aboutsummaryrefslogtreecommitdiff
path: root/nixpkgs/pkgs/tools/admin
diff options
context:
space:
mode:
Diffstat (limited to 'nixpkgs/pkgs/tools/admin')
-rw-r--r--nixpkgs/pkgs/tools/admin/aws-google-auth/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/admin/aws_shell/default.nix13
-rw-r--r--nixpkgs/pkgs/tools/admin/awscli/default.nix22
-rw-r--r--nixpkgs/pkgs/tools/admin/awslogs/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/admin/azure-cli/default.nix248
-rw-r--r--nixpkgs/pkgs/tools/admin/azure-cli/python-packages.nix250
-rw-r--r--nixpkgs/pkgs/tools/admin/berglas/default.nix8
-rw-r--r--nixpkgs/pkgs/tools/admin/boulder/default.nix33
-rw-r--r--nixpkgs/pkgs/tools/admin/certbot/0001-Don-t-use-distutils.StrictVersion-that-cannot-handle.patch60
-rw-r--r--nixpkgs/pkgs/tools/admin/certbot/0001-pebble_artifacts-hardcode-pebble-location.patch24
-rw-r--r--nixpkgs/pkgs/tools/admin/certbot/default.nix39
-rw-r--r--nixpkgs/pkgs/tools/admin/eksctl/default.nix6
-rw-r--r--nixpkgs/pkgs/tools/admin/elasticsearch-curator/default.nix81
-rw-r--r--nixpkgs/pkgs/tools/admin/fbvnc/default.nix30
-rw-r--r--nixpkgs/pkgs/tools/admin/google-cloud-sdk/default.nix8
-rw-r--r--nixpkgs/pkgs/tools/admin/pebble/default.nix26
-rw-r--r--nixpkgs/pkgs/tools/admin/procs/default.nix6
-rw-r--r--nixpkgs/pkgs/tools/admin/pulumi/data.nix51
-rw-r--r--nixpkgs/pkgs/tools/admin/pulumi/default.nix27
-rw-r--r--nixpkgs/pkgs/tools/admin/pulumi/update.sh55
-rw-r--r--nixpkgs/pkgs/tools/admin/simp_le/default.nix6
-rw-r--r--nixpkgs/pkgs/tools/admin/tightvnc/1.3.10-CVE-2019-15678.patch18
-rw-r--r--nixpkgs/pkgs/tools/admin/tightvnc/1.3.10-CVE-2019-15679.patch19
-rw-r--r--nixpkgs/pkgs/tools/admin/tightvnc/1.3.10-CVE-2019-15680.patch16
-rw-r--r--nixpkgs/pkgs/tools/admin/tightvnc/1.3.10-CVE-2019-8287.patch14
-rw-r--r--nixpkgs/pkgs/tools/admin/tightvnc/default.nix7
26 files changed, 1004 insertions, 69 deletions
diff --git a/nixpkgs/pkgs/tools/admin/aws-google-auth/default.nix b/nixpkgs/pkgs/tools/admin/aws-google-auth/default.nix
index 0fc001d5a19..e878369f177 100644
--- a/nixpkgs/pkgs/tools/admin/aws-google-auth/default.nix
+++ b/nixpkgs/pkgs/tools/admin/aws-google-auth/default.nix
@@ -19,7 +19,7 @@
buildPythonApplication rec {
pname = "aws-google-auth";
- version = "0.0.32";
+ version = "0.0.33";
# Pypi doesn't ship the tests, so we fetch directly from GitHub
# https://github.com/cevoaustralia/aws-google-auth/issues/120
@@ -27,7 +27,7 @@ buildPythonApplication rec {
owner = "cevoaustralia";
repo = "aws-google-auth";
rev = version;
- sha256 = "0blsvdkb28g1s3c7f8brjjai7lq9ij76xqr5z6zlxxafc4qqwhh3";
+ sha256 = "07sisv7b17bpjwikmm9zpxn3l3xpzywsbxi4brri2hdjmjb6p7w7";
};
propagatedBuildInputs = [
diff --git a/nixpkgs/pkgs/tools/admin/aws_shell/default.nix b/nixpkgs/pkgs/tools/admin/aws_shell/default.nix
index c319c47ea7e..95f1df39576 100644
--- a/nixpkgs/pkgs/tools/admin/aws_shell/default.nix
+++ b/nixpkgs/pkgs/tools/admin/aws_shell/default.nix
@@ -1,20 +1,16 @@
{ stdenv
-, buildPythonPackage
-, fetchPypi
, awscli
-, prompt_toolkit
-, boto3
-, configobj
-, pygments
}:
+with awscli.python.pkgs;
+
buildPythonPackage rec {
pname = "aws-shell";
- version = "0.2.0";
+ version = "0.2.1";
src = fetchPypi {
inherit pname version;
- sha256 = "b46a673b81254e5e014297e08c9ecab535773aa651ca33dc3786a1fd612f9810";
+ sha256 = "2044b0ef78c7542c392f2cee4b74a4439545c63dda0a3e28b712fff53e8e5823";
};
# Why does it propagate packages that are used for testing?
@@ -24,6 +20,7 @@ buildPythonPackage rec {
boto3
configobj
pygments
+ pyyaml
];
#Checks are failing due to missing TTY, which won't exist.
diff --git a/nixpkgs/pkgs/tools/admin/awscli/default.nix b/nixpkgs/pkgs/tools/admin/awscli/default.nix
index 7e3e0c9fff0..02a27b0fe48 100644
--- a/nixpkgs/pkgs/tools/admin/awscli/default.nix
+++ b/nixpkgs/pkgs/tools/admin/awscli/default.nix
@@ -1,12 +1,12 @@
{ lib
-, python
+, python3
, groff
, less
, fetchpatch
}:
let
- py = python.override {
+ py = python3.override {
packageOverrides = self: super: {
rsa = super.rsa.overridePythonAttrs (oldAttrs: rec {
version = "3.4.2";
@@ -15,30 +15,23 @@ let
sha256 = "25df4e10c263fb88b5ace923dd84bf9aa7f5019687b5e55382ffcdb8bede9db5";
};
});
- colorama = super.colorama.overridePythonAttrs (oldAttrs: rec {
- version = "0.3.9";
- src = oldAttrs.src.override {
- inherit version;
- sha256 = "48eb22f4f8461b1df5734a074b57042430fb06e1d61bd1e11b078c0fe6d7a1f1";
- };
- });
- pyyaml = super.pyyaml_3;
+ prompt_toolkit = self.callPackage ../../../development/python-modules/prompt_toolkit/1.nix { };
};
};
in py.pkgs.buildPythonApplication rec {
pname = "awscli";
- version = "1.16.215"; # N.B: if you change this, change botocore to a matching version too
+ version = "1.16.266"; # N.B: if you change this, change botocore to a matching version too
src = py.pkgs.fetchPypi {
inherit pname version;
- sha256 = "13r32z8iyza4gvpf81l6l2ywv37yxi4bb08ry7cli5m6ny9xqlq8";
+ sha256 = "9c59a5ca805f467669d471b29550ecafafb9b380a4a6926a9f8866f71cd4f7be";
};
# No tests included
doCheck = false;
- pythonPath = with py.pkgs; [
+ propagatedBuildInputs = with py.pkgs; [
botocore
bcdoc
s3transfer
@@ -52,7 +45,6 @@ in py.pkgs.buildPythonApplication rec {
urllib3
dateutil
jmespath
- futures
];
postInstall = ''
@@ -63,6 +55,8 @@ in py.pkgs.buildPythonApplication rec {
rm $out/bin/aws.cmd
'';
+ passthru.python = py; # for aws_shell
+
meta = with lib; {
homepage = https://aws.amazon.com/cli/;
description = "Unified tool to manage your AWS services";
diff --git a/nixpkgs/pkgs/tools/admin/awslogs/default.nix b/nixpkgs/pkgs/tools/admin/awslogs/default.nix
index 6d590b8975b..92b6d62a8a2 100644
--- a/nixpkgs/pkgs/tools/admin/awslogs/default.nix
+++ b/nixpkgs/pkgs/tools/admin/awslogs/default.nix
@@ -14,7 +14,7 @@ python3Packages.buildPythonApplication rec {
doCheck = false;
propagatedBuildInputs = with python3Packages; [
- boto3 termcolor dateutil docutils
+ boto3 termcolor dateutil docutils setuptools
];
meta = with stdenv.lib; {
diff --git a/nixpkgs/pkgs/tools/admin/azure-cli/default.nix b/nixpkgs/pkgs/tools/admin/azure-cli/default.nix
new file mode 100644
index 00000000000..3a80b4752c2
--- /dev/null
+++ b/nixpkgs/pkgs/tools/admin/azure-cli/default.nix
@@ -0,0 +1,248 @@
+{ lib, python, fetchFromGitHub, installShellFiles }:
+
+let
+ version = "2.0.76";
+ src = fetchFromGitHub {
+ owner = "Azure";
+ repo = "azure-cli";
+ rev = "azure-cli-${version}";
+ sha256 = "0zfy8nhw4nx0idh94qidr06vsfxgdk2ky0ih76s27121pdwr05aa";
+ };
+
+ # put packages that needs to be overriden in the py package scope
+ py = import ./python-packages.nix { inherit python lib src version; };
+in
+py.pkgs.toPythonApplication (py.pkgs.buildAzureCliPackage {
+ pname = "azure-cli";
+ inherit version src;
+ disabled = python.isPy27; # namespacing assumes PEP420, which isn't compat with py2
+
+ sourceRoot = "source/src/azure-cli";
+
+ prePatch = ''
+ substituteInPlace setup.py \
+ --replace "javaproperties==0.5.1" "javaproperties" \
+ --replace "pytz==2019.1" "pytz" \
+ --replace "mock~=2.0" "mock" \
+ --replace "azure-mgmt-reservations==0.3.1" "azure-mgmt-reservations~=0.3.1"
+
+ # remove namespace hacks
+ # remove urllib3 because it was added as 'urllib3[secure]', which doesn't get handled well
+ sed -i setup.py \
+ -e '/azure-cli-command_modules-nspkg/d' \
+ -e '/azure-cli-nspkg/d' \
+ -e '/urllib3/d'
+ '';
+
+ nativeBuildInputs = [ installShellFiles ];
+
+ propagatedBuildInputs = with py.pkgs; [
+ azure-batch
+ azure-cli-core
+ azure-cli-telemetry
+ azure-cosmos
+ azure-datalake-store
+ azure-functions-devops-build
+ azure-graphrbac
+ azure-keyvault
+ azure-mgmt-advisor
+ azure-mgmt-apimanagement
+ azure-mgmt-applicationinsights
+ azure-mgmt-appconfiguration
+ azure-mgmt-authorization
+ azure-mgmt-batch
+ azure-mgmt-batchai
+ azure-mgmt-billing
+ azure-mgmt-botservice
+ azure-mgmt-cdn
+ azure-mgmt-cognitiveservices
+ azure-mgmt-compute
+ azure-mgmt-consumption
+ azure-mgmt-containerinstance
+ azure-mgmt-containerregistry
+ azure-mgmt-containerservice
+ azure-mgmt-cosmosdb
+ azure-mgmt-datalake-analytics
+ azure-mgmt-datalake-store
+ azure-mgmt-datamigration
+ azure-mgmt-deploymentmanager
+ azure-mgmt-devtestlabs
+ azure-mgmt-dns
+ azure-mgmt-eventgrid
+ azure-mgmt-eventhub
+ azure-mgmt-hdinsight
+ azure-mgmt-imagebuilder
+ azure-mgmt-iotcentral
+ azure-mgmt-iothub
+ azure-mgmt-iothubprovisioningservices
+ azure-mgmt-keyvault
+ azure-mgmt-kusto
+ azure-mgmt-loganalytics
+ azure-mgmt-managedservices
+ azure-mgmt-managementgroups
+ azure-mgmt-maps
+ azure-mgmt-marketplaceordering
+ azure-mgmt-media
+ azure-mgmt-monitor
+ azure-mgmt-msi
+ azure-mgmt-network
+ azure-mgmt-netapp
+ azure-mgmt-policyinsights
+ azure-mgmt-privatedns
+ azure-mgmt-rdbms
+ azure-mgmt-recoveryservices
+ azure-mgmt-recoveryservicesbackup
+ azure-mgmt-redis
+ azure-mgmt-relay
+ azure-mgmt-reservations
+ azure-mgmt-resource
+ azure-mgmt-search
+ azure-mgmt-security
+ azure-mgmt-servicebus
+ azure-mgmt-servicefabric
+ azure-mgmt-signalr
+ azure-mgmt-sql
+ azure-mgmt-sqlvirtualmachine
+ azure-mgmt-storage
+ azure-mgmt-trafficmanager
+ azure-mgmt-web
+ azure-multiapi-storage
+ azure-storage-blob
+ colorama
+ cryptography
+ Fabric
+ jsmin
+ knack
+ mock
+ paramiko
+ pydocumentdb
+ pygments
+ pyopenssl
+ pytz
+ pyyaml
+ psutil
+ requests
+ scp
+ six
+ sshtunnel
+ urllib3
+ vsts-cd-manager
+ websocket_client
+ xmltodict
+ javaproperties
+ jsondiff
+ # urllib3[secure]
+ ipaddress
+ # shell completion
+ argcomplete
+ ];
+
+ # TODO: make shell completion actually work
+ # uses argcomplete, so completion needs PYTHONPATH to work
+ postInstall = ''
+ installShellCompletion --bash --name az.bash az.completion.sh
+ installShellCompletion --zsh --name _az az.completion.sh
+
+ # remove garbage
+ rm $out/bin/az.bat
+ rm $out/bin/az.completion.sh
+ '';
+
+ # wrap the executable so that the python packages are available
+ # it's just a shebang script which calls `python -m azure.cli "$@"`
+ postFixup = ''
+ wrapProgram $out/bin/az \
+ --set PYTHONPATH $PYTHONPATH
+ '';
+
+ # almost the entire test suite requires an azure account setup and networking
+ # ensure that the azure namespaces are setup correctly and that azure.cli can be accessed
+ checkPhase = ''
+ cd azure # avoid finding local copy
+ ${py.interpreter} -c 'import azure.cli.core; assert "${version}" == azure.cli.core.__version__'
+ HOME=$TMPDIR ${py.interpreter} -m azure.cli --help
+ '';
+
+ # ensure these namespaces are able to be accessed
+ pythonImportsCheck = [
+ "azure.batch"
+ "azure.cli.core"
+ "azure.cli.telemetry"
+ "azure.cosmos"
+ "azure.datalake.store"
+ "azure_functions_devops_build"
+ "azure.graphrbac"
+ "azure.keyvault"
+ "azure.mgmt.advisor"
+ "azure.mgmt.apimanagement"
+ "azure.mgmt.applicationinsights"
+ "azure.mgmt.appconfiguration"
+ "azure.mgmt.authorization"
+ "azure.mgmt.batch"
+ "azure.mgmt.batchai"
+ "azure.mgmt.billing"
+ "azure.mgmt.botservice"
+ "azure.mgmt.cdn"
+ "azure.mgmt.cognitiveservices"
+ "azure.mgmt.compute"
+ "azure.mgmt.consumption"
+ "azure.mgmt.containerinstance"
+ "azure.mgmt.containerregistry"
+ "azure.mgmt.containerservice"
+ "azure.mgmt.cosmosdb"
+ "azure.mgmt.datalake.analytics"
+ "azure.mgmt.datalake.store"
+ "azure.mgmt.datamigration"
+ "azure.mgmt.deploymentmanager"
+ "azure.mgmt.devtestlabs"
+ "azure.mgmt.dns"
+ "azure.mgmt.eventgrid"
+ "azure.mgmt.eventhub"
+ "azure.mgmt.hdinsight"
+ "azure.mgmt.imagebuilder"
+ "azure.mgmt.iotcentral"
+ "azure.mgmt.iothub"
+ "azure.mgmt.iothubprovisioningservices"
+ "azure.mgmt.keyvault"
+ "azure.mgmt.kusto"
+ "azure.mgmt.loganalytics"
+ "azure.mgmt.managedservices"
+ "azure.mgmt.managementgroups"
+ "azure.mgmt.maps"
+ "azure.mgmt.marketplaceordering"
+ "azure.mgmt.media"
+ "azure.mgmt.monitor"
+ "azure.mgmt.msi"
+ "azure.mgmt.network"
+ "azure.mgmt.netapp"
+ "azure.mgmt.policyinsights"
+ "azure.mgmt.privatedns"
+ "azure.mgmt.rdbms"
+ "azure.mgmt.recoveryservices"
+ "azure.mgmt.recoveryservicesbackup"
+ "azure.mgmt.redis"
+ "azure.mgmt.relay"
+ "azure.mgmt.reservations"
+ "azure.mgmt.resource"
+ "azure.mgmt.search"
+ "azure.mgmt.security"
+ "azure.mgmt.servicebus"
+ "azure.mgmt.servicefabric"
+ "azure.mgmt.signalr"
+ "azure.mgmt.sql"
+ "azure.mgmt.sqlvirtualmachine"
+ "azure.mgmt.storage"
+ "azure.mgmt.trafficmanager"
+ "azure.mgmt.web"
+ "azure.storage.blob"
+ "azure.storage.common"
+ ];
+
+ meta = with lib; {
+ homepage = "https://github.com/Azure/azure-cli";
+ description = "Next generation multi-platform command line experience for Azure";
+ license = licenses.mit;
+ maintainers = with maintainers; [ jonringer ];
+ };
+})
+
diff --git a/nixpkgs/pkgs/tools/admin/azure-cli/python-packages.nix b/nixpkgs/pkgs/tools/admin/azure-cli/python-packages.nix
new file mode 100644
index 00000000000..06886ba4c79
--- /dev/null
+++ b/nixpkgs/pkgs/tools/admin/azure-cli/python-packages.nix
@@ -0,0 +1,250 @@
+{ python, lib, src, version }:
+
+let
+ buildAzureCliPackage = with py.pkgs; attrs: buildPythonPackage (attrs // {
+ # Remove overly restrictive version contraints and obsolete namespace setup
+ prePatch = (attrs.prePatch or "") + ''
+ rm -f azure_bdist_wheel.py tox.ini
+ substituteInPlace setup.py \
+ --replace "wheel==0.30.0" "wheel"
+ sed -i "/azure-namespace-package/c\ " setup.cfg
+ '';
+
+ # Prevent these __init__'s from violating PEP420, only needed for python2
+ postInstall = (attrs.postInstall or "") + ''
+ rm $out/${python.sitePackages}/azure/{,__pycache__/}__init__.* \
+ $out/${python.sitePackages}/azure/cli/{,__pycache__/}__init__.*
+ '';
+
+ checkInputs = [ mock pytest ] ++ (attrs.checkInputs or []);
+ checkPhase = attrs.checkPhase or ''
+ cd azure
+ HOME=$TMPDIR pytest
+ '';
+ });
+
+ overrideAzureMgmtPackage = package: version: extension: sha256:
+ package.overrideAttrs(oldAttrs: rec {
+ inherit version;
+
+ src = py.pkgs.fetchPypi {
+ inherit (oldAttrs) pname;
+ inherit version sha256 extension;
+ };
+
+ preBuild = ''
+ rm -f azure_bdist_wheel.py
+ substituteInPlace setup.cfg \
+ --replace "azure-namespace-package = azure-mgmt-nspkg" ""
+ '';
+ });
+
+ py = python.override {
+ packageOverrides = self: super: {
+ inherit buildAzureCliPackage;
+
+ # core and the actual application are highly coupled
+ azure-cli-core = buildAzureCliPackage {
+ pname = "azure-cli-core";
+ inherit version src;
+
+ sourceRoot = "source/src/azure-cli-core";
+
+ propagatedBuildInputs = with self; [
+ adal
+ argcomplete
+ azure-cli-telemetry
+ colorama
+ jmespath
+ humanfriendly
+ knack
+ msrest
+ msrestazure
+ paramiko
+ pygments
+ pyjwt
+ pyopenssl
+ pyyaml
+ requests
+ six
+ azure-mgmt-resource
+ tabulate
+ pyperclip
+ psutil
+ ]
+ ++ lib.optionals isPy3k [ antlr4-python3-runtime ]
+ ++ lib.optionals (!isPy3k) [ enum34 futures antlr4-python2-runtime ndg-httpsclient ];
+
+ # ignore test that does network call
+ checkPhase = ''
+ HOME=$TMPDIR pytest --ignore=azure/cli/core/tests/test_profile.py
+ '';
+
+ pythonImportsCheck = [
+ "azure.cli.telemetry"
+ "azure.cli.core"
+ ];
+ };
+
+ azure-cli-telemetry = buildAzureCliPackage {
+ pname = "azure-cli-telemetry";
+ version = "1.0.4"; # might be wrong, but doesn't really matter
+ inherit src;
+
+ sourceRoot = "source/src/azure-cli-telemetry";
+
+ propagatedBuildInputs = with super; [
+ applicationinsights
+ portalocker
+ ];
+
+ # ignore flaky test
+ checkPhase = ''
+ cd azure
+ HOME=$TMPDIR pytest -k 'not test_create_telemetry_note_file_from_scratch'
+ '';
+ };
+
+ azure-mgmt-resource = overrideAzureMgmtPackage super.azure-mgmt-resource "4.0.0" "zip"
+ "0gy89bi89ikg5hps8rvnq28r33lixci3sk2m86jvziv9fh9rz41b";
+
+ azure-mgmt-compute = overrideAzureMgmtPackage super.azure-mgmt-compute "8.0.0" "zip"
+ "06hmf9iq2yqpmmvw7pr9zm4v427q03i436lnin3aczizfndrk76i";
+
+ azure-mgmt-consumption = overrideAzureMgmtPackage super.azure-mgmt-consumption "2.0.0" "zip"
+ "12ai4qps73ivawh0yzvgb148ksx02r30pqlvfihx497j62gsi1cs";
+
+ azure-mgmt-containerservice = overrideAzureMgmtPackage super.azure-mgmt-containerservice "7.0.0" "zip"
+ "104w7rxv7hy84yzddbbpkjqha04ghr0zz9qy788n3wl69cj4cv1a";
+
+ azure-mgmt-cosmosdb = overrideAzureMgmtPackage super.azure-mgmt-cosmosdb "0.8.0" "zip"
+ "0iakxb2rr1w9171802m9syjzqas02vjah711mpagbgcj549mjysb";
+
+ azure-mgmt-iothub = overrideAzureMgmtPackage super.azure-mgmt-iothub "0.8.2" "zip"
+ "0w3w1d156rnkwjdarv3qvycklxr3z2j7lry7a3jfgj3ykzny12rq";
+
+ azure-mgmt-kusto = overrideAzureMgmtPackage super.azure-mgmt-kusto "0.3.0" "zip"
+ "1pmcdgimd66h964a3d5m2j2fbydshcwhrk87wblhwhfl3xwbgf4y";
+
+ azure-mgmt-devtestlabs = overrideAzureMgmtPackage super.azure-mgmt-devtestlabs "2.2.0" "zip"
+ "15lpyv9z8ss47rjmg1wx5akh22p9br2vckaj7jk3639vi38ac5nl";
+
+ azure-mgmt-netapp = overrideAzureMgmtPackage super.azure-mgmt-netapp "0.6.0" "zip"
+ "10ymvyj386z9bjdm2g1b5a4vfnn87ig2zm6xn2xddvbpy0jxnyfv";
+
+ azure-mgmt-dns = overrideAzureMgmtPackage super.azure-mgmt-dns "2.1.0" "zip"
+ "1l55py4fzzwhxlmnwa41gpmqk9v2ncc79w7zq11sm9a5ynrv2c1p";
+
+ azure-mgmt-network = overrideAzureMgmtPackage super.azure-mgmt-network "7.0.0" "zip"
+ "0ss5yc9k3dh78lb88nfh3z98yz1pcd8d7d7cfjlxmv4n3dlr1kij";
+
+ azure-mgmt-msi = overrideAzureMgmtPackage super.azure-mgmt-msi "0.2.0" "zip"
+ "0rvik03njz940x2hvqg6iiq8k0d88gyygsr86w8s0sa12sdbq8l6";
+
+ azure-mgmt-web = overrideAzureMgmtPackage super.azure-mgmt-web "0.42.0" "zip"
+ "0vp40i9aaw5ycz7s7qqir6jq7327f7zg9j9i8g31qkfl1h1c7pdn";
+
+ azure-mgmt-reservations = overrideAzureMgmtPackage super.azure-mgmt-reservations "0.3.2" "zip"
+ "0nksxjh5kh09dr0zw667fg8mzik4ymvfq3dipwag6pynbqr9ls4l";
+
+ azure-mgmt-security = overrideAzureMgmtPackage super.azure-mgmt-security "0.1.0" "zip"
+ "1cb466722bs0ribrirb32kc299716pl0pwivz3jyn40dd78cwhhx";
+
+ azure-mgmt-datamigration = overrideAzureMgmtPackage super.azure-mgmt-datamigration "0.1.0" "zip"
+ "1pq5rn32yvrf5kqjafnj0kc92gpfg435w2l0k7cm8gvlja4r4m77";
+
+ azure-mgmt-relay = overrideAzureMgmtPackage super.azure-mgmt-relay "0.1.0" "zip"
+ "1jss6qhvif8l5s0lblqw3qzijjf0h88agciiydaa7f4q577qgyfr";
+
+ azure-mgmt-eventhub = overrideAzureMgmtPackage super.azure-mgmt-eventhub "2.6.0" "zip"
+ "1nnp2ki4iz4f4897psmwb0v5khrwh84fgxja7nl7g73g3ym20sz8";
+
+ azure-mgmt-keyvault = overrideAzureMgmtPackage super.azure-mgmt-keyvault "1.1.0" "zip"
+ "16a0d3j5dilbp7pd7gbwf8jr46vzbjim1p9alcmisi12m4km7885";
+
+ azure-mgmt-containerregistry = overrideAzureMgmtPackage super.azure-mgmt-containerregistry "3.0.0rc7" "zip"
+ "1bzfpbz186dhnxn0blgr20xxnk67gkr8ysn2b3f1r41bq9hz97xp";
+
+ azure-mgmt-monitor = overrideAzureMgmtPackage super.azure-mgmt-monitor "0.5.2" "zip"
+ "1r01aq5rbynbc1my4qljdifjdj9h65bh8cdzgd7vm4ij7r48v9gi";
+
+ azure-mgmt-advisor = overrideAzureMgmtPackage super.azure-mgmt-advisor "2.0.1" "zip"
+ "1wsfkprdrn22mwm24y2zlcms8ppp7jwq3s86r3ymbl29pbaxca8r";
+
+ azure-mgmt-applicationinsights = overrideAzureMgmtPackage super.azure-mgmt-applicationinsights "0.1.1" "zip"
+ "16raxr5naszrxmgbfhsvh7rqcph5cx6x3f480790m79ykvmjj0pi";
+
+ azure-mgmt-authorization = overrideAzureMgmtPackage super.azure-mgmt-authorization "0.52.0" "zip"
+ "0357laxgldb7lvvws81r8xb6mrq9dwwnr1bnwdnyj4bw6p21i9hn";
+
+ azure-mgmt-storage = overrideAzureMgmtPackage super.azure-mgmt-storage "5.0.0" "zip"
+ "1gzsscfnnfb8gxs34dq9hs339hidlzas7kgivw0234v3qz4gy9yx";
+
+ azure-mgmt-servicefabric = overrideAzureMgmtPackage super.azure-mgmt-servicefabric "0.2.0" "zip"
+ "1bcq6fcgrsvmk6q7v8mxzn1180jm2qijdqkqbv1m117zp1wj5gxj";
+
+ azure-mgmt-hdinsight = overrideAzureMgmtPackage super.azure-mgmt-hdinsight "1.1.0" "zip"
+ "0lj9dhb14dx4ag5pgd2zvrmn9y5ziq2qywvw38ccbv9g3bxpglkn";
+
+ azure-graphrbac = super.azure-graphrbac.overrideAttrs(oldAttrs: rec {
+ version = "0.60.0";
+
+ src = super.fetchPypi {
+ inherit (oldAttrs) pname;
+ inherit version;
+ sha256 = "1zna5vb887clvpyfp5439vhlz3j4z95blw9r7y86n6cfpzc65fyh";
+ extension = "zip";
+ };
+ });
+
+ azure-storage-blob = super.azure-storage-blob.overrideAttrs(oldAttrs: rec {
+ version = "1.5.0";
+ src = super.fetchPypi {
+ inherit (oldAttrs) pname;
+ inherit version;
+ sha256 = "0b15dzy75fml994gdfmaw5qcyij15gvh968mk3hg94d1wxwai1zi";
+ };
+ });
+
+ azure-storage-common = super.azure-storage-common.overrideAttrs(oldAttrs: rec {
+ version = "1.4.2";
+ src = super.fetchPypi {
+ inherit (oldAttrs) pname;
+ inherit version;
+ sha256 = "00g41b5q4ijlv02zvzjgfwrwy71cgr3lc3if4nayqmyl6xsprj2f";
+ };
+ });
+
+ # part of azure.mgmt.datalake namespace
+ azure-mgmt-datalake-analytics = super.azure-mgmt-datalake-analytics.overrideAttrs(oldAttrs: rec {
+ version = "0.2.1";
+
+ src = super.fetchPypi {
+ inherit (oldAttrs) pname;
+ inherit version;
+ sha256 = "192icfx82gcl3igr18w062744376r2ivh63c8nd7v17mjk860yac";
+ extension = "zip";
+ };
+
+ preBuild = ''
+ rm azure_bdist_wheel.py
+ substituteInPlace setup.cfg \
+ --replace "azure-namespace-package = azure-mgmt-datalake-nspkg" ""
+ '';
+ });
+
+
+
+
+
+
+
+
+
+
+
+
+ };
+ };
+in
+ py
diff --git a/nixpkgs/pkgs/tools/admin/berglas/default.nix b/nixpkgs/pkgs/tools/admin/berglas/default.nix
index 239fc9691f7..d75c317187b 100644
--- a/nixpkgs/pkgs/tools/admin/berglas/default.nix
+++ b/nixpkgs/pkgs/tools/admin/berglas/default.nix
@@ -3,16 +3,16 @@
buildGoModule rec {
name = "berglas-${version}";
- version = "0.2.0";
+ version = "0.2.1";
src = fetchFromGitHub {
owner = "GoogleCloudPlatform";
repo = "berglas";
- rev = "v0.2.0";
- sha256 = "1d75x0n1d1ry2xmy6h64qqc0dlnivipycv3p0aihyp3l810gpdbk";
+ rev = "v0.2.1";
+ sha256 = "1m34rxiynmgsris1avjn7am50b8sds77515zlnna9qvsrywbzljc";
};
- modSha256 = "0fvgvrvdpdwjx51wmbf0rdwnr9l1l212qbvznvif3xsi5nnlkx6r";
+ modSha256 = "0lfcrsb4r5hxxd652cxff23fnbrphp3lgwp5anpaddzcjcd2qyj8";
meta = with stdenv.lib; {
description = "A tool for managing secrets on Google Cloud";
diff --git a/nixpkgs/pkgs/tools/admin/boulder/default.nix b/nixpkgs/pkgs/tools/admin/boulder/default.nix
new file mode 100644
index 00000000000..a21a3ebdde1
--- /dev/null
+++ b/nixpkgs/pkgs/tools/admin/boulder/default.nix
@@ -0,0 +1,33 @@
+{ buildGoPackage
+, libtool
+, fetchFromGitHub
+, lib
+}:
+
+let
+ version = "release-2019-10-13";
+
+in buildGoPackage {
+
+ pname = "boulder";
+ inherit version;
+
+ goPackagePath = "github.com/letsencrypt/boulder";
+
+ buildInputs = [ libtool ];
+
+ src = fetchFromGitHub {
+ owner = "letsencrypt";
+ repo = "boulder";
+ rev = version;
+ sha256 = "0kis23dnjja6jp192rjpv2m9m2zmzfwhs93440nxg354k6fp8jdg";
+ };
+
+ meta = {
+ homepage = "https://github.com/letsencrypt/boulder";
+ description = "An ACME-based CA, written in Go";
+ license = [ lib.licenses.mpl20 ];
+ maintainers = [ ];
+ };
+
+}
diff --git a/nixpkgs/pkgs/tools/admin/certbot/0001-Don-t-use-distutils.StrictVersion-that-cannot-handle.patch b/nixpkgs/pkgs/tools/admin/certbot/0001-Don-t-use-distutils.StrictVersion-that-cannot-handle.patch
new file mode 100644
index 00000000000..81c1dd0e6a3
--- /dev/null
+++ b/nixpkgs/pkgs/tools/admin/certbot/0001-Don-t-use-distutils.StrictVersion-that-cannot-handle.patch
@@ -0,0 +1,60 @@
+From 411b8a413baf39e9b967949b17a992e81a11abfe Mon Sep 17 00:00:00 2001
+From: Frederik Rietdijk <fridh@fridh.nl>
+Date: Tue, 29 Oct 2019 14:08:07 +0100
+Subject: [PATCH] Don't use distutils.StrictVersion that cannot handle certain
+ versions
+
+```
+ File "setup.py", line 63, in <module>
+ if StrictVersion(setuptools_version) >= StrictVersion('36.2'):
+File
+"/nix/store/zdh16dcvjw99ybam59zd2ijb6bx138j0-python3-3.7.5/lib/python3.7/distutils/version.py",
+line 40, in __init__
+ self.parse(vstring)
+File
+"/nix/store/zdh16dcvjw99ybam59zd2ijb6bx138j0-python3-3.7.5/lib/python3.7/distutils/version.py",
+line 137, in parse
+ raise ValueError("invalid version number '%s'" % vstring)
+ValueError: invalid version number '41.4.0.post20191022'
+```
+---
+ setup.py | 15 +--------------
+ 1 file changed, 1 insertion(+), 14 deletions(-)
+
+diff --git a/setup.py b/setup.py
+index 1f4838c90..831528d77 100644
+--- a/setup.py
++++ b/setup.py
+@@ -3,7 +3,6 @@ import os
+ import re
+ import sys
+
+-from distutils.version import StrictVersion
+ from setuptools import find_packages, setup, __version__ as setuptools_version
+ from setuptools.command.test import test as TestCommand
+
+@@ -56,20 +55,8 @@ install_requires = [
+
+ # Add pywin32 on Windows platforms to handle low-level system calls.
+ # This dependency needs to be added using environment markers to avoid its installation on Linux.
+-# However environment markers are supported only with setuptools >= 36.2.
+-# So this dependency is not added for old Linux distributions with old setuptools,
+-# in order to allow these systems to build certbot from sources.
+ pywin32_req = 'pywin32>=224'
+-if StrictVersion(setuptools_version) >= StrictVersion('36.2'):
+- install_requires.append(pywin32_req + " ; sys_platform == 'win32'")
+-elif 'bdist_wheel' in sys.argv[1:]:
+- raise RuntimeError('Error, you are trying to build certbot wheels using an old version '
+- 'of setuptools. Version 36.2+ of setuptools is required.')
+-elif os.name == 'nt':
+- # This branch exists to improve this package's behavior on Windows. Without
+- # it, if the sdist is installed on Windows with an old version of
+- # setuptools, pywin32 will not be specified as a dependency.
+- install_requires.append(pywin32_req)
++install_requires.append(pywin32_req + " ; sys_platform == 'win32'")
+
+ dev_extras = [
+ 'astroid==1.6.5',
+--
+2.23.0
+
diff --git a/nixpkgs/pkgs/tools/admin/certbot/0001-pebble_artifacts-hardcode-pebble-location.patch b/nixpkgs/pkgs/tools/admin/certbot/0001-pebble_artifacts-hardcode-pebble-location.patch
new file mode 100644
index 00000000000..33f0cd216c1
--- /dev/null
+++ b/nixpkgs/pkgs/tools/admin/certbot/0001-pebble_artifacts-hardcode-pebble-location.patch
@@ -0,0 +1,24 @@
+From 8ddf2697508eca514a0dde4646ad14ac3ba34b2a Mon Sep 17 00:00:00 2001
+From: Florian Klink <flokli@flokli.de>
+Date: Fri, 18 Oct 2019 16:06:50 +0200
+Subject: [PATCH] pebble_artifacts: hardcode pebble location
+
+---
+ certbot-ci/certbot_integration_tests/utils/pebble_artifacts.py | 1 +
+ 1 file changed, 1 insertion(+)
+
+diff --git a/certbot-ci/certbot_integration_tests/utils/pebble_artifacts.py b/certbot-ci/certbot_integration_tests/utils/pebble_artifacts.py
+index 2b1557928..d2603c51a 100644
+--- a/certbot-ci/certbot_integration_tests/utils/pebble_artifacts.py
++++ b/certbot-ci/certbot_integration_tests/utils/pebble_artifacts.py
+@@ -22,6 +22,7 @@ def fetch(workspace):
+
+
+ def _fetch_asset(asset, suffix):
++ return "@pebble@"
+ asset_path = os.path.join(ASSETS_PATH, '{0}_{1}_{2}'.format(asset, PEBBLE_VERSION, suffix))
+ if not os.path.exists(asset_path):
+ asset_url = ('https://github.com/letsencrypt/pebble/releases/download/{0}/{1}_{2}'
+--
+2.23.0
+
diff --git a/nixpkgs/pkgs/tools/admin/certbot/default.nix b/nixpkgs/pkgs/tools/admin/certbot/default.nix
index 782af149ed6..7d3d019e81f 100644
--- a/nixpkgs/pkgs/tools/admin/certbot/default.nix
+++ b/nixpkgs/pkgs/tools/admin/certbot/default.nix
@@ -1,21 +1,28 @@
-{ stdenv, python3Packages, fetchFromGitHub, dialog }:
+{ stdenv, python37Packages, fetchFromGitHub, fetchurl, dialog, autoPatchelfHook, nginx, pebble }:
-python3Packages.buildPythonApplication rec {
+
+python37Packages.buildPythonApplication rec {
pname = "certbot";
- version = "0.31.0";
+ version = "0.39.0";
src = fetchFromGitHub {
owner = pname;
repo = pname;
rev = "v${version}";
- sha256 = "0rwjxmkpicyc9a5janvj1lfi430nq6ha94nyfgp11ds9fyydbh1s";
+ sha256 = "1s32xg2ljz7ci78wc8rqkjvgrz7vprb7fkznrlf9a4blm55pp54c";
};
- propagatedBuildInputs = with python3Packages; [
+ patches = [
+ ./0001-pebble_artifacts-hardcode-pebble-location.patch
+ ./0001-Don-t-use-distutils.StrictVersion-that-cannot-handle.patch
+ ];
+
+ propagatedBuildInputs = with python37Packages; [
ConfigArgParse
acme
configobj
cryptography
+ distro
josepy
parsedatetime
psutil
@@ -26,11 +33,19 @@ python3Packages.buildPythonApplication rec {
zope_component
zope_interface
];
- buildInputs = [ dialog ] ++ (with python3Packages; [ mock gnureadline ]);
- patchPhase = ''
+ buildInputs = [ dialog ] ++ (with python37Packages; [ mock gnureadline ]);
+
+ checkInputs = with python37Packages; [
+ pytest_xdist
+ pytest
+ dateutil
+ ];
+
+ postPatch = ''
substituteInPlace certbot/notify.py --replace "/usr/sbin/sendmail" "/run/wrappers/bin/sendmail"
substituteInPlace certbot/util.py --replace "sw_vers" "/usr/bin/sw_vers"
+ substituteInPlace certbot-ci/certbot_integration_tests/utils/pebble_artifacts.py --replace "@pebble@" "${pebble}/bin/pebble"
'';
postInstall = ''
@@ -40,7 +55,15 @@ python3Packages.buildPythonApplication rec {
done
'';
- doCheck = !stdenv.isDarwin; # On Hydra Darwin tests fail with "Too many open files".
+ # tests currently time out, because they're trying to do network access
+ # Upstream issue: https://github.com/certbot/certbot/issues/7450
+ doCheck = false;
+
+ checkPhase = ''
+ PATH="$out/bin:${nginx}/bin:$PATH" pytest certbot-ci/certbot_integration_tests
+ '';
+
+ dontUseSetuptoolsCheck = true;
meta = with stdenv.lib; {
homepage = src.meta.homepage;
diff --git a/nixpkgs/pkgs/tools/admin/eksctl/default.nix b/nixpkgs/pkgs/tools/admin/eksctl/default.nix
index c2035aebb35..b7208d7b867 100644
--- a/nixpkgs/pkgs/tools/admin/eksctl/default.nix
+++ b/nixpkgs/pkgs/tools/admin/eksctl/default.nix
@@ -2,16 +2,16 @@
buildGoModule rec {
pname = "eksctl";
- version = "0.6.0";
+ version = "0.10.2";
src = fetchFromGitHub {
owner = "weaveworks";
repo = pname;
rev = version;
- sha256 = "0gh6p912y8i295p3vwhlrsxky761zlvrykcl6jm6j2qhwl5k4k29";
+ sha256 = "0j1kzll23rj87nabzjjhxydg95cnxlwbkqp3qivf96bv1xlby75k";
};
- modSha256 = "0c8hbb73w1922qh895lsk0m9i7lk9kzrvxjc4crwsfpn9pv0qgd3";
+ modSha256 = "18n4aimf9diy9w7f2k08cd7xr8jay6pid5mwrc24y2pqkjhgpyp7";
subPackages = [ "cmd/eksctl" ];
diff --git a/nixpkgs/pkgs/tools/admin/elasticsearch-curator/default.nix b/nixpkgs/pkgs/tools/admin/elasticsearch-curator/default.nix
new file mode 100644
index 00000000000..8d8f9070499
--- /dev/null
+++ b/nixpkgs/pkgs/tools/admin/elasticsearch-curator/default.nix
@@ -0,0 +1,81 @@
+{ lib, fetchFromGitHub, python }:
+
+let
+py = python.override {
+ packageOverrides = self: super: {
+ click = super.click.overridePythonAttrs (oldAttrs: rec {
+ version = "6.7";
+ src = oldAttrs.src.override {
+ inherit version;
+ sha256 = "f15516df478d5a56180fbf80e68f206010e6d160fc39fa508b65e035fd75130b";
+ };
+ });
+ };
+};
+in
+
+with py.pkgs;
+buildPythonApplication rec {
+ pname = "elasticsearch-curator";
+ version = "5.8.1";
+
+ src = fetchFromGitHub {
+ owner = "elastic";
+ repo = "curator";
+ rev = "v${version}";
+ sha256 = "1shr9jslirjnbvma3p19djsnamxl7f3m9c8zrlclk57zv8rnwpkr";
+ };
+
+ # The test hangs so we disable it.
+ doCheck = false;
+
+ propagatedBuildInputs = [
+ click
+ certifi
+ requests-aws4auth
+ pyopenssl
+ voluptuous
+ pyyaml
+ elasticsearch
+ boto3
+ ];
+
+ checkInputs = [
+ nosexcover
+ coverage
+ nose
+ mock
+ funcsigs
+ ];
+
+ postPatch = ''
+ sed -i s/pyyaml==3.13/pyyaml/g setup.cfg setup.py
+ sed -i s/pyyaml==3.12/pyyaml/g setup.cfg setup.py
+ substituteInPlace setup.py \
+ --replace "urllib3>=1.24.2,<1.25" "urllib3"
+ substituteInPlace setup.cfg \
+ --replace "urllib3>=1.24.2,<1.25" "urllib3"
+ '';
+
+ meta = with lib; {
+ homepage = https://github.com/elastic/curator;
+ description = "Curate, or manage, your Elasticsearch indices and snapshots";
+ license = licenses.asl20;
+ longDescription = ''
+ Elasticsearch Curator helps you curate, or manage, your Elasticsearch
+ indices and snapshots by:
+
+ * Obtaining the full list of indices (or snapshots) from the cluster, as the
+ actionable list
+
+ * Iterate through a list of user-defined filters to progressively remove
+ indices (or snapshots) from this actionable list as needed.
+
+ * Perform various actions on the items which remain in the actionable list.
+ '';
+ maintainers = with maintainers; [ basvandijk ];
+
+ # https://github.com/elastic/curator/pull/1280
+ #broken = versionAtLeast click.version "7.0";
+ };
+}
diff --git a/nixpkgs/pkgs/tools/admin/fbvnc/default.nix b/nixpkgs/pkgs/tools/admin/fbvnc/default.nix
new file mode 100644
index 00000000000..ec32b5f0a26
--- /dev/null
+++ b/nixpkgs/pkgs/tools/admin/fbvnc/default.nix
@@ -0,0 +1,30 @@
+{stdenv, fetchFromGitHub}:
+stdenv.mkDerivation rec {
+ name = "${pname}-${version}";
+ pname = "fbvnc";
+ version = "1.0.2";
+
+ src = fetchFromGitHub {
+ owner = "zohead";
+ repo = pname;
+ sha256 = "0lkr4j1wsa05av2g9w99rr9w4j4k7a21vp36x0a3h50y8bmgwgm1";
+ rev = "783204ff6c92afec33d6d36f7e74f1fcf2b1b601";
+ };
+
+ buildInputs = [];
+
+ installPhase = ''
+ mkdir -p "$out/bin"
+ cp fbvnc "$out/bin"
+ mkdir -p "$out/share/doc/${pname}"
+ cp README* "$out/share/doc/${pname}"
+ '';
+
+ meta = {
+ description = "Framebuffer VNC client";
+ license = stdenv.lib.licenses.bsd3;
+ maintainers = [stdenv.lib.maintainers.raskin];
+ platforms = stdenv.lib.platforms.linux;
+ homepage = "https://github.com/zohead/fbvnc/";
+ };
+}
diff --git a/nixpkgs/pkgs/tools/admin/google-cloud-sdk/default.nix b/nixpkgs/pkgs/tools/admin/google-cloud-sdk/default.nix
index feb0b996b61..5e02c8e3483 100644
--- a/nixpkgs/pkgs/tools/admin/google-cloud-sdk/default.nix
+++ b/nixpkgs/pkgs/tools/admin/google-cloud-sdk/default.nix
@@ -21,18 +21,18 @@ let
sources = name: system: {
x86_64-darwin = {
url = "${baseUrl}/${name}-darwin-x86_64.tar.gz";
- sha256 = "17gqrfnqbhp9hhlb57nxii18pb5cnxn3k8p2djiw699qkx3aqs13";
+ sha256 = "10h0khh8npj2j5f7h3z86h46zbb1skbfs74firssich6jk7rx6km";
};
x86_64-linux = {
url = "${baseUrl}/${name}-linux-x86_64.tar.gz";
- sha256 = "1bgvwgyshh0icb07dacrip0q5xs5l2315m1gz5ggz5dhnf0vrz0q";
+ sha256 = "182r9lgpks50ihcrkarc5w6l4rfmpdnx825lazamj5j2jsha73xw";
};
}.${system};
in stdenv.mkDerivation rec {
pname = "google-cloud-sdk";
- version = "255.0.0";
+ version = "268.0.0";
src = fetchurl (sources "${pname}-${version}" stdenv.hostPlatform.system);
@@ -84,7 +84,7 @@ in stdenv.mkDerivation rec {
# This package contains vendored dependencies. All have free licenses.
license = licenses.free;
homepage = "https://cloud.google.com/sdk/";
- maintainers = with maintainers; [ stephenmw zimbatm ];
+ maintainers = with maintainers; [ pradyuman stephenmw zimbatm ];
platforms = [ "x86_64-linux" "x86_64-darwin" ];
};
}
diff --git a/nixpkgs/pkgs/tools/admin/pebble/default.nix b/nixpkgs/pkgs/tools/admin/pebble/default.nix
new file mode 100644
index 00000000000..5aa220fd89e
--- /dev/null
+++ b/nixpkgs/pkgs/tools/admin/pebble/default.nix
@@ -0,0 +1,26 @@
+{ buildGoPackage
+, fetchFromGitHub
+, lib
+}:
+
+let
+ version = "v2.2.2";
+ pname = "pebble";
+in buildGoPackage {
+ inherit pname version;
+ goPackagePath = "github.com/letsencrypt/${pname}";
+
+ src = fetchFromGitHub {
+ owner = "letsencrypt";
+ repo = pname;
+ rev = version;
+ sha256 = "10g6ivdxxp3632wk0gvmp75v9x668kchhmlczbsq8qnsc8sb8pwf";
+ };
+
+ meta = {
+ homepage = "https://github.com/letsencrypt/boulder";
+ description = "A miniature version of Boulder, Pebble is a small RFC 8555 ACME test server not suited for a production CA";
+ license = [ lib.licenses.mpl20 ];
+ maintainers = [ ];
+ };
+}
diff --git a/nixpkgs/pkgs/tools/admin/procs/default.nix b/nixpkgs/pkgs/tools/admin/procs/default.nix
index b2d173d5aab..24f8036b428 100644
--- a/nixpkgs/pkgs/tools/admin/procs/default.nix
+++ b/nixpkgs/pkgs/tools/admin/procs/default.nix
@@ -4,16 +4,16 @@
rustPlatform.buildRustPackage rec {
pname = "procs";
- version = "0.8.11";
+ version = "0.8.13";
src = fetchFromGitHub {
owner = "dalance";
repo = pname;
rev = "v${version}";
- sha256 = "1bds84r5qw1chqd92rlijn4arqaywc5x4yjss3523ka55w3mphmf";
+ sha256 = "0yy41v2crds9500fa4r0kqiddciqkilr2h13nrjqy44ckvw2mi5y";
};
- cargoSha256 = "11djms4rj3a1fs6f091gli32w6kww77n0072p0hwvqmc9yy1x57w";
+ cargoSha256 = "1gnl97h0l9k8xnrwl6807qlbx13vd45kmla02mk9p1h52sr0din5";
buildInputs = stdenv.lib.optional stdenv.isDarwin Security;
diff --git a/nixpkgs/pkgs/tools/admin/pulumi/data.nix b/nixpkgs/pkgs/tools/admin/pulumi/data.nix
new file mode 100644
index 00000000000..1edc80c24e2
--- /dev/null
+++ b/nixpkgs/pkgs/tools/admin/pulumi/data.nix
@@ -0,0 +1,51 @@
+# DO NOT EDIT! This file is generated automatically by update.sh
+{ }:
+{
+ version = "1.4.0";
+ pulumiPkgs = {
+ x86_64-linux = [
+ {
+ url = "https://get.pulumi.com/releases/sdk/pulumi-v1.4.0-linux-x64.tar.gz";
+ sha256 = "00ywy2ba4xha6gwd42i3fdrk1myivkd1r6ijdr2vkianmg524k6f";
+ }
+ {
+ url = "https://api.pulumi.com/releases/plugins/pulumi-resource-random-v0.2.0-linux-amd64.tar.gz";
+ sha256 = "1hj4gysjipd091f106a7xz02g9cail5d11rn6j08m0xphg9cf3fn";
+ }
+ {
+ url = "https://api.pulumi.com/releases/plugins/pulumi-resource-gcp-v1.4.1-linux-amd64.tar.gz";
+ sha256 = "0r6xpsb2riqmxwxw28lbi3xd7w4ds510gw99j1rr57h5b9bq19jj";
+ }
+ {
+ url = "https://api.pulumi.com/releases/plugins/pulumi-resource-kubernetes-v1.2.3-linux-amd64.tar.gz";
+ sha256 = "0m7fajy3cy1agsz787ak548khwj8rwahs1ibaswqfyyw092iyzb9";
+ }
+ {
+ url = "https://api.pulumi.com/releases/plugins/pulumi-resource-aws-v1.7.0-linux-amd64.tar.gz";
+ sha256 = "1qw90l7h8yn06bz2l2995nbrc3svs223dm3ys1807amj4n2jyfwb";
+ }
+ ];
+ x86_64-darwin = [
+ {
+ url = "https://get.pulumi.com/releases/sdk/pulumi-v1.4.0-darwin-x64.tar.gz";
+ sha256 = "02vqw9gn17dy3rfh0j00k9f827l42g3nl3rhlcbc8jbgx3n9c9qy";
+ }
+ {
+ url = "https://api.pulumi.com/releases/plugins/pulumi-resource-random-v0.2.0-darwin-amd64.tar.gz";
+ sha256 = "077j9fp8ix00rcqrq8qxk3kvz6gz6sknzb2iv3qjvkh6yh292mz3";
+ }
+ {
+ url = "https://api.pulumi.com/releases/plugins/pulumi-resource-gcp-v1.4.1-darwin-amd64.tar.gz";
+ sha256 = "1i2vf3bxwf8awvw183hq9bbnmznda1jpv1zqghgz2ybx4s0915nx";
+ }
+ {
+ url = "https://api.pulumi.com/releases/plugins/pulumi-resource-kubernetes-v1.2.3-darwin-amd64.tar.gz";
+ sha256 = "123czx1c31r5r91k2jhdgmnffypnl8w1a6h9mr2rdhwgbx8hzq40";
+ }
+ {
+ url = "https://api.pulumi.com/releases/plugins/pulumi-resource-aws-v1.7.0-darwin-amd64.tar.gz";
+ sha256 = "0cl0vakppxi0v8ym8b4fzhzb10nl84wd0vfik8gpfwsg7zwdzhlp";
+ }
+ ];
+ };
+}
diff --git a/nixpkgs/pkgs/tools/admin/pulumi/default.nix b/nixpkgs/pkgs/tools/admin/pulumi/default.nix
index a7199c66547..977c1991fab 100644
--- a/nixpkgs/pkgs/tools/admin/pulumi/default.nix
+++ b/nixpkgs/pkgs/tools/admin/pulumi/default.nix
@@ -3,26 +3,16 @@
with lib;
let
-
- version = "1.1.0";
-
- # switch the dropdown to โ€œmanualโ€ on https://pulumi.io/quickstart/install.html # TODO: update script
- pulumiArchPackage = {
- x86_64-linux = {
- url = "https://get.pulumi.com/releases/sdk/pulumi-v${version}-linux-x64.tar.gz";
- sha256 = "1r498pxsjdj9mhdzh9vh4nw8fcjxfga44xlg43b0yakkgrp7c224";
- };
- x86_64-darwin = {
- url = "https://get.pulumi.com/releases/sdk/pulumi-v${version}-darwin-x64.tar.gz";
- sha256 = "02nr5yxn5aqgbwrnl4shgd6rh4n4v8giqki4qkbgx74xf3bbwihg";
- };
- };
-
+ data = import ./data.nix {};
in stdenv.mkDerivation {
- inherit version;
pname = "pulumi";
+ version = data.version;
+
+ postUnpack = ''
+ mv pulumi-* pulumi
+ '';
- src = fetchurl pulumiArchPackage.${stdenv.hostPlatform.system};
+ srcs = map (x: fetchurl x) data.pulumiPkgs.${stdenv.hostPlatform.system};
installPhase = ''
mkdir -p $out/bin
@@ -35,9 +25,10 @@ in stdenv.mkDerivation {
homepage = https://pulumi.io/;
description = "Pulumi is a cloud development platform that makes creating cloud programs easy and productive";
license = with licenses; [ asl20 ];
- platforms = builtins.attrNames pulumiArchPackage;
+ platforms = builtins.attrNames data.pulumiPkgs;
maintainers = with maintainers; [
peterromfeldhk
+ jlesquembre
];
};
}
diff --git a/nixpkgs/pkgs/tools/admin/pulumi/update.sh b/nixpkgs/pkgs/tools/admin/pulumi/update.sh
new file mode 100644
index 00000000000..7cb500ee9d3
--- /dev/null
+++ b/nixpkgs/pkgs/tools/admin/pulumi/update.sh
@@ -0,0 +1,55 @@
+#!/usr/bin/env bash
+
+VERSION="1.4.0"
+
+declare -A plugins
+plugins=(
+ ["aws"]="1.7.0"
+ ["gcp"]="1.4.1"
+ ["kubernetes"]="1.2.3"
+ ["random"]="0.2.0"
+)
+
+function genMainSrc() {
+ local url="https://get.pulumi.com/releases/sdk/pulumi-v${VERSION}-$1-x64.tar.gz"
+ local sha256
+ sha256=$(nix-prefetch-url "$url")
+ echo " {"
+ echo " url = \"${url}\";"
+ echo " sha256 = \"$sha256\";"
+ echo " }"
+}
+
+function genSrcs() {
+ for plug in "${!plugins[@]}"; do
+ local version=${plugins[$plug]}
+ # url as defined here
+ # https://github.com/pulumi/pulumi/blob/06d4dde8898b2a0de2c3c7ff8e45f97495b89d82/pkg/workspace/plugins.go#L197
+ local url="https://api.pulumi.com/releases/plugins/pulumi-resource-${plug}-v${version}-$1-amd64.tar.gz"
+ local sha256
+ sha256=$(nix-prefetch-url "$url")
+ echo " {"
+ echo " url = \"${url}\";"
+ echo " sha256 = \"$sha256\";"
+ echo " }"
+ done
+}
+
+cat <<EOF
+# DO NOT EDIT! This file is generated automatically by update.sh
+{ }:
+{
+ version = "${VERSION}";
+ pulumiPkgs = {
+ x86_64-linux = [
+EOF
+genMainSrc "linux"
+genSrcs "linux"
+echo " ];"
+
+echo " x86_64-darwin = ["
+genMainSrc "darwin"
+genSrcs "darwin"
+echo " ];"
+echo " };"
+echo "}"
diff --git a/nixpkgs/pkgs/tools/admin/simp_le/default.nix b/nixpkgs/pkgs/tools/admin/simp_le/default.nix
index f5be7719d0d..37f627a18f5 100644
--- a/nixpkgs/pkgs/tools/admin/simp_le/default.nix
+++ b/nixpkgs/pkgs/tools/admin/simp_le/default.nix
@@ -2,16 +2,14 @@
python3Packages.buildPythonApplication rec {
pname = "simp_le-client";
- version = "0.9.0";
+ version = "0.16.0";
src = python3Packages.fetchPypi {
inherit pname version;
- sha256 = "1yxfznd78zkg2f657v520zj5w4dvq5n594d0kpm4lra8xnpg4zcv";
+ sha256 = "17azqlb1xsnh9p0m75apb19j7pramgj00cf5k6fwzz2zqz0x0hpp";
};
postPatch = ''
- # drop upper bound of acme requirement
- sed -ri "s/'(acme>=[^,]+),<[^']+'/'\1'/" setup.py
# drop upper bound of idna requirement
sed -ri "s/'(idna)<[^']+'/'\1'/" setup.py
substituteInPlace simp_le.py \
diff --git a/nixpkgs/pkgs/tools/admin/tightvnc/1.3.10-CVE-2019-15678.patch b/nixpkgs/pkgs/tools/admin/tightvnc/1.3.10-CVE-2019-15678.patch
new file mode 100644
index 00000000000..cd65d2fb5dd
--- /dev/null
+++ b/nixpkgs/pkgs/tools/admin/tightvnc/1.3.10-CVE-2019-15678.patch
@@ -0,0 +1,18 @@
+Adapted from https://github.com/LibVNC/libvncserver/commit/c5ba3fee85a7ecbbca1df5ffd46d32b92757bc2a
+diff --git a/vncviewer/rfbproto.c b/vncviewer/rfbproto.c
+index 04b0230..47a6863 100644
+--- a/vncviewer/rfbproto.c
++++ b/vncviewer/rfbproto.c
+@@ -1217,6 +1217,12 @@ HandleRFBServerMessage()
+ if (serverCutText)
+ free(serverCutText);
+
++ if (msg.sct.length > 1<<20) {
++ fprintf(stderr,"Ignoring too big cut text length sent by server: %u B > 1 MB\n",
++ (unsigned int)msg.sct.length);
++ return False;
++ }
++
+ serverCutText = malloc(msg.sct.length+1);
+
+ if (!ReadFromRFBServer(serverCutText, msg.sct.length))
diff --git a/nixpkgs/pkgs/tools/admin/tightvnc/1.3.10-CVE-2019-15679.patch b/nixpkgs/pkgs/tools/admin/tightvnc/1.3.10-CVE-2019-15679.patch
new file mode 100644
index 00000000000..6d7b3e89e0c
--- /dev/null
+++ b/nixpkgs/pkgs/tools/admin/tightvnc/1.3.10-CVE-2019-15679.patch
@@ -0,0 +1,19 @@
+Adapted from https://github.com/LibVNC/libvncserver/commit/c2c4b81e6cb3b485fb1ec7ba9e7defeb889f6ba7
+diff --git a/vncviewer/rfbproto.c b/vncviewer/rfbproto.c
+index 04b0230..bd11b54 100644
+--- a/vncviewer/rfbproto.c
++++ b/vncviewer/rfbproto.c
+@@ -303,7 +303,12 @@ InitialiseRFBConnection(void)
+ si.format.blueMax = Swap16IfLE(si.format.blueMax);
+ si.nameLength = Swap32IfLE(si.nameLength);
+
+- /* FIXME: Check arguments to malloc() calls. */
++ if (si.nameLength > 1<<20) {
++ fprintf(stderr, "Too big desktop name length sent by server: %lu B > 1 MB\n",
++ (unsigned long)si.nameLength);
++ return False;
++ }
++
+ desktopName = malloc(si.nameLength + 1);
+ if (!desktopName) {
+ fprintf(stderr, "Error allocating memory for desktop name, %lu bytes\n",
diff --git a/nixpkgs/pkgs/tools/admin/tightvnc/1.3.10-CVE-2019-15680.patch b/nixpkgs/pkgs/tools/admin/tightvnc/1.3.10-CVE-2019-15680.patch
new file mode 100644
index 00000000000..7426a2b58b1
--- /dev/null
+++ b/nixpkgs/pkgs/tools/admin/tightvnc/1.3.10-CVE-2019-15680.patch
@@ -0,0 +1,16 @@
+diff --git a/vncviewer/zlib.c b/vncviewer/zlib.c
+index 80c4eee..76998d8 100644
+--- a/vncviewer/zlib.c
++++ b/vncviewer/zlib.c
+@@ -55,6 +55,11 @@ HandleZlibBPP (int rx, int ry, int rw, int rh)
+ raw_buffer_size = (( rw * rh ) * ( BPP / 8 ));
+ raw_buffer = (char*) malloc( raw_buffer_size );
+
++ if ( raw_buffer == NULL ) {
++ fprintf(stderr,
++ "couldn't allocate raw_buffer in HandleZlibBPP");
++ return False;
++ }
+ }
+
+ if (!ReadFromRFBServer((char *)&hdr, sz_rfbZlibHeader))
diff --git a/nixpkgs/pkgs/tools/admin/tightvnc/1.3.10-CVE-2019-8287.patch b/nixpkgs/pkgs/tools/admin/tightvnc/1.3.10-CVE-2019-8287.patch
new file mode 100644
index 00000000000..5bfd1b9ea87
--- /dev/null
+++ b/nixpkgs/pkgs/tools/admin/tightvnc/1.3.10-CVE-2019-8287.patch
@@ -0,0 +1,14 @@
+Adapted from https://github.com/LibVNC/libvncserver/commit/7b1ef0ffc4815cab9a96c7278394152bdc89dc4d
+diff --git a/vncviewer/corre.c b/vncviewer/corre.c
+index c846a10..a4c272d 100644
+--- a/vncviewer/corre.c
++++ b/vncviewer/corre.c
+@@ -56,7 +56,7 @@ HandleCoRREBPP (int rx, int ry, int rw, int rh)
+ XChangeGC(dpy, gc, GCForeground, &gcv);
+ XFillRectangle(dpy, desktopWin, gc, rx, ry, rw, rh);
+
+- if (!ReadFromRFBServer(buffer, hdr.nSubrects * (4 + (BPP / 8))))
++ if (hdr.nSubrects > BUFFER_SIZE / (4 + (BPP / 8)) || !ReadFromRFBServer(buffer, hdr.nSubrects * (4 + (BPP / 8))))
+ return False;
+
+ ptr = (CARD8 *)buffer;
diff --git a/nixpkgs/pkgs/tools/admin/tightvnc/default.nix b/nixpkgs/pkgs/tools/admin/tightvnc/default.nix
index 5a76b500d14..1a65c31102e 100644
--- a/nixpkgs/pkgs/tools/admin/tightvnc/default.nix
+++ b/nixpkgs/pkgs/tools/admin/tightvnc/default.nix
@@ -9,6 +9,13 @@ stdenv.mkDerivation {
sha256 = "f48c70fea08d03744ae18df6b1499976362f16934eda3275cead87baad585c0d";
};
+ patches = [
+ ./1.3.10-CVE-2019-15678.patch
+ ./1.3.10-CVE-2019-15679.patch
+ ./1.3.10-CVE-2019-15680.patch
+ ./1.3.10-CVE-2019-8287.patch
+ ];
+
# for the builder script
inherit fontDirectories;