aboutsummaryrefslogtreecommitdiff
path: root/nixpkgs/pkgs/servers
diff options
context:
space:
mode:
Diffstat (limited to 'nixpkgs/pkgs/servers')
-rw-r--r--nixpkgs/pkgs/servers/amqp/rabbitmq-server/default.nix4
-rw-r--r--nixpkgs/pkgs/servers/apache-kafka/default.nix12
-rw-r--r--nixpkgs/pkgs/servers/atlassian/confluence.nix4
-rw-r--r--nixpkgs/pkgs/servers/atlassian/jira.nix8
-rw-r--r--nixpkgs/pkgs/servers/bird/default.nix12
-rw-r--r--nixpkgs/pkgs/servers/clickhouse/default.nix8
-rw-r--r--nixpkgs/pkgs/servers/computing/slurm/default.nix8
-rw-r--r--nixpkgs/pkgs/servers/dns/knot-resolver/default.nix4
-rw-r--r--nixpkgs/pkgs/servers/dns/powerdns/default.nix4
-rw-r--r--nixpkgs/pkgs/servers/documize-community/default.nix6
-rw-r--r--nixpkgs/pkgs/servers/fileshare/default.nix35
-rw-r--r--nixpkgs/pkgs/servers/freeradius/default.nix6
-rw-r--r--nixpkgs/pkgs/servers/home-assistant/esphome.nix12
-rw-r--r--nixpkgs/pkgs/servers/http/lighttpd/default.nix6
-rw-r--r--nixpkgs/pkgs/servers/http/openresty/default.nix4
-rw-r--r--nixpkgs/pkgs/servers/http/tengine/default.nix1
-rw-r--r--nixpkgs/pkgs/servers/http/unit/default.nix4
-rw-r--r--nixpkgs/pkgs/servers/irc/charybdis/default.nix4
-rw-r--r--nixpkgs/pkgs/servers/jackett/default.nix4
-rw-r--r--nixpkgs/pkgs/servers/jellyfin/default.nix4
-rw-r--r--nixpkgs/pkgs/servers/ma1sd/0001-gradle.patch20
-rw-r--r--nixpkgs/pkgs/servers/ma1sd/default.nix70
-rw-r--r--nixpkgs/pkgs/servers/mail/dovecot/default.nix8
-rw-r--r--nixpkgs/pkgs/servers/mail/dovecot/plugins/pigeonhole/default.nix4
-rw-r--r--nixpkgs/pkgs/servers/mail/exim/default.nix16
-rw-r--r--nixpkgs/pkgs/servers/mail/opensmtpd/extras.nix6
-rw-r--r--nixpkgs/pkgs/servers/mail/postfix/default.nix10
-rw-r--r--nixpkgs/pkgs/servers/memcached/default.nix4
-rw-r--r--nixpkgs/pkgs/servers/monitoring/do-agent/default.nix33
-rw-r--r--nixpkgs/pkgs/servers/monitoring/grafana/default.nix6
-rw-r--r--nixpkgs/pkgs/servers/monitoring/nagios/default.nix4
-rw-r--r--nixpkgs/pkgs/servers/monitoring/plugins/default.nix4
-rw-r--r--nixpkgs/pkgs/servers/monitoring/prometheus/alertmanager.nix4
-rw-r--r--nixpkgs/pkgs/servers/monitoring/prometheus/nextcloud-exporter-deps.nix300
-rw-r--r--nixpkgs/pkgs/servers/monitoring/prometheus/nextcloud-exporter.nix27
-rw-r--r--nixpkgs/pkgs/servers/monitoring/prometheus/wireguard-exporter.nix6
-rw-r--r--nixpkgs/pkgs/servers/monitoring/thanos/default.nix6
-rw-r--r--nixpkgs/pkgs/servers/monitoring/zabbix/proxy.nix4
-rw-r--r--nixpkgs/pkgs/servers/monitoring/zabbix/server.nix4
-rw-r--r--nixpkgs/pkgs/servers/mtprotoproxy/default.nix8
-rw-r--r--nixpkgs/pkgs/servers/mxisd/default.nix12
-rw-r--r--nixpkgs/pkgs/servers/nextcloud/default.nix4
-rw-r--r--nixpkgs/pkgs/servers/nosql/apache-jena/fuseki-binary.nix4
-rw-r--r--nixpkgs/pkgs/servers/nosql/neo4j/default.nix4
-rw-r--r--nixpkgs/pkgs/servers/nosql/redis/default.nix4
-rw-r--r--nixpkgs/pkgs/servers/plex/raw.nix4
-rw-r--r--nixpkgs/pkgs/servers/roundcube/default.nix4
-rw-r--r--nixpkgs/pkgs/servers/scylladb/configure-etc-osrelease.patch28
-rw-r--r--nixpkgs/pkgs/servers/scylladb/default.nix8
-rw-r--r--nixpkgs/pkgs/servers/search/groonga/default.nix4
-rw-r--r--nixpkgs/pkgs/servers/sql/mariadb/connector-c/3_1.nix6
-rw-r--r--nixpkgs/pkgs/servers/sql/mariadb/connector-c/default.nix54
-rw-r--r--nixpkgs/pkgs/servers/sql/mariadb/default.nix103
-rw-r--r--nixpkgs/pkgs/servers/sql/mariadb/galera/25.nix6
-rw-r--r--nixpkgs/pkgs/servers/sql/mariadb/galera/default.nix63
-rw-r--r--nixpkgs/pkgs/servers/sql/monetdb/default.nix4
-rw-r--r--nixpkgs/pkgs/servers/sql/pgbouncer/default.nix4
-rw-r--r--nixpkgs/pkgs/servers/sql/postgresql/ext/pg_repack.nix4
-rw-r--r--nixpkgs/pkgs/servers/uwsgi/default.nix4
-rw-r--r--nixpkgs/pkgs/servers/varnish/default.nix4
-rw-r--r--nixpkgs/pkgs/servers/web-apps/shiori/default.nix22
-rw-r--r--nixpkgs/pkgs/servers/x11/xorg/default.nix12
-rw-r--r--nixpkgs/pkgs/servers/x11/xorg/overrides.nix2
-rw-r--r--nixpkgs/pkgs/servers/x11/xorg/tarballs.list4
-rw-r--r--nixpkgs/pkgs/servers/xmpp/prosody/default.nix4
65 files changed, 826 insertions, 240 deletions
diff --git a/nixpkgs/pkgs/servers/amqp/rabbitmq-server/default.nix b/nixpkgs/pkgs/servers/amqp/rabbitmq-server/default.nix
index 14a0df25747..da60a122a4c 100644
--- a/nixpkgs/pkgs/servers/amqp/rabbitmq-server/default.nix
+++ b/nixpkgs/pkgs/servers/amqp/rabbitmq-server/default.nix
@@ -6,12 +6,12 @@
stdenv.mkDerivation rec {
pname = "rabbitmq-server";
- version = "3.7.17";
+ version = "3.7.18";
# when updating, consider bumping elixir version in all-packages.nix
src = fetchurl {
url = "https://github.com/rabbitmq/rabbitmq-server/releases/download/v${version}/${pname}-${version}.tar.xz";
- sha256 = "1ychgvjbi6ikapfcp4rgwa0vihhs1f34c2advb7833jym8alazrr";
+ sha256 = "1vzx9g2k7ynbv2gz450cwjyxcn3vcxsmlpnvq1r5wzcf25giy9ky";
};
buildInputs =
diff --git a/nixpkgs/pkgs/servers/apache-kafka/default.nix b/nixpkgs/pkgs/servers/apache-kafka/default.nix
index 0c1c69982fa..7b27909856d 100644
--- a/nixpkgs/pkgs/servers/apache-kafka/default.nix
+++ b/nixpkgs/pkgs/servers/apache-kafka/default.nix
@@ -1,4 +1,4 @@
-{ stdenv, fetchurl, jre, makeWrapper, bash, coreutils, gnugrep, gnused,
+{ stdenv, fetchurl, jre, makeWrapper, bash, coreutils, gnugrep, gnused, ps,
majorVersion ? "1.0" }:
let
@@ -43,6 +43,11 @@ let
scalaVersion = "2.12";
sha256 = "1svdnhdzq9a6jsig513i0ahaysfgar5i385bq9fz7laga6a4z3qv";
};
+ "2.3" = {
+ kafkaVersion = "2.3.0";
+ scalaVersion = "2.12";
+ sha256 = "1rz3xqv26h0zv5pmk65znzn08gycmrfj6vvbmrvl9i7hm4hm2vyq";
+ };
};
in
@@ -57,7 +62,7 @@ stdenv.mkDerivation rec {
inherit sha256;
};
- buildInputs = [ jre makeWrapper bash gnugrep gnused coreutils ];
+ buildInputs = [ jre makeWrapper bash gnugrep gnused coreutils ps ];
installPhase = ''
mkdir -p $out
@@ -71,6 +76,9 @@ stdenv.mkDerivation rec {
substituteInPlace $out/bin/kafka-run-class.sh \
--replace 'LOG_DIR="$base_dir/logs"' 'LOG_DIR="$KAFKA_LOG_DIR"'
+ substituteInPlace $out/bin/kafka-server-stop.sh \
+ --replace 'ps' '${ps}/bin/ps'
+
for p in $out/bin\/*.sh; do
wrapProgram $p \
--set JAVA_HOME "${jre}" \
diff --git a/nixpkgs/pkgs/servers/atlassian/confluence.nix b/nixpkgs/pkgs/servers/atlassian/confluence.nix
index c9dcba28382..d7fb5b55468 100644
--- a/nixpkgs/pkgs/servers/atlassian/confluence.nix
+++ b/nixpkgs/pkgs/servers/atlassian/confluence.nix
@@ -5,11 +5,11 @@
stdenv.mkDerivation rec {
pname = "atlassian-confluence";
- version = "6.15.8";
+ version = "7.0.2";
src = fetchurl {
url = "https://product-downloads.atlassian.com/software/confluence/downloads/${pname}-${version}.tar.gz";
- sha256 = "17pcgjv6rj2jxzmwx82941zhrrmprkchjhnnadnxq4709zsyb4q3";
+ sha256 = "00ma2l6gknlpaf2k26md9fskgzcllky3vv89sb1izsrxl8la1dhq";
};
buildPhase = ''
diff --git a/nixpkgs/pkgs/servers/atlassian/jira.nix b/nixpkgs/pkgs/servers/atlassian/jira.nix
index 2b7117f419f..18c838a0b21 100644
--- a/nixpkgs/pkgs/servers/atlassian/jira.nix
+++ b/nixpkgs/pkgs/servers/atlassian/jira.nix
@@ -5,15 +5,13 @@
stdenv.mkDerivation rec {
pname = "atlassian-jira";
- version = "8.3.2";
+ version = "8.4.2";
src = fetchurl {
url = "https://product-downloads.atlassian.com/software/jira/downloads/atlassian-jira-software-${version}.tar.gz";
- sha256 = "0cqj7al9892psc5zqpfvj0gnjf8b4dpm2kx7sr21grczss1dkcs1";
+ sha256 = "0f0l9ss8jv06iidg8jw7yk5z42r1m0cbmlgj1wgli9a21ssp65sh";
};
- phases = [ "unpackPhase" "buildPhase" "installPhase" "fixupPhase" ];
-
buildPhase = ''
mv conf/server.xml conf/server.xml.dist
ln -sf /run/atlassian-jira/server.xml conf/server.xml
@@ -36,7 +34,7 @@ stdenv.mkDerivation rec {
meta = with stdenv.lib; {
description = "Proprietary issue tracking product, also providing project management functions";
- homepage = https://www.atlassian.com/software/jira;
+ homepage = "https://www.atlassian.com/software/jira";
license = licenses.unfree;
maintainers = with maintainers; [ fpletz globin ciil ];
};
diff --git a/nixpkgs/pkgs/servers/bird/default.nix b/nixpkgs/pkgs/servers/bird/default.nix
index d4b4441408e..13b5a19a751 100644
--- a/nixpkgs/pkgs/servers/bird/default.nix
+++ b/nixpkgs/pkgs/servers/bird/default.nix
@@ -47,18 +47,18 @@ in
{
bird = generic {
- version = "1.6.6";
- sha256 = "0w1dmwx89g3qdy92wkjl3p52rn521izm2m8yq74hs7myxxx3nnwp";
+ version = "1.6.8";
+ sha256 = "1ch0pkkhd7axdjlvhprynh9q08x0nm984nvkm1cjb7gm5rfsnqbc";
};
bird6 = generic {
- version = "1.6.6";
- sha256 = "0w1dmwx89g3qdy92wkjl3p52rn521izm2m8yq74hs7myxxx3nnwp";
+ version = "1.6.8";
+ sha256 = "1ch0pkkhd7axdjlvhprynh9q08x0nm984nvkm1cjb7gm5rfsnqbc";
enableIPv6 = true;
};
bird2 = generic {
- version = "2.0.5";
- sha256 = "1lr963ywy0mkrhgs5969wc354lizddsagrlbf8x84yb5s9pp6jsf";
+ version = "2.0.6";
+ sha256 = "1ankpxvmn12kzgv5vh7awnkj34jzjciy5baq3smkj079db74r4wh";
};
}
diff --git a/nixpkgs/pkgs/servers/clickhouse/default.nix b/nixpkgs/pkgs/servers/clickhouse/default.nix
index e48dec7d20c..6418bd917f1 100644
--- a/nixpkgs/pkgs/servers/clickhouse/default.nix
+++ b/nixpkgs/pkgs/servers/clickhouse/default.nix
@@ -1,24 +1,24 @@
{ stdenv, fetchFromGitHub, cmake, libtool
, boost, capnproto, cctz, clang-unwrapped, double-conversion, gperftools, icu
-, libcpuid, libxml2, lld, llvm, lz4 , mysql, openssl, poco, re2, rdkafka
+, libcpuid, libxml2, lld, llvm, lz4 , libmysqlclient, openssl, poco, re2, rdkafka
, readline, sparsehash, unixODBC, zstd, ninja, jemalloc, brotli, protobuf, xxHash
}:
stdenv.mkDerivation rec {
pname = "clickhouse";
- version = "19.13.1.11";
+ version = "19.13.5.44";
src = fetchFromGitHub {
owner = "yandex";
repo = "ClickHouse";
rev = "v${version}-stable";
- sha256 = "1j9jhgl2z84id5z6rbvyal7aha5v3m8pd393cmcsf1bf0fiz8qmc";
+ sha256 = "1h0jjpa1wrms5vcgx1vf8fmkc7jjrql1r70dvwr0nw8f7rfyi1l6";
};
nativeBuildInputs = [ cmake libtool ninja ];
buildInputs = [
boost capnproto cctz clang-unwrapped double-conversion gperftools icu
- libcpuid libxml2 lld llvm lz4 mysql.connector-c openssl poco re2 rdkafka
+ libcpuid libxml2 lld llvm lz4 libmysqlclient openssl poco re2 rdkafka
readline sparsehash unixODBC zstd jemalloc brotli protobuf xxHash
];
diff --git a/nixpkgs/pkgs/servers/computing/slurm/default.nix b/nixpkgs/pkgs/servers/computing/slurm/default.nix
index c448e4936f6..916c681ab16 100644
--- a/nixpkgs/pkgs/servers/computing/slurm/default.nix
+++ b/nixpkgs/pkgs/servers/computing/slurm/default.nix
@@ -1,6 +1,6 @@
{ stdenv, fetchFromGitHub, pkgconfig, libtool, curl
, python, munge, perl, pam, openssl, zlib
-, ncurses, mysql, gtk2, lua, hwloc, numactl
+, ncurses, libmysqlclient, gtk2, lua, hwloc, numactl
, readline, freeipmi, libssh2, xorg, lz4
# enable internal X11 support via libssh2
, enableX11 ? true
@@ -8,7 +8,7 @@
stdenv.mkDerivation rec {
pname = "slurm";
- version = "19.05.2.1";
+ version = "19.05.3.2";
# N.B. We use github release tags instead of https://www.schedmd.com/downloads.php
# because the latter does not keep older releases.
@@ -17,7 +17,7 @@ stdenv.mkDerivation rec {
repo = "slurm";
# The release tags use - instead of .
rev = "${pname}-${builtins.replaceStrings ["."] ["-"] version}";
- sha256 = "1k19z0qyjr6nwqxv93wbnnhy498788rc4fl9zyf0smc5yq1zbjir";
+ sha256 = "1ds4dvwswyx9rjcmcwz2fm2zi3q4gcc2n0fxxihl31i5i6wg1kv0";
};
outputs = [ "out" "dev" ];
@@ -35,7 +35,7 @@ stdenv.mkDerivation rec {
nativeBuildInputs = [ pkgconfig libtool ];
buildInputs = [
curl python munge perl pam openssl zlib
- mysql.connector-c ncurses gtk2 lz4
+ libmysqlclient ncurses gtk2 lz4
lua hwloc numactl readline freeipmi
] ++ stdenv.lib.optionals enableX11 [ libssh2 xorg.xauth ];
diff --git a/nixpkgs/pkgs/servers/dns/knot-resolver/default.nix b/nixpkgs/pkgs/servers/dns/knot-resolver/default.nix
index 22b1f2a67e2..3fe8499a58c 100644
--- a/nixpkgs/pkgs/servers/dns/knot-resolver/default.nix
+++ b/nixpkgs/pkgs/servers/dns/knot-resolver/default.nix
@@ -23,11 +23,11 @@ exportLuaPathsFor = luaPkgs: ''
unwrapped = stdenv.mkDerivation rec {
pname = "knot-resolver";
- version = "4.2.0";
+ version = "4.2.2";
src = fetchurl {
url = "https://secure.nic.cz/files/knot-resolver/${pname}-${version}.tar.xz";
- sha256 = "b37ff9ceefbaa4e4527d183fb1bbb63e641d34d9889ce92715128bc1423c7ef4";
+ sha256 = "03b68dff16429aed7a5b0cea7189276c8056e8ecd567b678c2595d48d9a51458";
};
# https://gitlab.labs.nic.cz/knot/knot-resolver/issues/496
diff --git a/nixpkgs/pkgs/servers/dns/powerdns/default.nix b/nixpkgs/pkgs/servers/dns/powerdns/default.nix
index 1b23f652021..5bfb06cb15b 100644
--- a/nixpkgs/pkgs/servers/dns/powerdns/default.nix
+++ b/nixpkgs/pkgs/servers/dns/powerdns/default.nix
@@ -5,11 +5,11 @@
stdenv.mkDerivation rec {
pname = "powerdns";
- version = "4.1.13";
+ version = "4.2.0";
src = fetchurl {
url = "https://downloads.powerdns.com/releases/pdns-${version}.tar.bz2";
- sha256 = "09az5yp5d9wvzw8faifyzsljhmmc8ifm4j70m4n2sr83i9i9rsp7";
+ sha256 = "0flhia156vir03np8va53rw31jsbg9wz3dyqqwddgai5bvr0f812";
};
nativeBuildInputs = [ pkgconfig ];
diff --git a/nixpkgs/pkgs/servers/documize-community/default.nix b/nixpkgs/pkgs/servers/documize-community/default.nix
index f06315b899d..af969c9e929 100644
--- a/nixpkgs/pkgs/servers/documize-community/default.nix
+++ b/nixpkgs/pkgs/servers/documize-community/default.nix
@@ -2,13 +2,13 @@
buildGoPackage rec {
pname = "documize-community";
- version = "3.3.0";
+ version = "3.3.1";
src = fetchFromGitHub {
owner = "documize";
repo = "community";
rev = "v${version}";
- sha256 = "1qkc82bvpmgcil88630pnp1irc2w8rzlh702vl0v67vfmawpxpjq";
+ sha256 = "1n7cdi76yfdk79ky7six72jg2px0b4hb9s16nshz3qvss469dn2j";
};
goPackagePath = "github.com/documize/community";
@@ -19,7 +19,7 @@ buildGoPackage rec {
runHook preBuild
pushd go/src/github.com/documize/community
- go build -gcflags="all=-trimpath=$GOPATH" -o bin/documize ./edition/community.go
+ GO111MODULE=off go build -gcflags="all=-trimpath=$GOPATH" -o bin/documize ./edition/community.go
popd
runHook postBuild
diff --git a/nixpkgs/pkgs/servers/fileshare/default.nix b/nixpkgs/pkgs/servers/fileshare/default.nix
new file mode 100644
index 00000000000..357237e1e29
--- /dev/null
+++ b/nixpkgs/pkgs/servers/fileshare/default.nix
@@ -0,0 +1,35 @@
+{ stdenv, lib, fetchgit, pkgconfig, git, libmicrohttpd }:
+
+stdenv.mkDerivation rec {
+ pname = "fileshare";
+ version = "0.2.4";
+
+ src = fetchgit {
+ url = https://git.tkolb.de/Public/fileshare.git;
+ rev = "v${version}";
+ sha256 = "03jrhk4vj6bc2w3lsrfjpfflb4laihysgs5i4cv097nr5cz32hyk";
+ };
+
+ postPatch = ''
+ sed -i 's,$(shell git rev-parse --short HEAD),/${version},g' Makefile
+ '';
+
+ nativeBuildInputs = [ pkgconfig git ];
+ buildInputs = [ libmicrohttpd ];
+
+ makeFlags = "BUILD=release";
+
+ installPhase = ''
+ mkdir -p $out/bin
+ cp bin/release/fileshare $out/bin
+ '';
+
+ meta = with stdenv.lib; {
+ description = "A small HTTP Server for quickly sharing files over the network";
+ longDescription = "Fileshare is a simple tool for sharing the contents of a directory via a webserver and optionally allowing uploads.";
+ homepage = https://git.tkolb.de/Public/fileshare;
+ license = licenses.mit;
+ maintainers = [ maintainers.esclear ];
+ platforms = platforms.linux;
+ };
+} \ No newline at end of file
diff --git a/nixpkgs/pkgs/servers/freeradius/default.nix b/nixpkgs/pkgs/servers/freeradius/default.nix
index 6c6eb2b0c09..eeea3298ecd 100644
--- a/nixpkgs/pkgs/servers/freeradius/default.nix
+++ b/nixpkgs/pkgs/servers/freeradius/default.nix
@@ -13,7 +13,7 @@
, withMemcached ? false
, hiredis
, withRedis ? false
-, mysql
+, libmysqlclient
, withMysql ? false
, json_c
, withJson ? false
@@ -31,7 +31,7 @@ assert withPcap -> libpcap != null;
assert withCap -> libcap != null;
assert withMemcached -> libmemcached != null;
assert withRedis -> hiredis != null;
-assert withMysql -> mysql != null;
+assert withMysql -> libmysqlclient != null;
assert withYubikey -> libyubikey != null;
assert withCollectd -> collectd != null;
assert withRest -> curl != null && withJson;
@@ -59,7 +59,7 @@ stdenv.mkDerivation rec {
++ optional withCap libcap
++ optional withMemcached libmemcached
++ optional withRedis hiredis
- ++ optional withMysql mysql.connector-c
+ ++ optional withMysql libmysqlclient
++ optional withJson json_c
++ optional withYubikey libyubikey
++ optional withCollectd collectd
diff --git a/nixpkgs/pkgs/servers/home-assistant/esphome.nix b/nixpkgs/pkgs/servers/home-assistant/esphome.nix
index 775731babd6..b5f6af3e483 100644
--- a/nixpkgs/pkgs/servers/home-assistant/esphome.nix
+++ b/nixpkgs/pkgs/servers/home-assistant/esphome.nix
@@ -1,4 +1,4 @@
-{ lib, python3, platformio, esptool, git, protobuf3_7 }:
+{ lib, python3, platformio, esptool, git, protobuf3_7, fetchpatch }:
let
python = python3.override {
@@ -18,11 +18,17 @@ let
in python.pkgs.buildPythonApplication rec {
pname = "esphome";
- version = "1.12.2";
+ version = "1.13.6";
src = python.pkgs.fetchPypi {
inherit pname version;
- sha256 = "935fc3d0f05b2f5911c29f60c9b5538bed584a31455b492944007d8b1524462c";
+ sha256 = "53148fc43c6cc6736cb7aa4cc1189caa305812061f55289ff916f8bd731ac623";
+ };
+
+ patches = fetchpatch {
+ url = https://github.com/esphome/esphome/pull/694.patch;
+ includes = [ "esphome/voluptuous_schema.py" ];
+ sha256 = "0i2v1d6mcgc94i9rkaqmls7iyfbaisdji41sfc7bh7cf2j824im9";
};
ESPHOME_USE_SUBPROCESS = "";
diff --git a/nixpkgs/pkgs/servers/http/lighttpd/default.nix b/nixpkgs/pkgs/servers/http/lighttpd/default.nix
index 7dacb997d47..f67bc5b0045 100644
--- a/nixpkgs/pkgs/servers/http/lighttpd/default.nix
+++ b/nixpkgs/pkgs/servers/http/lighttpd/default.nix
@@ -1,6 +1,6 @@
{ stdenv, buildPackages, fetchurl, pkgconfig, pcre, libxml2, zlib, bzip2, which, file
, openssl, enableMagnet ? false, lua5_1 ? null
-, enableMysql ? false, mysql ? null
+, enableMysql ? false, libmysqlclient ? null
, enableLdap ? false, openldap ? null
, enableWebDAV ? false, sqlite ? null, libuuid ? null
, enableExtendedAttrs ? false, attr ? null
@@ -8,7 +8,7 @@
}:
assert enableMagnet -> lua5_1 != null;
-assert enableMysql -> mysql != null;
+assert enableMysql -> libmysqlclient != null;
assert enableLdap -> openldap != null;
assert enableWebDAV -> sqlite != null;
assert enableWebDAV -> libuuid != null;
@@ -33,7 +33,7 @@ stdenv.mkDerivation rec {
nativeBuildInputs = [ pkgconfig ];
buildInputs = [ pcre pcre.dev libxml2 zlib bzip2 which file openssl ]
++ stdenv.lib.optional enableMagnet lua5_1
- ++ stdenv.lib.optional enableMysql mysql.connector-c
+ ++ stdenv.lib.optional enableMysql libmysqlclient
++ stdenv.lib.optional enableLdap openldap
++ stdenv.lib.optional enableWebDAV sqlite
++ stdenv.lib.optional enableWebDAV libuuid;
diff --git a/nixpkgs/pkgs/servers/http/openresty/default.nix b/nixpkgs/pkgs/servers/http/openresty/default.nix
index 3990c5de818..53773302963 100644
--- a/nixpkgs/pkgs/servers/http/openresty/default.nix
+++ b/nixpkgs/pkgs/servers/http/openresty/default.nix
@@ -5,11 +5,11 @@ with stdenv.lib;
stdenv.mkDerivation rec {
pname = "openresty";
- version = "1.15.8.1";
+ version = "1.15.8.2";
src = fetchurl {
url = "https://openresty.org/download/openresty-${version}.tar.gz";
- sha256 = "0hh8aygyzxgb0cyafqin70nbi87jpnjvxbf00dljssbpl66278c9";
+ sha256 = "05jxrb8hv758nm38jil8n63q1nhrz3d249bsrwc7maa7sn24wss3";
};
buildInputs = [ openssl zlib pcre libxml2 libxslt gd geoip postgresql ];
diff --git a/nixpkgs/pkgs/servers/http/tengine/default.nix b/nixpkgs/pkgs/servers/http/tengine/default.nix
index a7ea61de042..fac90fd0df6 100644
--- a/nixpkgs/pkgs/servers/http/tengine/default.nix
+++ b/nixpkgs/pkgs/servers/http/tengine/default.nix
@@ -102,5 +102,6 @@ stdenv.mkDerivation rec {
license = licenses.bsd2;
platforms = platforms.all;
maintainers = with maintainers; [ izorkin ];
+ broken = true;
};
}
diff --git a/nixpkgs/pkgs/servers/http/unit/default.nix b/nixpkgs/pkgs/servers/http/unit/default.nix
index 88a26a22917..f05d9c1ce8f 100644
--- a/nixpkgs/pkgs/servers/http/unit/default.nix
+++ b/nixpkgs/pkgs/servers/http/unit/default.nix
@@ -14,14 +14,14 @@
with stdenv.lib;
stdenv.mkDerivation rec {
- version = "1.11.0";
+ version = "1.12.0";
pname = "unit";
src = fetchFromGitHub {
owner = "nginx";
repo = "unit";
rev = version;
- sha256 = "05qplbwki8kcj0xy9d39gf8lhwwg2cx24waxd1q5cb0fq9a5hprm";
+ sha256 = "1ylzfsajjfaxzn7mycjs69ms4x58r4szpk07kqrmbf03dp2cmxkq";
};
nativeBuildInputs = [ which ];
diff --git a/nixpkgs/pkgs/servers/irc/charybdis/default.nix b/nixpkgs/pkgs/servers/irc/charybdis/default.nix
index dc053f4581c..c6b2af3d387 100644
--- a/nixpkgs/pkgs/servers/irc/charybdis/default.nix
+++ b/nixpkgs/pkgs/servers/irc/charybdis/default.nix
@@ -1,13 +1,13 @@
{ stdenv, fetchFromGitHub, autoreconfHook, bison, flex, openssl, gnutls }:
stdenv.mkDerivation rec {
- name = "charybdis-4.1.1";
+ name = "charybdis-4.1.2";
src = fetchFromGitHub {
owner = "charybdis-ircd";
repo = "charybdis";
rev = name;
- sha256 = "0wvssc8b1xq6svcqrwxrpc1ga8ip0sksv73wwbk8na0pmysdvpg0";
+ sha256 = "1lndk0yp27qm8bds4jd204ynxcq92fqmpfb0kkcla5zgky3miks3";
};
postPatch = ''
diff --git a/nixpkgs/pkgs/servers/jackett/default.nix b/nixpkgs/pkgs/servers/jackett/default.nix
index 6aaae932906..c5c97b51422 100644
--- a/nixpkgs/pkgs/servers/jackett/default.nix
+++ b/nixpkgs/pkgs/servers/jackett/default.nix
@@ -2,11 +2,11 @@
stdenv.mkDerivation rec {
pname = "jackett";
- version = "0.11.687";
+ version = "0.11.751";
src = fetchurl {
url = "https://github.com/Jackett/Jackett/releases/download/v${version}/Jackett.Binaries.LinuxAMDx64.tar.gz";
- sha256 = "0wq6rc12dn5yxa6yyabv234xw5nrsbvlrpgfjppvw3i4vy2cfzh9";
+ sha256 = "09y9pck35pj2g89936zallxr3hanmbgp8jc42nj2js68l0z64qz3";
};
buildInputs = [ makeWrapper ];
diff --git a/nixpkgs/pkgs/servers/jellyfin/default.nix b/nixpkgs/pkgs/servers/jellyfin/default.nix
index a0cb4dc2eaf..356ae7fee17 100644
--- a/nixpkgs/pkgs/servers/jellyfin/default.nix
+++ b/nixpkgs/pkgs/servers/jellyfin/default.nix
@@ -18,12 +18,12 @@ let
in stdenv.mkDerivation rec {
pname = "jellyfin";
- version = "10.3.7";
+ version = "10.4.0";
# Impossible to build anything offline with dotnet
src = fetchurl {
url = "https://github.com/jellyfin/jellyfin/releases/download/v${version}/jellyfin_${version}_portable.tar.gz";
- sha256 = "1lpd0dvf7x0wgl8bllqzk54nnbn9fj73jcsz292g7nip1ippgibl";
+ sha256 = "0a3n2g8xcxz9syj21v3f3jbzksw22bg0dksbakkvs1kphaygk5q2";
};
buildInputs = [
diff --git a/nixpkgs/pkgs/servers/ma1sd/0001-gradle.patch b/nixpkgs/pkgs/servers/ma1sd/0001-gradle.patch
new file mode 100644
index 00000000000..0980ec9a5df
--- /dev/null
+++ b/nixpkgs/pkgs/servers/ma1sd/0001-gradle.patch
@@ -0,0 +1,20 @@
+--- a/build.gradle 2019-09-01 16:17:17.815513296 +0200
++++ b/build.gradle 2019-09-01 16:21:14.688832785 +0200
+@@ -73,7 +73,7 @@
+
+ buildscript {
+ repositories {
+- jcenter()
++REPLACE
+ }
+
+ dependencies {
+@@ -83,7 +83,7 @@
+ }
+
+ repositories {
+- jcenter()
++REPLACE
+ }
+
+ dependencies {
diff --git a/nixpkgs/pkgs/servers/ma1sd/default.nix b/nixpkgs/pkgs/servers/ma1sd/default.nix
new file mode 100644
index 00000000000..f35bc3bb302
--- /dev/null
+++ b/nixpkgs/pkgs/servers/ma1sd/default.nix
@@ -0,0 +1,70 @@
+{ stdenv, fetchFromGitHub, jre, git, gradle_5, perl, makeWrapper }:
+
+let
+ name = "ma1sd-${version}";
+ version = "2.1.1";
+ rev = "a112a5e57cb38ad282939d2dcb9c1476e038af39";
+
+ src = fetchFromGitHub {
+ inherit rev;
+ owner = "ma1uta";
+ repo = "ma1sd";
+ sha256 = "1qibn6m6mvxwnbiypxlgkaqg6in358vkf0q47410rv1dx1gjcnv5";
+ };
+
+
+ deps = stdenv.mkDerivation {
+ name = "${name}-deps";
+ inherit src;
+ nativeBuildInputs = [ gradle_5 perl git ];
+
+ buildPhase = ''
+ export MA1SD_BUILD_VERSION=${rev}
+ export GRADLE_USER_HOME=$(mktemp -d);
+ gradle --no-daemon build -x test
+ '';
+
+ # perl code mavenizes pathes (com.squareup.okio/okio/1.13.0/a9283170b7305c8d92d25aff02a6ab7e45d06cbe/okio-1.13.0.jar -> com/squareup/okio/okio/1.13.0/okio-1.13.0.jar)
+ installPhase = ''
+ find $GRADLE_USER_HOME/caches/modules-2 -type f -regex '.*\.\(jar\|pom\)' \
+ | perl -pe 's#(.*/([^/]+)/([^/]+)/([^/]+)/[0-9a-f]{30,40}/([^/\s]+))$# ($x = $2) =~ tr|\.|/|; "install -Dm444 $1 \$out/$x/$3/$4/$5" #e' \
+ | sh
+ '';
+
+ dontStrip = true;
+
+ outputHashAlgo = "sha256";
+ outputHashMode = "recursive";
+ outputHash = "1w9cxq0rlzyh7bzqr3v3vn2cjhpn7hhc5lk9qzwj7sdj4jn2qxq6";
+ };
+
+in
+stdenv.mkDerivation {
+ inherit name src version;
+ nativeBuildInputs = [ gradle_5 perl makeWrapper ];
+ buildInputs = [ jre ];
+
+ patches = [ ./0001-gradle.patch ];
+
+ buildPhase = ''
+ export MA1SD_BUILD_VERSION=${rev}
+ export GRADLE_USER_HOME=$(mktemp -d)
+
+ sed -ie "s#REPLACE#mavenLocal(); maven { url '${deps}' }#g" build.gradle
+ gradle --offline --no-daemon build -x test
+ '';
+
+ installPhase = ''
+ install -D build/libs/source.jar $out/lib/ma1sd.jar
+ makeWrapper ${jre}/bin/java $out/bin/ma1sd --add-flags "-jar $out/lib/ma1sd.jar"
+ '';
+
+ meta = with stdenv.lib; {
+ description = "a federated matrix identity server; fork of mxisd";
+ homepage = https://github.com/ma1uta/ma1sd;
+ license = licenses.agpl3;
+ maintainers = with maintainers; [ mguentner ];
+ platforms = platforms.all;
+ };
+
+}
diff --git a/nixpkgs/pkgs/servers/mail/dovecot/default.nix b/nixpkgs/pkgs/servers/mail/dovecot/default.nix
index e3afd1f9879..35c274eff25 100644
--- a/nixpkgs/pkgs/servers/mail/dovecot/default.nix
+++ b/nixpkgs/pkgs/servers/mail/dovecot/default.nix
@@ -3,25 +3,25 @@
, clucene_core_2, icu, openldap, libsodium, libstemmer, cyrus_sasl
, nixosTests
# Auth modules
-, withMySQL ? false, mysql
+, withMySQL ? false, libmysqlclient
, withPgSQL ? false, postgresql
, withSQLite ? true, sqlite
}:
stdenv.mkDerivation rec {
- name = "dovecot-2.3.7.2";
+ name = "dovecot-2.3.8";
nativeBuildInputs = [ perl pkgconfig ];
buildInputs =
[ openssl bzip2 zlib lz4 clucene_core_2 icu openldap libsodium libstemmer cyrus_sasl.dev ]
++ lib.optionals (stdenv.isLinux) [ systemd pam libcap inotify-tools ]
- ++ lib.optional withMySQL mysql.connector-c
+ ++ lib.optional withMySQL libmysqlclient
++ lib.optional withPgSQL postgresql
++ lib.optional withSQLite sqlite;
src = fetchurl {
url = "https://dovecot.org/releases/2.3/${name}.tar.gz";
- sha256 = "0q0jgcv3ni2znkgyhc966ffphj1wk73y76wssh0yciqafs2f0v36";
+ sha256 = "0jdng27hqqagjy6v7ymd0xflbv5dbc1rhh450nk39ar6pw1qsxy5";
};
enableParallelBuilding = true;
diff --git a/nixpkgs/pkgs/servers/mail/dovecot/plugins/pigeonhole/default.nix b/nixpkgs/pkgs/servers/mail/dovecot/plugins/pigeonhole/default.nix
index b7d791f3416..4184771f8a8 100644
--- a/nixpkgs/pkgs/servers/mail/dovecot/plugins/pigeonhole/default.nix
+++ b/nixpkgs/pkgs/servers/mail/dovecot/plugins/pigeonhole/default.nix
@@ -2,11 +2,11 @@
stdenv.mkDerivation rec {
pname = "dovecot-pigeonhole";
- version = "0.5.7.2";
+ version = "0.5.8";
src = fetchurl {
url = "https://pigeonhole.dovecot.org/releases/2.3/dovecot-2.3-pigeonhole-${version}.tar.gz";
- sha256 = "1c0ijjmdskxydmvfk8ixxgg8ndnxx1smvycbp7jjd895a9f0r7fm";
+ sha256 = "08lhfl877xm790f1mqdhvz74xqr2kkl8wpz2m6p0j6hv1kan1f4g";
};
buildInputs = [ dovecot openssl ];
diff --git a/nixpkgs/pkgs/servers/mail/exim/default.nix b/nixpkgs/pkgs/servers/mail/exim/default.nix
index fcafd5817d4..dd4d1850b59 100644
--- a/nixpkgs/pkgs/servers/mail/exim/default.nix
+++ b/nixpkgs/pkgs/servers/mail/exim/default.nix
@@ -1,23 +1,23 @@
{ coreutils, db, fetchurl, openssl, pcre, perl, pkgconfig, stdenv
, enableLDAP ? false, openldap
-, enableMySQL ? false, mysql, zlib
+, enableMySQL ? false, libmysqlclient, zlib
, enableAuthDovecot ? false, dovecot
, enablePAM ? false, pam
, enableSPF ? true, libspf2
}:
stdenv.mkDerivation rec {
- name = "exim-4.92.2";
+ name = "exim-4.92.3";
src = fetchurl {
url = "https://ftp.exim.org/pub/exim/exim4/${name}.tar.xz";
- sha256 = "0m56jsh2fzvwj4rdpcc3pkd5vsi40cjrpzalis7l1zq33m4axmq1";
+ sha256 = "1zfj4zblv5881qxpzkrg3f6a96pbcq270s9p6p1w85lfxjsknif4";
};
nativeBuildInputs = [ pkgconfig ];
buildInputs = [ coreutils db openssl perl pcre ]
++ stdenv.lib.optional enableLDAP openldap
- ++ stdenv.lib.optionals enableMySQL [ mysql.connector-c zlib ]
+ ++ stdenv.lib.optionals enableMySQL [ libmysqlclient zlib ]
++ stdenv.lib.optional enableAuthDovecot dovecot
++ stdenv.lib.optional enablePAM pam
++ stdenv.lib.optional enableSPF libspf2;
@@ -53,10 +53,10 @@ stdenv.mkDerivation rec {
''}
${stdenv.lib.optionalString enableMySQL ''
s:^# \(LOOKUP_MYSQL=yes\)$:\1:
- s:^# \(LOOKUP_MYSQL_PC=mysql.connector-c\)$:\1:
- s:^\(LOOKUP_LIBS\)=\(.*\):\1=\2 -lmysqlclient -L${mysql.connector-c}/lib/mysql -lssl -ldl -lm -lpthread -lz:
- s:^# \(LOOKUP_LIBS\)=.*:\1=-lmysqlclient -L${mysql.connector-c}/lib/mysql -lssl -ldl -lm -lpthread -lz:
- s:^# \(LOOKUP_INCLUDE\)=.*:\1=-I${mysql.connector-c}/include/mysql/:
+ s:^# \(LOOKUP_MYSQL_PC=libmysqlclient\)$:\1:
+ s:^\(LOOKUP_LIBS\)=\(.*\):\1=\2 -lmysqlclient -L${libmysqlclient}/lib/mysql -lssl -ldl -lm -lpthread -lz:
+ s:^# \(LOOKUP_LIBS\)=.*:\1=-lmysqlclient -L${libmysqlclient}/lib/mysql -lssl -ldl -lm -lpthread -lz:
+ s:^# \(LOOKUP_INCLUDE\)=.*:\1=-I${libmysqlclient}/include/mysql/:
''}
${stdenv.lib.optionalString enableAuthDovecot ''
s:^# \(AUTH_DOVECOT\)=.*:\1=yes:
diff --git a/nixpkgs/pkgs/servers/mail/opensmtpd/extras.nix b/nixpkgs/pkgs/servers/mail/opensmtpd/extras.nix
index 71b27facbab..f7ed6382a7b 100644
--- a/nixpkgs/pkgs/servers/mail/opensmtpd/extras.nix
+++ b/nixpkgs/pkgs/servers/mail/opensmtpd/extras.nix
@@ -1,5 +1,5 @@
{ stdenv, fetchurl, openssl, libevent, libasr,
- python2, pkgconfig, lua5, perl, mysql, postgresql, sqlite, hiredis,
+ python2, pkgconfig, lua5, perl, libmysqlclient, postgresql, sqlite, hiredis,
enablePython ? true,
enableLua ? true,
enablePerl ? true,
@@ -20,7 +20,7 @@ stdenv.mkDerivation rec {
nativeBuildInputs = [ pkgconfig ];
buildInputs = [ openssl libevent
- libasr python2 lua5 perl mysql.connector-c postgresql sqlite hiredis ];
+ libasr python2 lua5 perl libmysqlclient postgresql sqlite hiredis ];
configureFlags = [
"--sysconfdir=/etc"
@@ -80,7 +80,7 @@ stdenv.mkDerivation rec {
stdenv.lib.optional enableRedis
"-I${hiredis}/include/hiredis -lhiredis"
++ stdenv.lib.optional enableMysql
- "-L${mysql.connector-c}/lib/mysql";
+ "-L${libmysqlclient}/lib/mysql";
meta = with stdenv.lib; {
homepage = https://www.opensmtpd.org/;
diff --git a/nixpkgs/pkgs/servers/mail/postfix/default.nix b/nixpkgs/pkgs/servers/mail/postfix/default.nix
index 39845f12f03..8b6a46b9657 100644
--- a/nixpkgs/pkgs/servers/mail/postfix/default.nix
+++ b/nixpkgs/pkgs/servers/mail/postfix/default.nix
@@ -3,7 +3,7 @@
, buildPackages
, withLDAP ? true, openldap
, withPgSQL ? false, postgresql
-, withMySQL ? false, mysql
+, withMySQL ? false, libmysqlclient
, withSQLite ? false, sqlite
}:
@@ -12,7 +12,7 @@ let
"-DUSE_TLS" "-DUSE_SASL_AUTH" "-DUSE_CYRUS_SASL" "-I${cyrus_sasl.dev}/include/sasl"
"-DHAS_DB_BYPASS_MAKEDEFS_CHECK"
] ++ lib.optional withPgSQL "-DHAS_PGSQL"
- ++ lib.optionals withMySQL [ "-DHAS_MYSQL" "-I${mysql.connector-c}/include/mysql" "-L${mysql.connector-c}/lib/mysql" ]
+ ++ lib.optionals withMySQL [ "-DHAS_MYSQL" "-I${libmysqlclient}/include/mysql" "-L${libmysqlclient}/lib/mysql" ]
++ lib.optional withSQLite "-DHAS_SQLITE"
++ lib.optionals withLDAP ["-DHAS_LDAP" "-DUSE_LDAP_SASL"]);
auxlibs = lib.concatStringsSep " " ([
@@ -26,17 +26,17 @@ in stdenv.mkDerivation rec {
pname = "postfix";
- version = "3.4.6";
+ version = "3.4.7";
src = fetchurl {
url = "ftp://ftp.cs.uu.nl/mirror/postfix/postfix-release/official/${pname}-${version}.tar.gz";
- sha256 = "09p3vg2xlh6iq45gp6zanbp1728fc31r7zz71r131vh20ssajx6n";
+ sha256 = "0rzr0n1gljhmxidsslbr9505xcv0hm8jahkp4dm87a1v3l956cpy";
};
nativeBuildInputs = [ makeWrapper m4 ];
buildInputs = [ db openssl cyrus_sasl icu libnsl pcre ]
++ lib.optional withPgSQL postgresql
- ++ lib.optional withMySQL mysql.connector-c
+ ++ lib.optional withMySQL libmysqlclient
++ lib.optional withSQLite sqlite
++ lib.optional withLDAP openldap;
diff --git a/nixpkgs/pkgs/servers/memcached/default.nix b/nixpkgs/pkgs/servers/memcached/default.nix
index a9873261d78..bd1acd36278 100644
--- a/nixpkgs/pkgs/servers/memcached/default.nix
+++ b/nixpkgs/pkgs/servers/memcached/default.nix
@@ -1,12 +1,12 @@
{stdenv, fetchurl, cyrus_sasl, libevent}:
stdenv.mkDerivation rec {
- version = "1.5.16";
+ version = "1.5.18";
pname = "memcached";
src = fetchurl {
url = "https://memcached.org/files/${pname}-${version}.tar.gz";
- sha256 = "0nnccb697jhdn5gqrh3phibzs6xr4nf4ryv7nmyv5vf11n4jr8j5";
+ sha256 = "127g4l0ilb376dpgz6qby24vc72ban35c938dzmp1nh6bdqddgcy";
};
configureFlags = [
diff --git a/nixpkgs/pkgs/servers/monitoring/do-agent/default.nix b/nixpkgs/pkgs/servers/monitoring/do-agent/default.nix
new file mode 100644
index 00000000000..572535b7fcd
--- /dev/null
+++ b/nixpkgs/pkgs/servers/monitoring/do-agent/default.nix
@@ -0,0 +1,33 @@
+{ lib, buildGoModule, fetchFromGitHub }:
+
+buildGoModule rec {
+ pname = "do-agent";
+ version = "3.5.6";
+
+ src = fetchFromGitHub {
+ owner = "digitalocean";
+ repo = "do-agent";
+ rev = "${version}";
+ sha256 = "1gl034cslqa30fqy2p9rymgx398s1rcgbmfvzk5zjlrw47327k8i";
+ };
+
+ buildFlagsArray = ''
+ -ldflags=
+ -X main.version=${version}
+ '';
+
+ modSha256 = "164bwqg996097db399j7lar6gj9xpshjdmyapvzg7zh655xlkf3d";
+
+ meta = with lib; {
+ description = "DigitalOcean droplet system metrics agent";
+ longDescription = ''
+ do-agent is a program provided by DigitalOcean that collects system
+ metrics from a DigitalOcean Droplet (on which the program runs) and sends
+ them to DigitalOcean to provide resource usage graphs and alerting.
+ '';
+ homepage = https://github.com/digitalocean/do-agent;
+ license = licenses.asl20;
+ maintainers = with maintainers; [ yvt ];
+ platforms = platforms.linux;
+ };
+}
diff --git a/nixpkgs/pkgs/servers/monitoring/grafana/default.nix b/nixpkgs/pkgs/servers/monitoring/grafana/default.nix
index 3d61961321d..658c7ad816e 100644
--- a/nixpkgs/pkgs/servers/monitoring/grafana/default.nix
+++ b/nixpkgs/pkgs/servers/monitoring/grafana/default.nix
@@ -2,7 +2,7 @@
buildGoPackage rec {
pname = "grafana";
- version = "6.3.6";
+ version = "6.4.2";
goPackagePath = "github.com/grafana/grafana";
@@ -12,12 +12,12 @@ buildGoPackage rec {
rev = "v${version}";
owner = "grafana";
repo = "grafana";
- sha256 = "1dxsd32ny7wcpfyhhdf5m6anzgs0mkyvlrha7ps5pfyiix7brrlk";
+ sha256 = "12j0lksryggn7lg003ma2cnblclgzdw6b8rhz1wbq8d68m1mq5wv";
};
srcStatic = fetchurl {
url = "https://dl.grafana.com/oss/release/grafana-${version}.linux-amd64.tar.gz";
- sha256 = "0cz6bg8q8lxxvqh9nb2b64rr5brkmbvpvvg4x7dykc04vcjivf6n";
+ sha256 = "0ch35h681yq5w7cpys0iiv3kva9hiqxzgk2gp0vcnadzmincwj7c";
};
postPatch = ''
diff --git a/nixpkgs/pkgs/servers/monitoring/nagios/default.nix b/nixpkgs/pkgs/servers/monitoring/nagios/default.nix
index 475d79a090a..693e67ee6dd 100644
--- a/nixpkgs/pkgs/servers/monitoring/nagios/default.nix
+++ b/nixpkgs/pkgs/servers/monitoring/nagios/default.nix
@@ -2,11 +2,11 @@
stdenv.mkDerivation rec {
pname = "nagios";
- version = "4.4.4";
+ version = "4.4.5";
src = fetchurl {
url = "mirror://sourceforge/nagios/nagios-4.x/${pname}-${version}/${pname}-${version}.tar.gz";
- sha256 = "0nkbv8lzpiknddiq0466dlpp3hw8lqmaidk8931hp4664cdsaw57";
+ sha256 = "079rgi3dqdg6h511c96hrch62rxsap9p4x37hm2nj672zb9f4sdz";
};
patches = [ ./nagios.patch ];
diff --git a/nixpkgs/pkgs/servers/monitoring/plugins/default.nix b/nixpkgs/pkgs/servers/monitoring/plugins/default.nix
index 9f23cc3e54c..62f40b59d37 100644
--- a/nixpkgs/pkgs/servers/monitoring/plugins/default.nix
+++ b/nixpkgs/pkgs/servers/monitoring/plugins/default.nix
@@ -1,6 +1,6 @@
{ stdenv, fetchFromGitHub, fetchpatch, autoreconfHook
, coreutils, gnugrep, gnused, lm_sensors, net_snmp, openssh, openssl, perl
-, dnsutils, libdbi, mysql, zlib, openldap, procps
+, dnsutils, libdbi, libmysqlclient, zlib, openldap, procps
, runtimeShell }:
with stdenv.lib;
@@ -48,7 +48,7 @@ in stdenv.mkDerivation {
'';
# !!! make openssh a runtime dependency only
- buildInputs = [ dnsutils libdbi mysql net_snmp openldap openssh openssl perl procps zlib ];
+ buildInputs = [ dnsutils libdbi libmysqlclient net_snmp openldap openssh openssl perl procps zlib ];
nativeBuildInputs = [ autoreconfHook ];
diff --git a/nixpkgs/pkgs/servers/monitoring/prometheus/alertmanager.nix b/nixpkgs/pkgs/servers/monitoring/prometheus/alertmanager.nix
index f1dbf0e5144..5ad5cfc0613 100644
--- a/nixpkgs/pkgs/servers/monitoring/prometheus/alertmanager.nix
+++ b/nixpkgs/pkgs/servers/monitoring/prometheus/alertmanager.nix
@@ -2,7 +2,7 @@
buildGoPackage rec {
pname = "alertmanager";
- version = "0.18.0";
+ version = "0.19.0";
rev = "v${version}";
goPackagePath = "github.com/prometheus/alertmanager";
@@ -11,7 +11,7 @@ buildGoPackage rec {
inherit rev;
owner = "prometheus";
repo = "alertmanager";
- sha256 = "17f3a4fiwycpd031k1d9irhd96cklbh2ygs35j5r6hgw2130sy4p";
+ sha256 = "08k898x9ks5rzcmb7ps1rnxv36ynv64x8yq2ahpwmfkmv6nw1ylh";
};
buildFlagsArray = let t = "${goPackagePath}/vendor/github.com/prometheus/common/version"; in ''
diff --git a/nixpkgs/pkgs/servers/monitoring/prometheus/nextcloud-exporter-deps.nix b/nixpkgs/pkgs/servers/monitoring/prometheus/nextcloud-exporter-deps.nix
new file mode 100644
index 00000000000..bca32bdeccf
--- /dev/null
+++ b/nixpkgs/pkgs/servers/monitoring/prometheus/nextcloud-exporter-deps.nix
@@ -0,0 +1,300 @@
+# file generated from go.mod using vgo2nix (https://github.com/adisbladis/vgo2nix)
+[
+ {
+ goPackagePath = "github.com/beorn7/perks";
+ fetch = {
+ type = "git";
+ url = "https://github.com/beorn7/perks";
+ rev = "v1.0.1";
+ sha256 = "17n4yygjxa6p499dj3yaqzfww2g7528165cl13haj97hlx94dgl7";
+ };
+ }
+ {
+ goPackagePath = "github.com/davecgh/go-spew";
+ fetch = {
+ type = "git";
+ url = "https://github.com/davecgh/go-spew";
+ rev = "v1.1.1";
+ sha256 = "0hka6hmyvp701adzag2g26cxdj47g21x6jz4sc6jjz1mn59d474y";
+ };
+ }
+ {
+ goPackagePath = "github.com/go-kit/kit";
+ fetch = {
+ type = "git";
+ url = "https://github.com/go-kit/kit";
+ rev = "v0.8.0";
+ sha256 = "1rcywbc2pvab06qyf8pc2rdfjv7r6kxdv2v4wnpqnjhz225wqvc0";
+ };
+ }
+ {
+ goPackagePath = "github.com/go-logfmt/logfmt";
+ fetch = {
+ type = "git";
+ url = "https://github.com/go-logfmt/logfmt";
+ rev = "v0.4.0";
+ sha256 = "06smxc112xmixz78nyvk3b2hmc7wasf2sl5vxj1xz62kqcq9lzm9";
+ };
+ }
+ {
+ goPackagePath = "github.com/golang/protobuf";
+ fetch = {
+ type = "git";
+ url = "https://github.com/golang/protobuf";
+ rev = "v1.3.2";
+ sha256 = "1k1wb4zr0qbwgpvz9q5ws9zhlal8hq7dmq62pwxxriksayl6hzym";
+ };
+ }
+ {
+ goPackagePath = "github.com/google/go-cmp";
+ fetch = {
+ type = "git";
+ url = "https://github.com/google/go-cmp";
+ rev = "v0.3.0";
+ sha256 = "1hyxx3434zshl2m9ja78gwlkg1rx9yl6diqa7dnjb31xz5x4gbjj";
+ };
+ }
+ {
+ goPackagePath = "github.com/google/gofuzz";
+ fetch = {
+ type = "git";
+ url = "https://github.com/google/gofuzz";
+ rev = "v1.0.0";
+ sha256 = "0qz439qvccm91w0mmjz4fqgx48clxdwagkvvx89cr43q1d4iry36";
+ };
+ }
+ {
+ goPackagePath = "github.com/json-iterator/go";
+ fetch = {
+ type = "git";
+ url = "https://github.com/json-iterator/go";
+ rev = "v1.1.7";
+ sha256 = "0n79p4s67zl5zprxv7diayw3vavnmmfqkmd6snz0i9bxp825dsyz";
+ };
+ }
+ {
+ goPackagePath = "github.com/julienschmidt/httprouter";
+ fetch = {
+ type = "git";
+ url = "https://github.com/julienschmidt/httprouter";
+ rev = "v1.2.0";
+ sha256 = "1k8bylc9s4vpvf5xhqh9h246dl1snxrzzz0614zz88cdh8yzs666";
+ };
+ }
+ {
+ goPackagePath = "github.com/konsorten/go-windows-terminal-sequences";
+ fetch = {
+ type = "git";
+ url = "https://github.com/konsorten/go-windows-terminal-sequences";
+ rev = "v1.0.1";
+ sha256 = "1lchgf27n276vma6iyxa0v1xds68n2g8lih5lavqnx5x6q5pw2ip";
+ };
+ }
+ {
+ goPackagePath = "github.com/kr/logfmt";
+ fetch = {
+ type = "git";
+ url = "https://github.com/kr/logfmt";
+ rev = "b84e30acd515";
+ sha256 = "02ldzxgznrfdzvghfraslhgp19la1fczcbzh7wm2zdc6lmpd1qq9";
+ };
+ }
+ {
+ goPackagePath = "github.com/matttproud/golang_protobuf_extensions";
+ fetch = {
+ type = "git";
+ url = "https://github.com/matttproud/golang_protobuf_extensions";
+ rev = "v1.0.1";
+ sha256 = "1d0c1isd2lk9pnfq2nk0aih356j30k3h1gi2w0ixsivi5csl7jya";
+ };
+ }
+ {
+ goPackagePath = "github.com/modern-go/concurrent";
+ fetch = {
+ type = "git";
+ url = "https://github.com/modern-go/concurrent";
+ rev = "bacd9c7ef1dd";
+ sha256 = "0s0fxccsyb8icjmiym5k7prcqx36hvgdwl588y0491gi18k5i4zs";
+ };
+ }
+ {
+ goPackagePath = "github.com/modern-go/reflect2";
+ fetch = {
+ type = "git";
+ url = "https://github.com/modern-go/reflect2";
+ rev = "v1.0.1";
+ sha256 = "06a3sablw53n1dqqbr2f53jyksbxdmmk8axaas4yvnhyfi55k4lf";
+ };
+ }
+ {
+ goPackagePath = "github.com/mwitkow/go-conntrack";
+ fetch = {
+ type = "git";
+ url = "https://github.com/mwitkow/go-conntrack";
+ rev = "cc309e4a2223";
+ sha256 = "0nbrnpk7bkmqg9mzwsxlm0y8m7s9qd9phr1q30qlx2qmdmz7c1mf";
+ };
+ }
+ {
+ goPackagePath = "github.com/pkg/errors";
+ fetch = {
+ type = "git";
+ url = "https://github.com/pkg/errors";
+ rev = "v0.8.0";
+ sha256 = "001i6n71ghp2l6kdl3qq1v2vmghcz3kicv9a5wgcihrzigm75pp5";
+ };
+ }
+ {
+ goPackagePath = "github.com/pmezard/go-difflib";
+ fetch = {
+ type = "git";
+ url = "https://github.com/pmezard/go-difflib";
+ rev = "v1.0.0";
+ sha256 = "0c1cn55m4rypmscgf0rrb88pn58j3ysvc2d0432dp3c6fqg6cnzw";
+ };
+ }
+ {
+ goPackagePath = "github.com/prometheus/client_golang";
+ fetch = {
+ type = "git";
+ url = "https://github.com/prometheus/client_golang";
+ rev = "v1.1.0";
+ sha256 = "1r0irxkmfnj6ininb06w6ybknini5lz02idawrbkk2i5lq1qcvvf";
+ };
+ }
+ {
+ goPackagePath = "github.com/prometheus/client_model";
+ fetch = {
+ type = "git";
+ url = "https://github.com/prometheus/client_model";
+ rev = "14fe0d1b01d4";
+ sha256 = "0zdmk6rbbx39cvfz0r59v2jg5sg9yd02b4pds5n5llgvivi99550";
+ };
+ }
+ {
+ goPackagePath = "github.com/prometheus/common";
+ fetch = {
+ type = "git";
+ url = "https://github.com/prometheus/common";
+ rev = "v0.6.0";
+ sha256 = "1q16br348117ffycxdwsldb0i39p34miclfa8z93k6vjwnrqbh2l";
+ };
+ }
+ {
+ goPackagePath = "github.com/prometheus/procfs";
+ fetch = {
+ type = "git";
+ url = "https://github.com/prometheus/procfs";
+ rev = "v0.0.3";
+ sha256 = "18c4m795fwng8f8qa395f3crvamlbk5y5afk8b5rzyisnmjq774y";
+ };
+ }
+ {
+ goPackagePath = "github.com/sirupsen/logrus";
+ fetch = {
+ type = "git";
+ url = "https://github.com/sirupsen/logrus";
+ rev = "v1.2.0";
+ sha256 = "0r6334x2bls8ddznvzaldx4g88msjjns4mlks95rqrrg7h0ijigg";
+ };
+ }
+ {
+ goPackagePath = "github.com/spf13/pflag";
+ fetch = {
+ type = "git";
+ url = "https://github.com/spf13/pflag";
+ rev = "v1.0.3";
+ sha256 = "1cj3cjm7d3zk0mf1xdybh0jywkbbw7a6yr3y22x9sis31scprswd";
+ };
+ }
+ {
+ goPackagePath = "github.com/stretchr/objx";
+ fetch = {
+ type = "git";
+ url = "https://github.com/stretchr/objx";
+ rev = "v0.1.1";
+ sha256 = "0iph0qmpyqg4kwv8jsx6a56a7hhqq8swrazv40ycxk9rzr0s8yls";
+ };
+ }
+ {
+ goPackagePath = "github.com/stretchr/testify";
+ fetch = {
+ type = "git";
+ url = "https://github.com/stretchr/testify";
+ rev = "v1.3.0";
+ sha256 = "0wjchp2c8xbgcbbq32w3kvblk6q6yn533g78nxl6iskq6y95lxsy";
+ };
+ }
+ {
+ goPackagePath = "golang.org/x/crypto";
+ fetch = {
+ type = "git";
+ url = "https://go.googlesource.com/crypto";
+ rev = "c2843e01d9a2";
+ sha256 = "01xgxbj5r79nmisdvpq48zfy8pzaaj90bn6ngd4nf33j9ar1dp8r";
+ };
+ }
+ {
+ goPackagePath = "golang.org/x/net";
+ fetch = {
+ type = "git";
+ url = "https://go.googlesource.com/net";
+ rev = "d28f0bde5980";
+ sha256 = "18xj31h70m7xxb7gc86n9i21w6d7djbjz67zfaljm4jqskz6hxkf";
+ };
+ }
+ {
+ goPackagePath = "golang.org/x/sync";
+ fetch = {
+ type = "git";
+ url = "https://go.googlesource.com/sync";
+ rev = "37e7f081c4d4";
+ sha256 = "1bb0mw6ckb1k7z8v3iil2qlqwfj408fvvp8m1cik2b46p7snyjhm";
+ };
+ }
+ {
+ goPackagePath = "golang.org/x/sys";
+ fetch = {
+ type = "git";
+ url = "https://go.googlesource.com/sys";
+ rev = "4e8604ab3aff";
+ sha256 = "1y4nvb8xqk3gzmkk3pc0bdphxbnphz71cld9i6f75js01pggaspc";
+ };
+ }
+ {
+ goPackagePath = "golang.org/x/text";
+ fetch = {
+ type = "git";
+ url = "https://go.googlesource.com/text";
+ rev = "v0.3.0";
+ sha256 = "0r6x6zjzhr8ksqlpiwm5gdd7s209kwk5p4lw54xjvz10cs3qlq19";
+ };
+ }
+ {
+ goPackagePath = "gopkg.in/alecthomas/kingpin.v2";
+ fetch = {
+ type = "git";
+ url = "https://gopkg.in/alecthomas/kingpin.v2";
+ rev = "v2.2.6";
+ sha256 = "0mndnv3hdngr3bxp7yxfd47cas4prv98sqw534mx7vp38gd88n5r";
+ };
+ }
+ {
+ goPackagePath = "gopkg.in/check.v1";
+ fetch = {
+ type = "git";
+ url = "https://gopkg.in/check.v1";
+ rev = "20d25e280405";
+ sha256 = "0k1m83ji9l1a7ng8a7v40psbymxasmssbrrhpdv2wl4rhs0nc3np";
+ };
+ }
+ {
+ goPackagePath = "gopkg.in/yaml.v2";
+ fetch = {
+ type = "git";
+ url = "https://gopkg.in/yaml.v2";
+ rev = "v2.2.1";
+ sha256 = "0dwjrs2lp2gdlscs7bsrmyc5yf6mm4fvgw71bzr9mv2qrd2q73s1";
+ };
+ }
+]
diff --git a/nixpkgs/pkgs/servers/monitoring/prometheus/nextcloud-exporter.nix b/nixpkgs/pkgs/servers/monitoring/prometheus/nextcloud-exporter.nix
new file mode 100644
index 00000000000..61b891fa3a9
--- /dev/null
+++ b/nixpkgs/pkgs/servers/monitoring/prometheus/nextcloud-exporter.nix
@@ -0,0 +1,27 @@
+{ lib, fetchFromGitHub, buildGoPackage }:
+
+buildGoPackage {
+ pname = "prometheus-nextcloud-exporter";
+ version = "unstable-2019-10-12";
+
+ src = fetchFromGitHub {
+ owner = "xperimental";
+ repo = "nextcloud-exporter";
+ rev = "215c8b6b2daa3125798d883fe222bc419240e7ab";
+ sha256 = "1xpc6q6zp92ckkyd24cfl65vyzjv60qwh44ys6mza4k6yrxhacv4";
+ };
+
+ goPackagePath = "github.com/xperimental/nextcloud-exporter";
+
+ goDeps = ./nextcloud-exporter-deps.nix;
+
+ doCheck = true;
+
+ meta = with lib; {
+ description = "Prometheus exporter for Nextcloud servers.";
+ homepage = "https://github.com/xperimental/nextcloud-exporter";
+ license = licenses.mit;
+ maintainers = with maintainers; [ willibutz ];
+ platforms = platforms.unix;
+ };
+}
diff --git a/nixpkgs/pkgs/servers/monitoring/prometheus/wireguard-exporter.nix b/nixpkgs/pkgs/servers/monitoring/prometheus/wireguard-exporter.nix
index 80fe9b2357f..249a3f8a089 100644
--- a/nixpkgs/pkgs/servers/monitoring/prometheus/wireguard-exporter.nix
+++ b/nixpkgs/pkgs/servers/monitoring/prometheus/wireguard-exporter.nix
@@ -2,16 +2,16 @@
rustPlatform.buildRustPackage rec {
pname = "wireguard-exporter";
- version = "3.0.1";
+ version = "3.1.1";
src = fetchFromGitHub {
owner = "MindFlavor";
repo = "prometheus_wireguard_exporter";
rev = version;
- sha256 = "0wfv54ny557mjajjdf0lyq5sbf9m7y50ggm7s2v30c639i0swyrc";
+ sha256 = "1cc36bngpjq8138f98d2dl0imgisiph7xmw1i7csmjs03b4pnfcx";
};
- cargoSha256 = "06s9194lvwd7lynxnsrjfbjfj87ngvjbqjhx3idf7d1w9mgi4ysw";
+ cargoSha256 = "1ndb33bi08j40b4jkj4q7d3k0cw5fscz2gc2cc3134nbs2r7jamk";
buildInputs = lib.optional stdenv.isDarwin Security;
diff --git a/nixpkgs/pkgs/servers/monitoring/thanos/default.nix b/nixpkgs/pkgs/servers/monitoring/thanos/default.nix
index ab2f187e504..01068a909b9 100644
--- a/nixpkgs/pkgs/servers/monitoring/thanos/default.nix
+++ b/nixpkgs/pkgs/servers/monitoring/thanos/default.nix
@@ -1,16 +1,16 @@
{ stdenv, buildGoModule, fetchFromGitHub }:
buildGoModule rec {
pname = "thanos";
- version = "0.6.1";
+ version = "0.7.0";
src = fetchFromGitHub {
rev = "v${version}";
owner = "thanos-io";
repo = "thanos";
- sha256 = "06vy22cy81rd71py8057bia3265vjm6ffp16wpx06faramdazq6p";
+ sha256 = "0yxa1wipab1n9bh95n237c9l1sx1nx7r8snsk4nzpmwr3y1b4nn8";
};
- modSha256 = "139b66jdryqv4s1hjbn9fzkyzn1160wr4z6a6wmmvm3f6p6wgjxp";
+ modSha256 = "0iz16yj41gahsyb6mxbmjs8mjhp5c96dmw75rg9bh5xdh8qh767m";
subPackages = "cmd/thanos";
diff --git a/nixpkgs/pkgs/servers/monitoring/zabbix/proxy.nix b/nixpkgs/pkgs/servers/monitoring/zabbix/proxy.nix
index 48b72dc0590..53932af6a18 100644
--- a/nixpkgs/pkgs/servers/monitoring/zabbix/proxy.nix
+++ b/nixpkgs/pkgs/servers/monitoring/zabbix/proxy.nix
@@ -3,7 +3,7 @@
, snmpSupport ? true, net_snmp
, sshSupport ? true, libssh2
, sqliteSupport ? false, sqlite
-, mysqlSupport ? false, mysql
+, mysqlSupport ? false, libmysqlclient
, postgresqlSupport ? false, postgresql
}:
@@ -37,7 +37,7 @@ in
++ optional snmpSupport net_snmp
++ optional sqliteSupport sqlite
++ optional sshSupport libssh2
- ++ optional mysqlSupport mysql.connector-c
+ ++ optional mysqlSupport libmysqlclient
++ optional postgresqlSupport postgresql;
configureFlags = [
diff --git a/nixpkgs/pkgs/servers/monitoring/zabbix/server.nix b/nixpkgs/pkgs/servers/monitoring/zabbix/server.nix
index 51ca38e8cfc..ac5dcca901d 100644
--- a/nixpkgs/pkgs/servers/monitoring/zabbix/server.nix
+++ b/nixpkgs/pkgs/servers/monitoring/zabbix/server.nix
@@ -4,7 +4,7 @@
, odbcSupport ? true, unixODBC
, snmpSupport ? true, net_snmp
, sshSupport ? true, libssh2
-, mysqlSupport ? false, mysql
+, mysqlSupport ? false, libmysqlclient
, postgresqlSupport ? false, postgresql
}:
@@ -40,7 +40,7 @@ in
++ optional ldapSupport openldap
++ optional snmpSupport net_snmp
++ optional sshSupport libssh2
- ++ optional mysqlSupport mysql.connector-c
+ ++ optional mysqlSupport libmysqlclient
++ optional postgresqlSupport postgresql;
configureFlags = [
diff --git a/nixpkgs/pkgs/servers/mtprotoproxy/default.nix b/nixpkgs/pkgs/servers/mtprotoproxy/default.nix
index 69c7f137e3d..e5aba6f95a0 100644
--- a/nixpkgs/pkgs/servers/mtprotoproxy/default.nix
+++ b/nixpkgs/pkgs/servers/mtprotoproxy/default.nix
@@ -1,18 +1,18 @@
-{ stdenv, fetchFromGitHub, python, pyaes, pycrypto, wrapPython }:
+{ stdenv, fetchFromGitHub, python, pyaes, pycrypto, uvloop, wrapPython }:
stdenv.mkDerivation rec {
pname = "mtprotoproxy";
- version = "1.0.5";
+ version = "1.0.6";
src = fetchFromGitHub {
owner = "alexbers";
repo = "mtprotoproxy";
rev = "v${version}";
- sha256 = "11jaz01cagmqadyxkks7dx41ggg6pp2l1ia9npqyrl2xhcxm5b0x";
+ sha256 = "1i8v6w79ad3xn9dnn144q93vcs23cj0m7hj3x33i16hxz325zb9y";
};
nativeBuildInputs = [ wrapPython ];
- pythonPath = [ pyaes pycrypto ];
+ pythonPath = [ pyaes pycrypto uvloop ];
installPhase = ''
install -Dm755 mtprotoproxy.py $out/bin/mtprotoproxy
diff --git a/nixpkgs/pkgs/servers/mxisd/default.nix b/nixpkgs/pkgs/servers/mxisd/default.nix
index 7166a57747d..4290d31870c 100644
--- a/nixpkgs/pkgs/servers/mxisd/default.nix
+++ b/nixpkgs/pkgs/servers/mxisd/default.nix
@@ -1,22 +1,22 @@
-{ stdenv, fetchFromGitHub, jre, git, gradle_4_10, perl, makeWrapper }:
+{ stdenv, fetchFromGitHub, jre, git, gradle_4, perl, makeWrapper }:
let
name = "mxisd-${version}";
- version = "1.4.5";
- rev = "a964b073bfa7552e94fe51f48e18830b1051b0b7";
+ version = "1.4.6";
+ rev = "6e9601cb3a18281857c3cefd20ec773023b577d2";
src = fetchFromGitHub {
inherit rev;
owner = "kamax-matrix";
repo = "mxisd";
- sha256 = "1h1lx531rjswh0m2zdsmfizrkkx9bh414v9m321hbbfzk3f98fkk";
+ sha256 = "07gpdgbz281506p2431qn92bvdza6ap3jfq5b7xdm7nwrry80pzd";
};
deps = stdenv.mkDerivation {
name = "${name}-deps";
inherit src;
- nativeBuildInputs = [ gradle_4_10 perl git ];
+ nativeBuildInputs = [ gradle_4 perl git ];
buildPhase = ''
export MXISD_BUILD_VERSION=${rev}
@@ -41,7 +41,7 @@ let
in
stdenv.mkDerivation {
inherit name src version;
- nativeBuildInputs = [ gradle_4_10 perl makeWrapper ];
+ nativeBuildInputs = [ gradle_4 perl makeWrapper ];
buildInputs = [ jre ];
patches = [ ./0001-gradle.patch ];
diff --git a/nixpkgs/pkgs/servers/nextcloud/default.nix b/nixpkgs/pkgs/servers/nextcloud/default.nix
index 69b1f28d2d6..3b994337e9c 100644
--- a/nixpkgs/pkgs/servers/nextcloud/default.nix
+++ b/nixpkgs/pkgs/servers/nextcloud/default.nix
@@ -2,11 +2,11 @@
stdenv.mkDerivation rec {
pname = "nextcloud";
- version = "16.0.4";
+ version = "17.0.0";
src = fetchurl {
url = "https://download.nextcloud.com/server/releases/${pname}-${version}.tar.bz2";
- sha256 = "1l7ckzyqz7g4ny8s2q4xal72p57ldfjs947sk2ya2df93qjh0qz0";
+ sha256 = "19j2l4qxkqsxcw75gvkinjqawia07wx2kcmzn8q33nzc6cdl50b0";
};
installPhase = ''
diff --git a/nixpkgs/pkgs/servers/nosql/apache-jena/fuseki-binary.nix b/nixpkgs/pkgs/servers/nosql/apache-jena/fuseki-binary.nix
index be7c51a7ef5..641220e1344 100644
--- a/nixpkgs/pkgs/servers/nosql/apache-jena/fuseki-binary.nix
+++ b/nixpkgs/pkgs/servers/nosql/apache-jena/fuseki-binary.nix
@@ -3,10 +3,10 @@ let
s = # Generated upstream information
rec {
baseName="apache-jena-fuseki";
- version = "3.11.0";
+ version = "3.12.0";
name="${baseName}-${version}";
url="http://archive.apache.org/dist/jena/binaries/apache-jena-fuseki-${version}.tar.gz";
- sha256 = "05krsd0arhcl2yqmdp3iq2gwl1sc2adv44xpq9w06cps8bxj6yrb";
+ sha256 = "1j2p3r4vgp4l2xrrsh5mx3vbgq03c0vdg6961g1fvd307yqpibk0";
};
buildInputs = [
makeWrapper
diff --git a/nixpkgs/pkgs/servers/nosql/neo4j/default.nix b/nixpkgs/pkgs/servers/nosql/neo4j/default.nix
index f471017a336..ecc36dc283d 100644
--- a/nixpkgs/pkgs/servers/nosql/neo4j/default.nix
+++ b/nixpkgs/pkgs/servers/nosql/neo4j/default.nix
@@ -4,11 +4,11 @@ with stdenv.lib;
stdenv.mkDerivation rec {
pname = "neo4j";
- version = "3.5.8";
+ version = "3.5.11";
src = fetchurl {
url = "https://neo4j.com/artifact.php?name=neo4j-community-${version}-unix.tar.gz";
- sha256 = "0kj92vljxdhk9pf6gr9cvd2a2ilc4myp5djjkrj3gm37f074swgg";
+ sha256 = "0xk37rvb37rd7pwpv4ingmb2v6ad1kqka8ldmd16n89fqfvg5m2d";
};
buildInputs = [ makeWrapper jre8 which gawk ];
diff --git a/nixpkgs/pkgs/servers/nosql/redis/default.nix b/nixpkgs/pkgs/servers/nosql/redis/default.nix
index 9b785917bfb..f7a67ce398d 100644
--- a/nixpkgs/pkgs/servers/nosql/redis/default.nix
+++ b/nixpkgs/pkgs/servers/nosql/redis/default.nix
@@ -1,12 +1,12 @@
{ stdenv, fetchurl, lua, jemalloc }:
stdenv.mkDerivation rec {
- version = "5.0.5";
+ version = "5.0.6";
pname = "redis";
src = fetchurl {
url = "http://download.redis.io/releases/${pname}-${version}.tar.gz";
- sha256 = "0xd3ak527cnkz2cn422l2ag9nsa6mhv7y2y49zwqy7fjk6bh0f91";
+ sha256 = "1cr2dn9ilhj52snmlz38fw30gdlgbxq2sadyspawahp1cw988936";
};
# Cross-compiling fixes
diff --git a/nixpkgs/pkgs/servers/plex/raw.nix b/nixpkgs/pkgs/servers/plex/raw.nix
index b617fe6fa0e..197b1699749 100644
--- a/nixpkgs/pkgs/servers/plex/raw.nix
+++ b/nixpkgs/pkgs/servers/plex/raw.nix
@@ -8,13 +8,13 @@
# server, and the FHS userenv and corresponding NixOS module should
# automatically pick up the changes.
stdenv.mkDerivation rec {
- version = "1.16.6.1592-b9d49bdb7";
+ version = "1.17.0.1841-d42cfa161";
pname = "plexmediaserver";
# Fetch the source
src = fetchurl {
url = "https://downloads.plex.tv/plex-media-server-new/${version}/redhat/plexmediaserver-${version}.x86_64.rpm";
- sha256 = "12wff06nlvcssa6sf6vhxajfd1dnr9870xn9fac4q7gf0yayj27j";
+ sha256 = "1sa3a8i204qq1hsg0dsa3f6vpsbyny88y3bskf6ljsz87c6g9kmh";
};
outputs = [ "out" "basedb" ];
diff --git a/nixpkgs/pkgs/servers/roundcube/default.nix b/nixpkgs/pkgs/servers/roundcube/default.nix
index 0b774a4b5ad..93499d87e0b 100644
--- a/nixpkgs/pkgs/servers/roundcube/default.nix
+++ b/nixpkgs/pkgs/servers/roundcube/default.nix
@@ -2,11 +2,11 @@
stdenv.mkDerivation rec {
pname = "roundcube";
- version = "1.3.9";
+ version = "1.3.10";
src = fetchurl {
url = "https://github.com/roundcube/roundcubemail/releases/download/${version}/roundcubemail-${version}-complete.tar.gz";
- sha256 = "1b91amcpzb7935hpm67iqw92bl5r1a0rkfrc8gfm8w9sngzv8vbj";
+ sha256 = "1gx8dgrr3p6fksv3pm381a080i9r6snwcmfd1q112mqg19ai3zk9";
};
patches = [ ./0001-Don-t-resolve-symlinks-when-trying-to-find-INSTALL_P.patch ];
diff --git a/nixpkgs/pkgs/servers/scylladb/configure-etc-osrelease.patch b/nixpkgs/pkgs/servers/scylladb/configure-etc-osrelease.patch
new file mode 100644
index 00000000000..5fd6c7caf08
--- /dev/null
+++ b/nixpkgs/pkgs/servers/scylladb/configure-etc-osrelease.patch
@@ -0,0 +1,28 @@
+diff --git a/configure.py b/configure.py
+index 25ca951ac..454140420 100755
+--- a/configure.py
++++ b/configure.py
+@@ -36,13 +36,16 @@ tempfile.tempdir = "./build/tmp"
+
+ configure_args = str.join(' ', [shlex.quote(x) for x in sys.argv[1:]])
+
+-for line in open('/etc/os-release'):
+- key, _, value = line.partition('=')
+- value = value.strip().strip('"')
+- if key == 'ID':
+- os_ids = [value]
+- if key == 'ID_LIKE':
+- os_ids += value.split(' ')
++try:
++ for line in open('/etc/os-release'):
++ key, _, value = line.partition('=')
++ value = value.strip().strip('"')
++ if key == 'ID':
++ os_ids = [value]
++ if key == 'ID_LIKE':
++ os_ids += value.split(' ')
++except FileNotFoundError:
++ os_ids = ["linux"]
+
+
+ # distribution "internationalization", converting package names.
diff --git a/nixpkgs/pkgs/servers/scylladb/default.nix b/nixpkgs/pkgs/servers/scylladb/default.nix
index f48ace22f8f..a2671e17cb7 100644
--- a/nixpkgs/pkgs/servers/scylladb/default.nix
+++ b/nixpkgs/pkgs/servers/scylladb/default.nix
@@ -41,7 +41,7 @@ gcc8Stdenv.mkDerivation {
fetchSubmodules = true;
};
- patches = [ ./seastar-configure-script-paths.patch ];
+ patches = [ ./seastar-configure-script-paths.patch ./configure-etc-osrelease.patch ];
nativeBuildInputs = [
pkgconfig
@@ -77,20 +77,26 @@ gcc8Stdenv.mkDerivation {
postPatch = ''
patchShebangs ./configure.py
+ patchShebangs seastar/json/json2code.py
'';
configurePhase = ''
./configure.py --mode=release
'';
+
installPhase = ''
mkdir $out
cp -r * $out/
'';
+
+ requiredSystemFeatures = [ "big-parallel" ];
+
meta = with stdenv.lib; {
description = "NoSQL data store using the seastar framework, compatible with Apache Cassandra";
homepage = "https://scylladb.com";
license = licenses.agpl3;
platforms = stdenv.lib.platforms.linux;
+ hydraPlatforms = []; # It's huge ATM, about 18 GB.
maintainers = [ stdenv.lib.maintainers.farlion ];
};
}
diff --git a/nixpkgs/pkgs/servers/search/groonga/default.nix b/nixpkgs/pkgs/servers/search/groonga/default.nix
index 9fd49e96fa2..669901d7625 100644
--- a/nixpkgs/pkgs/servers/search/groonga/default.nix
+++ b/nixpkgs/pkgs/servers/search/groonga/default.nix
@@ -7,11 +7,11 @@
stdenv.mkDerivation rec {
pname = "groonga";
- version = "9.0.6";
+ version = "9.0.7";
src = fetchurl {
url = "https://packages.groonga.org/source/groonga/${pname}-${version}.tar.gz";
- sha256 = "0d1p8v7qd97h3znp84a1w40hbg834n3wxp6gaa8mbnff16s18kl7";
+ sha256 = "1j308p6l6q716qlk3azqk9v11a93cxhcppj7qh5wm2aqsngw9rfq";
};
buildInputs = with stdenv.lib;
diff --git a/nixpkgs/pkgs/servers/sql/mariadb/connector-c/3_1.nix b/nixpkgs/pkgs/servers/sql/mariadb/connector-c/3_1.nix
new file mode 100644
index 00000000000..c8bc4858f71
--- /dev/null
+++ b/nixpkgs/pkgs/servers/sql/mariadb/connector-c/3_1.nix
@@ -0,0 +1,6 @@
+{ callPackage, ... } @ args:
+
+callPackage ./. (args // {
+ version = "3.1.2";
+ sha256 = "0pgz8m8d39mvj9wnjll6c83xvdl2h24273b3dkx0g5pxj7ga4shm";
+})
diff --git a/nixpkgs/pkgs/servers/sql/mariadb/connector-c/default.nix b/nixpkgs/pkgs/servers/sql/mariadb/connector-c/default.nix
new file mode 100644
index 00000000000..cb873f4d5a0
--- /dev/null
+++ b/nixpkgs/pkgs/servers/sql/mariadb/connector-c/default.nix
@@ -0,0 +1,54 @@
+{ stdenv, fetchurl, cmake
+, curl, openssl, zlib
+, libiconv
+, version, sha256, ...
+}:
+
+with stdenv.lib;
+
+stdenv.mkDerivation {
+ pname = "mariadb-connector-c";
+ inherit version;
+
+ src = fetchurl {
+ urls = [
+ "https://downloads.mariadb.org/f/connector-c-${version}/mariadb-connector-c-${version}-src.tar.gz"
+ "https://downloads.mariadb.com/Connectors/c/connector-c-${version}/mariadb-connector-c-${version}-src.tar.gz"
+ ];
+ inherit sha256;
+ };
+
+ cmakeFlags = [
+ "-DWITH_EXTERNAL_ZLIB=ON"
+ "-DMARIADB_UNIX_ADDR=/run/mysqld/mysqld.sock"
+ "-DWITH_CURL=ON"
+ ];
+
+ # The cmake setup-hook uses $out/lib by default, this is not the case here.
+ preConfigure = optionalString stdenv.isDarwin ''
+ cmakeFlagsArray+=("-DCMAKE_INSTALL_NAME_DIR=$out/lib/mariadb")
+ '';
+
+ nativeBuildInputs = [ cmake ];
+ propagatedBuildInputs = [ curl openssl zlib ];
+ buildInputs = [ libiconv ];
+
+ enableParallelBuilding = true;
+
+ postFixup = ''
+ ln -sv mariadb_config $out/bin/mysql_config
+ ln -sv mariadb $out/lib/mysql
+ ln -sv mariadb $out/include/mysql
+ ln -sv libmariadbclient.a $out/lib/mariadb/libmysqlclient.a
+ ln -sv libmariadbclient.a $out/lib/mariadb/libmysqlclient_r.a
+ ln -sv libmariadb.so $out/lib/mariadb/libmysqlclient.so
+ ln -sv libmariadb.so $out/lib/mariadb/libmysqlclient_r.so
+ '';
+
+ meta = {
+ description = "Client library that can be used to connect to MySQL or MariaDB";
+ license = licenses.lgpl21;
+ maintainers = with maintainers; [ globin ];
+ platforms = platforms.all;
+ };
+}
diff --git a/nixpkgs/pkgs/servers/sql/mariadb/default.nix b/nixpkgs/pkgs/servers/sql/mariadb/default.nix
index b0fdd333238..63ad6ce3b25 100644
--- a/nixpkgs/pkgs/servers/sql/mariadb/default.nix
+++ b/nixpkgs/pkgs/servers/sql/mariadb/default.nix
@@ -18,13 +18,6 @@ mytopEnv = perl.withPackages (p: with p; [ DataDumper DBDmysql DBI TermReadKey ]
mariadb = server // {
inherit client; # MariaDB Client
server = server; # MariaDB Server
- inherit connector-c; # libmysqlclient.so
- inherit galera;
-};
-
-galeraLibs = buildEnv {
- name = "galera-lib-inputs-united";
- paths = [ openssl.out boost check ];
};
common = rec { # attributes common to both builds
@@ -48,9 +41,6 @@ common = rec { # attributes common to both builds
prePatch = ''
sed -i 's,[^"]*/var/log,/var/log,g' storage/mroonga/vendor/groonga/CMakeLists.txt
- '' + optionalString stdenv.hostPlatform.isDarwin ''
- substituteInPlace cmake/build_configurations/mysql_release.cmake \
- --replace "SET(PLUGIN_AUTH_PAM YES)" ""
'';
patches = [
@@ -170,6 +160,8 @@ server = stdenv.mkDerivation (common // {
patches = common.patches ++ [
./cmake-without-client.patch
+ ] ++ optionals stdenv.isDarwin [
+ ./cmake-without-plugin-auth-pam.patch
];
cmakeFlags = common.cmakeFlags ++ [
@@ -223,95 +215,4 @@ server = stdenv.mkDerivation (common // {
CXXFLAGS = optionalString stdenv.isi686 "-fpermissive";
});
-
-connector-c = stdenv.mkDerivation rec {
- pname = "mariadb-connector-c";
- version = "2.3.7";
-
- src = fetchurl {
- url = "https://downloads.mariadb.org/interstitial/connector-c-${version}/mariadb-connector-c-${version}-src.tar.gz/from/http%3A//nyc2.mirrors.digitalocean.com/mariadb/";
- sha256 = "13izi35vvxhiwl2dsnqrz75ciisy2s2k30giv7hrm01qlwnmiycl";
- name = "mariadb-connector-c-${version}-src.tar.gz";
- };
-
- # outputs = [ "dev" "out" ]; FIXME: cmake variables don't allow that < 3.0
- cmakeFlags = [
- "-DWITH_EXTERNAL_ZLIB=ON"
- "-DMYSQL_UNIX_ADDR=/run/mysqld/mysqld.sock"
- ];
-
- # The cmake setup-hook uses $out/lib by default, this is not the case here.
- preConfigure = stdenv.lib.optionalString stdenv.isDarwin ''
- cmakeFlagsArray+=("-DCMAKE_INSTALL_NAME_DIR=$out/lib/mariadb")
- '';
-
- nativeBuildInputs = [ cmake ];
- propagatedBuildInputs = [ openssl zlib ];
- buildInputs = [ libiconv ];
-
- enableParallelBuilding = true;
-
- postFixup = ''
- ln -sv mariadb_config $out/bin/mysql_config
- ln -sv mariadb $out/lib/mysql
- ln -sv mariadb $out/include/mysql
- '';
-
- meta = with stdenv.lib; {
- description = "Client library that can be used to connect to MySQL or MariaDB";
- license = licenses.lgpl21;
- maintainers = with maintainers; [ globin ];
- platforms = platforms.all;
- };
-};
-
-galera = stdenv.mkDerivation rec {
- pname = "mariadb-galera";
- version = "25.3.26";
-
- src = fetchFromGitHub {
- owner = "codership";
- repo = "galera";
- rev = "release_${version}";
- sha256 = "0fs0c1px9lknf1a5wwb12z1hj7j7b6hsfjddggikvkdkrnr2xs1f";
- fetchSubmodules = true;
- };
-
- buildInputs = [ asio boost check openssl scons ];
-
- postPatch = ''
- substituteInPlace SConstruct \
- --replace "boost_library_path = '''" "boost_library_path = '${boost}/lib'"
- '';
-
- preConfigure = ''
- export CPPFLAGS="-I${asio}/include -I${boost.dev}/include -I${check}/include -I${openssl.dev}/include"
- export LIBPATH="${galeraLibs}/lib"
- '';
-
- sconsFlags = "ssl=1 system_asio=0 strict_build_flags=0";
-
- installPhase = ''
- # copied with modifications from scripts/packages/freebsd.sh
- GALERA_LICENSE_DIR="$share/licenses/${pname}-${version}"
- install -d $out/{bin,lib/galera,share/doc/galera,$GALERA_LICENSE_DIR}
- install -m 555 "garb/garbd" "$out/bin/garbd"
- install -m 444 "libgalera_smm.so" "$out/lib/galera/libgalera_smm.so"
- install -m 444 "scripts/packages/README" "$out/share/doc/galera/"
- install -m 444 "scripts/packages/README-MySQL" "$out/share/doc/galera/"
- install -m 444 "scripts/packages/freebsd/LICENSE" "$out/$GALERA_LICENSE_DIR"
- install -m 444 "LICENSE" "$out/$GALERA_LICENSE_DIR/GPLv2"
- install -m 444 "asio/LICENSE_1_0.txt" "$out/$GALERA_LICENSE_DIR/LICENSE.asio"
- install -m 444 "www.evanjones.ca/LICENSE" "$out/$GALERA_LICENSE_DIR/LICENSE.crc32c"
- install -m 444 "chromium/LICENSE" "$out/$GALERA_LICENSE_DIR/LICENSE.chromium"
- '';
-
- meta = {
- description = "Galera 3 wsrep provider library";
- homepage = http://galeracluster.com/;
- license = licenses.lgpl2;
- maintainers = with maintainers; [ izorkin ];
- platforms = platforms.all;
- };
-};
in mariadb
diff --git a/nixpkgs/pkgs/servers/sql/mariadb/galera/25.nix b/nixpkgs/pkgs/servers/sql/mariadb/galera/25.nix
new file mode 100644
index 00000000000..2772d60e398
--- /dev/null
+++ b/nixpkgs/pkgs/servers/sql/mariadb/galera/25.nix
@@ -0,0 +1,6 @@
+{ callPackage, ... } @ args:
+
+callPackage ./. (args // {
+ version = "25.3.27";
+ sha256 = "143kzj0fmak1gdww4qkqmmliw8klxm6mwk5531748swlwm6gqr5q";
+})
diff --git a/nixpkgs/pkgs/servers/sql/mariadb/galera/default.nix b/nixpkgs/pkgs/servers/sql/mariadb/galera/default.nix
new file mode 100644
index 00000000000..263a21983e2
--- /dev/null
+++ b/nixpkgs/pkgs/servers/sql/mariadb/galera/default.nix
@@ -0,0 +1,63 @@
+{ stdenv, fetchFromGitHub, buildEnv
+, asio, boost, check, openssl, scons
+, version, sha256, ...
+}:
+
+let
+ pname = "mariadb-galera";
+ galeraLibs = buildEnv {
+ name = "galera-lib-inputs-united";
+ paths = [ openssl.out boost check ];
+ };
+
+in stdenv.mkDerivation {
+ inherit pname;
+ inherit version;
+
+ src = fetchFromGitHub {
+ owner = "codership";
+ repo = "galera";
+ rev = "release_${version}";
+ inherit sha256;
+ fetchSubmodules = true;
+ };
+
+ buildInputs = [ asio boost check openssl scons ];
+
+ postPatch = ''
+ substituteInPlace SConstruct \
+ --replace "boost_library_path = '''" "boost_library_path = '${boost}/lib'"
+ '';
+
+ preConfigure = ''
+ export CPPFLAGS="-I${asio}/include -I${boost.dev}/include -I${check}/include -I${openssl.dev}/include"
+ export LIBPATH="${galeraLibs}/lib"
+ '';
+
+ sconsFlags = "ssl=1 system_asio=1 strict_build_flags=0";
+
+ enableParallelBuilding = true;
+
+ installPhase = ''
+ # copied with modifications from scripts/packages/freebsd.sh
+ GALERA_LICENSE_DIR="$share/licenses/${pname}"
+ install -d $out/{bin,lib/galera,share/doc/galera,$GALERA_LICENSE_DIR}
+ install -m 555 "garb/garbd" "$out/bin/garbd"
+ install -m 444 "libgalera_smm.so" "$out/lib/galera/libgalera_smm.so"
+ install -m 444 "scripts/packages/README" "$out/share/doc/galera/"
+ install -m 444 "scripts/packages/README-MySQL" "$out/share/doc/galera/"
+ install -m 444 "scripts/packages/freebsd/LICENSE" "$out/$GALERA_LICENSE_DIR"
+ install -m 444 "LICENSE" "$out/$GALERA_LICENSE_DIR/GPLv2"
+ install -m 444 "asio/LICENSE_1_0.txt" "$out/$GALERA_LICENSE_DIR/LICENSE.asio"
+ install -m 444 "www.evanjones.ca/LICENSE" "$out/$GALERA_LICENSE_DIR/LICENSE.crc32c"
+ install -m 444 "chromium/LICENSE" "$out/$GALERA_LICENSE_DIR/LICENSE.chromium"
+ '';
+
+ meta = with stdenv.lib; {
+ description = "Galera 3 wsrep provider library";
+ homepage = http://galeracluster.com/;
+ license = licenses.lgpl2;
+ maintainers = with maintainers; [ izorkin ];
+ platforms = platforms.all;
+ };
+}
diff --git a/nixpkgs/pkgs/servers/sql/monetdb/default.nix b/nixpkgs/pkgs/servers/sql/monetdb/default.nix
index 245bd811c1a..34ebebbbcc1 100644
--- a/nixpkgs/pkgs/servers/sql/monetdb/default.nix
+++ b/nixpkgs/pkgs/servers/sql/monetdb/default.nix
@@ -3,7 +3,7 @@
}:
let
- version = "11.33.3";
+ version = "11.33.11";
in stdenv.mkDerivation {
pname = "monetdb";
@@ -11,7 +11,7 @@ in stdenv.mkDerivation {
src = fetchurl {
url = "https://dev.monetdb.org/downloads/sources/archive/MonetDB-${version}.tar.bz2";
- sha256 = "0k0xcm3b5qq2arjfn8f1h020sjkk97qfynsimn848bnl01vscqh8";
+ sha256 = "1fzgf1hplwlki6l6yvrk8an9y4jj40xzl4m5x1d8vi3xr526bzc9";
};
postPatch = ''
diff --git a/nixpkgs/pkgs/servers/sql/pgbouncer/default.nix b/nixpkgs/pkgs/servers/sql/pgbouncer/default.nix
index 30be61a805a..76b35a345b5 100644
--- a/nixpkgs/pkgs/servers/sql/pgbouncer/default.nix
+++ b/nixpkgs/pkgs/servers/sql/pgbouncer/default.nix
@@ -2,11 +2,11 @@
stdenv.mkDerivation rec {
pname = "pgbouncer";
- version = "1.10.0";
+ version = "1.11.0";
src = fetchurl {
url = "https://pgbouncer.github.io/downloads/files/${version}/${pname}-${version}.tar.gz";
- sha256 = "1m8vsxyna5grs5p0vnxf3fxxnkk9aqjf3qmr2bbkpkhlzr11986q";
+ sha256 = "0w3y53kwnkcm9fmf28zbjvqk6ivfic5f2k3nflvca1i8iaj2z044";
};
buildInputs = [ libevent openssl c-ares pkg-config ];
diff --git a/nixpkgs/pkgs/servers/sql/postgresql/ext/pg_repack.nix b/nixpkgs/pkgs/servers/sql/postgresql/ext/pg_repack.nix
index 7b64de381f3..aeaff17889f 100644
--- a/nixpkgs/pkgs/servers/sql/postgresql/ext/pg_repack.nix
+++ b/nixpkgs/pkgs/servers/sql/postgresql/ext/pg_repack.nix
@@ -2,7 +2,7 @@
stdenv.mkDerivation rec {
pname = "pg_repack";
- version = "1.4.4";
+ version = "1.4.5";
buildInputs = [ postgresql openssl zlib readline ];
@@ -10,7 +10,7 @@ stdenv.mkDerivation rec {
owner = "reorg";
repo = "pg_repack";
rev = "refs/tags/ver_${version}";
- sha256 = "0ynsmsxfkcp82ccpz2nrgg8wiil8yxqigvw6425lx8v80h5lszbw";
+ sha256 = "1qsya9h4r147mkl7jzh4qk7ciyr3hj6gv7rfh4zml9zav0pjj76x";
};
installPhase = ''
diff --git a/nixpkgs/pkgs/servers/uwsgi/default.nix b/nixpkgs/pkgs/servers/uwsgi/default.nix
index 85fa6cd8006..556c44b61a7 100644
--- a/nixpkgs/pkgs/servers/uwsgi/default.nix
+++ b/nixpkgs/pkgs/servers/uwsgi/default.nix
@@ -4,7 +4,7 @@
, pam, withPAM ? stdenv.isLinux
, systemd, withSystemd ? stdenv.isLinux
, python2, python3, ncurses
-, ruby, php-embed, mysql
+, ruby, php-embed, libmysqlclient
}:
let pythonPlugin = pkg : lib.nameValuePair "python${if pkg.isPy2 then "2" else "3"}" {
@@ -34,7 +34,7 @@ let pythonPlugin = pkg : lib.nameValuePair "python${if pkg.isPy2 then "2" else "
# usage: https://uwsgi-docs.readthedocs.io/en/latest/PHP.html#running-php-apps-with-nginx
path = "plugins/php";
inputs = [ php-embed ] ++ php-embed.buildInputs;
- NIX_CFLAGS_LINK = [ "-L${mysql.connector-c}/lib/mysql" ];
+ NIX_CFLAGS_LINK = [ "-L${libmysqlclient}/lib/mysql" ];
})
];
diff --git a/nixpkgs/pkgs/servers/varnish/default.nix b/nixpkgs/pkgs/servers/varnish/default.nix
index 8a63ed3ea7f..4756fbdafb6 100644
--- a/nixpkgs/pkgs/servers/varnish/default.nix
+++ b/nixpkgs/pkgs/servers/varnish/default.nix
@@ -51,8 +51,8 @@ in
python = python2;
};
varnish6 = common {
- version = "6.2.0";
- sha256 = "0lwfk2gq99c653h5f51fs3j37r0gh2pf0p4w5z986nm2mi9z6yn3";
+ version = "6.3.0";
+ sha256 = "0zwlffdd1m0ih33nq40xf2wwdyvr4czmns2fs90qpfnwy72xxk4m";
python = python3;
extraNativeBuildInputs = [ python3.pkgs.sphinx ];
};
diff --git a/nixpkgs/pkgs/servers/web-apps/shiori/default.nix b/nixpkgs/pkgs/servers/web-apps/shiori/default.nix
new file mode 100644
index 00000000000..5cf54ff14ba
--- /dev/null
+++ b/nixpkgs/pkgs/servers/web-apps/shiori/default.nix
@@ -0,0 +1,22 @@
+{ stdenv, buildGoModule, fetchFromGitHub }:
+
+buildGoModule rec {
+ pname = "shiori";
+ version = "1.5.0";
+
+ modSha256 = "142raxqh6mipw0dyhzgc8ha6vn74wdin25qrl1nkd68mpcvsbblg";
+
+ src = fetchFromGitHub {
+ owner = "go-shiori";
+ repo = pname;
+ rev = "v${version}";
+ sha256 = "13and7gh2882khqppwz3wwq44p7az4bfdfjvlnqcpqyi8xa28pmq";
+ };
+
+ meta = with stdenv.lib; {
+ description = "Simple bookmark manager built with Go";
+ homepage = "https://github.com/go-shiori/shiori";
+ license = licenses.mit;
+ maintainers = with maintainers; [ minijackson ];
+ };
+}
diff --git a/nixpkgs/pkgs/servers/x11/xorg/default.nix b/nixpkgs/pkgs/servers/x11/xorg/default.nix
index e752f3ad834..f121fe77ff8 100644
--- a/nixpkgs/pkgs/servers/x11/xorg/default.nix
+++ b/nixpkgs/pkgs/servers/x11/xorg/default.nix
@@ -872,11 +872,11 @@ lib.makeScope newScope (self: with self; {
}) {};
libXfont2 = callPackage ({ stdenv, pkgconfig, fetchurl, libfontenc, xorgproto, freetype, xtrans, zlib }: stdenv.mkDerivation {
- name = "libXfont2-2.0.3";
+ name = "libXfont2-2.0.4";
builder = ./builder.sh;
src = fetchurl {
- url = mirror://xorg/individual/lib/libXfont2-2.0.3.tar.bz2;
- sha256 = "0klwmimmhm3axpj8pwn5l41lbggh47r5aazhw63zxkbwfgyvg2hf";
+ url = mirror://xorg/individual/lib/libXfont2-2.0.4.tar.bz2;
+ sha256 = "1rk9pjxcm01lbr1dxhnvk4f2qrn6zp068qjbvvz5w0z5d0rin5bd";
};
hardeningDisable = [ "bindnow" "relro" ];
nativeBuildInputs = [ pkgconfig ];
@@ -1288,11 +1288,11 @@ lib.makeScope newScope (self: with self; {
}) {};
setxkbmap = callPackage ({ stdenv, pkgconfig, fetchurl, libX11, libxkbfile }: stdenv.mkDerivation {
- name = "setxkbmap-1.3.1";
+ name = "setxkbmap-1.3.2";
builder = ./builder.sh;
src = fetchurl {
- url = mirror://xorg/individual/app/setxkbmap-1.3.1.tar.bz2;
- sha256 = "1qfk097vjysqb72pq89h0la3462kbb2dh1d11qzs2fr67ybb7pd9";
+ url = mirror://xorg/individual/app/setxkbmap-1.3.2.tar.bz2;
+ sha256 = "1xdrxs65v7d0rw1yaz0vsz55w4hxym99216p085ya9978j379wlg";
};
hardeningDisable = [ "bindnow" "relro" ];
nativeBuildInputs = [ pkgconfig ];
diff --git a/nixpkgs/pkgs/servers/x11/xorg/overrides.nix b/nixpkgs/pkgs/servers/x11/xorg/overrides.nix
index 7e081b664b3..10cbca832b4 100644
--- a/nixpkgs/pkgs/servers/x11/xorg/overrides.nix
+++ b/nixpkgs/pkgs/servers/x11/xorg/overrides.nix
@@ -368,6 +368,8 @@ self: super:
xf86videoglide = super.xf86videoglide.overrideAttrs (attrs: { meta = attrs.meta // { broken = true; }; });
xf86videoi128 = super.xf86videoi128.overrideAttrs (attrs: { meta = attrs.meta // { broken = true; }; });
xf86videonewport = super.xf86videonewport.overrideAttrs (attrs: { meta = attrs.meta // { broken = true; }; });
+ xf86videos3virge = super.xf86videos3virge.overrideAttrs (attrs: { meta = attrs.meta // { broken = true; }; });
+ xf86videosavage = super.xf86videosavage.overrideAttrs (attrs: { meta = attrs.meta // { broken = true; }; });
xf86videotga = super.xf86videotga.overrideAttrs (attrs: { meta = attrs.meta // { broken = true; }; });
xf86videov4l = super.xf86videov4l.overrideAttrs (attrs: { meta = attrs.meta // { broken = true; }; });
xf86videovoodoo = super.xf86videovoodoo.overrideAttrs (attrs: { meta = attrs.meta // { broken = true; }; });
diff --git a/nixpkgs/pkgs/servers/x11/xorg/tarballs.list b/nixpkgs/pkgs/servers/x11/xorg/tarballs.list
index 05b035197c1..832104f0b5e 100644
--- a/nixpkgs/pkgs/servers/x11/xorg/tarballs.list
+++ b/nixpkgs/pkgs/servers/x11/xorg/tarballs.list
@@ -20,7 +20,7 @@ mirror://xorg/individual/app/listres-1.0.4.tar.bz2
mirror://xorg/individual/app/mkfontscale-1.2.1.tar.bz2
mirror://xorg/individual/app/oclock-1.0.4.tar.bz2
mirror://xorg/individual/app/sessreg-1.1.2.tar.bz2
-mirror://xorg/individual/app/setxkbmap-1.3.1.tar.bz2
+mirror://xorg/individual/app/setxkbmap-1.3.2.tar.bz2
mirror://xorg/individual/app/smproxy-1.0.6.tar.bz2
mirror://xorg/individual/app/transset-1.0.2.tar.bz2
mirror://xorg/individual/app/twm-1.0.10.tar.bz2
@@ -188,7 +188,7 @@ mirror://xorg/individual/lib/libXdmcp-1.1.3.tar.bz2
mirror://xorg/individual/lib/libXext-1.3.4.tar.bz2
mirror://xorg/individual/lib/libXfixes-5.0.3.tar.bz2
mirror://xorg/individual/lib/libXfont-1.5.4.tar.bz2
-mirror://xorg/individual/lib/libXfont2-2.0.3.tar.bz2
+mirror://xorg/individual/lib/libXfont2-2.0.4.tar.bz2
mirror://xorg/individual/lib/libXft-2.3.3.tar.bz2
mirror://xorg/individual/lib/libXi-1.7.10.tar.bz2
mirror://xorg/individual/lib/libXinerama-1.1.4.tar.bz2
diff --git a/nixpkgs/pkgs/servers/xmpp/prosody/default.nix b/nixpkgs/pkgs/servers/xmpp/prosody/default.nix
index 549b55705c4..8becdcd6a45 100644
--- a/nixpkgs/pkgs/servers/xmpp/prosody/default.nix
+++ b/nixpkgs/pkgs/servers/xmpp/prosody/default.nix
@@ -14,12 +14,12 @@ with stdenv.lib;
stdenv.mkDerivation rec {
- version = "0.11.2"; # also update communityModules
+ version = "0.11.3"; # also update communityModules
pname = "prosody";
src = fetchurl {
url = "https://prosody.im/downloads/source/${pname}-${version}.tar.gz";
- sha256 = "0ca8ivqb4hxqka08pwnaqi1bqxrdl8zw47g6z7nw9q5r57fgc4c9";
+ sha256 = "11xz4milv2962qf75vrdwsvd8sy2332nf69202rmvz5989pvvnng";
};
# A note to all those merging automated updates: Please also update this