aboutsummaryrefslogtreecommitdiff
path: root/nixpkgs/pkgs/tools
diff options
context:
space:
mode:
Diffstat (limited to 'nixpkgs/pkgs/tools')
-rw-r--r--nixpkgs/pkgs/tools/X11/nx-libs/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/X11/winswitch/default.nix1
-rw-r--r--nixpkgs/pkgs/tools/X11/xdg-utils/default.nix8
-rw-r--r--nixpkgs/pkgs/tools/X11/xidlehook/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/X11/xsecurelock/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/admin/berglas/default.nix23
-rw-r--r--nixpkgs/pkgs/tools/admin/eksctl/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/admin/mycli/default.nix7
-rw-r--r--nixpkgs/pkgs/tools/admin/mycli/fix-tests.patch446
-rw-r--r--nixpkgs/pkgs/tools/admin/oxidized/Gemfile.lock2
-rw-r--r--nixpkgs/pkgs/tools/admin/oxidized/gemset.nix12
-rw-r--r--nixpkgs/pkgs/tools/admin/procs/default.nix6
-rw-r--r--nixpkgs/pkgs/tools/archivers/innoextract/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/archivers/unrar/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/audio/bpm-tools/default.nix32
-rw-r--r--nixpkgs/pkgs/tools/audio/video2midi/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/backup/bareos/default.nix8
-rw-r--r--nixpkgs/pkgs/tools/backup/dar/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/backup/mydumper/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/backup/stenc/default.nix21
-rw-r--r--nixpkgs/pkgs/tools/backup/wal-g/default.nix1
-rw-r--r--nixpkgs/pkgs/tools/bluetooth/blueman/default.nix9
-rw-r--r--nixpkgs/pkgs/tools/cd-dvd/unetbootin/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/compression/brotli/default.nix10
-rw-r--r--nixpkgs/pkgs/tools/filesystems/bcachefs-tools/default.nix6
-rw-r--r--nixpkgs/pkgs/tools/filesystems/btrfs-progs/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/filesystems/ceph/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/filesystems/f2fs-tools/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/filesystems/f2fs-tools/f2fs-tools-cross-fix.patch30
-rw-r--r--nixpkgs/pkgs/tools/filesystems/fuse-overlayfs/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/filesystems/gcsfuse/default.nix37
-rw-r--r--nixpkgs/pkgs/tools/filesystems/gcsfuse/go.mod.patch28
-rw-r--r--nixpkgs/pkgs/tools/filesystems/gcsfuse/go.sum.patch38
-rw-r--r--nixpkgs/pkgs/tools/filesystems/irods/default.nix1
-rw-r--r--nixpkgs/pkgs/tools/filesystems/mergerfs/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/filesystems/nixpart/0.4/default.nix1
-rw-r--r--nixpkgs/pkgs/tools/filesystems/ntfs-3g/default.nix1
-rw-r--r--nixpkgs/pkgs/tools/filesystems/xtreemfs/default.nix11
-rw-r--r--nixpkgs/pkgs/tools/graphics/dpic/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/graphics/gifski/default.nix6
-rw-r--r--nixpkgs/pkgs/tools/graphics/povray/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/graphics/scrot/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/graphics/svgbob/default.nix6
-rw-r--r--nixpkgs/pkgs/tools/graphics/vips/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/graphics/zbar/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/inputmethods/evdevremapkeys/default.nix31
-rw-r--r--nixpkgs/pkgs/tools/inputmethods/ibus-engines/ibus-typing-booster/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/misc/bat/default.nix10
-rw-r--r--nixpkgs/pkgs/tools/misc/bdf2psf/default.nix3
-rw-r--r--nixpkgs/pkgs/tools/misc/birdfont/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/misc/calamares/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/misc/clac/default.nix5
-rw-r--r--nixpkgs/pkgs/tools/misc/clipman/default.nix30
-rw-r--r--nixpkgs/pkgs/tools/misc/cloc/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/misc/cloud-utils/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/misc/crudini/default.nix48
-rw-r--r--nixpkgs/pkgs/tools/misc/ddcutil/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/misc/debootstrap/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/misc/diffoscope/default.nix15
-rw-r--r--nixpkgs/pkgs/tools/misc/entr/default.nix6
-rw-r--r--nixpkgs/pkgs/tools/misc/ffsend/default.nix6
-rw-r--r--nixpkgs/pkgs/tools/misc/fpp/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/misc/gawp/default.nix6
-rw-r--r--nixpkgs/pkgs/tools/misc/getopt/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/misc/gotify-cli/default.nix26
-rw-r--r--nixpkgs/pkgs/tools/misc/hashit/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/misc/hebcal/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/misc/hexyl/default.nix6
-rw-r--r--nixpkgs/pkgs/tools/misc/html-proofer/Gemfile.lock2
-rw-r--r--nixpkgs/pkgs/tools/misc/html-proofer/gemset.nix4
-rw-r--r--nixpkgs/pkgs/tools/misc/ldmtool/default.nix15
-rw-r--r--nixpkgs/pkgs/tools/misc/memtest86-efi/default.nix44
-rw-r--r--nixpkgs/pkgs/tools/misc/mysqltuner/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/misc/noti/default.nix8
-rw-r--r--nixpkgs/pkgs/tools/misc/osm2pgsql/default.nix9
-rw-r--r--nixpkgs/pkgs/tools/misc/parallel/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/misc/patdiff/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/misc/pgcenter/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/misc/phoronix-test-suite/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/misc/plantuml/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/misc/profile-sync-daemon/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/misc/pspg/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/misc/rmlint/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/misc/screen/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/misc/shadowenv/default.nix24
-rw-r--r--nixpkgs/pkgs/tools/misc/skim/default.nix6
-rw-r--r--nixpkgs/pkgs/tools/misc/starship/default.nix10
-rw-r--r--nixpkgs/pkgs/tools/misc/svtplay-dl/default.nix1
-rw-r--r--nixpkgs/pkgs/tools/misc/ultrastar-creator/default.nix8
-rw-r--r--nixpkgs/pkgs/tools/misc/ultrastar-manager/default.nix12
-rw-r--r--nixpkgs/pkgs/tools/misc/wacomtablet/default.nix30
-rw-r--r--nixpkgs/pkgs/tools/misc/wl-clipboard/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/misc/wlr-randr/default.nix23
-rw-r--r--nixpkgs/pkgs/tools/misc/woeusb/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/misc/woeusb/remove-workaround.patch82
-rw-r--r--nixpkgs/pkgs/tools/misc/xprite-editor/default.nix43
-rw-r--r--nixpkgs/pkgs/tools/misc/you-get/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/misc/youtube-dl/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/misc/z-lua/default.nix11
-rw-r--r--nixpkgs/pkgs/tools/networking/atinout/default.nix28
-rw-r--r--nixpkgs/pkgs/tools/networking/axel/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/networking/babeld/default.nix11
-rw-r--r--nixpkgs/pkgs/tools/networking/boringtun/default.nix16
-rw-r--r--nixpkgs/pkgs/tools/networking/cjdns/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/networking/croc/default.nix6
-rw-r--r--nixpkgs/pkgs/tools/networking/davix/default.nix6
-rw-r--r--nixpkgs/pkgs/tools/networking/eggdrop/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/networking/getmail/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/networking/htpdate/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/networking/http-prompt/default.nix1
-rw-r--r--nixpkgs/pkgs/tools/networking/i2pd/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/networking/ipv6calc/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/networking/kea/default.nix6
-rw-r--r--nixpkgs/pkgs/tools/networking/logmein-hamachi/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/networking/mailutils/default.nix8
-rw-r--r--nixpkgs/pkgs/tools/networking/maxscale/default.nix6
-rw-r--r--nixpkgs/pkgs/tools/networking/modem-manager/default.nix7
-rw-r--r--nixpkgs/pkgs/tools/networking/mu/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/networking/nbd/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/networking/network-manager/default.nix5
-rw-r--r--nixpkgs/pkgs/tools/networking/network-manager/iodine/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/networking/network-manager/strongswan.nix4
-rw-r--r--nixpkgs/pkgs/tools/networking/openapi-generator-cli/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/networking/openconnect/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/networking/p2p/tahoe-lafs/default.nix1
-rw-r--r--nixpkgs/pkgs/tools/networking/ppp/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/networking/prettyping/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/networking/radsecproxy/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/networking/shadowsocks-rust/default.nix6
-rw-r--r--nixpkgs/pkgs/tools/networking/unbound/python.nix1
-rw-r--r--nixpkgs/pkgs/tools/networking/uwimap/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/networking/weighttp/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/networking/whois/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/networking/wireguard-go/default.nix7
-rw-r--r--nixpkgs/pkgs/tools/networking/wireguard-go/deps.nix43
-rw-r--r--nixpkgs/pkgs/tools/networking/wstunnel/default.nix47
-rw-r--r--nixpkgs/pkgs/tools/package-management/cargo-audit/default.nix28
-rw-r--r--nixpkgs/pkgs/tools/package-management/clib/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/package-management/home-manager/default.nix6
-rw-r--r--nixpkgs/pkgs/tools/package-management/nix-du/default.nix9
-rw-r--r--nixpkgs/pkgs/tools/package-management/nix/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/package-management/pacman/default.nix10
-rw-r--r--nixpkgs/pkgs/tools/security/aespipe/default.nix14
-rw-r--r--nixpkgs/pkgs/tools/security/bitwarden/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/security/clamav/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/security/diceware/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/security/fprintd/default.nix49
-rw-r--r--nixpkgs/pkgs/tools/security/hcxtools/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/security/keycard-cli/default.nix31
-rw-r--r--nixpkgs/pkgs/tools/security/mbox/default.nix1
-rw-r--r--nixpkgs/pkgs/tools/security/meo/default.nix1
-rw-r--r--nixpkgs/pkgs/tools/security/nsjail/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/security/nwipe/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/security/pass/clip-wayland-support.patch113
-rw-r--r--nixpkgs/pkgs/tools/security/pass/default.nix13
-rw-r--r--nixpkgs/pkgs/tools/security/pdfcrack/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/security/scrypt/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/security/sequoia/default.nix1
-rw-r--r--nixpkgs/pkgs/tools/security/thc-hydra/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/security/vulnix/default.nix1
-rw-r--r--nixpkgs/pkgs/tools/system/bfs/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/system/collectd/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/system/ctop/default.nix6
-rw-r--r--nixpkgs/pkgs/tools/system/ctop/go-1.13-deps.patch90
-rw-r--r--nixpkgs/pkgs/tools/system/di/default.nix5
-rw-r--r--nixpkgs/pkgs/tools/system/fio/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/system/inxi/default.nix6
-rw-r--r--nixpkgs/pkgs/tools/system/logrotate/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/system/netdata/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/system/rsyslog/default.nix6
-rw-r--r--nixpkgs/pkgs/tools/system/stress-ng/default.nix6
-rw-r--r--nixpkgs/pkgs/tools/system/thinkfan/default.nix38
-rw-r--r--nixpkgs/pkgs/tools/system/uptimed/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/system/which/default.nix1
-rw-r--r--nixpkgs/pkgs/tools/text/catdoc/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/text/diffr/default.nix29
-rw-r--r--nixpkgs/pkgs/tools/text/dos2unix/default.nix18
-rw-r--r--nixpkgs/pkgs/tools/text/fanficfare/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/text/icdiff/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/text/languagetool/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/text/link-grammar/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/text/lv/default.nix33
-rw-r--r--nixpkgs/pkgs/tools/text/mawk/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/text/mdcat/default.nix32
-rw-r--r--nixpkgs/pkgs/tools/text/poedit/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/text/transifex-client/default.nix6
-rw-r--r--nixpkgs/pkgs/tools/typesetting/xml2rfc/default.nix24
-rw-r--r--nixpkgs/pkgs/tools/virtualization/amazon-ecs-cli/default.nix4
188 files changed, 1454 insertions, 947 deletions
diff --git a/nixpkgs/pkgs/tools/X11/nx-libs/default.nix b/nixpkgs/pkgs/tools/X11/nx-libs/default.nix
index c2bcfe788e6..77aada9f83f 100644
--- a/nixpkgs/pkgs/tools/X11/nx-libs/default.nix
+++ b/nixpkgs/pkgs/tools/X11/nx-libs/default.nix
@@ -2,12 +2,12 @@
libpng, libtool, libxml2, pkgconfig, which, xorg }:
stdenv.mkDerivation rec {
pname = "nx-libs";
- version = "3.5.99.21";
+ version = "3.5.99.22";
src = fetchFromGitHub {
owner = "ArcticaProject";
repo = "nx-libs";
rev = version;
- sha256 = "10xid8mhhid5mrap5jb51k9fm63cm03ss4k4sfymc8zsn0wrqnr9";
+ sha256 = "0ipq93s2knv2xbb919d777mrc7v4k9l5bk0d4x6ji1bgispfa7jl";
};
nativeBuildInputs = [ autoconf automake libtool pkgconfig which
diff --git a/nixpkgs/pkgs/tools/X11/winswitch/default.nix b/nixpkgs/pkgs/tools/X11/winswitch/default.nix
index e8b2be4b783..404cef72a3e 100644
--- a/nixpkgs/pkgs/tools/X11/winswitch/default.nix
+++ b/nixpkgs/pkgs/tools/X11/winswitch/default.nix
@@ -38,6 +38,7 @@ let
doCheck = false;
meta.platforms = stdenv.lib.platforms.linux;
+ meta.broken = true;
};
in stdenv.lib.overrideDerivation base (b: {
postFixup = b.postFixup + ''
diff --git a/nixpkgs/pkgs/tools/X11/xdg-utils/default.nix b/nixpkgs/pkgs/tools/X11/xdg-utils/default.nix
index f1e6e28627c..e5c4a47b110 100644
--- a/nixpkgs/pkgs/tools/X11/xdg-utils/default.nix
+++ b/nixpkgs/pkgs/tools/X11/xdg-utils/default.nix
@@ -1,6 +1,6 @@
{ stdenv, fetchurl, fetchFromGitHub
, file, libxslt, docbook_xml_dtd_412, docbook_xsl, xmlto
-, w3m, gnugrep, gnused, coreutils, xset
+, w3m, gnugrep, gnused, coreutils, xset, perlPackages
, mimiSupport ? false, gawk ? null }:
assert mimiSupport -> gawk != null;
@@ -13,6 +13,11 @@ let
rev = "8e0070f17bcd3612ee83cb84e663e7c7fabcca3d";
sha256 = "15gw2nyrqmdsdin8gzxihpn77grhk9l97jp7s7pr7sl4n9ya2rpj";
};
+
+ perlPath = with perlPackages; makePerlPath [
+ NetDBus XMLTwig XMLParser X11Protocol
+ ];
+
in
stdenv.mkDerivation rec {
@@ -39,6 +44,7 @@ stdenv.mkDerivation rec {
awk() { ${gawk}/bin/awk "$@"; }\
sort() { ${coreutils}/bin/sort "$@"; }\
xset() { ${xset}/bin/xset "$@"; }\
+ perl() { PERL5LIB=${perlPath} ${perlPackages.perl}/bin/perl "$@"; }\
&#' -i "$out"/bin/*
substituteInPlace $out/bin/xdg-open \
diff --git a/nixpkgs/pkgs/tools/X11/xidlehook/default.nix b/nixpkgs/pkgs/tools/X11/xidlehook/default.nix
index b1770af2406..89aff817f50 100644
--- a/nixpkgs/pkgs/tools/X11/xidlehook/default.nix
+++ b/nixpkgs/pkgs/tools/X11/xidlehook/default.nix
@@ -3,7 +3,7 @@
rustPlatform.buildRustPackage rec {
pname = "xidlehook";
- version = "0.7.0";
+ version = "0.7.1";
doCheck = false;
@@ -12,7 +12,7 @@ rustPlatform.buildRustPackage rec {
repo = "xidlehook";
rev = version;
- sha256 = "0dl4rnh4l3rhga5pfxmkc9syn6vx05zxdf8xcv0gw9h60y1smp6v";
+ sha256 = "04bb81iwxznkr1zq1q8dql9qklzm9qy7837a71b02ywp3fc6v5b2";
};
cargoBuildFlags = lib.optionals (!stdenv.isLinux) ["--no-default-features" "--features" "pulse"];
diff --git a/nixpkgs/pkgs/tools/X11/xsecurelock/default.nix b/nixpkgs/pkgs/tools/X11/xsecurelock/default.nix
index 8766e3c0d54..6e6aa1fb60e 100644
--- a/nixpkgs/pkgs/tools/X11/xsecurelock/default.nix
+++ b/nixpkgs/pkgs/tools/X11/xsecurelock/default.nix
@@ -4,13 +4,13 @@
stdenv.mkDerivation rec {
pname = "xsecurelock";
- version = "1.4.0";
+ version = "1.5.1";
src = fetchFromGitHub {
owner = "google";
repo = "xsecurelock";
rev = "v${version}";
- sha256 = "1l9xk3hb5fxp4sqlxjldm4j6cvmxa39a7a37hw8f7vbpmcqy6n6w";
+ sha256 = "1if8byaby18ydkrk4k5yy8n0981x1dfqikq59gfpb7c2rv0vgi7i";
};
nativeBuildInputs = [
diff --git a/nixpkgs/pkgs/tools/admin/berglas/default.nix b/nixpkgs/pkgs/tools/admin/berglas/default.nix
new file mode 100644
index 00000000000..239fc9691f7
--- /dev/null
+++ b/nixpkgs/pkgs/tools/admin/berglas/default.nix
@@ -0,0 +1,23 @@
+{ stdenv, buildGoModule, fetchFromGitHub }:
+
+buildGoModule rec {
+
+ name = "berglas-${version}";
+ version = "0.2.0";
+
+ src = fetchFromGitHub {
+ owner = "GoogleCloudPlatform";
+ repo = "berglas";
+ rev = "v0.2.0";
+ sha256 = "1d75x0n1d1ry2xmy6h64qqc0dlnivipycv3p0aihyp3l810gpdbk";
+ };
+
+ modSha256 = "0fvgvrvdpdwjx51wmbf0rdwnr9l1l212qbvznvif3xsi5nnlkx6r";
+
+ meta = with stdenv.lib; {
+ description = "A tool for managing secrets on Google Cloud";
+ homepage = https://github.com/GoogleCloudPlatform/berglas;
+ license = licenses.asl20;
+ platforms = platforms.unix;
+ };
+}
diff --git a/nixpkgs/pkgs/tools/admin/eksctl/default.nix b/nixpkgs/pkgs/tools/admin/eksctl/default.nix
index 25330658653..c2035aebb35 100644
--- a/nixpkgs/pkgs/tools/admin/eksctl/default.nix
+++ b/nixpkgs/pkgs/tools/admin/eksctl/default.nix
@@ -2,13 +2,13 @@
buildGoModule rec {
pname = "eksctl";
- version = "0.5.2";
+ version = "0.6.0";
src = fetchFromGitHub {
owner = "weaveworks";
repo = pname;
rev = version;
- sha256 = "1aw69kcb2wx832hdfbx0944wwvdn5jbpr164pv6z0bxqzc0yi2kv";
+ sha256 = "0gh6p912y8i295p3vwhlrsxky761zlvrykcl6jm6j2qhwl5k4k29";
};
modSha256 = "0c8hbb73w1922qh895lsk0m9i7lk9kzrvxjc4crwsfpn9pv0qgd3";
diff --git a/nixpkgs/pkgs/tools/admin/mycli/default.nix b/nixpkgs/pkgs/tools/admin/mycli/default.nix
index aa22e10b95d..1783c1ae04d 100644
--- a/nixpkgs/pkgs/tools/admin/mycli/default.nix
+++ b/nixpkgs/pkgs/tools/admin/mycli/default.nix
@@ -7,15 +7,13 @@ with python3.pkgs;
buildPythonApplication rec {
pname = "mycli";
- version = "1.19.0";
+ version = "1.20.1";
src = fetchPypi {
inherit pname version;
- sha256 = "0x5vzl4vvirqy03fnjwkamhzrqkknlajamwz1rmbnqh4bfmijh9m";
+ sha256 = "0vhwaqkx4njarm0wy8zg2hvzr2yl92y8gnwipcn7p59sazw4whfl";
};
- patches = [ ./fix-tests.patch ];
-
propagatedBuildInputs = [
pymysql configobj sqlparse prompt_toolkit pygments click pycrypto cli-helpers
];
@@ -38,5 +36,6 @@ buildPythonApplication rec {
'';
homepage = http://mycli.net;
license = lib.licenses.bsd3;
+ maintainers = [ lib.maintainers.jojosch ];
};
}
diff --git a/nixpkgs/pkgs/tools/admin/mycli/fix-tests.patch b/nixpkgs/pkgs/tools/admin/mycli/fix-tests.patch
deleted file mode 100644
index e67370bc824..00000000000
--- a/nixpkgs/pkgs/tools/admin/mycli/fix-tests.patch
+++ /dev/null
@@ -1,446 +0,0 @@
-diff --git a/mycli/sqlcompleter.py b/mycli/sqlcompleter.py
-index 81ee128..2b22fa9 100644
---- a/mycli/sqlcompleter.py
-+++ b/mycli/sqlcompleter.py
-@@ -16,27 +16,32 @@ _logger = logging.getLogger(__name__)
-
- class SQLCompleter(Completer):
- keywords = ['ACCESS', 'ADD', 'ALL', 'ALTER TABLE', 'AND', 'ANY', 'AS',
-- 'ASC', 'AUTO_INCREMENT', 'BEFORE', 'BEGIN', 'BETWEEN', 'BINARY', 'BY',
-- 'CASE', 'CHAR', 'CHECK', 'COLUMN', 'COMMENT', 'COMMIT', 'CONSTRAINT',
-- 'CHANGE MASTER TO', 'CHARACTER SET', 'COLLATE', 'CREATE', 'CURRENT', 'CURRENT_TIMESTAMP', 'DATABASE', 'DATE',
-- 'DECIMAL', 'DEFAULT', 'DELETE FROM', 'DELIMITER', 'DESC',
-- 'DESCRIBE', 'DROP', 'ELSE', 'END', 'ENGINE', 'ESCAPE', 'EXISTS',
-- 'FILE', 'FLOAT', 'FOR', 'FOREIGN KEY', 'FORMAT', 'FROM', 'FULL', 'FUNCTION', 'GRANT',
-- 'GROUP BY', 'HAVING', 'HOST', 'IDENTIFIED', 'IN', 'INCREMENT', 'INDEX',
-- 'INSERT INTO', 'INTEGER', 'INTO', 'INTERVAL', 'IS', 'JOIN', 'KEY', 'LEFT',
-- 'LEVEL', 'LIKE', 'LIMIT', 'LOCK', 'LOGS', 'LONG', 'MASTER', 'MODE',
-- 'MODIFY', 'NOT', 'NULL', 'NUMBER', 'OFFSET', 'ON', 'OPTION', 'OR',
-- 'ORDER BY', 'OUTER', 'OWNER', 'PASSWORD', 'PORT', 'PRIMARY',
-- 'PRIVILEGES', 'PROCESSLIST', 'PURGE', 'REFERENCES', 'REGEXP', 'RENAME', 'REPAIR', 'RESET',
-- 'REVOKE', 'RIGHT', 'ROLLBACK', 'ROW', 'ROWS', 'ROW_FORMAT', 'SELECT', 'SESSION', 'SET',
-- 'SAVEPOINT', 'SHARE', 'SHOW', 'SLAVE', 'SMALLINT', 'START', 'STOP', 'TABLE', 'THEN',
-- 'TO', 'TRANSACTION', 'TRIGGER', 'TRUNCATE', 'UNION', 'UNIQUE', 'UNSIGNED', 'UPDATE',
-- 'USE', 'USER', 'USING', 'VALUES', 'VARCHAR', 'VIEW', 'WHEN', 'WHERE',
-- 'WITH', 'TINYINT', 'SMALLINT', 'MEDIUMINT', 'INT', 'BIGINT']
--
-- functions = ['AVG', 'CONCAT', 'COUNT', 'DISTINCT', 'FIRST', 'FORMAT', 'LAST',
-- 'LCASE', 'LEN', 'MAX', 'MIN', 'MID', 'NOW', 'ROUND', 'SUM',
-- 'TOP', 'UCASE','FROM_UNIXTIME', 'UNIX_TIMESTAMP']
-+ 'ASC', 'AUTO_INCREMENT', 'BEFORE', 'BEGIN', 'BETWEEN',
-+ 'BIGINT', 'BINARY', 'BY', 'CASE', 'CHANGE MASTER TO', 'CHAR',
-+ 'CHARACTER SET', 'CHECK', 'COLLATE', 'COLUMN', 'COMMENT',
-+ 'COMMIT', 'CONSTRAINT', 'CREATE', 'CURRENT',
-+ 'CURRENT_TIMESTAMP', 'DATABASE', 'DATE', 'DECIMAL', 'DEFAULT',
-+ 'DELETE FROM', 'DELIMITER', 'DESC', 'DESCRIBE', 'DROP',
-+ 'ELSE', 'END', 'ENGINE', 'ESCAPE', 'EXISTS', 'FILE', 'FLOAT',
-+ 'FOR', 'FOREIGN KEY', 'FORMAT', 'FROM', 'FULL', 'FUNCTION',
-+ 'GRANT', 'GROUP BY', 'HAVING', 'HOST', 'IDENTIFIED', 'IN',
-+ 'INCREMENT', 'INDEX', 'INSERT INTO', 'INT', 'INTEGER',
-+ 'INTERVAL', 'INTO', 'IS', 'JOIN', 'KEY', 'LEFT', 'LEVEL',
-+ 'LIKE', 'LIMIT', 'LOCK', 'LOGS', 'LONG', 'MASTER',
-+ 'MEDIUMINT', 'MODE', 'MODIFY', 'NOT', 'NULL', 'NUMBER',
-+ 'OFFSET', 'ON', 'OPTION', 'OR', 'ORDER BY', 'OUTER', 'OWNER',
-+ 'PASSWORD', 'PORT', 'PRIMARY', 'PRIVILEGES', 'PROCESSLIST',
-+ 'PURGE', 'REFERENCES', 'REGEXP', 'RENAME', 'REPAIR', 'RESET',
-+ 'REVOKE', 'RIGHT', 'ROLLBACK', 'ROW', 'ROWS', 'ROW_FORMAT',
-+ 'SAVEPOINT', 'SELECT', 'SESSION', 'SET', 'SHARE', 'SHOW',
-+ 'SLAVE', 'SMALLINT', 'SMALLINT', 'START', 'STOP', 'TABLE',
-+ 'THEN', 'TINYINT', 'TO', 'TRANSACTION', 'TRIGGER', 'TRUNCATE',
-+ 'UNION', 'UNIQUE', 'UNSIGNED', 'UPDATE', 'USE', 'USER',
-+ 'USING', 'VALUES', 'VARCHAR', 'VIEW', 'WHEN', 'WHERE', 'WITH']
-+
-+ functions = ['AVG', 'CONCAT', 'COUNT', 'DISTINCT', 'FIRST', 'FORMAT',
-+ 'FROM_UNIXTIME', 'LAST', 'LCASE', 'LEN', 'MAX', 'MID',
-+ 'MIN', 'NOW', 'ROUND', 'SUM', 'TOP', 'UCASE', 'UNIX_TIMESTAMP']
-
- show_items = []
-
-diff --git a/test/test_naive_completion.py b/test/test_naive_completion.py
-index 3282c7e..01a432d 100644
---- a/test/test_naive_completion.py
-+++ b/test/test_naive_completion.py
-@@ -19,36 +19,36 @@ def complete_event():
- def test_empty_string_completion(completer, complete_event):
- text = ''
- position = 0
-- result = set(completer.get_completions(
-+ result = list(completer.get_completions(
- Document(text=text, cursor_position=position),
- complete_event))
-- assert result == set(map(Completion, completer.all_completions))
-+ assert result == list(map(Completion, sorted(completer.all_completions)))
-
-
- def test_select_keyword_completion(completer, complete_event):
- text = 'SEL'
- position = len('SEL')
-- result = set(completer.get_completions(
-+ result = list(completer.get_completions(
- Document(text=text, cursor_position=position),
- complete_event))
-- assert result == set([Completion(text='SELECT', start_position=-3)])
-+ assert result == list([Completion(text='SELECT', start_position=-3)])
-
-
- def test_function_name_completion(completer, complete_event):
- text = 'SELECT MA'
- position = len('SELECT MA')
-- result = set(completer.get_completions(
-+ result = list(completer.get_completions(
- Document(text=text, cursor_position=position),
- complete_event))
-- assert result == set([
-- Completion(text='MAX', start_position=-2),
-- Completion(text='MASTER', start_position=-2)])
-+ assert result == list([
-+ Completion(text='MASTER', start_position=-2),
-+ Completion(text='MAX', start_position=-2)])
-
-
- def test_column_name_completion(completer, complete_event):
- text = 'SELECT FROM users'
- position = len('SELECT ')
-- result = set(completer.get_completions(
-+ result = list(completer.get_completions(
- Document(text=text, cursor_position=position),
- complete_event))
-- assert result == set(map(Completion, completer.all_completions))
-+ assert result == list(map(Completion, sorted(completer.all_completions)))
-diff --git a/test/test_smart_completion_public_schema_only.py b/test/test_smart_completion_public_schema_only.py
-index 00059bb..3c29956 100644
---- a/test/test_smart_completion_public_schema_only.py
-+++ b/test/test_smart_completion_public_schema_only.py
-@@ -42,11 +42,11 @@ def complete_event():
- def test_empty_string_completion(completer, complete_event):
- text = ''
- position = 0
-- result = set(
-+ result = list(
- completer.get_completions(
- Document(text=text, cursor_position=position),
- complete_event))
-- assert set(map(Completion, completer.keywords)) == result
-+ assert list(map(Completion, completer.keywords)) == result
-
-
- def test_select_keyword_completion(completer, complete_event):
-@@ -55,7 +55,7 @@ def test_select_keyword_completion(completer, complete_event):
- result = completer.get_completions(
- Document(text=text, cursor_position=position),
- complete_event)
-- assert set(result) == set([Completion(text='SELECT', start_position=-3)])
-+ assert list(result) == list([Completion(text='SELECT', start_position=-3)])
-
-
- def test_table_completion(completer, complete_event):
-@@ -63,10 +63,12 @@ def test_table_completion(completer, complete_event):
- position = len(text)
- result = completer.get_completions(
- Document(text=text, cursor_position=position), complete_event)
-- assert set(result) == set([Completion(text='users', start_position=0),
-- Completion(text='`select`', start_position=0),
-- Completion(text='`réveillé`', start_position=0),
-- Completion(text='orders', start_position=0)])
-+ assert list(result) == list([
-+ Completion(text='`réveillé`', start_position=0),
-+ Completion(text='`select`', start_position=0),
-+ Completion(text='orders', start_position=0),
-+ Completion(text='users', start_position=0),
-+ ])
-
-
- def test_function_name_completion(completer, complete_event):
-@@ -74,7 +76,7 @@ def test_function_name_completion(completer, complete_event):
- position = len('SELECT MA')
- result = completer.get_completions(
- Document(text=text, cursor_position=position), complete_event)
-- assert set(result) == set([Completion(text='MAX', start_position=-2),
-+ assert list(result) == list([Completion(text='MAX', start_position=-2),
- Completion(text='MASTER', start_position=-2),
- ])
-
-@@ -89,17 +91,18 @@ def test_suggested_column_names(completer, complete_event):
- """
- text = 'SELECT from users'
- position = len('SELECT ')
-- result = set(completer.get_completions(
-+ result = list(completer.get_completions(
- Document(text=text, cursor_position=position),
- complete_event))
-- assert set(result) == set([
-- Completion(text='users', start_position=0),
-+ assert result == list([
- Completion(text='*', start_position=0),
-- Completion(text='id', start_position=0),
- Completion(text='email', start_position=0),
- Completion(text='first_name', start_position=0),
-- Completion(text='last_name', start_position=0)] +
-+ Completion(text='id', start_position=0),
-+ Completion(text='last_name', start_position=0),
-+ ] +
- list(map(Completion, completer.functions)) +
-+ [Completion(text='users', start_position=0)] +
- list(map(Completion, completer.keywords)))
-
-
-@@ -117,11 +120,11 @@ def test_suggested_column_names_in_function(completer, complete_event):
- result = completer.get_completions(
- Document(text=text, cursor_position=position),
- complete_event)
-- assert set(result) == set([
-+ assert list(result) == list([
- Completion(text='*', start_position=0),
-- Completion(text='id', start_position=0),
- Completion(text='email', start_position=0),
- Completion(text='first_name', start_position=0),
-+ Completion(text='id', start_position=0),
- Completion(text='last_name', start_position=0)])
-
-
-@@ -135,14 +138,14 @@ def test_suggested_column_names_with_table_dot(completer, complete_event):
- """
- text = 'SELECT users. from users'
- position = len('SELECT users.')
-- result = set(completer.get_completions(
-+ result = list(completer.get_completions(
- Document(text=text, cursor_position=position),
- complete_event))
-- assert set(result) == set([
-+ assert result == list([
- Completion(text='*', start_position=0),
-- Completion(text='id', start_position=0),
- Completion(text='email', start_position=0),
- Completion(text='first_name', start_position=0),
-+ Completion(text='id', start_position=0),
- Completion(text='last_name', start_position=0)])
-
-
-@@ -156,14 +159,14 @@ def test_suggested_column_names_with_alias(completer, complete_event):
- """
- text = 'SELECT u. from users u'
- position = len('SELECT u.')
-- result = set(completer.get_completions(
-+ result = list(completer.get_completions(
- Document(text=text, cursor_position=position),
- complete_event))
-- assert set(result) == set([
-+ assert result == list([
- Completion(text='*', start_position=0),
-- Completion(text='id', start_position=0),
- Completion(text='email', start_position=0),
- Completion(text='first_name', start_position=0),
-+ Completion(text='id', start_position=0),
- Completion(text='last_name', start_position=0)])
-
-
-@@ -178,17 +181,17 @@ def test_suggested_multiple_column_names(completer, complete_event):
- """
- text = 'SELECT id, from users u'
- position = len('SELECT id, ')
-- result = set(completer.get_completions(
-+ result = list(completer.get_completions(
- Document(text=text, cursor_position=position),
- complete_event))
-- assert set(result) == set([
-- Completion(text='u', start_position=0),
-+ assert result == list([
- Completion(text='*', start_position=0),
-- Completion(text='id', start_position=0),
- Completion(text='email', start_position=0),
- Completion(text='first_name', start_position=0),
-+ Completion(text='id', start_position=0),
- Completion(text='last_name', start_position=0)] +
- list(map(Completion, completer.functions)) +
-+ [Completion(text='u', start_position=0)] +
- list(map(Completion, completer.keywords)))
-
-
-@@ -203,14 +206,14 @@ def test_suggested_multiple_column_names_with_alias(completer, complete_event):
- """
- text = 'SELECT u.id, u. from users u'
- position = len('SELECT u.id, u.')
-- result = set(completer.get_completions(
-+ result = list(completer.get_completions(
- Document(text=text, cursor_position=position),
- complete_event))
-- assert set(result) == set([
-+ assert result == list([
- Completion(text='*', start_position=0),
-- Completion(text='id', start_position=0),
- Completion(text='email', start_position=0),
- Completion(text='first_name', start_position=0),
-+ Completion(text='id', start_position=0),
- Completion(text='last_name', start_position=0)])
-
-
-@@ -225,106 +228,108 @@ def test_suggested_multiple_column_names_with_dot(completer, complete_event):
- """
- text = 'SELECT users.id, users. from users u'
- position = len('SELECT users.id, users.')
-- result = set(completer.get_completions(
-+ result = list(completer.get_completions(
- Document(text=text, cursor_position=position),
- complete_event))
-- assert set(result) == set([
-+ assert result == list([
- Completion(text='*', start_position=0),
-- Completion(text='id', start_position=0),
- Completion(text='email', start_position=0),
- Completion(text='first_name', start_position=0),
-+ Completion(text='id', start_position=0),
- Completion(text='last_name', start_position=0)])
-
-
- def test_suggested_aliases_after_on(completer, complete_event):
- text = 'SELECT u.name, o.id FROM users u JOIN orders o ON '
- position = len('SELECT u.name, o.id FROM users u JOIN orders o ON ')
-- result = set(completer.get_completions(
-+ result = list(completer.get_completions(
- Document(text=text, cursor_position=position),
- complete_event))
-- assert set(result) == set([
-- Completion(text='u', start_position=0),
-- Completion(text='o', start_position=0)])
-+ assert result == list([
-+ Completion(text='o', start_position=0),
-+ Completion(text='u', start_position=0)])
-
-
- def test_suggested_aliases_after_on_right_side(completer, complete_event):
- text = 'SELECT u.name, o.id FROM users u JOIN orders o ON o.user_id = '
- position = len(
- 'SELECT u.name, o.id FROM users u JOIN orders o ON o.user_id = ')
-- result = set(completer.get_completions(
-+ result = list(completer.get_completions(
- Document(text=text, cursor_position=position),
- complete_event))
-- assert set(result) == set([
-- Completion(text='u', start_position=0),
-- Completion(text='o', start_position=0)])
-+ assert result == list([
-+ Completion(text='o', start_position=0),
-+ Completion(text='u', start_position=0)])
-
-
- def test_suggested_tables_after_on(completer, complete_event):
- text = 'SELECT users.name, orders.id FROM users JOIN orders ON '
- position = len('SELECT users.name, orders.id FROM users JOIN orders ON ')
-- result = set(completer.get_completions(
-+ result = list(completer.get_completions(
- Document(text=text, cursor_position=position),
- complete_event))
-- assert set(result) == set([
-- Completion(text='users', start_position=0),
-- Completion(text='orders', start_position=0)])
-+ assert result == list([
-+ Completion(text='orders', start_position=0),
-+ Completion(text='users', start_position=0)])
-
-
- def test_suggested_tables_after_on_right_side(completer, complete_event):
- text = 'SELECT users.name, orders.id FROM users JOIN orders ON orders.user_id = '
- position = len(
- 'SELECT users.name, orders.id FROM users JOIN orders ON orders.user_id = ')
-- result = set(completer.get_completions(
-+ result = list(completer.get_completions(
- Document(text=text, cursor_position=position),
- complete_event))
-- assert set(result) == set([
-- Completion(text='users', start_position=0),
-- Completion(text='orders', start_position=0)])
-+ assert result == list([
-+ Completion(text='orders', start_position=0),
-+ Completion(text='users', start_position=0)])
-
-
- def test_table_names_after_from(completer, complete_event):
- text = 'SELECT * FROM '
- position = len('SELECT * FROM ')
-- result = set(completer.get_completions(
-+ result = list(completer.get_completions(
- Document(text=text, cursor_position=position),
- complete_event))
-- assert set(result) == set([
-- Completion(text='users', start_position=0),
-- Completion(text='orders', start_position=0),
-+ assert result == list([
- Completion(text='`réveillé`', start_position=0),
- Completion(text='`select`', start_position=0),
-+ Completion(text='orders', start_position=0),
-+ Completion(text='users', start_position=0),
- ])
-
-
- def test_auto_escaped_col_names(completer, complete_event):
- text = 'SELECT from `select`'
- position = len('SELECT ')
-- result = set(completer.get_completions(
-+ result = list(completer.get_completions(
- Document(text=text, cursor_position=position),
- complete_event))
-- assert set(result) == set([
-- Completion(text='`select`', start_position=0),
-+ assert result == [
- Completion(text='*', start_position=0),
-- Completion(text='id', start_position=0),
-+ Completion(text='`ABC`', start_position=0),
- Completion(text='`insert`', start_position=0),
-- Completion(text='`ABC`', start_position=0), ] +
-- list(map(Completion, completer.functions)) +
-- list(map(Completion, completer.keywords)))
-+ Completion(text='id', start_position=0),
-+ ] + \
-+ list(map(Completion, completer.functions)) + \
-+ [Completion(text='`select`', start_position=0)] + \
-+ list(map(Completion, completer.keywords))
-
-
- def test_un_escaped_table_names(completer, complete_event):
- text = 'SELECT from réveillé'
- position = len('SELECT ')
-- result = set(completer.get_completions(
-+ result = list(completer.get_completions(
- Document(text=text, cursor_position=position),
- complete_event))
-- assert set(result) == set([
-- Completion(text='réveillé', start_position=0),
-+ assert result == list([
- Completion(text='*', start_position=0),
-- Completion(text='id', start_position=0),
-+ Completion(text='`ABC`', start_position=0),
- Completion(text='`insert`', start_position=0),
-- Completion(text='`ABC`', start_position=0), ] +
-+ Completion(text='id', start_position=0),
-+ ] +
- list(map(Completion, completer.functions)) +
-+ [Completion(text='réveillé', start_position=0)] +
- list(map(Completion, completer.keywords)))
-
-
-@@ -349,10 +354,10 @@ def dummy_list_path(dir_name):
-
- @patch('mycli.packages.filepaths.list_path', new=dummy_list_path)
- @pytest.mark.parametrize('text,expected', [
-- ('source ', [('~', 0),
-- ('/', 0),
-- ('.', 0),
-- ('..', 0)]),
-+ # ('source ', [('~', 0),
-+ # ('/', 0),
-+ # ('.', 0),
-+ # ('..', 0)]),
- ('source /', [('dir1', 0),
- ('file1.sql', 0),
- ('file2.sql', 0)]),
-@@ -363,8 +368,8 @@ def dummy_list_path(dir_name):
- ])
- def test_file_name_completion(completer, complete_event, text, expected):
- position = len(text)
-- result = set(completer.get_completions(
-+ result = list(completer.get_completions(
- Document(text=text, cursor_position=position),
- complete_event))
-- expected = set([Completion(txt, pos) for txt, pos in expected])
-+ expected = list((Completion(txt, pos) for txt, pos in expected))
- assert result == expected
diff --git a/nixpkgs/pkgs/tools/admin/oxidized/Gemfile.lock b/nixpkgs/pkgs/tools/admin/oxidized/Gemfile.lock
index 89129ccb25f..0832bce6d2e 100644
--- a/nixpkgs/pkgs/tools/admin/oxidized/Gemfile.lock
+++ b/nixpkgs/pkgs/tools/admin/oxidized/Gemfile.lock
@@ -7,6 +7,7 @@ GEM
emk-sinatra-url-for (0.2.1)
sinatra (>= 0.9.1.1)
ffi (1.10.0)
+ git (1.5.0)
haml (5.0.4)
temple (>= 0.8.0)
tilt
@@ -17,6 +18,7 @@ GEM
net-telnet (0.1.1)
oxidized (0.26.3)
asetus (~> 0.1)
+ git (~> 1)
net-ssh (~> 5)
net-telnet (~> 0.1.1)
rugged (~> 0.21, >= 0.21.4)
diff --git a/nixpkgs/pkgs/tools/admin/oxidized/gemset.nix b/nixpkgs/pkgs/tools/admin/oxidized/gemset.nix
index de7714aced8..ff77102af12 100644
--- a/nixpkgs/pkgs/tools/admin/oxidized/gemset.nix
+++ b/nixpkgs/pkgs/tools/admin/oxidized/gemset.nix
@@ -50,6 +50,16 @@
};
version = "1.10.0";
};
+ git = {
+ groups = ["default"];
+ platforms = [];
+ source = {
+ remotes = ["https://rubygems.org"];
+ sha256 = "0bf83icwypi3p3pd97vlqbnp3hvf31ncd440m9kh9y7x6yk74wyh";
+ type = "gem";
+ };
+ version = "1.5.0";
+ };
haml = {
dependencies = ["temple" "tilt"];
groups = ["default"];
@@ -112,7 +122,7 @@
version = "0.1.1";
};
oxidized = {
- dependencies = ["asetus" "net-ssh" "net-telnet" "rugged" "slop"];
+ dependencies = ["asetus" "git" "net-ssh" "net-telnet" "rugged" "slop"];
groups = ["default"];
platforms = [];
source = {
diff --git a/nixpkgs/pkgs/tools/admin/procs/default.nix b/nixpkgs/pkgs/tools/admin/procs/default.nix
index 85333ca78f8..b2d173d5aab 100644
--- a/nixpkgs/pkgs/tools/admin/procs/default.nix
+++ b/nixpkgs/pkgs/tools/admin/procs/default.nix
@@ -4,16 +4,16 @@
rustPlatform.buildRustPackage rec {
pname = "procs";
- version = "0.8.9";
+ version = "0.8.11";
src = fetchFromGitHub {
owner = "dalance";
repo = pname;
rev = "v${version}";
- sha256 = "0gqbdk4gaxkpval52fsravjgvqz6c9zh1ahry57a2p6kszw96n13";
+ sha256 = "1bds84r5qw1chqd92rlijn4arqaywc5x4yjss3523ka55w3mphmf";
};
- cargoSha256 = "1k0yl03rxbv009gb2jkc0f7mjq3pzc9bf8hppk2w9xicxpq6l55c";
+ cargoSha256 = "11djms4rj3a1fs6f091gli32w6kww77n0072p0hwvqmc9yy1x57w";
buildInputs = stdenv.lib.optional stdenv.isDarwin Security;
diff --git a/nixpkgs/pkgs/tools/archivers/innoextract/default.nix b/nixpkgs/pkgs/tools/archivers/innoextract/default.nix
index dc9796cc9e3..6b0ca7e1528 100644
--- a/nixpkgs/pkgs/tools/archivers/innoextract/default.nix
+++ b/nixpkgs/pkgs/tools/archivers/innoextract/default.nix
@@ -3,11 +3,11 @@
, withGog ? false, unar ? null }:
stdenv.mkDerivation rec {
- name = "innoextract-1.7";
+ name = "innoextract-1.8";
src = fetchurl {
url = "http://constexpr.org/innoextract/files/${name}.tar.gz";
- sha256 = "197hs9aj1ska6czrsq4caazsw9v0xbaa0lazbh380fmwy8rbgvy1";
+ sha256 = "0saj50n8ds85shygy4mq1h6s99510r9wgjjdll4dmvhra4lzcy2y";
};
buildInputs = [ python lzma boost ];
diff --git a/nixpkgs/pkgs/tools/archivers/unrar/default.nix b/nixpkgs/pkgs/tools/archivers/unrar/default.nix
index 07f62fa02ad..ce878075f2a 100644
--- a/nixpkgs/pkgs/tools/archivers/unrar/default.nix
+++ b/nixpkgs/pkgs/tools/archivers/unrar/default.nix
@@ -2,11 +2,11 @@
stdenv.mkDerivation rec {
pname = "unrar";
- version = "5.7.5";
+ version = "5.8.1";
src = fetchurl {
url = "https://www.rarlab.com/rar/unrarsrc-${version}.tar.gz";
- sha256 = "1vp2pc1n5qhri0zr7fszlpjz8niw9x4cl47wbd9v323sm3dgvhp1";
+ sha256 = "0cp6436ckivljfnv8qic5x2a4z74qff6n57ckahaxhhddx1iypq3";
};
postPatch = ''
diff --git a/nixpkgs/pkgs/tools/audio/bpm-tools/default.nix b/nixpkgs/pkgs/tools/audio/bpm-tools/default.nix
new file mode 100644
index 00000000000..035fbf09533
--- /dev/null
+++ b/nixpkgs/pkgs/tools/audio/bpm-tools/default.nix
@@ -0,0 +1,32 @@
+{
+ stdenv,
+ fetchurl,
+}:
+
+stdenv.mkDerivation rec {
+ pname = "bpm-tools";
+ version = "0.3";
+
+ src = fetchurl {
+ url = "http://www.pogo.org.uk/~mark/bpm-tools/releases/bpm-tools-${version}.tar.gz";
+ sha256 = "151vfbs8h3cibs7kbdps5pqrsxhpjv16y2iyfqbxzsclylgfivrp";
+ };
+
+ patchPhase = ''
+ patchShebangs bpm-tag
+ patchShebangs bpm-graph
+ '';
+
+ installFlags = [
+ "PREFIX=${placeholder "out"}"
+ ];
+
+ meta = with stdenv.lib; {
+ homepage = "http://www.pogo.org.uk/~mark/bpm-tools/";
+ description = "Automatically calculate BPM (tempo) of music files";
+ license = licenses.gpl2;
+ platforms = platforms.all;
+ maintainers = with maintainers; [ doronbehar ];
+ };
+}
+
diff --git a/nixpkgs/pkgs/tools/audio/video2midi/default.nix b/nixpkgs/pkgs/tools/audio/video2midi/default.nix
index 1ed5e48077b..c664c745f32 100644
--- a/nixpkgs/pkgs/tools/audio/video2midi/default.nix
+++ b/nixpkgs/pkgs/tools/audio/video2midi/default.nix
@@ -8,7 +8,7 @@ let
});
in pythonPackages.buildPythonApplication rec {
pname = "video2midi";
- version = "0.3.9.1";
+ version = "0.3.9.5";
format = "other";
@@ -16,7 +16,7 @@ in pythonPackages.buildPythonApplication rec {
owner = "svsdval";
repo = pname;
rev = version;
- sha256 = "1ndzhfng8z5080n1xkcavw21dm6rjz0x1954v9llifsdmf4cpn8y";
+ sha256 = "1jc50zimc64ilc1as3dyh16lsygwqyvi381mw8si8m9j3pw6may4";
};
propagatedBuildInputs = with pythonPackages; [ opencv3_ midiutil pygame pyopengl ];
diff --git a/nixpkgs/pkgs/tools/backup/bareos/default.nix b/nixpkgs/pkgs/tools/backup/bareos/default.nix
index 79ae1e50ca2..949e45de5e1 100644
--- a/nixpkgs/pkgs/tools/backup/bareos/default.nix
+++ b/nixpkgs/pkgs/tools/backup/bareos/default.nix
@@ -1,10 +1,10 @@
{ stdenv, fetchFromGitHub, pkgconfig, nettools, gettext, flex
, readline ? null, openssl ? null, python2 ? null, ncurses ? null, rocksdb
-, sqlite ? null, postgresql ? null, mysql ? null, zlib ? null, lzo ? null
+, sqlite ? null, postgresql ? null, libmysqlclient ? null, zlib ? null, lzo ? null
, jansson ? null, acl ? null, glusterfs ? null, libceph ? null, libcap ? null
}:
-assert sqlite != null || postgresql != null || mysql != null;
+assert sqlite != null || postgresql != null || libmysqlclient != null;
with stdenv.lib;
let
@@ -25,7 +25,7 @@ stdenv.mkDerivation rec {
nativeBuildInputs = [ pkgconfig ];
buildInputs = [
nettools gettext readline openssl python2 flex ncurses sqlite postgresql
- mysql.connector-c zlib lzo jansson acl glusterfs libceph libcap rocksdb
+ libmysqlclient zlib lzo jansson acl glusterfs libceph libcap rocksdb
];
postPatch = ''
@@ -55,7 +55,7 @@ stdenv.mkDerivation rec {
++ optional (openssl != null) "--with-openssl=${openssl.dev}"
++ optional (sqlite != null) "--with-sqlite3=${sqlite.dev}"
++ optional (postgresql != null) "--with-postgresql=${postgresql}"
- ++ optional (mysql != null) "--with-mysql=${mysql.connector-c}"
+ ++ optional (libmysqlclient != null) "--with-mysql=${libmysqlclient}"
++ optional (zlib != null) "--with-zlib=${zlib.dev}"
++ optional (lzo != null) "--with-lzo=${lzo}"
++ optional (jansson != null) "--with-jansson=${jansson}"
diff --git a/nixpkgs/pkgs/tools/backup/dar/default.nix b/nixpkgs/pkgs/tools/backup/dar/default.nix
index 352f320dadf..f48bfbd3d6a 100644
--- a/nixpkgs/pkgs/tools/backup/dar/default.nix
+++ b/nixpkgs/pkgs/tools/backup/dar/default.nix
@@ -3,12 +3,12 @@
with stdenv.lib;
stdenv.mkDerivation rec {
- version = "2.6.5";
+ version = "2.6.6";
pname = "dar";
src = fetchurl {
url = "mirror://sourceforge/dar/${pname}-${version}.tar.gz";
- sha256 = "1x2zr5nw3qq1vmbs4bva6mx1cx0180dri5i2971ynzcxybn75znd";
+ sha256 = "1pqdcb9dkjlf8wzpsnx4gcv9nhrm60glv4xadxnknnqlvzs6vips";
};
buildInputs = [ zlib bzip2 openssl lzo libgcrypt gpgme xz ]
diff --git a/nixpkgs/pkgs/tools/backup/mydumper/default.nix b/nixpkgs/pkgs/tools/backup/mydumper/default.nix
index 5538b45c5f1..7160e7f1950 100644
--- a/nixpkgs/pkgs/tools/backup/mydumper/default.nix
+++ b/nixpkgs/pkgs/tools/backup/mydumper/default.nix
@@ -1,5 +1,5 @@
{ stdenv, fetchFromGitHub, cmake, pkgconfig
-, glib, zlib, pcre, mysql, libressl }:
+, glib, zlib, pcre, libmysqlclient, libressl }:
stdenv.mkDerivation rec {
version = "0.9.5";
@@ -14,7 +14,7 @@ stdenv.mkDerivation rec {
nativeBuildInputs = [ cmake pkgconfig ];
- buildInputs = [ glib zlib pcre mysql.connector-c libressl ];
+ buildInputs = [ glib zlib pcre libmysqlclient libressl ];
meta = with stdenv.lib; {
description = ''High-perfomance MySQL backup tool'';
diff --git a/nixpkgs/pkgs/tools/backup/stenc/default.nix b/nixpkgs/pkgs/tools/backup/stenc/default.nix
new file mode 100644
index 00000000000..ed4f944a960
--- /dev/null
+++ b/nixpkgs/pkgs/tools/backup/stenc/default.nix
@@ -0,0 +1,21 @@
+{ stdenv, fetchFromGitHub }:
+
+stdenv.mkDerivation rec {
+ version = "1.0.7";
+ pname = "stenc";
+
+ src = fetchFromGitHub {
+ owner = "scsitape";
+ repo = "stenc";
+ rev = "${version}";
+ sha256 = "1778m1zcyzyf42k5m496yqh0gv6kqhb0sq5983dhky1fccjl905k";
+ };
+
+ meta = {
+ description = "SCSI Tape Encryption Manager";
+ homepage = https://github.com/scsitape/stenc;
+ license = stdenv.lib.licenses.gpl2;
+ maintainers = with stdenv.lib.maintainers; [ woffs ];
+ platforms = stdenv.lib.platforms.linux;
+ };
+}
diff --git a/nixpkgs/pkgs/tools/backup/wal-g/default.nix b/nixpkgs/pkgs/tools/backup/wal-g/default.nix
index 70cc8a425c1..c6c47ce4f16 100644
--- a/nixpkgs/pkgs/tools/backup/wal-g/default.nix
+++ b/nixpkgs/pkgs/tools/backup/wal-g/default.nix
@@ -21,5 +21,6 @@ buildGoPackage rec {
license = stdenv.lib.licenses.asl20;
description = "An archival restoration tool for Postgres";
maintainers = [ stdenv.lib.maintainers.ocharles ];
+ broken = true;
};
}
diff --git a/nixpkgs/pkgs/tools/bluetooth/blueman/default.nix b/nixpkgs/pkgs/tools/bluetooth/blueman/default.nix
index 8e393ac3f13..01ab2eefc21 100644
--- a/nixpkgs/pkgs/tools/bluetooth/blueman/default.nix
+++ b/nixpkgs/pkgs/tools/bluetooth/blueman/default.nix
@@ -1,9 +1,7 @@
{ config, stdenv, lib, fetchurl, intltool, pkgconfig, python3Packages, bluez, gtk3
, obex_data_server, xdg_utils, dnsmasq, dhcp, libappindicator, iproute
, gnome3, librsvg, wrapGAppsHook, gobject-introspection
-, withNetworkManager ?
- config.networking.networkmanager.enable or false, networkmanager
-, withPulseAudio ? config.pulseaudio or stdenv.isLinux, libpulseaudio }:
+, networkmanager, withPulseAudio ? config.pulseaudio or stdenv.isLinux, libpulseaudio }:
let
pythonPackages = python3Packages;
@@ -24,10 +22,9 @@ in stdenv.mkDerivation rec {
];
buildInputs = [ bluez gtk3 pythonPackages.python librsvg
- gnome3.adwaita-icon-theme iproute libappindicator ]
+ gnome3.adwaita-icon-theme iproute libappindicator networkmanager ]
++ pythonPath
- ++ lib.optional withPulseAudio libpulseaudio
- ++ lib.optional withNetworkManager networkmanager;
+ ++ lib.optional withPulseAudio libpulseaudio;
postPatch = lib.optionalString withPulseAudio ''
sed -i 's,CDLL(",CDLL("${libpulseaudio.out}/lib/,g' blueman/main/PulseAudioUtils.py
diff --git a/nixpkgs/pkgs/tools/cd-dvd/unetbootin/default.nix b/nixpkgs/pkgs/tools/cd-dvd/unetbootin/default.nix
index 9495f8dac99..a6c2885d4b4 100644
--- a/nixpkgs/pkgs/tools/cd-dvd/unetbootin/default.nix
+++ b/nixpkgs/pkgs/tools/cd-dvd/unetbootin/default.nix
@@ -3,13 +3,13 @@
stdenv.mkDerivation rec {
pname = "unetbootin";
- version = "661";
+ version = "675";
src = fetchFromGitHub {
owner = "unetbootin";
repo = "unetbootin";
rev = version;
- sha256 = "0jwmmym86x9hc6yr619dxdbxdawx8x0zwld0dfrhzwxvwbqbpav5";
+ sha256 = "0b7z2amsf6i7b56a5sfs5di1vh30h6ybcqg23d5gx5zgn3w38w4a";
};
setSourceRoot = ''
diff --git a/nixpkgs/pkgs/tools/compression/brotli/default.nix b/nixpkgs/pkgs/tools/compression/brotli/default.nix
index 33b6f12cd46..229c6c8b8e4 100644
--- a/nixpkgs/pkgs/tools/compression/brotli/default.nix
+++ b/nixpkgs/pkgs/tools/compression/brotli/default.nix
@@ -1,4 +1,4 @@
-{ stdenv, fetchFromGitHub, cmake }:
+{ stdenv, fetchFromGitHub, cmake, fetchpatch, staticOnly ? false }:
# ?TODO: there's also python lib in there
@@ -15,7 +15,13 @@ stdenv.mkDerivation rec {
nativeBuildInputs = [ cmake ];
- cmakeFlags = [];
+ patches = stdenv.lib.optional staticOnly (fetchpatch {
+ url = "https://github.com/google/brotli/pull/655/commits/7289e5a378ba13801996a84d89d8fe95c3fc4c11.patch";
+ sha256 = "1bghbdvj24jrvb0sqfdif9vwg7wx6pn8dvl6flkrcjkhpj0gi0jg";
+ });
+
+ cmakeFlags = []
+ ++ stdenv.lib.optional staticOnly "-DBUILD_SHARED_LIBS=OFF";
outputs = [ "out" "dev" "lib" ];
diff --git a/nixpkgs/pkgs/tools/filesystems/bcachefs-tools/default.nix b/nixpkgs/pkgs/tools/filesystems/bcachefs-tools/default.nix
index 98dab6278b0..d53fbb3960b 100644
--- a/nixpkgs/pkgs/tools/filesystems/bcachefs-tools/default.nix
+++ b/nixpkgs/pkgs/tools/filesystems/bcachefs-tools/default.nix
@@ -3,12 +3,12 @@
stdenv.mkDerivation {
pname = "bcachefs-tools";
- version = "2019-08-21";
+ version = "2019-10-01";
src = fetchgit {
url = "https://evilpiepirate.org/git/bcachefs-tools.git";
- rev = "72a408f84846fe702b8db4f158b678ee20bbf835";
- sha256 = "0y5700afv1x1i3wnp3g71i3zhyhkwmx79j0irxr63fmg47n0ys1i";
+ rev = "7f69c4161c31b8f43723a9ccad1a9a358f4e2e70";
+ sha256 = "0v4b8h99cd434v349y8vmhj2igf0ryky7svd20ar1fr7da580kvj";
};
enableParallelBuilding = true;
diff --git a/nixpkgs/pkgs/tools/filesystems/btrfs-progs/default.nix b/nixpkgs/pkgs/tools/filesystems/btrfs-progs/default.nix
index f5588cc51ab..95fc1c1cd7a 100644
--- a/nixpkgs/pkgs/tools/filesystems/btrfs-progs/default.nix
+++ b/nixpkgs/pkgs/tools/filesystems/btrfs-progs/default.nix
@@ -4,11 +4,11 @@
stdenv.mkDerivation rec {
pname = "btrfs-progs";
- version = "5.2.1";
+ version = "5.2.2";
src = fetchurl {
url = "mirror://kernel/linux/kernel/people/kdave/btrfs-progs/btrfs-progs-v${version}.tar.xz";
- sha256 = "0crjv3i20nyj2dagfw6q7byshscpn6j7wlqch3apkzzzk00lmb1n";
+ sha256 = "1imivxjppi8zl27gn472pwpk8bg5dijkbyi340by31vhy7dj24w2";
};
nativeBuildInputs = [
diff --git a/nixpkgs/pkgs/tools/filesystems/ceph/default.nix b/nixpkgs/pkgs/tools/filesystems/ceph/default.nix
index 1755ef625f5..141d21951a8 100644
--- a/nixpkgs/pkgs/tools/filesystems/ceph/default.nix
+++ b/nixpkgs/pkgs/tools/filesystems/ceph/default.nix
@@ -89,7 +89,7 @@ let
ps.six
]);
- version = "14.2.3";
+ version = "14.2.4";
in rec {
ceph = stdenv.mkDerivation {
pname = "ceph";
@@ -97,7 +97,7 @@ in rec {
src = fetchurl {
url = "http://download.ceph.com/tarballs/ceph-${version}.tar.gz";
- sha256 = "1pa8czb205pz4vjfh82gsgickj3cdjrx51mcx7acsyqgp3dfvl33";
+ sha256 = "1y6hixh6srd5aswhzq0sf0dbygwhx0ardx3w3f7qazf5rapvd03i";
};
patches = [
diff --git a/nixpkgs/pkgs/tools/filesystems/f2fs-tools/default.nix b/nixpkgs/pkgs/tools/filesystems/f2fs-tools/default.nix
index d7fa971c987..c5ec523e247 100644
--- a/nixpkgs/pkgs/tools/filesystems/f2fs-tools/default.nix
+++ b/nixpkgs/pkgs/tools/filesystems/f2fs-tools/default.nix
@@ -2,12 +2,12 @@
stdenv.mkDerivation rec {
pname = "f2fs-tools";
- version = "1.11.0";
+ version = "1.13.0";
src = fetchgit {
url = "https://git.kernel.org/pub/scm/linux/kernel/git/jaegeuk/f2fs-tools.git";
rev = "refs/tags/v${version}";
- sha256 = "188yv77ga466wpzbirsx6vspym8idaschgi7cx92z4jwqpnkk5gv";
+ sha256 = "0h6wincsvg6s232ajxblg66r5nx87v00a4w7xkbxgbl1qyny477j";
};
nativeBuildInputs = [ autoreconfHook pkgconfig ];
diff --git a/nixpkgs/pkgs/tools/filesystems/f2fs-tools/f2fs-tools-cross-fix.patch b/nixpkgs/pkgs/tools/filesystems/f2fs-tools/f2fs-tools-cross-fix.patch
index 1503732240c..e01a97b0bc3 100644
--- a/nixpkgs/pkgs/tools/filesystems/f2fs-tools/f2fs-tools-cross-fix.patch
+++ b/nixpkgs/pkgs/tools/filesystems/f2fs-tools/f2fs-tools-cross-fix.patch
@@ -1,25 +1,27 @@
---- f2fs-tools/configure.ac.orig 2018-11-29 05:05:57.154988687 +0300
-+++ f2fs-tools/configure.ac 2018-11-29 05:06:12.667316101 +0300
-@@ -20,14 +20,16 @@
+diff --git a/configure.ac b/configure.ac
+index 9b0e872..0108219 100644
+--- a/configure.ac
++++ b/configure.ac
+@@ -20,14 +20,16 @@ AC_DEFINE([F2FS_MINOR_VERSION], m4_bpatsubst(f2fs_tools_version,
[\([0-9]*\).\([0-9]*\)\(\w\|\W\)*], [\2]),
[Minor version for f2fs-tools])
--AC_CHECK_FILE(.git,
+-AS_IF([test -d .git],[
- AC_DEFINE([F2FS_TOOLS_DATE],
- "m4_bpatsubst(f2fs_tools_gitdate,
- [\([0-9-]*\)\(\w\|\W\)*], [\1])",
-- [f2fs-tools date based on Git commits]),
+- [f2fs-tools date based on Git commits])],[
- AC_DEFINE([F2FS_TOOLS_DATE],
- "f2fs_tools_date",
-- [f2fs-tools date based on Source releases]))
-+dnl AC_CHECK_FILE(.git,
-+dnl AC_DEFINE([F2FS_TOOLS_DATE],
-+dnl "m4_bpatsubst(f2fs_tools_gitdate,
-+dnl [\([0-9-]*\)\(\w\|\W\)*], [\1])",
-+dnl [f2fs-tools date based on Git commits]),
-+dnl AC_DEFINE([F2FS_TOOLS_DATE],
-+dnl "f2fs_tools_date",
-+dnl [f2fs-tools date based on Source releases]))
+- [f2fs-tools date based on Source releases])])
++dnl AS_IF([test -d .git],[
++dnl AC_DEFINE([F2FS_TOOLS_DATE],
++dnl "m4_bpatsubst(f2fs_tools_gitdate,
++dnl [\([0-9-]*\)\(\w\|\W\)*], [\1])",
++dnl [f2fs-tools date based on Git commits])],[
++dnl AC_DEFINE([F2FS_TOOLS_DATE],
++dnl "f2fs_tools_date",
++dnl [f2fs-tools date based on Source releases])])
+
+AC_DEFINE([F2FS_TOOLS_DATE], "f2fs_tools_date", [f2fs-tools date based on Source releases])
diff --git a/nixpkgs/pkgs/tools/filesystems/fuse-overlayfs/default.nix b/nixpkgs/pkgs/tools/filesystems/fuse-overlayfs/default.nix
index a96830feb2a..2c9336802ea 100644
--- a/nixpkgs/pkgs/tools/filesystems/fuse-overlayfs/default.nix
+++ b/nixpkgs/pkgs/tools/filesystems/fuse-overlayfs/default.nix
@@ -2,13 +2,13 @@
stdenv.mkDerivation rec {
pname = "fuse-overlayfs";
- version = "0.5.1";
+ version = "0.6.2";
src = fetchFromGitHub {
owner = "containers";
repo = pname;
rev = "v${version}";
- sha256 = "03sdnnq0x44jlwf41snrrma4hxdiixmhynw35gjhm84slpljnngp";
+ sha256 = "03gad89jg0dif5wqdl1kh0rpmfc80pnkx8hk0v4hrlirr130dgl2";
};
nativeBuildInputs = [ autoreconfHook pkgconfig ];
diff --git a/nixpkgs/pkgs/tools/filesystems/gcsfuse/default.nix b/nixpkgs/pkgs/tools/filesystems/gcsfuse/default.nix
index fe46fccf271..af3e9250985 100644
--- a/nixpkgs/pkgs/tools/filesystems/gcsfuse/default.nix
+++ b/nixpkgs/pkgs/tools/filesystems/gcsfuse/default.nix
@@ -1,25 +1,28 @@
-# This file was generated by go2nix.
-{ lib, buildGoPackage, fetchgit }:
+{ lib, buildGoModule, fetchFromGitHub }:
-buildGoPackage rec {
+buildGoModule rec {
pname = "gcsfuse";
- version = "0.23.0";
- rev = "v${version}";
+ version = "0.28.1";
- goPackagePath = "github.com/googlecloudplatform/gcsfuse";
-
- src = fetchgit {
- inherit rev;
- url = "https://github.com/googlecloudplatform/gcsfuse";
- sha256 = "1qxbpsmz22l5w4b7wbgfdq4v85cfc9ka9i8h4c56nals1x5lcsnx";
+ src = fetchFromGitHub {
+ owner = "googlecloudplatform";
+ repo = "gcsfuse";
+ rev = "v${version}";
+ sha256 = "0dh01qvsjlzji2mwznykc2nghg4f1raylvgnp6sbxv9x1kpnwx71";
};
- meta = {
- license = lib.licenses.asl20;
- platforms = lib.platforms.unix;
+ modSha256 = "0i86xs3lq2mj22yv7jmhmb34k7lz348bakqz020xpyccllkkszy4";
+
+ patches = [
+ ./go.mod.patch
+ ./go.sum.patch
+ ];
+
+ meta = with lib;{
+ description = "A user-space file system for interacting with Google Cloud Storage";
+ homepage = "https://cloud.google.com/storage/docs/gcs-fuse";
+ license = licenses.asl20;
+ platforms = platforms.unix;
maintainers = [];
- homepage = https://cloud.google.com/storage/docs/gcs-fuse;
- description =
- "A user-space file system for interacting with Google Cloud Storage";
};
}
diff --git a/nixpkgs/pkgs/tools/filesystems/gcsfuse/go.mod.patch b/nixpkgs/pkgs/tools/filesystems/gcsfuse/go.mod.patch
new file mode 100644
index 00000000000..fbda63432d7
--- /dev/null
+++ b/nixpkgs/pkgs/tools/filesystems/gcsfuse/go.mod.patch
@@ -0,0 +1,28 @@
+--- a/go.mod 2019-10-09 22:35:05.777065057 -0400
++++ b/go.mod 2019-10-10 21:34:15.809681738 -0400
+@@ -0,0 +1,25 @@
++module github.com/googlecloudplatform/gcsfuse
++
++go 1.12
++
++require (
++ cloud.google.com/go v0.0.0-20170807235027-9be7f826df5c
++ github.com/codegangsta/cli v0.0.0-20170804093415-b99aa811b4c1
++ github.com/golang/protobuf v0.0.0-20170902000452-17ce1425424a
++ github.com/jacobsa/daemonize v0.0.0-20160101105449-e460293e890f
++ github.com/jacobsa/fuse v0.0.0-20170513050233-fe7f3a55dcaa
++ github.com/jacobsa/gcloud v0.0.0-20180124212516-9291bd1e8308
++ github.com/jacobsa/oglematchers v0.0.0-20150720000706-141901ea67cd
++ github.com/jacobsa/oglemock v0.0.0-20150831005832-e94d794d06ff
++ github.com/jacobsa/ogletest v0.0.0-20170503003838-80d50a735a11
++ github.com/jacobsa/ratelimit v0.0.0-20150904001804-f5e47030f3b0
++ github.com/jacobsa/reqtrace v0.0.0-20150505043853-245c9e0234cb
++ github.com/jacobsa/syncutil v0.0.0-20150827001642-c39ef5c1aa0b
++ github.com/jacobsa/timeutil v0.0.0-20170205232429-577e5acbbcf6
++ github.com/jacobsa/util v0.0.0-20150810040848-976a6f4de67e
++ github.com/kardianos/osext v0.0.0-20170510131534-ae77be60afb1
++ golang.org/x/net v0.0.0-20170809000501-1c05540f6879
++ golang.org/x/oauth2 v0.0.0-20170807180024-9a379c6b3e95
++ google.golang.org/api v0.0.0-20170807210121-5c4ffd5985e2
++ google.golang.org/appengine v0.0.0-20170801183137-c5a90ac045b7
++)
diff --git a/nixpkgs/pkgs/tools/filesystems/gcsfuse/go.sum.patch b/nixpkgs/pkgs/tools/filesystems/gcsfuse/go.sum.patch
new file mode 100644
index 00000000000..d537266e3c1
--- /dev/null
+++ b/nixpkgs/pkgs/tools/filesystems/gcsfuse/go.sum.patch
@@ -0,0 +1,38 @@
+--- a/go.sum 2019-10-09 22:35:05.777065057 -0400
++++ b/go.sum 2019-10-10 21:34:15.809681738 -0400
+@@ -0,0 +1,35 @@
++cloud.google.com/go v0.0.0-20170807235027-9be7f826df5c h1:pTb3uxaVLke7AQ/KUVTHWZmzKrKYrip7FimNb3ecAbo=
++cloud.google.com/go v0.0.0-20170807235027-9be7f826df5c/go.mod h1:aQUYkXzVsufM+DwF1aE+0xfcU+56JwCaLick0ClmMTw=
++github.com/codegangsta/cli v0.0.0-20170804093415-b99aa811b4c1 h1:PTPzzngHWcTI0ph/9I92RhVtRkdOCi37wySw/ojR5Eg=
++github.com/codegangsta/cli v0.0.0-20170804093415-b99aa811b4c1/go.mod h1:/qJNoX69yVSKu5o4jLyXAENLRyk1uhi7zkbQ3slBdOA=
++github.com/golang/protobuf v0.0.0-20170902000452-17ce1425424a/go.mod h1:6lQm79b+lXiMfvg/cZm0SGofjICqVBUtrP5yJMmIC1U=
++github.com/jacobsa/daemonize v0.0.0-20160101105449-e460293e890f h1:X+tnaqoCcBgAwSTJtoYW6p0qKiuPyMfofEHEFUf2kdU=
++github.com/jacobsa/daemonize v0.0.0-20160101105449-e460293e890f/go.mod h1:Ip4fOwzCrnDVuluHBd7FXIMb7SHOKfkt9/UDrYSZvqI=
++github.com/jacobsa/fuse v0.0.0-20170513050233-fe7f3a55dcaa h1:3420E523ahKsI3tlbO0zeLvgzuTFdJoy6JoAVuShs8U=
++github.com/jacobsa/fuse v0.0.0-20170513050233-fe7f3a55dcaa/go.mod h1:9Aml1MG17JVeXrN4D2mtJvYHtHklJH5bESjCKNzVjFU=
++github.com/jacobsa/gcloud v0.0.0-20180124212516-9291bd1e8308 h1:sfc1gTCrsJQJMySgDstAhwzogqQIrTxkwwScG4p2kbM=
++github.com/jacobsa/gcloud v0.0.0-20180124212516-9291bd1e8308/go.mod h1:3fF6sEraNZSToePaj5q+f9KSaMpuZcwccqAQmOKDv/k=
++github.com/jacobsa/oglematchers v0.0.0-20150720000706-141901ea67cd h1:9GCSedGjMcLZCrusBZuo4tyKLpKUPenUUqi34AkuFmA=
++github.com/jacobsa/oglematchers v0.0.0-20150720000706-141901ea67cd/go.mod h1:TlmyIZDpGmwRoTWiakdr+HA1Tukze6C6XbRVidYq02M=
++github.com/jacobsa/oglemock v0.0.0-20150831005832-e94d794d06ff h1:2xRHTvkpJ5zJmglXLRqHiZQNjUoOkhUyhTAhEQvPAWw=
++github.com/jacobsa/oglemock v0.0.0-20150831005832-e94d794d06ff/go.mod h1:gJWba/XXGl0UoOmBQKRWCJdHrr3nE0T65t6ioaj3mLI=
++github.com/jacobsa/ogletest v0.0.0-20170503003838-80d50a735a11/go.mod h1:+DBdDyfoO2McrOyDemRBq0q9CMEByef7sYl7JH5Q3BI=
++github.com/jacobsa/ratelimit v0.0.0-20150904001804-f5e47030f3b0 h1:6GaIakaFrxn738iBykUc6fyS5sIAKRg/wafwzrzRX30=
++github.com/jacobsa/ratelimit v0.0.0-20150904001804-f5e47030f3b0/go.mod h1:5/sdn6lSZE5l3rXMkJGO7Y3MHJImklO43rZx9ouOWYQ=
++github.com/jacobsa/reqtrace v0.0.0-20150505043853-245c9e0234cb h1:uSWBjJdMf47kQlXMwWEfmc864bA1wAC+Kl3ApryuG9Y=
++github.com/jacobsa/reqtrace v0.0.0-20150505043853-245c9e0234cb/go.mod h1:ivcmUvxXWjb27NsPEaiYK7AidlZXS7oQ5PowUS9z3I4=
++github.com/jacobsa/syncutil v0.0.0-20150827001642-c39ef5c1aa0b h1:HMNP0njxow/ahg3AFKzu8HnyOUSRiVqWXm+i4VefV+Y=
++github.com/jacobsa/syncutil v0.0.0-20150827001642-c39ef5c1aa0b/go.mod h1:mPvulh9VKXvo+yOlrD4VYOOYuLdZJ36wa/5QIrtXvWs=
++github.com/jacobsa/timeutil v0.0.0-20170205232429-577e5acbbcf6 h1:XKHJmHcgU9glxk3eLPiRZT5VFSHJitVTnMj/EgIoXC4=
++github.com/jacobsa/timeutil v0.0.0-20170205232429-577e5acbbcf6/go.mod h1:JEWKD6V8xETMW+DEv+IQVz++f8Cn8O/X0HPeDY3qNis=
++github.com/jacobsa/util v0.0.0-20150810040848-976a6f4de67e h1:BegecLAVSx5IW1bOImB8Lt6+4yiWP4t+PUeckWYzIeg=
++github.com/jacobsa/util v0.0.0-20150810040848-976a6f4de67e/go.mod h1:q0HiLetNeSPHjs8ddOw9U6xahog8xR7WPp6PhzJ6wmk=
++github.com/kardianos/osext v0.0.0-20170510131534-ae77be60afb1 h1:PJPDf8OUfOK1bb/NeTKd4f1QXZItOX389VN3B6qC8ro=
++github.com/kardianos/osext v0.0.0-20170510131534-ae77be60afb1/go.mod h1:1NbS8ALrpOvjt0rHPNLyCIeMtbizbir8U//inJ+zuB8=
++golang.org/x/net v0.0.0-20170809000501-1c05540f6879 h1:0rFa7EaCGdQPmZVbo9F7MNF65b8dyzS6EUnXjs9Cllk=
++golang.org/x/net v0.0.0-20170809000501-1c05540f6879/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4=
++golang.org/x/oauth2 v0.0.0-20170807180024-9a379c6b3e95 h1:RS+wSrhdVci7CsPwJaMN8exaP3UTuQU0qB34R/E/JD0=
++golang.org/x/oauth2 v0.0.0-20170807180024-9a379c6b3e95/go.mod h1:N/0e6XlmueqKjAGxoOufVs8QHGRruUQn6yWY3a++T0U=
++google.golang.org/api v0.0.0-20170807210121-5c4ffd5985e2 h1:wF/9eBxkxh3/00HWCFpF3583KFXGapuZ3EVpZIuLd4Q=
++google.golang.org/api v0.0.0-20170807210121-5c4ffd5985e2/go.mod h1:4mhQ8q/RsB7i+udVvVy5NUi08OU8ZlA0gRVgrF7VFY0=
++google.golang.org/appengine v0.0.0-20170801183137-c5a90ac045b7/go.mod h1:EbEs0AVv82hx2wNQdGPgUI5lhzA/G0D9YwlJXL52JkM=
diff --git a/nixpkgs/pkgs/tools/filesystems/irods/default.nix b/nixpkgs/pkgs/tools/filesystems/irods/default.nix
index 14790ae7087..56fc2e40ba2 100644
--- a/nixpkgs/pkgs/tools/filesystems/irods/default.nix
+++ b/nixpkgs/pkgs/tools/filesystems/irods/default.nix
@@ -87,6 +87,7 @@ in rec {
description = common.meta.description + " CLI clients";
longDescription = common.meta.longDescription + ''
This package provides the CLI clients, called 'icommands'.'';
+ broken = true;
};
});
}
diff --git a/nixpkgs/pkgs/tools/filesystems/mergerfs/default.nix b/nixpkgs/pkgs/tools/filesystems/mergerfs/default.nix
index 43c7c167b5e..4a3e860d358 100644
--- a/nixpkgs/pkgs/tools/filesystems/mergerfs/default.nix
+++ b/nixpkgs/pkgs/tools/filesystems/mergerfs/default.nix
@@ -2,13 +2,13 @@
stdenv.mkDerivation rec {
pname = "mergerfs";
- version = "2.28.1";
+ version = "2.28.2";
src = fetchFromGitHub {
owner = "trapexit";
repo = pname;
rev = version;
- sha256 = "18yc80ccpqf785gah5xw6jg5524wfra8bf3pcjr7idzdz4ca7nvf";
+ sha256 = "14h32acx2fcbyjf1f80vb86q845zwcjszd99a307ybdfhlv18r2m";
};
nativeBuildInputs = [
diff --git a/nixpkgs/pkgs/tools/filesystems/nixpart/0.4/default.nix b/nixpkgs/pkgs/tools/filesystems/nixpart/0.4/default.nix
index 129283e83eb..b293b6d8146 100644
--- a/nixpkgs/pkgs/tools/filesystems/nixpart/0.4/default.nix
+++ b/nixpkgs/pkgs/tools/filesystems/nixpart/0.4/default.nix
@@ -73,5 +73,6 @@ in buildPythonApplication rec {
license = licenses.gpl2Plus;
maintainers = [ maintainers.aszlig ];
platforms = platforms.linux;
+ broken = true;
};
}
diff --git a/nixpkgs/pkgs/tools/filesystems/ntfs-3g/default.nix b/nixpkgs/pkgs/tools/filesystems/ntfs-3g/default.nix
index 3660649553d..1d402090355 100644
--- a/nixpkgs/pkgs/tools/filesystems/ntfs-3g/default.nix
+++ b/nixpkgs/pkgs/tools/filesystems/ntfs-3g/default.nix
@@ -30,6 +30,7 @@ stdenv.mkDerivation rec {
"--enable-posix-acls"
"--enable-xattr-mappings"
"--${if crypto then "enable" else "disable"}-crypto"
+ "--enable-extras"
];
postInstall =
diff --git a/nixpkgs/pkgs/tools/filesystems/xtreemfs/default.nix b/nixpkgs/pkgs/tools/filesystems/xtreemfs/default.nix
index 436037245bb..d8d41450079 100644
--- a/nixpkgs/pkgs/tools/filesystems/xtreemfs/default.nix
+++ b/nixpkgs/pkgs/tools/filesystems/xtreemfs/default.nix
@@ -1,5 +1,5 @@
{ stdenv, boost, fuse, openssl, cmake, attr, jdk, ant, which, file, python
-, lib, valgrind, makeWrapper, fetchFromGitHub }:
+, lib, valgrind, makeWrapper, fetchFromGitHub, fetchpatch }:
stdenv.mkDerivation {
src = fetchFromGitHub {
@@ -15,6 +15,14 @@ stdenv.mkDerivation {
buildInputs = [ which attr makeWrapper python ];
+ patches = [
+ (fetchpatch {
+ url = "https://github.com/xtreemfs/xtreemfs/commit/ebfdc2fff56c09f310159d92026883941e42a953.patch";
+ sha256 = "075w00ad88qm6xpm5679m0gfzkrc53w17sk7ycybf4hzxjs29ygy";
+ name = "xtreemfs-fix-for-openssl_1_1";
+ })
+ ];
+
preConfigure = ''
export JAVA_HOME=${jdk}
export ANT_HOME=${ant}
@@ -66,6 +74,5 @@ stdenv.mkDerivation {
maintainers = with lib.maintainers; [ raskin matejc ];
platforms = lib.platforms.linux;
license = lib.licenses.bsd3;
- broken = true; # does not support openssl 1.1
};
}
diff --git a/nixpkgs/pkgs/tools/graphics/dpic/default.nix b/nixpkgs/pkgs/tools/graphics/dpic/default.nix
index f21b84c1521..7a9217302d6 100644
--- a/nixpkgs/pkgs/tools/graphics/dpic/default.nix
+++ b/nixpkgs/pkgs/tools/graphics/dpic/default.nix
@@ -2,11 +2,11 @@
stdenv.mkDerivation rec {
pname = "dpic";
- version = "2016.01.12";
+ version = "2019.08.30";
src = fetchurl {
url = "https://ece.uwaterloo.ca/~aplevich/dpic/${pname}-${version}.tar.gz";
- sha256 = "0iwwf8shgm8n4drz8mndvk7jga93yy8plnyby3lgk8376g5ps6cz";
+ sha256 = "059m53cppw67hwygm7l03ciaxbnaldx63bqdhx1vzbx3kiwz8iw2";
};
phases = [ "unpackPhase" "buildPhase" "installPhase" ];
diff --git a/nixpkgs/pkgs/tools/graphics/gifski/default.nix b/nixpkgs/pkgs/tools/graphics/gifski/default.nix
index 5875f64f7ef..f5076801326 100644
--- a/nixpkgs/pkgs/tools/graphics/gifski/default.nix
+++ b/nixpkgs/pkgs/tools/graphics/gifski/default.nix
@@ -2,16 +2,16 @@
rustPlatform.buildRustPackage rec {
pname = "gifski";
- version = "0.8.7";
+ version = "0.9.1";
src = fetchFromGitHub {
owner = "ImageOptim";
repo = "gifski";
rev = version;
- sha256 = "0x41gyc5jk45jlx0hcq80j5gj1f66lcmbclqyx70l43ggslsi26f";
+ sha256 = "0dl5725imb2a2s0fskdqlnh2207ryyi2v5gz37cr5mf6khz898p2";
};
- cargoSha256 = "1pik6jcxg3amb5widpxn8j9szghbrhl0wsxjisizas3033xzrhcf";
+ cargoSha256 = "0wngsd0pmmxlwzxmyp8pvphh1ijs5s9k1mkkv688xpc4b8w0z10j";
nativeBuildInputs = [ pkgconfig ];
diff --git a/nixpkgs/pkgs/tools/graphics/povray/default.nix b/nixpkgs/pkgs/tools/graphics/povray/default.nix
index d2042540d71..ead44897968 100644
--- a/nixpkgs/pkgs/tools/graphics/povray/default.nix
+++ b/nixpkgs/pkgs/tools/graphics/povray/default.nix
@@ -4,13 +4,13 @@
stdenv.mkDerivation rec {
pname = "povray";
- version = "3.7.0.8";
+ version = "3.8.0-x.10064738";
src = fetchFromGitHub {
owner = "POV-Ray";
repo = "povray";
rev = "v${version}";
- sha256 = "1q114n4m3r7qy3yn954fq7p46rg7ypdax5fazxr9yj1jklf1lh6z";
+ sha256 = "0hy5a3q5092szk2x3s9lpn1zkszgq9bp15rxzdncxlvnanyzsasf";
};
diff --git a/nixpkgs/pkgs/tools/graphics/scrot/default.nix b/nixpkgs/pkgs/tools/graphics/scrot/default.nix
index 2f4862b0645..413bc8c52f1 100644
--- a/nixpkgs/pkgs/tools/graphics/scrot/default.nix
+++ b/nixpkgs/pkgs/tools/graphics/scrot/default.nix
@@ -16,7 +16,7 @@ stdenv.mkDerivation rec {
buildInputs = [ giblib xlibsWrapper libXfixes libXcursor ];
meta = with stdenv.lib; {
- homepage = http://linuxbrit.co.uk/scrot/;
+ homepage = https://github.com/resurrecting-open-source-projects/scrot;
description = "A command-line screen capture utility";
platforms = platforms.linux;
maintainers = with maintainers; [ globin ];
diff --git a/nixpkgs/pkgs/tools/graphics/svgbob/default.nix b/nixpkgs/pkgs/tools/graphics/svgbob/default.nix
index ecf982c21cd..24736b8f0ff 100644
--- a/nixpkgs/pkgs/tools/graphics/svgbob/default.nix
+++ b/nixpkgs/pkgs/tools/graphics/svgbob/default.nix
@@ -2,13 +2,13 @@
rustPlatform.buildRustPackage rec {
pname = "svgbob";
- version = "unstable-2018-10-05";
+ version = "0.4.2";
src = fetchFromGitHub {
owner = "ivanceras";
repo = pname;
- rev = "43fb0364e989d0e9a7656b148c947d47cc769622";
- sha256 = "1imjj57dx1af3wrs214yzaa2qfk8ld00nj3nx4z450gw2xjjj1gw";
+ rev = "0febc4377134a2ea3b3cd43ebdf5ea688a0e7432";
+ sha256 = "1n0w5b3fjgbczy1iw52172x1p3y1bvw1qpz77fkaxkhrkgfd7vwr";
};
sourceRoot = "source/svgbob_cli";
diff --git a/nixpkgs/pkgs/tools/graphics/vips/default.nix b/nixpkgs/pkgs/tools/graphics/vips/default.nix
index ad352c04ad9..3efbd6e0765 100644
--- a/nixpkgs/pkgs/tools/graphics/vips/default.nix
+++ b/nixpkgs/pkgs/tools/graphics/vips/default.nix
@@ -10,13 +10,13 @@
stdenv.mkDerivation rec {
pname = "vips";
- version = "8.8.1";
+ version = "8.8.3";
src = fetchFromGitHub {
owner = "libvips";
repo = "libvips";
rev = "v${version}";
- sha256 = "1wnfn92rvafx1g9vvhbvxssifzydx9y95kszg6i4c1p5sv5nhfd2";
+ sha256 = "0wlwcgcp7d3vhjdbi3xlpvnj4jl4321vac9v1sr1mis4aivwzsrn";
# Remove unicode file names which leads to different checksums on HFS+
# vs. other filesystems because of unicode normalisation.
extraPostFetch = ''
diff --git a/nixpkgs/pkgs/tools/graphics/zbar/default.nix b/nixpkgs/pkgs/tools/graphics/zbar/default.nix
index 6423a84badc..687c4832e47 100644
--- a/nixpkgs/pkgs/tools/graphics/zbar/default.nix
+++ b/nixpkgs/pkgs/tools/graphics/zbar/default.nix
@@ -8,6 +8,7 @@
, qtbase
, qtx11extras
, wrapQtAppsHook
+, wrapGAppsHook
, gtk3
, xmlto
, docbook_xsl
@@ -36,6 +37,7 @@ stdenv.mkDerivation rec {
autoreconfHook
docbook_xsl
wrapQtAppsHook
+ wrapGAppsHook
];
buildInputs = [
@@ -71,7 +73,7 @@ stdenv.mkDerivation rec {
dontWrapGApps = true;
postFixup = lib.optionalString enableVideo ''
- wrapProgram "$out/bin/zbarcam-gtk" "''${gappsWrapperArgs[@]}"
+ wrapGApp "$out/bin/zbarcam-gtk"
wrapQtApp "$out/bin/zbarcam-qt"
'';
diff --git a/nixpkgs/pkgs/tools/inputmethods/evdevremapkeys/default.nix b/nixpkgs/pkgs/tools/inputmethods/evdevremapkeys/default.nix
new file mode 100644
index 00000000000..0dc6f673925
--- /dev/null
+++ b/nixpkgs/pkgs/tools/inputmethods/evdevremapkeys/default.nix
@@ -0,0 +1,31 @@
+{ stdenv, fetchFromGitHub, python3Packages }:
+
+let
+ pythonPackages = python3Packages;
+
+in pythonPackages.buildPythonPackage rec {
+ name = "${pname}-0.1.0";
+ pname = "evdevremapkeys";
+
+ src = fetchFromGitHub {
+ owner = "philipl";
+ repo = pname;
+ rev = "68fb618b8142e1b45d7a1e19ea9a5a9bbb206144";
+ sha256 = "0c9slflakm5jqd8s1zpxm7gmrrk0335m040d7m70hnsak42jvs2f";
+ };
+
+ propagatedBuildInputs = with pythonPackages; [
+ pyyaml
+ pyxdg
+ python-daemon
+ evdev
+ ];
+
+ meta = with stdenv.lib; {
+ homepage = "https://github.com/philipl/evdevremapkeys";
+ description = "Daemon to remap events on linux input devices";
+ license = licenses.mit;
+ maintainers = [ maintainers.q3k ];
+ platforms = platforms.linux;
+ };
+}
diff --git a/nixpkgs/pkgs/tools/inputmethods/ibus-engines/ibus-typing-booster/default.nix b/nixpkgs/pkgs/tools/inputmethods/ibus-engines/ibus-typing-booster/default.nix
index 2ee6944eeb3..839768822f5 100644
--- a/nixpkgs/pkgs/tools/inputmethods/ibus-engines/ibus-typing-booster/default.nix
+++ b/nixpkgs/pkgs/tools/inputmethods/ibus-engines/ibus-typing-booster/default.nix
@@ -13,13 +13,13 @@ in
stdenv.mkDerivation rec {
pname = "ibus-typing-booster";
- version = "2.6.4";
+ version = "2.6.6";
src = fetchFromGitHub {
owner = "mike-fabian";
repo = "ibus-typing-booster";
rev = version;
- sha256 = "1k074y9439w8v6s71i7hhmkq9bgkl836y2a409rx3mb73vidadjr";
+ sha256 = "105g16icd482p7s0rpf6yck4hc50qhd3wxrnj0032f015vdzlh5a";
};
patches = [ ./hunspell-dirs.patch ];
diff --git a/nixpkgs/pkgs/tools/misc/bat/default.nix b/nixpkgs/pkgs/tools/misc/bat/default.nix
index 449be0f017f..6b62ca247cb 100644
--- a/nixpkgs/pkgs/tools/misc/bat/default.nix
+++ b/nixpkgs/pkgs/tools/misc/bat/default.nix
@@ -1,5 +1,5 @@
-{ stdenv, rustPlatform, fetchFromGitHub, llvmPackages, pkgconfig, zlib
-, Security, libiconv
+{ stdenv, rustPlatform, fetchFromGitHub, llvmPackages, pkgconfig
+, Security, libiconv, installShellFiles
}:
rustPlatform.buildRustPackage rec {
@@ -16,15 +16,15 @@ rustPlatform.buildRustPackage rec {
cargoSha256 = "0d7h0kn41w6wm4w63vjy2i7r19jkansfvfjn7vgh2gqh5m60kal2";
- nativeBuildInputs = [ pkgconfig llvmPackages.libclang zlib ];
+ nativeBuildInputs = [ pkgconfig llvmPackages.libclang installShellFiles ];
buildInputs = stdenv.lib.optionals stdenv.isDarwin [ Security libiconv ];
LIBCLANG_PATH = "${llvmPackages.libclang}/lib";
postInstall = ''
- install -m 444 -Dt $out/share/man/man1 doc/bat.1
- install -m 444 -Dt $out/share/fish/vendor_completions.d assets/completions/bat.fish
+ installManPage doc/bat.1
+ installShellCompletion assets/completions/bat.fish
'';
meta = with stdenv.lib; {
diff --git a/nixpkgs/pkgs/tools/misc/bdf2psf/default.nix b/nixpkgs/pkgs/tools/misc/bdf2psf/default.nix
index 2f326a1d6ac..6309587fd52 100644
--- a/nixpkgs/pkgs/tools/misc/bdf2psf/default.nix
+++ b/nixpkgs/pkgs/tools/misc/bdf2psf/default.nix
@@ -17,8 +17,7 @@ stdenv.mkDerivation rec {
unpackPhase = "dpkg-deb -x $src .";
installPhase = "
substituteInPlace usr/bin/bdf2psf --replace /usr/bin/perl ${perl}/bin/perl
- mv usr/bin .
- cp -r . $out
+ mv usr $out
";
meta = with stdenv.lib; {
diff --git a/nixpkgs/pkgs/tools/misc/birdfont/default.nix b/nixpkgs/pkgs/tools/misc/birdfont/default.nix
index 092c83114e7..9dc3eb86e79 100644
--- a/nixpkgs/pkgs/tools/misc/birdfont/default.nix
+++ b/nixpkgs/pkgs/tools/misc/birdfont/default.nix
@@ -1,5 +1,5 @@
{ stdenv, fetchurl, pkgconfig, python3, xmlbird,
-cairo, gdk-pixbuf, libgee, glib, gtk3, webkitgtk, libnotify, sqlite, vala,
+cairo, gdk-pixbuf, libgee, glib, gtk3, webkitgtk, libnotify, sqlite, vala_0_44,
gobject-introspection, gsettings-desktop-schemas, wrapGAppsHook }:
stdenv.mkDerivation rec {
@@ -11,7 +11,7 @@ stdenv.mkDerivation rec {
sha256 = "0dr2cnvq30wak0j2k8089is7fvhw0ppwkfrrw1m649s2b95wav3q";
};
- nativeBuildInputs = [ python3 pkgconfig vala gobject-introspection wrapGAppsHook ];
+ nativeBuildInputs = [ python3 pkgconfig vala_0_44 gobject-introspection wrapGAppsHook ];
buildInputs = [ xmlbird libgee cairo gdk-pixbuf glib gtk3 webkitgtk libnotify sqlite gsettings-desktop-schemas ];
postPatch = "patchShebangs .";
diff --git a/nixpkgs/pkgs/tools/misc/calamares/default.nix b/nixpkgs/pkgs/tools/misc/calamares/default.nix
index 2c48f995ca2..3a6585514ab 100644
--- a/nixpkgs/pkgs/tools/misc/calamares/default.nix
+++ b/nixpkgs/pkgs/tools/misc/calamares/default.nix
@@ -6,12 +6,12 @@
stdenv.mkDerivation rec {
pname = "calamares";
- version = "3.2.11";
+ version = "3.2.15";
# release including submodule
src = fetchurl {
url = "https://github.com/${pname}/${pname}/releases/download/v${version}/${pname}-${version}.tar.gz";
- sha256 = "1djrc8p6kll8szycyj86v02jphiw2xwfhn563siykphfqr0jknlw";
+ sha256 = "0m2z34vgcqaf1yfa2919v3mz9b0q43mihz6di5kg62h6swaaanxd";
};
buildInputs = [
diff --git a/nixpkgs/pkgs/tools/misc/clac/default.nix b/nixpkgs/pkgs/tools/misc/clac/default.nix
index f71faf6ab74..544379d8d21 100644
--- a/nixpkgs/pkgs/tools/misc/clac/default.nix
+++ b/nixpkgs/pkgs/tools/misc/clac/default.nix
@@ -1,4 +1,4 @@
-{stdenv, fetchFromGitHub}:
+{ stdenv, fetchFromGitHub }:
stdenv.mkDerivation rec {
pname = "clac";
version = "0.0.0.20170503";
@@ -10,8 +10,7 @@ stdenv.mkDerivation rec {
sha256 = "0j8p1npgq32s377c9lw959h5i2csq4yb27cvg7av17bji46816bv";
};
- buildInputs = [];
- makeFlags = ["PREFIX=$(out)"];
+ makeFlags = [ "PREFIX=$(out)" ];
postInstall = ''
mkdir -p "$out/share/doc/${pname}"
diff --git a/nixpkgs/pkgs/tools/misc/clipman/default.nix b/nixpkgs/pkgs/tools/misc/clipman/default.nix
new file mode 100644
index 00000000000..1dd2c16cb56
--- /dev/null
+++ b/nixpkgs/pkgs/tools/misc/clipman/default.nix
@@ -0,0 +1,30 @@
+{ buildGoModule, fetchFromGitHub, lib, wl-clipboard, makeWrapper }:
+
+buildGoModule rec {
+ pname = "clipman";
+ version = "1.0.1";
+
+ src = fetchFromGitHub {
+ owner = "yory8";
+ repo = pname;
+ rev = "v${version}";
+ sha256 = "1qv7mncb8ggyxrxqxax3gbcfxzk8b4zj2n8rp2xpghsynw4j740w";
+ };
+
+ modSha256 = "0qwrj6wqy32v65k3sbp24frhrcq6wfk38ckmy6wfmhgcix47fzj2";
+
+ nativeBuildInputs = [ makeWrapper ];
+
+ postInstall = ''
+ wrapProgram $out/bin/clipman \
+ --prefix PATH : ${lib.makeBinPath [ wl-clipboard ]}
+ '';
+
+ meta = with lib; {
+ homepage = https://github.com/yory8/clipman;
+ license = licenses.gpl3;
+ maintainers = with maintainers; [ ma27 ];
+ description = "A simple clipboard manager for Wayland";
+ platforms = platforms.linux;
+ };
+}
diff --git a/nixpkgs/pkgs/tools/misc/cloc/default.nix b/nixpkgs/pkgs/tools/misc/cloc/default.nix
index 987d694a0a4..39370e6754e 100644
--- a/nixpkgs/pkgs/tools/misc/cloc/default.nix
+++ b/nixpkgs/pkgs/tools/misc/cloc/default.nix
@@ -2,13 +2,13 @@
stdenv.mkDerivation rec {
pname = "cloc";
- version = "1.82";
+ version = "1.84";
src = fetchFromGitHub {
owner = "AlDanial";
repo = "cloc";
rev = version;
- sha256 = "0fsz07z0slfg58512fmnlj8pnxkc360bgf7fclg60v9clvcjbjsw";
+ sha256 = "14xikdwcr6pcnkk2i43zrsj88z8b3mrv0svbnbvxvarw1id83pnn";
};
setSourceRoot = ''
diff --git a/nixpkgs/pkgs/tools/misc/cloud-utils/default.nix b/nixpkgs/pkgs/tools/misc/cloud-utils/default.nix
index 5408c39920b..cdd1891fb40 100644
--- a/nixpkgs/pkgs/tools/misc/cloud-utils/default.nix
+++ b/nixpkgs/pkgs/tools/misc/cloud-utils/default.nix
@@ -1,6 +1,6 @@
{ stdenv, fetchurl, makeWrapper
, gawk, gnused, utillinux, file
-, wget, python3, qemu, euca2ools
+, wget, python3, qemu-utils, euca2ools
, e2fsprogs, cdrkit }:
stdenv.mkDerivation rec {
@@ -19,7 +19,7 @@ stdenv.mkDerivation rec {
# according to https://packages.ubuntu.com/source/zesty/cloud-utils
binDeps = [
- wget e2fsprogs file gnused gawk utillinux qemu euca2ools cdrkit
+ wget e2fsprogs file gnused gawk utillinux qemu-utils euca2ools cdrkit
];
postFixup = ''
diff --git a/nixpkgs/pkgs/tools/misc/crudini/default.nix b/nixpkgs/pkgs/tools/misc/crudini/default.nix
index f5291d0789e..f63cd0d32c9 100644
--- a/nixpkgs/pkgs/tools/misc/crudini/default.nix
+++ b/nixpkgs/pkgs/tools/misc/crudini/default.nix
@@ -1,47 +1,53 @@
-{ stdenv, fetchFromGitHub, python2Packages, help2man }:
+{ stdenv, fetchFromGitHub, python2Packages, help2man, installShellFiles }:
-python2Packages.buildPythonApplication rec {
+let
+ # py3 is supposedly working in version 0.9.3 but the tests fail so stick to py2
+ pypkgs = python2Packages;
+
+in
+pypkgs.buildPythonApplication rec {
pname = "crudini";
- version = "0.9";
+ version = "0.9.3";
src = fetchFromGitHub {
owner = "pixelb";
repo = "crudini";
rev = version;
- sha256 = "0x9z9lsygripj88gadag398pc9zky23m16wmh8vbgw7ld1nhkiav";
+ sha256 = "0298hvg0fpk0m0bjpwryj3icksbckwqqsr9w1ain55wf5s0v24k3";
};
- nativeBuildInputs = [ help2man ];
- propagatedBuildInputs = with python2Packages; [ iniparse ];
-
- doCheck = true;
+ nativeBuildInputs = [ help2man installShellFiles ];
- prePatch = ''
- # make runs the unpatched version in src so we need to patch them in addition to tests
- patchShebangs .
- '';
+ propagatedBuildInputs = with pypkgs; [ iniparse ];
- postBuild = ''
- make all
+ postPatch = ''
+ substituteInPlace crudini-help \
+ --replace ./crudini $out/bin/crudini
+ substituteInPlace tests/test.sh \
+ --replace ..: $out/bin:
'';
postInstall = ''
- mkdir -p $out/share/{man/man1,doc/crudini}
+ # this just creates the man page
+ make all
- cp README EXAMPLES $out/share/doc/crudini/
- for f in *.1 ; do
- gzip -c $f > $out/share/man/man1/$(basename $f).gz
- done
+ install -Dm444 -t $out/share/doc/${pname} README EXAMPLES
+ installManPage *.1
'';
checkPhase = ''
+ runHook preCheck
+
pushd tests >/dev/null
- ./test.sh
+ bash ./test.sh
+ popd >/dev/null
+
+ runHook postCheck
'';
meta = with stdenv.lib; {
description = "A utility for manipulating ini files ";
- homepage = http://www.pixelbeat.org/programs/crudini/;
+ homepage = "https://www.pixelbeat.org/programs/crudini/";
license = licenses.gpl2;
maintainers = with maintainers; [ peterhoeg ];
};
diff --git a/nixpkgs/pkgs/tools/misc/ddcutil/default.nix b/nixpkgs/pkgs/tools/misc/ddcutil/default.nix
index 0ddceb76ffe..a91fdad8d82 100644
--- a/nixpkgs/pkgs/tools/misc/ddcutil/default.nix
+++ b/nixpkgs/pkgs/tools/misc/ddcutil/default.nix
@@ -3,13 +3,13 @@
stdenv.mkDerivation rec {
pname = "ddcutil";
- version = "0.9.5";
+ version = "0.9.7";
src = fetchFromGitHub {
owner = "rockowitz";
repo = "ddcutil";
rev = "v${version}";
- sha256 = "1mqamwafm0rhw420i0pib6gq6hkdafnbg07b0z2ckrxii44sy0c2";
+ sha256 = "1p99kxgg2893ppp56q5igpva39lzj4wvx37c993r4p6i4gq6bi3v";
};
nativeBuildInputs = [ autoreconfHook pkgconfig ];
diff --git a/nixpkgs/pkgs/tools/misc/debootstrap/default.nix b/nixpkgs/pkgs/tools/misc/debootstrap/default.nix
index ec594de0c34..da810b3c9d8 100644
--- a/nixpkgs/pkgs/tools/misc/debootstrap/default.nix
+++ b/nixpkgs/pkgs/tools/misc/debootstrap/default.nix
@@ -15,13 +15,13 @@ let binPath = stdenv.lib.makeBinPath [
];
in stdenv.mkDerivation rec {
pname = "debootstrap";
- version = "1.0.115";
+ version = "1.0.116";
src = fetchurl {
# git clone git://git.debian.org/d-i/debootstrap.git
# I'd like to use the source. However it's lacking the lanny script ? (still true?)
url = "mirror://debian/pool/main/d/${pname}/${pname}_${version}.tar.gz";
- sha256 = "1s6ln7r6y91f0xmzbf9x4yx53hzcpiaa76i9dbmpy0ibw1ji30g4";
+ sha256 = "06gh7hks8flpg327wnrwwmp7h9s6knz2kk794s5wpd91iwnjfcyb";
};
nativeBuildInputs = [ makeWrapper ];
diff --git a/nixpkgs/pkgs/tools/misc/diffoscope/default.nix b/nixpkgs/pkgs/tools/misc/diffoscope/default.nix
index 22da00da9fc..9cb76b2ce37 100644
--- a/nixpkgs/pkgs/tools/misc/diffoscope/default.nix
+++ b/nixpkgs/pkgs/tools/misc/diffoscope/default.nix
@@ -1,4 +1,4 @@
-{ lib, stdenv, fetchgit, python3Packages, docutils, help2man
+{ lib, stdenv, fetchurl, python3Packages, docutils, help2man
, acl, apktool, binutils-unwrapped, bzip2, cbfstool, cdrkit, colord, colordiff, coreutils, cpio, db, diffutils, dtc
, e2fsprogs, file, findutils, fontforge-fonttools, fpc, gettext, ghc, ghostscriptX, giflib, gnumeric, gnupg, gnutar
, gzip, imagemagick, jdk, libarchive, libcaca, llvm, lz4, mono, openssh, pdftk, pgpdump, poppler_utils, sng, sqlite
@@ -8,13 +8,12 @@
# Note: when upgrading this package, please run the list-missing-tools.sh script as described below!
python3Packages.buildPythonApplication rec {
- name = "diffoscope-${version}";
- version = "110";
+ pname = "diffoscope";
+ version = "125";
- src = fetchgit {
- url = "https://anonscm.debian.org/git/reproducible/diffoscope.git";
- rev = "refs/tags/${version}";
- sha256 = "0rhjxigwxbqbqk7xv7n4m4rh693rg3cbp4x565jv68iy423mf2fb";
+ src = fetchurl {
+ url = "https://diffoscope.org/archive/diffoscope-${version}.tar.bz2";
+ sha256 = "0qwib44f43hinidbdjqnr2zanj678mgckx34x48jyywppvbj8yq4";
};
patches = [
@@ -34,7 +33,7 @@ python3Packages.buildPythonApplication rec {
# Most of the non-Python dependencies here are optional command-line tools for various file-format parsers.
# To help figuring out what's missing from the list, run: ./pkgs/tools/misc/diffoscope/list-missing-tools.sh
#
- # Still missing these tools: abootimg docx2txt dumpxsb enjarify js-beautify lipo oggDump otool procyon-decompiler Rscript
+ # Still missing these tools: abootimg docx2txt dumpxsb enjarify js-beautify lipo oggDump otool procyon-decompiler Rscript wasm2wat zipnode
# Also these libraries: python3-guestfs
pythonPath = with python3Packages; [ debian libarchive-c python_magic tlsh rpm ] ++ [
acl binutils-unwrapped bzip2 cdrkit colordiff coreutils cpio db diffutils
diff --git a/nixpkgs/pkgs/tools/misc/entr/default.nix b/nixpkgs/pkgs/tools/misc/entr/default.nix
index 954b570c79d..735580eee5d 100644
--- a/nixpkgs/pkgs/tools/misc/entr/default.nix
+++ b/nixpkgs/pkgs/tools/misc/entr/default.nix
@@ -2,11 +2,11 @@
stdenv.mkDerivation rec {
pname = "entr";
- version = "4.2";
+ version = "4.3";
src = fetchurl {
url = "http://entrproject.org/code/${pname}-${version}.tar.gz";
- sha256 = "0w2xkf77jikcjh15fp9g7661ss30pz3jbnh261vqpaqavwah4c17";
+ sha256 = "0ni34sfrssa6njiqm22q2kxv437r6vbs0a6mys8kwwn7vbdw30dh";
};
postPatch = ''
@@ -26,6 +26,6 @@ stdenv.mkDerivation rec {
description = "Run arbitrary commands when files change";
license = licenses.isc;
platforms = platforms.all;
- maintainers = with maintainers; [ pSub ];
+ maintainers = with maintainers; [ pSub synthetica ];
};
}
diff --git a/nixpkgs/pkgs/tools/misc/ffsend/default.nix b/nixpkgs/pkgs/tools/misc/ffsend/default.nix
index 31642000806..511b4fb1c36 100644
--- a/nixpkgs/pkgs/tools/misc/ffsend/default.nix
+++ b/nixpkgs/pkgs/tools/misc/ffsend/default.nix
@@ -16,16 +16,16 @@ with rustPlatform;
buildRustPackage rec {
pname = "ffsend";
- version = "0.2.51";
+ version = "0.2.52";
src = fetchFromGitLab {
owner = "timvisee";
repo = "ffsend";
rev = "v${version}";
- sha256 = "1ckzgzbv2fh5y7c5r0b9n6y2migmsrnlwdg7dybr0c82s39swr7f";
+ sha256 = "0bz0pgv7vdcha6sx2csx3mhkj4ph90w32p7h1wjvcgg3wlk1cgsf";
};
- cargoSha256 = "1x4hxar60lwimldpsi0frdlssgsb72qahn3dmb980sj6cmbq3f0b";
+ cargoSha256 = "01sgk4101ad0zk1k8zz89fsk2iq6j2vr8xd0wi6h88g2lgxvffzf";
nativeBuildInputs = [ cmake pkgconfig installShellFiles ];
buildInputs = [ openssl ]
diff --git a/nixpkgs/pkgs/tools/misc/fpp/default.nix b/nixpkgs/pkgs/tools/misc/fpp/default.nix
index ac731bcdbe8..7f036cb1f90 100644
--- a/nixpkgs/pkgs/tools/misc/fpp/default.nix
+++ b/nixpkgs/pkgs/tools/misc/fpp/default.nix
@@ -2,13 +2,13 @@
stdenv.mkDerivation rec {
pname = "fpp";
- version = "0.8.2";
+ version = "0.9.2";
src = fetchFromGitHub {
owner = "facebook";
repo = "PathPicker";
rev = version;
- sha256 = "00916xx4scd4xr9zxqkyhilczi27f2qm5y042592wr79ddix4n9v";
+ sha256 = "08p2xlz045fqyb0aj9pwwf2s5nb4b02i8zj81732q59yx5c6lrlv";
};
postPatch = ''
diff --git a/nixpkgs/pkgs/tools/misc/gawp/default.nix b/nixpkgs/pkgs/tools/misc/gawp/default.nix
index 002853abc1d..865ce3c440d 100644
--- a/nixpkgs/pkgs/tools/misc/gawp/default.nix
+++ b/nixpkgs/pkgs/tools/misc/gawp/default.nix
@@ -16,4 +16,10 @@ buildGoPackage rec {
};
goDeps = ./deps.nix;
+
+ meta = {
+ homepage = "https://github.com/martingallagher/gawp";
+ description = "A simple, configurable, file watching, job execution tool";
+ license = stdenv.lib.licenses.asl20;
+ };
}
diff --git a/nixpkgs/pkgs/tools/misc/getopt/default.nix b/nixpkgs/pkgs/tools/misc/getopt/default.nix
index 62414a60475..d168c8aaa14 100644
--- a/nixpkgs/pkgs/tools/misc/getopt/default.nix
+++ b/nixpkgs/pkgs/tools/misc/getopt/default.nix
@@ -17,5 +17,7 @@ stdenv.mkDerivation rec {
meta = {
platforms = stdenv.lib.platforms.unix;
+ homepage = http://frodo.looijaard.name/project/getopt;
+ description = "Parses command-line arguments from shell scripts";
};
}
diff --git a/nixpkgs/pkgs/tools/misc/gotify-cli/default.nix b/nixpkgs/pkgs/tools/misc/gotify-cli/default.nix
new file mode 100644
index 00000000000..a4b9af09712
--- /dev/null
+++ b/nixpkgs/pkgs/tools/misc/gotify-cli/default.nix
@@ -0,0 +1,26 @@
+{ buildGoModule, fetchFromGitHub, lib }:
+
+buildGoModule rec {
+ pname = "gotify-cli";
+ version = "2.1.1";
+
+ src = fetchFromGitHub {
+ owner = "gotify";
+ repo = "cli";
+ rev = "v${version}";
+ sha256 = "131gs6xzfggnrzq5jgyky23zvcmhx3q3hd17xvqxd02s2i9x1mg4";
+ };
+
+ modSha256 = "1lrsg33zd7m24za2gv407hz02n3lmz9qljfk82whlj44hx7kim1z";
+
+ postInstall = ''
+ mv $out/bin/cli $out/bin/gotify
+ '';
+
+ meta = with lib; {
+ license = licenses.mit;
+ homepage = https://github.com/gotify/cli;
+ description = "A command line interface for pushing messages to gotify/server.";
+ maintainers = with maintainers; [ ma27 ];
+ };
+}
diff --git a/nixpkgs/pkgs/tools/misc/hashit/default.nix b/nixpkgs/pkgs/tools/misc/hashit/default.nix
index 6d928524713..0315750c250 100644
--- a/nixpkgs/pkgs/tools/misc/hashit/default.nix
+++ b/nixpkgs/pkgs/tools/misc/hashit/default.nix
@@ -1,4 +1,4 @@
-{ stdenv, fetchFromGitHub, meson, ninja, pkgconfig, pantheon, python3, libgee, gtk3, desktop-file-utils, wrapGAppsHook }:
+{ stdenv, fetchFromGitHub, meson, ninja, pkgconfig, vala, pantheon, python3, libgee, gtk3, desktop-file-utils, wrapGAppsHook }:
stdenv.mkDerivation rec {
pname = "hashit";
@@ -15,7 +15,7 @@ stdenv.mkDerivation rec {
desktop-file-utils
meson
ninja
- pantheon.vala
+ vala
pkgconfig
python3
wrapGAppsHook
diff --git a/nixpkgs/pkgs/tools/misc/hebcal/default.nix b/nixpkgs/pkgs/tools/misc/hebcal/default.nix
index 39678abeba4..8b435fcef56 100644
--- a/nixpkgs/pkgs/tools/misc/hebcal/default.nix
+++ b/nixpkgs/pkgs/tools/misc/hebcal/default.nix
@@ -1,14 +1,14 @@
{ stdenv, fetchFromGitHub, autoreconfHook }:
stdenv.mkDerivation rec {
- version = "4.18";
+ version = "4.19";
pname = "hebcal";
src = fetchFromGitHub {
owner = "hebcal";
repo = "hebcal";
rev = "v${version}";
- sha256 = "13b3gbfl043s6vycf5kdy2lkchy3kg690vy0dpmy3si6x05nl10w";
+ sha256 = "028y2bw0bs0bx58gnxzbrg2c14a2pgkni2carf5i7kb6dg4wnkaq";
};
nativeBuildInputs = [ autoreconfHook ];
diff --git a/nixpkgs/pkgs/tools/misc/hexyl/default.nix b/nixpkgs/pkgs/tools/misc/hexyl/default.nix
index f6b0649e404..c00e47433c1 100644
--- a/nixpkgs/pkgs/tools/misc/hexyl/default.nix
+++ b/nixpkgs/pkgs/tools/misc/hexyl/default.nix
@@ -2,16 +2,16 @@
rustPlatform.buildRustPackage rec {
pname = "hexyl";
- version = "0.5.1";
+ version = "0.6.0";
src = fetchFromGitHub {
owner = "sharkdp";
repo = pname;
rev = "v${version}";
- sha256 = "0511ikhfc0fa6cfp02n49zlzyqgwf7ymgn911y8fnjlaf6grsh67";
+ sha256 = "1n2q5a6697bxvl0askywhad2x560cajv456gxihdqqmmyq2vf63h";
};
- cargoSha256 = "126hq802hncji4yvkf7jvaq2njzw8kwzvc7fqw99nrdn4k56xig7";
+ cargoSha256 = "1wcpbqlglf9r0xhfjmyym8bnd4pgrsf9lrmb14hn1ml5zlshpd7p";
meta = with stdenv.lib; {
description = "A command-line hex viewer";
diff --git a/nixpkgs/pkgs/tools/misc/html-proofer/Gemfile.lock b/nixpkgs/pkgs/tools/misc/html-proofer/Gemfile.lock
index be01c0118b3..08689ae8dcf 100644
--- a/nixpkgs/pkgs/tools/misc/html-proofer/Gemfile.lock
+++ b/nixpkgs/pkgs/tools/misc/html-proofer/Gemfile.lock
@@ -6,7 +6,7 @@ GEM
ethon (0.12.0)
ffi (>= 1.3.0)
ffi (1.11.1)
- html-proofer (3.12.2)
+ html-proofer (3.13.0)
addressable (~> 2.3)
mercenary (~> 0.3)
nokogiri (~> 1.10)
diff --git a/nixpkgs/pkgs/tools/misc/html-proofer/gemset.nix b/nixpkgs/pkgs/tools/misc/html-proofer/gemset.nix
index 2deda655d99..2d915a48dd9 100644
--- a/nixpkgs/pkgs/tools/misc/html-proofer/gemset.nix
+++ b/nixpkgs/pkgs/tools/misc/html-proofer/gemset.nix
@@ -37,10 +37,10 @@
platforms = [];
source = {
remotes = ["https://rubygems.org"];
- sha256 = "0xkcchgvlqkk3xgn11vw8n42bhavj6nn6vqsbycbx1rqxgiljlhy";
+ sha256 = "1a620704y2h4g9ffpl6461ssdx87bn6hjd0y1m370r2p2xddkb9f";
type = "gem";
};
- version = "3.12.2";
+ version = "3.13.0";
};
mercenary = {
groups = ["default"];
diff --git a/nixpkgs/pkgs/tools/misc/ldmtool/default.nix b/nixpkgs/pkgs/tools/misc/ldmtool/default.nix
index b59c46a8477..d1d3996bd62 100644
--- a/nixpkgs/pkgs/tools/misc/ldmtool/default.nix
+++ b/nixpkgs/pkgs/tools/misc/ldmtool/default.nix
@@ -1,5 +1,6 @@
{ stdenv, fetchFromGitHub, autoconf, automake, gtk-doc, pkgconfig, libuuid,
- libtool, readline, gobject-introspection, json-glib, lvm2, libxslt, docbook_xsl }:
+ libtool, readline, gobject-introspection, json-glib, lvm2, libxslt, docbook_xsl
+, fetchpatch }:
stdenv.mkDerivation rec {
pname = "ldmtool";
@@ -12,13 +13,21 @@ stdenv.mkDerivation rec {
sha256 = "1fy5wbmk8kwl86lzswq0d1z2j5y023qzfm2ppm8knzv9c47kniqk";
};
+ patches = [
+ # Remove useage of deprecrated G_PARAM_PRIVATE
+ (fetchpatch {
+ url = "https://github.com/mdbooth/libldm/commit/ee1b37a034038f09d61b121cc8b3651024acc46f.patch";
+ sha256 = "02y34kbcpcpffvy1n9yqngvdldmxmvdkha1v2xjqvrnclanpigcp";
+ })
+ ];
+
preConfigure = ''
sed -i docs/reference/ldmtool/Makefile.am \
-e 's|-nonet http://docbook.sourceforge.net/release/xsl/current/manpages/docbook.xsl|--nonet ${docbook_xsl}/xml/xsl/docbook/manpages/docbook.xsl|g'
'';
- # ldm.c:951:5: error: 'g_type_class_add_private' is deprecated [-Werror=deprecated-declarations]
- NIX_CFLAGS_COMPILE = "-Wno-error=deprecated-declarations";
+ # glib-2.62 deprecations
+ NIX_CFLAGS_COMPILE = [ "-DGLIB_DISABLE_DEPRECATION_WARNINGS" ];
configureScript = "sh autogen.sh";
diff --git a/nixpkgs/pkgs/tools/misc/memtest86-efi/default.nix b/nixpkgs/pkgs/tools/misc/memtest86-efi/default.nix
index 10135d66408..8d28dbcf40e 100644
--- a/nixpkgs/pkgs/tools/misc/memtest86-efi/default.nix
+++ b/nixpkgs/pkgs/tools/misc/memtest86-efi/default.nix
@@ -1,25 +1,28 @@
-{ lib, stdenv, fetchurl, unzip, libguestfs-with-appliance }:
+{ fetchzip, lib, p7zip, stdenv }:
stdenv.mkDerivation rec {
pname = "memtest86-efi";
- version = "8.0";
+ version = "8.1";
- src = fetchurl {
- # TODO: The latest version of memtest86 is actually 8.1, but apparently the
- # company has stopped distributing versioned binaries of memtest86:
+ src = fetchzip {
+ # TODO: The latest version of memtest86 is actually 8.2, but the
+ # company developing memtest86 has stopped providing a versioned download
+ # link for the latest version:
+ #
# https://www.passmark.com/forum/memtest86/44494-version-8-1-distribution-file-is-not-versioned?p=44505#post44505
- # However, it does look like redistribution is okay, so if we had
- # somewhere to host binaries that we make sure to version, then we could
- # probably keep up with the latest versions released by the company.
+ #
+ # However, versioned links for the previous version are available, so that
+ # is what is being used.
+ #
+ # It does look like redistribution is okay, so if we had somewhere to host
+ # binaries that we make sure to version, then we could probably keep up
+ # with the latest versions released by the company.
url = "https://www.memtest86.com/downloads/memtest86-${version}-usb.zip";
- sha256 = "147mnd7fnx2wvbzscw7pkg9ljiczhz05nb0cjpmww49a0ms4yknw";
+ sha256 = "0qiyd8ymn307shmvwmqd80q3svxf49133d2pf84qpdlcmjjfnhgg";
+ stripRoot = false;
};
- nativeBuildInputs = [ libguestfs-with-appliance unzip ];
-
- unpackPhase = ''
- unzip -q $src -d .
- '';
+ nativeBuildInputs = [ p7zip ];
installPhase = ''
mkdir -p $out
@@ -27,16 +30,15 @@ stdenv.mkDerivation rec {
# memtest86 is distributed as a bootable USB image. It contains the actual
# memtest86 EFI app.
#
- # The following command uses libguestfs to extract the actual EFI app from the
- # usb image so that it can be installed directly on the hard drive. This creates
- # the ./BOOT/ directory with the memtest86 EFI app.
- guestfish --ro --add ./memtest86-usb.img --mount /dev/sda1:/ copy-out /EFI/BOOT .
-
- cp -r BOOT/* $out/
+ # The following command uses p7zip to extract the actual EFI app from the
+ # usb image so that it can be installed directly on the hard drive.
+ 7z x -o$TEMP/temp-efi-dirs $src/memtest86-usb.img
+ 7z x -o$TEMP/memtest86-files $TEMP/temp-efi-dirs/EFI\ System\ Partition.img
+ cp -r $TEMP/memtest86-files/EFI/BOOT/* $out/
'';
meta = with lib; {
- homepage = http://memtest86.com/;
+ homepage = "http://memtest86.com/";
downloadPage = "https://www.memtest86.com/download.htm";
description = "A tool to detect memory errors, to be run from a bootloader";
longDescription = ''
diff --git a/nixpkgs/pkgs/tools/misc/mysqltuner/default.nix b/nixpkgs/pkgs/tools/misc/mysqltuner/default.nix
index 183871c39a7..9b7453ad1cc 100644
--- a/nixpkgs/pkgs/tools/misc/mysqltuner/default.nix
+++ b/nixpkgs/pkgs/tools/misc/mysqltuner/default.nix
@@ -2,13 +2,13 @@
stdenv.mkDerivation rec {
pname = "mysqltuner";
- version = "1.7.13";
+ version = "1.7.17";
src = fetchFromGitHub {
owner = "major";
repo = "MySQLTuner-perl";
rev = version;
- sha256 = "0zxm2hjvgznbbmsqb8bpcgzc0yq1ikxz1gckirp95ibxid3jdham";
+ sha256 = "0wjdqraa6r6kd6rsgrn177dq6xsnnr1sgnbs9whknjbs4fn3wwl5";
};
buildInputs = [ perl ];
diff --git a/nixpkgs/pkgs/tools/misc/noti/default.nix b/nixpkgs/pkgs/tools/misc/noti/default.nix
index 74b1f96fad8..dcc946c854e 100644
--- a/nixpkgs/pkgs/tools/misc/noti/default.nix
+++ b/nixpkgs/pkgs/tools/misc/noti/default.nix
@@ -3,18 +3,16 @@
buildGoPackage rec {
pname = "noti";
- version = "3.2.0";
+ version = "3.3.0";
src = fetchFromGitHub {
owner = "variadico";
repo = "noti";
rev = version;
- sha256 = "1lw1wmw2m83m0s5znb4gliywjpg74qrhrj6rwpcb5p352c4vbwxs";
+ sha256 = "1644bivjcky07n3rrm83vsms7hw47p4hnp2536q0z3qca5jyri2f";
};
buildInputs = lib.optional stdenv.isDarwin Cocoa;
- # TODO: Remove this when we update apple_sdk
- NIX_CFLAGS_COMPILE = lib.optional stdenv.isDarwin "-fno-objc-arc";
goPackagePath = "github.com/variadico/noti";
@@ -36,7 +34,7 @@ buildGoPackage rec {
'';
homepage = https://github.com/variadico/noti;
license = licenses.mit;
- maintainers = with maintainers; [ stites ];
+ maintainers = with maintainers; [ stites marsam ];
platforms = platforms.all;
};
}
diff --git a/nixpkgs/pkgs/tools/misc/osm2pgsql/default.nix b/nixpkgs/pkgs/tools/misc/osm2pgsql/default.nix
index 370d1924711..1a4e4d5b3a2 100644
--- a/nixpkgs/pkgs/tools/misc/osm2pgsql/default.nix
+++ b/nixpkgs/pkgs/tools/misc/osm2pgsql/default.nix
@@ -2,13 +2,13 @@
stdenv.mkDerivation rec {
pname = "osm2pgsql";
- version = "0.96.0";
+ version = "1.0.0";
src = fetchFromGitHub {
owner = "openstreetmap";
- repo = "osm2pgsql";
+ repo = pname;
rev = version;
- sha256 = "032cydh8ynaqfhdzmkvgbmqyjql668y6qln1l59l2s3ni9963bbl";
+ sha256 = "1g9qc1z5gzdjd37n586vcmq1qli0lkhbnsrnky0mf22szzv8iwfx";
};
nativeBuildInputs = [ cmake ];
@@ -19,8 +19,9 @@ stdenv.mkDerivation rec {
meta = with stdenv.lib; {
description = "OpenStreetMap data to PostgreSQL converter";
- homepage = https://github.com/openstreetmap/osm2pgsql;
+ homepage = "https://github.com/openstreetmap/osm2pgsql";
license = licenses.gpl2;
platforms = platforms.linux;
+ maintainers = with maintainers; [ jglukasik ];
};
}
diff --git a/nixpkgs/pkgs/tools/misc/parallel/default.nix b/nixpkgs/pkgs/tools/misc/parallel/default.nix
index 06ae22c86ff..46ff72a678a 100644
--- a/nixpkgs/pkgs/tools/misc/parallel/default.nix
+++ b/nixpkgs/pkgs/tools/misc/parallel/default.nix
@@ -1,11 +1,11 @@
{ fetchurl, stdenv, perl, makeWrapper, procps }:
stdenv.mkDerivation rec {
- name = "parallel-20190722";
+ name = "parallel-20190922";
src = fetchurl {
url = "mirror://gnu/parallel/${name}.tar.bz2";
- sha256 = "19xwdkmia2dw2hry9sbaq0ln79qy9dsqx11hq2s9dcyvhhqqdl0f";
+ sha256 = "0qrw34rpp8g5knb2nhs8z1hz9i42nxjn6i12m4rblm0anhnfwbr8";
};
nativeBuildInputs = [ makeWrapper ];
diff --git a/nixpkgs/pkgs/tools/misc/patdiff/default.nix b/nixpkgs/pkgs/tools/misc/patdiff/default.nix
index f67a8274443..1c5e5b04474 100644
--- a/nixpkgs/pkgs/tools/misc/patdiff/default.nix
+++ b/nixpkgs/pkgs/tools/misc/patdiff/default.nix
@@ -4,8 +4,8 @@ with ocamlPackages;
janePackage {
pname = "patdiff";
- hash = "02cdn5j5brbp4n2rpxprzxfakjbl7n2llixg7m632bih3ppmfcq1";
- buildInputs = [ core_extended expect_test_helpers patience_diff ocaml_pcre ];
+ hash = "04krzn6rj2r81z55pms5ayk6bxhlxrm006cbhy0m6rc69a0h00lh";
+ buildInputs = [ core_extended expect_test_helpers patience_diff ocaml_pcre shell ];
meta = {
description = "File Diff using the Patience Diff algorithm";
};
diff --git a/nixpkgs/pkgs/tools/misc/pgcenter/default.nix b/nixpkgs/pkgs/tools/misc/pgcenter/default.nix
index 5e0d0aa8089..7cb810b2fe2 100644
--- a/nixpkgs/pkgs/tools/misc/pgcenter/default.nix
+++ b/nixpkgs/pkgs/tools/misc/pgcenter/default.nix
@@ -2,13 +2,13 @@
buildGoModule rec {
pname = "pgcenter";
- version = "0.6.2";
+ version = "0.6.4";
src = fetchFromGitHub {
owner = "lesovsky";
repo = "pgcenter";
rev = "v${version}";
- sha256 = "0mh0s83gkjhrm9ip5r1bb6y5n0nl1rlh99570yv7p3yvyhmh2292";
+ sha256 = "0p8ck4s5jj53nc638darhwbylcsslfmfz72bwy6wxby9iqi9kq6b";
};
modSha256 = "0kassq52v07zmffs6l066g0d3kfv6wmrh9g5cgk79bmyq13clqjj";
diff --git a/nixpkgs/pkgs/tools/misc/phoronix-test-suite/default.nix b/nixpkgs/pkgs/tools/misc/phoronix-test-suite/default.nix
index 6c1bc5fcf04..2dfbd227ac0 100644
--- a/nixpkgs/pkgs/tools/misc/phoronix-test-suite/default.nix
+++ b/nixpkgs/pkgs/tools/misc/phoronix-test-suite/default.nix
@@ -2,11 +2,11 @@
stdenv.mkDerivation rec {
pname = "phoronix-test-suite";
- version = "8.8.1";
+ version = "9.0.0";
src = fetchurl {
url = "https://phoronix-test-suite.com/releases/${pname}-${version}.tar.gz";
- sha256 = "1l5wnj5d652dg02j7iy7n9ab7qrpclmgvyxnh1s6cdnnnspyxznn";
+ sha256 = "1gfmkwfzgpbmhv2wdr5aiknv1jyazx7sb33nna34pnd3bkmak0bq";
};
buildInputs = [ php ];
diff --git a/nixpkgs/pkgs/tools/misc/plantuml/default.nix b/nixpkgs/pkgs/tools/misc/plantuml/default.nix
index eb2881b29f7..2ff042d8cbb 100644
--- a/nixpkgs/pkgs/tools/misc/plantuml/default.nix
+++ b/nixpkgs/pkgs/tools/misc/plantuml/default.nix
@@ -1,12 +1,12 @@
{ stdenv, fetchurl, makeWrapper, jre, graphviz }:
stdenv.mkDerivation rec {
- version = "1.2019.8";
+ version = "1.2019.11";
pname = "plantuml";
src = fetchurl {
url = "mirror://sourceforge/project/plantuml/${version}/plantuml.${version}.jar";
- sha256 = "0kbyjsy8zp3325syg9g91rfgy2dzkffdj2ji82b5h9zy3rkrz08p";
+ sha256 = "0k9l4d3rf5g5vwx6kd170ija872j3fafkn50fkd3ddzjqdd0v9lm";
};
nativeBuildInputs = [ makeWrapper ];
diff --git a/nixpkgs/pkgs/tools/misc/profile-sync-daemon/default.nix b/nixpkgs/pkgs/tools/misc/profile-sync-daemon/default.nix
index 989a2d3f22b..c1496e0dbc9 100644
--- a/nixpkgs/pkgs/tools/misc/profile-sync-daemon/default.nix
+++ b/nixpkgs/pkgs/tools/misc/profile-sync-daemon/default.nix
@@ -1,12 +1,12 @@
{ stdenv, fetchurl, utillinux}:
stdenv.mkDerivation rec {
- version = "6.34";
+ version = "6.35";
pname = "profile-sync-daemon";
src = fetchurl {
url = "https://github.com/graysky2/profile-sync-daemon/archive/v${version}.tar.gz";
- sha256 = "0v6yzgfwv3mhf1q2fp6abrvr15p9b1c1gahj3mdh5b4bfcsg3n5a";
+ sha256 = "0hd3cjhf9nv4q5gvc8lbh5c82095lll7mxll1mj5hkzmnijzsf0v";
};
installPhase = ''
diff --git a/nixpkgs/pkgs/tools/misc/pspg/default.nix b/nixpkgs/pkgs/tools/misc/pspg/default.nix
index 81d7591b740..099c5598958 100644
--- a/nixpkgs/pkgs/tools/misc/pspg/default.nix
+++ b/nixpkgs/pkgs/tools/misc/pspg/default.nix
@@ -2,13 +2,13 @@
stdenv.mkDerivation rec {
pname = "pspg";
- version = "1.6.8";
+ version = "2.0.4";
src = fetchFromGitHub {
owner = "okbob";
repo = "pspg";
rev = version;
- sha256 = "1lwzyimn28a7q8k2c8z7and4qhrdil0za8lixh96z6x4lcb0rz5q";
+ sha256 = "1xiyshz56qpx3bv0mzx73rqr7wmyamyj8jbqdv05wjb72npkjmzl";
};
nativeBuildInputs = [ pkgconfig ];
diff --git a/nixpkgs/pkgs/tools/misc/rmlint/default.nix b/nixpkgs/pkgs/tools/misc/rmlint/default.nix
index 7b7fa9ce705..408660bf3d9 100644
--- a/nixpkgs/pkgs/tools/misc/rmlint/default.nix
+++ b/nixpkgs/pkgs/tools/misc/rmlint/default.nix
@@ -5,13 +5,13 @@
with stdenv.lib;
stdenv.mkDerivation rec {
pname = "rmlint";
- version = "2.8.0";
+ version = "2.9.0";
src = fetchFromGitHub {
owner = "sahib";
repo = "rmlint";
rev = "v${version}";
- sha256 = "1gc7gbnh0qg1kl151cv1ld87vhpm1v3pnkn7prhscdcc21jrg8nz";
+ sha256 = "1b5cziam14h80xrfb285fmfrzz2rligxcpsq1xsig14xf4l2875i";
};
CFLAGS="-I${stdenv.lib.getDev utillinux}/include";
diff --git a/nixpkgs/pkgs/tools/misc/screen/default.nix b/nixpkgs/pkgs/tools/misc/screen/default.nix
index beeeb84aac9..bb02c286c4d 100644
--- a/nixpkgs/pkgs/tools/misc/screen/default.nix
+++ b/nixpkgs/pkgs/tools/misc/screen/default.nix
@@ -2,11 +2,11 @@
stdenv.mkDerivation rec {
pname = "screen";
- version = "4.6.2";
+ version = "4.7.0";
src = fetchurl {
url = "mirror://gnu/screen/${pname}-${version}.tar.gz";
- sha256 = "0fps0fsipfbh7c2cnp7rjw9n79j0ysq21mk8hzifa33a1r924s8v";
+ sha256 = "1h90bpy2wk304xw367y1zwz0kilrpm6h28nphykx4fvqz8l56xys";
};
configureFlags= [
diff --git a/nixpkgs/pkgs/tools/misc/shadowenv/default.nix b/nixpkgs/pkgs/tools/misc/shadowenv/default.nix
new file mode 100644
index 00000000000..6638a50931d
--- /dev/null
+++ b/nixpkgs/pkgs/tools/misc/shadowenv/default.nix
@@ -0,0 +1,24 @@
+{ stdenv, fetchFromGitHub, rustPlatform, Security }:
+
+rustPlatform.buildRustPackage rec {
+ pname = "shadowenv";
+ version = "1.2.1";
+
+ src = fetchFromGitHub {
+ owner = "Shopify";
+ repo = pname;
+ rev = version;
+ sha256 = "01hhh45h742z9mjcpmyjpbjf90a5b1m58b6nml2han149xpn5b74";
+ };
+
+ cargoSha256 = "0r8s20xgcp5d1ac07g5g4lrrnhrn2qsr1kgj13h2csly22j0ca2a";
+
+ buildInputs = stdenv.lib.optionals stdenv.isDarwin [ Security ];
+
+ meta = with stdenv.lib; {
+ homepage = "https://shopify.github.io/shadowenv/";
+ description = "reversible directory-local environment variable manipulations";
+ license = licenses.mit;
+ maintainers = [ maintainers.marsam ];
+ };
+}
diff --git a/nixpkgs/pkgs/tools/misc/skim/default.nix b/nixpkgs/pkgs/tools/misc/skim/default.nix
index 5072bfb6934..55e6e5424d7 100644
--- a/nixpkgs/pkgs/tools/misc/skim/default.nix
+++ b/nixpkgs/pkgs/tools/misc/skim/default.nix
@@ -2,18 +2,18 @@
rustPlatform.buildRustPackage rec {
pname = "skim";
- version = "0.6.8";
+ version = "0.6.9";
src = fetchFromGitHub {
owner = "lotabout";
repo = pname;
rev = "v${version}";
- sha256 = "00sx1pyj0a9hkv9b8g3iykkw303vnqziddp2600nvfr8x8pd01gi";
+ sha256 = "1ygnjrljar4caybh8lqfjif4vhb33aam80ffnzgqxz6s6g85ifrb";
};
outputs = [ "out" "vim" ];
- cargoSha256 = "1kqawnyddv4pjyiaizw3ydqk6hl4ng6xfw9ixy58rb1vk591kq8w";
+ cargoSha256 = "1vcxcyhhqncjii0pad775x10j1kp62y82q1mii65jclr1karml3p";
patchPhase = ''
sed -i -e "s|expand('<sfile>:h:h')|'$out'|" plugin/skim.vim
diff --git a/nixpkgs/pkgs/tools/misc/starship/default.nix b/nixpkgs/pkgs/tools/misc/starship/default.nix
index 8685bf7139e..8335c04c3d2 100644
--- a/nixpkgs/pkgs/tools/misc/starship/default.nix
+++ b/nixpkgs/pkgs/tools/misc/starship/default.nix
@@ -1,26 +1,26 @@
-{ stdenv, fetchFromGitHub, rustPlatform, pkgconfig, libiconv, darwin }:
+{ stdenv, fetchFromGitHub, rustPlatform, libiconv, darwin }:
rustPlatform.buildRustPackage rec {
pname = "starship";
- version = "0.18.0";
+ version = "0.21.0";
src = fetchFromGitHub {
owner = "starship";
repo = "starship";
rev = "v${version}";
- sha256 = "1xin821lgrdxb50i9p9ya3yfi64l4byf9il4jiijgsjckinxyflj";
+ sha256 = "07f502xrh8pkh02xkb79g64qcwxdlipypwn6x35zq8hdrw07xhw3";
};
buildInputs = stdenv.lib.optionals stdenv.isDarwin [ libiconv darwin.apple_sdk.frameworks.Security ];
- cargoSha256 = "12yswvhgcmqz0nyarva27pjc4xqqqn3m31y04r3l7ldbzgikn8k6";
+ cargoSha256 = "0c82k6aw245vsqkcrg6bhqhylfbxdszcr040mrz7cz9ydxcb58b9";
checkPhase = "cargo test -- --skip directory::home_directory --skip directory::directory_in_root";
meta = with stdenv.lib; {
description = "A minimal, blazing fast, and extremely customizable prompt for any shell";
homepage = "https://starship.rs";
license = licenses.isc;
- maintainers = with maintainers; [ bbigras ];
+ maintainers = with maintainers; [ bbigras davidtwco ];
platforms = platforms.all;
};
}
diff --git a/nixpkgs/pkgs/tools/misc/svtplay-dl/default.nix b/nixpkgs/pkgs/tools/misc/svtplay-dl/default.nix
index b530193258c..b516a6c268d 100644
--- a/nixpkgs/pkgs/tools/misc/svtplay-dl/default.nix
+++ b/nixpkgs/pkgs/tools/misc/svtplay-dl/default.nix
@@ -44,5 +44,6 @@ in stdenv.mkDerivation rec {
license = licenses.mit;
platforms = stdenv.lib.platforms.linux;
maintainers = [ maintainers.rycee ];
+ broken = true;
};
}
diff --git a/nixpkgs/pkgs/tools/misc/ultrastar-creator/default.nix b/nixpkgs/pkgs/tools/misc/ultrastar-creator/default.nix
index d70fded5e3e..dd9742293ac 100644
--- a/nixpkgs/pkgs/tools/misc/ultrastar-creator/default.nix
+++ b/nixpkgs/pkgs/tools/misc/ultrastar-creator/default.nix
@@ -1,4 +1,4 @@
-{ stdenv, fetchFromGitHub
+{ lib, mkDerivation, fetchFromGitHub
, qmake, qtbase, pkgconfig, taglib, libbass, libbass_fx }:
# TODO: get rid of (unfree) libbass
@@ -6,7 +6,7 @@
# there’s a WIP branch here:
# https://github.com/UltraStar-Deluxe/UltraStar-Creator/commits/BASS_removed
-stdenv.mkDerivation {
+mkDerivation {
pname = "ultrastar-creator";
version = "2019-04-23";
@@ -17,7 +17,7 @@ stdenv.mkDerivation {
sha256 = "1rzz04l7s7pxj74xam0cxlq569lfpgig35kpbsplq531d4007pc9";
};
- postPatch = with stdenv.lib; ''
+ postPatch = with lib; ''
# we don’t want prebuild binaries checked into version control!
rm -rf lib include
sed -e "s|DESTDIR =.*$|DESTDIR = $out/bin|" \
@@ -36,7 +36,7 @@ stdenv.mkDerivation {
nativeBuildInputs = [ qmake pkgconfig ];
buildInputs = [ qtbase taglib libbass libbass_fx ];
- meta = with stdenv.lib; {
+ meta = with lib; {
description = "Ultrastar karaoke song creation tool";
homepage = https://github.com/UltraStar-Deluxe/UltraStar-Creator;
license = licenses.gpl2;
diff --git a/nixpkgs/pkgs/tools/misc/ultrastar-manager/default.nix b/nixpkgs/pkgs/tools/misc/ultrastar-manager/default.nix
index 0a3bb19d14b..19d126d98f6 100644
--- a/nixpkgs/pkgs/tools/misc/ultrastar-manager/default.nix
+++ b/nixpkgs/pkgs/tools/misc/ultrastar-manager/default.nix
@@ -1,4 +1,4 @@
-{ stdenv, fetchFromGitHub, pkgconfig, symlinkJoin, qmake, diffPlugins
+{ lib, mkDerivation, fetchFromGitHub, pkgconfig, symlinkJoin, qmake, diffPlugins
, qtbase, qtmultimedia, taglib, libmediainfo, libzen, libbass }:
let
@@ -24,12 +24,12 @@ let
repo = "UltraStar-Manager";
inherit rev sha256;
};
- in stdenv.mkDerivation {
+ in mkDerivation {
name = "${src.name}-patched";
inherit src;
phases = [ "unpackPhase" "patchPhase" ];
- patchPhase = with stdenv.lib; ''
+ patchPhase = with lib; ''
# we don’t want prebuild binaries checked into version control!
rm -rf lib include
@@ -55,7 +55,7 @@ let
sed -e "s|QCore.*applicationDirPath()|QString(\"${path}\")|" -i "${file}"
'';
- buildPlugin = name: stdenv.mkDerivation {
+ buildPlugin = name: mkDerivation {
name = "ultrastar-manager-${name}-plugin-${version}";
src = patchedSrc;
@@ -82,7 +82,7 @@ let
paths = map buildPlugin plugins;
};
-in stdenv.mkDerivation {
+in mkDerivation {
pname = "ultrastar-manager";
inherit version;
src = patchedSrc;
@@ -112,7 +112,7 @@ in stdenv.mkDerivation {
nativeBuildInputs = [ pkgconfig ];
inherit buildInputs;
- meta = with stdenv.lib; {
+ meta = with lib; {
description = "Ultrastar karaoke song manager";
homepage = https://github.com/UltraStar-Deluxe/UltraStar-Manager;
license = licenses.gpl2;
diff --git a/nixpkgs/pkgs/tools/misc/wacomtablet/default.nix b/nixpkgs/pkgs/tools/misc/wacomtablet/default.nix
new file mode 100644
index 00000000000..d0fbcecf027
--- /dev/null
+++ b/nixpkgs/pkgs/tools/misc/wacomtablet/default.nix
@@ -0,0 +1,30 @@
+{ lib, mkDerivation, fetchurl, extra-cmake-modules, qtx11extras,
+ plasma-workspace, libwacom, xf86_input_wacom
+}:
+
+mkDerivation rec {
+ pname = "wacomtablet";
+ version = "3.2.0";
+ src = fetchurl {
+ url = "mirror://kde/stable/${pname}/${version}/${pname}-${version}.tar.xz";
+ sha256 = "197pwpl87gqlnza36bp68jvw8ww25znk08acmi8bpz7n84xfc368";
+ };
+
+ nativeBuildInputs = [ extra-cmake-modules ];
+ buildInputs = [
+ qtx11extras plasma-workspace
+ libwacom xf86_input_wacom
+ ];
+
+ meta = {
+ description = "KDE Configuration Module for Wacom Graphics Tablets";
+ longDescription = ''
+ This module implements a GUI for the Wacom Linux Drivers and extends it
+ with profile support to handle different button / pen layouts per profile.
+ '';
+ homepage = https://cgit.kde.org/wacomtablet.git/about/;
+ license = lib.licenses.gpl2;
+ maintainers = [ lib.maintainers.Thra11 ];
+ platforms = lib.platforms.linux;
+ };
+}
diff --git a/nixpkgs/pkgs/tools/misc/wl-clipboard/default.nix b/nixpkgs/pkgs/tools/misc/wl-clipboard/default.nix
index de3a19c3f51..349d910dafc 100644
--- a/nixpkgs/pkgs/tools/misc/wl-clipboard/default.nix
+++ b/nixpkgs/pkgs/tools/misc/wl-clipboard/default.nix
@@ -3,13 +3,13 @@
stdenv.mkDerivation rec {
pname = "wl-clipboard";
- version = "1.0.0";
+ version = "2.0.0";
src = fetchFromGitHub {
owner = "bugaevc";
repo = "wl-clipboard";
rev = "v${version}";
- sha256 = "03h6ajcc30w6928bkd4h6xfj4iy2359ww6hdlybq8mr1zwmb2h0q";
+ sha256 = "0c4w87ipsw09aii34szj9p0xfy0m00wyjpll0gb0aqmwa60p0c5d";
};
nativeBuildInputs = [ meson ninja pkgconfig wayland-protocols ];
diff --git a/nixpkgs/pkgs/tools/misc/wlr-randr/default.nix b/nixpkgs/pkgs/tools/misc/wlr-randr/default.nix
new file mode 100644
index 00000000000..c9f43964696
--- /dev/null
+++ b/nixpkgs/pkgs/tools/misc/wlr-randr/default.nix
@@ -0,0 +1,23 @@
+{ stdenv, fetchFromGitHub, meson, ninja, cmake, pkgconfig, wayland }:
+
+stdenv.mkDerivation rec {
+ pname = "wlr-randr";
+ version = "unstable-2019-03-21";
+
+ src = fetchFromGitHub {
+ owner = "emersion";
+ repo = pname;
+ rev = "c4066aa3249963dc7877119cffce10f3fa8b6304";
+ sha256 = "1ahw4sv07xg5rh9vr7j28636iaxs06vnybm3li6y8dz2sky7hk88";
+ };
+
+ nativeBuildInputs = [ meson ninja cmake pkgconfig ];
+ buildInputs = [ wayland ];
+
+ meta = with stdenv.lib; {
+ license = licenses.mit;
+ description = "An xrandr clone for wlroots compositors";
+ homepage = "https://github.com/emersion/wlr-randr";
+ maintainers = with maintainers; [ ma27 ];
+ };
+}
diff --git a/nixpkgs/pkgs/tools/misc/woeusb/default.nix b/nixpkgs/pkgs/tools/misc/woeusb/default.nix
index f25034dd8cd..cc53b26e238 100644
--- a/nixpkgs/pkgs/tools/misc/woeusb/default.nix
+++ b/nixpkgs/pkgs/tools/misc/woeusb/default.nix
@@ -13,6 +13,8 @@ stdenv.mkDerivation rec {
sha256 = "1w3m3qbjn0igydsbpf22w29lzf1pkxv7dlny5mbyrb6j0q6wlx0b";
};
+ patches = [ ./remove-workaround.patch ];
+
nativeBuildInputs = [ autoreconfHook makeWrapper ];
buildInputs = [ wxGTK30 ];
diff --git a/nixpkgs/pkgs/tools/misc/woeusb/remove-workaround.patch b/nixpkgs/pkgs/tools/misc/woeusb/remove-workaround.patch
new file mode 100644
index 00000000000..094da2cb2bc
--- /dev/null
+++ b/nixpkgs/pkgs/tools/misc/woeusb/remove-workaround.patch
@@ -0,0 +1,82 @@
+From 3cf93fd595bd3fca98c98a0bdc8fc86b36ee1403 Mon Sep 17 00:00:00 2001
+From: Michael Hoang <enzime@users.noreply.github.com>
+Date: Wed, 9 Oct 2019 12:42:53 +1100
+Subject: [PATCH] Remove writeback buffering workaround
+
+---
+ src/woeusb | 45 ---------------------------------------------
+ 1 file changed, 45 deletions(-)
+
+diff --git a/src/woeusb b/src/woeusb
+index 3284259..0d3ea20 100755
+--- a/src/woeusb
++++ b/src/woeusb
+@@ -308,9 +308,6 @@ init(){
+
+ current_state=copying-filesystem
+
+- workaround_linux_make_writeback_buffering_not_suck \
+- apply
+-
+ copy_filesystem_files \
+ "${source_fs_mountpoint}" \
+ "${target_fs_mountpoint}" \
+@@ -1650,41 +1647,6 @@ workaround_support_windows_7_uefi_boot(){
+ > "${efi_boot_directory}/bootx64.efi"
+ }; declare -fr workaround_support_windows_7_uefi_boot
+
+-## Currently WoeUSB indirectly causes severely unresponsive system on 64-bit architecture with large primary memory during file copy process due to a flaw of the writeback buffer size handling in Linux kernel, workaround it before it is fixed
+-## Refer:
+-## - System lagging while copying data · Issue #113 · slacka/WoeUSB <https://github.com/slacka/WoeUSB/issues/113>
+-## - The pernicious USB-stick stall problem [LWN.net] <https://lwn.net/Articles/572911/>
+-workaround_linux_make_writeback_buffering_not_suck(){
+- util_check_function_parameters_quantity 1 "${#}"
+- local -r mode="${1}"
+-
+- local -ir VM_DIRTY_BACKGROUND_BYTES=$((16*1024*1024)) # 16MiB
+- local -ir VM_DIRTY_BYTES=$((48*1024*1024)) # 48MiB
+-
+- case "${mode}" in
+- apply)
+- echo_with_color \
+- yellow \
+- 'Applying workaround to prevent 64-bit systems with big primary memory from being unresponsive during copying files.'
+- echo "${VM_DIRTY_BACKGROUND_BYTES}" > /proc/sys/vm/dirty_background_bytes
+- echo "${VM_DIRTY_BYTES}" > /proc/sys/vm/dirty_bytes
+- ;;
+- reset)
+- echo_with_color \
+- yellow \
+- 'Resetting workaround to prevent 64-bit systems with big primary memory from being unresponsive during copying files.'
+- echo 0 > /proc/sys/vm/dirty_background_bytes
+- echo 0 > /proc/sys/vm/dirty_bytes
+- ;;
+- *)
+- printf_with_color \
+- red \
+- 'Fatal: %s: Unexpected *mode* encountered, please report bug.\n' \
+- "${FUNCNAME[0]}"
+- ;;
+- esac
+-}; declare -fr workaround_linux_make_writeback_buffering_not_suck
+-
+ install_legacy_pc_bootloader_grub(){
+ util_check_function_parameters_quantity 3 "${#}"
+ local -r target_fs_mountpoint="${1}"; shift 1
+@@ -1836,13 +1798,6 @@ trap_exit(){
+ off \
+ "${global_only_for_gui}"
+
+- case "${current_state}" in
+- copying-filesystem|finished)
+- workaround_linux_make_writeback_buffering_not_suck \
+- reset
+- ;;
+- esac
+-
+ if util_is_parameter_set_and_not_empty \
+ source_fs_mountpoint; then
+ if ! cleanup_mountpoint \
+--
+2.23.0
+
diff --git a/nixpkgs/pkgs/tools/misc/xprite-editor/default.nix b/nixpkgs/pkgs/tools/misc/xprite-editor/default.nix
new file mode 100644
index 00000000000..e2615bef6ce
--- /dev/null
+++ b/nixpkgs/pkgs/tools/misc/xprite-editor/default.nix
@@ -0,0 +1,43 @@
+{ stdenv
+, fetchFromGitHub
+, rustPlatform
+, gtk3
+, AppKit
+, pkg-config
+, python3
+}:
+
+rustPlatform.buildRustPackage rec {
+ pname = "xprite-editor-unstable";
+ version = "2019-09-22";
+
+ src = fetchFromGitHub {
+ owner = "rickyhan";
+ repo = "xprite-editor";
+ rev = "7f899dff982642927024540e4bafd74e4ea5e52a";
+ sha256 = "1k6k8y8gg1vdmyjz27q689q9rliw0rrnzwlpjcd4vlc6swaq9ahx";
+ fetchSubmodules = true;
+ # Rename unicode file name which leads to different checksums on HFS+
+ # vs. other filesystems because of unicode normalization.
+ postFetch = ''
+ mv $out/config/palettes/Sweet\ Guaran*.hex $out/config/palettes/Sweet\ Guarana.hex
+ '';
+ };
+
+ buildInputs = stdenv.lib.optionals stdenv.isLinux [ gtk3 ]
+ ++ stdenv.lib.optionals stdenv.isDarwin [ AppKit ];
+
+ nativeBuildInputs = stdenv.lib.optionals stdenv.isLinux [ pkg-config python3 ];
+
+ cargoSha256 = "0cd58888l7pjmghin31ha780yhs2pz67b10jysyasdw0a88m0dwy";
+
+ cargoBuildFlags = [ "--bin" "xprite-native" ];
+
+ meta = with stdenv.lib; {
+ homepage = "https://github.com/rickyhan/xprite-editor";
+ description = "Pixel art editor";
+ license = licenses.gpl3;
+ maintainers = [ maintainers.marsam ];
+ platforms = platforms.linux ++ platforms.darwin;
+ };
+}
diff --git a/nixpkgs/pkgs/tools/misc/you-get/default.nix b/nixpkgs/pkgs/tools/misc/you-get/default.nix
index a900e26019c..81d98ff7ab3 100644
--- a/nixpkgs/pkgs/tools/misc/you-get/default.nix
+++ b/nixpkgs/pkgs/tools/misc/you-get/default.nix
@@ -2,7 +2,7 @@
buildPythonApplication rec {
pname = "you-get";
- version = "0.4.1328";
+ version = "0.4.1347";
# Tests aren't packaged, but they all hit the real network so
# probably aren't suitable for a build environment anyway.
@@ -10,7 +10,7 @@ buildPythonApplication rec {
src = fetchPypi {
inherit pname version;
- sha256 = "1rbsf7dphvlzahrzgdj1bq62mqhp2fmr61lckcyzq6jdq3vsf0w8";
+ sha256 = "11wqk0q2nim7mmi247sflk4sq4yac3f4s71a6kldhbb94l4p8q26";
};
meta = with stdenv.lib; {
diff --git a/nixpkgs/pkgs/tools/misc/youtube-dl/default.nix b/nixpkgs/pkgs/tools/misc/youtube-dl/default.nix
index 98449f8f554..9ef2156af8f 100644
--- a/nixpkgs/pkgs/tools/misc/youtube-dl/default.nix
+++ b/nixpkgs/pkgs/tools/misc/youtube-dl/default.nix
@@ -18,11 +18,11 @@ buildPythonPackage rec {
# The websites youtube-dl deals with are a very moving target. That means that
# downloads break constantly. Because of that, updates should always be backported
# to the latest stable release.
- version = "2019.09.12.1";
+ version = "2019.09.28";
src = fetchurl {
url = "https://yt-dl.org/downloads/${version}/${pname}-${version}.tar.gz";
- sha256 = "0h7v81kcxcpy82wq9b1aiz2zg6hg7rnlcfmzd13j6k8yhr7ah9yf";
+ sha256 = "0nrk0bk6lksnmng8lwhcpkc57iibzjjamlqz8rxjpsw6dnzxz82h";
};
nativeBuildInputs = [ makeWrapper ];
diff --git a/nixpkgs/pkgs/tools/misc/z-lua/default.nix b/nixpkgs/pkgs/tools/misc/z-lua/default.nix
index adce403f35d..9c637d3ae80 100644
--- a/nixpkgs/pkgs/tools/misc/z-lua/default.nix
+++ b/nixpkgs/pkgs/tools/misc/z-lua/default.nix
@@ -1,4 +1,4 @@
-{ stdenv, fetchFromGitHub, lua }:
+{ stdenv, fetchFromGitHub, lua52Packages, makeWrapper }:
stdenv.mkDerivation rec {
pname = "z-lua";
@@ -13,10 +13,17 @@ stdenv.mkDerivation rec {
dontBuild = true;
- buildInputs = [ (lua.withPackages (p: with p; [ luafilesystem ])) ];
+ nativeBuildInputs = [ makeWrapper ];
+
+ buildInputs = [ lua52Packages.lua ];
installPhase = ''
+ runHook preInstall
+
install -Dm755 z.lua $out/bin/z
+ wrapProgram $out/bin/z --set LUA_CPATH "${lua52Packages.luafilesystem}/lib/lua/5.2/lfs.so" --set _ZL_USE_LFS 1;
+
+ runHook postInstall
'';
meta = with stdenv.lib; {
diff --git a/nixpkgs/pkgs/tools/networking/atinout/default.nix b/nixpkgs/pkgs/tools/networking/atinout/default.nix
new file mode 100644
index 00000000000..175ba3960ee
--- /dev/null
+++ b/nixpkgs/pkgs/tools/networking/atinout/default.nix
@@ -0,0 +1,28 @@
+{ stdenv, fetchgit, ronn, mount }:
+
+stdenv.mkDerivation rec {
+ name = "atinout-${version}";
+ version = "0.9.2-alpha";
+
+ NIX_CFLAGS_COMPILE = [ "-Werror=implicit-fallthrough=0" ];
+ LANG = "C.UTF-8";
+ nativeBuildInputs = [ ronn mount ];
+
+ src = fetchgit {
+ url = "git://git.code.sf.net/p/atinout/code";
+ rev = "4976a6cb5237373b7e23cd02d7cd5517f306e3f6";
+ sha256 = "0bninv2bklz7ly140cxx8iyaqjlq809jjx6xqpimn34ghwsaxbpv";
+ };
+
+ installPhase = ''
+ make PREFIX=$out install
+ '';
+
+ meta = with stdenv.lib; {
+ homepage = http://atinout.sourceforge.net;
+ description = "Tool for talking to modems";
+ platforms = platforms.unix;
+ license = licenses.gpl3;
+ maintainers = with maintainers; [ bendlas ];
+ };
+}
diff --git a/nixpkgs/pkgs/tools/networking/axel/default.nix b/nixpkgs/pkgs/tools/networking/axel/default.nix
index afa6cef1524..1fa43e5849e 100644
--- a/nixpkgs/pkgs/tools/networking/axel/default.nix
+++ b/nixpkgs/pkgs/tools/networking/axel/default.nix
@@ -3,13 +3,13 @@
stdenv.mkDerivation rec {
pname = "axel";
- version = "2.17.5";
+ version = "2.17.6";
src = fetchFromGitHub {
owner = "axel-download-accelerator";
repo = pname;
rev = "v${version}";
- sha256 = "0kwfbwh9g2227icgykgwa057vll5rkgac3df0pby530bivqzzzlw";
+ sha256 = "011cpkf6hpia5b5wfhy84fxfqpishdkvrg0kpbfprymq9bxjp0yl";
};
nativeBuildInputs = [ autoreconfHook pkgconfig autoconf-archive txt2man ];
diff --git a/nixpkgs/pkgs/tools/networking/babeld/default.nix b/nixpkgs/pkgs/tools/networking/babeld/default.nix
index e593bccbd1d..2ff127f3e68 100644
--- a/nixpkgs/pkgs/tools/networking/babeld/default.nix
+++ b/nixpkgs/pkgs/tools/networking/babeld/default.nix
@@ -1,17 +1,20 @@
-{ stdenv, fetchurl }:
+{ stdenv, fetchurl, nixosTests }:
stdenv.mkDerivation rec {
- name = "babeld-1.9.0";
+ pname = "babeld";
+ version = "1.9.1";
src = fetchurl {
- url = "http://www.pps.univ-paris-diderot.fr/~jch/software/files/${name}.tar.gz";
- sha256 = "0g7nhvd0hhb3jxdzpbqdxnb68375vm6apj2wslkxb70ip6rkk2hj";
+ url = "http://www.pps.univ-paris-diderot.fr/~jch/software/files/${pname}-${version}.tar.gz";
+ sha256 = "1d503igqv9s5pgrhvxp1czjy2xfsjhagyyh2iny7g4cjvl0kq6qy";
};
preBuild = ''
makeFlags="PREFIX=$out ETCDIR=$out/etc"
'';
+ passthru.tests.babeld = nixosTests.babeld;
+
meta = {
homepage = http://www.pps.univ-paris-diderot.fr/~jch/software/babel/;
description = "Loop-avoiding distance-vector routing protocol";
diff --git a/nixpkgs/pkgs/tools/networking/boringtun/default.nix b/nixpkgs/pkgs/tools/networking/boringtun/default.nix
index 05e9ba1282e..dfb13f2168b 100644
--- a/nixpkgs/pkgs/tools/networking/boringtun/default.nix
+++ b/nixpkgs/pkgs/tools/networking/boringtun/default.nix
@@ -2,25 +2,17 @@
rustPlatform.buildRustPackage rec {
pname = "boringtun";
- # "boringtun" is still undergoing review for security concerns.
- # The GitHub page does not show any release yet,
- # use 20190407 as version number to indicate that it is an unstable version.
- version = "20190407";
+ version = "0.2.0";
src = fetchFromGitHub {
owner = "cloudflare";
repo = pname;
- rev = "b040eb4fd1591b1d5ceb07c6cbb0856553f50adc";
- sha256 = "04i53dvxld2a0xzr0gfl895rcwfvisj1rfs7rl0444gml8s8xyb3";
+ rev = "v${version}";
+ sha256 = "1mijy51hd8c4as9g4ivpfxismc9m5m3nhibfvclh3wrlcmp1ha9c";
};
cargoSha256 = "1gvmshwg9b486933vfgkg2r8nn6w6dyz42hqjy74p785fcg0v5hs";
- # To prevent configuration phase error that is caused by
- # lacking a new line in file ".cargo/config",
- # we append a new line to the end of file.
- preConfigure = "echo '' >> .cargo/config";
-
buildInputs = stdenv.lib.optional stdenv.isDarwin darwin.apple_sdk.frameworks.Security;
# Testing this project requires sudo, Docker and network access, etc.
@@ -30,7 +22,7 @@ rustPlatform.buildRustPackage rec {
description = "Userspace WireGuard® implementation in Rust";
homepage = https://github.com/cloudflare/boringtun;
license = licenses.bsd3;
- maintainers = with maintainers; [ xrelkd ];
+ maintainers = with maintainers; [ xrelkd marsam ];
platforms = platforms.linux ++ platforms.darwin;
};
}
diff --git a/nixpkgs/pkgs/tools/networking/cjdns/default.nix b/nixpkgs/pkgs/tools/networking/cjdns/default.nix
index 82fbfac842a..f9dc3de7735 100644
--- a/nixpkgs/pkgs/tools/networking/cjdns/default.nix
+++ b/nixpkgs/pkgs/tools/networking/cjdns/default.nix
@@ -1,6 +1,6 @@
{ stdenv, fetchFromGitHub, nodejs, which, python27, utillinux }:
-let version = "20.3"; in
+let version = "20.4"; in
stdenv.mkDerivation {
name = "cjdns-"+version;
@@ -8,7 +8,7 @@ stdenv.mkDerivation {
owner = "cjdelisle";
repo = "cjdns";
rev = "cjdns-v${version}";
- sha256 = "02cxrjmpi7pyf0qfvhkqg3y5rq7vlnib55n2hhxnyhzznxhgrsgy";
+ sha256 = "1d8li7vws1dmdgs96dmy4vh55gqy2ir4dnkrvgkv3fjq9pffr7vx";
};
buildInputs = [ which python27 nodejs ] ++
diff --git a/nixpkgs/pkgs/tools/networking/croc/default.nix b/nixpkgs/pkgs/tools/networking/croc/default.nix
index 5ed2d5a1cb1..db3c24398f7 100644
--- a/nixpkgs/pkgs/tools/networking/croc/default.nix
+++ b/nixpkgs/pkgs/tools/networking/croc/default.nix
@@ -2,7 +2,7 @@
buildGoModule rec {
pname = "croc";
- version = "6.1.3";
+ version = "6.1.4";
goPackagePath = "github.com/schollz/croc";
@@ -10,10 +10,10 @@ buildGoModule rec {
owner = "schollz";
repo = pname;
rev = "v${version}";
- sha256 = "1qc655y1vvz0bk4rk78fl33s3dqz196zn08aczrb4ipbbj7hp8x8";
+ sha256 = "1qqmyqkzg8gcib6zzva9zqlv22zpg4lwc3dqi6yyaynmdgy9pk1m";
};
- modSha256 = "00bnf4dc3i41s9wjpbc59nn7jwlhvp2zhdrjhjn5fwbc95pm4gm0";
+ modSha256 = "17vpfq3bsciq3vx5s2r3sv76aqsij3vvckqnk2w2sp346by5vavf";
subPackages = [ "." ];
meta = with stdenv.lib; {
diff --git a/nixpkgs/pkgs/tools/networking/davix/default.nix b/nixpkgs/pkgs/tools/networking/davix/default.nix
index ff4d0d64c20..9faad377520 100644
--- a/nixpkgs/pkgs/tools/networking/davix/default.nix
+++ b/nixpkgs/pkgs/tools/networking/davix/default.nix
@@ -1,17 +1,17 @@
{ stdenv, fetchurl, cmake, pkgconfig, openssl, libxml2, boost, python3, libuuid }:
stdenv.mkDerivation rec {
- version = "0.7.4";
+ version = "0.7.5";
pname = "davix";
nativeBuildInputs = [ cmake pkgconfig python3 ];
buildInputs = [ openssl libxml2 boost libuuid ];
- # using the url below since the 0.7.4 release did carry a broken CMake file,
+ # using the url below since the 0.7.5 release did carry a broken CMake file,
# supposedly fixed in the next release
# https://github.com/cern-fts/davix/issues/40
src = fetchurl {
url = "http://grid-deployment.web.cern.ch/grid-deployment/dms/lcgutil/tar/davix/${version}/davix-${version}.tar.gz";
- sha256 = "1k407ckvsw1w212k3lp2867i0sscnrbigsx79l1sp5ymj3n62aih";
+ sha256 = "1j3gzsjhzrsk6irxalc3rwgp9cqb52chriadmy1mv1s6d2bwl86r";
};
diff --git a/nixpkgs/pkgs/tools/networking/eggdrop/default.nix b/nixpkgs/pkgs/tools/networking/eggdrop/default.nix
index c490464c31a..5b85a680efd 100644
--- a/nixpkgs/pkgs/tools/networking/eggdrop/default.nix
+++ b/nixpkgs/pkgs/tools/networking/eggdrop/default.nix
@@ -32,5 +32,7 @@ stdenv.mkDerivation {
meta = with stdenv.lib; {
license = licenses.gpl2;
platforms = platforms.unix;
+ homepage = http://www.eggheads.org;
+ description = "An Internet Relay Chat (IRC) bot";
};
}
diff --git a/nixpkgs/pkgs/tools/networking/getmail/default.nix b/nixpkgs/pkgs/tools/networking/getmail/default.nix
index 6181093a193..f107e410678 100644
--- a/nixpkgs/pkgs/tools/networking/getmail/default.nix
+++ b/nixpkgs/pkgs/tools/networking/getmail/default.nix
@@ -2,11 +2,11 @@
python2Packages.buildPythonApplication rec {
pname = "getmail";
- version = "5.13";
+ version = "5.14";
src = fetchurl {
url = "http://pyropus.ca/software/getmail/old-versions/${pname}-${version}.tar.gz";
- sha256 = "178a1c37z1aia5m2mbq9gyv6hylnxg9g3lp3njcrz7phfmj2zm84";
+ sha256 = "1hcrd9h4g12f5gvl1djsbchcjry02ghq4icdr897s8v48pkrzagk";
};
doCheck = false;
diff --git a/nixpkgs/pkgs/tools/networking/htpdate/default.nix b/nixpkgs/pkgs/tools/networking/htpdate/default.nix
index 4a350d237d0..9bb44b70f11 100644
--- a/nixpkgs/pkgs/tools/networking/htpdate/default.nix
+++ b/nixpkgs/pkgs/tools/networking/htpdate/default.nix
@@ -1,12 +1,12 @@
{ stdenv, fetchurl }:
stdenv.mkDerivation rec {
- version = "1.2.1";
+ version = "1.2.2";
pname = "htpdate";
src = fetchurl {
url = "http://www.vervest.org/htp/archive/c/${pname}-${version}.tar.xz";
- sha256 = "1gqw3lg4wwkn8snf4pf21s3qidhb4h791f2ci7i7i0d6kd86jv0q";
+ sha256 = "0mgr350qwgzrdrwkb9kaj6z7l6hn6a2pwh7sacqvnal5fyc9a7sz";
};
makeFlags = [
diff --git a/nixpkgs/pkgs/tools/networking/http-prompt/default.nix b/nixpkgs/pkgs/tools/networking/http-prompt/default.nix
index bcaca9ef0ce..049fb7a1a6e 100644
--- a/nixpkgs/pkgs/tools/networking/http-prompt/default.nix
+++ b/nixpkgs/pkgs/tools/networking/http-prompt/default.nix
@@ -30,5 +30,6 @@ pythonPackages.buildPythonApplication rec {
license = licenses.mit;
maintainers = with maintainers; [ matthiasbeyer ];
platforms = platforms.linux ++ platforms.darwin;
+ broken = true;
};
}
diff --git a/nixpkgs/pkgs/tools/networking/i2pd/default.nix b/nixpkgs/pkgs/tools/networking/i2pd/default.nix
index 97dbb1bdb8f..10e821fa152 100644
--- a/nixpkgs/pkgs/tools/networking/i2pd/default.nix
+++ b/nixpkgs/pkgs/tools/networking/i2pd/default.nix
@@ -9,13 +9,13 @@ assert upnpSupport -> miniupnpc != null;
stdenv.mkDerivation rec {
pname = "i2pd";
- version = "2.26.0";
+ version = "2.28.0";
src = fetchFromGitHub {
owner = "PurpleI2P";
repo = pname;
rev = version;
- sha256 = "1za7h449dnnw9h6nx33s5ai3qkakah37yg686a2sp8qynrb0h93h";
+ sha256 = "0pkqm5h3zvpbspj0xdc8j4yb1j2kc9gkw77mihc9g3rqifr7jvsv";
};
buildInputs = with stdenv.lib; [ boost zlib openssl ]
diff --git a/nixpkgs/pkgs/tools/networking/ipv6calc/default.nix b/nixpkgs/pkgs/tools/networking/ipv6calc/default.nix
index 169fea6c447..6e04859410f 100644
--- a/nixpkgs/pkgs/tools/networking/ipv6calc/default.nix
+++ b/nixpkgs/pkgs/tools/networking/ipv6calc/default.nix
@@ -3,11 +3,11 @@
stdenv.mkDerivation rec {
pname = "ipv6calc";
- version = "1.1.0";
+ version = "2.1.1";
src = fetchurl {
url = "ftp://ftp.deepspace6.net/pub/ds6/sources/ipv6calc/${pname}-${version}.tar.gz";
- sha256 = "1q74ikg780v5hllbq08wdfvxr2lf0fc7i41hclqrh1ajc6dqybbq";
+ sha256 = "01a4p2g31y6p1r3kacymbv2hhvkwnv00yskhphgcgjq5jpkmfjcn";
};
buildInputs = [ geoip geolite-legacy getopt ip2location-c openssl ];
diff --git a/nixpkgs/pkgs/tools/networking/kea/default.nix b/nixpkgs/pkgs/tools/networking/kea/default.nix
index bc35a25cfde..3986cadd08a 100644
--- a/nixpkgs/pkgs/tools/networking/kea/default.nix
+++ b/nixpkgs/pkgs/tools/networking/kea/default.nix
@@ -1,5 +1,5 @@
{ stdenv, fetchurl, autoreconfHook, pkgconfig, openssl, botan2, log4cplus
-, boost, python3, postgresql, mysql, gmp, bzip2 }:
+, boost, python3, postgresql, libmysqlclient, gmp, bzip2 }:
stdenv.mkDerivation rec {
pname = "kea";
@@ -20,12 +20,12 @@ stdenv.mkDerivation rec {
configureFlags = [
"--localstatedir=/var"
"--with-pgsql=${postgresql}/bin/pg_config"
- "--with-mysql=${mysql.connector-c}/bin/mysql_config"
+ "--with-mysql=${libmysqlclient}/bin/mysql_config"
];
nativeBuildInputs = [ autoreconfHook pkgconfig ];
buildInputs = [
- openssl log4cplus boost python3 mysql.connector-c
+ openssl log4cplus boost python3 libmysqlclient
botan2 gmp bzip2
];
diff --git a/nixpkgs/pkgs/tools/networking/logmein-hamachi/default.nix b/nixpkgs/pkgs/tools/networking/logmein-hamachi/default.nix
index 52b2a9a94dc..e8a83d38131 100644
--- a/nixpkgs/pkgs/tools/networking/logmein-hamachi/default.nix
+++ b/nixpkgs/pkgs/tools/networking/logmein-hamachi/default.nix
@@ -9,14 +9,14 @@ let
else throwSystem;
throwSystem = throw "Unsupported system: ${stdenv.hostPlatform.system}";
sha256 =
- if stdenv.hostPlatform.system == "x86_64-linux" then "11mxa4kls5xjj3462ycrfvfxb1xkk23p5m9iirvwsi0zdmhpnwm8"
+ if stdenv.hostPlatform.system == "x86_64-linux" then "0zy0jzvdqccfsg42m2lq1rj8r2c4iypd1h9vxl9824cbl92yim37"
else if stdenv.hostPlatform.system == "i686-linux" then "03ml9xv19km99f0z7fpr21b1zkxvw7q39kjzd8wpb2pds51wnc62"
else throwSystem;
libraries = stdenv.lib.makeLibraryPath [ stdenv.cc.cc ];
in stdenv.mkDerivation rec {
pname = "logmein-hamachi";
- version = "2.1.0.198";
+ version = "2.1.0.203";
src = fetchurl {
url = "https://www.vpn.net/installers/${pname}-${version}-${arch}.tgz";
diff --git a/nixpkgs/pkgs/tools/networking/mailutils/default.nix b/nixpkgs/pkgs/tools/networking/mailutils/default.nix
index f507e4dc287..40eeed7f050 100644
--- a/nixpkgs/pkgs/tools/networking/mailutils/default.nix
+++ b/nixpkgs/pkgs/tools/networking/mailutils/default.nix
@@ -1,6 +1,6 @@
{ stdenv, fetchurl, fetchpatch, autoreconfHook, dejagnu, gettext, pkgconfig
, gdbm, pam, readline, ncurses, gnutls, guile, texinfo, gnum4, sasl, fribidi, nettools
-, python, gss, mysql, system-sendmail }:
+, python, gss, libmysqlclient, system-sendmail }:
stdenv.mkDerivation rec {
name = "${project}-${version}";
@@ -16,7 +16,7 @@ stdenv.mkDerivation rec {
sed -i -e '/chown root:mail/d' \
-e 's/chmod [24]755/chmod 0755/' \
*/Makefile{.in,.am}
- sed -i 's:/usr/lib/mysql:${mysql.connector-c}/lib/mysql:' configure.ac
+ sed -i 's:/usr/lib/mysql:${libmysqlclient}/lib/mysql:' configure.ac
sed -i 's/0\.18/0.19/' configure.ac
sed -i -e 's:mysql/mysql.h:mysql.h:' \
-e 's:mysql/errmsg.h:errmsg.h:' \
@@ -29,7 +29,7 @@ stdenv.mkDerivation rec {
buildInputs = [
gdbm pam readline ncurses gnutls guile texinfo gnum4 sasl fribidi nettools
- gss mysql.connector-c python
+ gss libmysqlclient python
];
patches = [
@@ -62,7 +62,7 @@ stdenv.mkDerivation rec {
(fetchurl { url = "${p}/weed.at"; sha256 = "1101xakhc99f5gb9cs3mmydn43ayli7b270pzbvh7f9rbvh0d0nh"; })
];
- NIX_CFLAGS_COMPILE = "-L${mysql.connector-c}/lib/mysql -I${mysql.connector-c}/include/mysql";
+ NIX_CFLAGS_COMPILE = "-L${libmysqlclient}/lib/mysql -I${libmysqlclient}/include/mysql";
checkInputs = [ dejagnu ];
doCheck = false; # fails 1 out of a bunch of tests, looks like a bug
diff --git a/nixpkgs/pkgs/tools/networking/maxscale/default.nix b/nixpkgs/pkgs/tools/networking/maxscale/default.nix
index 32f6b11d77c..d047646fa71 100644
--- a/nixpkgs/pkgs/tools/networking/maxscale/default.nix
+++ b/nixpkgs/pkgs/tools/networking/maxscale/default.nix
@@ -1,5 +1,5 @@
{ stdenv, fetchFromGitHub, cmake, pkgconfig, glibc
-, bison2, curl, flex, gperftools, jansson, jemalloc, kerberos, lua, mariadb
+, bison2, curl, flex, gperftools, jansson, jemalloc, kerberos, lua, libmysqlclient
, ncurses, openssl, pcre, pcre2, perl, rabbitmq-c, sqlite, tcl
, libaio, libedit, libtool, libui, libuuid, zlib
}:
@@ -18,7 +18,7 @@ stdenv.mkDerivation rec {
nativeBuildInputs = [ cmake pkgconfig ];
buildInputs = [
- bison2 curl flex gperftools jansson jemalloc kerberos lua mariadb.connector-c
+ bison2 curl flex gperftools jansson jemalloc kerberos lua libmysqlclient
ncurses openssl pcre pcre2 perl rabbitmq-c sqlite tcl
libaio libedit libtool libui libuuid zlib
];
@@ -63,7 +63,7 @@ stdenv.mkDerivation rec {
postInstall = ''
find $out/bin -type f -perm -0100 | while read f1; do
patchelf \
- --set-rpath "$(patchelf --print-rpath $f1):${mariadb.connector-c}/lib/mariadb:$out/lib/maxscale" \
+ --set-rpath "$(patchelf --print-rpath $f1):${libmysqlclient}/lib/mariadb:$out/lib/maxscale" \
--set-interpreter "$(cat ${stdenv.cc}/nix-support/dynamic-linker)" $f1 \
&& patchelf --shrink-rpath $f1
done
diff --git a/nixpkgs/pkgs/tools/networking/modem-manager/default.nix b/nixpkgs/pkgs/tools/networking/modem-manager/default.nix
index b2644d0c2a4..fedc8d4b71d 100644
--- a/nixpkgs/pkgs/tools/networking/modem-manager/default.nix
+++ b/nixpkgs/pkgs/tools/networking/modem-manager/default.nix
@@ -32,13 +32,6 @@ stdenv.mkDerivation rec {
doCheck = true;
- postInstall = ''
- # systemd in NixOS doesn't use `systemctl enable`, so we need to establish
- # aliases ourselves.
- ln -s $out/etc/systemd/system/ModemManager.service \
- $out/etc/systemd/system/dbus-org.freedesktop.ModemManager1.service
- '';
-
meta = with stdenv.lib; {
description = "WWAN modem manager, part of NetworkManager";
homepage = https://www.freedesktop.org/wiki/Software/ModemManager/;
diff --git a/nixpkgs/pkgs/tools/networking/mu/default.nix b/nixpkgs/pkgs/tools/networking/mu/default.nix
index bd035e8f03c..0ff6a3baa59 100644
--- a/nixpkgs/pkgs/tools/networking/mu/default.nix
+++ b/nixpkgs/pkgs/tools/networking/mu/default.nix
@@ -5,13 +5,13 @@
stdenv.mkDerivation rec {
pname = "mu";
- version = "1.2";
+ version = "1.3.3";
src = fetchFromGitHub {
owner = "djcb";
repo = "mu";
rev = version;
- sha256 = "0yhjlj0z23jw3cf2wfnl98y8q6gikvmhkb8vdm87bd7jw0bdnrfz";
+ sha256 = "06z1l27rp3dpyphg3zqg0ww568a4g8iwz01vy4f7rl62asrbglsy";
};
# test-utils coredumps so don't run those
diff --git a/nixpkgs/pkgs/tools/networking/nbd/default.nix b/nixpkgs/pkgs/tools/networking/nbd/default.nix
index f9df781715a..9c443696eda 100644
--- a/nixpkgs/pkgs/tools/networking/nbd/default.nix
+++ b/nixpkgs/pkgs/tools/networking/nbd/default.nix
@@ -1,11 +1,11 @@
{ stdenv, fetchurl, pkgconfig, glib, which }:
stdenv.mkDerivation rec {
- name = "nbd-3.19";
+ name = "nbd-3.20";
src = fetchurl {
url = "mirror://sourceforge/nbd/${name}.tar.xz";
- sha256 = "1446rdg490fxd8mg5gvrf4nddbw1w7lf2daxy9cpc19yy4968iml";
+ sha256 = "1kfnyx52nna2mnw264njk1dl2zc8m78sz031yp65mbmpi99v7qg0";
};
buildInputs = [ glib ]
diff --git a/nixpkgs/pkgs/tools/networking/network-manager/default.nix b/nixpkgs/pkgs/tools/networking/network-manager/default.nix
index 5bc915caea6..490ebd0fa6b 100644
--- a/nixpkgs/pkgs/tools/networking/network-manager/default.nix
+++ b/nixpkgs/pkgs/tools/networking/network-manager/default.nix
@@ -97,11 +97,6 @@ in stdenv.mkDerivation rec {
'';
postInstall = ''
- # systemd in NixOS doesn't use `systemctl enable`, so we need to establish
- # aliases ourselves.
- ln -s $out/etc/systemd/system/NetworkManager-dispatcher.service $out/etc/systemd/system/dbus-org.freedesktop.nm-dispatcher.service
- ln -s $out/etc/systemd/system/NetworkManager.service $out/etc/systemd/system/dbus-org.freedesktop.NetworkManager.service
-
# Add the legacy service name from before #51382 to prevent NetworkManager
# from not starting back up:
# TODO: remove this once 19.10 is released
diff --git a/nixpkgs/pkgs/tools/networking/network-manager/iodine/default.nix b/nixpkgs/pkgs/tools/networking/network-manager/iodine/default.nix
index 27e091b6b60..a7f5bbf145e 100644
--- a/nixpkgs/pkgs/tools/networking/network-manager/iodine/default.nix
+++ b/nixpkgs/pkgs/tools/networking/network-manager/iodine/default.nix
@@ -24,8 +24,8 @@ in stdenv.mkDerivation {
nativeBuildInputs = [ intltool pkgconfig ];
- # Fixes deprecation errors with networkmanager 1.10.2
- NIX_CFLAGS_COMPILE = "-Wno-deprecated-declarations";
+ # glib-2.62 deprecations
+ NIX_CFLAGS_COMPILE = [ "-DGLIB_DISABLE_DEPRECATION_WARNINGS" ];
configureFlags = [
"--without-libnm-glib"
diff --git a/nixpkgs/pkgs/tools/networking/network-manager/strongswan.nix b/nixpkgs/pkgs/tools/networking/network-manager/strongswan.nix
index 60c344e8eb4..448fef4226a 100644
--- a/nixpkgs/pkgs/tools/networking/network-manager/strongswan.nix
+++ b/nixpkgs/pkgs/tools/networking/network-manager/strongswan.nix
@@ -14,8 +14,8 @@ stdenv.mkDerivation rec {
nativeBuildInputs = [ intltool pkgconfig ];
- # Fixes deprecation errors with networkmanager 1.10.2
- NIX_CFLAGS_COMPILE = "-Wno-deprecated-declarations";
+ # glib-2.62 deprecations
+ NIX_CFLAGS_COMPILE = [ "-DGLIB_DISABLE_DEPRECATION_WARNINGS" ];
configureFlags = [
"--without-libnm-glib"
diff --git a/nixpkgs/pkgs/tools/networking/openapi-generator-cli/default.nix b/nixpkgs/pkgs/tools/networking/openapi-generator-cli/default.nix
index 38255a68ffe..5fd1172778e 100644
--- a/nixpkgs/pkgs/tools/networking/openapi-generator-cli/default.nix
+++ b/nixpkgs/pkgs/tools/networking/openapi-generator-cli/default.nix
@@ -1,7 +1,7 @@
{ stdenv, fetchurl, jre, makeWrapper }:
stdenv.mkDerivation rec {
- version = "4.1.0";
+ version = "4.1.2";
pname = "openapi-generator-cli";
jarfilename = "${pname}-${version}.jar";
@@ -12,7 +12,7 @@ stdenv.mkDerivation rec {
src = fetchurl {
url = "http://central.maven.org/maven2/org/openapitools/${pname}/${version}/${jarfilename}";
- sha256 = "0pkibvhk1f999mg1zv2ikxzjpkrrbb0wwq5x0gzpmvr5sgywr6k4";
+ sha256 = "18f5ksngx6afh7rrw9aiw7q6yx801qflbbbqc7i28b68l9dh5qy4";
};
phases = [ "installPhase" ];
diff --git a/nixpkgs/pkgs/tools/networking/openconnect/default.nix b/nixpkgs/pkgs/tools/networking/openconnect/default.nix
index 7e614629484..7244653e493 100644
--- a/nixpkgs/pkgs/tools/networking/openconnect/default.nix
+++ b/nixpkgs/pkgs/tools/networking/openconnect/default.nix
@@ -4,13 +4,13 @@ assert (openssl != null) == (gnutls == null);
stdenv.mkDerivation rec {
pname = "openconnect";
- version = "8.04";
+ version = "8.05";
src = fetchurl {
urls = [
"ftp://ftp.infradead.org/pub/openconnect/${pname}-${version}.tar.gz"
];
- sha256 = "07zqcl2ykdc4mgix9sbv4jgpg7cybifxfgrycvf99ckq7xp9r5wq";
+ sha256 = "14i9q727c2zc9xhzp1a9hz3gzb5lwgsslbhircm84dnbs192jp1k";
};
outputs = [ "out" "dev" ];
diff --git a/nixpkgs/pkgs/tools/networking/p2p/tahoe-lafs/default.nix b/nixpkgs/pkgs/tools/networking/p2p/tahoe-lafs/default.nix
index a5305acdf59..e8a4261ed12 100644
--- a/nixpkgs/pkgs/tools/networking/p2p/tahoe-lafs/default.nix
+++ b/nixpkgs/pkgs/tools/networking/p2p/tahoe-lafs/default.nix
@@ -90,5 +90,6 @@ pythonPackages.buildPythonApplication rec {
license = [ lib.licenses.gpl2Plus /* or */ "TGPPLv1+" ];
maintainers = with lib.maintainers; [ MostAwesomeDude ];
platforms = lib.platforms.gnu ++ lib.platforms.linux;
+ broken = true;
};
}
diff --git a/nixpkgs/pkgs/tools/networking/ppp/default.nix b/nixpkgs/pkgs/tools/networking/ppp/default.nix
index b072ed21318..987960c9c50 100644
--- a/nixpkgs/pkgs/tools/networking/ppp/default.nix
+++ b/nixpkgs/pkgs/tools/networking/ppp/default.nix
@@ -20,11 +20,11 @@ stdenv.mkDerivation rec {
./nonpriv.patch
(fetchurl {
name = "CVE-2015-3310.patch";
- url = "https://anonscm.debian.org/git/collab-maint/pkg-ppp.git/plain/debian/patches/rc_mksid-no-buffer-overflow?h=debian/2.4.7-1%2b4";
+ url = "https://salsa.debian.org/roam/ppp/raw/ef5d585aca6b1200a52c7109caa66ef97964d76e/debian/patches/rc_mksid-no-buffer-overflow";
sha256 = "1dk00j7bg9nfgskw39fagnwv1xgsmyv0xnkd6n1v5gy0psw0lvqh";
})
(fetchurl {
- url = "https://anonscm.debian.org/git/collab-maint/pkg-ppp.git/plain/debian/patches/0016-pppoe-include-netinet-in.h-before-linux-in.h.patch";
+ url = "https://salsa.debian.org/roam/ppp/raw/ef5d585aca6b1200a52c7109caa66ef97964d76e/debian/patches/0016-pppoe-include-netinet-in.h-before-linux-in.h.patch";
sha256 = "1xnmqn02kc6g5y84xynjwnpv9cvrfn3nyv7h7r8j8xi7qf2aj4q8";
})
(fetchurl {
diff --git a/nixpkgs/pkgs/tools/networking/prettyping/default.nix b/nixpkgs/pkgs/tools/networking/prettyping/default.nix
index 36700195a1b..fb0508b3c90 100644
--- a/nixpkgs/pkgs/tools/networking/prettyping/default.nix
+++ b/nixpkgs/pkgs/tools/networking/prettyping/default.nix
@@ -19,7 +19,7 @@ stdenv.mkDerivation rec {
homepage = https://github.com/denilsonsa/prettyping;
description = "A wrapper around the standard ping tool with the objective of making the output prettier, more colorful, more compact, and easier to read";
license = with licenses; [ mit ];
- platforms = platforms.linux;
+ platforms = platforms.unix;
maintainers = with maintainers; [ qoelet ];
};
}
diff --git a/nixpkgs/pkgs/tools/networking/radsecproxy/default.nix b/nixpkgs/pkgs/tools/networking/radsecproxy/default.nix
index 9901194f3c6..5460bf80a07 100644
--- a/nixpkgs/pkgs/tools/networking/radsecproxy/default.nix
+++ b/nixpkgs/pkgs/tools/networking/radsecproxy/default.nix
@@ -2,13 +2,13 @@
stdenv.mkDerivation rec {
pname = "radsecproxy";
- version = "1.8.0";
+ version = "1.8.1";
src = fetchFromGitHub {
owner = pname;
repo = pname;
rev = version;
- sha256 = "1268lbysa82b6h0101jzs0v6ixvmy3x0d0a8hw37sy95filsjmia";
+ sha256 = "12pvwd7v3iswki3riycxaiiqxingg4bqnkwc5ay3j4n2kzynr1qg";
};
nativeBuildInputs = [ autoreconfHook ];
diff --git a/nixpkgs/pkgs/tools/networking/shadowsocks-rust/default.nix b/nixpkgs/pkgs/tools/networking/shadowsocks-rust/default.nix
index 668d55d8927..2416ef23c8a 100644
--- a/nixpkgs/pkgs/tools/networking/shadowsocks-rust/default.nix
+++ b/nixpkgs/pkgs/tools/networking/shadowsocks-rust/default.nix
@@ -2,16 +2,16 @@
rustPlatform.buildRustPackage rec {
pname = "shadowsocks-rust";
- version = "1.7.0";
+ version = "1.7.2";
src = fetchFromGitHub {
rev = "v${version}";
owner = "shadowsocks";
repo = pname;
- sha256 = "0mqjm54mp6c9mfdl3gf01v9vm2rjll8fw63n6j4qgv01y4hrsm4f";
+ sha256 = "0w7ysha46ml3j1i1knvll4pmqg291z8a2ypcy650m61dhrvkh2ng";
};
- cargoSha256 = "19wx19sbal2q5ndniv6vllayjjy5fzi8fw7fn1d23jb9l91ak7ab";
+ cargoSha256 = "18nlvqa9ha4vs9xb60hivhgcsqr69zsigfmqyig48slvwgqkbwda";
buildInputs = [ openssl libsodium ]
++ stdenv.lib.optionals stdenv.isDarwin [ Security ];
diff --git a/nixpkgs/pkgs/tools/networking/unbound/python.nix b/nixpkgs/pkgs/tools/networking/unbound/python.nix
index fdd110e14b3..c1186204104 100644
--- a/nixpkgs/pkgs/tools/networking/unbound/python.nix
+++ b/nixpkgs/pkgs/tools/networking/unbound/python.nix
@@ -60,5 +60,6 @@ in stdenv.mkDerivation rec {
homepage = http://www.unbound.net;
maintainers = with maintainers; [ leenaars ];
platforms = stdenv.lib.platforms.unix;
+ broken = true;
};
}
diff --git a/nixpkgs/pkgs/tools/networking/uwimap/default.nix b/nixpkgs/pkgs/tools/networking/uwimap/default.nix
index 125c83da4c4..bc500a01c11 100644
--- a/nixpkgs/pkgs/tools/networking/uwimap/default.nix
+++ b/nixpkgs/pkgs/tools/networking/uwimap/default.nix
@@ -21,7 +21,7 @@ stdenv.mkDerivation ({
++ stdenv.lib.optional (!stdenv.isDarwin) pam;
patches = [ (fetchpatch {
- url = "https://anonscm.debian.org/cgit/collab-maint/uw-imap.git/plain/debian/patches/1006_openssl1.1_autoverify.patch?id=b4df81d246a6cdbfd035c21f43e844effda3582b";
+ url = "https://salsa.debian.org/holmgren/uw-imap/raw/dcb42981201ea14c2d71c01ebb4a61691b6f68b3/debian/patches/1006_openssl1.1_autoverify.patch";
sha256 = "09xb58awvkhzmmjhrkqgijzgv7ia381ablf0y7i1rvhcqkb5wga7";
}) ];
diff --git a/nixpkgs/pkgs/tools/networking/weighttp/default.nix b/nixpkgs/pkgs/tools/networking/weighttp/default.nix
index 5615c249de9..8ba47534cfb 100644
--- a/nixpkgs/pkgs/tools/networking/weighttp/default.nix
+++ b/nixpkgs/pkgs/tools/networking/weighttp/default.nix
@@ -14,5 +14,7 @@ stdenv.mkDerivation rec {
meta = {
platforms = stdenv.lib.platforms.unix;
+ homepage = https://redmine.lighttpd.net/projects/weighttp/wiki;
+ description = "A lightweight and simple webserver benchmarking tool";
};
}
diff --git a/nixpkgs/pkgs/tools/networking/whois/default.nix b/nixpkgs/pkgs/tools/networking/whois/default.nix
index b6c03c08cff..b0564ad7c74 100644
--- a/nixpkgs/pkgs/tools/networking/whois/default.nix
+++ b/nixpkgs/pkgs/tools/networking/whois/default.nix
@@ -1,14 +1,14 @@
{ stdenv, fetchFromGitHub, perl, gettext, pkgconfig, libidn2, libiconv }:
stdenv.mkDerivation rec {
- version = "5.5.1";
+ version = "5.5.2";
pname = "whois";
src = fetchFromGitHub {
owner = "rfc1036";
repo = "whois";
rev = "v${version}";
- sha256 = "05dbc58dgq5ln28pahififljdb19gqicwlcmnni0vw4ny4r7r9bg";
+ sha256 = "0587xvw0ifjrwxgisw0nfx7qykmkly1knfdghrpph9vicpzwsidw";
};
nativeBuildInputs = [ perl gettext pkgconfig ];
diff --git a/nixpkgs/pkgs/tools/networking/wireguard-go/default.nix b/nixpkgs/pkgs/tools/networking/wireguard-go/default.nix
index dfda88cb867..025573d7dd1 100644
--- a/nixpkgs/pkgs/tools/networking/wireguard-go/default.nix
+++ b/nixpkgs/pkgs/tools/networking/wireguard-go/default.nix
@@ -2,13 +2,13 @@
buildGoPackage rec {
pname = "wireguard-go";
- version = "0.0.20190517";
+ version = "0.0.20190908";
- goPackagePath = "git.zx2c4.com/wireguard-go";
+ goPackagePath = "golang.zx2c4.com/wireguard";
src = fetchzip {
url = "https://git.zx2c4.com/wireguard-go/snapshot/wireguard-go-${version}.tar.xz";
- sha256 = "0ir3dp13vkkqr76q0jvw610qw40053ngk51psqhqxfaw3jicdqgr";
+ sha256 = "1jsch0157nk86krdknij7dsvg6i7ar0ydhy07r40drhxqyp3q0hx";
};
goDeps = ./deps.nix;
@@ -20,6 +20,5 @@ buildGoPackage rec {
homepage = https://git.zx2c4.com/wireguard-go/about/;
license = licenses.gpl2;
maintainers = with maintainers; [ elseym kirelagin yegortimoshenko zx2c4 ];
- platforms = platforms.darwin;
};
}
diff --git a/nixpkgs/pkgs/tools/networking/wireguard-go/deps.nix b/nixpkgs/pkgs/tools/networking/wireguard-go/deps.nix
index 6ebef971e59..5501ebdc6c2 100644
--- a/nixpkgs/pkgs/tools/networking/wireguard-go/deps.nix
+++ b/nixpkgs/pkgs/tools/networking/wireguard-go/deps.nix
@@ -1,30 +1,12 @@
# file generated from go.mod using vgo2nix (https://github.com/adisbladis/vgo2nix)
[
{
- goPackagePath = "github.com/Microsoft/go-winio";
- fetch = {
- type = "git";
- url = "https://github.com/Microsoft/go-winio";
- rev = "v0.4.12";
- sha256 = "10v2f1xaw2cc97mjqnxzgs9ydpqv71f0ynp1spcywqw97la56zqw";
- };
- }
- {
- goPackagePath = "github.com/pkg/errors";
- fetch = {
- type = "git";
- url = "https://github.com/pkg/errors";
- rev = "v0.8.1";
- sha256 = "0g5qcb4d4fd96midz0zdk8b9kz8xkzwfa8kr1cliqbg8sxsy5vd1";
- };
- }
- {
goPackagePath = "golang.org/x/crypto";
fetch = {
type = "git";
url = "https://go.googlesource.com/crypto";
- rev = "a29dc8fdc734";
- sha256 = "07f0jj4haqs0ywc1akk1qjwn5msl2j0pry1rxjkkbfcq4r6ihc1p";
+ rev = "9756ffdc2472";
+ sha256 = "0q7hxaaq6lp0v8qqzifvysl47z5rfdlrxkh3d29vsl3wyby3dxl8";
};
}
{
@@ -32,8 +14,8 @@
fetch = {
type = "git";
url = "https://go.googlesource.com/net";
- rev = "7f726cade0ab";
- sha256 = "0zv5var5agbhd2mcn7lciwip0j49gxka73f0csvh3hvb1di068gn";
+ rev = "ba9fcec4b297";
+ sha256 = "1hbqvy6r0s5h0dpdqw8fynl3cq0acin3iyqki9xvl5r8h33yb9bx";
};
}
{
@@ -41,8 +23,8 @@
fetch = {
type = "git";
url = "https://go.googlesource.com/sys";
- rev = "a43fa875dd82";
- sha256 = "0xvwwaqcj02a9n8izs4zrlg8vvz7wffli955i93nc34m1f0w8vyg";
+ rev = "19e00faab6ad";
+ sha256 = "0znjx9xbyjdvk8cafdc1jl22gg29asxl5yl7mi3yz6zx3h39rm8y";
};
}
{
@@ -50,8 +32,17 @@
fetch = {
type = "git";
url = "https://go.googlesource.com/text";
- rev = "v0.3.0";
- sha256 = "0r6x6zjzhr8ksqlpiwm5gdd7s209kwk5p4lw54xjvz10cs3qlq19";
+ rev = "v0.3.2";
+ sha256 = "0flv9idw0jm5nm8lx25xqanbkqgfiym6619w575p7nrdh0riqwqh";
+ };
+ }
+ {
+ goPackagePath = "golang.org/x/tools";
+ fetch = {
+ type = "git";
+ url = "https://go.googlesource.com/tools";
+ rev = "90fa682c2a6e";
+ sha256 = "03ic2xsy51jw9749wl7gszdbz99iijbd2bckgygl6cm9w5m364ak";
};
}
]
diff --git a/nixpkgs/pkgs/tools/networking/wstunnel/default.nix b/nixpkgs/pkgs/tools/networking/wstunnel/default.nix
new file mode 100644
index 00000000000..2488d874e6d
--- /dev/null
+++ b/nixpkgs/pkgs/tools/networking/wstunnel/default.nix
@@ -0,0 +1,47 @@
+{ mkDerivation, async, base, base64-bytestring, binary, bytestring
+, classy-prelude, cmdargs, connection, hslogger, mtl, network
+, network-conduit-tls, stdenv, streaming-commons, text
+, unordered-containers, websockets
+, lib, fetchFromGitHub, fetchpatch
+}:
+
+mkDerivation rec {
+ pname = "wstunnel";
+ version = "unstable-2019-01-28";
+
+ src = fetchFromGitHub {
+ owner = "erebe";
+ repo = pname;
+ rev = "78cc5a5f1aa4dbcb25fa9b0efc9cfef3640672e4";
+ sha256 = "17y3yn7qg1h7jx9xs041sw63g51vyns236f60d2m2mghi49lm9i2";
+ };
+
+ patches = [
+ # Support GHC 8.6 https://github.com/erebe/wstunnel/pull/18
+ (fetchpatch {
+ url = "https://github.com/erebe/wstunnel/commit/8f348fea4dbf75874d5d930334377843763335ab.patch";
+ sha256 = "0a66jx7k97j3iyr7j5npbyq1lkhzz74r81mkas4nig7z3hny1gn9";
+ })
+ ];
+
+ isLibrary = false;
+ isExecutable = true;
+
+ libraryHaskellDepends = [
+ async base base64-bytestring binary bytestring classy-prelude
+ connection hslogger mtl network network-conduit-tls
+ streaming-commons text unordered-containers websockets
+ ];
+
+ executableHaskellDepends = [
+ base bytestring classy-prelude cmdargs hslogger text
+ ];
+
+ testHaskellDepends = [ base text ];
+
+ homepage = "https://github.com/erebe/wstunnel";
+ description = "UDP and TCP tunnelling over WebSocket";
+ maintainers = with lib.maintainers; [ gebner ];
+ license = lib.licenses.bsd3;
+
+}
diff --git a/nixpkgs/pkgs/tools/package-management/cargo-audit/default.nix b/nixpkgs/pkgs/tools/package-management/cargo-audit/default.nix
new file mode 100644
index 00000000000..45422f613d0
--- /dev/null
+++ b/nixpkgs/pkgs/tools/package-management/cargo-audit/default.nix
@@ -0,0 +1,28 @@
+{ stdenv, lib, rustPlatform, fetchFromGitHub, openssl, pkg-config, Security, libiconv }:
+rustPlatform.buildRustPackage rec {
+ pname = "cargo-audit";
+ version = "0.9.1";
+
+ src = fetchFromGitHub {
+ owner = "RustSec";
+ repo = "cargo-audit";
+ rev = "v${version}";
+ sha256 = "0j556dh0lf2l8nq7pfl5bbypgsvp00fh6ckms9wr4dgb8xvpf2r1";
+ };
+
+ cargoSha256 = "0200x0bdllq7mpxmp7ly5jarpkc3gpg22gxq8qvdbnmyd39b7wx0";
+
+ buildInputs = [ openssl libiconv ] ++ lib.optionals stdenv.isDarwin [ Security ];
+ nativeBuildInputs = [ pkg-config ];
+
+ # The tests require network access which is not available in sandboxed Nix builds.
+ doCheck = false;
+
+ meta = with lib; {
+ description = "Audit Cargo.lock files for crates with security vulnerabilities";
+ homepage = "https://rustsec.org";
+ license = with licenses; [ mit asl20 ];
+ maintainers = with maintainers; [ basvandijk ];
+ platforms = platforms.all;
+ };
+}
diff --git a/nixpkgs/pkgs/tools/package-management/clib/default.nix b/nixpkgs/pkgs/tools/package-management/clib/default.nix
index 60c77db44d8..eb8f5ef186f 100644
--- a/nixpkgs/pkgs/tools/package-management/clib/default.nix
+++ b/nixpkgs/pkgs/tools/package-management/clib/default.nix
@@ -1,14 +1,14 @@
{ stdenv, fetchFromGitHub, curl }:
stdenv.mkDerivation rec {
- version = "1.8.1";
+ version = "1.11.2";
pname = "clib";
src = fetchFromGitHub {
rev = version;
owner = "clibs";
repo = "clib";
- sha256 = "1kl8amlw0106jsvv71a7nifhff1jdvgsrxr7l7hfr75i506q8976";
+ sha256 = "03q5l873zc1dm478f35ibqandypakf47hzqb5gjpnpbcyb2m2jxz";
};
hardeningDisable = [ "fortify" ];
diff --git a/nixpkgs/pkgs/tools/package-management/home-manager/default.nix b/nixpkgs/pkgs/tools/package-management/home-manager/default.nix
index e1ae6bc88b8..90c7ae8ba34 100644
--- a/nixpkgs/pkgs/tools/package-management/home-manager/default.nix
+++ b/nixpkgs/pkgs/tools/package-management/home-manager/default.nix
@@ -6,13 +6,13 @@
stdenv.mkDerivation rec {
pname = "home-manager";
- version = "2019-09-04";
+ version = "2019-09-20";
src = fetchFromGitHub {
owner = "rycee";
repo = "home-manager";
- rev = "1923ac3358cbd2d75352c2db2178314eb4623818";
- sha256 = "1xdsz62sjh8j3p8jfz449gv9vl01adk3qdyjvbpgi7y5c09ymwg7";
+ rev = "3f4563018010e2ad180d99d9cd876187e2905cee";
+ sha256 = "1bj7i9yslynhbmn4w5ilm7554zn8pgd0npvy2b0z8n98hlc2d30c";
};
nativeBuildInputs = [ makeWrapper ];
diff --git a/nixpkgs/pkgs/tools/package-management/nix-du/default.nix b/nixpkgs/pkgs/tools/package-management/nix-du/default.nix
index 870e6ce67b9..74543cef83b 100644
--- a/nixpkgs/pkgs/tools/package-management/nix-du/default.nix
+++ b/nixpkgs/pkgs/tools/package-management/nix-du/default.nix
@@ -1,15 +1,16 @@
{ stdenv, fetchFromGitHub, rustPlatform, nix, boost, graphviz, darwin }:
rustPlatform.buildRustPackage rec {
pname = "nix-du";
- version = "unstable-2019-07-15";
+ version = "0.3.1";
src = fetchFromGitHub {
owner = "symphorien";
repo = "nix-du";
- rev = "e6e927c15e75f7c2e63f7f3c181dc6b257f6fd9e";
- sha256 = "08jyp078h9jpb9qfqg5mdbq29rl8a006n94hqk3yk6gv1s57cfic";
+ rev = "v${version}";
+ sha256 = "149d60mid29s5alv5m3d7jrhyzc6cj7b6hpiq399gsdwzgxr00wq";
};
- cargoSha256 = "071gbhxbvnwi7n3zpy7bmlprzir0sl0f0pb191xg2ynw678prd7v";
+ cargoSha256 = "18kb4car5nzch3vpl6z1499silhs3fyn8c6xj3rzk94mm2m9srg4";
+ verifyCargoDeps = true;
doCheck = true;
checkInputs = [ graphviz ];
diff --git a/nixpkgs/pkgs/tools/package-management/nix/default.nix b/nixpkgs/pkgs/tools/package-management/nix/default.nix
index 518c1baad5a..269d7261536 100644
--- a/nixpkgs/pkgs/tools/package-management/nix/default.nix
+++ b/nixpkgs/pkgs/tools/package-management/nix/default.nix
@@ -174,10 +174,10 @@ in rec {
};
nixStable = callPackage common (rec {
- name = "nix-2.3";
+ name = "nix-2.3.1";
src = fetchurl {
url = "http://nixos.org/releases/nix/${name}/${name}.tar.xz";
- sha256 = "b1d1b4d87390941fc64b19776f1ed9e3871231d38f5a1f295dd13925acd3a98d";
+ sha256 = "bb6578e9f20eebab6d78469ecc59c450ac54f276e5a86a882015d98fecb1bc7b";
};
inherit storeDir stateDir confDir boehmgc;
diff --git a/nixpkgs/pkgs/tools/package-management/pacman/default.nix b/nixpkgs/pkgs/tools/package-management/pacman/default.nix
index 81e8152769b..9fd0ea05510 100644
--- a/nixpkgs/pkgs/tools/package-management/pacman/default.nix
+++ b/nixpkgs/pkgs/tools/package-management/pacman/default.nix
@@ -1,5 +1,5 @@
{ stdenv, lib, fetchurl, autoreconfHook, pkgconfig, perl, libarchive, openssl,
-zlib, bzip2, lzma }:
+zlib, bzip2, lzma, curl, runtimeShell }:
stdenv.mkDerivation rec {
pname = "pacman";
@@ -10,15 +10,21 @@ stdenv.mkDerivation rec {
sha256 = "108xp6dhvp02jnzskhgzjmp9jvrxhhkffvmpvs3rrif7vj47xd76";
};
+ enableParallelBuilding = true;
+
configureFlags = [
# trying to build docs fails with a2x errors, unable to fix through asciidoc
"--disable-doc"
+ "--sysconfdir=/etc"
"--localstatedir=/var"
+ "--with-scriptlet-shell=${runtimeShell}"
];
+ installFlags = [ "sysconfdir=${placeholder "out"}/etc" ];
+
nativeBuildInputs = [ autoreconfHook pkgconfig ];
- buildInputs = [ perl libarchive openssl zlib bzip2 lzma ];
+ buildInputs = [ curl perl libarchive openssl zlib bzip2 lzma ];
postFixup = ''
substituteInPlace $out/bin/repo-add \
diff --git a/nixpkgs/pkgs/tools/security/aespipe/default.nix b/nixpkgs/pkgs/tools/security/aespipe/default.nix
index 22fb8848eb9..69bef27258e 100644
--- a/nixpkgs/pkgs/tools/security/aespipe/default.nix
+++ b/nixpkgs/pkgs/tools/security/aespipe/default.nix
@@ -2,18 +2,20 @@
stdenv.mkDerivation rec {
pname = "aespipe";
- version = "2.4e";
+ version = "2.4f";
src = fetchurl {
url = "mirror://sourceforge/loop-aes/aespipe/aespipe-v${version}.tar.bz2";
- sha256 = "0fmr0vk408bf13jydhdmcdhqw31yc9qk329bs9i60alccywapmds";
+ sha256 = "15pg9j27mjzl78mpzkdqd84kdafj0g6j72f8wgjrpp2qkxjy2ddi";
};
- meta = {
+ configureFlags = [ "--enable-padlock" "--enable-intelaes" ];
+
+ meta = with stdenv.lib; {
description = "AES encrypting or decrypting pipe";
homepage = http://loop-aes.sourceforge.net/aespipe.README;
- license = stdenv.lib.licenses.gpl2;
- maintainers = [ stdenv.lib.maintainers.goibhniu ];
- platforms = stdenv.lib.platforms.linux;
+ license = licenses.gpl2;
+ maintainers = [ maintainers.goibhniu ];
+ platforms = platforms.linux;
};
}
diff --git a/nixpkgs/pkgs/tools/security/bitwarden/default.nix b/nixpkgs/pkgs/tools/security/bitwarden/default.nix
index c67cc447431..f96501ddf77 100644
--- a/nixpkgs/pkgs/tools/security/bitwarden/default.nix
+++ b/nixpkgs/pkgs/tools/security/bitwarden/default.nix
@@ -16,11 +16,11 @@ let
pname = "bitwarden";
version = {
- x86_64-linux = "1.15.2";
+ x86_64-linux = "1.16.4";
}.${system} or "";
sha256 = {
- x86_64-linux = "0yz4hkqqwq2zrdjfxk5kybhs90n80k6bkn0625m47b09lwl2di4f";
+ x86_64-linux = "1g9ljxjqs7mx509lkfd7db7xvm9srzypbgv0qfzrr2flqbsfl06m";
}.${system} or "";
meta = with stdenv.lib; {
diff --git a/nixpkgs/pkgs/tools/security/clamav/default.nix b/nixpkgs/pkgs/tools/security/clamav/default.nix
index 54932e1200b..de275b6c09a 100644
--- a/nixpkgs/pkgs/tools/security/clamav/default.nix
+++ b/nixpkgs/pkgs/tools/security/clamav/default.nix
@@ -5,11 +5,11 @@
stdenv.mkDerivation rec {
pname = "clamav";
- version = "0.101.4";
+ version = "0.102.0";
src = fetchurl {
url = "https://www.clamav.net/downloads/production/${pname}-${version}.tar.gz";
- sha256 = "1kdw0b49hbvja6xn589v4f0q334wav16pmi1hibql5cxj7q99w0b";
+ sha256 = "1qdyj4r39266bmbsd2nwyspm20k9wh3c30awrg8c54y78s61izj8";
};
# don't install sample config files into the absolute sysconfdir folder
diff --git a/nixpkgs/pkgs/tools/security/diceware/default.nix b/nixpkgs/pkgs/tools/security/diceware/default.nix
index 1c3d5f1d465..07682eb22c5 100644
--- a/nixpkgs/pkgs/tools/security/diceware/default.nix
+++ b/nixpkgs/pkgs/tools/security/diceware/default.nix
@@ -15,6 +15,8 @@ buildPythonApplication rec {
nativeBuildInputs = [ pytestrunner ];
+ propagatedBuildInputs = [ setuptools ];
+
checkInputs = [ coverage pytest ];
# see https://github.com/ulif/diceware/commit/a7d844df76cd4b95a717f21ef5aa6167477b6733
diff --git a/nixpkgs/pkgs/tools/security/fprintd/default.nix b/nixpkgs/pkgs/tools/security/fprintd/default.nix
index 84727f55b93..201780b1492 100644
--- a/nixpkgs/pkgs/tools/security/fprintd/default.nix
+++ b/nixpkgs/pkgs/tools/security/fprintd/default.nix
@@ -1,26 +1,49 @@
{ thinkpad ? false
-, stdenv, fetchurl, pkgconfig, intltool, libfprint-thinkpad ? null
-, libfprint ? null, glib, dbus-glib, polkit, nss, pam, systemd }:
+, stdenv
+, fetchurl
+, pkgconfig
+, intltool
+, libfprint-thinkpad ? null
+, libfprint ? null
+, glib
+, dbus-glib
+, polkit
+, nss
+, pam
+, systemd
+}:
stdenv.mkDerivation rec {
pname = "fprintd" + stdenv.lib.optionalString thinkpad "-thinkpad";
- version = "0.8.1";
+ version = "0.9.0";
src = fetchurl {
- url = "https://gitlab.freedesktop.org/libfprint/fprintd/uploads/bdd9f91909f535368b7c21f72311704a/fprintd-${version}.tar.xz";
- sha256 = "124s0g9syvglgsmqnavp2a8c0zcq8cyaph8p8iyvbla11vfizs9l";
+ url = "https://gitlab.freedesktop.org/libfprint/fprintd/uploads/9dec4b63d1f00e637070be1477ce63c0/fprintd-${version}.tar.xz";
+ sha256 = "182gcnwb6zjwmk0dn562rjmpbk7ac7dhipbfdhfic2sn1jzis49p";
};
- buildInputs = [ glib dbus-glib polkit nss pam systemd ]
- ++ stdenv.lib.optional thinkpad libfprint-thinkpad
- ++ stdenv.lib.optional (!thinkpad) libfprint;
+ nativeBuildInputs = [
+ intltool
+ pkgconfig
+ ];
- nativeBuildInputs = [ pkgconfig intltool ];
+ buildInputs = [
+ glib
+ dbus-glib
+ polkit
+ nss
+ pam
+ systemd
+ ]
+ ++ stdenv.lib.optional thinkpad libfprint-thinkpad
+ ++ stdenv.lib.optional (!thinkpad) libfprint
+ ;
- configureFlags = [
- "--with-systemdsystemunitdir=${placeholder "out"}/lib/systemd/system"
- "--localstatedir=/var"
- "--sysconfdir=${placeholder "out"}/etc"
+ configureFlags = [
+ # is hardcoded to /var/lib/fprint, this is for the StateDirectory install target
+ "--localstatedir=${placeholder "out"}/var"
+ "--sysconfdir=${placeholder "out"}/etc"
+ "--with-systemdsystemunitdir=${placeholder "out"}/lib/systemd/system"
];
meta = with stdenv.lib; {
diff --git a/nixpkgs/pkgs/tools/security/hcxtools/default.nix b/nixpkgs/pkgs/tools/security/hcxtools/default.nix
index 216d58192fb..40e9ee03952 100644
--- a/nixpkgs/pkgs/tools/security/hcxtools/default.nix
+++ b/nixpkgs/pkgs/tools/security/hcxtools/default.nix
@@ -2,13 +2,13 @@
stdenv.mkDerivation rec {
pname = "hcxtools";
- version = "5.2.0";
+ version = "5.2.2";
src = fetchFromGitHub {
owner = "ZerBea";
repo = pname;
rev = version;
- sha256 = "0k2qlq9hz5zc21nyc6yrnfqzga7hydn5mm0x3rpl2fhkwl81lxcn";
+ sha256 = "0jschcjk9z9s3q2f7qcb4nmjmyipar3f0yqbrgmbg3jpgamahykn";
};
buildInputs = [ curl openssl zlib ];
diff --git a/nixpkgs/pkgs/tools/security/keycard-cli/default.nix b/nixpkgs/pkgs/tools/security/keycard-cli/default.nix
new file mode 100644
index 00000000000..a76c102b2bb
--- /dev/null
+++ b/nixpkgs/pkgs/tools/security/keycard-cli/default.nix
@@ -0,0 +1,31 @@
+{ lib, buildGoPackage, fetchFromGitHub, pkgconfig, pcsclite }:
+
+buildGoPackage rec {
+ pname = "keycard-cli";
+ version = "0.0.12";
+
+ goPackagePath = "github.com/status-im/keycard-cli";
+ subPackages = [ "." ];
+
+ nativeBuildInputs = [ pkgconfig ];
+ buildInputs = [ pcsclite ];
+
+ src = fetchFromGitHub {
+ owner = "status-im";
+ repo = pname;
+ rev = version;
+ sha256 = "1jnbaq57i6i9bad1hcvd28mxfqq6v8rv806c6l74vlb79ff4v1wb";
+ };
+
+ buildFlagsArray = [
+ "-ldflags="
+ "-X main.version=${version}"
+ ];
+
+ meta = with lib; {
+ description = "A command line tool and shell to manage keycards";
+ homepage = "https://keycard.status.im";
+ license = licenses.mpl20;
+ maintainers = [ maintainers.zimbatm ];
+ };
+}
diff --git a/nixpkgs/pkgs/tools/security/mbox/default.nix b/nixpkgs/pkgs/tools/security/mbox/default.nix
index 24a7ea51a82..1ef282b8b6e 100644
--- a/nixpkgs/pkgs/tools/security/mbox/default.nix
+++ b/nixpkgs/pkgs/tools/security/mbox/default.nix
@@ -33,6 +33,7 @@ stdenv.mkDerivation {
maintainers = with maintainers; [ ehmry ];
license = licenses.bsd3;
platforms = [ "x86_64-linux" ];
+ broken = true;
};
}
diff --git a/nixpkgs/pkgs/tools/security/meo/default.nix b/nixpkgs/pkgs/tools/security/meo/default.nix
index 308b94231e7..19f51775ff2 100644
--- a/nixpkgs/pkgs/tools/security/meo/default.nix
+++ b/nixpkgs/pkgs/tools/security/meo/default.nix
@@ -30,5 +30,6 @@ stdenv.mkDerivation {
license = stdenv.lib.licenses.agpl3Plus;
maintainers = with stdenv.lib.maintainers; [viric];
platforms = with stdenv.lib.platforms; linux;
+ broken = true;
};
}
diff --git a/nixpkgs/pkgs/tools/security/nsjail/default.nix b/nixpkgs/pkgs/tools/security/nsjail/default.nix
index 3f04d276489..f1335a1ad1d 100644
--- a/nixpkgs/pkgs/tools/security/nsjail/default.nix
+++ b/nixpkgs/pkgs/tools/security/nsjail/default.nix
@@ -4,14 +4,14 @@
stdenv.mkDerivation rec {
pname = "nsjail";
- version = "2.8";
+ version = "2.9";
src = fetchFromGitHub {
owner = "google";
repo = "nsjail";
rev = version;
fetchSubmodules = true;
- sha256 = "0cgycj0cz74plmz4asxryqprg6mkzpmnxzqbfsp1wwackinxq5fq";
+ sha256 = "0218n0qjb45fawqqfj3gdxgd0fw5k0vxn9iggi0ciljmr9zywkgh";
};
postPatch = ''
diff --git a/nixpkgs/pkgs/tools/security/nwipe/default.nix b/nixpkgs/pkgs/tools/security/nwipe/default.nix
index caaa5eba86a..62d7fb3b34a 100644
--- a/nixpkgs/pkgs/tools/security/nwipe/default.nix
+++ b/nixpkgs/pkgs/tools/security/nwipe/default.nix
@@ -1,13 +1,13 @@
{ stdenv, fetchFromGitHub, ncurses, parted, automake, autoconf, pkgconfig }:
stdenv.mkDerivation rec {
- version = "0.25";
+ version = "0.26";
pname = "nwipe";
src = fetchFromGitHub {
owner = "martijnvanbrummelen";
repo = "nwipe";
rev = "v${version}";
- sha256 = "1hx041arw82k814g9r8dqsfi736mj5nlzp2zpi8n2qfqfc1q8nir";
+ sha256 = "072gg7hafq4vncpgm62yswshg6qgbi9mg2hl0p22c7if908p4vaa";
};
nativeBuildInputs = [ automake autoconf pkgconfig ];
buildInputs = [ ncurses parted ];
diff --git a/nixpkgs/pkgs/tools/security/pass/clip-wayland-support.patch b/nixpkgs/pkgs/tools/security/pass/clip-wayland-support.patch
new file mode 100644
index 00000000000..7b8d2eb010d
--- /dev/null
+++ b/nixpkgs/pkgs/tools/security/pass/clip-wayland-support.patch
@@ -0,0 +1,113 @@
+From b0b784b1a57c0b06936e6f5d6560712b4b810cd3 Mon Sep 17 00:00:00 2001
+From: Brett Cornwall <brett@i--b.com>
+Date: Wed, 27 Feb 2019 00:08:33 -0700
+Subject: clip: Add support for wl-clipboard
+
+Edited to properly apply with
+`set-correct-program-name-for-sleep.patch`.
+
+---
+ README | 4 +++-
+ man/pass.1 | 5 +++++
+ src/password-store.sh | 26 +++++++++++++++++++++-----
+ 3 files changed, 29 insertions(+), 6 deletions(-)
+
+diff --git a/README b/README
+index 6b59965..1a46242 100644
+--- a/README
++++ b/README
+@@ -19,8 +19,10 @@ Depends on:
+ http://www.gnupg.org/
+ - git
+ http://www.git-scm.com/
+-- xclip
++- xclip (for X11 environments)
+ http://sourceforge.net/projects/xclip/
++- wl-clipboard (for wlroots Wayland-based environments)
++ https://github.com/bugaevc/wl-clipboard
+ - tree >= 1.7.0
+ http://mama.indstate.edu/users/ice/tree/
+ - GNU getopt
+diff --git a/man/pass.1 b/man/pass.1
+index 01a3fbe..a555dcb 100644
+--- a/man/pass.1
++++ b/man/pass.1
+@@ -99,6 +99,8 @@ Decrypt and print a password named \fIpass-name\fP. If \fI--clip\fP or \fI-c\fP
+ is specified, do not print the password but instead copy the first (or otherwise specified)
+ line to the clipboard using
+ .BR xclip (1)
++or
++.BR wl-clipboard(1)
+ and then restore the clipboard after 45 (or \fIPASSWORD_STORE_CLIP_TIME\fP) seconds. If \fI--qrcode\fP
+ or \fI-q\fP is specified, do not print the password but instead display a QR code using
+ .BR qrencode (1)
+@@ -132,6 +134,8 @@ in generating passwords can be changed with the \fIPASSWORD_STORE_CHARACTER_SET\
+ If \fI--clip\fP or \fI-c\fP is specified, do not print the password but instead copy
+ it to the clipboard using
+ .BR xclip (1)
++or
++.BR wl-clipboard(1)
+ and then restore the clipboard after 45 (or \fIPASSWORD_STORE_CLIP_TIME\fP) seconds. If \fI--qrcode\fP
+ or \fI-q\fP is specified, do not print the password but instead display a QR code using
+ .BR qrencode (1)
+@@ -466,6 +470,7 @@ The location of the text editor used by \fBedit\fP.
+ .BR tr (1),
+ .BR git (1),
+ .BR xclip (1),
++.BR wl-clipboard (1),
+ .BR qrencode (1).
+
+ .SH AUTHOR
+diff --git a/src/password-store.sh b/src/password-store.sh
+index d89d455..284eabf 100755
+--- a/src/password-store.sh
++++ b/src/password-store.sh
+@@ -152,16 +152,32 @@ check_sneaky_paths() {
+ #
+
+ clip() {
++ if [[ -n $WAYLAND_DISPLAY ]]; then
++ local copy_cmd=( wl-copy )
++ local paste_cmd=( wl-paste -n )
++ if [[ $X_SELECTION == primary ]]; then
++ copy_cmd+=( --primary )
++ paste_cmd+=( --primary )
++ fi
++ local display_name="$WAYLAND_DISPLAY"
++ elif [[ -n $DISPLAY ]]; then
++ local copy_cmd=( xclip -selection "$X_SELECTION" )
++ local paste_cmd=( xclip -o -selection "$X_SELECTION" )
++ local display_name="$DISPLAY"
++ else
++ die "Error: No X11 or Wayland display detected"
++ fi
++ local sleep_argv0="password store sleep on display $display_name"
++
+ # This base64 business is because bash cannot store binary data in a shell
+ # variable. Specifically, it cannot store nulls nor (non-trivally) store
+ # trailing new lines.
+- local sleep_argv0="password store sleep on display $DISPLAY"
+ pkill -P $(pgrep -f "^$sleep_argv0") 2>/dev/null && sleep 0.5
+- local before="$(xclip -o -selection "$X_SELECTION" 2>/dev/null | $BASE64)"
+- echo -n "$1" | xclip -selection "$X_SELECTION" || die "Error: Could not copy data to the clipboard"
++ local before="$("${paste_cmd[@]}" 2>/dev/null | $BASE64)"
++ echo -n "$1" | "${copy_cmd[@]}" || die "Error: Could not copy data to the clipboard"
+ (
+ ( exec -a "$sleep_argv0" bash <(echo trap 'kill %1' TERM\; sleep "$CLIP_TIME & wait") )
+- local now="$(xclip -o -selection "$X_SELECTION" | $BASE64)"
++ local now="$("${paste_cmd[@]}" | $BASE64)"
+ [[ $now != $(echo -n "$1" | $BASE64) ]] && before="$now"
+
+ # It might be nice to programatically check to see if klipper exists,
+@@ -173,7 +189,7 @@ clip() {
+ # so we axe it here:
+ qdbus org.kde.klipper /klipper org.kde.klipper.klipper.clearClipboardHistory &>/dev/null
+
+- echo "$before" | $BASE64 -d | xclip -selection "$X_SELECTION"
++ echo "$before" | $BASE64 -d | "${copy_cmd[@]}"
+ ) >/dev/null 2>&1 & disown
+ echo "Copied $2 to clipboard. Will clear in $CLIP_TIME seconds."
+ }
+--
+cgit v1.2.1-28-gf32c
+
diff --git a/nixpkgs/pkgs/tools/security/pass/default.nix b/nixpkgs/pkgs/tools/security/pass/default.nix
index aeb838c0576..5d0e94bc803 100644
--- a/nixpkgs/pkgs/tools/security/pass/default.nix
+++ b/nixpkgs/pkgs/tools/security/pass/default.nix
@@ -4,6 +4,7 @@
, xclip ? null, xdotool ? null, dmenu ? null
, x11Support ? !stdenv.isDarwin
+, waylandSupport ? false, wl-clipboard ? null
# For backwards-compatibility
, tombPluginSupport ? false
@@ -15,6 +16,8 @@ assert x11Support -> xclip != null
&& xdotool != null
&& dmenu != null;
+assert waylandSupport -> wl-clipboard != null;
+
let
passExtensions = import ./extensions { inherit pkgs; };
@@ -37,8 +40,11 @@ let
sha256 = "1x53k5dn3cdmvy8m4fqdld4hji5n676ksl0ql4armkmsds26av1b";
};
- patches = [ ./set-correct-program-name-for-sleep.patch
- ] ++ stdenv.lib.optional stdenv.isDarwin ./no-darwin-getopt.patch;
+ patches = [ ./set-correct-program-name-for-sleep.patch ]
+ ++ stdenv.lib.optional stdenv.isDarwin ./no-darwin-getopt.patch
+ # TODO (@Ma27) this patch adds support for wl-clipboard and can be removed during the next
+ # version bump.
+ ++ stdenv.lib.optional waylandSupport ./clip-wayland-support.patch;
nativeBuildInputs = [ makeWrapper ];
@@ -67,7 +73,8 @@ let
qrencode
procps
] ++ optional stdenv.isDarwin openssl
- ++ ifEnable x11Support [ dmenu xclip xdotool ]);
+ ++ ifEnable x11Support [ dmenu xclip xdotool ]
+ ++ optional waylandSupport wl-clipboard);
postFixup = ''
# Link extensions env
diff --git a/nixpkgs/pkgs/tools/security/pdfcrack/default.nix b/nixpkgs/pkgs/tools/security/pdfcrack/default.nix
index c235c98b971..bf8f014bcfd 100644
--- a/nixpkgs/pkgs/tools/security/pdfcrack/default.nix
+++ b/nixpkgs/pkgs/tools/security/pdfcrack/default.nix
@@ -2,11 +2,11 @@
stdenv.mkDerivation rec {
pname = "pdfcrack";
- version = "0.17";
+ version = "0.18";
src = fetchurl {
url = "mirror://sourceforge/pdfcrack/pdfcrack/pdfcrack-${version}.tar.gz";
- sha256 = "15hfxwr9yfzkx842p0jjdjnjarny6qc5fwcpy2f6lnq047pb26sn";
+ sha256 = "035s3jzrs3ci0i53x04dzpqp9225c4s52cd722d6zqra5b2sw8w2";
};
installPhase = ''
diff --git a/nixpkgs/pkgs/tools/security/scrypt/default.nix b/nixpkgs/pkgs/tools/security/scrypt/default.nix
index 2ca4c1df18c..66313b53649 100644
--- a/nixpkgs/pkgs/tools/security/scrypt/default.nix
+++ b/nixpkgs/pkgs/tools/security/scrypt/default.nix
@@ -2,11 +2,11 @@
stdenv.mkDerivation rec {
pname = "scrypt";
- version = "1.2.1";
+ version = "1.3.0";
src = fetchurl {
url = "https://www.tarsnap.com/scrypt/${pname}-${version}.tgz";
- sha256 = "0xy5yhrwwv13skv9im9vm76rybh9f29j2dh4hlh2x01gvbkza8a6";
+ sha256 = "0j17yfrpi2bk5cawb4a4mzpv1vadqxh956hx0pa1gqfisknk8c16";
};
buildInputs = [ openssl ];
diff --git a/nixpkgs/pkgs/tools/security/sequoia/default.nix b/nixpkgs/pkgs/tools/security/sequoia/default.nix
index 9d6928abf86..554ed93f093 100644
--- a/nixpkgs/pkgs/tools/security/sequoia/default.nix
+++ b/nixpkgs/pkgs/tools/security/sequoia/default.nix
@@ -87,5 +87,6 @@ rustPlatform.buildRustPackage rec {
license = licenses.gpl3;
maintainers = with maintainers; [ minijackson doronbehar ];
platforms = platforms.all;
+ broken = true;
};
}
diff --git a/nixpkgs/pkgs/tools/security/thc-hydra/default.nix b/nixpkgs/pkgs/tools/security/thc-hydra/default.nix
index 14fc89e9170..aa36901e46b 100644
--- a/nixpkgs/pkgs/tools/security/thc-hydra/default.nix
+++ b/nixpkgs/pkgs/tools/security/thc-hydra/default.nix
@@ -1,4 +1,4 @@
-{ stdenv, lib, fetchFromGitHub, zlib, openssl, ncurses, libidn, pcre, libssh, mysql, postgresql
+{ stdenv, lib, fetchFromGitHub, zlib, openssl, ncurses, libidn, pcre, libssh, libmysqlclient, postgresql
, withGUI ? false, makeWrapper, pkgconfig, gtk2 }:
stdenv.mkDerivation rec {
@@ -26,7 +26,7 @@ stdenv.mkDerivation rec {
nativeBuildInputs = lib.optionals withGUI [ pkgconfig makeWrapper ];
buildInputs = [
- zlib openssl ncurses libidn pcre libssh mysql.connector-c postgresql
+ zlib openssl ncurses libidn pcre libssh libmysqlclient postgresql
] ++ lib.optional withGUI gtk2;
enableParallelBuilding = true;
diff --git a/nixpkgs/pkgs/tools/security/vulnix/default.nix b/nixpkgs/pkgs/tools/security/vulnix/default.nix
index 2f7986c128b..25d3e8d105b 100644
--- a/nixpkgs/pkgs/tools/security/vulnix/default.nix
+++ b/nixpkgs/pkgs/tools/security/vulnix/default.nix
@@ -27,6 +27,7 @@ pythonPackages.buildPythonApplication rec {
lxml
pyyaml
requests
+ setuptools
toml
zodb
]);
diff --git a/nixpkgs/pkgs/tools/system/bfs/default.nix b/nixpkgs/pkgs/tools/system/bfs/default.nix
index 8443314cf71..a304fce352f 100644
--- a/nixpkgs/pkgs/tools/system/bfs/default.nix
+++ b/nixpkgs/pkgs/tools/system/bfs/default.nix
@@ -2,13 +2,13 @@
stdenv.mkDerivation rec {
pname = "bfs";
- version = "1.5";
+ version = "1.5.1";
src = fetchFromGitHub {
repo = "bfs";
owner = "tavianator";
rev = version;
- sha256 = "0lyrxbmfr4ckz4hx5dgz8xbq479l5rlyrqf205v6c82cap4zyv4x";
+ sha256 = "1yp8zaj2rqd1df20wxym1x7q5d3lxqwalazbvmfnwqn5y4m368y3";
};
buildInputs = stdenv.lib.optionals stdenv.isLinux [ libcap acl ];
diff --git a/nixpkgs/pkgs/tools/system/collectd/default.nix b/nixpkgs/pkgs/tools/system/collectd/default.nix
index 1df73e08d1e..3e7e4e5969a 100644
--- a/nixpkgs/pkgs/tools/system/collectd/default.nix
+++ b/nixpkgs/pkgs/tools/system/collectd/default.nix
@@ -22,7 +22,7 @@
, libtool
, lm_sensors
, lvm2
-, mysql
+, libmysqlclient
, numactl
, postgresql
, protobufc
@@ -63,7 +63,7 @@ stdenv.mkDerivation rec {
libxml2 postgresql protobufc rrdtool
varnish yajl jdk libtool python hiredis libmicrohttpd
riemann_c_client mosquitto rdkafka mongoc
- ] ++ stdenv.lib.optionals (mysql != null) [ mysql.connector-c
+ ] ++ stdenv.lib.optionals (libmysqlclient != null) [ libmysqlclient
] ++ stdenv.lib.optionals stdenv.isLinux [
iptables libatasmart libcredis libmodbus libsigrok
lm_sensors lvm2 rabbitmq-c udev net_snmp libmnl
diff --git a/nixpkgs/pkgs/tools/system/ctop/default.nix b/nixpkgs/pkgs/tools/system/ctop/default.nix
index effc879e478..8d8b710750c 100644
--- a/nixpkgs/pkgs/tools/system/ctop/default.nix
+++ b/nixpkgs/pkgs/tools/system/ctop/default.nix
@@ -11,6 +11,12 @@ buildGoModule rec {
sha256 = "0mm6hl5qklfv0yffj6cgypsgcrk4fq6p60djycfgj20yhz9cmf9x";
};
+ patches = [
+ # Version 0.7.2 does not build with go 1.13.
+ # TODO: Remove once(and if) https://github.com/bcicen/ctop/pull/178 is merged and lands in a release.
+ ./go-1.13-deps.patch
+ ];
+
modSha256 = "0ad1gvamckg94r7f68cnjdbq9nyz6c3hh339hy4hghxd3rd1qskn";
meta = with lib; {
diff --git a/nixpkgs/pkgs/tools/system/ctop/go-1.13-deps.patch b/nixpkgs/pkgs/tools/system/ctop/go-1.13-deps.patch
new file mode 100644
index 00000000000..153c0f36f81
--- /dev/null
+++ b/nixpkgs/pkgs/tools/system/ctop/go-1.13-deps.patch
@@ -0,0 +1,90 @@
+diff --git a/go.mod b/go.mod
+index 4921cba..cbb4028 100644
+--- a/go.mod
++++ b/go.mod
+@@ -18,9 +18,6 @@ require (
+ github.com/golang/protobuf v0.0.0-20170712042213-0a4f71a498b7 // indirect
+ github.com/hashicorp/go-cleanhttp v0.0.0-20170211013415-3573b8b52aa7 // indirect
+ github.com/jgautheron/codename-generator v0.0.0-20150829203204-16d037c7cc3c
+- github.com/kr/pretty v0.1.0 // indirect
+- github.com/maruel/panicparse v0.0.0-20170227222818-25bcac0d793c // indirect
+- github.com/maruel/ut v1.0.0 // indirect
+ github.com/mattn/go-runewidth v0.0.0-20170201023540-14207d285c6c // indirect
+ github.com/mitchellh/go-wordwrap v0.0.0-20150314170334-ad45545899c7 // indirect
+ github.com/nsf/termbox-go v0.0.0-20180303152453-e2050e41c884
+@@ -39,3 +36,5 @@ require (
+ )
+
+ replace github.com/gizak/termui => github.com/bcicen/termui v0.0.0-20180326052246-4eb80249d3f5
++
++go 1.13
+diff --git a/go.sum b/go.sum
+new file mode 100644
+index 0000000..5ca7d55
+--- /dev/null
++++ b/go.sum
+@@ -0,0 +1,64 @@
++github.com/Azure/go-ansiterm v0.0.0-20160622173216-fa152c58bc15 h1:VtP6TygBMvrR+SMMPHj3z3jvnj4vcafMRLIw4at7xww=
++github.com/Azure/go-ansiterm v0.0.0-20160622173216-fa152c58bc15/go.mod h1:LmzpDX56iTiv29bbRTIsUNlaFfuhWRQBWjQdVyAevI8=
++github.com/BurntSushi/toml v0.3.0 h1:e1/Ivsx3Z0FVTV0NSOv/aVgbUWyQuzj7DDnFblkRvsY=
++github.com/BurntSushi/toml v0.3.0/go.mod h1:xHWCNGjB5oqiDr8zfno3MHue2Ht5sIBksp03qcyfWMU=
++github.com/Microsoft/go-winio v0.3.8 h1:dvxbxtpTIjdAbx2OtL26p4eq0iEvys/U5yrsTJb3NZI=
++github.com/Microsoft/go-winio v0.3.8/go.mod h1:VhR8bwka0BXejwEJY73c50VrPtXAaKcyvVC4A4RozmA=
++github.com/Nvveen/Gotty v0.0.0-20120604004816-cd527374f1e5 h1:TngWCqHvy9oXAN6lEVMRuU21PR1EtLVZJmdB18Gu3Rw=
++github.com/Nvveen/Gotty v0.0.0-20120604004816-cd527374f1e5/go.mod h1:lmUJ/7eu/Q8D7ML55dXQrVaamCz2vxCfdQBasLZfHKk=
++github.com/Sirupsen/logrus v0.0.0-20150423025312-26709e271410 h1:RxP6uUzJlS1Qa3+HYls3u+nQMKlnqC3RhL7wWC4Y4+E=
++github.com/Sirupsen/logrus v0.0.0-20150423025312-26709e271410/go.mod h1:rmk17hk6i8ZSAJkSDa7nOxamrG+SP4P0mm+DAvExv4U=
++github.com/bcicen/termui v0.0.0-20180326052246-4eb80249d3f5 h1:2pI3ZsoefWIi++8EqmANoC7Px/v2lRwnleVUcCuFgLg=
++github.com/bcicen/termui v0.0.0-20180326052246-4eb80249d3f5/go.mod h1:yIA9ITWZD1p4/DvCQ44xvhyVb9XEUlVnY1rzGSHwbiM=
++github.com/c9s/goprocinfo v0.0.0-20170609001544-b34328d6e0cd h1:xqaBnULC8wEnQpRDXAsDgXkU/STqoluz1REOoegSfNU=
++github.com/c9s/goprocinfo v0.0.0-20170609001544-b34328d6e0cd/go.mod h1:uEyr4WpAH4hio6LFriaPkL938XnrvLpNPmQHBdrmbIE=
++github.com/coreos/go-systemd v0.0.0-20151104194251-b4a58d95188d h1:MJ4ge3i0lehw+gE3JcGUUp8TmWjsLAlQlhmdASs/9wk=
++github.com/coreos/go-systemd v0.0.0-20151104194251-b4a58d95188d/go.mod h1:F5haX7vjVVG0kc13fIWeqUViNPyEJxv/OmvnBo0Yme4=
++github.com/davecgh/go-spew v1.1.1 h1:vj9j/u1bqnvCEfJOwUhtlOARqs3+rkHYY13jYWTU97c=
++github.com/davecgh/go-spew v1.1.1/go.mod h1:J7Y8YcW2NihsgmVo/mv3lAwl/skON4iLHjSsI+c5H38=
++github.com/docker/docker v0.0.0-20170502054910-90d35abf7b35 h1:ly3dRUfvdP5i/t9iqVHd2VQQIDtO3tpfFWPah7g4CFw=
++github.com/docker/docker v0.0.0-20170502054910-90d35abf7b35/go.mod h1:eEKB0N0r5NX/I1kEveEz05bcu8tLC/8azJZsviup8Sk=
++github.com/docker/go-connections v0.0.0-20170301234100-a2afab980204 h1:JYhQLEn7v7EtrpA9ByRz51gwlk8qt12EGP9XlbX/qw4=
++github.com/docker/go-connections v0.0.0-20170301234100-a2afab980204/go.mod h1:Gbd7IOopHjR8Iph03tsViu4nIes5XhDvyHbTtUxmeec=
++github.com/docker/go-units v0.3.2 h1:Kjm80apys7gTtfVmCvVY8gwu10uofaFSrmAKOVrtueE=
++github.com/docker/go-units v0.3.2/go.mod h1:fgPhTUdO+D/Jk86RDLlptpiXQzgHJF7gydDDbaIK4Dk=
++github.com/fsouza/go-dockerclient v0.0.0-20170307141636-318513eb1ab2 h1:JuVaWSoRMBrstn2l8cxKXjK8l/qurk5qyJ9dq7EIQmU=
++github.com/fsouza/go-dockerclient v0.0.0-20170307141636-318513eb1ab2/go.mod h1:KpcjM623fQYE9MZiTGzKhjfxXAV9wbyX2C1cyRHfhl0=
++github.com/godbus/dbus v0.0.0-20151105175453-c7fdd8b5cd55 h1:oIgNYSrSUbNH5DJh6DMhU1PiOKOYIHNxrV3djLsLpEI=
++github.com/godbus/dbus v0.0.0-20151105175453-c7fdd8b5cd55/go.mod h1:/YcGZj5zSblfDWMMoOzV4fas9FZnQYTkDnsGvmh2Grw=
++github.com/golang/protobuf v0.0.0-20170712042213-0a4f71a498b7 h1:ulJ2cj/xlDlrwLCvWH4UeV9vJ/jXP6wEGgTSF7EOnmQ=
++github.com/golang/protobuf v0.0.0-20170712042213-0a4f71a498b7/go.mod h1:6lQm79b+lXiMfvg/cZm0SGofjICqVBUtrP5yJMmIC1U=
++github.com/hashicorp/go-cleanhttp v0.0.0-20170211013415-3573b8b52aa7 h1:67fHcS+inUoiIqWCKIqeDuq2AlPHNHPiTqp97LdQ+bc=
++github.com/hashicorp/go-cleanhttp v0.0.0-20170211013415-3573b8b52aa7/go.mod h1:JpRdi6/HCYpAwUzNwuwqhbovhLtngrth3wmdIIUrZ80=
++github.com/jgautheron/codename-generator v0.0.0-20150829203204-16d037c7cc3c h1:/hc+TxW4Q1v6aqNPHE5jiaNF2xEK0CzWTgo25RQhQ+U=
++github.com/jgautheron/codename-generator v0.0.0-20150829203204-16d037c7cc3c/go.mod h1:FJRkXmPrkHw0WDjB/LXMUhjWJ112Y6JUYnIVBOy8oH8=
++github.com/mattn/go-runewidth v0.0.0-20170201023540-14207d285c6c h1:eFzthqtg3W6Pihj3DMTXLAF4f+ge5r5Ie5g6HLIZAF0=
++github.com/mattn/go-runewidth v0.0.0-20170201023540-14207d285c6c/go.mod h1:LwmH8dsx7+W8Uxz3IHJYH5QSwggIsqBzpuz5H//U1FU=
++github.com/mitchellh/go-wordwrap v0.0.0-20150314170334-ad45545899c7 h1:DpOJ2HYzCv8LZP15IdmG+YdwD2luVPHITV96TkirNBM=
++github.com/mitchellh/go-wordwrap v0.0.0-20150314170334-ad45545899c7/go.mod h1:ZXFpozHsX6DPmq2I0TCekCxypsnAUbP2oI0UX1GXzOo=
++github.com/nsf/termbox-go v0.0.0-20180303152453-e2050e41c884 h1:fcs71SMqqDhUD+PbpIv9xf3EH9F9s6HfiLwr6jKm1VA=
++github.com/nsf/termbox-go v0.0.0-20180303152453-e2050e41c884/go.mod h1:IuKpRQcYE1Tfu+oAQqaLisqDeXgjyyltCfsaoYN18NQ=
++github.com/nu7hatch/gouuid v0.0.0-20131221200532-179d4d0c4d8d h1:VhgPp6v9qf9Agr/56bj7Y/xa04UccTW04VP0Qed4vnQ=
++github.com/nu7hatch/gouuid v0.0.0-20131221200532-179d4d0c4d8d/go.mod h1:YUTz3bUH2ZwIWBy3CJBeOBEugqcmXREj14T+iG/4k4U=
++github.com/op/go-logging v0.0.0-20160211212156-b2cb9fa56473 h1:J1QZwDXgZ4dJD2s19iqR9+U00OWM2kDzbf1O/fmvCWg=
++github.com/op/go-logging v0.0.0-20160211212156-b2cb9fa56473/go.mod h1:HzydrMdWErDVzsI23lYNej1Htcns9BCg93Dk0bBINWk=
++github.com/opencontainers/runc v0.1.1 h1:GlxAyO6x8rfZYN9Tt0Kti5a/cP41iuiO2yYT0IJGY8Y=
++github.com/opencontainers/runc v0.1.1/go.mod h1:qT5XzbpPznkRYVz/mWwUaVBUv2rmF59PVA73FjuZG0U=
++github.com/pmezard/go-difflib v1.0.0 h1:4DBwDE0NGyQoBHbLQYPwSUPoCMWR5BEzIk/f1lZbAQM=
++github.com/pmezard/go-difflib v1.0.0/go.mod h1:iKH77koFhYxTK1pcRnkKkqfTogsbg7gZNVY4sRDYZ/4=
++github.com/seccomp/libseccomp-golang v0.0.0-20150813023252-1b506fc7c24e h1:HJbgNpzYMeTLPpkMwbPNTPlhNd9r4xQtqcZG6qoIGgs=
++github.com/seccomp/libseccomp-golang v0.0.0-20150813023252-1b506fc7c24e/go.mod h1:GbW5+tmTXfcxTToHLXlScSlAvWlF4P2Ca7zGrPiEpWo=
++github.com/stretchr/testify v1.2.2 h1:bSDNvY7ZPG5RlJ8otE/7V6gMiyenm9RtJ7IUVIAoJ1w=
++github.com/stretchr/testify v1.2.2/go.mod h1:a8OnRcib4nhh0OaRAV+Yts87kKdq0PP7pXfy6kDkUVs=
++github.com/syndtr/gocapability v0.0.0-20150716010906-2c00daeb6c3b h1:UzwAjzrPQVJoxLfb26YI2WRrhD3g09ZHt9vAQckWiPY=
++github.com/syndtr/gocapability v0.0.0-20150716010906-2c00daeb6c3b/go.mod h1:hkRG7XYTFWNJGYcbNJQlaLq0fg1yr4J4t/NcTQtrfww=
++github.com/vishvananda/netlink v0.0.0-20150820014904-1e2e08e8a2dc h1:0HAHLwEY4k1VqaO1SzBi4XxT0KA06Cv+QW2LXknBk9g=
++github.com/vishvananda/netlink v0.0.0-20150820014904-1e2e08e8a2dc/go.mod h1:+SR5DhBJrl6ZM7CoCKvpw5BKroDKQ+PJqOg65H/2ktk=
++github.com/vishvananda/netns v0.0.0-20180720170159-13995c7128cc h1:R83G5ikgLMxrBvLh22JhdfI8K6YXEPHx5P03Uu3DRs4=
++github.com/vishvananda/netns v0.0.0-20180720170159-13995c7128cc/go.mod h1:ZjcWmFBXmLKZu9Nxj3WKYEafiSqer2rnvPr0en9UNpI=
++golang.org/x/net v0.0.0-20170308210134-a6577fac2d73 h1:5kGFsglTK4KqaHYb/WCmYmj+Gm1+dzbilbtzruHj6dw=
++golang.org/x/net v0.0.0-20170308210134-a6577fac2d73/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4=
++golang.org/x/sync v0.0.0-20181108010431-42b317875d0f h1:Bl/8QSvNqXvPGPGXa2z5xUTmV7VDcZyvRZ+QQXkXTZQ=
++golang.org/x/sync v0.0.0-20181108010431-42b317875d0f/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
++golang.org/x/sys v0.0.0-20170308153327-99f16d856c98 h1:U3NsAsR1IG0Aet3Z+IToBDWbPoJ7hjwgDpqqch4APkU=
++golang.org/x/sys v0.0.0-20170308153327-99f16d856c98/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY=
diff --git a/nixpkgs/pkgs/tools/system/di/default.nix b/nixpkgs/pkgs/tools/system/di/default.nix
index 9d56b8488e5..48335d28d46 100644
--- a/nixpkgs/pkgs/tools/system/di/default.nix
+++ b/nixpkgs/pkgs/tools/system/di/default.nix
@@ -5,7 +5,7 @@ stdenv.mkDerivation rec {
version = "4.47.1";
src = fetchurl {
- url = "http://gentoo.com/di/${pname}-${version}.tar.gz";
+ url = "https://gentoo.com/${pname}/${pname}-${version}.tar.gz";
sha256 = "1bdbl9k3gqf4h6g21difqc0w17pjid6r587y19wi37vx36aava7f";
};
@@ -13,8 +13,9 @@ stdenv.mkDerivation rec {
meta = with stdenv.lib; {
description = "Disk information utility; displays everything 'df' does and more";
- homepage = http://www.gentoo.com/di/;
+ homepage = https://gentoo.com/di/;
license = licenses.zlib;
+ updateWalker = true;
maintainers = with maintainers; [ manveru ndowens ];
platforms = platforms.all;
};
diff --git a/nixpkgs/pkgs/tools/system/fio/default.nix b/nixpkgs/pkgs/tools/system/fio/default.nix
index 5a690b28845..b6ad10ec645 100644
--- a/nixpkgs/pkgs/tools/system/fio/default.nix
+++ b/nixpkgs/pkgs/tools/system/fio/default.nix
@@ -4,13 +4,13 @@
stdenv.mkDerivation rec {
pname = "fio";
- version = "3.15";
+ version = "3.16";
src = fetchFromGitHub {
owner = "axboe";
repo = "fio";
rev = "fio-${version}";
- sha256 = "0wzy5byc2qx5mbnwkcyjkrzc662n4wkrzpcg4h611q4ix494zka9";
+ sha256 = "10ygvmzsrqh2bs8v0a304gkl8h50437xfaz1ck7j2ymckipnbha0";
};
buildInputs = [ python zlib ]
diff --git a/nixpkgs/pkgs/tools/system/inxi/default.nix b/nixpkgs/pkgs/tools/system/inxi/default.nix
index 3c1e3e79862..a896a57b080 100644
--- a/nixpkgs/pkgs/tools/system/inxi/default.nix
+++ b/nixpkgs/pkgs/tools/system/inxi/default.nix
@@ -1,4 +1,4 @@
-{ stdenv, fetchFromGitHub, perl }:
+{ stdenv, fetchFromGitHub, perl, perlPackages, makeWrapper }:
stdenv.mkDerivation rec {
pname = "inxi";
@@ -11,11 +11,13 @@ stdenv.mkDerivation rec {
sha256 = "04134l323vwd0g2bffj11rnpw2jgs9la6aqrmv8vh7w9mq5nd57y";
};
- buildInputs = [ perl ];
+ buildInputs = [ perl makeWrapper ];
installPhase = ''
mkdir -p $out/bin
cp inxi $out/bin/
+ wrapProgram $out/bin/inxi \
+ --set PERL5LIB "${perlPackages.makePerlPath (with perlPackages; [ CpanelJSONXS ])}"
mkdir -p $out/share/man/man1
cp inxi.1 $out/share/man/man1/
'';
diff --git a/nixpkgs/pkgs/tools/system/logrotate/default.nix b/nixpkgs/pkgs/tools/system/logrotate/default.nix
index cee092f755f..9fd6c4ea81a 100644
--- a/nixpkgs/pkgs/tools/system/logrotate/default.nix
+++ b/nixpkgs/pkgs/tools/system/logrotate/default.nix
@@ -4,13 +4,13 @@
stdenv.mkDerivation rec {
pname = "logrotate";
- version = "3.15.0";
+ version = "3.15.1";
src = fetchFromGitHub {
owner = "logrotate";
repo = "logrotate";
rev = version;
- sha256 = "094wv4d3gv5dmw55d0xij06lgcg5q9bmq49hipc2jhp4vdsj4xr5";
+ sha256 = "0l92zarygp34qnw3p5rcwqsvgz7zmmhi7lgh00vj2jb9zkjbldc0";
};
# Logrotate wants to access the 'mail' program; to be done.
diff --git a/nixpkgs/pkgs/tools/system/netdata/default.nix b/nixpkgs/pkgs/tools/system/netdata/default.nix
index 7526a55d7ef..b04bc905ec0 100644
--- a/nixpkgs/pkgs/tools/system/netdata/default.nix
+++ b/nixpkgs/pkgs/tools/system/netdata/default.nix
@@ -12,12 +12,12 @@
with stdenv.lib;
stdenv.mkDerivation rec {
- version = "1.17.1";
+ version = "1.18.0";
pname = "netdata";
src = fetchurl {
url = "https://github.com/netdata/netdata/releases/download/v${version}/netdata-v${version}.tar.gz";
- sha256 = "0k49ms295b9icccvknyqyqlsy911h06c7h7aql5havcx5m5jxq7w";
+ sha256 = "1ay22x3ydmfh7649scampr0xvgzb32rvbs6fk57xx64sav8vx607";
};
nativeBuildInputs = [ autoreconfHook pkgconfig ];
diff --git a/nixpkgs/pkgs/tools/system/rsyslog/default.nix b/nixpkgs/pkgs/tools/system/rsyslog/default.nix
index 2899837f3f8..34b7b7d908a 100644
--- a/nixpkgs/pkgs/tools/system/rsyslog/default.nix
+++ b/nixpkgs/pkgs/tools/system/rsyslog/default.nix
@@ -1,5 +1,5 @@
{ stdenv, fetchurl, pkgconfig, autoreconfHook, libestr, json_c, zlib, pythonPackages, fastJson
-, libkrb5 ? null, systemd ? null, jemalloc ? null, mysql ? null, postgresql ? null
+, libkrb5 ? null, systemd ? null, jemalloc ? null, libmysqlclient ? null, postgresql ? null
, libdbi ? null, net_snmp ? null, libuuid ? null, curl ? null, gnutls ? null
, libgcrypt ? null, liblognorm ? null, openssl ? null, librelp ? null, libksi ? null
, libgt ? null, liblogging ? null, libnet ? null, hadoop ? null, rdkafka ? null
@@ -26,7 +26,7 @@ stdenv.mkDerivation rec {
postgresql libdbi net_snmp libuuid curl gnutls libgcrypt liblognorm openssl
librelp libgt libksi liblogging libnet hadoop rdkafka libmongo-client czmq
rabbitmq-c hiredis mongoc
- ] ++ stdenv.lib.optional (mysql != null) mysql.connector-c
+ ] ++ stdenv.lib.optional (libmysqlclient != null) libmysqlclient
++ stdenv.lib.optional stdenv.isLinux systemd;
hardeningDisable = [ "format" ];
@@ -50,7 +50,7 @@ stdenv.mkDerivation rec {
(mkFlag false "valgrind")
(mkFlag false "diagtools")
(mkFlag true "usertools")
- (mkFlag (mysql != null) "mysql")
+ (mkFlag (libmysqlclient != null) "mysql")
(mkFlag (postgresql != null) "pgsql")
(mkFlag (libdbi != null) "libdbi")
(mkFlag (net_snmp != null) "snmp")
diff --git a/nixpkgs/pkgs/tools/system/stress-ng/default.nix b/nixpkgs/pkgs/tools/system/stress-ng/default.nix
index 9a9879d5564..7f7ce425fa7 100644
--- a/nixpkgs/pkgs/tools/system/stress-ng/default.nix
+++ b/nixpkgs/pkgs/tools/system/stress-ng/default.nix
@@ -4,11 +4,11 @@
stdenv.mkDerivation rec {
pname = "stress-ng";
- version = "0.10.02";
+ version = "0.10.05";
src = fetchurl {
url = "https://kernel.ubuntu.com/~cking/tarballs/${pname}/${pname}-${version}.tar.xz";
- sha256 = "100daxz0j80jhmpfnqa78mvfwq1qj7zb67y7w9f747a0f1havvim";
+ sha256 = "0hkghs99fl8kzg3lkkd4w6cj5133zr9a415py0ng60kzrfffmgdy";
};
# All platforms inputs then Linux-only ones
@@ -21,6 +21,8 @@ stdenv.mkDerivation rec {
substituteInPlace Makefile --replace "/usr" ""
'';
+ NIX_CFLAGS_COMPILE = stdenv.lib.optional stdenv.hostPlatform.isMusl "-D_LINUX_SYSINFO_H=1";
+
# Won't build on i686 because the binary will be linked again in the
# install phase without checking the dependencies. This will prevent
# triggering the rebuild. Why this only happens on i686 remains a
diff --git a/nixpkgs/pkgs/tools/system/thinkfan/default.nix b/nixpkgs/pkgs/tools/system/thinkfan/default.nix
index 8c803400584..f3b4ab8440e 100644
--- a/nixpkgs/pkgs/tools/system/thinkfan/default.nix
+++ b/nixpkgs/pkgs/tools/system/thinkfan/default.nix
@@ -1,34 +1,46 @@
-{ stdenv, fetchurl, cmake
+{ stdenv, fetchFromGitHub, cmake, libyamlcpp, pkgconfig
, smartSupport ? false, libatasmart }:
stdenv.mkDerivation rec {
pname = "thinkfan";
- version = "0.9.3";
+ version = "1.0.2";
- src = fetchurl {
- url = "mirror://sourceforge/thinkfan/thinkfan-${version}.tar.gz";
- sha256 = "0nz4c48f0i0dljpk5y33c188dnnwg8gz82s4grfl8l64jr4n675n";
+ src = fetchFromGitHub {
+ owner = "vmatare";
+ repo = "thinkfan";
+ rev = version;
+ sha256 = "107vw0962hrwva3wra9n3hxlbfzg82ldc10qssv3dspja88g8psr";
};
- nativeBuildInputs = [ cmake ];
+ cmakeFlags = [
+ "-DCMAKE_INSTALL_DOCDIR=share/doc/${pname}"
+ "-DUSE_NVML=OFF"
+ ] ++ stdenv.lib.optional smartSupport "-DUSE_ATASMART=ON";
- buildInputs = stdenv.lib.optional smartSupport libatasmart;
+ nativeBuildInputs = [ cmake pkgconfig ];
- cmakeFlags = stdenv.lib.optional smartSupport "-DUSE_ATASMART=ON";
+ buildInputs = [ libyamlcpp ] ++ stdenv.lib.optional smartSupport libatasmart;
installPhase = ''
+ runHook preInstall
+
install -Dm755 {.,$out/bin}/thinkfan
cd "$NIX_BUILD_TOP"; cd "$sourceRoot" # attempt to be a bit robust
install -Dm644 {.,$out/share/doc/thinkfan}/README
cp -R examples $out/share/doc/thinkfan
install -Dm644 {src,$out/share/man/man1}/thinkfan.1
+
+ runHook postInstall
'';
- meta = {
- license = stdenv.lib.licenses.gpl3;
- homepage = http://thinkfan.sourceforge.net/;
- maintainers = with stdenv.lib.maintainers; [ domenkozar ];
- platforms = stdenv.lib.platforms.linux;
+ meta = with stdenv.lib; {
+ description = "A minimalist fan control program. Originally designed
+specifically for IBM/Lenovo Thinkpads, it now supports any kind of system via
+the sysfs hwmon interface (/sys/class/hwmon).";
+ license = licenses.gpl3;
+ homepage = "https://github.com/vmatare/thinkfan";
+ maintainers = with maintainers; [ domenkozar ];
+ platforms = platforms.linux;
};
}
diff --git a/nixpkgs/pkgs/tools/system/uptimed/default.nix b/nixpkgs/pkgs/tools/system/uptimed/default.nix
index 71a5726759c..2e856aaf9be 100644
--- a/nixpkgs/pkgs/tools/system/uptimed/default.nix
+++ b/nixpkgs/pkgs/tools/system/uptimed/default.nix
@@ -2,10 +2,10 @@
stdenv.mkDerivation rec {
pname = "uptimed";
- version = "0.4.1";
+ version = "0.4.2";
src = fetchFromGitHub {
- sha256 = "0hqs7n3agayckwdgwadzw5shpdh4h1inqgvp4zr5fi324pj5x80j";
+ sha256 = "0wnnpjfxnycigqj6hag0n6p5piss8cv40y9jda72d9s4df5n91z8";
rev = "v${version}";
repo = "uptimed";
owner = "rpodgorny";
diff --git a/nixpkgs/pkgs/tools/system/which/default.nix b/nixpkgs/pkgs/tools/system/which/default.nix
index be2892e52e8..12aac2508cb 100644
--- a/nixpkgs/pkgs/tools/system/which/default.nix
+++ b/nixpkgs/pkgs/tools/system/which/default.nix
@@ -10,6 +10,7 @@ stdenv.mkDerivation rec {
meta = with stdenv.lib; {
homepage = https://www.gnu.org/software/which/;
+ description = "Shows the full path of (shell) commands";
platforms = platforms.all;
license = licenses.gpl3;
};
diff --git a/nixpkgs/pkgs/tools/text/catdoc/default.nix b/nixpkgs/pkgs/tools/text/catdoc/default.nix
index 16d5b9995c2..d4f40270915 100644
--- a/nixpkgs/pkgs/tools/text/catdoc/default.nix
+++ b/nixpkgs/pkgs/tools/text/catdoc/default.nix
@@ -11,8 +11,8 @@ stdenv.mkDerivation rec {
patches = [
(fetchpatch {
- url = "https://anonscm.debian.org/git/collab-maint/catdoc.git/diff/debian/patches/05-CVE-2017-11110.patch?id=21dd5b29b11be04149587657dd90253f52dfef0b";
- sha256 = "0mdqa9w1p6cmli6976v4wi0sw9r4p5prkj7lzfd1877wk11c9c73";
+ url = "https://sources.debian.org/data/main/c/catdoc/1:0.95-4.1/debian/patches/05-CVE-2017-11110.patch";
+ sha256 = "1ljnwvssvzig94hwx8843b88p252ww2lbxh8zybcwr3kwwlcymx7";
})
];
diff --git a/nixpkgs/pkgs/tools/text/diffr/default.nix b/nixpkgs/pkgs/tools/text/diffr/default.nix
new file mode 100644
index 00000000000..c032d2e8b36
--- /dev/null
+++ b/nixpkgs/pkgs/tools/text/diffr/default.nix
@@ -0,0 +1,29 @@
+{ stdenv, fetchFromGitHub, rustPlatform, Security }:
+
+rustPlatform.buildRustPackage rec {
+ pname = "diffr";
+ version = "v0.1.2";
+
+ # diffr's tests expect the diffr binary to be at `$CARGO_MANIFEST_DIR/target/debug/diffr`.
+ doCheck = false;
+
+ src = fetchFromGitHub {
+ owner = "mookid";
+ repo = pname;
+ rev = version;
+ sha256 = "1fpcyl4kc4djfl6a2jlj56xqra42334vygz8n7614zgjpyxz3zx2";
+ };
+
+ cargoSha256 = "1dddb3a547qnpm1vvrgffb3v9m8sh19hmhy0fg6xjqpm032lqx3v";
+
+ nativeBuildInputs = [];
+ buildInputs = (stdenv.lib.optional stdenv.isDarwin Security);
+
+ meta = with stdenv.lib; {
+ description = "Yet another diff highlighting tool";
+ homepage = https://github.com/mookid/diffr;
+ license = with licenses; [ mit ];
+ maintainers = with maintainers; [ davidtwco ];
+ platforms = platforms.all;
+ };
+}
diff --git a/nixpkgs/pkgs/tools/text/dos2unix/default.nix b/nixpkgs/pkgs/tools/text/dos2unix/default.nix
index bd72ec94714..146338df916 100644
--- a/nixpkgs/pkgs/tools/text/dos2unix/default.nix
+++ b/nixpkgs/pkgs/tools/text/dos2unix/default.nix
@@ -2,25 +2,21 @@
stdenv.mkDerivation rec {
pname = "dos2unix";
- version = "7.4.0";
+ version = "7.4.1";
src = fetchurl {
url = "https://waterlan.home.xs4all.nl/dos2unix/${pname}-${version}.tar.gz";
- sha256 = "12h4c61g376bhq03y5g2xszkrkrj5hwd928rly3xsp6rvfmnbixs";
+ sha256 = "08w6yywzirsxq8bh87jycvvw922ybhc2l426j2iqzliyn1h8mm8w";
};
- configurePhase = ''
- substituteInPlace Makefile \
- --replace /usr $out
- '';
-
nativeBuildInputs = [ perl gettext ];
+ makeFlags = [ "prefix=${placeholder "out"}" ];
meta = with stdenv.lib; {
- homepage = http://waterlan.home.xs4all.nl/dos2unix.html;
- description = "Tools to transform text files from dos to unix formats and vicervesa";
+ description = "Convert text files with DOS or Mac line breaks to Unix line breaks and vice versa";
+ homepage = "https://waterlan.home.xs4all.nl/dos2unix.html";
+ changelog = "https://sourceforge.net/p/dos2unix/dos2unix/ci/dos2unix-${version}/tree/dos2unix/NEWS.txt?format=raw";
license = licenses.bsd2;
- maintainers = with maintainers; [ndowens ];
-
+ maintainers = with maintainers; [ c0bw3b ndowens ];
};
}
diff --git a/nixpkgs/pkgs/tools/text/fanficfare/default.nix b/nixpkgs/pkgs/tools/text/fanficfare/default.nix
index 87306a61e0d..556b868e161 100644
--- a/nixpkgs/pkgs/tools/text/fanficfare/default.nix
+++ b/nixpkgs/pkgs/tools/text/fanficfare/default.nix
@@ -2,11 +2,11 @@
python3Packages.buildPythonApplication rec {
pname = "FanFicFare";
- version = "3.10.5";
+ version = "3.11.0";
src = python3Packages.fetchPypi {
inherit pname version;
- sha256 = "0bxz1a0ak6b6zj5xpkzwy8ikxf45kkxdj64sf4ilj43yaqicm0bw";
+ sha256 = "1w1crc32p5rnbah6x9km6yvjiy5qrmpmvzb4ignsprfxjq803r3a";
};
propagatedBuildInputs = with python3Packages; [
diff --git a/nixpkgs/pkgs/tools/text/icdiff/default.nix b/nixpkgs/pkgs/tools/text/icdiff/default.nix
index dfbe6e7b6dc..79bcf90718b 100644
--- a/nixpkgs/pkgs/tools/text/icdiff/default.nix
+++ b/nixpkgs/pkgs/tools/text/icdiff/default.nix
@@ -2,13 +2,13 @@
pythonPackages.buildPythonApplication rec {
pname = "icdiff";
- version = "1.9.4";
+ version = "1.9.5";
src = fetchFromGitHub {
owner = "jeffkaufman";
repo = "icdiff";
rev = "release-${version}";
- sha256 = "1micpm7kq9swfscmp4mg37fnzgzpsg7704yi33c5sd6cmgbdabxm";
+ sha256 = "080v8h09pv8qwplin4kwfm0kmqjwdqjfxbpcdrv16sv4hwfwl5qd";
};
meta = with stdenv.lib; {
diff --git a/nixpkgs/pkgs/tools/text/languagetool/default.nix b/nixpkgs/pkgs/tools/text/languagetool/default.nix
index f75099e630d..f6ca3a7d760 100644
--- a/nixpkgs/pkgs/tools/text/languagetool/default.nix
+++ b/nixpkgs/pkgs/tools/text/languagetool/default.nix
@@ -2,11 +2,11 @@
stdenv.mkDerivation rec {
pname = "LanguageTool";
- version = "4.6";
+ version = "4.7";
src = fetchzip {
url = "https://www.languagetool.org/download/${pname}-${version}.zip";
- sha256 = "1z3i6kz1dz7dw2ykyk1yamrv8h5h330sfyl037hhyy9hw6p30rhg";
+ sha256 = "08200f9vk157jv27lmm89rsf9r05sb6jxcmnphrpz1hxykixd294";
};
nativeBuildInputs = [ makeWrapper ];
buildInputs = [ jre ];
diff --git a/nixpkgs/pkgs/tools/text/link-grammar/default.nix b/nixpkgs/pkgs/tools/text/link-grammar/default.nix
index bca0a5e3857..ce9b0bfa883 100644
--- a/nixpkgs/pkgs/tools/text/link-grammar/default.nix
+++ b/nixpkgs/pkgs/tools/text/link-grammar/default.nix
@@ -1,14 +1,14 @@
{ stdenv, fetchurl, pkgconfig, python3, sqlite, libedit, zlib }:
stdenv.mkDerivation rec {
- version = "5.6.2";
+ version = "5.7.0";
pname = "link-grammar";
outputs = [ "bin" "out" "dev" "man" ];
src = fetchurl {
url = "http://www.abisource.com/downloads/${pname}/${version}/${pname}-${version}.tar.gz";
- sha256 = "1jc6j5kxdv3y4mm82q0rrjvlak8p26fqh92dzw5bkwxnvjmjjg1k";
+ sha256 = "0ak1v469k56v3511kxxkxvx1nw6zcxcl0f1kcvc82ffacqbr4y96";
};
nativeBuildInputs = [ pkgconfig python3 ];
diff --git a/nixpkgs/pkgs/tools/text/lv/default.nix b/nixpkgs/pkgs/tools/text/lv/default.nix
new file mode 100644
index 00000000000..3e96858f9c9
--- /dev/null
+++ b/nixpkgs/pkgs/tools/text/lv/default.nix
@@ -0,0 +1,33 @@
+{ stdenv, fetchurl, ncurses }:
+
+stdenv.mkDerivation rec {
+ pname = "lv";
+ version = "4.51";
+
+ src = fetchurl {
+ url = "mirror://debian/pool/main/l/${pname}/${pname}_${version}.orig.tar.gz";
+ sha256 = "0yf3idz1qspyff1if41xjpqqcaqa8q8icslqlnz0p9dj36gmm5l3";
+ };
+
+ makeFlags = [ "prefix=${placeholder "out"}" ];
+
+ buildInputs = [ ncurses ];
+
+ configurePhase = ''
+ mkdir -p build
+ cd build
+ ../src/configure
+ '';
+
+ preInstall = ''
+ mkdir -p $out/bin
+ '';
+
+ meta = with stdenv.lib; {
+ description = "Powerful multi-lingual file viewer / grep";
+ homepage = "https://web.archive.org/web/20160310122517/www.ff.iij4u.or.jp/~nrt/lv/";
+ license = licenses.gpl2;
+ platforms = with platforms; linux ++ darwin;
+ maintainers = with maintainers; [ kayhide ];
+ };
+}
diff --git a/nixpkgs/pkgs/tools/text/mawk/default.nix b/nixpkgs/pkgs/tools/text/mawk/default.nix
index 9fed14c6d55..fbfc032445b 100644
--- a/nixpkgs/pkgs/tools/text/mawk/default.nix
+++ b/nixpkgs/pkgs/tools/text/mawk/default.nix
@@ -1,14 +1,14 @@
{ stdenv, fetchurl }:
stdenv.mkDerivation rec {
- name = "mawk-1.3.4-20171017";
+ name = "mawk-1.3.4-20190203";
src = fetchurl {
urls = [
"ftp://ftp.invisible-island.net/mawk/${name}.tgz"
"https://invisible-mirror.net/archives/mawk/${name}.tgz"
];
- sha256 = "0nwyxhipn4jx7j695lih1xggxm6cp4fjk4wbgihd33ni3rfi25yv";
+ sha256 = "0h5qlslaj5czz4v25hqg8a6kg4c5mlkmdpxhhvpvp1ci08ab7b6s";
};
meta = with stdenv.lib; {
diff --git a/nixpkgs/pkgs/tools/text/mdcat/default.nix b/nixpkgs/pkgs/tools/text/mdcat/default.nix
new file mode 100644
index 00000000000..9ebc9840b07
--- /dev/null
+++ b/nixpkgs/pkgs/tools/text/mdcat/default.nix
@@ -0,0 +1,32 @@
+{ stdenv, fetchFromGitHub, rustPlatform, pkgconfig, openssl, Security, ansi2html }:
+
+rustPlatform.buildRustPackage rec {
+ pname = "mdcat";
+ version = "0.13.0";
+
+ src = fetchFromGitHub {
+ owner = "lunaryorn";
+ repo = pname;
+ rev = "mdcat-${version}";
+ sha256 = "0xlcpyfmil7sszv4008v4ipqswz49as4nzac0kzmzsb86np191q0";
+ };
+
+ nativeBuildInputs = [ pkgconfig ];
+ buildInputs = [ (stdenv.lib.optional stdenv.isDarwin Security) openssl ];
+
+ cargoSha256 = "16q17gm59lpjqa18q289cjmjlf2jicag12jz529x5kh11x6bjl8v";
+
+ checkInputs = [ ansi2html ];
+ checkPhase = ''
+ # Skip tests that use the network.
+ cargo test -- --skip terminal::iterm2
+ '';
+
+ meta = with stdenv.lib; {
+ description = "cat for markdown";
+ homepage = https://github.com/lunaryorn/mdcat;
+ license = with licenses; [ asl20 ];
+ maintainers = with maintainers; [ davidtwco ];
+ platforms = platforms.all;
+ };
+}
diff --git a/nixpkgs/pkgs/tools/text/poedit/default.nix b/nixpkgs/pkgs/tools/text/poedit/default.nix
index e1ac2248d22..4d29c380483 100644
--- a/nixpkgs/pkgs/tools/text/poedit/default.nix
+++ b/nixpkgs/pkgs/tools/text/poedit/default.nix
@@ -4,11 +4,11 @@
stdenv.mkDerivation rec {
pname = "poedit";
- version = "2.2.1";
+ version = "2.2.4";
src = fetchurl {
url = "https://github.com/vslavik/poedit/archive/v${version}-oss.tar.gz";
- sha256 = "0brj6ysisxng2xn8l9ii2rngsj5b4rk27hzfjbp3zwb2caagd3vq";
+ sha256 = "1k5ql41g635z01s1i9bchvf72ynwsvg54gs3s40f07f9dihb23gd";
};
nativeBuildInputs = [ autoconf automake asciidoc wrapGAppsHook
diff --git a/nixpkgs/pkgs/tools/text/transifex-client/default.nix b/nixpkgs/pkgs/tools/text/transifex-client/default.nix
index 9a11b5fba57..12e68689934 100644
--- a/nixpkgs/pkgs/tools/text/transifex-client/default.nix
+++ b/nixpkgs/pkgs/tools/text/transifex-client/default.nix
@@ -1,12 +1,12 @@
{ stdenv, buildPythonApplication, fetchPypi
-, python-slugify, requests, urllib3, six }:
+, python-slugify, requests, urllib3, six, setuptools }:
buildPythonApplication rec {
pname = "transifex-client";
version = "0.13.6";
propagatedBuildInputs = [
- urllib3 requests python-slugify six
+ urllib3 requests python-slugify six setuptools
];
src = fetchPypi {
@@ -24,7 +24,7 @@ buildPythonApplication rec {
doCheck = false;
meta = with stdenv.lib; {
- homepage = https://www.transifex.com/;
+ homepage = "https://www.transifex.com/";
license = licenses.gpl2;
description = "Transifex translation service client";
maintainers = [ maintainers.etu ];
diff --git a/nixpkgs/pkgs/tools/typesetting/xml2rfc/default.nix b/nixpkgs/pkgs/tools/typesetting/xml2rfc/default.nix
deleted file mode 100644
index 7fe0396ae44..00000000000
--- a/nixpkgs/pkgs/tools/typesetting/xml2rfc/default.nix
+++ /dev/null
@@ -1,24 +0,0 @@
-{ python, stdenv }:
-
-with python.pkgs;
-
-buildPythonPackage rec {
- pname = "xml2rfc";
- version = "2.9.8";
-
- buildInputs = [ intervaltree lxml requests pyflakes ];
- propagatedBuildInputs = [ intervaltree lxml requests six ];
-
- src = fetchPypi {
- inherit pname version;
- sha256 = "b50ce2f98bc431cadbcef0523213497049b78c2829ee81c399976f1e4832afc6";
- };
-
- meta = with stdenv.lib; {
- homepage = "https://xml2rfc.tools.ietf.org/";
- license = licenses.bsdOriginal;
- description = "Xml2rfc generates RFCs and IETF drafts from document source in XML according to the dtd in RFC2629.";
- maintainers = [ maintainers.yrashk ];
- };
-
-}
diff --git a/nixpkgs/pkgs/tools/virtualization/amazon-ecs-cli/default.nix b/nixpkgs/pkgs/tools/virtualization/amazon-ecs-cli/default.nix
index e7c391806aa..306bd0574c9 100644
--- a/nixpkgs/pkgs/tools/virtualization/amazon-ecs-cli/default.nix
+++ b/nixpkgs/pkgs/tools/virtualization/amazon-ecs-cli/default.nix
@@ -2,11 +2,11 @@
stdenv.mkDerivation rec {
pname = "amazon-ecs-cli";
- version = "1.15.1";
+ version = "1.16.0";
src = fetchurl {
url = "https://s3.amazonaws.com/amazon-ecs-cli/ecs-cli-linux-amd64-v${version}";
- sha256 = "0p0z12b6z00sxzjfsvb37czgczrsi61klr5azan0f8wf32x6wc28";
+ sha256 = "0mj0y2hrl7yp8mfjgi68gvbravgwp5v58hhcclr49mdjnr4v6i9x";
};
dontUnpack = true;