec { name = "murmur-" + version; version = "1.2.4"; @@ -9,22 +19,28 @@ stdenv.mkDerivation rec { sha256 = "16wwj6gwcnyjlnzh7wk0l255ldxmbwx0wi652sdp20lsv61q7kx1"; }; - configurePhase = '' - qmake CONFIG+=no-client CONFIG+=no-ice CONFIG+=no-embed-qt + patchPhase = optional iceSupport '' + sed -i 's,/usr/share/Ice/,${zeroc_ice}/,g' src/murmur/murmur.pro ''; - buildInputs = [ qt4 boost protobuf avahi libcap pkgconfig ]; + configurePhase = '' + qmake CONFIG+=no-client CONFIG+=no-embed-qt \ + ${optionalString (!iceSupport) "CONFIG+=no-ice"} + ''; + + buildInputs = [ qt4 boost protobuf avahi libcap pkgconfig ] + ++ optional iceSupport [ zeroc_ice ]; installPhase = '' mkdir -p $out cp -r ./release $out/bin ''; - meta = { - homepage = http://mumble.sourceforge.net/; + meta = with stdenv.lib; { + homepage = "http://mumble.sourceforge.net/"; description = "Low-latency, high quality voice chat software"; - license = "BSD"; - platforms = with stdenv.lib.platforms; linux; - maintainers = with stdenv.lib.maintainers; [viric]; + license = licenses.bsd3; + platforms = platforms.linux; + maintainers = with maintainers; [ viric ]; }; } diff --git a/pkgs/top-level/all-packages.nix b/pkgs/top-level/all-packages.nix index b707f1cc6338..978a67d232ef 100644 --- a/pkgs/top-level/all-packages.nix +++ b/pkgs/top-level/all-packages.nix @@ -8384,6 +8384,7 @@ let avahi = avahi.override { withLibdnssdCompat = true; }; + iceSupport = config.murmur.iceSupport or true; }; mutt = callPackage ../applications/networking/mailreaders/mutt { }; From 1c83b079d280d8cdc863fc64e015e5d7464e210a Mon Sep 17 00:00:00 2001 From: Song Wenwu Date: Fri, 31 Jan 2014 14:05:53 +0800 Subject: [PATCH 087/128] gimp: wrap plugins with PYTHONPATH, fix #223 --- pkgs/applications/graphics/gimp/2.8.nix | 7 ++++++- pkgs/top-level/all-packages.nix | 1 + 2 files changed, 7 insertions(+), 1 deletion(-) diff --git a/pkgs/applications/graphics/gimp/2.8.nix b/pkgs/applications/graphics/gimp/2.8.nix index af7d9e3399b0..423b9f3ce22f 100644 --- a/pkgs/applications/graphics/gimp/2.8.nix +++ b/pkgs/applications/graphics/gimp/2.8.nix @@ -1,7 +1,7 @@ { stdenv, fetchurl, pkgconfig, intltool, babl, gegl, gtk, glib, gdk_pixbuf , pango, cairo, freetype, fontconfig, lcms, libpng, libjpeg, poppler, libtiff , webkit, libmng, librsvg, libwmf, zlib, libzip, ghostscript, aalib, jasper -, python, pygtk, libart_lgpl, libexif, gettext, xlibs }: +, python, pygtk, libart_lgpl, libexif, gettext, xlibs, wrapPython }: stdenv.mkDerivation rec { name = "gimp-2.8.10"; @@ -16,8 +16,13 @@ stdenv.mkDerivation rec { freetype fontconfig lcms libpng libjpeg poppler libtiff webkit libmng librsvg libwmf zlib libzip ghostscript aalib jasper python pygtk libart_lgpl libexif gettext xlibs.libXpm + wrapPython ]; + pythonPath = [ pygtk ]; + + postInstall = ''wrapPythonPrograms''; + passthru = { inherit gtk; }; # probably its a good idea to use the same gtk in plugins ? #configureFlags = [ "--disable-print" ]; diff --git a/pkgs/top-level/all-packages.nix b/pkgs/top-level/all-packages.nix index 6b28eb79073e..2b1446610b25 100644 --- a/pkgs/top-level/all-packages.nix +++ b/pkgs/top-level/all-packages.nix @@ -7897,6 +7897,7 @@ let inherit (gnome) libart_lgpl; webkit = null; lcms = lcms2; + wrapPython = pythonPackages.wrapPython; }; gimp = gimp_2_8; From b5d19fad6710e786a80f9584e65f4f17e9678c24 Mon Sep 17 00:00:00 2001 From: Linquize Date: Fri, 31 Jan 2014 09:44:05 +0100 Subject: [PATCH 088/128] Update simutrans 112.3 --- pkgs/games/simutrans/default.nix | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/pkgs/games/simutrans/default.nix b/pkgs/games/simutrans/default.nix index 65a61cb6cabc..1a75aa460955 100644 --- a/pkgs/games/simutrans/default.nix +++ b/pkgs/games/simutrans/default.nix @@ -4,7 +4,7 @@ let result = withPak (mkPak pak128); ver_1 = "112"; - ver_2 = "1"; + ver_2 = "3"; ver_h2 = "${ver_1}-${ver_2}"; # "pakset" of objects, images, text, music, etc. @@ -23,7 +23,7 @@ let }; pak64 = fetchurl { url = "mirror://sourceforge/simutrans/pak64/${ver_h2}/simupak64-${ver_h2}.zip"; - sha256 = "1197rl2534wx9wdafarlr42qjw6pyghz4bynq2g68pi10h8csypw"; + sha256 = "1ng963n2gvnwmsj73iy3gp9i5iqf5g6qk1gh1jnfm86gnjrsrq4m"; }; pak128 = fetchurl { url = "mirror://sourceforge/simutrans/pak128/pak128%20for%20${ver_1}/pak128-2.2.0--${ver_1}.0.zip"; @@ -44,7 +44,7 @@ let src = fetchurl { url = "mirror://sourceforge/simutrans/simutrans/${ver_h2}/simutrans-src-${ver_h2}.zip"; - sha256 = "1xrxpd5m2dc9bk8w21smfj28r41ji1qaihjwkwrifgz6rhg19l5c"; + sha256 = "0jdq2krfj3qsh8dks9ixsdvpyjq9yi80p58b0xjpsn35mkbxxaca"; }; sourceRoot = "."; From d59778678a23d72297a5dd813387d38c0448df3c Mon Sep 17 00:00:00 2001 From: Eelco Dolstra Date: Fri, 31 Jan 2014 13:07:25 +0100 Subject: [PATCH 089/128] Revert "dictd: Update to latest upstream (0.12.1)." This reverts commit 81622220713ca0871362703bc9e8c69ba5996e0e since it breaks evaluation (libmaa.nix is missing). --- pkgs/servers/dict/buildfix.diff | 11 ----------- pkgs/servers/dict/default.nix | 21 +++++++++------------ pkgs/top-level/all-packages.nix | 4 +--- 3 files changed, 10 insertions(+), 26 deletions(-) delete mode 100644 pkgs/servers/dict/buildfix.diff diff --git a/pkgs/servers/dict/buildfix.diff b/pkgs/servers/dict/buildfix.diff deleted file mode 100644 index e30fcb2b0380..000000000000 --- a/pkgs/servers/dict/buildfix.diff +++ /dev/null @@ -1,11 +0,0 @@ ---- Makefile.in~ 2011-03-06 18:52:54.000000000 +0100 -+++ Makefile.in 2014-01-29 19:04:51.384844897 +0100 -@@ -123,7 +123,7 @@ - - %: %.o - $(LIBTOOL) --tag=CC --mode=link $(CC) -o $@ -static \ -- $^ $(OBJS) $(LDFLAGS) -lz ${LIBS} -+ $(^:.o=.lo) $(OBJS) $(LDFLAGS) -lz ${LIBS} - - include $(srcdir)/deps - diff --git a/pkgs/servers/dict/default.nix b/pkgs/servers/dict/default.nix index 1fb7c24418f0..51de674eb9f7 100644 --- a/pkgs/servers/dict/default.nix +++ b/pkgs/servers/dict/default.nix @@ -1,22 +1,19 @@ -{ stdenv, fetchurl, which, bison, flex, libmaa, zlib, libtool }: +{ stdenv, fetchurl, which, bison, flex }: -stdenv.mkDerivation rec { - version = "1.12.1"; - name = "dictd-${version}"; +stdenv.mkDerivation { + name = "dictd-1.9.15"; src = fetchurl { - url = "mirror://sourceforge/dict/dictd-${version}.tar.gz"; - sha256 = "0min6v60b6z5mrymyjfwzx8nv6rdm8pd8phlwl6v2jl5vkngcdx2"; + url = mirror://sourceforge/dict/dictd-1.9.15.tar.gz; + sha256 = "0p41yf72l0igmshz6vxy3hm51z25600vrnb9j2jpgws4c03fqnac"; }; - buildInputs = [ flex bison which libmaa zlib libtool ]; - - patchPhase = "patch -p0 < ${./buildfix.diff}"; + buildInputs = [ flex bison which ]; + configureFlags = "--datadir=/var/run/current-system/share/dictd"; - meta = with stdenv.lib; { + meta = { description = "Dict protocol server and client"; - maintainers = maintainers.mornfall; - platforms = platforms.linux; + maintainers = with stdenv.lib.maintainers; mornfall; }; } diff --git a/pkgs/top-level/all-packages.nix b/pkgs/top-level/all-packages.nix index b1fb47c9be75..9187a6f0aad0 100644 --- a/pkgs/top-level/all-packages.nix +++ b/pkgs/top-level/all-packages.nix @@ -6107,9 +6107,7 @@ let dico = callPackage ../servers/dico { }; - dict = callPackage ../servers/dict { - libmaa = callPackage ../servers/dict/libmaa.nix {}; - }; + dict = callPackage ../servers/dict { }; dictdDBs = recurseIntoAttrs (import ../servers/dict/dictd-db.nix { inherit builderDefs; From 0b499fb96350636ccb4be1c1416a8ac8a22eef63 Mon Sep 17 00:00:00 2001 From: Eelco Dolstra Date: Fri, 31 Jan 2014 13:08:23 +0100 Subject: [PATCH 090/128] Remove trace message to prevent spamming nix-env users --- pkgs/top-level/all-packages.nix | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/pkgs/top-level/all-packages.nix b/pkgs/top-level/all-packages.nix index 9187a6f0aad0..1679e994a088 100644 --- a/pkgs/top-level/all-packages.nix +++ b/pkgs/top-level/all-packages.nix @@ -6816,7 +6816,7 @@ let linuxPackages = linuxPackages_3_10; # A function to build a manually-configured kernel - linuxManualConfig = builtins.trace "linuxManualConfig is now called buildLinux" pkgs.buildLinux; + linuxManualConfig = pkgs.buildLinux; buildLinux = import ../os-specific/linux/kernel/manual-config.nix { inherit (pkgs) stdenv runCommand nettools bc perl kmod writeTextFile ubootChooser; }; From cdac4b69c97d539e96b2b03e963c29f8b28376be Mon Sep 17 00:00:00 2001 From: Petr Rockai Date: Fri, 31 Jan 2014 13:17:37 +0100 Subject: [PATCH 091/128] Revert "Revert "dictd: Update to latest upstream (0.12.1)."" and add the missing libmaa.nix. This reverts commit d59778678a23d72297a5dd813387d38c0448df3c. --- pkgs/servers/dict/buildfix.diff | 11 +++++++++++ pkgs/servers/dict/default.nix | 21 ++++++++++++--------- pkgs/servers/dict/libmaa.nix | 20 ++++++++++++++++++++ pkgs/top-level/all-packages.nix | 4 +++- 4 files changed, 46 insertions(+), 10 deletions(-) create mode 100644 pkgs/servers/dict/buildfix.diff create mode 100644 pkgs/servers/dict/libmaa.nix diff --git a/pkgs/servers/dict/buildfix.diff b/pkgs/servers/dict/buildfix.diff new file mode 100644 index 000000000000..e30fcb2b0380 --- /dev/null +++ b/pkgs/servers/dict/buildfix.diff @@ -0,0 +1,11 @@ +--- Makefile.in~ 2011-03-06 18:52:54.000000000 +0100 ++++ Makefile.in 2014-01-29 19:04:51.384844897 +0100 +@@ -123,7 +123,7 @@ + + %: %.o + $(LIBTOOL) --tag=CC --mode=link $(CC) -o $@ -static \ +- $^ $(OBJS) $(LDFLAGS) -lz ${LIBS} ++ $(^:.o=.lo) $(OBJS) $(LDFLAGS) -lz ${LIBS} + + include $(srcdir)/deps + diff --git a/pkgs/servers/dict/default.nix b/pkgs/servers/dict/default.nix index 51de674eb9f7..1fb7c24418f0 100644 --- a/pkgs/servers/dict/default.nix +++ b/pkgs/servers/dict/default.nix @@ -1,19 +1,22 @@ -{ stdenv, fetchurl, which, bison, flex }: +{ stdenv, fetchurl, which, bison, flex, libmaa, zlib, libtool }: -stdenv.mkDerivation { - name = "dictd-1.9.15"; +stdenv.mkDerivation rec { + version = "1.12.1"; + name = "dictd-${version}"; src = fetchurl { - url = mirror://sourceforge/dict/dictd-1.9.15.tar.gz; - sha256 = "0p41yf72l0igmshz6vxy3hm51z25600vrnb9j2jpgws4c03fqnac"; + url = "mirror://sourceforge/dict/dictd-${version}.tar.gz"; + sha256 = "0min6v60b6z5mrymyjfwzx8nv6rdm8pd8phlwl6v2jl5vkngcdx2"; }; - buildInputs = [ flex bison which ]; - + buildInputs = [ flex bison which libmaa zlib libtool ]; + + patchPhase = "patch -p0 < ${./buildfix.diff}"; configureFlags = "--datadir=/var/run/current-system/share/dictd"; - meta = { + meta = with stdenv.lib; { description = "Dict protocol server and client"; - maintainers = with stdenv.lib.maintainers; mornfall; + maintainers = maintainers.mornfall; + platforms = platforms.linux; }; } diff --git a/pkgs/servers/dict/libmaa.nix b/pkgs/servers/dict/libmaa.nix new file mode 100644 index 000000000000..c63306e1ff4f --- /dev/null +++ b/pkgs/servers/dict/libmaa.nix @@ -0,0 +1,20 @@ +{ stdenv, fetchurl, libtool }: + +stdenv.mkDerivation rec { + version = "1.3.2"; + name = "libmaa-${version}"; + + src = fetchurl { + url = "mirror://sourceforge/dict/libmaa-${version}.tar.gz"; + sha256 = "1idi4c30pi79g5qfl7rr9s17krbjbg93bi8f2qrbsdlh78ga19ar"; + }; + + buildInputs = [ libtool ]; + # configureFlags = "--datadir=/var/run/current-system/share/dictd"; + + meta = with stdenv.lib; { + description = "Dict protocol server and client"; + maintainers = maintainers.mornfall; + platforms = platforms.linux; + }; +} diff --git a/pkgs/top-level/all-packages.nix b/pkgs/top-level/all-packages.nix index 1679e994a088..423e627a89b3 100644 --- a/pkgs/top-level/all-packages.nix +++ b/pkgs/top-level/all-packages.nix @@ -6107,7 +6107,9 @@ let dico = callPackage ../servers/dico { }; - dict = callPackage ../servers/dict { }; + dict = callPackage ../servers/dict { + libmaa = callPackage ../servers/dict/libmaa.nix {}; + }; dictdDBs = recurseIntoAttrs (import ../servers/dict/dictd-db.nix { inherit builderDefs; From 62e78f6b23a9dd77411e8ffd5adcf6bd1083cd50 Mon Sep 17 00:00:00 2001 From: "William A. Kennington III" Date: Fri, 31 Jan 2014 02:34:27 -0600 Subject: [PATCH 092/128] openssh: Upgrade from 6.4p1 -> 6.5p1 --- pkgs/tools/networking/openssh/default.nix | 22 +++++++++++----------- 1 file changed, 11 insertions(+), 11 deletions(-) diff --git a/pkgs/tools/networking/openssh/default.nix b/pkgs/tools/networking/openssh/default.nix index 1f785fdf730b..0391d8f7b40e 100644 --- a/pkgs/tools/networking/openssh/default.nix +++ b/pkgs/tools/networking/openssh/default.nix @@ -13,15 +13,16 @@ let url = mirror://sourceforge/hpnssh/openssh-6.3p1-hpnssh14v2.diff.gz; sha256 = "1jldqjwry9qpxxzb3mikfmmmv90mfb7xkmcfdbvwqac6nl3r7bi3"; }; + optionalString = stdenv.lib.optionalString; in stdenv.mkDerivation rec { - name = "openssh-6.4p1"; + name = "openssh-6.5p1"; src = fetchurl { url = "ftp://ftp.nl.uu.net/pub/OpenBSD/OpenSSH/portable/${name}.tar.gz"; - sha256 = "1lkmi7v83qvpcc04qrrqk4k7mafnmwxkfk1ccsisw51va4bgcc2m"; + sha256 = "09wh7mi65aahyxd2xvq1makckhd5laid8c0pb8njaidrbpamw6d1"; }; prePatch = stdenv.lib.optionalString hpnSupport @@ -32,9 +33,8 @@ stdenv.mkDerivation rec { patches = [ ./locale_archive.patch ]; - buildInputs = [ zlib openssl libedit pkgconfig pam ] ++ - (if withKerberos then [ kerberos ] else []) - ; + buildInputs = [ zlib openssl libedit pkgconfig pam ] + ++ stdenv.lib.optional withKerberos [ kerberos ]; # I set --disable-strip because later we strip anyway. And it fails to strip # properly when cross building. @@ -44,8 +44,8 @@ stdenv.mkDerivation rec { --with-libedit=yes --disable-strip ${if pam != null then "--with-pam" else "--without-pam"} - ${if etcDir != null then "--sysconfdir=${etcDir}" else ""} - ${if withKerberos then "--with-kerberos5=${kerberos}" else ""} + ${optionalString (etcDir != null) "--sysconfdir=${etcDir}"} + ${optionalString withKerberos "--with-kerberos5=${kerberos}"} ''; preConfigure = @@ -67,11 +67,11 @@ stdenv.mkDerivation rec { installTargets = "install-nosysconf"; - meta = { - homepage = http://www.openssh.org/; + meta = with stdenv.lib; { + homepage = "http://www.openssh.org/"; description = "An implementation of the SSH protocol"; license = "bsd"; - platforms = stdenv.lib.platforms.unix; - maintainers = stdenv.lib.maintainers.eelco; + platforms = platforms.unix; + maintainers = with maintainers; [ eelco ]; }; } From 54288f5cfe4e48779d7c08abefa8cbb23d58e58a Mon Sep 17 00:00:00 2001 From: Rob Vermaas Date: Fri, 31 Jan 2014 16:30:51 +0100 Subject: [PATCH 093/128] Update hipchat --- .../instant-messengers/hipchat/default.nix | 47 ++++++++++--------- pkgs/top-level/all-packages.nix | 2 +- 2 files changed, 27 insertions(+), 22 deletions(-) diff --git a/pkgs/applications/networking/instant-messengers/hipchat/default.nix b/pkgs/applications/networking/instant-messengers/hipchat/default.nix index c0f76602b2bb..c7ea2d135d59 100644 --- a/pkgs/applications/networking/instant-messengers/hipchat/default.nix +++ b/pkgs/applications/networking/instant-messengers/hipchat/default.nix @@ -1,21 +1,12 @@ -{ stdenv -, fetchurl -, libtool -, libXext -, libSM -, libICE -, libX11 -, libXft -, libXau -, libXdmcp -, libXrender -, freetype -, fontconfig -, openssl +{ stdenv, fetchurl, libtool, libXext, libSM, libICE, libX11, libXft, libXau, libXdmcp, libXrender +, libxcb, libXfixes, libXcomposite, libXi, dbus, freetype, fontconfig, openssl, zlib, mesa +, libxslt, libxml2 }: +assert stdenv.system == "i686-linux" || stdenv.system == "x86_64-linux"; + let - version = "1.94.407"; + version = "2.1.982"; rpath = stdenv.lib.makeSearchPath "lib" [ stdenv.glibc @@ -29,15 +20,29 @@ let libXau libXdmcp libXrender + libxcb + libXfixes + libXcomposite + libXi + dbus freetype fontconfig openssl + zlib + mesa + libxslt + libxml2 ]; - src = fetchurl { - url = "http://downloads.hipchat.com/linux/arch/hipchat-${version}-i686.pkg.tar.xz"; - sha256 = "0kyjpa2ir066zqkvs1zmnx6kvl8v4jfl8h7bw110cgigwmiplk7k"; - }; + src = + if stdenv.system == "i686-linux" then fetchurl { + url = "http://downloads.hipchat.com/linux/arch/i686/hipchat-${version}-i686.pkg.tar.xz"; + sha256 = "1i60fkl5hdx2p2yfsx9w8qkzn6hl8fajvfls0r0gc2bqc9whg6vn"; + } else fetchurl { + url = "http://downloads.hipchat.com/linux/arch/x86_64/hipchat-${version}-x86_64.pkg.tar.xz"; + sha256 = "12bn4la9z1grkbcnixjwhadgxa2g6qkd5x7r3l3vn1sdalgal4ks"; + }; + in stdenv.mkDerivation { name = "hipchat-${version}"; @@ -49,8 +54,8 @@ in stdenv.mkDerivation { mv usr/share $out patchShebangs $out/bin for file in $(find $out/lib -type f); do - patchelf --set-interpreter ${stdenv.glibc}/lib/ld-linux.so.2 $file || true - patchelf --set-rpath ${rpath}:$out/lib $file || true + patchelf --set-interpreter $(cat $NIX_GCC/nix-support/dynamic-linker) $file || true + patchelf --set-rpath ${rpath}:${stdenv.lib.optionalString stdenv.is64bit "${stdenv.gcc.gcc}/lib64:"}$out/lib $file || true done substituteInPlace $out/share/applications/hipchat.desktop \ --replace /opt/HipChat/bin $out/bin diff --git a/pkgs/top-level/all-packages.nix b/pkgs/top-level/all-packages.nix index 423e627a89b3..9ec3270b09de 100644 --- a/pkgs/top-level/all-packages.nix +++ b/pkgs/top-level/all-packages.nix @@ -8068,7 +8068,7 @@ let hexedit = callPackage ../applications/editors/hexedit { }; - hipchat = callPackage_i686 ../applications/networking/instant-messengers/hipchat { }; + hipchat = callPackage ../applications/networking/instant-messengers/hipchat { }; homebank = callPackage ../applications/office/homebank { }; From b913a2eb81b03250a370ecd4456cad2f290f3870 Mon Sep 17 00:00:00 2001 From: Eelco Dolstra Date: Fri, 31 Jan 2014 17:59:51 +0100 Subject: [PATCH 094/128] linux: Update to 3.4.78 --- pkgs/os-specific/linux/kernel/linux-3.4.nix | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/pkgs/os-specific/linux/kernel/linux-3.4.nix b/pkgs/os-specific/linux/kernel/linux-3.4.nix index d1909c17967a..14a4b64fe550 100644 --- a/pkgs/os-specific/linux/kernel/linux-3.4.nix +++ b/pkgs/os-specific/linux/kernel/linux-3.4.nix @@ -1,11 +1,11 @@ { stdenv, fetchurl, ... } @ args: import ./generic.nix (args // rec { - version = "3.4.77"; + version = "3.4.78"; src = fetchurl { url = "mirror://kernel/linux/kernel/v3.x/linux-${version}.tar.xz"; - sha256 = "05hfa5cxcxvqg183amfpvjzh6i9lphx1956j92sh6r90pnhg0xgz"; + sha256 = "1n9avgjy3qpr28n1rq80kc1gn33w9nz6bvwds6i4d5z793fp7qpk"; }; features.iwlwifi = true; From 2778c00bfe1b472c40400a0867e3dfbf0be27481 Mon Sep 17 00:00:00 2001 From: Jaka Hudoklin Date: Fri, 31 Jan 2014 13:38:53 +0100 Subject: [PATCH 095/128] amdadl-sdk: set license to unfree (close #1647) We cannot auto build amdadl-sdk on hydra, so setting license to unfree disable auto builds. I also remove amdadl license, because it's irrelevant. vcunat changed string license to attribute. --- lib/licenses.nix | 6 ------ pkgs/development/misc/amdadl-sdk/default.nix | 2 +- 2 files changed, 1 insertion(+), 7 deletions(-) diff --git a/lib/licenses.nix b/lib/licenses.nix index b13a72f3f644..cda43583279f 100644 --- a/lib/licenses.nix +++ b/lib/licenses.nix @@ -28,12 +28,6 @@ url = "http://developer.amd.com/amd-license-agreement/"; }; - amdadl = { - shortName = "amd-adl"; - fullName = "amd-adl license"; - url = "http://sources.gentoo.org/cgi-bin/viewvc.cgi/gentoo-x86/licenses/AMD-ADL?revision=1.1"; - }; - # Apple Public Source License 2.0; # http://opensource.org/licenses/APSL-2.0 apsl20 = "APSL 2.0"; diff --git a/pkgs/development/misc/amdadl-sdk/default.nix b/pkgs/development/misc/amdadl-sdk/default.nix index f131295bcba5..6907a38d5a4f 100644 --- a/pkgs/development/misc/amdadl-sdk/default.nix +++ b/pkgs/development/misc/amdadl-sdk/default.nix @@ -42,7 +42,7 @@ stdenv.mkDerivation rec { meta = with stdenv.lib; { description = "API to access display driver functionality for ATI graphics cards"; homepage = http://developer.amd.com/tools/graphics-development/display-library-adl-sdk/; - license = licenses.amdadl; + license = "unfree"; maintainers = [ maintainers.offline ]; platforms = stdenv.lib.platforms.linux; hydraPlatforms = []; From 34b0e59c0a01eeabfc67bdfc7f805d053773079b Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Vladim=C3=ADr=20=C4=8Cun=C3=A1t?= Date: Fri, 31 Jan 2014 18:51:10 +0100 Subject: [PATCH 096/128] fixup previous commit: do the change to attribute --- pkgs/development/misc/amdadl-sdk/default.nix | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/pkgs/development/misc/amdadl-sdk/default.nix b/pkgs/development/misc/amdadl-sdk/default.nix index 6907a38d5a4f..c177d8fe03fd 100644 --- a/pkgs/development/misc/amdadl-sdk/default.nix +++ b/pkgs/development/misc/amdadl-sdk/default.nix @@ -42,7 +42,7 @@ stdenv.mkDerivation rec { meta = with stdenv.lib; { description = "API to access display driver functionality for ATI graphics cards"; homepage = http://developer.amd.com/tools/graphics-development/display-library-adl-sdk/; - license = "unfree"; + license = licenses.unfree; maintainers = [ maintainers.offline ]; platforms = stdenv.lib.platforms.linux; hydraPlatforms = []; From bfa56d7657e4e4d3f0180e16e20cd7e3e132d919 Mon Sep 17 00:00:00 2001 From: Rob Vermaas Date: Fri, 31 Jan 2014 21:14:05 +0100 Subject: [PATCH 097/128] httpd: Only add PHPRC to environment of httpd when enablePHP is true. --- nixos/modules/services/web-servers/apache-httpd/default.nix | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/nixos/modules/services/web-servers/apache-httpd/default.nix b/nixos/modules/services/web-servers/apache-httpd/default.nix index 2552ec18bb92..d6c539aa78b6 100644 --- a/nixos/modules/services/web-servers/apache-httpd/default.nix +++ b/nixos/modules/services/web-servers/apache-httpd/default.nix @@ -628,8 +628,8 @@ in ++ concatMap (svc: svc.extraServerPath) allSubservices; environment = - { PHPRC = if enablePHP then phpIni else ""; - } // (listToAttrs (concatMap (svc: svc.globalEnvVars) allSubservices)); + (listToAttrs (concatMap (svc: svc.globalEnvVars) allSubservices)) + // optionalAttrs enablePHP { PHPRC = phpIni; }; preStart = '' From 9b1bd849402d208e7f0c8a0c0032adca41ab74e4 Mon Sep 17 00:00:00 2001 From: Rob Vermaas Date: Fri, 31 Jan 2014 21:18:24 +0100 Subject: [PATCH 098/128] httpd: Respect original order of environment eval. --- nixos/modules/services/web-servers/apache-httpd/default.nix | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/nixos/modules/services/web-servers/apache-httpd/default.nix b/nixos/modules/services/web-servers/apache-httpd/default.nix index d6c539aa78b6..b96f5cf159b0 100644 --- a/nixos/modules/services/web-servers/apache-httpd/default.nix +++ b/nixos/modules/services/web-servers/apache-httpd/default.nix @@ -628,8 +628,8 @@ in ++ concatMap (svc: svc.extraServerPath) allSubservices; environment = - (listToAttrs (concatMap (svc: svc.globalEnvVars) allSubservices)) - // optionalAttrs enablePHP { PHPRC = phpIni; }; + optionalAttrs enablePHP { PHPRC = phpIni; } + // (listToAttrs (concatMap (svc: svc.globalEnvVars) allSubservices)); preStart = '' From f9f065a17809c3b8c4998df0160d6262357626fd Mon Sep 17 00:00:00 2001 From: "William A. Kennington III" Date: Fri, 31 Jan 2014 15:28:50 -0600 Subject: [PATCH 099/128] kernel: Upgrade from 3.13.0 -> 3.13.1 --- pkgs/os-specific/linux/kernel/linux-3.13.nix | 6 ++---- 1 file changed, 2 insertions(+), 4 deletions(-) diff --git a/pkgs/os-specific/linux/kernel/linux-3.13.nix b/pkgs/os-specific/linux/kernel/linux-3.13.nix index 967de85b7b3f..437e4bc025a1 100644 --- a/pkgs/os-specific/linux/kernel/linux-3.13.nix +++ b/pkgs/os-specific/linux/kernel/linux-3.13.nix @@ -1,13 +1,11 @@ { stdenv, fetchurl, ... } @ args: import ./generic.nix (args // rec { - version = "3.13"; - - modDirVersion = "3.13.0"; + version = "3.13.1"; src = fetchurl { url = "mirror://kernel/linux/kernel/v3.x/linux-${version}.tar.xz"; - sha256 = "4d5e5eee5f276424c32e9591f1b6c971baedc7b49f28ce03d1f48b1e5d6226a2"; + sha256 = "0gkikbz676h79rv0aaihl90mw7fqhjx3rkhcqrmzggjb54048jvq"; }; features.iwlwifi = true; From 6d449f7c60f1cd33f7bc34097353515f79871c68 Mon Sep 17 00:00:00 2001 From: "Ricardo M. Correia" Date: Sat, 1 Feb 2014 01:44:39 +0100 Subject: [PATCH 100/128] libarchive: Add extra source URL (close #1655) It seems that libarchive's home page has not been available for at least the past couple of days. --- pkgs/development/libraries/libarchive/default.nix | 5 ++++- 1 file changed, 4 insertions(+), 1 deletion(-) diff --git a/pkgs/development/libraries/libarchive/default.nix b/pkgs/development/libraries/libarchive/default.nix index e0f2ba77de2d..7abad2f2d089 100644 --- a/pkgs/development/libraries/libarchive/default.nix +++ b/pkgs/development/libraries/libarchive/default.nix @@ -5,7 +5,10 @@ stdenv.mkDerivation rec { name = "libarchive-3.1.2"; src = fetchurl { - url = "${meta.homepage}/downloads/${name}.tar.gz"; + urls = [ + "http://pkgs.fedoraproject.org/repo/pkgs/libarchive/libarchive-3.1.2.tar.gz/efad5a503f66329bb9d2f4308b5de98a/${name}.tar.gz" + "${meta.homepage}/downloads/${name}.tar.gz" + ]; sha256 = "0pixqnrcf35dnqgv0lp7qlcw7k13620qkhgxr288v7p4iz6ym1zb"; }; From 5d2e884aa1cf3f0078ac0a109514500570bb89cb Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Vladim=C3=ADr=20=C4=8Cun=C3=A1t?= Date: Sat, 1 Feb 2014 08:43:33 +0100 Subject: [PATCH 101/128] pidgin: minor update 2.10.7 -> .8, including CVE-2013-6484 Also switch no newer libstartup-notification, add license and platforms. --- .../networking/instant-messengers/pidgin/default.nix | 8 +++++--- pkgs/top-level/all-packages.nix | 2 +- 2 files changed, 6 insertions(+), 4 deletions(-) diff --git a/pkgs/applications/networking/instant-messengers/pidgin/default.nix b/pkgs/applications/networking/instant-messengers/pidgin/default.nix index d0652adcb0d6..53790cd2b8be 100644 --- a/pkgs/applications/networking/instant-messengers/pidgin/default.nix +++ b/pkgs/applications/networking/instant-messengers/pidgin/default.nix @@ -21,10 +21,10 @@ } : stdenv.mkDerivation rec { - name = "pidgin-2.10.7"; + name = "pidgin-2.10.8"; src = fetchurl { url = "mirror://sourceforge/pidgin/${name}.tar.bz2"; - sha256 = "14piyx4xpc3l8286x4nh5pna2wfyn9cv0qa29br1q3d2xja2k8zb"; + sha256 = "09w2gbnplyw21lmf9jwk6vkk5gpx5lq15s38bmhkxzw86mz3ccxn"; }; inherit nss ncurses; @@ -51,8 +51,10 @@ stdenv.mkDerivation rec { configureFlags="--with-nspr-includes=${nspr}/include/nspr --with-nspr-libs=${nspr}/lib --with-nss-includes=${nss}/include/nss --with-nss-libs=${nss}/lib --with-ncurses-headers=${ncurses}/include --disable-meanwhile --disable-nm --disable-tcl" + (lib.optionalString (gnutls != null) " --enable-gnutls=yes --enable-nss=no") ; - meta = { + meta = with stdenv.lib; { description = "Pidgin IM - XMPP(Jabber), AIM/ICQ, IRC, SIP etc client"; homepage = http://pidgin.im; + license = licenses.gpl2Plus; + platforms = platforms.linux; }; } diff --git a/pkgs/top-level/all-packages.nix b/pkgs/top-level/all-packages.nix index 9ec3270b09de..a4b687c344e1 100644 --- a/pkgs/top-level/all-packages.nix +++ b/pkgs/top-level/all-packages.nix @@ -8555,7 +8555,7 @@ let openssl = if config.pidgin.openssl or true then openssl else null; gnutls = if config.pidgin.gnutls or false then gnutls else null; libgcrypt = if config.pidgin.gnutls or false then libgcrypt else null; - inherit (gnome) startupnotification; + startupnotification = libstartup_notification; }; pidginlatex = callPackage ../applications/networking/instant-messengers/pidgin-plugins/pidgin-latex { From f33d50c04eff944ce5b795c1ede9a00be7eee0a6 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Vladim=C3=ADr=20=C4=8Cun=C3=A1t?= Date: Sat, 1 Feb 2014 09:07:16 +0100 Subject: [PATCH 102/128] openssh_hpn: mark as broken ATM, cf. #1640 --- pkgs/tools/networking/openssh/default.nix | 1 + 1 file changed, 1 insertion(+) diff --git a/pkgs/tools/networking/openssh/default.nix b/pkgs/tools/networking/openssh/default.nix index 0391d8f7b40e..0b68ec83b522 100644 --- a/pkgs/tools/networking/openssh/default.nix +++ b/pkgs/tools/networking/openssh/default.nix @@ -73,5 +73,6 @@ stdenv.mkDerivation rec { license = "bsd"; platforms = platforms.unix; maintainers = with maintainers; [ eelco ]; + broken = hpnSupport; # cf. https://github.com/NixOS/nixpkgs/pull/1640 }; } From 449cfcfa918fad8487f966b978d629f66f823f29 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Vladim=C3=ADr=20=C4=8Cun=C3=A1t?= Date: Sat, 1 Feb 2014 10:09:52 +0100 Subject: [PATCH 103/128] gnome3: re-introduce libsoup dependency (fix many evals) --- pkgs/desktops/gnome-3/default.nix | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/pkgs/desktops/gnome-3/default.nix b/pkgs/desktops/gnome-3/default.nix index 1b440be200ae..56d38bf1d903 100644 --- a/pkgs/desktops/gnome-3/default.nix +++ b/pkgs/desktops/gnome-3/default.nix @@ -6,7 +6,7 @@ rec { libcanberra = pkgs.libcanberra_gtk3; # just to be sure inherit (pkgs.gnome2) gnome_common ORBit2; orbit = ORBit2; - + inherit (pkgs) libsoup; #### Core (http://ftp.acc.umu.se/pub/GNOME/core/) From ddf5841d74a6037197d0f8aa24a2f3ef9b6de1ba Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Vladim=C3=ADr=20=C4=8Cun=C3=A1t?= Date: Sat, 1 Feb 2014 10:12:36 +0100 Subject: [PATCH 104/128] libsoup: enable introspection (gnome3 stuff needs it) Also some minor refactoring of the expression. --- pkgs/development/libraries/libsoup/default.nix | 13 +++++++------ 1 file changed, 7 insertions(+), 6 deletions(-) diff --git a/pkgs/development/libraries/libsoup/default.nix b/pkgs/development/libraries/libsoup/default.nix index 121244745660..049d6646ec8a 100644 --- a/pkgs/development/libraries/libsoup/default.nix +++ b/pkgs/development/libraries/libsoup/default.nix @@ -1,12 +1,13 @@ { stdenv, fetchurl, glib, libxml2, pkgconfig -, gnomeSupport ? true, libgnome_keyring, sqlite, glib_networking +, gnomeSupport ? true, libgnome_keyring, sqlite, glib_networking, gobjectIntrospection , libintlOrEmpty , intltool, python }: - -stdenv.mkDerivation rec { - name = "libsoup-${version}"; +let majorVersion = "2.45"; version = "${majorVersion}.3"; +in +stdenv.mkDerivation { + name = "libsoup-${version}"; src = fetchurl { url = "mirror://gnome/sources/libsoup/${majorVersion}/libsoup-${version}.tar.xz"; @@ -15,11 +16,11 @@ stdenv.mkDerivation rec { patchPhase = '' patchShebangs libsoup/ - ''; + ''; buildInputs = libintlOrEmpty ++ [ intltool python ]; nativeBuildInputs = [ pkgconfig ]; - propagatedBuildInputs = [ glib libxml2 ] + propagatedBuildInputs = [ glib libxml2 gobjectIntrospection ] ++ stdenv.lib.optionals gnomeSupport [ libgnome_keyring sqlite ]; passthru.propagatedUserEnvPackages = [ glib_networking ]; From c79bda8d47772fdde7752fb22ae9f6bbb379cbe1 Mon Sep 17 00:00:00 2001 From: Eelco Dolstra Date: Sat, 1 Feb 2014 11:55:14 +0100 Subject: [PATCH 105/128] release-small.nix: Disable FreeBSD --- pkgs/top-level/release-small.nix | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/pkgs/top-level/release-small.nix b/pkgs/top-level/release-small.nix index 213358bc8ce7..14812b3e8112 100644 --- a/pkgs/top-level/release-small.nix +++ b/pkgs/top-level/release-small.nix @@ -2,7 +2,7 @@ the load on Hydra when testing the `stdenv-updates' branch. */ { nixpkgs ? { outPath = (import ./all-packages.nix {}).lib.cleanSource ../..; revCount = 1234; shortRev = "abcdef"; } -, supportedSystems ? [ "x86_64-linux" "i686-linux" "x86_64-darwin" "x86_64-freebsd" "i686-freebsd" ] +, supportedSystems ? [ "x86_64-linux" "i686-linux" "x86_64-darwin" ] }: with import ./release-lib.nix { inherit supportedSystems; }; From 21a220900ad72cebc08286f2f9d936db0da7fa6f Mon Sep 17 00:00:00 2001 From: James Cook Date: Sat, 1 Feb 2014 01:07:00 -0800 Subject: [PATCH 106/128] libyaml: Patch to fix CVE-2013-6393 (close #1658) --- .../libraries/libyaml/cve-2013-6393_a.patch | 11 ++ .../libraries/libyaml/cve-2013-6393_b.patch | 16 +++ .../libraries/libyaml/cve-2013-6393_c.patch | 131 ++++++++++++++++++ .../development/libraries/libyaml/default.nix | 3 + 4 files changed, 161 insertions(+) create mode 100644 pkgs/development/libraries/libyaml/cve-2013-6393_a.patch create mode 100644 pkgs/development/libraries/libyaml/cve-2013-6393_b.patch create mode 100644 pkgs/development/libraries/libyaml/cve-2013-6393_c.patch diff --git a/pkgs/development/libraries/libyaml/cve-2013-6393_a.patch b/pkgs/development/libraries/libyaml/cve-2013-6393_a.patch new file mode 100644 index 000000000000..130107341f7f --- /dev/null +++ b/pkgs/development/libraries/libyaml/cve-2013-6393_a.patch @@ -0,0 +1,11 @@ +--- a/src/scanner.c ++++ a/src/scanner.c +@@ -2574,7 +2574,7 @@ + + /* Resize the string to include the head. */ + +- while (string.end - string.start <= (int)length) { ++ while ((size_t)(string.end - string.start) <= length) { + if (!yaml_string_extend(&string.start, &string.pointer, &string.end)) { + parser->error = YAML_MEMORY_ERROR; + goto error; diff --git a/pkgs/development/libraries/libyaml/cve-2013-6393_b.patch b/pkgs/development/libraries/libyaml/cve-2013-6393_b.patch new file mode 100644 index 000000000000..db2b9ff2bba6 --- /dev/null +++ b/pkgs/development/libraries/libyaml/cve-2013-6393_b.patch @@ -0,0 +1,16 @@ +--- a/src/api.c ++++ a/src/api.c +@@ -117,7 +117,12 @@ + YAML_DECLARE(int) + yaml_stack_extend(void **start, void **top, void **end) + { +- void *new_start = yaml_realloc(*start, ((char *)*end - (char *)*start)*2); ++ void *new_start; ++ ++ if ((char *)*end - (char *)*start >= INT_MAX / 2) ++ return 0; ++ ++ new_start = yaml_realloc(*start, ((char *)*end - (char *)*start)*2); + + if (!new_start) return 0; + diff --git a/pkgs/development/libraries/libyaml/cve-2013-6393_c.patch b/pkgs/development/libraries/libyaml/cve-2013-6393_c.patch new file mode 100644 index 000000000000..dc1c50da4e87 --- /dev/null +++ b/pkgs/development/libraries/libyaml/cve-2013-6393_c.patch @@ -0,0 +1,131 @@ +--- a/src/scanner.c Mon Dec 24 03:51:32 2012 +0000 ++++ a/src/scanner.c Mon Jan 27 19:48:28 2014 -0500 +@@ -615,11 +615,14 @@ + */ + + static int +-yaml_parser_roll_indent(yaml_parser_t *parser, int column, ++yaml_parser_roll_indent(yaml_parser_t *parser, size_t column, + int number, yaml_token_type_t type, yaml_mark_t mark); + + static int +-yaml_parser_unroll_indent(yaml_parser_t *parser, int column); ++yaml_parser_unroll_indent(yaml_parser_t *parser, size_t column); ++ ++static int ++yaml_parser_reset_indent(yaml_parser_t *parser); + + /* + * Token fetchers. +@@ -1206,7 +1209,7 @@ + */ + + static int +-yaml_parser_roll_indent(yaml_parser_t *parser, int column, ++yaml_parser_roll_indent(yaml_parser_t *parser, size_t column, + int number, yaml_token_type_t type, yaml_mark_t mark) + { + yaml_token_t token; +@@ -1216,7 +1219,7 @@ + if (parser->flow_level) + return 1; + +- if (parser->indent < column) ++ if (parser->indent == -1 || parser->indent < column) + { + /* + * Push the current indentation level to the stack and set the new +@@ -1254,7 +1257,7 @@ + + + static int +-yaml_parser_unroll_indent(yaml_parser_t *parser, int column) ++yaml_parser_unroll_indent(yaml_parser_t *parser, size_t column) + { + yaml_token_t token; + +@@ -1263,6 +1266,15 @@ + if (parser->flow_level) + return 1; + ++ /* ++ * column is unsigned and parser->indent is signed, so if ++ * parser->indent is less than zero the conditional in the while ++ * loop below is incorrect. Guard against that. ++ */ ++ ++ if (parser->indent < 0) ++ return 1; ++ + /* Loop through the intendation levels in the stack. */ + + while (parser->indent > column) +@@ -1283,6 +1295,41 @@ + } + + /* ++ * Pop indentation levels from the indents stack until the current ++ * level resets to -1. For each intendation level, append the ++ * BLOCK-END token. ++ */ ++ ++static int ++yaml_parser_reset_indent(yaml_parser_t *parser) ++{ ++ yaml_token_t token; ++ ++ /* In the flow context, do nothing. */ ++ ++ if (parser->flow_level) ++ return 1; ++ ++ /* Loop through the intendation levels in the stack. */ ++ ++ while (parser->indent > -1) ++ { ++ /* Create a token and append it to the queue. */ ++ ++ TOKEN_INIT(token, YAML_BLOCK_END_TOKEN, parser->mark, parser->mark); ++ ++ if (!ENQUEUE(parser, parser->tokens, token)) ++ return 0; ++ ++ /* Pop the indentation level. */ ++ ++ parser->indent = POP(parser, parser->indents); ++ } ++ ++ return 1; ++} ++ ++/* + * Initialize the scanner and produce the STREAM-START token. + */ + +@@ -1338,7 +1385,7 @@ + + /* Reset the indentation level. */ + +- if (!yaml_parser_unroll_indent(parser, -1)) ++ if (!yaml_parser_reset_indent(parser)) + return 0; + + /* Reset simple keys. */ +@@ -1369,7 +1416,7 @@ + + /* Reset the indentation level. */ + +- if (!yaml_parser_unroll_indent(parser, -1)) ++ if (!yaml_parser_reset_indent(parser)) + return 0; + + /* Reset simple keys. */ +@@ -1407,7 +1454,7 @@ + + /* Reset the indentation level. */ + +- if (!yaml_parser_unroll_indent(parser, -1)) ++ if (!yaml_parser_reset_indent(parser)) + return 0; + + /* Reset simple keys. */ diff --git a/pkgs/development/libraries/libyaml/default.nix b/pkgs/development/libraries/libyaml/default.nix index cf687c972430..93f19165e88d 100644 --- a/pkgs/development/libraries/libyaml/default.nix +++ b/pkgs/development/libraries/libyaml/default.nix @@ -8,6 +8,9 @@ stdenv.mkDerivation { sha256 = "0dvavrhxjrjfxgdgysxqfpdy08lpg3m9i8vxjyvdkcjsmra1by3v"; }; + # Downloaded on 2014-02-01 from https://bugzilla.redhat.com/show_bug.cgi?id=1033990 + patches = [ ./cve-2013-6393_a.patch ./cve-2013-6393_b.patch ./cve-2013-6393_c.patch ]; + meta = { homepage = http://pyyaml.org/; description = "A YAML 1.1 parser and emitter written in C"; From 0602ef22de47435cc62f6a09111363f3084ef514 Mon Sep 17 00:00:00 2001 From: Arvin Moezzi Date: Sat, 1 Feb 2014 11:48:00 +0100 Subject: [PATCH 107/128] git-daemon service: fix typo in option (close #1659) --- nixos/modules/services/networking/git-daemon.nix | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/nixos/modules/services/networking/git-daemon.nix b/nixos/modules/services/networking/git-daemon.nix index a7c7c206198f..2e7c9c68e2fa 100644 --- a/nixos/modules/services/networking/git-daemon.nix +++ b/nixos/modules/services/networking/git-daemon.nix @@ -101,7 +101,7 @@ in name = "git-daemon"; startOn = "ip-up"; exec = "${pkgs.git}/bin/git daemon --reuseaddr " - + (optionalString (cfg.basePath != "") "--basepath=${cfg.basePath} ") + + (optionalString (cfg.basePath != "") "--base-path=${cfg.basePath} ") + (optionalString (cfg.listenAddress != "") "--listen=${cfg.listenAddress} ") + "--port=${toString cfg.port} --user=${gitUser} --group=${gitUser} ${cfg.options} " + "--verbose " + (optionalString cfg.exportAll "--export-all") + concatStringsSep " " cfg.repositories; From 5227638ee0934cd4570e494761672ff6a3a28ebf Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Vladim=C3=ADr=20=C4=8Cun=C3=A1t?= Date: Sat, 1 Feb 2014 12:44:22 +0100 Subject: [PATCH 108/128] libusb1: minor update x-1.0.17 -> 1.0.18 (joined) The forks joined (or rather libusbx continues under libusb name). http://sourceforge.net/p/libusb/mailman/message/31886062/ --- pkgs/development/libraries/libusb1/default.nix | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/pkgs/development/libraries/libusb1/default.nix b/pkgs/development/libraries/libusb1/default.nix index 3833e5bffa1a..8be17b289f7e 100644 --- a/pkgs/development/libraries/libusb1/default.nix +++ b/pkgs/development/libraries/libusb1/default.nix @@ -1,14 +1,14 @@ { stdenv, fetchurl, pkgconfig, udev }: let - version = "1.0.17"; + version = "1.0.18"; in stdenv.mkDerivation rec { - name = "libusbx-${version}"; # it's a fork of original libusb1; should be mostly compatible + name = "libusb-${version}"; # at 1.0.18 libusb joined with libusbx src = fetchurl { - url = "mirror://sourceforge/libusbx/libusbx-${version}.tar.bz2"; - sha256 = "1f25a773x9x5n48a0mcigyk77ay0hkiz6y6bi4588wzf7wn8svw7"; + url = "mirror://sourceforge/libusb/libusb-${version}.tar.bz2"; + sha256 = "081px0j98az0pjwwyjlq4qcmfn194fvm3qd4im0r9pm58pn5qgy7"; }; buildInputs = [ pkgconfig ]; @@ -17,7 +17,7 @@ stdenv.mkDerivation rec { NIX_LDFLAGS = stdenv.lib.optionalString stdenv.isLinux "-lgcc_s"; meta = { - homepage = http://www.libusb.org; + homepage = http://www.libusb.info; description = "User-space USB library"; platforms = stdenv.lib.platforms.unix; maintainers = [ stdenv.lib.maintainers.urkud ]; From 3dc05acf6a5d7907626c7deb6bb27625320f8b65 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Bj=C3=B8rn=20Forsman?= Date: Sat, 1 Feb 2014 13:45:00 +0100 Subject: [PATCH 109/128] directfb: update from 1.6.2 to 1.6.3 There is a 1.7.x release out but to minimize chances of breaking dependees I'm only bumping the minimal needed to be compatible with ilixi (a gui toolkit for directfb that I'm packaging). --- pkgs/development/libraries/directfb/src-for-default.nix | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/pkgs/development/libraries/directfb/src-for-default.nix b/pkgs/development/libraries/directfb/src-for-default.nix index a9c8c16a9d33..be583e08b6bc 100644 --- a/pkgs/development/libraries/directfb/src-for-default.nix +++ b/pkgs/development/libraries/directfb/src-for-default.nix @@ -1,9 +1,9 @@ rec { - version="1.6.2"; - name="directfb-1.6.2"; - hash="0k9x8lnjvlyalsd07a8z4iv2rfmpiz6j7aj0y4m4sybxhc8c86xr"; + version="1.6.3"; + name="directfb-1.6.3"; + hash="0w2yyx6l2wn8jj9y14ymknqyc88wwrl314p9204frck91znsr5ks"; url="http://directfb.org/downloads/Core/DirectFB-1.6/DirectFB-${version}.tar.gz"; - advertisedUrl="http://directfb.org/downloads/Core/DirectFB-1.6/DirectFB-1.6.2.tar.gz"; + advertisedUrl="http://directfb.org/downloads/Core/DirectFB-1.6/DirectFB-1.6.3.tar.gz"; } From 6473c41c71dad155c01cc7e4dee10cc24d3d8612 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Bj=C3=B8rn=20Forsman?= Date: Sat, 1 Feb 2014 14:03:44 +0100 Subject: [PATCH 110/128] directfb: add meta attributes --- .../development/libraries/directfb/default.nix | 18 ++++++++++++++++++ 1 file changed, 18 insertions(+) diff --git a/pkgs/development/libraries/directfb/default.nix b/pkgs/development/libraries/directfb/default.nix index cdc54ef66916..6326efe1adb8 100644 --- a/pkgs/development/libraries/directfb/default.nix +++ b/pkgs/development/libraries/directfb/default.nix @@ -35,4 +35,22 @@ stdenv.mkDerivation { ] ++ stdenv.lib.optionals enableX11 [ "--enable-x11" ]; + + meta = with stdenv.lib; { + description = "Graphics and input library designed with embedded systems in mind"; + longDescription = '' + DirectFB is a thin library that provides hardware graphics acceleration, + input device handling and abstraction, integrated windowing system with + support for translucent windows and multiple display layers, not only on + top of the Linux Framebuffer Device. It is a complete hardware + abstraction layer with software fallbacks for every graphics operation + that is not supported by the underlying hardware. DirectFB adds graphical + power to embedded systems and sets a new standard for graphics under + Linux. + ''; + homepage = http://directfb.org/; + license = licenses.lgpl21; + platforms = platforms.linux; + maintainers = [ maintainers.bjornfor ]; + }; } From 40de4d73b8aa7e7c26e0abf8cb35a46da215b68e Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Bj=C3=B8rn=20Forsman?= Date: Sat, 1 Feb 2014 16:00:40 +0100 Subject: [PATCH 111/128] ilixi: new package ilixi is a lightweight C++ GUI toolkit for embedded Linux systems. http://ilixi.org/ --- pkgs/development/libraries/ilixi/default.nix | 27 ++++++++++++++++++++ pkgs/top-level/all-packages.nix | 2 ++ 2 files changed, 29 insertions(+) create mode 100644 pkgs/development/libraries/ilixi/default.nix diff --git a/pkgs/development/libraries/ilixi/default.nix b/pkgs/development/libraries/ilixi/default.nix new file mode 100644 index 000000000000..dd8ad8b35615 --- /dev/null +++ b/pkgs/development/libraries/ilixi/default.nix @@ -0,0 +1,27 @@ +{ stdenv, fetchurl, pkgconfig, directfb, libsigcxx, libxml2, fontconfig }: + +# TODO: optional deps: baresip, FusionDale, FusionSound, SaWMan, doxygen, +# Reflex, Wnn, NLS + +stdenv.mkDerivation rec { + name = "ilixi-1.0.0"; + + src = fetchurl { + url = "http://www.directfb.org/downloads/Libs/${name}.tar.gz"; + sha256 = "1kmdmqf68jiv7y6as41bhbgdy70yy2i811a3l6kccbazlzpif34v"; + }; + + buildInputs = [ pkgconfig directfb libsigcxx libxml2 fontconfig ]; + + configureFlags = '' + --enable-log-debug --enable-debug --enable-trace --with-examples + ''; + + meta = with stdenv.lib; { + description = "Lightweight C++ GUI toolkit for embedded Linux systems"; + homepage = http://ilixi.org/; + license = licenses.lgpl3; + platforms = platforms.linux; + maintainers = [ maintainers.bjornfor ]; + }; +} diff --git a/pkgs/top-level/all-packages.nix b/pkgs/top-level/all-packages.nix index a4b687c344e1..e2cb2a62174f 100644 --- a/pkgs/top-level/all-packages.nix +++ b/pkgs/top-level/all-packages.nix @@ -4448,6 +4448,8 @@ let ilbc = callPackage ../development/libraries/ilbc { }; + ilixi = callPackage ../development/libraries/ilixi { }; + ilmbase = callPackage ../development/libraries/ilmbase { }; imlib = callPackage ../development/libraries/imlib { From 071e26e5e8ea391099c8918cc8a4cc7d017227fe Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Bj=C3=B8rn=20Forsman?= Date: Sat, 1 Feb 2014 16:25:47 +0100 Subject: [PATCH 112/128] python-dpkt: new package dpkt is a fast, simple packet creation / parsing module, with definitions for the basic TCP/IP protocols. --- pkgs/top-level/python-packages.nix | 21 +++++++++++++++++++++ 1 file changed, 21 insertions(+) diff --git a/pkgs/top-level/python-packages.nix b/pkgs/top-level/python-packages.nix index c9039ec09727..b639f739a052 100644 --- a/pkgs/top-level/python-packages.nix +++ b/pkgs/top-level/python-packages.nix @@ -1418,6 +1418,27 @@ pythonPackages = modules // import ./python-packages-generated.nix { }; + dpkt = buildPythonPackage rec { + name = "dpkt-1.8"; + + src = fetchurl { + url = "https://dpkt.googlecode.com/files/${name}.tar.gz"; + sha256 = "01q5prynymaqyfsfi2296xncicdpid2hs3yyasim8iigvkwy4vf5"; + }; + + # error: invalid command 'test' + doCheck = false; + + meta = with stdenv.lib; { + description = "Fast, simple packet creation / parsing, with definitions for the basic TCP/IP protocols"; + homepage = https://code.google.com/p/dpkt/; + license = licenses.bsd3; + maintainers = [ maintainers.bjornfor ]; + platforms = stdenv.lib.platforms.all; + }; + }; + + evdev = buildPythonPackage rec { version = "0.3.2"; name = "evdev-${version}"; From 9037126df0050748b3bf65b90a6be36e1c3e8cd3 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Bj=C3=B8rn=20Forsman?= Date: Sat, 1 Feb 2014 12:30:23 +0100 Subject: [PATCH 113/128] bcache-tools: new package Bcache is a Linux kernel block layer cache. It allows one or more fast disk drives such as flash-based solid state drives (SSDs) to act as a cache for one or more slower hard disk drives. This package contains the required user-space tools. User documentation is in Documentation/bcache.txt in the Linux kernel tree. http://bcache.evilpiepirate.org/ --- .../filesystems/bcache-tools/default.nix | 51 +++++++++++++++++++ pkgs/top-level/all-packages.nix | 2 + 2 files changed, 53 insertions(+) create mode 100644 pkgs/tools/filesystems/bcache-tools/default.nix diff --git a/pkgs/tools/filesystems/bcache-tools/default.nix b/pkgs/tools/filesystems/bcache-tools/default.nix new file mode 100644 index 000000000000..183b889da9b3 --- /dev/null +++ b/pkgs/tools/filesystems/bcache-tools/default.nix @@ -0,0 +1,51 @@ +{ stdenv, fetchurl, pkgconfig, utillinux, kmod }: + +stdenv.mkDerivation rec { + name = "bcache-tools-${version}"; + version = "1.0.5"; + + src = fetchurl { + url = "https://github.com/g2p/bcache-tools/archive/v${version}.tar.gz"; + sha256 = "1abf86xcnj601lddig3kmn26jrf8q8xhcyszf5pxrcs5ym72jj8l"; + }; + + buildInputs = [ pkgconfig utillinux ]; + + # * Remove broken install rules (they ignore $PREFIX) for stuff we don't need + # anyway (it's distro specific stuff). + # * Fixup absolute path to modprobe. + prePatch = '' + sed -e "/INSTALL.*initramfs\/hook/d" \ + -e "/INSTALL.*initcpio\/install/d" \ + -e "/INSTALL.*dracut\/module-setup.sh/d" \ + -i Makefile + + sed -e "s|/sbin/modprobe|${kmod}/sbin/modprobe|" -i bcache-register + ''; + + preBuild = '' + export makeFlags="$makeFlags PREFIX=\"$out\" UDEVLIBDIR=\"$out/lib/udev/\""; + ''; + + preInstall = '' + mkdir -p "$out/sbin" "$out/lib/udev/rules.d" "$out/share/man/man8" + ''; + + meta = with stdenv.lib; { + description = "User-space tools required for bcache (Linux block layer cache)"; + longDescription = '' + Bcache is a Linux kernel block layer cache. It allows one or more fast + disk drives such as flash-based solid state drives (SSDs) to act as a + cache for one or more slower hard disk drives. + + This package contains the required user-space tools. + + User documentation is in Documentation/bcache.txt in the Linux kernel + tree. + ''; + homepage = http://bcache.evilpiepirate.org/; + license = licenses.gpl2; + platforms = platforms.linux; + maintainers = [ maintainers.bjornfor ]; + }; +} diff --git a/pkgs/top-level/all-packages.nix b/pkgs/top-level/all-packages.nix index e2cb2a62174f..c0de8b6a2d10 100644 --- a/pkgs/top-level/all-packages.nix +++ b/pkgs/top-level/all-packages.nix @@ -532,6 +532,8 @@ let bc = callPackage ../tools/misc/bc { }; + bcache-tools = callPackage ../tools/filesystems/bcache-tools { }; + bchunk = callPackage ../tools/cd-dvd/bchunk { }; bfr = callPackage ../tools/misc/bfr { }; From 2d30955632ea02cf634cf098d3dba2c731cdddd4 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Bj=C3=B8rn=20Forsman?= Date: Sat, 1 Feb 2014 17:06:37 +0100 Subject: [PATCH 114/128] xpra: fix package name Remove the "python2.7-" prefix from the package name so that it can be installed with "nix-env -i xpra". --- pkgs/tools/X11/xpra/default.nix | 1 + 1 file changed, 1 insertion(+) diff --git a/pkgs/tools/X11/xpra/default.nix b/pkgs/tools/X11/xpra/default.nix index d7d1533b3be3..35370ae21280 100644 --- a/pkgs/tools/X11/xpra/default.nix +++ b/pkgs/tools/X11/xpra/default.nix @@ -5,6 +5,7 @@ buildPythonPackage rec { name = "xpra-0.9.5"; + namePrefix = ""; src = fetchurl { url = "http://xpra.org/src/${name}.tar.bz2"; From 67d73f3957eb9aaa2e75ce2868548274d05f44e8 Mon Sep 17 00:00:00 2001 From: Linquize Date: Sat, 1 Feb 2014 11:16:20 +0800 Subject: [PATCH 115/128] Update cython --- pkgs/development/interpreters/cython/default.nix | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/pkgs/development/interpreters/cython/default.nix b/pkgs/development/interpreters/cython/default.nix index 34bd63c29abf..83e5be6e2552 100644 --- a/pkgs/development/interpreters/cython/default.nix +++ b/pkgs/development/interpreters/cython/default.nix @@ -1,11 +1,11 @@ { stdenv, fetchurl, python, pkgconfig }: stdenv.mkDerivation { - name = "cython-0.16"; + name = "cython-0.20"; src = fetchurl { - url = http://www.cython.org/release/Cython-0.16.tar.gz; - sha256 = "1yz6jwv25xx5mbr2nm4l7mi65gvpm63dzi3vrw73p51wbpy525lp"; + url = http://www.cython.org/release/Cython-0.20.tar.gz; + sha256 = "1a3m7zhw8mdyr95fwx7n1scrz82drr433i99dzm1n9dxi0cx2qah"; }; buildPhase = "python setup.py build --build-base $out"; From 8f7a502af2cb2f000a2a2db9e8791cd6951ab818 Mon Sep 17 00:00:00 2001 From: Linquize Date: Sat, 1 Feb 2014 12:18:34 +0800 Subject: [PATCH 116/128] Add cython3 (python 3), move cython (python 2) to subfolder --- .../interpreters/cython/{ => 2}/default.nix | 2 +- .../interpreters/cython/3/default.nix | 21 +++++++++++++++++++ pkgs/top-level/all-packages.nix | 3 ++- 3 files changed, 24 insertions(+), 2 deletions(-) rename pkgs/development/interpreters/cython/{ => 2}/default.nix (97%) create mode 100644 pkgs/development/interpreters/cython/3/default.nix diff --git a/pkgs/development/interpreters/cython/default.nix b/pkgs/development/interpreters/cython/2/default.nix similarity index 97% rename from pkgs/development/interpreters/cython/default.nix rename to pkgs/development/interpreters/cython/2/default.nix index 83e5be6e2552..5b3cfd588c9f 100644 --- a/pkgs/development/interpreters/cython/default.nix +++ b/pkgs/development/interpreters/cython/2/default.nix @@ -15,7 +15,7 @@ stdenv.mkDerivation { buildInputs = [ python pkgconfig ]; meta = { - description = "An interpreter to help writing C extensions for Python"; + description = "An interpreter to help writing C extensions for Python 2"; platforms = stdenv.lib.platforms.all; }; } diff --git a/pkgs/development/interpreters/cython/3/default.nix b/pkgs/development/interpreters/cython/3/default.nix new file mode 100644 index 000000000000..d977ea87b3e1 --- /dev/null +++ b/pkgs/development/interpreters/cython/3/default.nix @@ -0,0 +1,21 @@ +{ stdenv, fetchurl, python3, pkgconfig }: + +stdenv.mkDerivation { + name = "cython3-0.20"; + + src = fetchurl { + url = http://www.cython.org/release/Cython-0.20.tar.gz; + sha256 = "1a3m7zhw8mdyr95fwx7n1scrz82drr433i99dzm1n9dxi0cx2qah"; + }; + + buildPhase = "python3 setup.py build --build-base $out"; + + installPhase = "python3 setup.py install --prefix=$out"; + + buildInputs = [ python3 pkgconfig ]; + + meta = { + description = "An interpreter to help writing C extensions for Python3"; + platforms = stdenv.lib.platforms.all; + }; +} diff --git a/pkgs/top-level/all-packages.nix b/pkgs/top-level/all-packages.nix index c0de8b6a2d10..217258f43a81 100644 --- a/pkgs/top-level/all-packages.nix +++ b/pkgs/top-level/all-packages.nix @@ -2345,7 +2345,8 @@ let cmucl_binary = callPackage ../development/compilers/cmucl/binary.nix { }; - cython = callPackage ../development/interpreters/cython { }; + cython = callPackage ../development/interpreters/cython/2 { }; + cython3 = callPackage ../development/interpreters/cython/3 { }; dylan = callPackage ../development/compilers/gwydion-dylan { dylan = callPackage ../development/compilers/gwydion-dylan/binary.nix { }; From cf99e5f939138337a00c619520267f3dfa94dbbe Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Edward=20Tj=C3=B6rnhammar?= Date: Wed, 29 Jan 2014 20:38:11 +0100 Subject: [PATCH 117/128] IntelliJ IDEA version bump (13.0.1->13.0.2) --- pkgs/applications/editors/idea/default.nix | 36 +++++----------------- 1 file changed, 8 insertions(+), 28 deletions(-) diff --git a/pkgs/applications/editors/idea/default.nix b/pkgs/applications/editors/idea/default.nix index 74dbaf78dac8..93e95c8d87d6 100644 --- a/pkgs/applications/editors/idea/default.nix +++ b/pkgs/applications/editors/idea/default.nix @@ -61,43 +61,23 @@ let in { - idea_community_1301 = buildIdea { - name = "idea-IC-133.331"; + idea_community_1302 = buildIdea { + name = "idea-IC-133.696"; description = "IntelliJ IDEA 13 Community Edition"; license = stdenv.lib.licenses.asl20.shortName; src = fetchurl { - url = http://download-ln.jetbrains.com/idea/ideaIC-13.0.1.tar.gz; - sha256 = "6f268bb1dbe61ed0274fd2ea9b4b7403f50da11bdde208bcfc8c391d235d7c02"; + url = http://download-ln.jetbrains.com/idea/ideaIC-13.0.2.tar.gz; + sha256 = "a776878c2dba877761b74d2886d006f64eec3c9694dbd1578380287a9c8cbd53"; }; }; - idea_ultimate_1301 = buildIdea { - name = "idea-IU-133.331"; + idea_ultimate_1302 = buildIdea { + name = "idea-IU-133.696"; description = "IntelliJ IDEA 13 Ultimate Edition"; license = stdenv.lib.licenses.unfree; src = fetchurl { - url = http://download-ln.jetbrains.com/idea/ideaIU-13.0.1.tar.gz; - sha256 = "d3638d97b719773459d5027ba096b52695325b241cbf5e31e535165a5f19849d"; - }; - }; - - idea_community_13 = buildIdea { - name = "idea-IC-133.193"; - description = "IntelliJ IDEA 13 Community Edition"; - license = stdenv.lib.licenses.asl20.shortName; - src = fetchurl { - url = http://download-ln.jetbrains.com/idea/ideaIC-13.tar.gz; - sha256 = "5cd88b8effc5e4e55d999df1cec6f54c53b5adf0b88e49400b3a185bef7db13a"; - }; - }; - - idea_ultimate_13 = buildIdea { - name = "idea-IU-133.193"; - description = "IntelliJ IDEA 13 Ultimate Edition"; - license = stdenv.lib.licenses.unfree; - src = fetchurl { - url = http://download-ln.jetbrains.com/idea/ideaIU-13.tar.gz; - sha256 = "211a782654d04f2fe5fce9084043edfb8355a7bc4dc41fee7dc79cfe604d4654"; + url = http://download-ln.jetbrains.com/idea/ideaIU-13.0.2.tar.gz; + sha256 = "7ba9499ecc82029470712d6ead520db1e2cf520e4f86d382cbdea1d0052712d0"; }; }; From f06c3ef47f031fb9eb158ce600ced6c2dc99ff04 Mon Sep 17 00:00:00 2001 From: Linquize Date: Fri, 31 Jan 2014 21:27:55 +0800 Subject: [PATCH 118/128] Fix previous simutrans 112.3 build This fixes commit b5d19fad6710e786a80f9584e65f4f17e9678c24 --- pkgs/games/simutrans/default.nix | 11 +++++++++-- 1 file changed, 9 insertions(+), 2 deletions(-) diff --git a/pkgs/games/simutrans/default.nix b/pkgs/games/simutrans/default.nix index 1a75aa460955..196561d1e379 100644 --- a/pkgs/games/simutrans/default.nix +++ b/pkgs/games/simutrans/default.nix @@ -26,8 +26,8 @@ let sha256 = "1ng963n2gvnwmsj73iy3gp9i5iqf5g6qk1gh1jnfm86gnjrsrq4m"; }; pak128 = fetchurl { - url = "mirror://sourceforge/simutrans/pak128/pak128%20for%20${ver_1}/pak128-2.2.0--${ver_1}.0.zip"; - sha256 = "13rwv9q3fa3ac0k11ds7zkpd00k4mn14rb0cknknvyz46icb9n80"; + url = "mirror://sourceforge/simutrans/pak128/pak128%20for%20${ver_1}/pak128-2.3.0--${ver_1}.2.zip"; + sha256 = "0jcif6mafsvpvxh1njyd6z2f6sab0fclq3f3nlg765yp3i1bfgff"; }; withPak = pak: stdenv.mkDerivation { @@ -46,6 +46,12 @@ let url = "mirror://sourceforge/simutrans/simutrans/${ver_h2}/simutrans-src-${ver_h2}.zip"; sha256 = "0jdq2krfj3qsh8dks9ixsdvpyjq9yi80p58b0xjpsn35mkbxxaca"; }; + + # this resource is needed since 112.2 because the folders in simutrans directory has been removed from source code + resources = fetchurl { + url = "mirror://sourceforge/simutrans/simutrans/${ver_h2}/simulinux-${ver_h2}.zip"; + sha256 = "14ly341pdkr8r3cd0q49w424m79iz38iaxfi9l1yfcxl8idkga1c"; + }; sourceRoot = "."; buildInputs = [ zlib libpng bzip2 SDL SDL_mixer unzip ]; @@ -72,6 +78,7 @@ let installPhase = '' mkdir -p $out/share/ mv simutrans $out/share/ + unzip -o ${resources} -d $out/share/ mkdir -p $out/bin/ mv build/default/sim $out/bin/simutrans From 0828be1597d89859dc25ebe0af79fd3c9e539549 Mon Sep 17 00:00:00 2001 From: Oliver Charles Date: Mon, 27 Jan 2014 14:31:27 +0000 Subject: [PATCH 119/128] xmlindent: New expression MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit [Bjørn Forsman : - introduce "name-${version}" (to not duplicate version number) - use mirror://sourceforge instead of specific mirror URL - add vertical whitespace between attributes - add meta description and homepage attributes - place the top-level 'xmlindent' attribute in alphabetial order ] --- pkgs/development/web/xmlindent/default.nix | 25 ++++++++++++++++++++++ pkgs/top-level/all-packages.nix | 2 ++ 2 files changed, 27 insertions(+) create mode 100644 pkgs/development/web/xmlindent/default.nix diff --git a/pkgs/development/web/xmlindent/default.nix b/pkgs/development/web/xmlindent/default.nix new file mode 100644 index 000000000000..f0966357d93d --- /dev/null +++ b/pkgs/development/web/xmlindent/default.nix @@ -0,0 +1,25 @@ +{ stdenv, fetchurl, flex }: + +stdenv.mkDerivation rec { + name = "xmlindent-${version}"; + version = "0.2.17"; + + src = fetchurl { + url = "mirror://sourceforge/project/xmlindent/xmlindent/${version}/${name}.tar.gz"; + sha256 = "0k15rxh51a5r4bvfm6c4syxls8al96cx60a9mn6pn24nns3nh3rs"; + }; + + buildInputs = [ flex ]; + + preConfigure = '' + substituteInPlace Makefile --replace "PREFIX=/usr/local" "PREFIX=$out" + ''; + + meta = { + description = "XML stream reformatter"; + homepage = http://xmlindent.sourceforge.net/; + license = stdenv.lib.licenses.gpl3; + platforms = stdenv.lib.platforms.linux; + maintainers = [ stdenv.lib.maintainers.ocharles ]; + }; +} diff --git a/pkgs/top-level/all-packages.nix b/pkgs/top-level/all-packages.nix index 217258f43a81..76b52f899d55 100644 --- a/pkgs/top-level/all-packages.nix +++ b/pkgs/top-level/all-packages.nix @@ -3776,6 +3776,8 @@ let xc3sprog = callPackage ../development/tools/misc/xc3sprog { }; + xmlindent = callPackage ../development/web/xmlindent {}; + xxdiff = callPackage ../development/tools/misc/xxdiff { bison = bison2; }; From 03be686dec19302499bb7e20d7385c06ee8be57d Mon Sep 17 00:00:00 2001 From: "William A. Kennington III" Date: Sat, 25 Jan 2014 16:45:15 -0600 Subject: [PATCH 120/128] ccid: Update from 1.4.13 -> 1.4.14 --- pkgs/tools/security/ccid/default.nix | 7 ++++--- 1 file changed, 4 insertions(+), 3 deletions(-) diff --git a/pkgs/tools/security/ccid/default.nix b/pkgs/tools/security/ccid/default.nix index ad1cb6bec906..4be2393eed5d 100644 --- a/pkgs/tools/security/ccid/default.nix +++ b/pkgs/tools/security/ccid/default.nix @@ -1,10 +1,11 @@ { stdenv, fetchurl, pcsclite, pkgconfig, libusb1, perl }: stdenv.mkDerivation rec { - name = "ccid-1.4.13"; + version = "1.4.14"; + name = "ccid-${version}"; src = fetchurl { - url = "http://pkgs.fedoraproject.org/repo/pkgs/pcsc-lite-ccid/ccid-1.4.13.tar.bz2/89c167a873df1f8bc0dc907ce209e5ff/ccid-1.4.13.tar.bz2"; - sha256 = "1w0mxb5qzps9x2fcggv958mwgwmvfxxj4nspxs67fa7qg7r6yxar"; + url = "http://ftp.de.debian.org/debian/pool/main/c/ccid/ccid_${version}.orig.tar.bz2"; + sha256 = "0inibkhzk4ghg85jkysscjrzshmxfdzz6b54dqj182l0isn082y5"; }; patchPhase = '' From 40f202e4a069d3d4232bb80c7e2e45a64f18aeb1 Mon Sep 17 00:00:00 2001 From: "William A. Kennington III" Date: Sat, 25 Jan 2014 16:51:09 -0600 Subject: [PATCH 121/128] pcsclite: Upgrade from 1.8.8 -> 1.8.10 --- pkgs/tools/security/pcsclite/default.nix | 7 ++++--- 1 file changed, 4 insertions(+), 3 deletions(-) diff --git a/pkgs/tools/security/pcsclite/default.nix b/pkgs/tools/security/pcsclite/default.nix index de0fef9b73f3..18fa10451536 100644 --- a/pkgs/tools/security/pcsclite/default.nix +++ b/pkgs/tools/security/pcsclite/default.nix @@ -1,11 +1,12 @@ { stdenv, fetchurl, pkgconfig, udev, dbus_libs, perl }: stdenv.mkDerivation rec { - name = "pcsclite-1.8.8"; + version = "1.8.10"; + name = "pcsclite-${version}"; src = fetchurl { - url = "http://alioth.debian.org/frs/download.php/3862/${name}.tar.bz2"; - sha256 = "1rw5530vr2jf02ziyf32jbd98n5q8zjcfwp5nkw3x3bkgr53arpy"; + url = "http://ftp.de.debian.org/debian/pool/main/p/pcsc-lite/pcsc-lite_${version}.orig.tar.bz2"; + sha256 = "04i63zi9ayg38z3cahp6gf3rgx23w17bmcpdccm2hvaj63blnz30"; }; # The OS should care on preparing the drivers into this location From f0be5119d9cf293d92d31967d6187bbd0b51e695 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Bj=C3=B8rn=20Forsman?= Date: Sat, 1 Feb 2014 19:56:54 +0100 Subject: [PATCH 122/128] ruby/patches.nix: sort attributes alphabetically And remove trailing whitespace. --- .../development/interpreters/ruby/patches.nix | 98 +++++++++---------- 1 file changed, 49 insertions(+), 49 deletions(-) diff --git a/pkgs/development/interpreters/ruby/patches.nix b/pkgs/development/interpreters/ruby/patches.nix index c5ab0f5e5e20..10cbf1ecfe56 100644 --- a/pkgs/development/interpreters/ruby/patches.nix +++ b/pkgs/development/interpreters/ruby/patches.nix @@ -10,10 +10,29 @@ let find "$1" -type f -name "*.rb" | xargs sed -i "s@/usr/bin/env@$(type -p env)@g" find "$1" -type f -name "*.mk" | xargs sed -i "s@/usr/bin/env@$(type -p env)@g" ''; - + in { + buildr = { + # Many Buildfiles rely on RUBYLIB containing the current directory + # (as was the default in Ruby < 1.9.2). + extraWrapperFlags = "--prefix RUBYLIB : ."; + }; + + fakes3 = { + postInstall = '' + cd $out/${ruby.gemPath}/gems/* + patch -Np1 -i ${../../ruby-modules/fake-s3-list-bucket.patch} + ''; + }; + + ffi = { + postUnpack = "onetuh"; + buildFlags = ["--with-ffi-dir=${libffi}"]; + NIX_POST_EXTRACT_FILES_HOOK = patchUsrBinEnv; + }; + iconv = { buildInputs = [ libiconvOrEmpty ]; }; libv8 = { @@ -26,16 +45,16 @@ in # # Finally, we must set CC and AR explicitly to allow scons to find the # compiler and archiver - + preBuild = '' cat > $TMPDIR/g++ < Date: Mon, 27 Jan 2014 22:17:23 +0100 Subject: [PATCH 123/128] silver-searcher: updated to 0.19.1 --- pkgs/tools/text/silver-searcher/default.nix | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/pkgs/tools/text/silver-searcher/default.nix b/pkgs/tools/text/silver-searcher/default.nix index 83a89cfb6028..adc8d9ec4860 100644 --- a/pkgs/tools/text/silver-searcher/default.nix +++ b/pkgs/tools/text/silver-searcher/default.nix @@ -1,13 +1,13 @@ {stdenv, fetchgit, autoreconfHook, pkgconfig, pcre, zlib, lzma}: -let release = "0.18.1"; in +let release = "0.19.1"; in stdenv.mkDerivation { name = "silver-searcher-${release}"; src = fetchgit { url = "https://github.com/ggreer/the_silver_searcher.git"; rev = "refs/tags/${release}"; - sha256 = "bf2c8f3c68895e0ee00d373c1d87201e806b413bb28373ee168e375f2a095ec5"; + sha256 = "1km3ap74mls7vkp6si4f302zb1ifmldipjyfw2z9akqpvr3n44p9"; }; buildInputs = [ autoreconfHook pkgconfig pcre zlib lzma ]; From 37b1c1481be10e20be0f05cf687eefcd303246cf Mon Sep 17 00:00:00 2001 From: Evgeny Egorochkin Date: Sun, 2 Feb 2014 07:43:00 +0200 Subject: [PATCH 124/128] bangarang: fix build with gcc 4.7 --- pkgs/applications/video/bangarang/default.nix | 2 + .../video/bangarang/gcc-4.7.patch | 45 +++++++++++++++++++ 2 files changed, 47 insertions(+) create mode 100644 pkgs/applications/video/bangarang/gcc-4.7.patch diff --git a/pkgs/applications/video/bangarang/default.nix b/pkgs/applications/video/bangarang/default.nix index 5dde88076a1e..1058243c0e08 100644 --- a/pkgs/applications/video/bangarang/default.nix +++ b/pkgs/applications/video/bangarang/default.nix @@ -10,6 +10,8 @@ stdenv.mkDerivation rec { buildInputs = [ kdelibs phonon soprano shared_desktop_ontologies kdemultimedia taglib gettext ]; nativeBuildInputs = [ cmake ]; + patches = [ ./gcc-4.7.patch ]; + meta = with stdenv.lib; { description = "A media player for KDE based on Nepomuk and Phonon"; longDescription = '' diff --git a/pkgs/applications/video/bangarang/gcc-4.7.patch b/pkgs/applications/video/bangarang/gcc-4.7.patch new file mode 100644 index 000000000000..d4f650b9caf5 --- /dev/null +++ b/pkgs/applications/video/bangarang/gcc-4.7.patch @@ -0,0 +1,45 @@ +commit b893fcdb7ddfc8c59fd29a29b7265a713c3dbab1 +Author: Alex Fiestas +Date: Thu Mar 29 10:09:22 2012 +0200 + + Build fix: Add unistd.h include since sleep is defined there + +diff --git a/src/platform/infofetchers/lastfminfofetcher.cpp b/src/platform/infofetchers/lastfminfofetcher.cpp +index 0c49d69..fcc4cd3 100644 +--- a/src/platform/infofetchers/lastfminfofetcher.cpp ++++ b/src/platform/infofetchers/lastfminfofetcher.cpp +@@ -32,6 +32,8 @@ + #include + #include + ++#include ++ + LastfmInfoFetcher::LastfmInfoFetcher(QObject *parent) : + InfoFetcher(parent) + { +diff --git a/src/platform/infofetchers/tmdbinfofetcher.cpp b/src/platform/infofetchers/tmdbinfofetcher.cpp +index 7801644..3c01960 100644 +--- a/src/platform/infofetchers/tmdbinfofetcher.cpp ++++ b/src/platform/infofetchers/tmdbinfofetcher.cpp +@@ -30,6 +30,8 @@ + #include + #include + ++#include ++ + TMDBInfoFetcher::TMDBInfoFetcher(QObject *parent) : + InfoFetcher(parent) + { +diff --git a/src/platform/infofetchers/tvdbinfofetcher.cpp b/src/platform/infofetchers/tvdbinfofetcher.cpp +index ff351b0..670ed18 100644 +--- a/src/platform/infofetchers/tvdbinfofetcher.cpp ++++ b/src/platform/infofetchers/tvdbinfofetcher.cpp +@@ -30,6 +30,8 @@ + #include + #include + ++#include ++ + TVDBInfoFetcher::TVDBInfoFetcher(QObject *parent) : + InfoFetcher(parent) + { From 72a8329ee2a598bd28787f276ccafa959fe60875 Mon Sep 17 00:00:00 2001 From: Evgeny Egorochkin Date: Sun, 2 Feb 2014 07:43:30 +0200 Subject: [PATCH 125/128] vidalia: fix build with gcc-4.7 --- pkgs/tools/security/vidalia/default.nix | 2 ++ pkgs/tools/security/vidalia/gcc-4.7.patch | 12 ++++++++++++ 2 files changed, 14 insertions(+) create mode 100644 pkgs/tools/security/vidalia/gcc-4.7.patch diff --git a/pkgs/tools/security/vidalia/default.nix b/pkgs/tools/security/vidalia/default.nix index 4d216bee0b60..6ce094997806 100644 --- a/pkgs/tools/security/vidalia/default.nix +++ b/pkgs/tools/security/vidalia/default.nix @@ -11,6 +11,8 @@ stdenv.mkDerivation rec { buildInputs = [ cmake qt4 doxygen ]; + patches = [ ./gcc-4.7.patch ]; + meta = with stdenv.lib; { homepage = https://www.torproject.org/projects/vidalia.html.en; description = "a cross-platform graphical controller for the Tor software, built using the Qt framework"; diff --git a/pkgs/tools/security/vidalia/gcc-4.7.patch b/pkgs/tools/security/vidalia/gcc-4.7.patch new file mode 100644 index 000000000000..4c163af760c6 --- /dev/null +++ b/pkgs/tools/security/vidalia/gcc-4.7.patch @@ -0,0 +1,12 @@ +diff -ru vidalia-0.3.1_orig/src/vidalia/plugin/PluginEngine.cpp vidalia-0.3.1/src/vidalia/plugin/PluginEngine.cpp +--- vidalia-0.3.1_orig/src/vidalia/plugin/PluginEngine.cpp 2012-08-08 18:02:01.901732270 +0200 ++++ vidalia-0.3.1/src/vidalia/plugin/PluginEngine.cpp 2012-08-08 18:03:26.241677875 +0200 +@@ -20,6 +20,8 @@ + + #include "Vidalia.h" + ++#include ++ + PluginEngine::PluginEngine(QObject *parent) + : QScriptEngine(parent) + { From 2ed3c10cbed8772fc1a14955207902ed9a490dfb Mon Sep 17 00:00:00 2001 From: Evgeny Egorochkin Date: Sun, 2 Feb 2014 07:45:08 +0200 Subject: [PATCH 126/128] youtubeDL: update from 2014.01.23.4 to 2014.01.30.2 --- pkgs/tools/misc/youtube-dl/default.nix | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/pkgs/tools/misc/youtube-dl/default.nix b/pkgs/tools/misc/youtube-dl/default.nix index 40a2f7f481d5..cca459c1a293 100644 --- a/pkgs/tools/misc/youtube-dl/default.nix +++ b/pkgs/tools/misc/youtube-dl/default.nix @@ -1,14 +1,14 @@ { stdenv, fetchurl, python, zip }: let - version = "2014.01.23.4"; + version = "2014.01.30.2"; in stdenv.mkDerivation rec { name = "youtube-dl-${version}"; src = fetchurl { url = "http://youtube-dl.org/downloads/${version}/${name}.tar.gz"; - sha256 = "0wnw11s3k191wqf3h13ibdbkgdyabv3gigsjk5xq3sqswlmmcvd9"; + sha256 = "1bx4ip1d4gp057nha4ylj2baksxg8kkxgvsdcx6bj36wbb0f8fl9"; }; buildInputs = [ python ]; From 546315d9338ae1a6a783abb4efec4d1209e8bda4 Mon Sep 17 00:00:00 2001 From: Michael Raskin <7c6f434c@mail.ru> Date: Sun, 2 Feb 2014 12:50:57 +0400 Subject: [PATCH 127/128] Update/fix merkaartor to 0.18.1 --- pkgs/applications/misc/merkaartor/default.nix | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/pkgs/applications/misc/merkaartor/default.nix b/pkgs/applications/misc/merkaartor/default.nix index 6d10cbb8c21f..e6636415b5ef 100644 --- a/pkgs/applications/misc/merkaartor/default.nix +++ b/pkgs/applications/misc/merkaartor/default.nix @@ -1,17 +1,17 @@ -{stdenv, fetchurl, qt4, boost}: +{stdenv, fetchurl, qt4, boost, proj, gdal}: stdenv.mkDerivation rec { - name = "merkaartor-0.17.2"; + name = "merkaartor-0.18.1"; src = fetchurl { - url = "http://merkaartor.be/attachments/download/253/merkaartor-0.17.2.tar.bz2"; - sha256 = "0akhp9czzn39132mgj9h38nlh4l9ibzn3vh93bfs685zxyn4yps2"; + url = "http://merkaartor.be/attachments/download/301/merkaartor-0.18.1.tar.bz2"; + sha256 = "17qk45pmlxqigla1915dvn9pp91y85d2bkcaap4g3m8mk1crcsix"; }; configurePhase = '' qmake -makefile PREFIX=$out ''; - buildInputs = [ qt4 boost ]; + buildInputs = [ qt4 boost proj gdal ]; meta = { description = "An openstreetmap editor"; From 14a6a059f5863bfd9e7c69336baa8a918b41a86a Mon Sep 17 00:00:00 2001 From: Michael Raskin <7c6f434c@mail.ru> Date: Sun, 2 Feb 2014 12:54:04 +0400 Subject: [PATCH 128/128] Use gcc-4.6.0 for avr-gcc-libc --- pkgs/top-level/all-packages.nix | 5 ++++- 1 file changed, 4 insertions(+), 1 deletion(-) diff --git a/pkgs/top-level/all-packages.nix b/pkgs/top-level/all-packages.nix index 76b52f899d55..d49dc207133f 100644 --- a/pkgs/top-level/all-packages.nix +++ b/pkgs/top-level/all-packages.nix @@ -3323,7 +3323,10 @@ let samples = true; }; - avrgcclibc = callPackage ../development/misc/avr-gcc-with-avr-libc {}; + avrgcclibc = callPackage ../development/misc/avr-gcc-with-avr-libc { + gcc = gcc46; + stdenv = overrideGCC stdenv gcc46; + }; avr8burnomat = callPackage ../development/misc/avr8-burn-omat { };