Merge master into haskell-updates

This commit is contained in:
github-actions[bot] 2022-03-15 00:10:48 +00:00 committed by GitHub
commit c134f0d97a
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
157 changed files with 2954 additions and 1037 deletions

View File

@ -16,5 +16,10 @@ jobs:
steps: steps:
- uses: actions/checkout@v3 - uses: actions/checkout@v3
- uses: cachix/install-nix-action@v16 - uses: cachix/install-nix-action@v16
- uses: cachix/cachix-action@v10
with:
# This cache is for the nixpkgs repo checks and should not be trusted or used elsewhere.
name: nixpkgs-ci
signingKey: '${{ secrets.CACHIX_SIGNING_KEY }}'
# explicit list of supportedSystems is needed until aarch64-darwin becomes part of the trunk jobset # explicit list of supportedSystems is needed until aarch64-darwin becomes part of the trunk jobset
- run: nix-build pkgs/top-level/release.nix -A tarball.nixpkgs-basic-release-checks --arg supportedSystems '[ "aarch64-darwin" "aarch64-linux" "x86_64-linux" "x86_64-darwin" ]' - run: nix-build pkgs/top-level/release.nix -A tarball.nixpkgs-basic-release-checks --arg supportedSystems '[ "aarch64-darwin" "aarch64-linux" "x86_64-linux" "x86_64-darwin" ]'

View File

@ -24,7 +24,7 @@ jobs:
extra_nix_config: sandbox = true extra_nix_config: sandbox = true
- uses: cachix/cachix-action@v10 - uses: cachix/cachix-action@v10
with: with:
# This cache is for the nixos/nixpkgs manual builds and should not be trusted or used elsewhere. # This cache is for the nixpkgs repo checks and should not be trusted or used elsewhere.
name: nixpkgs-ci name: nixpkgs-ci
signingKey: '${{ secrets.CACHIX_SIGNING_KEY }}' signingKey: '${{ secrets.CACHIX_SIGNING_KEY }}'
- name: Building NixOS manual - name: Building NixOS manual

View File

@ -24,7 +24,7 @@ jobs:
extra_nix_config: sandbox = true extra_nix_config: sandbox = true
- uses: cachix/cachix-action@v10 - uses: cachix/cachix-action@v10
with: with:
# This cache is for the nixos/nixpkgs manual builds and should not be trusted or used elsewhere. # This cache is for the nixpkgs repo checks and should not be trusted or used elsewhere.
name: nixpkgs-ci name: nixpkgs-ci
signingKey: '${{ secrets.CACHIX_SIGNING_KEY }}' signingKey: '${{ secrets.CACHIX_SIGNING_KEY }}'
- name: Building Nixpkgs manual - name: Building Nixpkgs manual

View File

@ -45,3 +45,5 @@ One can create a simple environment using a `shell.nix` like that:
``` ```
Running `nix-shell` would then drop you into a shell with these libraries and binaries available. You can use this to run closed-source applications which expect FHS structure without hassles: simply change `runScript` to the application path, e.g. `./bin/start.sh` -- relative paths are supported. Running `nix-shell` would then drop you into a shell with these libraries and binaries available. You can use this to run closed-source applications which expect FHS structure without hassles: simply change `runScript` to the application path, e.g. `./bin/start.sh` -- relative paths are supported.
Additionally, the FHS builder links all relocated gsettings-schemas (the glib setup-hook moves them to `share/gsettings-schemas/${name}/glib-2.0/schemas`) to their standard FHS location. This means you don't need to wrap binaries with `wrapGAppsHook`.

View File

@ -1688,6 +1688,12 @@
githubId = 355401; githubId = 355401;
name = "Brian Hicks"; name = "Brian Hicks";
}; };
brianmcgee = {
name = "Brian McGee";
email = "brian@41north.dev";
github = "brianmcgee";
githubId = 1173648;
};
Br1ght0ne = { Br1ght0ne = {
email = "brightone@protonmail.com"; email = "brightone@protonmail.com";
github = "Br1ght0ne"; github = "Br1ght0ne";

View File

@ -29,6 +29,7 @@ let
"blackbox" "blackbox"
"buildkite-agent" "buildkite-agent"
"collectd" "collectd"
"dmarc"
"dnsmasq" "dnsmasq"
"domain" "domain"
"dovecot" "dovecot"

View File

@ -0,0 +1,117 @@
{ config, lib, pkgs, options }:
with lib;
let
cfg = config.services.prometheus.exporters.dmarc;
json = builtins.toJSON {
inherit (cfg) folders port;
listen_addr = cfg.listenAddress;
storage_path = "$STATE_DIRECTORY";
imap = (builtins.removeAttrs cfg.imap [ "passwordFile" ]) // { password = "$IMAP_PASSWORD"; use_ssl = true; };
poll_interval_seconds = cfg.pollIntervalSeconds;
deduplication_max_seconds = cfg.deduplicationMaxSeconds;
logging = {
version = 1;
disable_existing_loggers = false;
};
};
in {
port = 9797;
extraOpts = {
imap = {
host = mkOption {
type = types.str;
default = "localhost";
description = ''
Hostname of IMAP server to connect to.
'';
};
port = mkOption {
type = types.port;
default = 993;
description = ''
Port of the IMAP server to connect to.
'';
};
username = mkOption {
type = types.str;
example = "postmaster@example.org";
description = ''
Login username for the IMAP connection.
'';
};
passwordFile = mkOption {
type = types.str;
example = "/run/secrets/dovecot_pw";
description = ''
File containing the login password for the IMAP connection.
'';
};
};
folders = {
inbox = mkOption {
type = types.str;
default = "INBOX";
description = ''
IMAP mailbox that is checked for incoming DMARC aggregate reports
'';
};
done = mkOption {
type = types.str;
default = "Archive";
description = ''
IMAP mailbox that successfully processed reports are moved to.
'';
};
error = mkOption {
type = types.str;
default = "Invalid";
description = ''
IMAP mailbox that emails are moved to that could not be processed.
'';
};
};
pollIntervalSeconds = mkOption {
type = types.ints.unsigned;
default = 60;
description = ''
How often to poll the IMAP server in seconds.
'';
};
deduplicationMaxSeconds = mkOption {
type = types.ints.unsigned;
default = 604800;
defaultText = "7 days (in seconds)";
description = ''
How long individual report IDs will be remembered to avoid
counting double delivered reports twice.
'';
};
debug = mkOption {
type = types.bool;
default = false;
description = ''
Whether to declare enable <literal>--debug</literal>.
'';
};
};
serviceOpts = {
path = with pkgs; [ envsubst coreutils ];
serviceConfig = {
StateDirectory = "prometheus-dmarc-exporter";
WorkingDirectory = "/var/lib/prometheus-dmarc-exporter";
ExecStart = "${pkgs.writeShellScript "setup-cfg" ''
export IMAP_PASSWORD="$(<${cfg.imap.passwordFile})"
envsubst \
-i ${pkgs.writeText "dmarc-exporter.json.template" json} \
-o ''${STATE_DIRECTORY}/dmarc-exporter.json
exec ${pkgs.prometheus-dmarc-exporter}/bin/prometheus-dmarc-exporter \
--configuration /var/lib/prometheus-dmarc-exporter/dmarc-exporter.json \
${optionalString cfg.debug "--debug"}
''}";
};
};
}

View File

@ -20,6 +20,21 @@ in
description = "PlantUML server package to use"; description = "PlantUML server package to use";
}; };
packages = {
jdk = mkOption {
type = types.package;
default = pkgs.jdk;
defaultText = literalExpression "pkgs.jdk";
description = "JDK package to use for the server";
};
jetty = mkOption {
type = types.package;
default = pkgs.jetty;
defaultText = literalExpression "pkgs.jetty";
description = "Jetty package to use for the server";
};
};
user = mkOption { user = mkOption {
type = types.str; type = types.str;
default = "plantuml"; default = "plantuml";
@ -105,10 +120,10 @@ in
ALLOW_PLANTUML_INCLUDE = if cfg.allowPlantumlInclude then "true" else "false"; ALLOW_PLANTUML_INCLUDE = if cfg.allowPlantumlInclude then "true" else "false";
}; };
script = '' script = ''
${pkgs.jre}/bin/java \ ${cfg.packages.jdk}/bin/java \
-jar ${pkgs.jetty}/start.jar \ -jar ${cfg.packages.jetty}/start.jar \
--module=deploy,http,jsp \ --module=deploy,http,jsp \
jetty.home=${pkgs.jetty} \ jetty.home=${cfg.packages.jetty} \
jetty.base=${cfg.package} \ jetty.base=${cfg.package} \
jetty.http.host=${cfg.listenHost} \ jetty.http.host=${cfg.listenHost} \
jetty.http.port=${builtins.toString cfg.listenPort} jetty.http.port=${builtins.toString cfg.listenPort}

View File

@ -74,11 +74,9 @@ in
# Debugging # Debugging
environment.sessionVariables.MATE_SESSION_DEBUG = mkIf cfg.debug "1"; environment.sessionVariables.MATE_SESSION_DEBUG = mkIf cfg.debug "1";
environment.systemPackages = environment.systemPackages = pkgs.gnome.removePackagesByName
pkgs.mate.basePackages ++ (pkgs.mate.basePackages ++
(pkgs.gnome.removePackagesByName pkgs.mate.extraPackages ++
pkgs.mate.extraPackages
config.environment.mate.excludePackages) ++
[ [
pkgs.desktop-file-utils pkgs.desktop-file-utils
pkgs.glib pkgs.glib
@ -87,7 +85,8 @@ in
pkgs.xdg-user-dirs # Update user dirs as described in https://freedesktop.org/wiki/Software/xdg-user-dirs/ pkgs.xdg-user-dirs # Update user dirs as described in https://freedesktop.org/wiki/Software/xdg-user-dirs/
pkgs.mate.mate-settings-daemon pkgs.mate.mate-settings-daemon
pkgs.yelp # for 'Contents' in 'Help' menus pkgs.yelp # for 'Contents' in 'Help' menus
]; ])
config.environment.mate.excludePackages;
programs.dconf.enable = true; programs.dconf.enable = true;
# Shell integration for VTE terminals # Shell integration for VTE terminals

View File

@ -227,6 +227,7 @@ in
# Settings from elementary-default-settings # Settings from elementary-default-settings
environment.etc."gtk-3.0/settings.ini".source = "${pkgs.pantheon.elementary-default-settings}/etc/gtk-3.0/settings.ini"; environment.etc."gtk-3.0/settings.ini".source = "${pkgs.pantheon.elementary-default-settings}/etc/gtk-3.0/settings.ini";
xdg.portal.enable = true;
xdg.portal.extraPortals = with pkgs.pantheon; [ xdg.portal.extraPortals = with pkgs.pantheon; [
elementary-files elementary-files
elementary-settings-daemon elementary-settings-daemon

View File

@ -67,7 +67,10 @@ openlog("nixos", "", LOG_USER);
# Install or update the bootloader. # Install or update the bootloader.
if ($action eq "switch" || $action eq "boot") { if ($action eq "switch" || $action eq "boot") {
system('@installBootLoader@', $out) == 0 or exit 1; chomp(my $installBootLoader = <<'EOFBOOTLOADER');
@installBootLoader@
EOFBOOTLOADER
system("$installBootLoader $out") == 0 or exit 1;
} }
# Just in case the new configuration hangs the system, do a sync now. # Just in case the new configuration hangs the system, do a sync now.

View File

@ -6,7 +6,7 @@ import ./make-test-python.nix ({ pkgs, ... }: {
virtualisation.emptyDiskImages = [ 4096 ]; virtualisation.emptyDiskImages = [ 4096 ];
networking.hostId = "deadbeef"; networking.hostId = "deadbeef";
boot.supportedFilesystems = [ "bcachefs" ]; boot.supportedFilesystems = [ "bcachefs" ];
environment.systemPackages = with pkgs; [ parted ]; environment.systemPackages = with pkgs; [ parted keyutils ];
}; };
testScript = '' testScript = ''
@ -20,10 +20,9 @@ import ./make-test-python.nix ({ pkgs, ... }: {
"parted --script /dev/vdb mklabel msdos", "parted --script /dev/vdb mklabel msdos",
"parted --script /dev/vdb -- mkpart primary 1024M 50% mkpart primary 50% -1s", "parted --script /dev/vdb -- mkpart primary 1024M 50% mkpart primary 50% -1s",
"udevadm settle", "udevadm settle",
# Due to #32279, we cannot use encryption for this test yet "keyctl link @u @s",
# "echo password | bcachefs format --encrypted --metadata_replicas 2 --label vtest /dev/vdb1 /dev/vdb2", "echo password | bcachefs format --encrypted --metadata_replicas 2 --label vtest /dev/vdb1 /dev/vdb2",
# "echo password | bcachefs unlock /dev/vdb1", "echo password | bcachefs unlock /dev/vdb1",
"bcachefs format --metadata_replicas 2 --label vtest /dev/vdb1 /dev/vdb2",
"mount -t bcachefs /dev/vdb1:/dev/vdb2 /tmp/mnt", "mount -t bcachefs /dev/vdb1:/dev/vdb2 /tmp/mnt",
"udevadm settle", "udevadm settle",
"bcachefs fs usage /tmp/mnt", "bcachefs fs usage /tmp/mnt",

View File

@ -2,11 +2,11 @@
let metadata = assert stdenv.hostPlatform.system == "i686-linux" || stdenv.hostPlatform.system == "x86_64-linux"; let metadata = assert stdenv.hostPlatform.system == "i686-linux" || stdenv.hostPlatform.system == "x86_64-linux";
if stdenv.hostPlatform.system == "i686-linux" then if stdenv.hostPlatform.system == "i686-linux" then
{ arch = "x86"; sha256 = "afa4b1116aee18e3ddd93132467809d0bcf03715cf9ad55b895f021a13e1cb8a"; } { arch = "x86"; sha256 = "sha256-k4FQrt72VNb5FdYMzxskcVhKlvx8MZelUlLCItxDB7c="; }
else else
{ arch = "x86_64"; sha256 = "55ab653c601727a2077080e7ea4d76fe7a897379934ed9a5b544e20d490f53f9"; }; { arch = "x86_64"; sha256 = "sha256-mj5wVQlY2xFzdulvMdb5Qb5HGwr7RElzIkpOLjaAfGA="; };
in stdenv.mkDerivation rec { in stdenv.mkDerivation rec {
version = "1.5.4"; version = "1.5.5";
pname = "tuxguitar"; pname = "tuxguitar";
src = fetchurl { src = fetchurl {

View File

@ -697,8 +697,8 @@ let
mktplcRef = { mktplcRef = {
name = "gitlens"; name = "gitlens";
publisher = "eamodio"; publisher = "eamodio";
version = "12.0.1"; version = "12.0.3";
sha256 = "1xv1vzx643qa8jhjpnpv2wrymz38w130vm0idkcl77lh209r5i8x"; sha256 = "sha256-PHQXfk0JggkEBRflHp+OAUOCVuymCubaszfDCYbpfG0=";
}; };
meta = with lib; { meta = with lib; {
changelog = "https://marketplace.visualstudio.com/items/eamodio.gitlens/changelog"; changelog = "https://marketplace.visualstudio.com/items/eamodio.gitlens/changelog";
@ -789,8 +789,8 @@ let
mktplcRef = { mktplcRef = {
name = "prettier-vscode"; name = "prettier-vscode";
publisher = "esbenp"; publisher = "esbenp";
version = "9.2.0"; version = "9.3.0";
sha256 = "sha256-ROI312MPMUY1q6IV4qVCW8DD0MQPA/hVW7rfamo/IbI="; sha256 = "sha256-hJgPjWf7a8+ltjmXTK8U/MwqgIZqBjmcCfHsAk2G3PA=";
}; };
meta = with lib; { meta = with lib; {
changelog = "https://marketplace.visualstudio.com/items/esbenp.prettier-vscode/changelog"; changelog = "https://marketplace.visualstudio.com/items/esbenp.prettier-vscode/changelog";
@ -887,8 +887,8 @@ let
mktplcRef = { mktplcRef = {
name = "auto-close-tag"; name = "auto-close-tag";
publisher = "formulahendry"; publisher = "formulahendry";
version = "0.5.13"; version = "0.5.14";
sha256 = "0swyxhcibv6cl54gmfpnbz6bqidjzc77nx369wndhlq264idnwkw"; sha256 = "sha256-XYYHS2QTy8WYjtUYYWsIESzmH4dRQLlXQpJq78BolMw=";
}; };
meta = { meta = {
license = lib.licenses.mit; license = lib.licenses.mit;
@ -899,8 +899,8 @@ let
mktplcRef = { mktplcRef = {
name = "auto-rename-tag"; name = "auto-rename-tag";
publisher = "formulahendry"; publisher = "formulahendry";
version = "0.1.9"; version = "0.1.10";
sha256 = "1xk8rzda16qgdxhq8bz6f8w09fd9044qczx1wfhszd6w3r4q9262"; sha256 = "sha256-uXqWebxnDwaUVLFG6MUh4bZ7jw5d2rTHRm5NoR2n0Vs=";
}; };
meta = { meta = {
license = lib.licenses.mit; license = lib.licenses.mit;
@ -1229,8 +1229,8 @@ let
mktplcRef = { mktplcRef = {
name = "svg"; name = "svg";
publisher = "jock"; publisher = "jock";
version = "1.4.15"; version = "1.4.17";
sha256 = "0a5w6qxvsdzcmgc0yfiagpmz25y90pmzgrxz9899na5qy3pjcbmz"; sha256 = "sha256-CDxh/YRyDGocxG4qOcyLXA0zHCg0YJ7XUu3OjFFjleI=";
}; };
meta = with lib; { meta = with lib; {
license = licenses.mit; license = licenses.mit;
@ -1426,8 +1426,8 @@ let
mktplcRef = { mktplcRef = {
name = "vscode-docker"; name = "vscode-docker";
publisher = "ms-azuretools"; publisher = "ms-azuretools";
version = "1.19.0"; version = "1.20.0";
sha256 = "sha256-buIAbsyKUvX3blO1AbCq/tJ1KAcqaFpciqQovmOZ5GE="; sha256 = "sha256-i3gYTP76YEDItG2oXR9pEXuGv0qmyf1Xv6HQvDBEOyg=";
}; };
meta = { meta = {
license = lib.licenses.mit; license = lib.licenses.mit;
@ -1590,8 +1590,8 @@ let
mktplcRef = { mktplcRef = {
name = "java"; name = "java";
publisher = "redhat"; publisher = "redhat";
version = "1.3.0"; version = "1.4.0";
sha256 = "sha256-Y5hP/Rq9BsFwbCRQWOfiLHKoYkKBpZx8blg9o74obfk="; sha256 = "sha256-9q3ilNukx3sQ6Fr1LhuQdjHHS251SDoHxC33w+qrfAI=";
}; };
buildInputs = [ jdk ]; buildInputs = [ jdk ];
meta = { meta = {
@ -1604,8 +1604,8 @@ let
mktplcRef = { mktplcRef = {
name = "vscode-yaml"; name = "vscode-yaml";
publisher = "redhat"; publisher = "redhat";
version = "1.3.0"; version = "1.5.1";
sha256 = "sha256-Tz6bLcBUATn8cYIzGoLJwgaJZGbBVr1CISmJHz+iM60="; sha256 = "sha256-JXhmgBFZdKNjgX6K7U+M/T7HEmIOBQOzQEJ5957TUuM=";
}; };
meta = { meta = {
license = lib.licenses.mit; license = lib.licenses.mit;
@ -1659,8 +1659,8 @@ let
mktplcRef = { mktplcRef = {
name = "material-icon-theme"; name = "material-icon-theme";
publisher = "PKief"; publisher = "PKief";
version = "4.12.1"; version = "4.14.1";
sha256 = "sha256-pmWnnZrdk6zb8YFG5ESgK4k875hgeseWyzkA9YUjg7A="; sha256 = "sha256-OHXi0EfeyKMeFiMU5yg0aDoWds4ED0lb+l6T12XZ3LQ=";
}; };
meta = { meta = {
license = lib.licenses.mit; license = lib.licenses.mit;

View File

@ -0,0 +1,66 @@
{ lib
, stdenvNoCC
, fetchzip
, copyDesktopItems
, jdk11
, makeDesktopItem
, makeWrapper
, unzip
}:
stdenvNoCC.mkDerivation rec {
pname = "irpf";
version = "2022-1.0";
src = let
year = lib.head (lib.splitVersion version);
in fetchzip {
url = "https://downloadirpf.receita.fazenda.gov.br/irpf/${year}/irpf/arquivos/IRPF${version}.zip";
sha256 = "0h8f51ilvg7m6hlx0y5mpxhac90p32ksbrffw0hxdqbilgjz1s68";
};
nativeBuildInputs = [ unzip makeWrapper copyDesktopItems ];
desktopItems = [
(makeDesktopItem rec {
name = pname;
exec = pname;
icon = "rfb64";
desktopName = "Imposto de Renda Pessoa Física";
comment = "Programa Oficial da Receita para elaboração do IRPF";
categories = [ "Office" ];
})
];
installPhase = ''
runHook preInstall
BASEDIR="$out/share/${pname}"
mkdir -p "$BASEDIR"
cp -r help lib lib-modulos "$BASEDIR"
install -Dm755 irpf.jar "$BASEDIR/${pname}.jar"
install -Dm644 Leia-me.htm offline.png online.png pgd-updater.jar "$BASEDIR"
makeWrapper ${jdk11}/bin/java $out/bin/${pname} \
--add-flags "-Dawt.useSystemAAFontSettings=on" \
--add-flags "-Dswing.aatext=true" \
--add-flags "-jar $BASEDIR/${pname}.jar" \
--set _JAVA_AWT_WM_NONREPARENTING 1 \
--set AWT_TOOLKIT MToolkit
mkdir -p $out/share/pixmaps
unzip -j lib/ppgd-icones-4.0.jar icones/rfb64.png -d $out/share/pixmaps
runHook postInstall
'';
meta = with lib; {
description = "Programa Oficial da Receita para elaboração do IRPF";
homepage = "https://www.gov.br/receitafederal/pt-br";
license = licenses.unfree;
platforms = platforms.all;
maintainers = with maintainers; [ atila ];
};
}

View File

@ -0,0 +1,70 @@
{ stdenv
, lib
, fetchFromGitLab
, gettext
, meson
, ninja
, pkg-config
, python3
, rustPlatform
, wrapGAppsHook
, appstream-glib
, desktop-file-utils
, glib
, gtk4
, libadwaita
}:
stdenv.mkDerivation rec {
pname = "gnome-obfuscate";
version = "0.0.4";
src = fetchFromGitLab {
domain = "gitlab.gnome.org";
owner = "World";
repo = "Obfuscate";
rev = version;
sha256 = "sha256-P8Y2Eizn1BMZXuFjGMXF/3oAUzI8ZNTrnbLyU+V6uk4=";
};
cargoDeps = rustPlatform.fetchCargoTarball {
inherit src;
name = "${pname}-${version}";
sha256 = "sha256-5MzWz5NH2sViIfaP8xOQLreEal5TYkji11VaUgieT3U=";
};
nativeBuildInputs = [
gettext
glib
meson
ninja
pkg-config
python3
rustPlatform.cargoSetupHook
rustPlatform.rust.cargo
rustPlatform.rust.rustc
wrapGAppsHook
];
buildInputs = [
appstream-glib
desktop-file-utils
glib
gtk4
libadwaita
];
postPatch = ''
patchShebangs build-aux/meson_post_install.py
'';
meta = with lib; {
description = "Censor private information";
homepage = "https://gitlab.gnome.org/World/obfuscate";
license = licenses.gpl3Plus;
maintainers = with maintainers; [ fgaz ];
platforms = platforms.all;
};
}

View File

@ -1,25 +1,21 @@
{ lib, stdenv, fetchurl, wrapGAppsHook { lib, stdenv, fetchurl, wrapGAppsHook
, cargo, desktop-file-utils, meson, ninja, pkg-config, python3, rustc , cargo, desktop-file-utils, meson, ninja, pkg-config, rustc
, dbus, gdk-pixbuf, glib, gtk3, gtksourceview4, libhandy , gdk-pixbuf, glib, gtk4, gtksourceview5, libadwaita
}: }:
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
pname = "icon-library"; pname = "icon-library";
version = "0.0.8"; version = "0.0.11";
src = fetchurl { src = fetchurl {
url = "https://gitlab.gnome.org/World/design/icon-library/uploads/fdf890706e0eef2458a5285e3bf65dd5/icon-library-${version}.tar.xz"; url = "https://gitlab.gnome.org/World/design/icon-library/uploads/93d183b17d216bbed7b03b2f3698059c/icon-library-${version}.tar.xz";
sha256 = "0807b56bgm8j1gpq4nf8x31gq9wqhcmpzpkqw6s4wissw3cb7q96"; sha256 = "1zrcnc5dn5fgcl3vklfpbp3m0qzi2n2viw59vw5fhwkysvp670y7";
}; };
nativeBuildInputs = [ nativeBuildInputs = [
cargo desktop-file-utils meson ninja pkg-config python3 rustc wrapGAppsHook cargo desktop-file-utils meson ninja pkg-config rustc wrapGAppsHook
]; ];
buildInputs = [ dbus gdk-pixbuf glib gtk3 gtksourceview4 libhandy ]; buildInputs = [ gdk-pixbuf glib gtk4 gtksourceview5 libadwaita ];
postPatch = ''
patchShebangs build-aux/meson_post_install.py
'';
meta = with lib; { meta = with lib; {
homepage = "https://gitlab.gnome.org/World/design/icon-library"; homepage = "https://gitlab.gnome.org/World/design/icon-library";

View File

@ -0,0 +1,48 @@
{ lib, stdenv, fetchFromGitHub
, autoconf, autoconf-archive, automake, glib, intltool, libtool, pkg-config
, gnome, gnupg, gtk3, udisks
}:
stdenv.mkDerivation rec {
pname = "eos-installer";
version = "4.0.3";
src = fetchFromGitHub {
owner = "endlessm";
repo = "eos-installer";
rev = "Release_${version}";
sha256 = "1nl6vim5dd83kvskmf13xp9d6zx39fayz4z0wqwf7xf4nwl07gwz";
fetchSubmodules = true;
};
strictDeps = true;
nativeBuildInputs = [
autoconf autoconf-archive automake glib intltool libtool pkg-config
];
buildInputs = [ gnome.gnome-desktop gtk3 udisks ];
preConfigure = ''
./autogen.sh
'';
configureFlags = [
"--libexecdir=${placeholder "out"}/bin"
"--localstatedir=/var"
"--with-systemdsystemunitdir=${placeholder "out"}/lib/systemd/system"
];
# These are for runtime, so can't be discovered from PATH, which
# is constructed from nativeBuildInputs.
GPG_PATH = "${gnupg}/bin/gpg";
GPGCONF_PATH = "${gnupg}/bin/gpgconf";
enableParallelBuilding = true;
meta = with lib; {
homepage = "https://github.com/endlessm/eos-installer";
description = "Installer UI which writes images to disk";
license = licenses.gpl2Plus;
maintainers = with maintainers; [ qyliss ];
platforms = platforms.linux;
};
}

View File

@ -30,13 +30,13 @@
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
pname = "waybar"; pname = "waybar";
version = "0.9.10"; version = "0.9.12";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "Alexays"; owner = "Alexays";
repo = "Waybar"; repo = "Waybar";
rev = version; rev = version;
sha256 = "sha256-KiRtU32h3AvThDWnCw55LnqbWVAZLXY/7fU1HxLMjLo="; sha256 = "sha256-NQ/d+eXmc+GRxl5zby97S4U/YQnsRWGpwNZZL0Sqby8=";
}; };
nativeBuildInputs = [ nativeBuildInputs = [

View File

@ -15,7 +15,9 @@
, rust-cbindgen, nodejs, nasm, fetchpatch , rust-cbindgen, nodejs, nasm, fetchpatch
, gnum4 , gnum4
, gtk3, wrapGAppsHook , gtk3, wrapGAppsHook
, pkgsCross
, debugBuild ? false , debugBuild ? false
, runCommand
### optionals ### optionals
@ -121,6 +123,15 @@ let
}) })
else stdenv; else stdenv;
# Compile the wasm32 sysroot to build the RLBox Sandbox
# https://hacks.mozilla.org/2021/12/webassembly-and-back-again-fine-grained-sandboxing-in-firefox-95/
# We only link c++ libs here, our compiler wrapper can find wasi libc and crt itself.
wasiSysRoot = runCommand "wasi-sysroot" {} ''
mkdir -p $out/lib/wasm32-wasi
for lib in ${pkgsCross.wasi32.llvmPackages.libcxx}/lib/* ${pkgsCross.wasi32.llvmPackages.libcxxabi}/lib/*; do
ln -s $lib $out/lib/wasm32-wasi
done
'';
in in
buildStdenv.mkDerivation ({ buildStdenv.mkDerivation ({
@ -213,7 +224,11 @@ buildStdenv.mkDerivation ({
configureScript="$(realpath ./mach) configure" configureScript="$(realpath ./mach) configure"
export MOZBUILD_STATE_PATH=$(pwd)/mozbuild export MOZBUILD_STATE_PATH=$(pwd)/mozbuild
'' + (lib.optionalString googleAPISupport '' '' + (lib.optionalString (lib.versionAtLeast version "95.0") ''
# RBox WASM Sandboxing
export WASM_CC=${pkgsCross.wasi32.stdenv.cc}/bin/${pkgsCross.wasi32.stdenv.cc.targetPrefix}cc
export WASM_CXX=${pkgsCross.wasi32.stdenv.cc}/bin/${pkgsCross.wasi32.stdenv.cc.targetPrefix}c++
'') + (lib.optionalString googleAPISupport ''
# Google API key used by Chromium and Firefox. # Google API key used by Chromium and Firefox.
# Note: These are for NixOS/nixpkgs use ONLY. For your own distribution, # Note: These are for NixOS/nixpkgs use ONLY. For your own distribution,
# please get your own set of keys. # please get your own set of keys.
@ -258,6 +273,7 @@ buildStdenv.mkDerivation ({
++ lib.optional ltoSupport "--enable-lto=cross" # Cross-language LTO. ++ lib.optional ltoSupport "--enable-lto=cross" # Cross-language LTO.
++ lib.optional (ltoSupport && (buildStdenv.isAarch32 || buildStdenv.isi686 || buildStdenv.isx86_64)) "--disable-elf-hack" ++ lib.optional (ltoSupport && (buildStdenv.isAarch32 || buildStdenv.isi686 || buildStdenv.isx86_64)) "--disable-elf-hack"
++ lib.optional (ltoSupport && !buildStdenv.isDarwin) "--enable-linker=lld" ++ lib.optional (ltoSupport && !buildStdenv.isDarwin) "--enable-linker=lld"
++ lib.optional (lib.versionAtLeast version "95") "--with-wasi-sysroot=${wasiSysRoot}"
++ flag alsaSupport "alsa" ++ flag alsaSupport "alsa"
++ flag pulseaudioSupport "pulseaudio" ++ flag pulseaudioSupport "pulseaudio"
@ -277,7 +293,6 @@ buildStdenv.mkDerivation ({
++ lib.optionals enableDebugSymbols [ "--disable-strip" "--disable-install-strip" ] ++ lib.optionals enableDebugSymbols [ "--disable-strip" "--disable-install-strip" ]
++ lib.optional enableOfficialBranding "--enable-official-branding" ++ lib.optional enableOfficialBranding "--enable-official-branding"
++ lib.optional (lib.versionAtLeast version "95") "--without-wasm-sandboxed-libraries"
++ extraConfigureFlags; ++ extraConfigureFlags;
postConfigure = '' postConfigure = ''
@ -356,6 +371,7 @@ buildStdenv.mkDerivation ({
inherit applicationName; inherit applicationName;
inherit tests; inherit tests;
inherit gtk3; inherit gtk3;
inherit wasiSysRoot;
} // extraPassthru; } // extraPassthru;
hardeningDisable = [ "format" ]; # -Werror=format-security hardeningDisable = [ "format" ]; # -Werror=format-security

View File

@ -32,10 +32,10 @@ rec {
firefox-esr-91 = common rec { firefox-esr-91 = common rec {
pname = "firefox-esr"; pname = "firefox-esr";
version = "91.7.0esr"; version = "91.7.1esr";
src = fetchurl { src = fetchurl {
url = "mirror://mozilla/firefox/releases/${version}/source/firefox-${version}.source.tar.xz"; url = "mirror://mozilla/firefox/releases/${version}/source/firefox-${version}.source.tar.xz";
sha512 = "925811989d8a91d826ba356bd46ac54be8153288ec0319c28d2bfbe89191e62e107691159dd7ca247253e2a4952eb59a5b9613e3feea3f5351238d4822e26301"; sha512 = "c56aa38e9d706ff1f1838d2639dac82109dcffb54a7ea17326ae306604d78967ac32da13676756999bc1aa0bf50dc4e7072936ceb16e2e834bea48382ae4b48c";
}; };
meta = { meta = {

View File

@ -0,0 +1,25 @@
{ lib, buildGoModule, fetchFromGitHub }:
buildGoModule rec {
pname = "kubemqctl";
version = "3.5.1";
src = fetchFromGitHub {
owner = "kubemq-io";
repo = pname;
rev = "v${version}";
sha256 = "0daqvd1y6b87xvnpdl2k0sa91zdmp48r0pgp6dvnb2l44ml8a4z0";
};
ldflags = [ "-w" "-s" "-X main.version=${version}" ];
doCheck = false; # TODO tests are failing
vendorSha256 = "1agn6i7cnsb5igvvbjzlaa5fgssr5h7h25y440q44bk16jxk6s74";
meta = {
homepage = "https://github.com/kubemq-io/kubemqctl";
description = "Kubemqctl is a command line interface (CLI) for Kubemq Kubernetes Message Broker.";
license = lib.licenses.asl20;
maintainers = with lib.maintainers; [ brianmcgee ];
};
}

View File

@ -5,8 +5,8 @@ self: super: {
_: { _: {
src = pkgs.fetchgit { src = pkgs.fetchgit {
url = "https://github.com/NixOS/nixops.git"; url = "https://github.com/NixOS/nixops.git";
rev = "d939c9bcae184d10583bf48211739b5b6521fc64"; rev = "7220cbdc8a1cf2db5b3ad75b525faf145a5560a3";
sha256 = "111wfph4c737xxs717pz8bnksp8zw0b6zv1il4zzq3fshv2ckd5c"; sha256 = "199cw25cvjb8gxs56nc8ilq7v4560c6vgi1sh1vqrsqxayq1g4cs";
}; };
} }
); );
@ -74,9 +74,9 @@ self: super: {
nixops-virtd = super.nixops-virtd.overridePythonAttrs ( nixops-virtd = super.nixops-virtd.overridePythonAttrs (
_: { _: {
src = pkgs.fetchgit { src = pkgs.fetchgit {
url = "https://github.com/nix-community/nixops-libvirtd.git"; url = "https://github.com/lovesegfault/nixops-libvirtd.git";
rev = "1245280d97e0adc4643d02d1cf62ddd582c73e49"; rev = "84d1688ee06afff136738b3eaf51f9cc3c08c350";
sha256 = "1z3zsx54585rcyabj6hrbwbd1c783rrlfj53np1sa3i7m93vmxzc"; sha256 = "1f3q9bwmdjr3qac7fh9b9hgw7l43hmiixbsmqm2zrnhb7xcyfmfg";
}; };
} }
); );

View File

@ -8,14 +8,14 @@ python-versions = "*"
[[package]] [[package]]
name = "apache-libcloud" name = "apache-libcloud"
version = "3.4.1" version = "3.5.0"
description = "A standard Python library that abstracts away differences among multiple cloud provider APIs. For more information and documentation, please see https://libcloud.apache.org" description = "A standard Python library that abstracts away differences among multiple cloud provider APIs. For more information and documentation, please see https://libcloud.apache.org"
category = "main" category = "main"
optional = false optional = false
python-versions = ">=3.5, <4" python-versions = ">=3.6, <4"
[package.dependencies] [package.dependencies]
requests = ">=2.5.0" requests = ">=2.26.0"
[[package]] [[package]]
name = "babel" name = "babel"
@ -38,14 +38,14 @@ python-versions = "*"
[[package]] [[package]]
name = "boto3" name = "boto3"
version = "1.21.11" version = "1.21.18"
description = "The AWS SDK for Python" description = "The AWS SDK for Python"
category = "main" category = "main"
optional = false optional = false
python-versions = ">= 3.6" python-versions = ">= 3.6"
[package.dependencies] [package.dependencies]
botocore = ">=1.24.11,<1.25.0" botocore = ">=1.24.18,<1.25.0"
jmespath = ">=0.7.1,<1.0.0" jmespath = ">=0.7.1,<1.0.0"
s3transfer = ">=0.5.0,<0.6.0" s3transfer = ">=0.5.0,<0.6.0"
@ -54,7 +54,7 @@ crt = ["botocore[crt] (>=1.21.0,<2.0a0)"]
[[package]] [[package]]
name = "botocore" name = "botocore"
version = "1.24.11" version = "1.24.18"
description = "Low-level, data-driven core of boto 3." description = "Low-level, data-driven core of boto 3."
category = "main" category = "main"
optional = false optional = false
@ -194,7 +194,7 @@ testing = ["pytest (>=3.5,!=3.7.3)", "pytest-checkdocs (>=1.2.3)", "pytest-flake
[[package]] [[package]]
name = "libvirt-python" name = "libvirt-python"
version = "7.10.0" version = "8.1.0"
description = "The libvirt virtualization API python binding" description = "The libvirt virtualization API python binding"
category = "main" category = "main"
optional = false optional = false
@ -227,7 +227,7 @@ typing-extensions = "^3.7.4"
type = "git" type = "git"
url = "https://github.com/NixOS/nixops.git" url = "https://github.com/NixOS/nixops.git"
reference = "master" reference = "master"
resolved_reference = "d939c9bcae184d10583bf48211739b5b6521fc64" resolved_reference = "7220cbdc8a1cf2db5b3ad75b525faf145a5560a3"
[[package]] [[package]]
name = "nixops-aws" name = "nixops-aws"
@ -358,14 +358,14 @@ python-versions = "^3.7"
develop = false develop = false
[package.dependencies] [package.dependencies]
libvirt-python = "^7.0" libvirt-python = "^8.0"
nixops = {git = "https://github.com/NixOS/nixops.git", branch = "master"} nixops = {git = "https://github.com/NixOS/nixops.git", branch = "master"}
[package.source] [package.source]
type = "git" type = "git"
url = "https://github.com/nix-community/nixops-libvirtd.git" url = "https://github.com/lovesegfault/nixops-libvirtd.git"
reference = "master" reference = "update-libvirt"
resolved_reference = "1245280d97e0adc4643d02d1cf62ddd582c73e49" resolved_reference = "84d1688ee06afff136738b3eaf51f9cc3c08c350"
[[package]] [[package]]
name = "nixopsvbox" name = "nixopsvbox"
@ -677,7 +677,7 @@ socks = ["PySocks (>=1.5.6,!=1.5.7,<2.0)"]
[metadata] [metadata]
lock-version = "1.1" lock-version = "1.1"
python-versions = "^3.8" python-versions = "^3.8"
content-hash = "e75c6429aa8989659a345f903e2e67d87514b5864751e33890d90aa2d20ef3e2" content-hash = "63b68a38ca6f7b9189d2403c2c6d1ec7af29cc1ccdeab2fbc970b5dbd766c3c6"
[metadata.files] [metadata.files]
alabaster = [ alabaster = [
@ -685,8 +685,8 @@ alabaster = [
{file = "alabaster-0.7.12.tar.gz", hash = "sha256:a661d72d58e6ea8a57f7a86e37d86716863ee5e92788398526d58b26a4e4dc02"}, {file = "alabaster-0.7.12.tar.gz", hash = "sha256:a661d72d58e6ea8a57f7a86e37d86716863ee5e92788398526d58b26a4e4dc02"},
] ]
apache-libcloud = [ apache-libcloud = [
{file = "apache-libcloud-3.4.1.tar.gz", hash = "sha256:88f18da0cf3fac0af723e743fb741d9d1be251881edab7a5a0d1629955b5011b"}, {file = "apache-libcloud-3.5.0.tar.gz", hash = "sha256:073f10492976faa383a22b13b82c249827cfe90a083c71620e8316e815a6db3b"},
{file = "apache_libcloud-3.4.1-py2.py3-none-any.whl", hash = "sha256:af1a5b3cda7bc3220093726ff67dbb70928521e2ec19d0e33a31b1e22fde1850"}, {file = "apache_libcloud-3.5.0-py2.py3-none-any.whl", hash = "sha256:3789f4f2464fe18e317cdd3a03eff363268e096bc47f1f5770ee82d6ffe28c40"},
] ]
babel = [ babel = [
{file = "Babel-2.9.1-py2.py3-none-any.whl", hash = "sha256:ab49e12b91d937cd11f0b67cb259a57ab4ad2b59ac7a3b41d6c06c0ac5b0def9"}, {file = "Babel-2.9.1-py2.py3-none-any.whl", hash = "sha256:ab49e12b91d937cd11f0b67cb259a57ab4ad2b59ac7a3b41d6c06c0ac5b0def9"},
@ -697,12 +697,12 @@ boto = [
{file = "boto-2.49.0.tar.gz", hash = "sha256:ea0d3b40a2d852767be77ca343b58a9e3a4b00d9db440efb8da74b4e58025e5a"}, {file = "boto-2.49.0.tar.gz", hash = "sha256:ea0d3b40a2d852767be77ca343b58a9e3a4b00d9db440efb8da74b4e58025e5a"},
] ]
boto3 = [ boto3 = [
{file = "boto3-1.21.11-py3-none-any.whl", hash = "sha256:bf5f6a8997ed11a66280ace67cc25ec31c28525940da91d309c3976a9955d4cf"}, {file = "boto3-1.21.18-py3-none-any.whl", hash = "sha256:d857feb6af9932e1ee3a748060a2cd9fd6043dbbccf66976eda54586597efdc0"},
{file = "boto3-1.21.11.tar.gz", hash = "sha256:f2cecf5d176f398a39bfde0008df83c03f2142b2be5eabe32bf104961df68810"}, {file = "boto3-1.21.18.tar.gz", hash = "sha256:8d6f3c548f0ee03d742f404c96515e7579fc6968135aaa50dd855a046698ff79"},
] ]
botocore = [ botocore = [
{file = "botocore-1.24.11-py3-none-any.whl", hash = "sha256:b29c2b5906d7f70782634bb8713c77e39f23aafc994bb2f7dccbeb2b36712adc"}, {file = "botocore-1.24.18-py3-none-any.whl", hash = "sha256:7ea8ef1ff7c4882ab59b337662f90ddf5ea860e95e7e209dca593a34ea585b1b"},
{file = "botocore-1.24.11.tar.gz", hash = "sha256:2af93de704f3122878a3233e7cf5de0b02f6c4c9fa993ca853b583f597bb1c38"}, {file = "botocore-1.24.18.tar.gz", hash = "sha256:d2da7ccbc5ddd61fe3cd45fcbd3de380d9e3a15bfa8fbfd2d9259a93dcc60c56"},
] ]
certifi = [ certifi = [
{file = "certifi-2021.10.8-py2.py3-none-any.whl", hash = "sha256:d62a0163eb4c2344ac042ab2bdf75399a71a2d8c7d47eac2e2ee91b9d6339569"}, {file = "certifi-2021.10.8-py2.py3-none-any.whl", hash = "sha256:d62a0163eb4c2344ac042ab2bdf75399a71a2d8c7d47eac2e2ee91b9d6339569"},
@ -775,6 +775,8 @@ cryptography = [
{file = "cryptography-3.4.8-cp36-abi3-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:34dae04a0dce5730d8eb7894eab617d8a70d0c97da76b905de9efb7128ad7085"}, {file = "cryptography-3.4.8-cp36-abi3-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:34dae04a0dce5730d8eb7894eab617d8a70d0c97da76b905de9efb7128ad7085"},
{file = "cryptography-3.4.8-cp36-abi3-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:1eb7bb0df6f6f583dd8e054689def236255161ebbcf62b226454ab9ec663746b"}, {file = "cryptography-3.4.8-cp36-abi3-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:1eb7bb0df6f6f583dd8e054689def236255161ebbcf62b226454ab9ec663746b"},
{file = "cryptography-3.4.8-cp36-abi3-manylinux_2_24_x86_64.whl", hash = "sha256:9965c46c674ba8cc572bc09a03f4c649292ee73e1b683adb1ce81e82e9a6a0fb"}, {file = "cryptography-3.4.8-cp36-abi3-manylinux_2_24_x86_64.whl", hash = "sha256:9965c46c674ba8cc572bc09a03f4c649292ee73e1b683adb1ce81e82e9a6a0fb"},
{file = "cryptography-3.4.8-cp36-abi3-musllinux_1_1_aarch64.whl", hash = "sha256:3c4129fc3fdc0fa8e40861b5ac0c673315b3c902bbdc05fc176764815b43dd1d"},
{file = "cryptography-3.4.8-cp36-abi3-musllinux_1_1_x86_64.whl", hash = "sha256:695104a9223a7239d155d7627ad912953b540929ef97ae0c34c7b8bf30857e89"},
{file = "cryptography-3.4.8-cp36-abi3-win32.whl", hash = "sha256:21ca464b3a4b8d8e86ba0ee5045e103a1fcfac3b39319727bc0fc58c09c6aff7"}, {file = "cryptography-3.4.8-cp36-abi3-win32.whl", hash = "sha256:21ca464b3a4b8d8e86ba0ee5045e103a1fcfac3b39319727bc0fc58c09c6aff7"},
{file = "cryptography-3.4.8-cp36-abi3-win_amd64.whl", hash = "sha256:3520667fda779eb788ea00080124875be18f2d8f0848ec00733c0ec3bb8219fc"}, {file = "cryptography-3.4.8-cp36-abi3-win_amd64.whl", hash = "sha256:3520667fda779eb788ea00080124875be18f2d8f0848ec00733c0ec3bb8219fc"},
{file = "cryptography-3.4.8-pp36-pypy36_pp73-manylinux_2_12_x86_64.manylinux2010_x86_64.whl", hash = "sha256:d2a6e5ef66503da51d2110edf6c403dc6b494cc0082f85db12f54e9c5d4c3ec5"}, {file = "cryptography-3.4.8-pp36-pypy36_pp73-manylinux_2_12_x86_64.manylinux2010_x86_64.whl", hash = "sha256:d2a6e5ef66503da51d2110edf6c403dc6b494cc0082f85db12f54e9c5d4c3ec5"},
@ -815,7 +817,7 @@ jsonpickle = [
{file = "jsonpickle-2.1.0.tar.gz", hash = "sha256:84684cfc5338a534173c8dd69809e40f2865d0be1f8a2b7af8465e5b968dcfa9"}, {file = "jsonpickle-2.1.0.tar.gz", hash = "sha256:84684cfc5338a534173c8dd69809e40f2865d0be1f8a2b7af8465e5b968dcfa9"},
] ]
libvirt-python = [ libvirt-python = [
{file = "libvirt-python-7.10.0.tar.gz", hash = "sha256:267774bbdf99d47515274542880499437dc94ae291771f5663c62020a62da975"}, {file = "libvirt-python-8.1.0.tar.gz", hash = "sha256:a21ecfab6d29ac1bdd1bfd4aa3ef58447f9f70919aefecd03774613f65914e43"},
] ]
markupsafe = [ markupsafe = [
{file = "MarkupSafe-2.1.0-cp310-cp310-macosx_10_9_universal2.whl", hash = "sha256:3028252424c72b2602a323f70fbf50aa80a5d3aa616ea6add4ba21ae9cc9da4c"}, {file = "MarkupSafe-2.1.0-cp310-cp310-macosx_10_9_universal2.whl", hash = "sha256:3028252424c72b2602a323f70fbf50aa80a5d3aa616ea6add4ba21ae9cc9da4c"},

View File

@ -14,7 +14,10 @@ nixops-gcp = {git = "https://github.com/nix-community/nixops-gce.git"}
nixops-hercules-ci = {git = "https://github.com/hercules-ci/nixops-hercules-ci.git"} nixops-hercules-ci = {git = "https://github.com/hercules-ci/nixops-hercules-ci.git"}
nixops-hetzner = {git = "https://github.com/NixOS/nixops-hetzner"} nixops-hetzner = {git = "https://github.com/NixOS/nixops-hetzner"}
nixopsvbox = {git = "https://github.com/nix-community/nixops-vbox.git"} nixopsvbox = {git = "https://github.com/nix-community/nixops-vbox.git"}
nixops-virtd = {git = "https://github.com/nix-community/nixops-libvirtd.git"} # FIXME: Once #30 lands this can be replaced
# https://github.com/nix-community/nixops-libvirtd/pull/30
# nixops-virtd = {git = "https://github.com/nix-community/nixops-libvirtd.git"}
nixops-virtd = { git = "https://github.com/lovesegfault/nixops-libvirtd.git", branch = "update-libvirt" }
[tool.poetry.dev-dependencies] [tool.poetry.dev-dependencies]
sphinx = "^3.1.2" sphinx = "^3.1.2"

View File

@ -40,10 +40,10 @@
"owner": "aliyun", "owner": "aliyun",
"provider-source-address": "registry.terraform.io/aliyun/alicloud", "provider-source-address": "registry.terraform.io/aliyun/alicloud",
"repo": "terraform-provider-alicloud", "repo": "terraform-provider-alicloud",
"rev": "v1.159.0", "rev": "v1.160.0",
"sha256": "0vfpmagxrlv6fqaq008lhygxd49br06d0bi1w6dsazfszw3ihj02", "sha256": "sha256-ijSOvBS8bcFKX0qa2Cl/xqDdwduamVdCWzgTCWao1Sg=",
"vendorSha256": "05vkn52s0x6kcyxxs0p7w6z1nclmvvla7rjv1ippzw7fgn2s19m0", "vendorSha256": "sha256-oKaghX3u8H9vDFvmo+jelTIbvuHnAt27Z9N0oEWxcxc=",
"version": "1.159.0" "version": "1.160.0"
}, },
"ansible": { "ansible": {
"owner": "nbering", "owner": "nbering",
@ -94,28 +94,28 @@
"owner": "hashicorp", "owner": "hashicorp",
"provider-source-address": "registry.terraform.io/hashicorp/aws", "provider-source-address": "registry.terraform.io/hashicorp/aws",
"repo": "terraform-provider-aws", "repo": "terraform-provider-aws",
"rev": "v4.4.0", "rev": "v4.5.0",
"sha256": "082bllsihmc4jndi1hrv1chcrdm755vphlgpajg22s1ajmylqgm5", "sha256": "sha256-L1LRuinU3YrqywRGpmUqGQgjZ1JuYhECjCN6ysYPzco=",
"vendorSha256": "0j6ghjr2mhi7nixkk8v9vwm6sr78h0wnj1lxs19lkrpnvy6jc31i", "vendorSha256": "sha256-3akEup/M7Zc5MPf2XA+324PxQiHegIwzR05JNSjYanw=",
"version": "4.4.0" "version": "4.5.0"
}, },
"azuread": { "azuread": {
"owner": "hashicorp", "owner": "hashicorp",
"provider-source-address": "registry.terraform.io/hashicorp/azuread", "provider-source-address": "registry.terraform.io/hashicorp/azuread",
"repo": "terraform-provider-azuread", "repo": "terraform-provider-azuread",
"rev": "v2.18.0", "rev": "v2.19.1",
"sha256": "06l4w9g4p48gnb9c9mmnydvpyr89f8rijpf103ndsg6ack6k4mg2", "sha256": "sha256-n5jDlcy5rwCcrqoL3ut+HThDLQ8hPj2mZ15d7hhALFw=",
"vendorSha256": null, "vendorSha256": null,
"version": "2.18.0" "version": "2.19.1"
}, },
"azurerm": { "azurerm": {
"owner": "hashicorp", "owner": "hashicorp",
"provider-source-address": "registry.terraform.io/hashicorp/azurerm", "provider-source-address": "registry.terraform.io/hashicorp/azurerm",
"repo": "terraform-provider-azurerm", "repo": "terraform-provider-azurerm",
"rev": "v2.98.0", "rev": "v2.99.0",
"sha256": "0cfdw70q1kh6f50gsc94mh1xi7s4z47wfsmskp1ahx7av7wpz1p6", "sha256": "sha256-HXLr22UVciRvW1iaa46sy37ivG41hKqhrQtCXpnl8ss=",
"vendorSha256": null, "vendorSha256": null,
"version": "2.98.0" "version": "2.99.0"
}, },
"azurestack": { "azurestack": {
"owner": "hashicorp", "owner": "hashicorp",
@ -148,10 +148,10 @@
"owner": "DrFaust92", "owner": "DrFaust92",
"provider-source-address": "registry.terraform.io/DrFaust92/bitbucket", "provider-source-address": "registry.terraform.io/DrFaust92/bitbucket",
"repo": "terraform-provider-bitbucket", "repo": "terraform-provider-bitbucket",
"rev": "v2.4.1", "rev": "v2.8.0",
"sha256": "07y0biab2g6plkyp8scqf7b12alijnxq2zqqr05lbm6wgrc22kvk", "sha256": "sha256-W+mAud3DpBViLeFwXLWIwZ1+TOco8FWZnVrIbHUwgIU=",
"vendorSha256": null, "vendorSha256": "sha256-hSMVLDZXC9QMpcgREjEUjhxArtotrIrIyfdNIZw8uM4=",
"version": "2.4.1" "version": "2.8.0"
}, },
"brightbox": { "brightbox": {
"owner": "brightbox", "owner": "brightbox",
@ -166,10 +166,10 @@
"owner": "checkly", "owner": "checkly",
"provider-source-address": "registry.terraform.io/checkly/checkly", "provider-source-address": "registry.terraform.io/checkly/checkly",
"repo": "terraform-provider-checkly", "repo": "terraform-provider-checkly",
"rev": "v1.4.2", "rev": "v1.4.3",
"sha256": "1wd9834d3yi2y35yrcrgxmzijrb2ymz11gqmva9m1hd10i0aqj9f", "sha256": "sha256-5VF1cAFgdm2TR4wvuNlycpgQuVdHesFYnTv34MeauxY=",
"vendorSha256": "0pjxrdpsn99g6hjp0flrk7czjb05ibnsjcggrvvpwzrbj55rqzgd", "vendorSha256": "sha256-7X2cS5Erf373zu8xqe2KBSz52ZmZOnAlNC8lq2/LXV4=",
"version": "1.4.2" "version": "1.4.3"
}, },
"checkpoint": { "checkpoint": {
"deleteVendor": true, "deleteVendor": true,
@ -194,10 +194,10 @@
"owner": "cloudflare", "owner": "cloudflare",
"provider-source-address": "registry.terraform.io/cloudflare/cloudflare", "provider-source-address": "registry.terraform.io/cloudflare/cloudflare",
"repo": "terraform-provider-cloudflare", "repo": "terraform-provider-cloudflare",
"rev": "v3.9.1", "rev": "v3.10.1",
"sha256": "02kyjf2mizvxv1a2fkw2wsk0gmilj83sj3qv1d7g0wxxkxx00nd2", "sha256": "sha256-2Ulavo82Y8dEOXtgpbgCwuCTOhAEoOFbgL4bK5HXQlY=",
"vendorSha256": "167jafxr4g43y9gvqjq5z7vd9cyf15d69wbrdvqsfzj8sszqfq5l", "vendorSha256": "sha256-CgK1/Ddau3glxmzb7Y6o1RZbMV8dwA84F6n2OzuyZrU=",
"version": "3.9.1" "version": "3.10.1"
}, },
"cloudfoundry": { "cloudfoundry": {
"owner": "cloudfoundry-community", "owner": "cloudfoundry-community",
@ -257,10 +257,10 @@
"owner": "DataDog", "owner": "DataDog",
"provider-source-address": "registry.terraform.io/DataDog/datadog", "provider-source-address": "registry.terraform.io/DataDog/datadog",
"repo": "terraform-provider-datadog", "repo": "terraform-provider-datadog",
"rev": "v3.8.1", "rev": "v3.9.0",
"sha256": "0mvl80dsqzab1r3p5n446737dadzfbsyfbdy2w2xvmz4fgx6aklh", "sha256": "sha256-CncMqWIa1JiHkIkNAgIQl4fcKZVKZGD4BZSjuv5cw18=",
"vendorSha256": "0p8czqb4hn5z9bfgsfajdpx46hwil0ax75j8xljlh1ccvpp2rvyz", "vendorSha256": "sha256-U1gVP4o1mj21NW9z8jyV5KhuJNJRYAV1Qvg1fV1zGO4=",
"version": "3.8.1" "version": "3.9.0"
}, },
"dhall": { "dhall": {
"owner": "awakesecurity", "owner": "awakesecurity",
@ -275,10 +275,10 @@
"owner": "digitalocean", "owner": "digitalocean",
"provider-source-address": "registry.terraform.io/digitalocean/digitalocean", "provider-source-address": "registry.terraform.io/digitalocean/digitalocean",
"repo": "terraform-provider-digitalocean", "repo": "terraform-provider-digitalocean",
"rev": "v2.17.1", "rev": "v2.18.0",
"sha256": "0dfw4sjmsfzrs28gf5k4vqjs6phwa6w3pwi7fpbngnw6l2r4m6h9", "sha256": "sha256-MuJpBLOB8AeAlNhQC+rwT6mkZriU4+XgAqQY33xjFck=",
"vendorSha256": null, "vendorSha256": null,
"version": "2.17.1" "version": "2.18.0"
}, },
"dme": { "dme": {
"owner": "DNSMadeEasy", "owner": "DNSMadeEasy",
@ -329,19 +329,19 @@
"owner": "phillbaker", "owner": "phillbaker",
"provider-source-address": "registry.terraform.io/phillbaker/elasticsearch", "provider-source-address": "registry.terraform.io/phillbaker/elasticsearch",
"repo": "terraform-provider-elasticsearch", "repo": "terraform-provider-elasticsearch",
"rev": "v2.0.0-beta.4", "rev": "v2.0.0",
"sha256": "0ypw916sziy8dhvbv96f7d4as08ps18xxx8h6ip69mk74vf029sm", "sha256": "sha256-wl8pRAB97JObpZvi2rdyDZP5itKcOnm6Gsbku1+5oqQ=",
"vendorSha256": "1w92k895ikrqm9n1hf36wlh9nq278vifl3r14v0rxa8g9awizfdr", "vendorSha256": "sha256-OCXTZg0JkaxJDEgoF2Qs4BcMSiYkQpLmehWdCpEmTzk=",
"version": "2.0.0-beta.4" "version": "2.0.0"
}, },
"exoscale": { "exoscale": {
"owner": "exoscale", "owner": "exoscale",
"provider-source-address": "registry.terraform.io/exoscale/exoscale", "provider-source-address": "registry.terraform.io/exoscale/exoscale",
"repo": "terraform-provider-exoscale", "repo": "terraform-provider-exoscale",
"rev": "v0.32.0", "rev": "v0.33.0",
"sha256": "1jnpbw50cqzkxr1xgxxnkg0fp65mz84v9fqxpv4j29djgvi94w2m", "sha256": "sha256-mih0Bo6fcNgpyeCQ+GWSPyTrPlGzmBXkEO43TOVWMds=",
"vendorSha256": null, "vendorSha256": null,
"version": "0.32.0" "version": "0.33.0"
}, },
"external": { "external": {
"owner": "hashicorp", "owner": "hashicorp",
@ -356,10 +356,10 @@
"owner": "fastly", "owner": "fastly",
"provider-source-address": "registry.terraform.io/fastly/fastly", "provider-source-address": "registry.terraform.io/fastly/fastly",
"repo": "terraform-provider-fastly", "repo": "terraform-provider-fastly",
"rev": "v1.1.1", "rev": "v1.1.2",
"sha256": "1n7lwvfp4y0k1rh13jz94im367h6mxmvglik2nddq58pmxwns2lz", "sha256": "sha256-CxyVW9uE9mK+ZF8fyjAsrFKY82xAyGn9k1jOFqTaAhA=",
"vendorSha256": null, "vendorSha256": null,
"version": "1.1.1" "version": "1.1.2"
}, },
"flexibleengine": { "flexibleengine": {
"owner": "FlexibleEngineCloud", "owner": "FlexibleEngineCloud",
@ -392,39 +392,39 @@
"owner": "integrations", "owner": "integrations",
"provider-source-address": "registry.terraform.io/integrations/github", "provider-source-address": "registry.terraform.io/integrations/github",
"repo": "terraform-provider-github", "repo": "terraform-provider-github",
"rev": "v4.20.1", "rev": "v4.21.0",
"sha256": "1kqi41g1lw2phar7gy35rf92qb5s32p7q780d9wrmyimriwhlh4j", "sha256": "sha256-ayL22zlfZkGL/ycyQX384g7CjFHDgK8k010kg1fI4h4=",
"vendorSha256": null, "vendorSha256": null,
"version": "4.20.1" "version": "4.21.0"
}, },
"gitlab": { "gitlab": {
"owner": "gitlabhq", "owner": "gitlabhq",
"provider-source-address": "registry.terraform.io/gitlabhq/gitlab", "provider-source-address": "registry.terraform.io/gitlabhq/gitlab",
"repo": "terraform-provider-gitlab", "repo": "terraform-provider-gitlab",
"rev": "v3.11.1", "rev": "v3.12.0",
"sha256": "19l2m1d8jn5c8kd39fhw34f805ckad36vs4a2xalpb3whj89sfwy", "sha256": "sha256-6CrM2Pt4yB0ZaXvcgUPreIhJrUhXCNt/xt+fExzGJqc=",
"vendorSha256": "0flvda6jrq5ff8lk0405bxs90rwpaw3aci85bfd9k258sp3ign9s", "vendorSha256": "sha256-78/7+t75xFjLt1JfoVpHVPlM7q5BX+NI/I9ugfjdv+g=",
"version": "3.11.1" "version": "3.12.0"
}, },
"google": { "google": {
"owner": "hashicorp", "owner": "hashicorp",
"provider-source-address": "registry.terraform.io/hashicorp/google", "provider-source-address": "registry.terraform.io/hashicorp/google",
"proxyVendor": true, "proxyVendor": true,
"repo": "terraform-provider-google", "repo": "terraform-provider-google",
"rev": "v4.12.0", "rev": "v4.13.0",
"sha256": "0yrzzg7b1dqfsz6wpqh869qwdwbi747hr5xwcjycl8mz4ajlwzsz", "sha256": "sha256-QSHlnvsWmkdUE7dd6HqzYtyYC+XDW69dIp/h7u1jD9g=",
"vendorSha256": "1rfhcapahzss8frpnyag53r5s7iqwq7ndqjv30bmhzw3ilwgdfdr", "vendorSha256": "sha256-1tiFBc03RyIAtnu/NqhU3RowM8JhuLNS+blfyjXBcW0=",
"version": "4.12.0" "version": "4.13.0"
}, },
"google-beta": { "google-beta": {
"owner": "hashicorp", "owner": "hashicorp",
"provider-source-address": "registry.terraform.io/hashicorp/google-beta", "provider-source-address": "registry.terraform.io/hashicorp/google-beta",
"proxyVendor": true, "proxyVendor": true,
"repo": "terraform-provider-google-beta", "repo": "terraform-provider-google-beta",
"rev": "v4.12.0", "rev": "v4.13.0",
"sha256": "0dbhzch3vixl8lpdd39p1crx997kdg25scliha7nj2g7a8cli73y", "sha256": "sha256-jjYUijzUgIiSC9eL6rbgtuBSh6bbHLjeifN+GIndrVs=",
"vendorSha256": "1rfhcapahzss8frpnyag53r5s7iqwq7ndqjv30bmhzw3ilwgdfdr", "vendorSha256": "sha256-1tiFBc03RyIAtnu/NqhU3RowM8JhuLNS+blfyjXBcW0=",
"version": "4.12.0" "version": "4.13.0"
}, },
"grafana": { "grafana": {
"owner": "grafana", "owner": "grafana",
@ -511,10 +511,10 @@
"owner": "IBM-Cloud", "owner": "IBM-Cloud",
"provider-source-address": "registry.terraform.io/IBM-Cloud/ibm", "provider-source-address": "registry.terraform.io/IBM-Cloud/ibm",
"repo": "terraform-provider-ibm", "repo": "terraform-provider-ibm",
"rev": "v1.39.1", "rev": "v1.39.2",
"sha256": "1f7zhczsz9w4lk2fzcbk1w1pjwnmbgn7lk8nsyk5azkspbf4hjzv", "sha256": "sha256-9r0tt0N3m/IYq/9oepQ4DcB78ds8pb1up1TyjFYzX1U=",
"vendorSha256": "1dhm99h7srnfwscdqy2zaj3wjdb0v1ybb7arv60522xvhsdnb99r", "vendorSha256": "sha256-8qgm1zDdwKNE/bs1n5cpY/DUD3SKtFmnvEgwtKorASk=",
"version": "1.39.1" "version": "1.39.2"
}, },
"icinga2": { "icinga2": {
"owner": "Icinga", "owner": "Icinga",
@ -565,10 +565,10 @@
"owner": "kingsoftcloud", "owner": "kingsoftcloud",
"provider-source-address": "registry.terraform.io/kingsoftcloud/ksyun", "provider-source-address": "registry.terraform.io/kingsoftcloud/ksyun",
"repo": "terraform-provider-ksyun", "repo": "terraform-provider-ksyun",
"rev": "v1.3.41", "rev": "v1.3.42",
"sha256": "0p8fl7dkp2nfw73ij769svm83cpvi1rw3aykf0qx33n9si78m892", "sha256": "sha256-wj4o2XSz8ylZJdseIi/TadlhOwFWZ6nfDOUezbeGYw4=",
"vendorSha256": "1pm4kld23mvgs14z54fpfdvnj0alm8frkkmf0851hi58nazc54dq", "vendorSha256": "sha256-nbAEaRFtFtB4ftLgnCv3MmkjFFbcNkCuxZc+G8/ObPE=",
"version": "1.3.41" "version": "1.3.42"
}, },
"kubectl": { "kubectl": {
"owner": "gavinbunney", "owner": "gavinbunney",
@ -610,10 +610,10 @@
"owner": "linode", "owner": "linode",
"provider-source-address": "registry.terraform.io/linode/linode", "provider-source-address": "registry.terraform.io/linode/linode",
"repo": "terraform-provider-linode", "repo": "terraform-provider-linode",
"rev": "v1.25.2", "rev": "v1.26.1",
"sha256": "18w9x80zary64873d1r824g28l5dhkda1qq0lr895afwh8g11dfp", "sha256": "sha256-bd0raIIh/VmTlSVYnNd98fpppRKnO46g8FI5OwZPjMg=",
"vendorSha256": "0c882yafydhdhnp5awb8llzbmiljfdbamqlx740347ywpliy0ga2", "vendorSha256": "sha256-SCTWvTgJ0QYh2DEbTI9coa3Fp4fBHusytF+JFzAq2XA=",
"version": "1.25.2" "version": "1.26.1"
}, },
"linuxbox": { "linuxbox": {
"owner": "numtide", "owner": "numtide",
@ -628,10 +628,10 @@
"owner": "hashicorp", "owner": "hashicorp",
"provider-source-address": "registry.terraform.io/hashicorp/local", "provider-source-address": "registry.terraform.io/hashicorp/local",
"repo": "terraform-provider-local", "repo": "terraform-provider-local",
"rev": "v2.1.0", "rev": "v2.2.2",
"sha256": "0lv1mvy4pkx0sc49xny4j0h30m64lvr3rnmqk85i5p0xhyn77gf2", "sha256": "sha256-JpTdRi9EagrnhYnlq6sl6+t4SE6i7T7YrGTsYCDync8=",
"vendorSha256": null, "vendorSha256": "sha256-Ha/MGbXwwhbVxaHbkU2xBhyNcDxLivk7vYQjfVzWOcY=",
"version": "2.1.0" "version": "2.2.2"
}, },
"logicmonitor": { "logicmonitor": {
"deleteVendor": true, "deleteVendor": true,
@ -719,10 +719,10 @@
"owner": "newrelic", "owner": "newrelic",
"provider-source-address": "registry.terraform.io/newrelic/newrelic", "provider-source-address": "registry.terraform.io/newrelic/newrelic",
"repo": "terraform-provider-newrelic", "repo": "terraform-provider-newrelic",
"rev": "v2.39.0", "rev": "v2.39.2",
"sha256": "03raj9a0qxvss03ab78pdqwbkc4hc95khzi7lg1a156vxfnibdr2", "sha256": "sha256-NfszsBliZAjY52kPWB7yhOEYZB2V4yOp6IDffF7EG6k=",
"vendorSha256": "0sch3wdgy6mx8a983miwi5ihky2j4mzvcg8wilwlp7nsgrfv6ghc", "vendorSha256": "sha256-DD6zXX7anks5jRw9tn8lUvgJY4k81oGSQr0a/xofkGk=",
"version": "2.39.0" "version": "2.39.2"
}, },
"nomad": { "nomad": {
"owner": "hashicorp", "owner": "hashicorp",
@ -771,22 +771,22 @@
"version": "1.3.0" "version": "1.3.0"
}, },
"oci": { "oci": {
"owner": "terraform-providers", "owner": "oracle",
"provider-source-address": "registry.terraform.io/hashicorp/oci", "provider-source-address": "registry.terraform.io/hashicorp/oci",
"repo": "terraform-provider-oci", "repo": "terraform-provider-oci",
"rev": "v4.66.0", "rev": "v4.67.0",
"sha256": "0iyh87ckv18f3krlhklj07shv5jwskp6fd70fq3zzfdl07jyy429", "sha256": "sha256-kgnyGLF6UbWRbrjXDkh7y11jx4JO3hFo7/qdJzwX0rU=",
"vendorSha256": null, "vendorSha256": null,
"version": "4.66.0" "version": "4.67.0"
}, },
"okta": { "okta": {
"owner": "okta", "owner": "okta",
"provider-source-address": "registry.terraform.io/okta/okta", "provider-source-address": "registry.terraform.io/okta/okta",
"repo": "terraform-provider-okta", "repo": "terraform-provider-okta",
"rev": "v3.22.0", "rev": "v3.22.1",
"sha256": "1fsxdljpyb9qxc32jgi1yrwrs8rb8iz7ld11a0sm65qhh5yvl5jh", "sha256": "sha256-G1KJJSxJmzFlIUWOs+7htcgp61oWCu+ryCKaIHzxhzw=",
"vendorSha256": "0l0di6cmm41z7i4d498xxc8wcrbg6r9w4vcdksqhz92s1gqs3f4z", "vendorSha256": "sha256-n7ih8QtapA+xno1twlM2b2XGEesdJdJIPD+QWpmJDVA=",
"version": "3.22.0" "version": "3.22.1"
}, },
"oktaasa": { "oktaasa": {
"owner": "oktadeveloper", "owner": "oktadeveloper",
@ -811,10 +811,10 @@
"owner": "OpenNebula", "owner": "OpenNebula",
"provider-source-address": "registry.terraform.io/OpenNebula/opennebula", "provider-source-address": "registry.terraform.io/OpenNebula/opennebula",
"repo": "terraform-provider-opennebula", "repo": "terraform-provider-opennebula",
"rev": "v0.4.1", "rev": "v0.4.2",
"sha256": "13z14p8zkrmffai5pdiwi33xsznan015nl9b9cfyxi1is4m5i41m", "sha256": "sha256-h2trcyXJcdWQyonjdDLkJkcawE4AoFYnzLZtKPotMY0=",
"vendorSha256": "0qyzavig8wnnjzm63pny5azywqyrnjm978yg5y0sr6zw8wghjd15", "vendorSha256": "sha256-JTQJH0f8m6yBL8+jk6q02WPuvyre3mHql9Zy9OJW32M=",
"version": "0.4.1" "version": "0.4.2"
}, },
"openstack": { "openstack": {
"owner": "terraform-provider-openstack", "owner": "terraform-provider-openstack",
@ -829,10 +829,10 @@
"owner": "opentelekomcloud", "owner": "opentelekomcloud",
"provider-source-address": "registry.terraform.io/opentelekomcloud/opentelekomcloud", "provider-source-address": "registry.terraform.io/opentelekomcloud/opentelekomcloud",
"repo": "terraform-provider-opentelekomcloud", "repo": "terraform-provider-opentelekomcloud",
"rev": "v1.27.6", "rev": "v1.27.7",
"sha256": "1vq2h4ldvskw874fdnjqh1np5z09dh3q3lrqjmfand8ksrzacjjm", "sha256": "sha256-8y++zfxRam4sZvGWajyGiPv/5G8K7D4+ReNU7DBlqe8=",
"vendorSha256": "0bkya9ckh82bacaksqbb6010fwclz9wh1b5k1s9z9d0d6bgvf60m", "vendorSha256": "sha256-OqN+QGclKYo4jjQi0HJ/80zVTPkcOQyl4n6i2BpDZQE=",
"version": "1.27.6" "version": "1.27.7"
}, },
"opsgenie": { "opsgenie": {
"owner": "opsgenie", "owner": "opsgenie",
@ -991,10 +991,10 @@
"owner": "splunk-terraform", "owner": "splunk-terraform",
"provider-source-address": "registry.terraform.io/splunk-terraform/signalfx", "provider-source-address": "registry.terraform.io/splunk-terraform/signalfx",
"repo": "terraform-provider-signalfx", "repo": "terraform-provider-signalfx",
"rev": "v6.9.0", "rev": "v6.10.0",
"sha256": "08p33mjshi3m36yxhlvlsghnqmw2pnihglxm2p9iapi0zg3wxqbq", "sha256": "sha256-ZfNxab95ZDz68fEPfYd+w0E/fS/FPBVIs4kHTBhG858=",
"vendorSha256": "0hw7gz08k27kswbn42kab730f8gj2sjksmkc662hb9nbq8ykazbd", "vendorSha256": "sha256-bX01PcLLpgWFMWxWPaUW8iEHxllqCmIX1/OIicB/h0M=",
"version": "6.9.0" "version": "6.10.0"
}, },
"skytap": { "skytap": {
"owner": "skytap", "owner": "skytap",
@ -1027,10 +1027,10 @@
"owner": "spotinst", "owner": "spotinst",
"provider-source-address": "registry.terraform.io/spotinst/spotinst", "provider-source-address": "registry.terraform.io/spotinst/spotinst",
"repo": "terraform-provider-spotinst", "repo": "terraform-provider-spotinst",
"rev": "v1.68.0", "rev": "v1.69.0",
"sha256": "0llyy4rskspw4cy8jdbk175rli9s53mabj4b9yarm7apg17ai399", "sha256": "sha256-pTQvqjh52B9w383yLvhNjDujSgQI1k8WpA1vpcY7RKI=",
"vendorSha256": "0j0airkc1p0y9w1w40fbwxmymf8rbal2ycrkp31x1c06f8s4lhzm", "vendorSha256": "sha256-X7K0eHbmGBYnJ5ovnD/y6O9r7TTHgK7f7s9w4R5ThBU=",
"version": "1.68.0" "version": "1.69.0"
}, },
"stackpath": { "stackpath": {
"owner": "stackpath", "owner": "stackpath",
@ -1045,10 +1045,10 @@
"owner": "StatusCakeDev", "owner": "StatusCakeDev",
"provider-source-address": "registry.terraform.io/StatusCakeDev/statuscake", "provider-source-address": "registry.terraform.io/StatusCakeDev/statuscake",
"repo": "terraform-provider-statuscake", "repo": "terraform-provider-statuscake",
"rev": "v1.0.1", "rev": "v2.0.0-pre",
"sha256": "16pwsna1bkrdppxn2vjgbx552vsg4f2igykcb26mw3vp6n9piwfl", "sha256": "sha256-S9VJRGREoRJPIb9gv822Y/8ZRa0x7WoPjU7BxLlRpOM=",
"vendorSha256": null, "vendorSha256": "sha256-wKrbjxRCDk8GFAR0OFz4w9UnkIXH9EO/S+p2RKNLJaM=",
"version": "1.0.1" "version": "2.0.0-pre"
}, },
"sumologic": { "sumologic": {
"owner": "SumoLogic", "owner": "SumoLogic",
@ -1072,10 +1072,10 @@
"owner": "tencentcloudstack", "owner": "tencentcloudstack",
"provider-source-address": "registry.terraform.io/tencentcloudstack/tencentcloud", "provider-source-address": "registry.terraform.io/tencentcloudstack/tencentcloud",
"repo": "terraform-provider-tencentcloud", "repo": "terraform-provider-tencentcloud",
"rev": "v1.63.0", "rev": "v1.65.0",
"sha256": "1d5mzmr5r01gqf519r7f3mfcm1w7hryansymwazjbwy2rxpsn958", "sha256": "sha256-NpKZ4KbEDxCYmG2E4F/bHEUmK6invkcIaNkXDZjhmDI=",
"vendorSha256": null, "vendorSha256": null,
"version": "1.63.0" "version": "1.65.0"
}, },
"tfe": { "tfe": {
"owner": "hashicorp", "owner": "hashicorp",
@ -1200,10 +1200,10 @@
"owner": "hashicorp", "owner": "hashicorp",
"provider-source-address": "registry.terraform.io/hashicorp/vsphere", "provider-source-address": "registry.terraform.io/hashicorp/vsphere",
"repo": "terraform-provider-vsphere", "repo": "terraform-provider-vsphere",
"rev": "v2.1.0", "rev": "v2.1.1",
"sha256": "193qprm7psx0gshv5q7idm05k78rpi2vpdg5pgs7bq1wpzlaqrpa", "sha256": "sha256-Xu5BMmOHEX+ctPu8374BDGsRC5hnvzji5oI69ptIi3Y=",
"vendorSha256": null, "vendorSha256": null,
"version": "2.1.0" "version": "2.1.1"
}, },
"vultr": { "vultr": {
"owner": "vultr", "owner": "vultr",
@ -1218,10 +1218,10 @@
"owner": "vmware", "owner": "vmware",
"provider-source-address": "registry.terraform.io/vmware/wavefront", "provider-source-address": "registry.terraform.io/vmware/wavefront",
"repo": "terraform-provider-wavefront", "repo": "terraform-provider-wavefront",
"rev": "v3.0.0", "rev": "v3.0.1",
"sha256": "1awi74b7ny021krck0vp1gv6v93a4h0rgdl5xib82lf5pxnx4wgn", "sha256": "sha256-6SQjYaN0yhcHdmM+vGvIDPHKxN34ns3Yz+CMTEo13s0=",
"vendorSha256": "0gbwj4cqywip22irkx9hyghy6zx9dirm6gd3i70nclchvkg9dm1x", "vendorSha256": "sha256-PdSW3tyQUWbBiaM9U3NsqX/j4fMw9ZmjEDdyjxmRfD0=",
"version": "3.0.0" "version": "3.0.1"
}, },
"yandex": { "yandex": {
"owner": "yandex-cloud", "owner": "yandex-cloud",

View File

@ -65,6 +65,7 @@ mkDerivation rec {
setuptools setuptools
watchgod watchgod
dbus-python dbus-python
matrix-nio
]; ];
qmakeFlags = [ qmakeFlags = [

View File

@ -28,21 +28,21 @@ let
in in
assert lib.all (p: p.enabled -> ! (builtins.elem null p.buildInputs)) plugins; assert lib.all (p: p.enabled -> ! (builtins.elem null p.buildInputs)) plugins;
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
version = "3.3"; version = "3.4.1";
pname = "weechat"; pname = "weechat";
hardeningEnable = [ "pie" ]; hardeningEnable = [ "pie" ];
src = fetchurl { src = fetchurl {
url = "https://weechat.org/files/src/weechat-${version}.tar.bz2"; url = "https://weechat.org/files/src/weechat-${version}.tar.bz2";
sha256 = "sha256-GnSi7uMxiyWSQau75q07NlX1ikaBeWOdrzOf9f0jnBM="; sha256 = "sha256-TJ4JI97WiobkBxgnkUGh/XQAIlDV+PDgIxCzTqefiMw=";
}; };
outputs = [ "out" "man" ] ++ map (p: p.name) enabledPlugins; outputs = [ "out" "man" ] ++ map (p: p.name) enabledPlugins;
cmakeFlags = with lib; [ cmakeFlags = with lib; [
"-DENABLE_MAN=ON" "-DENABLE_MAN=ON"
"-DENABLE_DOC=ON" "-DENABLE_DOC=OFF" # TODO: Documentation fails to build, was deactivated to push through security update
"-DENABLE_JAVASCRIPT=OFF" # Requires v8 <= 3.24.3, https://github.com/weechat/weechat/issues/360 "-DENABLE_JAVASCRIPT=OFF" # Requires v8 <= 3.24.3, https://github.com/weechat/weechat/issues/360
"-DENABLE_PHP=OFF" "-DENABLE_PHP=OFF"
] ]

View File

@ -14,13 +14,13 @@
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
pname = "onedrive"; pname = "onedrive";
version = "2.4.15"; version = "2.4.16";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "abraunegg"; owner = "abraunegg";
repo = pname; repo = pname;
rev = "v${version}"; rev = "v${version}";
sha256 = "sha256-nYko7htg16Sp/Fs+KuPflrpHn8WShM0OKozhr9BFH5U="; sha256 = "sha256-GoufEcCu/Cg2Fu0RcjTi4te/7+gZfQRTj+AtK0YnF5I=";
}; };
nativeBuildInputs = [ autoreconfHook ldc installShellFiles pkg-config ]; nativeBuildInputs = [ autoreconfHook ldc installShellFiles pkg-config ];

View File

@ -8,22 +8,20 @@
python3.pkgs.buildPythonApplication rec { python3.pkgs.buildPythonApplication rec {
pname = "timeline"; pname = "timeline";
version = "2.4.0"; version = "2.6.0";
src = fetchurl { src = fetchurl {
url = "mirror://sourceforge/thetimelineproj/${pname}-${version}.zip"; url = "mirror://sourceforge/thetimelineproj/${pname}-${version}.zip";
sha256 = "1pa0whqci6c2p20xf7gbndrrpr1xg42ixhql595ibdd4p3l37v23"; sha256 = "sha256-qwH2mt3Va62QJKJGOpt5WV3QksqQaRGEif4CcPC5F2E=";
}; };
nativeBuildInputs = [ python3.pkgs.wrapPython copyDesktopItems ]; nativeBuildInputs = [ python3.pkgs.wrapPython copyDesktopItems ];
pythonPath = with python3.pkgs; [ pythonPath = with python3.pkgs; [
wxPython_4_1 wxPython_4_0
humblewx humblewx
icalendar icalendar
markdown markdown
pysvg-py3
pillow
]; ];
checkInputs = [ checkInputs = [

View File

@ -1,41 +1,39 @@
{ lib, stdenv, fetchFromGitHub, wxGTK, makeWrapper }: { lib
, stdenv
, fetchFromGitHub
, wxGTK
, cmake
, ninja
, wrapGAppsHook
, unstableGitUpdater
}:
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
pname = "treesheets"; pname = "treesheets";
version = "1.0.1"; version = "unstable-2022-03-12";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "aardappel"; owner = "aardappel";
repo = "treesheets"; repo = "treesheets";
rev = "v${version}"; rev = "120c10d4d9ea1ce76db5c1bbd6f5d705b397b57d";
sha256 = "0krsj7i5yr76imf83krz2lmlmpbsvpwqg2d4r0jwxiydjfyj4qr4"; sha256 = "oXgOvvRoZpueEeWnD3jsc6y5RIAzkXzLeEe7BSErBpw=";
}; };
nativeBuildInputs = [ makeWrapper ]; nativeBuildInputs = [
buildInputs = [ wxGTK ]; cmake
ninja
wrapGAppsHook
];
preConfigure = "cd src"; buildInputs = [
wxGTK
];
postInstall = '' NIX_CFLAGS_COMPILE = "-DPACKAGE_VERSION=\"${builtins.replaceStrings [ "unstable-" ] [ "" ] version}\"";
mkdir "$out/share" -p
cp -av ../TS "$out/share/libexec"
mkdir "$out/bin" -p passthru = {
makeWrapper "$out/share/libexec/treesheets" "$out/bin/treesheets" updateScript = unstableGitUpdater { };
};
mkdir "$out/share/doc" -p
for f in readme.html docs examples
do
mv -v "$out/share/libexec/$f" "$out/share/doc"
ln -sv "$out/share/doc/$f" "$out/share/libexec/$f"
done
mkdir "$out/share/applications" -p
mv -v "$out/share/libexec/treesheets.desktop" "$out/share/applications"
substituteInPlace "$out/share/applications/treesheets.desktop" \
--replace "Icon=images/treesheets.svg" "Icon=$out/share/libexec/images/treesheets.svg"
'';
meta = with lib; { meta = with lib; {
description = "Free Form Data Organizer"; description = "Free Form Data Organizer";
@ -49,9 +47,9 @@ stdenv.mkDerivation rec {
planning, requirements gathering, presentation of information, etc. planning, requirements gathering, presentation of information, etc.
''; '';
homepage = "https://strlen.com/treesheets/"; homepage = "https://strlen.com/treesheets/";
maintainers = with maintainers; [ obadz avery ]; maintainers = with maintainers; [ obadz avery ];
platforms = platforms.linux; platforms = platforms.linux;
license = licenses.zlib; license = licenses.zlib;
}; };
} }

View File

@ -0,0 +1,81 @@
diff --git a/src/sage/interfaces/tachyon.py b/src/sage/interfaces/tachyon.py
index 3f1dcdb538..b6fa8d1fbd 100644
--- a/src/sage/interfaces/tachyon.py
+++ b/src/sage/interfaces/tachyon.py
@@ -261,13 +261,13 @@ written in the sequence they are listed in the examples in this section.
The {\bf PROJECTION} keyword must be followed by one of the supported
camera projection mode identifiers {\bf PERSPECTIVE}, {\bf PERSPECTIVE_DOF},
{\bf ORTHOGRAPHIC}, or {\bf FISHEYE}. The {\bf FISHEYE} projection mode
-requires two extra parameters {\bf FOCALLENGTH} and {\bf APERTURE}
+requires two extra parameters {\bf FOCALDIST} and {\bf APERTURE}
which precede the regular camera options.
\begin{verbatim}
Camera
projection perspective_dof
- focallength 0.75
+ focaldist 0.75
aperture 0.02
Zoom 0.666667
Aspectratio 1.000000
diff --git a/src/sage/plot/plot3d/tachyon.py b/src/sage/plot/plot3d/tachyon.py
index 08caf38d67..3e827411ce 100644
--- a/src/sage/plot/plot3d/tachyon.py
+++ b/src/sage/plot/plot3d/tachyon.py
@@ -92,7 +92,7 @@ angle, right angle)::
Finally there is the ``projection='perspective_dof'`` option. ::
sage: T = Tachyon(xres=800, antialiasing=4, raydepth=10,
- ....: projection='perspective_dof', focallength='1.0', aperture='.0025')
+ ....: projection='perspective_dof', focaldist='1.0', aperture='.0025')
sage: T.light((0,5,7), 1.0, (1,1,1))
sage: T.texture('t1', opacity=1, specular=.3)
sage: T.texture('t2', opacity=1, specular=.3, color=(0,0,1))
@@ -186,7 +186,7 @@ class Tachyon(WithEqualityById, SageObject):
or ``'fisheye'``.
- ``frustum`` - (default ''), otherwise list of four numbers. Only
used with projection='fisheye'.
- - ``focallength`` - (default ''), otherwise a number. Only used
+ - ``focaldist`` - (default ''), otherwise a number. Only used
with projection='perspective_dof'.
- ``aperture`` - (default ''), otherwise a number. Only used
with projection='perspective_dof'.
@@ -331,7 +331,7 @@ class Tachyon(WithEqualityById, SageObject):
Use of the ``projection='perspective_dof'`` option. This may not be
implemented correctly. ::
- sage: T = Tachyon(xres=800,antialiasing=4, raydepth=10, projection='perspective_dof', focallength='1.0', aperture='.0025')
+ sage: T = Tachyon(xres=800,antialiasing=4, raydepth=10, projection='perspective_dof', focaldist='1.0', aperture='.0025')
sage: T.light((0,5,7), 1.0, (1,1,1))
sage: T.texture('t1', opacity=1, specular=.3)
sage: T.texture('t2', opacity=1, specular=.3, color=(0,0,1))
@@ -365,7 +365,7 @@ class Tachyon(WithEqualityById, SageObject):
look_at=[0, 0, 0],
viewdir=None,
projection='PERSPECTIVE',
- focallength='',
+ focaldist='',
aperture='',
frustum=''):
r"""
@@ -391,7 +391,7 @@ class Tachyon(WithEqualityById, SageObject):
self._camera_position = (-3, 0, 0) # default value
self._updir = updir
self._projection = projection
- self._focallength = focallength
+ self._focaldist = focaldist
self._aperture = aperture
self._frustum = frustum
self._objects = []
@@ -624,9 +624,9 @@ class Tachyon(WithEqualityById, SageObject):
camera_out = r"""
camera
projection %s""" % (tostr(self._projection))
- if self._focallength != '':
+ if self._focaldist != '':
camera_out = camera_out + r"""
- focallength %s""" % (float(self._focallength))
+ focaldist %s""" % (float(self._focaldist))
if self._aperture != '':
camera_out = camera_out + r"""
aperture %s""" % (float(self._aperture))

View File

@ -155,6 +155,9 @@ stdenv.mkDerivation rec {
rev = "97d7958bed441cf2ccc714d88f83d3a8426bc085"; rev = "97d7958bed441cf2ccc714d88f83d3a8426bc085";
sha256 = "sha256-y1STE0oxswnijGCsBw8eHWWqpmT1XMznIfA0vvX9pFA="; sha256 = "sha256-y1STE0oxswnijGCsBw8eHWWqpmT1XMznIfA0vvX9pFA=";
}) })
# adapted from https://trac.sagemath.org/ticket/23712#comment:22
./patches/tachyon-renamed-focallength.patch
]; ];
patches = nixPatches ++ bugfixPatches ++ packageUpgradePatches; patches = nixPatches ++ bugfixPatches ++ packageUpgradePatches;

View File

@ -2,18 +2,18 @@
buildGoModule rec { buildGoModule rec {
pname = "lab"; pname = "lab";
version = "0.23.0"; version = "0.24.0";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "zaquestion"; owner = "zaquestion";
repo = "lab"; repo = "lab";
rev = "v${version}"; rev = "v${version}";
sha256 = "0g8v3cli8rvr0zsxiv4w0afzqmh0d85a832c4hc75b3f9amkr0dl"; sha256 = "sha256-sw00D/PJaLAPHoPdJC2WYUNklIzMbc/bXt2jlQZ7E90=";
}; };
subPackages = [ "." ]; subPackages = [ "." ];
vendorSha256 = "09xn5vycb9shygs13pfwxlb89j6rhrbplm10mfgxi4kzlvm7agl6"; vendorSha256 = "sha256-FwnVMH//GwFbi+llFF6XNqrZX2hRB4r51p8TRz2vN+g=";
doCheck = false; doCheck = false;

View File

@ -0,0 +1,60 @@
{ lib
, rustPlatform
, fetchFromGitHub
, pkg-config
, openssl
, stdenv
, dbus
, sqlite
, Security
, SystemConfiguration
, libiconv
, testVersion
, jujutsu
}:
rustPlatform.buildRustPackage rec {
pname = "jujutsu";
version = "0.3.1";
src = fetchFromGitHub {
owner = "martinvonz";
repo = "jj";
rev = "v${version}";
sha256 = "sha256-BOT2pKcOSOha28fba62X+GgILcplhkMWhZo7Q0gGTQ8=";
};
cargoSha256 = "sha256-uvR+WXX2iIWFhcPYpOoOS1WBvOXuhTmgVVT2446c6XE=";
# Needed to get openssl-sys to use pkg-config.
OPENSSL_NO_VENDOR = 1;
nativeBuildInputs = [
pkg-config
];
buildInputs = [
openssl
dbus
sqlite
] ++ lib.optionals stdenv.isDarwin [
Security
SystemConfiguration
libiconv
];
passthru.tests = {
version = testVersion {
package = jujutsu;
command = "jj --version";
};
};
meta = with lib; {
description = "A Git-compatible DVCS that is both simple and powerful";
homepage = "https://github.com/martinvonz/jj";
changelog = "https://github.com/martinvonz/jj/blob/v${version}/CHANGELOG.md";
license = licenses.asl20;
maintainers = with maintainers; [ _0x4A6F ];
};
}

View File

@ -28,6 +28,11 @@ let
sha256 = "sha256-hvmGReRWWpJWmR3N4it3uOfSLKb7tgwfTNvYRpo4zB8="; sha256 = "sha256-hvmGReRWWpJWmR3N4it3uOfSLKb7tgwfTNvYRpo4zB8=";
}; };
patches = [
# Fix the type of libc buffer for aarch64-linux
./fix-rhg-type-aarch64.patch
];
format = "other"; format = "other";
passthru = { inherit python; }; # pass it so that the same version can be used in hg2git passthru = { inherit python; }; # pass it so that the same version can be used in hg2git

View File

@ -0,0 +1,12 @@
diff --git a/rust/hg-core/src/lock.rs b/rust/hg-core/src/lock.rs
--- a/rust/hg-core/src/lock.rs
+++ b/rust/hg-core/src/lock.rs
@@ -145,7 +145,7 @@ lazy_static::lazy_static! {
/// Same as https://github.com/python/cpython/blob/v3.10.0/Modules/socketmodule.c#L5414
const BUFFER_SIZE: usize = 1024;
- let mut buffer = [0_i8; BUFFER_SIZE];
+ let mut buffer = [0 as libc::c_char; BUFFER_SIZE];
let hostname_bytes = unsafe {
let result = libc::gethostname(buffer.as_mut_ptr(), BUFFER_SIZE);
if result != 0 {

View File

@ -1,18 +1,21 @@
{ lib, stdenv, fetchurl, tcl, tk }: { lib, stdenv, fetchurl, tcl, tk }:
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
pname = "tkcvs"; pname = "tkrev";
version = "8.2.1"; version = "9.4.1";
src = fetchurl { src = fetchurl {
url = "mirror://sourceforge/tkcvs/tkcvs_${lib.replaceStrings ["."] ["_"] version}.tar.gz"; url = "mirror://sourceforge/tkcvs/tkrev_${version}.tar.gz";
sha256 = "0kvj6rcx1153wq0n1lmd8imbrki6xy5wxghwzlb9i15l65sclg3i"; sha256 = "sha256-WHDZPShEB9Q+Bjbb37mogJLUZk2GuWoO8bz+Zydc7i4=";
}; };
buildInputs = [ tcl tk ]; buildInputs = [ tcl tk ];
patchPhase = '' patchPhase = ''
sed -e 's@exec wish@exec ${tk}/bin/wish@' -i tkcvs/tkcvs.tcl tkdiff/tkdiff for file in tkrev/tkrev.tcl tkdiff/tkdiff; do
substituteInPlace "$file" \
--replace "exec wish" "exec ${tk}/bin/wish"
done
''; '';
installPhase = '' installPhase = ''

View File

@ -14,21 +14,21 @@
}: }:
let let
version = "1.16.5"; version = "1.16.7";
# Using two URLs as the first one will break as soon as a new version is released # Using two URLs as the first one will break as soon as a new version is released
src_bin = fetchurl { src_bin = fetchurl {
urls = [ urls = [
"http://www.makemkv.com/download/makemkv-bin-${version}.tar.gz" "http://www.makemkv.com/download/makemkv-bin-${version}.tar.gz"
"http://www.makemkv.com/download/old/makemkv-bin-${version}.tar.gz" "http://www.makemkv.com/download/old/makemkv-bin-${version}.tar.gz"
]; ];
sha256 = "1y14yxhjj0sdq0s24qr58m0ddhna2rf0q0w3ny888as4wbqiwvm0"; sha256 = "sha256-YjsYW2MmzDZqOMdYlqE0dZ399Qq8hJRQ9BCViNexLHs=";
}; };
src_oss = fetchurl { src_oss = fetchurl {
urls = [ urls = [
"http://www.makemkv.com/download/makemkv-oss-${version}.tar.gz" "http://www.makemkv.com/download/makemkv-oss-${version}.tar.gz"
"http://www.makemkv.com/download/old/makemkv-oss-${version}.tar.gz" "http://www.makemkv.com/download/old/makemkv-oss-${version}.tar.gz"
]; ];
sha256 = "131vdi4gyc996z77rrcqb9nfbd62j8314ai4ib1jnilmrsrk93p5"; sha256 = "sha256-TL0PRP/pDg16qsbYi9RYyD0egNDaxuApmR86hiR/Rq8=";
}; };
in mkDerivation { in mkDerivation {
@ -55,15 +55,15 @@ in mkDerivation {
installPhase = '' installPhase = ''
runHook preInstall runHook preInstall
install -Dm555 -t $out/bin out/makemkv ../makemkv-bin-${version}/bin/amd64/makemkvcon install -Dm555 -t $out/bin out/makemkv ../makemkv-bin-${version}/bin/amd64/makemkvcon
install -D -t $out/lib out/lib{driveio,makemkv,mmbd}.so.* install -D -t $out/lib out/lib{driveio,makemkv,mmbd}.so.*
install -D -t $out/share/MakeMKV ../makemkv-bin-${version}/src/share/* install -D -t $out/share/MakeMKV ../makemkv-bin-${version}/src/share/*
install -Dm444 -t $out/share/applications ../makemkv-oss-${version}/makemkvgui/share/makemkv.desktop install -Dm444 -t $out/share/applications ../makemkv-oss-${version}/makemkvgui/share/makemkv.desktop
install -Dm444 -t $out/share/icons/hicolor/16x16 ../makemkv-oss-${version}/makemkvgui/share/icons/16x16/* install -Dm444 -t $out/share/icons/hicolor/16x16/apps ../makemkv-oss-${version}/makemkvgui/share/icons/16x16/*
install -Dm444 -t $out/share/icons/hicolor/32x32 ../makemkv-oss-${version}/makemkvgui/share/icons/32x32/* install -Dm444 -t $out/share/icons/hicolor/32x32/apps ../makemkv-oss-${version}/makemkvgui/share/icons/32x32/*
install -Dm444 -t $out/share/icons/hicolor/64x64 ../makemkv-oss-${version}/makemkvgui/share/icons/64x64/* install -Dm444 -t $out/share/icons/hicolor/64x64/apps ../makemkv-oss-${version}/makemkvgui/share/icons/64x64/*
install -Dm444 -t $out/share/icons/hicolor/128x128 ../makemkv-oss-${version}/makemkvgui/share/icons/128x128/* install -Dm444 -t $out/share/icons/hicolor/128x128/apps ../makemkv-oss-${version}/makemkvgui/share/icons/128x128/*
install -Dm444 -t $out/share/icons/hicolor/256x256 ../makemkv-oss-${version}/makemkvgui/share/icons/256x256/* install -Dm444 -t $out/share/icons/hicolor/256x256/apps ../makemkv-oss-${version}/makemkvgui/share/icons/256x256/*
runHook postInstall runHook postInstall
''; '';

View File

@ -15,7 +15,6 @@
, freetype , freetype
, libass , libass
, libpthreadstubs , libpthreadstubs
, mujs
, nv-codec-headers , nv-codec-headers
, lua , lua
, libuchardet , libuchardet
@ -56,6 +55,7 @@
, cmsSupport ? true, lcms2 , cmsSupport ? true, lcms2
, dvdnavSupport ? stdenv.isLinux, libdvdnav , dvdnavSupport ? stdenv.isLinux, libdvdnav
, jackaudioSupport ? false, libjack2 , jackaudioSupport ? false, libjack2
, javascriptSupport ? true, mujs
, libpngSupport ? true, libpng , libpngSupport ? true, libpng
, openalSupport ? true, openalSoft , openalSupport ? true, openalSoft
, pulseSupport ? config.pulseaudio or stdenv.isLinux, libpulseaudio , pulseSupport ? config.pulseaudio or stdenv.isLinux, libpulseaudio
@ -108,6 +108,7 @@ in stdenv.mkDerivation rec {
(lib.enableFeature archiveSupport "libarchive") (lib.enableFeature archiveSupport "libarchive")
(lib.enableFeature cddaSupport "cdda") (lib.enableFeature cddaSupport "cdda")
(lib.enableFeature dvdnavSupport "dvdnav") (lib.enableFeature dvdnavSupport "dvdnav")
(lib.enableFeature javascriptSupport "javascript")
(lib.enableFeature openalSupport "openal") (lib.enableFeature openalSupport "openal")
(lib.enableFeature sdl2Support "sdl2") (lib.enableFeature sdl2Support "sdl2")
(lib.enableFeature sixelSupport "sixel") (lib.enableFeature sixelSupport "sixel")
@ -134,7 +135,6 @@ in stdenv.mkDerivation rec {
libpthreadstubs libpthreadstubs
libuchardet libuchardet
luaEnv luaEnv
mujs
] ++ lib.optionals alsaSupport [ alsa-lib ] ] ++ lib.optionals alsaSupport [ alsa-lib ]
++ lib.optionals archiveSupport [ libarchive ] ++ lib.optionals archiveSupport [ libarchive ]
++ lib.optionals bluraySupport [ libbluray ] ++ lib.optionals bluraySupport [ libbluray ]
@ -145,6 +145,7 @@ in stdenv.mkDerivation rec {
++ lib.optionals drmSupport [ libdrm mesa ] ++ lib.optionals drmSupport [ libdrm mesa ]
++ lib.optionals dvdnavSupport [ libdvdnav libdvdnav.libdvdread ] ++ lib.optionals dvdnavSupport [ libdvdnav libdvdnav.libdvdread ]
++ lib.optionals jackaudioSupport [ libjack2 ] ++ lib.optionals jackaudioSupport [ libjack2 ]
++ lib.optionals javascriptSupport [ mujs ]
++ lib.optionals libpngSupport [ libpng ] ++ lib.optionals libpngSupport [ libpng ]
++ lib.optionals openalSupport [ openalSoft ] ++ lib.optionals openalSupport [ openalSoft ]
++ lib.optionals pulseSupport [ libpulseaudio ] ++ lib.optionals pulseSupport [ libpulseaudio ]

View File

@ -2,19 +2,19 @@
rustPlatform.buildRustPackage rec { rustPlatform.buildRustPackage rec {
pname = "cloud-hypervisor"; pname = "cloud-hypervisor";
version = "22.0"; version = "22.1";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "cloud-hypervisor"; owner = "cloud-hypervisor";
repo = pname; repo = pname;
rev = "v${version}"; rev = "v${version}";
sha256 = "1n4i7rgx8rkif2naw429fnkhv0888sfxmnky67fd42mlv1lhz9w8"; sha256 = "sha256-KWCGcGB4HCpV7uSM4otQhSGEzQ+1jQip2fiAysNN54k=";
}; };
nativeBuildInputs = [ pkg-config ]; nativeBuildInputs = [ pkg-config ];
buildInputs = [ openssl ] ++ lib.optional stdenv.isAarch64 dtc; buildInputs = [ openssl ] ++ lib.optional stdenv.isAarch64 dtc;
cargoSha256 = "0kc6lcwlqg9l19l4psakgkc5jf28nw1riz85adci897yha1dsnh0"; cargoSha256 = "sha256-R70H1R9jFnQyOLI4UNuRzpOAAnGSBGpiHFKbxP2472o=";
OPENSSL_NO_VENDOR = true; OPENSSL_NO_VENDOR = true;

View File

@ -2,16 +2,16 @@
buildGoModule rec { buildGoModule rec {
pname = "docker-compose"; pname = "docker-compose";
version = "2.3.0"; version = "2.3.3";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "docker"; owner = "docker";
repo = "compose"; repo = "compose";
rev = "v${version}"; rev = "v${version}";
sha256 = "sha256-DbZzVyTafBVsXvm1/aSdXJruKxBq5Ff8AIfDREFFVh0="; sha256 = "sha256-PFR7EcRkqn/d6gYlMNN36nRIslYEN0JFSbFU9niGc+Y=";
}; };
vendorSha256 = "sha256-ePL1L/A+48JEu6jpbzy8UBWrFY10iqITILSclfYs8Lw="; vendorSha256 = "sha256-L6PNKK1ID7ZVX/4sG72wn9ZjWlx0lsNuiBc/EtCN03E=";
ldflags = [ "-X github.com/docker/compose/v2/internal.Version=${version}" "-s" "-w" ]; ldflags = [ "-X github.com/docker/compose/v2/internal.Version=${version}" "-s" "-w" ];

View File

@ -1,49 +0,0 @@
From 9e4932ae99946b1a08ab5b5345fd2bc3486e54a5 Mon Sep 17 00:00:00 2001
From: aszlig <aszlig@nix.build>
Date: Mon, 18 Mar 2019 13:21:01 +0100
Subject: [PATCH] 9pfs: Ignore O_NOATIME open flag
Since Linux 4.19, overlayfs uses the O_NOATIME flag on its lowerdir,
which in turn causes errors when the Nix store is mounted in the guest
because the file owner of the store paths typically don't match the
owner of the QEMU process.
After submitting a patch to the overlayfs mailing list[1], it turns out
that my patch was incomplete[2] and needs a bit more rework.
So instead of using an incomplete kernel patch in nixpkgs, which affects
*all* users of overlayfs, not just NixOS VM tests, I decided that for
now it's better to patch QEMU instead.
The change here really only ignores the O_NOATIME flag so that the
behaviour is similar to what NFS does. From open(2):
This flag may not be effective on all filesystems. One example is NFS,
where the server maintains the access time.
This change is therefore only temporary until the final fix lands in the
stable kernel releases.
[1]: https://www.spinics.net/lists/linux-unionfs/msg06755.html
[2]: https://www.spinics.net/lists/linux-unionfs/msg06756.html
Signed-off-by: aszlig <aszlig@nix.build>
---
hw/9pfs/9p.c | 1 -
1 file changed, 1 deletion(-)
diff --git a/hw/9pfs/9p.c b/hw/9pfs/9p.c
index a6d6b3f835..4eb26e2294 100644
--- a/hw/9pfs/9p.c
+++ b/hw/9pfs/9p.c
@@ -139,7 +139,6 @@ static int dotl_to_open_flags(int flags)
{ P9_DOTL_DSYNC, O_DSYNC },
{ P9_DOTL_FASYNC, FASYNC },
#ifndef CONFIG_DARWIN
- { P9_DOTL_NOATIME, O_NOATIME },
/*
* On Darwin, we could map to F_NOCACHE, which is
* similar, but doesn't quite have the same
--
2.35.1

View File

@ -142,8 +142,6 @@ stdenv.mkDerivation rec {
# set was removed during the process of upstreaming this functionality, and # set was removed during the process of upstreaming this functionality, and
# will still be needed in nix until the macOS SDK reaches 10.13+. # will still be needed in nix until the macOS SDK reaches 10.13+.
./provide-fallback-for-utimensat.patch ./provide-fallback-for-utimensat.patch
# Still needed indefinitely
./9p-ignore-noatime.patch
] ]
++ lib.optional nixosTestRunner ./force-uid0-on-9p.patch; ++ lib.optional nixosTestRunner ./force-uid0-on-9p.patch;

View File

@ -1,7 +1,7 @@
{ lib, fetchFromGitHub, python3, intltool, file, wrapGAppsHook, gtk-vnc { lib, fetchFromGitHub, python3, intltool, file, wrapGAppsHook, gtk-vnc
, vte, avahi, dconf, gobject-introspection, libvirt-glib, system-libvirt , vte, avahi, dconf, gobject-introspection, libvirt-glib, system-libvirt
, gsettings-desktop-schemas, libosinfo, gnome, gtksourceview4, docutils, cpio , gsettings-desktop-schemas, libosinfo, gnome, gtksourceview4, docutils, cpio
, e2fsprogs, findutils, gzip, cdrtools , e2fsprogs, findutils, gzip, cdrtools, xorriso
, spiceSupport ? true, spice-gtk ? null , spiceSupport ? true, spice-gtk ? null
}: }:
@ -58,11 +58,16 @@ python3.pkgs.buildPythonApplication rec {
makeWrapperArgs+=("''${gappsWrapperArgs[@]}") makeWrapperArgs+=("''${gappsWrapperArgs[@]}")
''; '';
checkInputs = with python3.pkgs; [ cpio cdrtools pytestCheckHook ]; checkInputs = with python3.pkgs; [
pytestCheckHook
cpio
cdrtools
xorriso
];
disabledTestPaths = [ disabledTests = [
"tests/test_misc.py" "testAlterDisk"
"tests/test_xmlparse.py" "test_misc_nonpredicatble_generate"
]; ];
preCheck = '' preCheck = ''

View File

@ -68,6 +68,8 @@ rec {
xdg-utils xdg-utils
iana-etc iana-etc
krb5 krb5
gsettings-desktop-schemas
hicolor-icon-theme # dont show a gtk warning about hicolor not being installed
]; ];
# list of libraries expected in an appimage environment: # list of libraries expected in an appimage environment:

View File

@ -93,6 +93,32 @@ let
paths = [ etcPkg ldconfig ] ++ basePkgs ++ targetPaths; paths = [ etcPkg ldconfig ] ++ basePkgs ++ targetPaths;
extraOutputsToInstall = [ "out" "lib" "bin" ] ++ extraOutputsToInstall; extraOutputsToInstall = [ "out" "lib" "bin" ] ++ extraOutputsToInstall;
ignoreCollisions = true; ignoreCollisions = true;
postBuild = ''
if [[ -d $out/share/gsettings-schemas/ ]]; then
# Recreate the standard schemas directory if its a symlink to make it writable
if [[ -L $out/share/glib-2.0 ]]; then
ln -s $(readlink $out/share/glib-2.0) $out/share/glib-2.0.old
rm -rf $out/share/glib-2.0
fi
mkdir -p $out/share/glib-2.0/schemas
# symlink any schema files or overrides to the standard schema directory
if [[ -e $out/share/glib-2.0.old/schemas ]]; then
ln -fs $out/share/glib-2.0.old/schemas/*.xml $out/share/glib-2.0/schemas
ln -fs $out/share/glib-2.0.old/schemas/*.gsettings-schemas.override $out/share/glib-2.0/schemas
fi
for d in $out/share/gsettings-schemas/*; do
# Force symlink, in case there are duplicates
ln -fs $d/glib-2.0/schemas/*.xml $out/share/glib-2.0/schemas
ln -fs $d/glib-2.0/schemas/*.gschema.override $out/share/glib-2.0/schemas
done
# and compile them
${pkgs.glib.dev}/bin/glib-compile-schemas $out/share/glib-2.0/schemas
fi
'';
}; };
staticUsrProfileMulti = buildEnv { staticUsrProfileMulti = buildEnv {

View File

@ -134,6 +134,32 @@ let
paths = [ etcPkg ] ++ basePkgs ++ targetPaths; paths = [ etcPkg ] ++ basePkgs ++ targetPaths;
extraOutputsToInstall = [ "out" "lib" "bin" ] ++ extraOutputsToInstall; extraOutputsToInstall = [ "out" "lib" "bin" ] ++ extraOutputsToInstall;
ignoreCollisions = true; ignoreCollisions = true;
postBuild = ''
if [[ -d $out/share/gsettings-schemas/ ]]; then
# Recreate the standard schemas directory if its a symlink to make it writable
if [[ -L $out/share/glib-2.0 ]]; then
ln -s $(readlink $out/share/glib-2.0) $out/share/glib-2.0.old
rm -rf $out/share/glib-2.0
fi
mkdir -p $out/share/glib-2.0/schemas
# symlink any schema files or overrides to the standard schema directory
if [[ -e $out/share/glib-2.0.old/schemas ]]; then
ln -fs $out/share/glib-2.0.old/schemas/*.xml $out/share/glib-2.0/schemas
ln -fs $out/share/glib-2.0.old/schemas/*.gsettings-schemas.override $out/share/glib-2.0/schemas
fi
for d in $out/share/gsettings-schemas/*; do
# Force symlink, in case there are duplicates
ln -fs $d/glib-2.0/schemas/*.xml $out/share/glib-2.0/schemas
ln -fs $d/glib-2.0/schemas/*.gschema.override $out/share/glib-2.0/schemas
done
# and compile them
${pkgs.glib.dev}/bin/glib-compile-schemas $out/share/glib-2.0/schemas
fi
'';
}; };
staticUsrProfileMulti = buildEnv { staticUsrProfileMulti = buildEnv {

View File

@ -98,6 +98,16 @@
"http://www.ring.gr.jp/pub/net/" "http://www.ring.gr.jp/pub/net/"
]; ];
# IBiblio (former metalab/sunsite)
# Most of the time the expressions refer to the /pub/Linux/ subdirectory;
# however there are other useful files outside it
ibiblioPubLinux = [
"https://www.ibiblio.org/pub/Linux/"
"ftp://ftp.ibiblio.org/pub/linux/"
"ftp://ftp.gwdg.de/pub/linux/metalab/"
"ftp://ftp.metalab.unc.edu/pub/linux/"
];
# ImageMagick mirrors, see https://www.imagemagick.org/script/mirror.php # ImageMagick mirrors, see https://www.imagemagick.org/script/mirror.php
imagemagick = [ imagemagick = [
"https://www.imagemagick.org/download/" "https://www.imagemagick.org/download/"
@ -124,12 +134,6 @@
"ftp://ftp.funet.fi/pub/mirrors/ftp.kernel.org/pub/" "ftp://ftp.funet.fi/pub/mirrors/ftp.kernel.org/pub/"
]; ];
# Metalab, now IBiblio
metalab = [
"ftp://ftp.gwdg.de/pub/linux/metalab/"
"ftp://ftp.metalab.unc.edu/pub/linux/"
];
# MySQL # MySQL
mysql = [ mysql = [
"https://cdn.mysql.com/Downloads/" "https://cdn.mysql.com/Downloads/"

View File

@ -1,9 +1,9 @@
{ fetchzip }: { fetchzip }:
fetchzip { fetchzip {
name = "lmodern-2.004.5"; name = "lmodern-2.005";
url = "mirror://debian/pool/main/l/lmodern/lmodern_2.004.5.orig.tar.gz"; url = "mirror://debian/pool/main/l/lmodern/lmodern_2.005.orig.tar.gz";
postFetch = '' postFetch = ''
tar xzvf $downloadedFile tar xzvf $downloadedFile
@ -11,13 +11,13 @@ fetchzip {
mkdir -p $out/texmf-dist/ mkdir -p $out/texmf-dist/
mkdir -p $out/share/fonts/ mkdir -p $out/share/fonts/
cp -r lmodern-2.004.5/* $out/texmf-dist/ cp -r lmodern-2.005/* $out/texmf-dist/
cp -r lmodern-2.004.5/fonts/{opentype,type1} $out/share/fonts/ cp -r lmodern-2.005/fonts/{opentype,type1} $out/share/fonts/
ln -s -r $out/texmf* $out/share/ ln -s -r $out/texmf* $out/share/
''; '';
sha256 = "11f10qnp8a435lhh19zc2znlf9q4isynmvjmvr63g5n5fhvhc192"; sha256 = "sha256-ySdKUt8o5FqmpdnYSzbGJ1f9t8VmKYXqPt53e1/E/FA=";
meta = { meta = {
description = "Latin Modern font"; description = "Latin Modern font";

View File

@ -49,13 +49,13 @@
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
pname = "evince"; pname = "evince";
version = "41.3"; version = "41.4";
outputs = [ "out" "dev" "devdoc" ]; outputs = [ "out" "dev" "devdoc" ];
src = fetchurl { src = fetchurl {
url = "mirror://gnome/sources/evince/${lib.versions.major version}/${pname}-${version}.tar.xz"; url = "mirror://gnome/sources/evince/${lib.versions.major version}/${pname}-${version}.tar.xz";
sha256 = "M0awH5vcjy1f/qkvEQoJDGSjYklCtbVDqtRZKp3jO7A="; sha256 = "/yRSQPIwkivsMqTXsKHZGyR6g9E0hPmbdANdUesjITA=";
}; };
patches = lib.optionals withPantheon [ patches = lib.optionals withPantheon [
@ -130,6 +130,8 @@ stdenv.mkDerivation rec {
"-Dps=enabled" "-Dps=enabled"
] ++ lib.optionals (!withLibsecret) [ ] ++ lib.optionals (!withLibsecret) [
"-Dkeyring=disabled" "-Dkeyring=disabled"
] ++ lib.optionals (!supportMultimedia) [
"-Dmultimedia=disabled"
]; ];
NIX_CFLAGS_COMPILE = "-I${glib.dev}/include/gio-unix-2.0"; NIX_CFLAGS_COMPILE = "-I${glib.dev}/include/gio-unix-2.0";

View File

@ -1,6 +1,7 @@
{ lib { lib
, stdenv , stdenv
, fetchFromGitHub , fetchFromGitHub
, fetchpatch
, nix-update-script , nix-update-script
, pkg-config , pkg-config
, meson , meson
@ -34,6 +35,15 @@ stdenv.mkDerivation rec {
sha256 = "sha256-ooqVNMgeAqGlFcfachPPfhSiKTEEcNGv5oWdM7VLWOc="; sha256 = "sha256-ooqVNMgeAqGlFcfachPPfhSiKTEEcNGv5oWdM7VLWOc=";
}; };
patches = [
# Fix build with vala 0.56
# https://github.com/elementary/mail/pull/765
(fetchpatch {
url = "https://github.com/elementary/mail/commit/c3aa61d226f49147d7685cc00013469ff4df369a.patch";
sha256 = "sha256-OxNBGIC1hrEaFSufQ59Wb0AMfdzqPt6diL4g3hbL/Ig=";
})
];
nativeBuildInputs = [ nativeBuildInputs = [
appstream appstream
desktop-file-utils desktop-file-utils

View File

@ -1,6 +1,7 @@
{ lib { lib
, stdenv , stdenv
, fetchFromGitHub , fetchFromGitHub
, fetchpatch
, nix-update-script , nix-update-script
, meson , meson
, ninja , ninja
@ -41,6 +42,15 @@ stdenv.mkDerivation rec {
sha256 = "sha256-NhF/WgS6IOwgALSCNyFNxz8ROVTb+mUX+lBtnWEyhEI="; sha256 = "sha256-NhF/WgS6IOwgALSCNyFNxz8ROVTb+mUX+lBtnWEyhEI=";
}; };
patches = [
# Fix build with vala 0.56
# https://github.com/elementary/photos/pull/711
(fetchpatch {
url = "https://github.com/elementary/photos/commit/6594f1323726fb0d38519a7bdafe16f9170353cb.patch";
sha256 = "sha256-Ie9ULC8Xw4KLQJANPXh4LDywMjWfniPX/P76eHW8LHc=";
})
];
nativeBuildInputs = [ nativeBuildInputs = [
appstream appstream
desktop-file-utils desktop-file-utils

View File

@ -13,13 +13,13 @@ assert enableLTO -> stdenv.cc.isGNU;
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
pname = "dictu"; pname = "dictu";
version = "0.23.0"; version = "0.24.0";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "dictu-lang"; owner = "dictu-lang";
repo = pname; repo = pname;
rev = "v${version}"; rev = "v${version}";
sha256 = "sha256-K/RbkRK8nCkmaNwWplWe2nWtULhn/GCNPXYStfMeUPg="; sha256 = "sha256-EYoLEyK8jh4z3/9aMuUBt0pCwks7NIevsK2mOh8x6bQ=";
}; };
nativeBuildInputs = [ cmake ]; nativeBuildInputs = [ cmake ];

View File

@ -2,11 +2,11 @@
buildGraalvmNativeImage rec { buildGraalvmNativeImage rec {
pname = "babashka"; pname = "babashka";
version = "0.7.7"; version = "0.7.8";
src = fetchurl { src = fetchurl {
url = "https://github.com/babashka/${pname}/releases/download/v${version}/${pname}-${version}-standalone.jar"; url = "https://github.com/babashka/${pname}/releases/download/v${version}/${pname}-${version}-standalone.jar";
sha256 = "sha256-4aYYm2gCtfp+OiY6ouaTn4giHbX6JyULBHMpDnGMpbs="; sha256 = "sha256-VbDivl92YYWzIbkbOgDijzf9bZ5ZyodcapPPG4EiGXc=";
}; };
executable = "bb"; executable = "bb";

View File

@ -1,33 +0,0 @@
diff -u a/Makefile b/Makefile
--- a/Makefile 2020-12-27 18:48:53.934098765 +0100
+++ b/Makefile 2020-12-27 18:50:44.022674117 +0100
@@ -19,13 +19,13 @@
# http://www.gnu.org/prep/standards/html_node/Directory-Variables.html
PREFIX ?= /usr/local
EXEC_PREFIX = $(PREFIX)
-BINDIR = $(EXEC_PREFIX)/bin
+BINDIR ?= $(EXEC_PREFIX)/bin
DATAROOTDIR = $(PREFIX)/share
DOCDIR = $(DATAROOTDIR)/doc/$(CPROG)
SYSCONFDIR ?= $(PREFIX)/etc
HTMLDIR = $(DOCDIR)
-INCLUDEDIR = $(DESTDIR)$(PREFIX)/include
-LIBDIR = $(DESTDIR)$(EXEC_PREFIX)/lib
+INCLUDEDIR ?= $(DESTDIR)$(PREFIX)/include
+LIBDIR ?= $(DESTDIR)$(EXEC_PREFIX)/lib
PID_FILE ?= /var/run/$(CPROG).pid
# build tools
@@ -337,10 +337,10 @@
install -m 755 $(CPROG) "$(BINDIR)/"
install-headers:
- install -m 644 $(HEADERS) "$(INCLUDEDIR)"
+ install -m 644 $(HEADERS) "$(INCLUDEDIR)/"
install-lib: lib$(CPROG).a
- install -m 644 $< "$(LIBDIR)"
+ install -m 644 $< "$(LIBDIR)/"
install-slib: lib$(CPROG).so
$(eval version=$(shell grep -w "define CIVETWEB_VERSION" include/civetweb.h | sed 's|.*VERSION "\(.*\)"|\1|g'))

View File

@ -1,5 +1,7 @@
{ lib, stdenv { lib
, stdenv
, fetchFromGitHub , fetchFromGitHub
, cmake
}: }:
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
@ -13,33 +15,28 @@ stdenv.mkDerivation rec {
sha256 = "sha256-Qh6BGPk7a01YzCeX42+Og9M+fjXRs7kzNUCyT4mYab4="; sha256 = "sha256-Qh6BGPk7a01YzCeX42+Og9M+fjXRs7kzNUCyT4mYab4=";
}; };
makeFlags = [ outputs = [ "out" "dev" ];
"WITH_CPP=1"
"PREFIX=${placeholder "out"}"
"LIBDIR=${placeholder "out"}/lib"
"INCLUDEDIR=${placeholder "dev"}/include"
];
patches = [
./0001-allow-setting-paths-in-makefile.patch
];
strictDeps = true; strictDeps = true;
outputs = [ "out" "dev" ]; nativeBuildInputs = [
cmake
installTargets = [
"install-headers"
"install-lib"
"install-slib"
"install"
]; ];
preInstall = '' # The existence of the "build" script causes `mkdir -p build` to fail:
mkdir -p $dev/include # mkdir: cannot create directory 'build': File exists
mkdir -p $out/lib preConfigure = ''
rm build
''; '';
cmakeFlags = [
"-DCIVETWEB_ENABLE_CXX=ON"
"-DBUILD_SHARED_LIBS=ON"
# The civetweb unit tests rely on downloading their fork of libcheck.
"-DCIVETWEB_BUILD_TESTING=OFF"
];
meta = { meta = {
description = "Embedded C/C++ web server"; description = "Embedded C/C++ web server";
homepage = "https://github.com/civetweb/civetweb"; homepage = "https://github.com/civetweb/civetweb";

View File

@ -1,4 +1,4 @@
From a896b0be849455edb83a9305dfec9b41447ef3e4 Mon Sep 17 00:00:00 2001 From ad42041cfedcf25716429d2aad16641e0e2a012f Mon Sep 17 00:00:00 2001
From: Euan Kemp <euank@euank.com> From: Euan Kemp <euank@euank.com>
Date: Thu, 14 Jan 2021 00:32:00 -0800 Date: Thu, 14 Jan 2021 00:32:00 -0800
Subject: [PATCH] meson: patch in an install prefix for building on nix Subject: [PATCH] meson: patch in an install prefix for building on nix
@ -6,22 +6,28 @@ Subject: [PATCH] meson: patch in an install prefix for building on nix
Used in the nixpkgs version of libvirt so that we can install things in Used in the nixpkgs version of libvirt so that we can install things in
the nix store, but read them from the root filesystem. the nix store, but read them from the root filesystem.
--- ---
meson.build | 9 +++++++++ meson.build | 9 ++++++++
meson_options.txt | 2 ++ meson_options.txt | 2 ++
src/libxl/meson.build | 6 +++--- src/ch/meson.build | 6 ++---
src/locking/meson.build | 8 ++++---- src/interface/meson.build | 2 +-
src/lxc/meson.build | 6 +++--- src/libxl/meson.build | 18 +++++++--------
src/meson.build | 18 +++++++++--------- src/locking/meson.build | 8 +++----
src/network/meson.build | 12 ++++++------ src/lxc/meson.build | 10 ++++----
src/meson.build | 18 +++++++--------
src/network/meson.build | 14 ++++++------
src/node_device/meson.build | 2 +-
src/nwfilter/meson.build | 6 ++---
src/nwfilter/xml/meson.build | 2 +- src/nwfilter/xml/meson.build | 2 +-
src/qemu/meson.build | 14 +++++++------- src/qemu/meson.build | 38 +++++++++++++++----------------
src/remote/meson.build | 6 +++--- src/remote/meson.build | 10 ++++----
src/security/apparmor/meson.build | 8 ++++---- src/secret/meson.build | 4 ++--
tools/meson.build | 4 ++-- src/security/apparmor/meson.build | 8 +++----
12 files changed, 53 insertions(+), 42 deletions(-) src/storage/meson.build | 6 ++---
tools/meson.build | 2 +-
18 files changed, 88 insertions(+), 77 deletions(-)
diff --git a/meson.build b/meson.build diff --git a/meson.build b/meson.build
index b5164f6..33719f1 100644 index 9016c0458a..b26e690194 100644
--- a/meson.build --- a/meson.build
+++ b/meson.build +++ b/meson.build
@@ -39,6 +39,8 @@ if host_machine.system() == 'windows' @@ -39,6 +39,8 @@ if host_machine.system() == 'windows'
@ -48,7 +54,7 @@ index b5164f6..33719f1 100644
# sysconfdir as this makes a lot of things break in testing situations # sysconfdir as this makes a lot of things break in testing situations
if prefix == '/usr' if prefix == '/usr'
diff --git a/meson_options.txt b/meson_options.txt diff --git a/meson_options.txt b/meson_options.txt
index e5d79c2..081cd32 100644 index 5b43cdbd6b..e9dff18441 100644
--- a/meson_options.txt --- a/meson_options.txt
+++ b/meson_options.txt +++ b/meson_options.txt
@@ -1,3 +1,5 @@ @@ -1,3 +1,5 @@
@ -57,27 +63,67 @@ index e5d79c2..081cd32 100644
option('no_git', type: 'boolean', value: false, description: 'Disable git submodule update') option('no_git', type: 'boolean', value: false, description: 'Disable git submodule update')
option('packager', type: 'string', value: '', description: 'Extra packager name') option('packager', type: 'string', value: '', description: 'Extra packager name')
option('packager_version', type: 'string', value: '', description: 'Extra packager version') option('packager_version', type: 'string', value: '', description: 'Extra packager version')
diff --git a/src/libxl/meson.build b/src/libxl/meson.build diff --git a/src/ch/meson.build b/src/ch/meson.build
index 3bb6cc5..78d7be0 100644 index 66b77907b0..6aa9bbc548 100644
--- a/src/libxl/meson.build --- a/src/ch/meson.build
+++ b/src/libxl/meson.build +++ b/src/ch/meson.build
@@ -84,8 +84,8 @@ if conf.has('WITH_LIBXL') @@ -64,8 +64,8 @@ if conf.has('WITH_CH')
} }
virt_install_dirs += [ virt_install_dirs += [
- localstatedir / 'lib' / 'libvirt' / 'ch',
- localstatedir / 'log' / 'libvirt' / 'ch',
- runstatedir / 'libvirt' / 'ch',
+ install_prefix + localstatedir / 'lib' / 'libvirt' / 'ch',
+ install_prefix + localstatedir / 'log' / 'libvirt' / 'ch',
+ install_prefix + runstatedir / 'libvirt' / 'ch',
]
endif
diff --git a/src/interface/meson.build b/src/interface/meson.build
index 828f274422..2a6b1f8c5e 100644
--- a/src/interface/meson.build
+++ b/src/interface/meson.build
@@ -56,6 +56,6 @@ if conf.has('WITH_INTERFACE')
}
virt_install_dirs += [
- runstatedir / 'libvirt' / 'interface',
+ install_prefix + runstatedir / 'libvirt' / 'interface',
]
endif
diff --git a/src/libxl/meson.build b/src/libxl/meson.build
index 0cc277db82..48d8c5b962 100644
--- a/src/libxl/meson.build
+++ b/src/libxl/meson.build
@@ -79,14 +79,14 @@ if conf.has('WITH_LIBXL')
}
virt_install_dirs += [
- confdir / 'libxl',
- confdir / 'libxl' / 'autostart',
- localstatedir / 'lib' / 'libvirt' / 'libxl', - localstatedir / 'lib' / 'libvirt' / 'libxl',
- runstatedir / 'libvirt' / 'libxl', - localstatedir / 'lib' / 'libvirt' / 'libxl' / 'channel',
- localstatedir / 'lib' / 'libvirt' / 'libxl' / 'channel' / 'target',
- localstatedir / 'lib' / 'libvirt' / 'libxl' / 'dump',
- localstatedir / 'lib' / 'libvirt' / 'libxl' / 'save',
- localstatedir / 'log' / 'libvirt' / 'libxl', - localstatedir / 'log' / 'libvirt' / 'libxl',
- runstatedir / 'libvirt' / 'libxl',
+ install_prefix + confdir / 'libxl',
+ install_prefix + confdir / 'libxl' / 'autostart',
+ install_prefix + localstatedir / 'lib' / 'libvirt' / 'libxl', + install_prefix + localstatedir / 'lib' / 'libvirt' / 'libxl',
+ install_prefix + runstatedir / 'libvirt' / 'libxl', + install_prefix + localstatedir / 'lib' / 'libvirt' / 'libxl' / 'channel',
+ install_prefix + localstatedir / 'lib' / 'libvirt' / 'libxl' / 'channel' / 'target',
+ install_prefix + localstatedir / 'lib' / 'libvirt' / 'libxl' / 'dump',
+ install_prefix + localstatedir / 'lib' / 'libvirt' / 'libxl' / 'save',
+ install_prefix + localstatedir / 'log' / 'libvirt' / 'libxl', + install_prefix + localstatedir / 'log' / 'libvirt' / 'libxl',
+ install_prefix + runstatedir / 'libvirt' / 'libxl',
] ]
endif endif
diff --git a/src/locking/meson.build b/src/locking/meson.build diff --git a/src/locking/meson.build b/src/locking/meson.build
index 8a28310..9da81cc 100644 index 72f7780438..abe70d20d5 100644
--- a/src/locking/meson.build --- a/src/locking/meson.build
+++ b/src/locking/meson.build +++ b/src/locking/meson.build
@@ -243,14 +243,14 @@ if conf.has('WITH_LIBVIRTD') @@ -238,14 +238,14 @@ if conf.has('WITH_LIBVIRTD')
} }
virt_install_dirs += [ virt_install_dirs += [
@ -97,26 +143,39 @@ index 8a28310..9da81cc 100644
endif endif
endif endif
diff --git a/src/lxc/meson.build b/src/lxc/meson.build diff --git a/src/lxc/meson.build b/src/lxc/meson.build
index f8e2a88..96d6687 100644 index 99d4a34213..aae477c1ee 100644
--- a/src/lxc/meson.build --- a/src/lxc/meson.build
+++ b/src/lxc/meson.build +++ b/src/lxc/meson.build
@@ -182,8 +182,8 @@ if conf.has('WITH_LXC') @@ -176,10 +176,10 @@ if conf.has('WITH_LXC')
} }
virt_install_dirs += [ virt_install_dirs += [
- confdir / 'lxc',
- confdir / 'lxc' / 'autostart',
- localstatedir / 'lib' / 'libvirt' / 'lxc', - localstatedir / 'lib' / 'libvirt' / 'lxc',
- runstatedir / 'libvirt' / 'lxc',
- localstatedir / 'log' / 'libvirt' / 'lxc', - localstatedir / 'log' / 'libvirt' / 'lxc',
- runstatedir / 'libvirt' / 'lxc',
+ install_prefix + confdir / 'lxc',
+ install_prefix + confdir / 'lxc' / 'autostart',
+ install_prefix + localstatedir / 'lib' / 'libvirt' / 'lxc', + install_prefix + localstatedir / 'lib' / 'libvirt' / 'lxc',
+ install_prefix + runstatedir / 'libvirt' / 'lxc',
+ install_prefix + localstatedir / 'log' / 'libvirt' / 'lxc', + install_prefix + localstatedir / 'log' / 'libvirt' / 'lxc',
+ install_prefix + runstatedir / 'libvirt' / 'lxc',
] ]
endif endif
diff --git a/src/meson.build b/src/meson.build diff --git a/src/meson.build b/src/meson.build
index 7c47821..d33d16a 100644 index b2d951d36c..305716010f 100644
--- a/src/meson.build --- a/src/meson.build
+++ b/src/meson.build +++ b/src/meson.build
@@ -669,7 +669,7 @@ endforeach @@ -210,7 +210,7 @@ openrc_init_files = []
# virt_install_dirs:
# list of directories to create during installation
-virt_install_dirs = [ confdir ]
+virt_install_dirs = [ install_prefix + confdir ]
# driver_source_files:
# driver source files to check
@@ -663,7 +663,7 @@ endforeach
virt_conf_files += 'libvirt.conf' virt_conf_files += 'libvirt.conf'
@ -125,7 +184,7 @@ index 7c47821..d33d16a 100644
install_data(virt_aug_files, install_dir: virt_aug_dir) install_data(virt_aug_files, install_dir: virt_aug_dir)
# augeas_test_data: # augeas_test_data:
@@ -729,7 +729,7 @@ foreach data : virt_daemon_confs @@ -723,7 +723,7 @@ foreach data : virt_daemon_confs
output: '@0@.conf'.format(data['name']), output: '@0@.conf'.format(data['name']),
configuration: daemon_conf, configuration: daemon_conf,
install: true, install: true,
@ -134,15 +193,16 @@ index 7c47821..d33d16a 100644
) )
if data.get('with_ip', false) if data.get('with_ip', false)
@@ -853,14 +853,14 @@ if conf.has('WITH_LIBVIRTD') @@ -847,7 +847,7 @@ if conf.has('WITH_LIBVIRTD')
install_data( install_data(
init_file, init_file,
- install_dir: sysconfdir / 'init.d', - install_dir: sysconfdir / 'init.d',
+ install_dir: install_prefix + sysconfdir / 'init.d', + install_dir: install_prefix + sysconfdir / 'init.d',
install_mode: 'rwxr-xr-x',
rename: [ init['name'] ], rename: [ init['name'] ],
) )
@@ -855,7 +855,7 @@ if conf.has('WITH_LIBVIRTD')
if init.has_key('confd') if init.has_key('confd')
install_data( install_data(
init['confd'], init['confd'],
@ -151,16 +211,7 @@ index 7c47821..d33d16a 100644
rename: [ init['name'] ], rename: [ init['name'] ],
) )
endif endif
@@ -872,7 +872,7 @@ if init_script != 'none' @@ -882,10 +882,10 @@ endif
foreach sysconf : sysconf_files
install_data(
sysconf['file'],
- install_dir: sysconfdir / 'sysconfig',
+ install_dir: install_prefix + sysconfdir / 'sysconfig',
rename: [ sysconf['name'] ],
)
endforeach
@@ -897,10 +897,10 @@ endif
# Install empty directories # Install empty directories
virt_install_dirs += [ virt_install_dirs += [
@ -176,23 +227,27 @@ index 7c47821..d33d16a 100644
meson.add_install_script( meson.add_install_script(
diff --git a/src/network/meson.build b/src/network/meson.build diff --git a/src/network/meson.build b/src/network/meson.build
index 3ec598c..b02040b 100644 index b5eff0c3ab..a0f26d624e 100644
--- a/src/network/meson.build --- a/src/network/meson.build
+++ b/src/network/meson.build +++ b/src/network/meson.build
@@ -79,9 +79,9 @@ if conf.has('WITH_NETWORK') @@ -73,11 +73,11 @@ if conf.has('WITH_NETWORK')
} }
virt_install_dirs += [ virt_install_dirs += [
- confdir / 'qemu' / 'networks',
- confdir / 'qemu' / 'networks' / 'autostart',
- localstatedir / 'lib' / 'libvirt' / 'network', - localstatedir / 'lib' / 'libvirt' / 'network',
- localstatedir / 'lib' / 'libvirt' / 'dnsmasq', - localstatedir / 'lib' / 'libvirt' / 'dnsmasq',
- runstatedir / 'libvirt' / 'network', - runstatedir / 'libvirt' / 'network',
+ install_prefix + confdir / 'qemu' / 'networks',
+ install_prefix + confdir / 'qemu' / 'networks' / 'autostart',
+ install_prefix + localstatedir / 'lib' / 'libvirt' / 'network', + install_prefix + localstatedir / 'lib' / 'libvirt' / 'network',
+ install_prefix + localstatedir / 'lib' / 'libvirt' / 'dnsmasq', + install_prefix + localstatedir / 'lib' / 'libvirt' / 'dnsmasq',
+ install_prefix + runstatedir / 'libvirt' / 'network', + install_prefix + runstatedir / 'libvirt' / 'network',
] ]
configure_file( configure_file(
@@ -89,12 +89,12 @@ if conf.has('WITH_NETWORK') @@ -85,12 +85,12 @@ if conf.has('WITH_NETWORK')
output: '@BASENAME@', output: '@BASENAME@',
copy: true, copy: true,
install: true, install: true,
@ -207,8 +262,37 @@ index 3ec598c..b02040b 100644
'../default.xml', 'default.xml', '../default.xml', 'default.xml',
) )
diff --git a/src/node_device/meson.build b/src/node_device/meson.build
index 1c95975c37..a7831242db 100644
--- a/src/node_device/meson.build
+++ b/src/node_device/meson.build
@@ -64,6 +64,6 @@ if conf.has('WITH_NODE_DEVICES')
}
virt_install_dirs += [
- runstatedir / 'libvirt' / 'nodedev',
+ install_prefix + runstatedir / 'libvirt' / 'nodedev',
]
endif
diff --git a/src/nwfilter/meson.build b/src/nwfilter/meson.build
index 55cf8fcce4..d331086f2e 100644
--- a/src/nwfilter/meson.build
+++ b/src/nwfilter/meson.build
@@ -62,9 +62,9 @@ if conf.has('WITH_NWFILTER')
}
virt_install_dirs += [
- confdir / 'nwfilter',
- runstatedir / 'libvirt' / 'nwfilter-binding',
- runstatedir / 'libvirt' / 'nwfilter',
+ install_prefix + confdir / 'nwfilter',
+ install_prefix + runstatedir / 'libvirt' / 'nwfilter-binding',
+ install_prefix + runstatedir / 'libvirt' / 'nwfilter',
]
subdir('xml')
diff --git a/src/nwfilter/xml/meson.build b/src/nwfilter/xml/meson.build diff --git a/src/nwfilter/xml/meson.build b/src/nwfilter/xml/meson.build
index 0d96c54..66c92a1 100644 index 0d96c54ebe..66c92a1016 100644
--- a/src/nwfilter/xml/meson.build --- a/src/nwfilter/xml/meson.build
+++ b/src/nwfilter/xml/meson.build +++ b/src/nwfilter/xml/meson.build
@@ -25,4 +25,4 @@ nwfilter_xml_files = [ @@ -25,4 +25,4 @@ nwfilter_xml_files = [
@ -218,43 +302,71 @@ index 0d96c54..66c92a1 100644
-install_data(nwfilter_xml_files, install_dir: sysconfdir / 'libvirt' / 'nwfilter') -install_data(nwfilter_xml_files, install_dir: sysconfdir / 'libvirt' / 'nwfilter')
+install_data(nwfilter_xml_files, install_dir: install_prefix + sysconfdir / 'libvirt' / 'nwfilter') +install_data(nwfilter_xml_files, install_dir: install_prefix + sysconfdir / 'libvirt' / 'nwfilter')
diff --git a/src/qemu/meson.build b/src/qemu/meson.build diff --git a/src/qemu/meson.build b/src/qemu/meson.build
index 90640b0..8802cec 100644 index 39f0f615cc..5f6f30f82b 100644
--- a/src/qemu/meson.build --- a/src/qemu/meson.build
+++ b/src/qemu/meson.build +++ b/src/qemu/meson.build
@@ -171,12 +171,12 @@ if conf.has('WITH_QEMU') @@ -175,24 +175,24 @@ if conf.has('WITH_QEMU')
} endif
virt_install_dirs += [ virt_install_dirs += [
- localstatedir / 'lib' / 'libvirt' / 'qemu', - confdir / 'qemu',
- runstatedir / 'libvirt' / 'qemu', - confdir / 'qemu' / 'autostart',
- localstatedir / 'cache' / 'libvirt' / 'qemu', - localstatedir / 'cache' / 'libvirt' / 'qemu',
- localstatedir / 'log' / 'libvirt' / 'qemu', - localstatedir / 'lib' / 'libvirt' / 'qemu',
- localstatedir / 'lib' / 'libvirt' / 'qemu' / 'channel',
- localstatedir / 'lib' / 'libvirt' / 'qemu' / 'channel' / 'target',
- localstatedir / 'lib' / 'libvirt' / 'qemu' / 'checkpoint',
- localstatedir / 'lib' / 'libvirt' / 'qemu' / 'dump',
- localstatedir / 'lib' / 'libvirt' / 'qemu' / 'nvram',
- localstatedir / 'lib' / 'libvirt' / 'qemu' / 'ram',
- localstatedir / 'lib' / 'libvirt' / 'qemu' / 'save',
- localstatedir / 'lib' / 'libvirt' / 'qemu' / 'snapshot',
- localstatedir / 'lib' / 'libvirt' / 'swtpm', - localstatedir / 'lib' / 'libvirt' / 'swtpm',
- runstatedir / 'libvirt' / 'qemu' / 'swtpm', - localstatedir / 'log' / 'libvirt' / 'qemu',
- localstatedir / 'log' / 'swtpm' / 'libvirt' / 'qemu', - localstatedir / 'log' / 'swtpm' / 'libvirt' / 'qemu',
+ install_prefix + localstatedir / 'lib' / 'libvirt' / 'qemu', - runstatedir / 'libvirt' / 'qemu',
+ install_prefix + runstatedir / 'libvirt' / 'qemu', - runstatedir / 'libvirt' / 'qemu' / 'dbus',
- runstatedir / 'libvirt' / 'qemu' / 'slirp',
- runstatedir / 'libvirt' / 'qemu' / 'swtpm',
+ install_prefix + confdir / 'qemu',
+ install_prefix + confdir / 'qemu' / 'autostart',
+ install_prefix + localstatedir / 'cache' / 'libvirt' / 'qemu', + install_prefix + localstatedir / 'cache' / 'libvirt' / 'qemu',
+ install_prefix + localstatedir / 'log' / 'libvirt' / 'qemu', + install_prefix + localstatedir / 'lib' / 'libvirt' / 'qemu',
+ install_prefix + localstatedir / 'lib' / 'libvirt' / 'qemu' / 'channel',
+ install_prefix + localstatedir / 'lib' / 'libvirt' / 'qemu' / 'channel' / 'target',
+ install_prefix + localstatedir / 'lib' / 'libvirt' / 'qemu' / 'checkpoint',
+ install_prefix + localstatedir / 'lib' / 'libvirt' / 'qemu' / 'dump',
+ install_prefix + localstatedir / 'lib' / 'libvirt' / 'qemu' / 'nvram',
+ install_prefix + localstatedir / 'lib' / 'libvirt' / 'qemu' / 'ram',
+ install_prefix + localstatedir / 'lib' / 'libvirt' / 'qemu' / 'save',
+ install_prefix + localstatedir / 'lib' / 'libvirt' / 'qemu' / 'snapshot',
+ install_prefix + localstatedir / 'lib' / 'libvirt' / 'swtpm', + install_prefix + localstatedir / 'lib' / 'libvirt' / 'swtpm',
+ install_prefix + runstatedir / 'libvirt' / 'qemu' / 'swtpm', + install_prefix + localstatedir / 'log' / 'libvirt' / 'qemu',
+ install_prefix + localstatedir / 'log' / 'swtpm' / 'libvirt' / 'qemu', + install_prefix + localstatedir / 'log' / 'swtpm' / 'libvirt' / 'qemu',
+ install_prefix + runstatedir / 'libvirt' / 'qemu',
+ install_prefix + runstatedir / 'libvirt' / 'qemu' / 'dbus',
+ install_prefix + runstatedir / 'libvirt' / 'qemu' / 'slirp',
+ install_prefix + runstatedir / 'libvirt' / 'qemu' / 'swtpm',
] ]
endif endif
diff --git a/src/remote/meson.build b/src/remote/meson.build diff --git a/src/remote/meson.build b/src/remote/meson.build
index 9ad2f6a..429a15b 100644 index b2aafe6320..6972d254ca 100644
--- a/src/remote/meson.build --- a/src/remote/meson.build
+++ b/src/remote/meson.build +++ b/src/remote/meson.build
@@ -245,7 +245,7 @@ if conf.has('WITH_REMOTE') @@ -235,9 +235,9 @@ if conf.has('WITH_REMOTE')
} }
virt_install_dirs += [ virt_install_dirs += [
- localstatedir / 'log' / 'libvirt', - localstatedir / 'log' / 'libvirt',
- runstatedir / 'libvirt',
- runstatedir / 'libvirt' / 'common',
+ install_prefix + localstatedir / 'log' / 'libvirt', + install_prefix + localstatedir / 'log' / 'libvirt',
+ install_prefix + runstatedir / 'libvirt',
+ install_prefix + runstatedir / 'libvirt' / 'common',
] ]
logrotate_conf = configuration_data() logrotate_conf = configuration_data()
@@ -259,7 +259,7 @@ if conf.has('WITH_REMOTE') @@ -251,7 +251,7 @@ if conf.has('WITH_REMOTE')
) )
install_data( install_data(
log_file, log_file,
@ -263,7 +375,7 @@ index 9ad2f6a..429a15b 100644
rename: [ name ], rename: [ name ],
) )
endforeach endforeach
@@ -309,7 +309,7 @@ endif @@ -301,7 +301,7 @@ endif
if conf.has('WITH_SASL') if conf.has('WITH_SASL')
install_data( install_data(
'libvirtd.sasl', 'libvirtd.sasl',
@ -272,11 +384,25 @@ index 9ad2f6a..429a15b 100644
rename: [ 'libvirt.conf' ], rename: [ 'libvirt.conf' ],
) )
endif endif
diff --git a/src/secret/meson.build b/src/secret/meson.build
index 1bda59849b..392bc2cb2e 100644
--- a/src/secret/meson.build
+++ b/src/secret/meson.build
@@ -45,7 +45,7 @@ if conf.has('WITH_SECRETS')
}
virt_install_dirs += [
- confdir / 'secrets',
- runstatedir / 'libvirt' / 'secrets',
+ install_prefix + confdir / 'secrets',
+ install_prefix + runstatedir / 'libvirt' / 'secrets',
]
endif
diff --git a/src/security/apparmor/meson.build b/src/security/apparmor/meson.build diff --git a/src/security/apparmor/meson.build b/src/security/apparmor/meson.build
index af43780..e2d6c81 100644 index 990f00b4f3..e5a7a14e1d 100644
--- a/src/security/apparmor/meson.build --- a/src/security/apparmor/meson.build
+++ b/src/security/apparmor/meson.build +++ b/src/security/apparmor/meson.build
@@ -17,22 +17,22 @@ foreach name : apparmor_gen_profiles @@ -19,22 +19,22 @@ foreach name : apparmor_gen_profiles
output: name, output: name,
configuration: apparmor_gen_profiles_conf, configuration: apparmor_gen_profiles_conf,
install: true, install: true,
@ -303,11 +429,28 @@ index af43780..e2d6c81 100644
+ install_dir: install_prefix + apparmor_dir / 'local', + install_dir: install_prefix + apparmor_dir / 'local',
rename: 'usr.lib.libvirt.virt-aa-helper', rename: 'usr.lib.libvirt.virt-aa-helper',
) )
diff --git a/src/storage/meson.build b/src/storage/meson.build
index 26e7ff1a1a..ad5c6eddc3 100644
--- a/src/storage/meson.build
+++ b/src/storage/meson.build
@@ -127,9 +127,9 @@ if conf.has('WITH_STORAGE')
}
virt_install_dirs += [
- confdir / 'storage',
- confdir / 'storage' / 'autostart',
- runstatedir / 'libvirt' / 'storage',
+ install_prefix + confdir / 'storage',
+ install_prefix + confdir / 'storage' / 'autostart',
+ install_prefix + runstatedir / 'libvirt' / 'storage',
]
endif
diff --git a/tools/meson.build b/tools/meson.build diff --git a/tools/meson.build b/tools/meson.build
index b8c6802..dacd0ff 100644 index f4b4a16c29..059c73a955 100644
--- a/tools/meson.build --- a/tools/meson.build
+++ b/tools/meson.build +++ b/tools/meson.build
@@ -115,7 +115,7 @@ if conf.has('WITH_LOGIN_SHELL') @@ -120,7 +120,7 @@ if conf.has('WITH_LOGIN_SHELL')
install_rpath: libvirt_rpath, install_rpath: libvirt_rpath,
) )
@ -316,11 +459,6 @@ index b8c6802..dacd0ff 100644
endif endif
if host_machine.system() == 'windows' if host_machine.system() == 'windows'
@@ -274,7 +274,7 @@ configure_file( --
if init_script == 'systemd' 2.35.1
install_data(
'libvirt-guests.sysconf',
- install_dir: sysconfdir / 'sysconfig',
+ install_dir: install_prefix + sysconfdir / 'sysconfig',
rename: 'libvirt-guests',
)

View File

@ -1,14 +0,0 @@
diff --git a/src/ch/meson.build b/src/ch/meson.build
index e34974d56c..4767763c2c 100644
--- a/src/ch/meson.build
+++ b/src/ch/meson.build
@@ -68,7 +68,7 @@ if conf.has('WITH_CH')
}
virt_install_dirs += [
- localstatedir / 'lib' / 'libvirt' / 'ch',
- runstatedir / 'libvirt' / 'ch',
+ install_prefix + localstatedir / 'lib' / 'libvirt' / 'ch',
+ install_prefix + runstatedir / 'libvirt' / 'ch',
]
endif

View File

@ -1,85 +1,122 @@
{ lib { lib
, stdenv
, fetchurl
, fetchFromGitLab
, makeWrapper
, autoreconfHook , autoreconfHook
, fetchpatch , bash-completion
, bridge-utils
, cmake
, coreutils , coreutils
, libxml2 , curl
, gnutls , darwin
, perl , dbus
, python3 , dnsmasq
, attr
, glib
, docutils , docutils
, iproute2 , fetchFromGitLab
, readline , fetchurl
, lvm2
, util-linux
, systemd
, libpciaccess
, gettext , gettext
, libtasn1 , glib
, gnutls
, iproute2
, iptables , iptables
, libgcrypt , libgcrypt
, yajl
, pmutils
, libcap_ng
, libapparmor
, dnsmasq
, libnl
, libpcap , libpcap
, libtasn1
, libxml2
, libxslt , libxslt
, xhtml1 , makeWrapper
, numad
, numactl
, perlPackages
, curl
, libiconv
, gmp
, zfs
, parted
, bridge-utils
, dmidecode
, dbus
, libtirpc
, rpcsvc-proto
, darwin
, meson , meson
, ninja , ninja
, audit , perl
, cmake , perlPackages
, bash-completion
, pkg-config , pkg-config
, pmutils
, python3
, readline
, rpcsvc-proto
, stdenv
, xhtml1
, yajl
# Linux
, acl ? null
, attr ? null
, audit ? null
, dmidecode ? null
, fuse ? null
, kmod ? null
, libapparmor ? null
, libcap_ng ? null
, libnl ? null
, libpciaccess ? null
, libtirpc ? null
, lvm2 ? null
, numactl ? null
, numad ? null
, parted ? null
, systemd ? null
, util-linux ? null
# Darwin
, gmp ? null
, libiconv ? null
, Carbon ? null
, AppKit ? null
# Options
, enableCeph ? false
, ceph ? null
, enableGlusterfs ? false
, glusterfs ? null
, enableIscsi ? false
, openiscsi ? null
, libiscsi ? null
, enableXen ? false , enableXen ? false
, xen ? null , xen ? null
, enableIscsi ? false , enableZfs ? stdenv.isLinux
, openiscsi , zfs ? null
, enableCeph ? false
, ceph
, enableGlusterfs ? false
, glusterfs
, Carbon
, AppKit
}: }:
with lib; with lib;
# if you update, also bump <nixpkgs/pkgs/development/python-modules/libvirt/default.nix> and SysVirt in <nixpkgs/pkgs/top-level/perl-packages.nix>
let let
buildFromTarball = stdenv.isDarwin; inherit (stdenv) isDarwin isLinux isx86_64;
binPath = makeBinPath ([
dnsmasq
] ++ optionals isLinux [
bridge-utils
dmidecode
dnsmasq
iproute2
iptables
kmod
lvm2
numactl
numad
pmutils
systemd
] ++ optionals enableIscsi [
libiscsi
openiscsi
]);
in in
assert enableXen -> isLinux && isx86_64;
assert enableCeph -> isLinux;
assert enableGlusterfs -> isLinux;
assert enableZfs -> isLinux;
# if you update, also bump <nixpkgs/pkgs/development/python-modules/libvirt/default.nix> and SysVirt in <nixpkgs/pkgs/top-level/perl-packages.nix>
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
pname = "libvirt"; pname = "libvirt";
version = "7.10.0"; # NOTE: You must also bump:
# <nixpkgs/pkgs/development/python-modules/libvirt/default.nix>
# SysVirt in <nixpkgs/pkgs/top-level/perl-packages.nix>
version = "8.1.0";
src = src =
if buildFromTarball then if isDarwin then
fetchurl fetchurl
{ {
url = "https://libvirt.org/sources/${pname}-${version}.tar.xz"; url = "https://libvirt.org/sources/${pname}-${version}.tar.xz";
sha256 = "sha256-yzGAFK8JcyeSjG49cpIuO+AqPmQBJHsqpS2auOC0gPk="; sha256 = "sha256-PGxDvs/+s0o/OXxhYgaqaaiT/4v16CCDk8hOjnU1KTQ=";
} }
else else
fetchFromGitLab fetchFromGitLab
@ -87,76 +124,84 @@ stdenv.mkDerivation rec {
owner = pname; owner = pname;
repo = pname; repo = pname;
rev = "v${version}"; rev = "v${version}";
sha256 = "sha256-bB8LsjZFeJbMmmC0YRPyMag2MBhwagUFC7aB1KhZEkA="; sha256 = "sha256-nk8pBlss+g4EMy+RnAOyz6YlGGvlBvl5aBpcytsK1wY=";
fetchSubmodules = true; fetchSubmodules = true;
}; };
patches = [ patches = [
./0001-meson-patch-in-an-install-prefix-for-building-on-nix.patch ./0001-meson-patch-in-an-install-prefix-for-building-on-nix.patch
./0002-meson-patch-ch-install-prefix.patch
]; ];
# remove some broken tests
postPatch = ''
sed -i '/commandtest/d' tests/meson.build
sed -i '/virnetsockettest/d' tests/meson.build
# delete only the first occurrence of this
sed -i '0,/qemuxml2argvtest/{/qemuxml2argvtest/d;}' tests/meson.build
'' + optionalString isDarwin ''
sed -i '/qemucapabilitiestest/d' tests/meson.build
'';
nativeBuildInputs = [ nativeBuildInputs = [
ninja
meson meson
cmake cmake
makeWrapper
pkg-config
docutils docutils
] ++ optional (!stdenv.isDarwin) [ makeWrapper
rpcsvc-proto ninja
] ++ optionals stdenv.isDarwin [ pkg-config
darwin.developer_cmds # needed for rpcgen ]
]; ++ optional (!isDarwin) rpcsvc-proto
# NOTE: needed for rpcgen
++ optional isDarwin darwin.developer_cmds;
buildInputs = [ buildInputs = [
bash-completion bash-completion
pkg-config curl
libxml2 dbus
gettext
glib
gnutls gnutls
libgcrypt
libpcap
libtasn1
libxml2
libxslt
perl perl
perlPackages.XMLXPath
pkg-config
python3 python3
readline readline
gettext
libtasn1
libgcrypt
yajl
libxslt
xhtml1 xhtml1
perlPackages.XMLXPath yajl
curl ] ++ optionals isLinux [
libpcap acl
glib attr
dbus
] ++ optionals stdenv.isLinux [
audit audit
libpciaccess fuse
lvm2
util-linux
systemd
libnl
numad
zfs
libapparmor libapparmor
libcap_ng libcap_ng
numactl libnl
attr libpciaccess
parted
libtirpc libtirpc
] ++ optionals (enableXen && stdenv.isLinux && stdenv.isx86_64) [ lvm2
xen numactl
] ++ optionals enableIscsi [ numad
openiscsi parted
] ++ optionals enableCeph [ systemd
ceph util-linux
] ++ optionals enableGlusterfs [ ] ++ optionals isDarwin [
glusterfs
] ++ optionals stdenv.isDarwin [
libiconv
gmp
Carbon
AppKit AppKit
]; Carbon
gmp
libiconv
]
++ optionals enableCeph [ ceph ]
++ optionals enableGlusterfs [ glusterfs ]
++ optionals enableIscsi [ libiscsi openiscsi ]
++ optionals enableXen [ xen ]
++ optionals enableZfs [ zfs ];
preConfigure = preConfigure =
let let
@ -164,80 +209,124 @@ stdenv.mkDerivation rec {
QEMU_BRIDGE_HELPER = "/run/wrappers/bin/qemu-bridge-helper"; QEMU_BRIDGE_HELPER = "/run/wrappers/bin/qemu-bridge-helper";
QEMU_PR_HELPER = "/run/libvirt/nix-helpers/qemu-pr-helper"; QEMU_PR_HELPER = "/run/libvirt/nix-helpers/qemu-pr-helper";
}; };
patchBuilder = var: value: '' patchBuilder = var: value: ''
sed -i meson.build -e "s|conf.set_quoted('${var}',.*|conf.set_quoted('${var}','${value}')|" sed -i meson.build -e "s|conf.set_quoted('${var}',.*|conf.set_quoted('${var}','${value}')|"
''; '';
in in
'' ''
PATH=${lib.makeBinPath ([ dnsmasq ] ++ optionals stdenv.isLinux [ iproute2 iptables lvm2 systemd numad ] ++ optionals enableIscsi [ openiscsi ])}:$PATH PATH="${binPath}:$PATH"
# the path to qemu-kvm will be stored in VM's .xml and .save files # the path to qemu-kvm will be stored in VM's .xml and .save files
# do not use "''${qemu_kvm}/bin/qemu-kvm" to avoid bound VMs to particular qemu derivations # do not use "''${qemu_kvm}/bin/qemu-kvm" to avoid bound VMs to particular qemu derivations
substituteInPlace src/lxc/lxc_conf.c \ substituteInPlace src/lxc/lxc_conf.c \
--replace 'lxc_path,' '"/run/libvirt/nix-emulators/libvirt_lxc",' --replace 'lxc_path,' '"/run/libvirt/nix-emulators/libvirt_lxc",'
substituteInPlace build-aux/meson.build \ substituteInPlace build-aux/meson.build \
--replace "gsed" "sed" \ --replace "gsed" "sed" \
--replace "gmake" "make" \ --replace "gmake" "make" \
--replace "ggrep" "grep" --replace "ggrep" "grep"
patchShebangs . patchShebangs .
'' ''
+ (lib.concatStringsSep "\n" (lib.mapAttrsToList patchBuilder overrides)); + (lib.concatStringsSep "\n" (lib.mapAttrsToList patchBuilder overrides));
mesonAutoFeatures = "auto"; mesonAutoFeatures = "disabled";
mesonFlags = mesonFlags =
let let
opt = option: enable: "-D${option}=${if enable then "enabled" else "disabled"}"; cfg = option: val: "-D${option}=${val}";
feat = option: enable: cfg option (if enable then "enabled" else "disabled");
driver = name: feat "driver_${name}";
storage = name: feat "storage_${name}";
in in
[ [
"--sysconfdir=/var/lib" "--sysconfdir=/var/lib"
"-Dinstall_prefix=${placeholder "out"}" (cfg "install_prefix" (placeholder "out"))
"-Dlocalstatedir=/var" (cfg "localstatedir" "/var")
"-Drunstatedir=/run" (cfg "runstatedir" "/run")
"-Dlibpcap=enabled"
"-Ddriver_qemu=enabled" (cfg "init_script" (if isDarwin then "none" else "systemd"))
"-Ddriver_vmware=enabled"
"-Ddriver_vbox=enabled" (feat "apparmor" isLinux)
"-Ddriver_test=enabled" (feat "attr" isLinux)
"-Ddriver_esx=enabled" (feat "audit" isLinux)
"-Ddriver_remote=enabled" (feat "bash_completion" true)
"-Dpolkit=enabled" (feat "blkid" isLinux)
(opt "storage_iscsi" enableIscsi) (feat "capng" isLinux)
] ++ optionals stdenv.isLinux [ (feat "curl" true)
(opt "storage_zfs" (zfs != null)) (feat "docs" true)
"-Dattr=enabled" (feat "expensive_tests" true)
"-Dapparmor=enabled" (feat "firewalld" isLinux)
"-Dsecdriver_apparmor=enabled" (feat "firewalld_zone" isLinux)
"-Dnumad=enabled" (feat "fuse" isLinux)
"-Dstorage_disk=enabled" (feat "glusterfs" enableGlusterfs)
(opt "glusterfs" enableGlusterfs) (feat "host_validate" true)
(opt "storage_rbd" enableCeph) (feat "libiscsi" enableIscsi)
] ++ optionals stdenv.isDarwin [ (feat "libnl" isLinux)
"-Dinit_script=none" (feat "libpcap" true)
(feat "libssh2" true)
(feat "login_shell" isLinux)
(feat "nss" isLinux)
(feat "numactl" isLinux)
(feat "numad" isLinux)
(feat "pciaccess" isLinux)
(feat "polkit" true)
(feat "readline" true)
(feat "secdriver_apparmor" isLinux)
(feat "tests" true)
(feat "udev" isLinux)
(feat "yajl" true)
(driver "ch" isLinux)
(driver "esx" true)
(driver "interface" isLinux)
(driver "libvirtd" true)
(driver "libxl" enableXen)
(driver "lxc" isLinux)
(driver "network" true)
(driver "openvz" isLinux)
(driver "qemu" true)
(driver "remote" true)
(driver "secrets" true)
(driver "test" true)
(driver "vbox" true)
(driver "vmware" true)
(storage "dir" true)
(storage "disk" isLinux)
(storage "fs" isLinux)
(storage "gluster" enableGlusterfs)
(storage "iscsi" enableIscsi)
(storage "iscsi_direct" enableIscsi)
(storage "lvm" isLinux)
(storage "mpath" isLinux)
(storage "rbd" enableCeph)
(storage "scsi" true)
(storage "vstorage" isLinux)
(storage "zfs" enableZfs)
]; ];
postInstall = doCheck = true;
let
binPath = [ iptables iproute2 pmutils numad numactl bridge-utils dmidecode dnsmasq ] ++ optionals enableIscsi [ openiscsi ];
in
''
substituteInPlace $out/bin/virt-xml-validate \
--replace xmllint ${libxml2}/bin/xmllint
substituteInPlace $out/libexec/libvirt-guests.sh \ postInstall = ''
--replace 'ON_BOOT="start"' 'ON_BOOT=''${ON_BOOT:-start}' \ substituteInPlace $out/bin/virt-xml-validate \
--replace 'ON_SHUTDOWN="suspend"' 'ON_SHUTDOWN=''${ON_SHUTDOWN:-suspend}' \ --replace xmllint ${libxml2}/bin/xmllint
--replace "$out/bin" '${gettext}/bin' \
--replace 'lock/subsys' 'lock' \ substituteInPlace $out/libexec/libvirt-guests.sh \
--replace 'gettext.sh' 'gettext.sh --replace 'ON_BOOT="start"' 'ON_BOOT=''${ON_BOOT:-start}' \
# Added in nixpkgs: --replace 'ON_SHUTDOWN="suspend"' 'ON_SHUTDOWN=''${ON_SHUTDOWN:-suspend}' \
gettext() { "${gettext}/bin/gettext" "$@"; } --replace "$out/bin" '${gettext}/bin' \
' --replace 'lock/subsys' 'lock' \
'' + optionalString stdenv.isLinux '' --replace 'gettext.sh' 'gettext.sh
substituteInPlace $out/lib/systemd/system/libvirtd.service --replace /bin/kill ${coreutils}/bin/kill # Added in nixpkgs:
rm $out/lib/systemd/system/{virtlockd,virtlogd}.* gettext() { "${gettext}/bin/gettext" "$@"; }
wrapProgram $out/sbin/libvirtd \ '
--prefix PATH : /run/libvirt/nix-emulators:${makeBinPath binPath} '' + optionalString isLinux ''
''; substituteInPlace $out/lib/systemd/system/libvirtd.service --replace /bin/kill ${coreutils}/bin/kill
rm $out/lib/systemd/system/{virtlockd,virtlogd}.*
wrapProgram $out/sbin/libvirtd \
--prefix PATH : /run/libvirt/nix-emulators:${binPath}
'';
meta = { meta = {
homepage = "https://libvirt.org/"; homepage = "https://libvirt.org/";
@ -248,6 +337,6 @@ stdenv.mkDerivation rec {
''; '';
license = licenses.lgpl2Plus; license = licenses.lgpl2Plus;
platforms = platforms.unix; platforms = platforms.unix;
maintainers = with maintainers; [ fpletz globin ]; maintainers = with maintainers; [ fpletz globin lovesegfault ];
}; };
} }

View File

@ -1,4 +1,5 @@
{ lib, stdenv { lib
, stdenv
, fetchFromGitHub , fetchFromGitHub
, cmake , cmake
, gbenchmark , gbenchmark
@ -10,13 +11,13 @@
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
pname = "prometheus-cpp"; pname = "prometheus-cpp";
version = "0.9.0"; version = "1.0.0";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "jupp0r"; owner = "jupp0r";
repo = pname; repo = pname;
rev = "v${version}"; rev = "v${version}";
sha256 = "1pjz29ywzfg3blhg2v8fn7gjvq46k3bqn7y0xvmn468ixxhv21fi"; sha256 = "L6CXRup3kU1lY5UnwPbaOwEtCeAySNmFCPmHwsk6cRE=";
}; };
nativeBuildInputs = [ cmake ]; nativeBuildInputs = [ cmake ];

View File

@ -6,13 +6,13 @@
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
pname = "rocclr"; pname = "rocclr";
version = "4.5.2"; version = "5.0.2";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "ROCm-Developer-Tools"; owner = "ROCm-Developer-Tools";
repo = "ROCclr"; repo = "ROCclr";
rev = "rocm-${version}"; rev = "rocm-${version}";
hash = "sha256-fsQANBND/oDeC/+wmCH/aLlDTxPIi7Z/oN1HnNHHnm0="; hash = "sha256-x6XwYxgiCoy6Q7gIevSTEWgUQ0aEjPFhKSqMqQahHig=";
}; };
prePatch = '' prePatch = ''

View File

@ -10,13 +10,13 @@
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
pname = "rocm-device-libs"; pname = "rocm-device-libs";
version = "4.5.2"; version = "5.0.2";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "RadeonOpenCompute"; owner = "RadeonOpenCompute";
repo = "ROCm-Device-Libs"; repo = "ROCm-Device-Libs";
rev = "rocm-${version}"; rev = "rocm-${version}";
hash = "sha256-UeunsDRLhmsDOzesiEgYIzYotwecehB6VswshzdRwjw="; hash = "sha256-eZdy9+BfuUVzPO6huvqcwCog96qMVTYoY3l6J0YMUZQ=";
}; };
nativeBuildInputs = [ cmake ]; nativeBuildInputs = [ cmake ];

View File

@ -24,13 +24,13 @@
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
pname = "rocm-opencl-runtime"; pname = "rocm-opencl-runtime";
version = "4.5.2"; version = "5.0.2";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "RadeonOpenCompute"; owner = "RadeonOpenCompute";
repo = "ROCm-OpenCL-Runtime"; repo = "ROCm-OpenCL-Runtime";
rev = "rocm-${version}"; rev = "rocm-${version}";
hash = "sha256-0OGYF4urlscr8tMkQwo2yATXwN0DjB092KQ+CBEhfIA="; hash = "sha256-ovYwElZGRKySH1mWFIISxuNNxCjaqoe9oCvqYZGdfq0=";
}; };
nativeBuildInputs = [ cmake rocm-cmake ]; nativeBuildInputs = [ cmake rocm-cmake ];

View File

@ -14,13 +14,13 @@
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
pname = "rocm-runtime"; pname = "rocm-runtime";
version = "4.5.2"; version = "5.0.1";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "RadeonOpenCompute"; owner = "RadeonOpenCompute";
repo = "ROCR-Runtime"; repo = "ROCR-Runtime";
rev = "rocm-${version}"; rev = "rocm-${version}";
hash = "sha256-DJDlEHnXhegcenO8BIY/8GnZdHldVs0GFLrQy4Z6heY="; hash = "sha256-KOzVZNHtpwEOn7lZ36c4BGrImrq8dkUWRiHqGm+UTDk=";
}; };
sourceRoot = "source/src"; sourceRoot = "source/src";

View File

@ -9,13 +9,13 @@
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
pname = "rocm-thunk"; pname = "rocm-thunk";
version = "4.5.2"; version = "5.0.2";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "RadeonOpenCompute"; owner = "RadeonOpenCompute";
repo = "ROCT-Thunk-Interface"; repo = "ROCT-Thunk-Interface";
rev = "rocm-${version}"; rev = "rocm-${version}";
hash = "sha256-s/N1wkAgpxYCK6rIiWH8cGQU5YFGj0q4Dxj9j3yIys8="; hash = "sha256-hhDLy92jS/akp1Ozun45OEjVbVcjufkRIfC8bqqFjp4=";
}; };
preConfigure = '' preConfigure = ''

View File

@ -21,19 +21,22 @@ stdenv.mkDerivation rec {
version = "5.1.2"; version = "5.1.2";
src = fetchurl { src = fetchurl {
url = "mirror://metalab/libs/graphics/t1lib-${version}.tar.gz"; url = "mirror://ibiblioPubLinux/libs/graphics/${pname}-${version}.tar.gz";
sha256 = "0nbvjpnmcznib1nlgg8xckrmsw3haa154byds2h90y2g0nsjh4w2"; hash = "sha256-ghMotQVPeJCg0M0vUoJScHBd82QdvUdtWNF+Vu2Ve1k=";
}; };
inherit patches; inherit patches;
buildInputs = [ libX11 libXaw ]; buildInputs = [ libX11 libXaw ];
buildFlags = [ "without_doc" ]; buildFlags = [ "without_doc" ];
postInstall = lib.optionalString (!stdenv.isDarwin) "chmod +x $out/lib/*.so.*"; # ?? postInstall = lib.optionalString (!stdenv.isDarwin) ''
# ??
chmod +x $out/lib/*.so.*
'';
meta = with lib; { meta = with lib; {
description = "A type 1 font rasterizer library for UNIX/X11";
homepage = "http://www.t1lib.org/"; homepage = "http://www.t1lib.org/";
description = "A type 1 font rasterizer library for UNIX/X11";
license = with licenses; [ gpl2 lgpl2 ]; license = with licenses; [ gpl2 lgpl2 ];
platforms = platforms.unix; platforms = platforms.unix;
}; };

View File

@ -1,14 +1,27 @@
{ stdenv, fetchFromGitHub, lib }: { stdenv, buildPackages, fetchFromGitHub, lib }:
stdenv.mkDerivation { stdenv.mkDerivation {
pname = "wasilibc"; pname = "wasilibc";
version = "20190712"; version = "unstable-2021-09-23";
src = fetchFromGitHub {
owner = "CraneStation"; src = buildPackages.fetchFromGitHub {
owner = "WebAssembly";
repo = "wasi-libc"; repo = "wasi-libc";
rev = "8df0d4cd6a559b58d4a34b738a5a766b567448cf"; rev = "ad5133410f66b93a2381db5b542aad5e0964db96";
sha256 = "1n4gvgzacpagar2mx8g9950q0brnhwz7jg2q44sa5mnjmlnkiqhh"; hash = "sha256-RiIClVXrb18jF9qCt+5iALHPCZKYcnad7JsILHBV0pA=";
fetchSubmodules = true;
}; };
# clang-13: error: argument unused during compilation: '-rtlib=compiler-rt' [-Werror,-Wunused-command-line-argument]
postPatch = ''
substituteInPlace Makefile \
--replace "-Werror" ""
'';
preBuild = ''
export NIX_CFLAGS_COMPILE="-I$(pwd)/sysroot/include $NIX_CFLAGS_COMPILE"
'';
makeFlags = [ makeFlags = [
"WASM_CC=${stdenv.cc.targetPrefix}cc" "WASM_CC=${stdenv.cc.targetPrefix}cc"
"WASM_NM=${stdenv.cc.targetPrefix}nm" "WASM_NM=${stdenv.cc.targetPrefix}nm"
@ -16,6 +29,8 @@ stdenv.mkDerivation {
"INSTALL_DIR=${placeholder "out"}" "INSTALL_DIR=${placeholder "out"}"
]; ];
enableParallelBuilding = true;
postInstall = '' postInstall = ''
mv $out/lib/*/* $out/lib mv $out/lib/*/* $out/lib
ln -s $out/share/wasm32-wasi/undefined-symbols.txt $out/lib/wasi.imports ln -s $out/share/wasm32-wasi/undefined-symbols.txt $out/lib/wasi.imports
@ -23,9 +38,9 @@ stdenv.mkDerivation {
meta = with lib; { meta = with lib; {
description = "WASI libc implementation for WebAssembly"; description = "WASI libc implementation for WebAssembly";
homepage = "https://wasi.dev"; homepage = "https://wasi.dev";
platforms = platforms.wasi; platforms = platforms.wasi;
maintainers = [ maintainers.matthewbauer ]; maintainers = with maintainers; [ matthewbauer ];
license = with licenses; [ asl20 mit llvm-exception ]; license = with licenses; [ asl20 mit llvm-exception ];
}; };
} }

View File

@ -1,14 +1,14 @@
{ mkDerivation, fetchurl, makeWrapper, lib, php }: { mkDerivation, fetchurl, makeWrapper, lib, php }:
let let
pname = "phpstan"; pname = "phpstan";
version = "1.4.8"; version = "1.4.9";
in in
mkDerivation { mkDerivation {
inherit pname version; inherit pname version;
src = fetchurl { src = fetchurl {
url = "https://github.com/phpstan/phpstan/releases/download/${version}/phpstan.phar"; url = "https://github.com/phpstan/phpstan/releases/download/${version}/phpstan.phar";
sha256 = "sha256-ghXyPo9n2oXAz7BvuvBYjyJnUqf/FvNk8nTPIRv19cw="; sha256 = "sha256-N2oYhhcU6uCGUzJbL8/vMUlypJa/Z86d4Xddvj6k1fc=";
}; };
dontUnpack = true; dontUnpack = true;

View File

@ -14,14 +14,14 @@
buildPythonPackage rec { buildPythonPackage rec {
pname = "amcrest"; pname = "amcrest";
version = "1.9.4"; version = "1.9.7";
disabled = pythonOlder "3.6"; disabled = pythonOlder "3.6";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "tchellomello"; owner = "tchellomello";
repo = "python-amcrest"; repo = "python-amcrest";
rev = version; rev = version;
sha256 = "sha256-smwPKZLevolNvpkLxoFR3NGL9YFPlBk3WYQqJXBaS7s="; sha256 = "sha256-An7MnGtZsmEZU/y6E0sivdexFD6HJRTB1juXqHfbDzE=";
}; };
propagatedBuildInputs = [ propagatedBuildInputs = [

View File

@ -4,16 +4,19 @@
, nose , nose
, parts , parts
, pytestCheckHook , pytestCheckHook
, pythonOlder
}: }:
buildPythonPackage rec { buildPythonPackage rec {
pname = "bitlist"; pname = "bitlist";
version = "0.6.2"; version = "0.7.0";
format = "setuptools"; format = "setuptools";
disabled = pythonOlder "3.7";
src = fetchPypi { src = fetchPypi {
inherit pname version; inherit pname version;
sha256 = "69cf632ca61b5fb5d2fd7587ddf023bcab8f327302f15070ec9079b68df9082a"; sha256 = "sha256-p3Gws48u1/AzltbtPyWvSX4O0u4MgSXiVq4GstpPCCg=";
}; };
propagatedBuildInputs = [ propagatedBuildInputs = [
@ -29,6 +32,11 @@ buildPythonPackage rec {
"bitlist" "bitlist"
]; ];
postPatch = ''
substituteInPlace setup.cfg \
--replace " --cov=bitlist --cov-report term-missing" ""
'';
meta = with lib; { meta = with lib; {
description = "Python library for working with little-endian list representation of bit strings"; description = "Python library for working with little-endian list representation of bit strings";
homepage = "https://github.com/lapets/bitlist"; homepage = "https://github.com/lapets/bitlist";

View File

@ -12,14 +12,14 @@
buildPythonPackage rec { buildPythonPackage rec {
pname = "channels-redis"; pname = "channels-redis";
version = "3.3.1"; version = "3.4.0";
disabled = pythonOlder "3.6"; disabled = pythonOlder "3.6";
src = fetchPypi { src = fetchPypi {
inherit version; inherit version;
pname = "channels_redis"; pname = "channels_redis";
sha256 = "899dc6433f5416cf8ad74505baaf2acb5461efac3cad40751a41119e3f68421b"; sha256 = "sha256-Xf/UzBYXQSW9QEP8j+dGLKdAPPgB1Zqfp0EO0QH6alc=";
}; };
buildInputs = [ redis hiredis ]; buildInputs = [ redis hiredis ];

View File

@ -10,14 +10,14 @@
buildPythonPackage rec { buildPythonPackage rec {
pname = "chart-studio"; pname = "chart-studio";
version = "5.5.0"; version = "5.6.0";
# chart-studio was split from plotly # chart-studio was split from plotly
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "plotly"; owner = "plotly";
repo = "plotly.py"; repo = "plotly.py";
rev = "v${version}"; rev = "v${version}";
sha256 = "04hsh1z2ngfslmvi8fdzfccssg6i0ziksil84j129f049m96wd51"; sha256 = "sha256-mf4QASdvO7doV5pKAAEzaKJP66w29osBlbLrJuopUvA=";
}; };
sourceRoot = "source/packages/python/chart-studio"; sourceRoot = "source/packages/python/chart-studio";

View File

@ -15,7 +15,7 @@
buildPythonPackage rec { buildPythonPackage rec {
pname = "dash"; pname = "dash";
version = "2.2.0"; version = "2.3.0";
format = "setuptools"; format = "setuptools";
disabled = pythonOlder "3.6"; disabled = pythonOlder "3.6";
@ -24,7 +24,7 @@ buildPythonPackage rec {
owner = "plotly"; owner = "plotly";
repo = pname; repo = pname;
rev = "v${version}"; rev = "v${version}";
sha256 = "sha256-Ul3j1BJd3lKzGCEhPFYxZG0CcAqAZqmOEDi8vGPFItw="; sha256 = "sha256-iH56c2PO1G/NlLmYC+6sdAMZ+kXvUkpkqxfnl9EmDsQ=";
}; };
propagatedBuildInputs = [ propagatedBuildInputs = [

View File

@ -6,16 +6,19 @@
, parts , parts
, nose , nose
, pytestCheckHook , pytestCheckHook
, pythonOlder
}: }:
buildPythonPackage rec { buildPythonPackage rec {
pname = "fe25519"; pname = "fe25519";
version = "1.1.0"; version = "1.2.0";
format = "setuptools"; format = "setuptools";
disabled = pythonOlder "3.7";
src = fetchPypi { src = fetchPypi {
inherit pname version; inherit pname version;
sha256 = "sha256-3WFpbt4bA7zPlK+mp5DJXdgk44MBimCbpIMhRjZ5p0o="; hash = "sha256-Hzdt8932WonJAaQPtL346JFPqxFXkNW4XQvbQlSoJJE=";
}; };
propagatedBuildInputs = [ propagatedBuildInputs = [
@ -29,6 +32,11 @@ buildPythonPackage rec {
pytestCheckHook pytestCheckHook
]; ];
postPatch = ''
substituteInPlace setup.cfg \
--replace " --cov=fe25519 --cov-report term-missing" ""
'';
pythonImportsCheck = [ pythonImportsCheck = [
"fe25519" "fe25519"
]; ];

View File

@ -2,16 +2,19 @@
, buildPythonPackage , buildPythonPackage
, fetchPypi , fetchPypi
, bitlist , bitlist
, pythonOlder
}: }:
buildPythonPackage rec { buildPythonPackage rec {
pname = "fountains"; pname = "fountains";
version = "1.2.0"; version = "1.3.0";
format = "setuptools"; format = "setuptools";
disabled = pythonOlder "3.7";
src = fetchPypi { src = fetchPypi {
inherit pname version; inherit pname version;
sha256 = "6de6bc117c376f40a26e111111d638159a2e8a25cfe32f946db0d779decbb70a"; sha256 = "sha256-c6nw22UtAREYZp0XCEZE6p7GpRvSLukq5y0c9KvVf9w=";
}; };
propagatedBuildInputs = [ propagatedBuildInputs = [

View File

@ -7,16 +7,19 @@
, nose , nose
, parts , parts
, pytestCheckHook , pytestCheckHook
, pythonOlder
}: }:
buildPythonPackage rec { buildPythonPackage rec {
pname = "ge25519"; pname = "ge25519";
version = "1.1.0"; version = "1.2.0";
format = "setuptools"; format = "setuptools";
disabled = pythonOlder "3.7";
src = fetchPypi { src = fetchPypi {
inherit pname version; inherit pname version;
sha256 = "sha256-0M9RF8tlEoLyduvY3RvltGAnsus3HF6FEy22b6w6aUs="; hash = "sha256-8GsNY62SusUmQcaqlhKOPHbd0jvZulCaxMxeob37JJM=";
}; };
propagatedBuildInputs = [ propagatedBuildInputs = [
@ -31,6 +34,12 @@ buildPythonPackage rec {
pytestCheckHook pytestCheckHook
]; ];
postPatch = ''
substituteInPlace setup.cfg \
--replace " --cov=ge25519 --cov-report term-missing" ""
'';
pythonImportsCheck = [ pythonImportsCheck = [
"ge25519" "ge25519"
]; ];

View File

@ -8,7 +8,7 @@
buildPythonPackage rec { buildPythonPackage rec {
pname = "graphql-subscription-manager"; pname = "graphql-subscription-manager";
version = "0.5.1"; version = "0.5.4";
disabled = pythonOlder "3.7"; disabled = pythonOlder "3.7";
@ -16,7 +16,7 @@ buildPythonPackage rec {
owner = "Danielhiversen"; owner = "Danielhiversen";
repo = "PyGraphqlWebsocketManager"; repo = "PyGraphqlWebsocketManager";
rev = version; rev = version;
sha256 = "sha256-PVQa6JmBnToXuL/wNkYO0b+K1e9yrQgRUzWNUbFN5mM="; sha256 = "sha256-J3us0xZN1jOFRcvUQg8PQP6AVHa/swGjKU8IivmfjQE=";
}; };
propagatedBuildInputs = [ propagatedBuildInputs = [

View File

@ -8,14 +8,14 @@
buildPythonPackage rec { buildPythonPackage rec {
pname = "apache-libcloud"; pname = "apache-libcloud";
version = "3.4.1"; version = "3.5.0";
format = "setuptools"; format = "setuptools";
disabled = pythonOlder "3.6"; disabled = pythonOlder "3.6";
src = fetchPypi { src = fetchPypi {
inherit pname version; inherit pname version;
sha256 = "sha256-iPGNoM8/rAr3I+dD+3QdnRviUYge2reloNFimVW1ARs="; sha256 = "sha256-Bz8QSSl2+qODoisTuCwkmCfP6QoIPHFiDoMW6BWm2zs=";
}; };
propagatedBuildInputs = [ propagatedBuildInputs = [

View File

@ -2,13 +2,13 @@
buildPythonPackage rec { buildPythonPackage rec {
pname = "libvirt"; pname = "libvirt";
version = "7.10.0"; version = "8.1.0";
src = assert version == libvirt.version; fetchFromGitLab { src = assert version == libvirt.version; fetchFromGitLab {
owner = "libvirt"; owner = "libvirt";
repo = "libvirt-python"; repo = "libvirt-python";
rev = "v${version}"; rev = "v${version}";
sha256 = "sha256-I1FNjNwWRyDAUSq2Co9EnjAbzKQtS0Rx8vHgPsFzSYw="; sha256 = "sha256-/uGxjptiqm5B823z4mcjredj9ZLZC2WTTqhQrQPVfDU=";
}; };
nativeBuildInputs = [ pkg-config ]; nativeBuildInputs = [ pkg-config ];

View File

@ -1,6 +1,7 @@
{ lib { lib
, buildPythonPackage , buildPythonPackage
, fetchPypi , fetchPypi
, pythonOlder
}: }:
buildPythonPackage rec { buildPythonPackage rec {
@ -8,6 +9,8 @@ buildPythonPackage rec {
version = "1.3.0"; version = "1.3.0";
format = "setuptools"; format = "setuptools";
disabled = pythonOlder "3.7";
src = fetchPypi { src = fetchPypi {
inherit pname version; inherit pname version;
sha256 = "sha256-NrhNpWyzqwn1bNnuqmcyKcUED0A4v7VJE4ZlTHFafJY="; sha256 = "sha256-NrhNpWyzqwn1bNnuqmcyKcUED0A4v7VJE4ZlTHFafJY=";

View File

@ -6,12 +6,12 @@
buildPythonPackage rec { buildPythonPackage rec {
pname = "pex"; pname = "pex";
version = "2.1.69"; version = "2.1.71";
format = "flit"; format = "flit";
src = fetchPypi { src = fetchPypi {
inherit pname version; inherit pname version;
sha256 = "sha256-JbQ8yn/uALjjVSRgqKXsQOC4rOCGkMPxb50KqWg89kM="; sha256 = "sha256-jJ7J4upDL1X1Eut1kUWdJu3Ih2mheNFt0wI+QTZMKow=";
}; };
nativeBuildInputs = [ nativeBuildInputs = [

View File

@ -8,22 +8,29 @@
buildPythonPackage rec { buildPythonPackage rec {
pname = "pyftdi"; pname = "pyftdi";
version = "0.53.3"; version = "0.54.0";
disabled = pythonOlder "3.5"; format = "setuptools";
disabled = pythonOlder "3.7";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "eblot"; owner = "eblot";
repo = pname; repo = pname;
rev = "v${version}"; rev = "v${version}";
sha256 = "sha256-t4rFsuhcpYdgmQeog+DRFxHk0wpMc+aukQi981vH/44="; hash = "sha256-vL8jSgTtDvaHuCvaCYmFixILQFasTl82yINL5yRtOwU=";
}; };
propagatedBuildInputs = [ pyusb pyserial ]; propagatedBuildInputs = [
pyserial
pyusb
];
# tests requires access to the serial port # Tests require access to the serial port
doCheck = false; doCheck = false;
pythonImportsCheck = [ "pyftdi" ]; pythonImportsCheck = [
"pyftdi"
];
meta = with lib; { meta = with lib; {
description = "User-space driver for modern FTDI devices"; description = "User-space driver for modern FTDI devices";

View File

@ -8,13 +8,13 @@
buildPythonPackage rec { buildPythonPackage rec {
pname = "pyisy"; pname = "pyisy";
version = "3.0.3"; version = "3.0.5";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "automicus"; owner = "automicus";
repo = "PyISY"; repo = "PyISY";
rev = "v${version}"; rev = "v${version}";
hash = "sha256-zQ0IBfbWEGv5t+b3EKF+6tEpmwfAWFMndPqSNSQZ5b4="; hash = "sha256-lVutG/xJvVP0qS0UnEyS/9KwwqdRX6ownTKek8/VXbU=";
}; };
postPatch = '' postPatch = ''

View File

@ -7,7 +7,7 @@
buildPythonPackage rec { buildPythonPackage rec {
pname = "pyroute2-core"; pname = "pyroute2-core";
version = "0.6.7"; version = "0.6.8";
format = "setuptools"; format = "setuptools";
disabled = pythonOlder "3.7"; disabled = pythonOlder "3.7";
@ -15,7 +15,7 @@ buildPythonPackage rec {
src = fetchPypi { src = fetchPypi {
pname = "pyroute2.core"; pname = "pyroute2.core";
inherit version; inherit version;
hash = "sha256-N74cQcWx57lYIPiQTL+/Ec5Kf1rgdMrRkkYIdyaLjN4="; hash = "sha256-gkvr1FgFWI1eurjbuUYhYj0D4eZTIBsDMRXSWrKiCP4=";
}; };
# pyroute2 sub-modules have no tests # pyroute2 sub-modules have no tests

View File

@ -7,7 +7,7 @@
buildPythonPackage rec { buildPythonPackage rec {
pname = "pyroute2-ethtool"; pname = "pyroute2-ethtool";
version = "0.6.7"; version = "0.6.8";
format = "setuptools"; format = "setuptools";
disabled = pythonOlder "3.7"; disabled = pythonOlder "3.7";
@ -15,7 +15,7 @@ buildPythonPackage rec {
src = fetchPypi { src = fetchPypi {
pname = "pyroute2.ethtool"; pname = "pyroute2.ethtool";
inherit version; inherit version;
hash = "sha256-jwPg7xcmQU3F4cVrs2GVUxBXV6waMkrnmyZkHo2kLR0="; hash = "sha256-+/B+YQOluzyGYmnwAZonsjgZeiZPYl8LhJ9OjnvV/64=";
}; };
propagatedBuildInputs = [ propagatedBuildInputs = [

View File

@ -7,7 +7,7 @@
buildPythonPackage rec { buildPythonPackage rec {
pname = "pyroute2-ipdb"; pname = "pyroute2-ipdb";
version = "0.6.7"; version = "0.6.8";
format = "setuptools"; format = "setuptools";
disabled = pythonOlder "3.7"; disabled = pythonOlder "3.7";
@ -15,7 +15,7 @@ buildPythonPackage rec {
src = fetchPypi { src = fetchPypi {
pname = "pyroute2.ipdb"; pname = "pyroute2.ipdb";
inherit version; inherit version;
hash = "sha256-uMEPUleEBIaIV4bCejTmeHYhKeaN9SNcUMzBAODNBEU="; hash = "sha256-sjlJ1eBoMQaJzEF/4Qk9ZwZB0s/yvR5wUUDP3UWBA50=";
}; };
propagatedBuildInputs = [ propagatedBuildInputs = [

View File

@ -7,7 +7,7 @@
buildPythonPackage rec { buildPythonPackage rec {
pname = "pyroute2-ipset"; pname = "pyroute2-ipset";
version = "0.6.7"; version = "0.6.8";
format = "setuptools"; format = "setuptools";
disabled = pythonOlder "3.7"; disabled = pythonOlder "3.7";
@ -15,7 +15,7 @@ buildPythonPackage rec {
src = fetchPypi { src = fetchPypi {
pname = "pyroute2.ipset"; pname = "pyroute2.ipset";
inherit version; inherit version;
hash = "sha256-roNLNXmnW27a+TgxtMi8HO5hF4agxdjQ0DMsYW6O44c="; hash = "sha256-j2vEQyfuuMH0QRtXw6acX9AMureQwgeS+Ap7m2uP9OY=";
}; };
propagatedBuildInputs = [ propagatedBuildInputs = [

View File

@ -7,7 +7,7 @@
buildPythonPackage rec { buildPythonPackage rec {
pname = "pyroute2-ndb"; pname = "pyroute2-ndb";
version = "0.6.7"; version = "0.6.8";
format = "setuptools"; format = "setuptools";
disabled = pythonOlder "3.7"; disabled = pythonOlder "3.7";
@ -15,7 +15,7 @@ buildPythonPackage rec {
src = fetchPypi { src = fetchPypi {
pname = "pyroute2.ndb"; pname = "pyroute2.ndb";
inherit version; inherit version;
hash = "sha256-o/rmbOwfRUPw/g1Cc/5otqKvGe3Br3y4iSXad/PfTPw="; hash = "sha256-90DAbXCkoIFUbWZotKYkCSGsQvb7LrEpf6xGCviP40w=";
}; };
propagatedBuildInputs = [ propagatedBuildInputs = [

View File

@ -6,12 +6,12 @@
buildPythonPackage rec { buildPythonPackage rec {
pname = "pyroute2-nftables"; pname = "pyroute2-nftables";
version = "0.6.7"; version = "0.6.8";
src = fetchPypi { src = fetchPypi {
pname = "pyroute2.nftables"; pname = "pyroute2.nftables";
inherit version; inherit version;
sha256 = "sha256-d9LdXxBQGa40MmGuK2cFOOEI7X4Y1pPv0ObW9n7ZUjo="; sha256 = "sha256-SNebxs0mCFEI4bejuLMeU3wrO8KZZT1frnfQw8Gko6E=";
}; };
propagatedBuildInputs = [ propagatedBuildInputs = [

View File

@ -7,7 +7,7 @@
buildPythonPackage rec { buildPythonPackage rec {
pname = "pyroute2-nslink"; pname = "pyroute2-nslink";
version = "0.6.7"; version = "0.6.8";
format = "setuptools"; format = "setuptools";
disabled = pythonOlder "3.7"; disabled = pythonOlder "3.7";
@ -15,7 +15,7 @@ buildPythonPackage rec {
src = fetchPypi { src = fetchPypi {
pname = "pyroute2.nslink"; pname = "pyroute2.nslink";
inherit version; inherit version;
hash = "sha256-p+U3Y5vKCxuvMl/yNKlay57tlU4GKttCJrAwctKa5TY="; hash = "sha256-bTGzXouEdVUFaT5mxGfonFu3aOMxZKRTDMaHFciofec=";
}; };
propagatedBuildInputs = [ propagatedBuildInputs = [

View File

@ -7,7 +7,7 @@
buildPythonPackage rec { buildPythonPackage rec {
pname = "pyroute2-protocols"; pname = "pyroute2-protocols";
version = "0.6.7"; version = "0.6.8";
format = "setuptools"; format = "setuptools";
disabled = pythonOlder "3.7"; disabled = pythonOlder "3.7";
@ -15,7 +15,7 @@ buildPythonPackage rec {
src = fetchPypi { src = fetchPypi {
pname = "pyroute2.protocols"; pname = "pyroute2.protocols";
inherit version; inherit version;
hash = "sha256-GdququbQcU+exzxifb8UGamkSUMhR94j+auF8I6e7/Q="; hash = "sha256-l07CEwZzDxym+QAnKFFEpX690RStOA+rAwMXiEd7FOs=";
}; };
propagatedBuildInputs = [ propagatedBuildInputs = [

View File

@ -15,14 +15,14 @@
buildPythonPackage rec { buildPythonPackage rec {
pname = "pyroute2"; pname = "pyroute2";
version = "0.6.7"; version = "0.6.8";
format = "setuptools"; format = "setuptools";
disabled = pythonOlder "3.7"; disabled = pythonOlder "3.7";
src = fetchPypi { src = fetchPypi {
inherit pname version; inherit pname version;
hash = "sha256-qBv9jshyg0S9IThdrXHTFcb2neQPDmURmtSbqYCKlWo="; hash = "sha256-WhqjvCwKrUUBLKvjpva7pc94UIZvTf7j705Bt2DHyKQ=";
}; };
propagatedBuildInputs = [ propagatedBuildInputs = [

View File

@ -0,0 +1,46 @@
{ lib
, buildPythonPackage
, fetchFromGitHub
, poetry-core
, pysigma
, pytestCheckHook
, pythonOlder
}:
buildPythonPackage rec {
pname = "pysigma-backend-splunk";
version = "0.1.1";
format = "pyproject";
disabled = pythonOlder "3.8";
src = fetchFromGitHub {
owner = "SigmaHQ";
repo = "pySigma-backend-splunk";
rev = "v${version}";
hash = "sha256-AGT+7BKtINe2ukmomYyoUa5PHYAH1N0tUTtbyjMD+kw=";
};
nativeBuildInputs = [
poetry-core
];
propagatedBuildInputs = [
pysigma
];
checkInputs = [
pytestCheckHook
];
pythonImportsCheck = [
"sigma.backends.splunk"
];
meta = with lib; {
description = "Library to support Splunk for pySigma";
homepage = "https://github.com/SigmaHQ/pySigma-backend-splunk";
license = with licenses; [ lgpl21Only ];
maintainers = with maintainers; [ fab ];
};
}

View File

@ -0,0 +1,46 @@
{ lib
, buildPythonPackage
, fetchFromGitHub
, poetry-core
, pysigma
, pytestCheckHook
, pythonOlder
}:
buildPythonPackage rec {
pname = "pysigma-pipeline-crowdstrike";
version = "0.1.3";
format = "pyproject";
disabled = pythonOlder "3.8";
src = fetchFromGitHub {
owner = "SigmaHQ";
repo = "pySigma-pipeline-crowdstrike";
rev = "v${version}";
hash = "sha256-JNJHKydMzKreN+6liLlGMT1CFBUr/IX8Ah+exddKR3g=";
};
nativeBuildInputs = [
poetry-core
];
propagatedBuildInputs = [
pysigma
];
checkInputs = [
pytestCheckHook
];
pythonImportsCheck = [
"sigma.pipelines.crowdstrike"
];
meta = with lib; {
description = "Library to support CrowdStrike pipeline for pySigma";
homepage = "https://github.com/SigmaHQ/pySigma-pipeline-crowdstrike";
license = with licenses; [ lgpl21Only ];
maintainers = with maintainers; [ fab ];
};
}

View File

@ -0,0 +1,46 @@
{ lib
, buildPythonPackage
, fetchFromGitHub
, poetry-core
, pysigma
, pytestCheckHook
, pythonOlder
}:
buildPythonPackage rec {
pname = "pysigma-pipeline-sysmon";
version = "0.1.1";
format = "pyproject";
disabled = pythonOlder "3.8";
src = fetchFromGitHub {
owner = "SigmaHQ";
repo = "pySigma-pipeline-sysmon";
rev = "v${version}";
hash = "sha256-BBJt2SAbnPEzIwJ+tXW4NmA4Nrb/glIaPlnmYHLoMD0=";
};
nativeBuildInputs = [
poetry-core
];
propagatedBuildInputs = [
pysigma
];
checkInputs = [
pytestCheckHook
];
pythonImportsCheck = [
"sigma.pipelines.sysmon"
];
meta = with lib; {
description = "Library to support Sysmon pipeline for pySigma";
homepage = "https://github.com/SigmaHQ/pySigma-pipeline-sysmon";
license = with licenses; [ lgpl21Only ];
maintainers = with maintainers; [ fab ];
};
}

View File

@ -0,0 +1,66 @@
{ lib
, buildPythonPackage
, fetchFromGitHub
, fetchpatch
, poetry-core
, pyparsing
, pytestCheckHook
, pythonOlder
, pyyaml
}:
buildPythonPackage rec {
pname = "pysigma";
version = "0.3.2";
format = "pyproject";
disabled = pythonOlder "3.8";
src = fetchFromGitHub {
owner = "SigmaHQ";
repo = "pySigma";
rev = "v${version}";
hash = "sha256-V/E2rZqVrk0kIvk+hPhNcAifhMM/rN3mk3pB+CGd43w=";
};
nativeBuildInputs = [
poetry-core
];
propagatedBuildInputs = [
pyparsing
pyyaml
];
checkInputs = [
pytestCheckHook
];
patches = [
# Switch to poetry-core, https://github.com/SigmaHQ/pySigma/pull/31
(fetchpatch {
name = "switch-to-poetry-core.patch";
url = "https://github.com/SigmaHQ/pySigma/commit/b7a852d18852007da90c2ec35bff347c97b36f07.patch";
sha256 = "sha256-zgg8Bsc37W2uuQluFpIZT4jHCQaitY2ZgS93Wk6Hxt0=";
})
];
postPatch = ''
# https://github.com/SigmaHQ/pySigma/issues/32
# https://github.com/SigmaHQ/pySigma/issues/33
substituteInPlace pyproject.toml \
--replace 'pyparsing = "^2.4.7"' 'pyparsing = "*"' \
--replace 'pyyaml = "^5.3.1"' 'pyyaml = "*"'
'';
pythonImportsCheck = [
"sigma"
];
meta = with lib; {
description = "Library to parse and convert Sigma rules into queries";
homepage = "https://github.com/SigmaHQ/pySigma";
license = with licenses; [ lgpl21Only ];
maintainers = with maintainers; [ fab ];
};
}

View File

@ -8,7 +8,7 @@
buildPythonPackage rec { buildPythonPackage rec {
pname = "pyupgrade"; pname = "pyupgrade";
version = "2.31.0"; version = "2.31.1";
format = "setuptools"; format = "setuptools";
disabled = pythonOlder "3.6"; disabled = pythonOlder "3.6";
@ -17,7 +17,7 @@ buildPythonPackage rec {
owner = "asottile"; owner = "asottile";
repo = pname; repo = pname;
rev = "v${version}"; rev = "v${version}";
sha256 = "sha256-nuYWJ4nilbXa/1KOuGhc6rB7uXDE4+lcESNud4Ug+3Y="; sha256 = "sha256-l4wF/I3wsA9nowIdLjNPUxCaTPBu5v5oPQ3oNbLh+/o=";
}; };
checkInputs = [ checkInputs = [

View File

@ -1,17 +1,18 @@
{ lib { lib
, buildPythonPackage , buildPythonPackage
, fetchgit , fetchFromGitHub
, cython , cython
}: }:
buildPythonPackage { buildPythonPackage rec {
pname = "rencode"; pname = "rencode";
version = "git20150810"; version = "1.0.6";
src = fetchgit { src = fetchFromGitHub {
url = "https://github.com/aresch/rencode"; owner = "aresch";
rev = "b45e04abdca0dea36e383a8199783269f186c99e"; repo = "rencode";
sha256 = "b4bd82852d4220e8a9493d3cfaecbc57b1325708a2d48c0f8acf262edb10dc40"; rev = "v${version}";
sha256 = "sha256-PGjjrZuoGYSPMNqXG1KXoZnOoWIe4g6s056jFhqrJ60=";
}; };
buildInputs = [ cython ]; buildInputs = [ cython ];

View File

@ -11,13 +11,13 @@
buildPythonPackage rec { buildPythonPackage rec {
pname = "symengine"; pname = "symengine";
version = "0.9.0"; version = "0.9.2";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "symengine"; owner = "symengine";
repo = "symengine.py"; repo = "symengine.py";
rev = "v${version}"; rev = "v${version}";
sha256 = "sha256-kz4M4ghR9Mi8Ig5K+pZC4zHt8XxoP3vU4ATImejqbgg="; sha256 = "sha256-ZHplYEG97foy/unOdSokFFkDl4LK5TI4kypHSLpcCM4=";
}; };
postConfigure = '' postConfigure = ''

Some files were not shown because too many files have changed in this diff Show More