aboutsummaryrefslogtreecommitdiff
path: root/nixpkgs/pkgs/tools
diff options
context:
space:
mode:
Diffstat (limited to 'nixpkgs/pkgs/tools')
-rw-r--r--nixpkgs/pkgs/tools/X11/ksuperkey/default.nix37
-rw-r--r--nixpkgs/pkgs/tools/X11/wpgtk/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/X11/xpra/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/admin/acme.sh/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/admin/ansible/default.nix20
-rw-r--r--nixpkgs/pkgs/tools/admin/aws-vault/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/admin/awsweeper/default.nix14
-rw-r--r--nixpkgs/pkgs/tools/admin/azure-cli/default.nix8
-rw-r--r--nixpkgs/pkgs/tools/admin/azure-cli/python-packages.nix84
-rw-r--r--nixpkgs/pkgs/tools/admin/berglas/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/admin/certigo/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/admin/clair/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/admin/docker-credential-helpers/default.nix6
-rw-r--r--nixpkgs/pkgs/tools/admin/eksctl/default.nix9
-rw-r--r--nixpkgs/pkgs/tools/admin/exoscale-cli/default.nix32
-rw-r--r--nixpkgs/pkgs/tools/admin/exoscale-cli/deps.nix876
-rw-r--r--nixpkgs/pkgs/tools/admin/iamy/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/admin/lego/default.nix8
-rw-r--r--nixpkgs/pkgs/tools/admin/lexicon/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/admin/lxd/default.nix21
-rw-r--r--nixpkgs/pkgs/tools/admin/nomachine-client/default.nix32
-rw-r--r--nixpkgs/pkgs/tools/admin/pebble/default.nix8
-rw-r--r--nixpkgs/pkgs/tools/admin/procs/default.nix8
-rw-r--r--nixpkgs/pkgs/tools/admin/pulumi/default.nix3
-rw-r--r--nixpkgs/pkgs/tools/admin/salt/default.nix39
-rw-r--r--nixpkgs/pkgs/tools/admin/scaleway-cli/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/admin/sec/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/admin/tigervnc/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/archivers/afio/default.nix12
-rw-r--r--nixpkgs/pkgs/tools/archivers/p7zip/default.nix26
-rw-r--r--nixpkgs/pkgs/tools/archivers/unar/default.nix59
-rw-r--r--nixpkgs/pkgs/tools/audio/mpd-mpris/default.nix5
-rw-r--r--nixpkgs/pkgs/tools/audio/pasystray/default.nix5
-rw-r--r--nixpkgs/pkgs/tools/audio/pasystray/fix-wayland.patch34
-rw-r--r--nixpkgs/pkgs/tools/backup/btrbk/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/backup/diskrsync/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/backup/duplicacy/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/backup/duplicity/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/backup/httrack/default.nix1
-rw-r--r--nixpkgs/pkgs/tools/backup/httrack/qt.nix4
-rw-r--r--nixpkgs/pkgs/tools/backup/luckybackup/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/backup/monolith/default.nix6
-rw-r--r--nixpkgs/pkgs/tools/backup/rdiff-backup/default.nix1
-rw-r--r--nixpkgs/pkgs/tools/backup/restic/default.nix28
-rw-r--r--nixpkgs/pkgs/tools/backup/restic/rest-server.nix2
-rw-r--r--nixpkgs/pkgs/tools/backup/wal-g/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/backup/znapzend/default.nix39
-rw-r--r--nixpkgs/pkgs/tools/bluetooth/obex-data-server/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/bluetooth/openobex/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/compression/gzip/default.nix9
-rw-r--r--nixpkgs/pkgs/tools/compression/hactool/default.nix30
-rw-r--r--nixpkgs/pkgs/tools/compression/zopfli/default.nix1
-rw-r--r--nixpkgs/pkgs/tools/filesystems/avfs/default.nix4
-rwxr-xr-xnixpkgs/pkgs/tools/filesystems/bees/bees-service-wrapper6
-rw-r--r--nixpkgs/pkgs/tools/filesystems/bindfs/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/filesystems/btrfs-progs/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/filesystems/catcli/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/filesystems/ceph/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/filesystems/ciopfs/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/filesystems/darling-dmg/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/filesystems/fatsort/default.nix6
-rw-r--r--nixpkgs/pkgs/tools/filesystems/fatsort/fatsort-Makefiles.patch49
-rw-r--r--nixpkgs/pkgs/tools/filesystems/fuse-overlayfs/default.nix10
-rw-r--r--nixpkgs/pkgs/tools/filesystems/fuseiso/default.nix61
-rw-r--r--nixpkgs/pkgs/tools/filesystems/gcsfuse/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/filesystems/glusterfs/default.nix32
-rw-r--r--nixpkgs/pkgs/tools/filesystems/irods/common.nix5
-rw-r--r--nixpkgs/pkgs/tools/filesystems/irods/default.nix40
-rw-r--r--nixpkgs/pkgs/tools/filesystems/irods/zmqcpp-deprecated-send_recv.patch21
-rw-r--r--nixpkgs/pkgs/tools/filesystems/squashfs-tools-ng/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/filesystems/tmsu/default.nix56
-rw-r--r--nixpkgs/pkgs/tools/filesystems/tmsu/deps.nix39
-rw-r--r--nixpkgs/pkgs/tools/filesystems/unionfs-fuse/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/graphics/gifski/default.nix6
-rw-r--r--nixpkgs/pkgs/tools/graphics/mesa-demos/default.nix24
-rw-r--r--nixpkgs/pkgs/tools/graphics/mscgen/default.nix18
-rw-r--r--nixpkgs/pkgs/tools/graphics/pfstools/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/graphics/pgf/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/graphics/pngcheck/default.nix1
-rw-r--r--nixpkgs/pkgs/tools/graphics/pngcrush/default.nix1
-rw-r--r--nixpkgs/pkgs/tools/graphics/rocket/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/graphics/scrot/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/graphics/spirv-cross/default.nix23
-rw-r--r--nixpkgs/pkgs/tools/graphics/vips/default.nix18
-rw-r--r--nixpkgs/pkgs/tools/graphics/wdisplays/default.nix11
-rw-r--r--nixpkgs/pkgs/tools/misc/3mux/default.nix24
-rw-r--r--nixpkgs/pkgs/tools/misc/agedu/default.nix6
-rw-r--r--nixpkgs/pkgs/tools/misc/aptly/default.nix9
-rw-r--r--nixpkgs/pkgs/tools/misc/autorandr/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/misc/bat-extras/default.nix147
-rw-r--r--nixpkgs/pkgs/tools/misc/bat/default.nix11
-rw-r--r--nixpkgs/pkgs/tools/misc/bat/macos.patch13
-rw-r--r--nixpkgs/pkgs/tools/misc/bibtool/default.nix5
-rw-r--r--nixpkgs/pkgs/tools/misc/blsd/default.nix29
-rw-r--r--nixpkgs/pkgs/tools/misc/blsd/deps.nix12
-rw-r--r--nixpkgs/pkgs/tools/misc/broot/default.nix8
-rw-r--r--nixpkgs/pkgs/tools/misc/brotab/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/misc/chafa/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/misc/chezmoi/default.nix8
-rw-r--r--nixpkgs/pkgs/tools/misc/clipman/default.nix8
-rw-r--r--nixpkgs/pkgs/tools/misc/colord-kde/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/misc/datamash/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/misc/diffoscope/default.nix6
-rw-r--r--nixpkgs/pkgs/tools/misc/direnv/default.nix22
-rw-r--r--nixpkgs/pkgs/tools/misc/dmg2img/default.nix17
-rw-r--r--nixpkgs/pkgs/tools/misc/docui/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/misc/dua/default.nix6
-rw-r--r--nixpkgs/pkgs/tools/misc/dvtm/dvtm.nix5
-rw-r--r--nixpkgs/pkgs/tools/misc/entr/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/misc/etcher/default.nix66
-rw-r--r--nixpkgs/pkgs/tools/misc/fd/default.nix5
-rw-r--r--nixpkgs/pkgs/tools/misc/ffsend/default.nix6
-rw-r--r--nixpkgs/pkgs/tools/misc/figlet/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/misc/fluent-bit/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/misc/fselect/default.nix6
-rw-r--r--nixpkgs/pkgs/tools/misc/fzf/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/misc/gnokii/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/misc/gotify-cli/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/misc/grub/2.0x.nix4
-rw-r--r--nixpkgs/pkgs/tools/misc/grub/trusted.nix4
-rw-r--r--nixpkgs/pkgs/tools/misc/heatseeker/default.nix9
-rw-r--r--nixpkgs/pkgs/tools/misc/hpcg/default.nix35
-rw-r--r--nixpkgs/pkgs/tools/misc/hpl/default.nix7
-rw-r--r--nixpkgs/pkgs/tools/misc/html-proofer/Gemfile.lock4
-rw-r--r--nixpkgs/pkgs/tools/misc/html-proofer/gemset.nix8
-rw-r--r--nixpkgs/pkgs/tools/misc/ili2c/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/misc/intermodal/default.nix25
-rw-r--r--nixpkgs/pkgs/tools/misc/jdupes/default.nix6
-rw-r--r--nixpkgs/pkgs/tools/misc/jugglinglab/default.nix30
-rw-r--r--nixpkgs/pkgs/tools/misc/kak-lsp/default.nix6
-rw-r--r--nixpkgs/pkgs/tools/misc/kepubify/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/misc/lf/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/misc/libgen-cli/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/misc/lsd/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/misc/mcrypt/default.nix7
-rw-r--r--nixpkgs/pkgs/tools/misc/mcrypt/format-string_CVE-2012-4426.patch (renamed from nixpkgs/pkgs/tools/misc/mcrypt/format-string.patch)0
-rw-r--r--nixpkgs/pkgs/tools/misc/mcrypt/overflow_CVE-2012-4409.patch (renamed from nixpkgs/pkgs/tools/misc/mcrypt/overflow.patch)0
-rw-r--r--nixpkgs/pkgs/tools/misc/mcrypt/sprintf_CVE-2012-4527.patch (renamed from nixpkgs/pkgs/tools/misc/mcrypt/sprintf.patch)0
-rw-r--r--nixpkgs/pkgs/tools/misc/memtest86-efi/default.nix33
-rw-r--r--nixpkgs/pkgs/tools/misc/miniserve/default.nix6
-rw-r--r--nixpkgs/pkgs/tools/misc/mongodb-tools/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/misc/mutagen/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/misc/neo-cowsay/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/misc/nix-direnv/default.nix36
-rw-r--r--nixpkgs/pkgs/tools/misc/parallel/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/misc/patdiff/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/misc/pg_flame/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/misc/pgcenter/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/misc/pgmetrics/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/misc/phoronix-test-suite/default.nix10
-rw-r--r--nixpkgs/pkgs/tools/misc/phoronix-test-suite/tests.nix20
-rw-r--r--nixpkgs/pkgs/tools/misc/phraseapp-client/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/misc/pistol/default.nix8
-rw-r--r--nixpkgs/pkgs/tools/misc/pk2cmd/default.nix6
-rw-r--r--nixpkgs/pkgs/tools/misc/plantuml/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/misc/powerline-go/default.nix8
-rw-r--r--nixpkgs/pkgs/tools/misc/profile-sync-daemon/default.nix9
-rw-r--r--nixpkgs/pkgs/tools/misc/pspg/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/misc/shadowenv/default.nix9
-rw-r--r--nixpkgs/pkgs/tools/misc/silicon/default.nix6
-rw-r--r--nixpkgs/pkgs/tools/misc/sixpair/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/misc/starship/default.nix8
-rw-r--r--nixpkgs/pkgs/tools/misc/statserial/default.nix44
-rw-r--r--nixpkgs/pkgs/tools/misc/stow/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/misc/tewisay/default.nix6
-rw-r--r--nixpkgs/pkgs/tools/misc/tmux/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/misc/tmuxinator/default.nix12
-rw-r--r--nixpkgs/pkgs/tools/misc/topgrade/default.nix6
-rw-r--r--nixpkgs/pkgs/tools/misc/ttygif/default.nix8
-rw-r--r--nixpkgs/pkgs/tools/misc/up/default.nix6
-rw-r--r--nixpkgs/pkgs/tools/misc/up/gomod.patch23
-rw-r--r--nixpkgs/pkgs/tools/misc/urjtag/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/misc/vdirsyncer/default.nix74
-rw-r--r--nixpkgs/pkgs/tools/misc/vdirsyncer/stable.nix52
-rw-r--r--nixpkgs/pkgs/tools/misc/vttest/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/misc/websocat/default.nix12
-rw-r--r--nixpkgs/pkgs/tools/misc/woeusb/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/misc/xburst-tools/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/misc/youtube-dl/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/misc/yubikey-personalization/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/misc/zoxide/default.nix6
-rw-r--r--nixpkgs/pkgs/tools/networking/amass/default.nix6
-rw-r--r--nixpkgs/pkgs/tools/networking/aria2/default.nix7
-rw-r--r--nixpkgs/pkgs/tools/networking/assh/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/networking/babeld/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/networking/bandwhich/default.nix6
-rw-r--r--nixpkgs/pkgs/tools/networking/cassowary/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/networking/cjdns/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/networking/clash/default.nix8
-rw-r--r--nixpkgs/pkgs/tools/networking/corerad/default.nix10
-rw-r--r--nixpkgs/pkgs/tools/networking/croc/default.nix8
-rw-r--r--nixpkgs/pkgs/tools/networking/curl/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/networking/curlie/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/networking/davix/default.nix6
-rw-r--r--nixpkgs/pkgs/tools/networking/dd-agent/datadog-agent.nix16
-rw-r--r--nixpkgs/pkgs/tools/networking/dnsmasq/default.nix12
-rw-r--r--nixpkgs/pkgs/tools/networking/dnsproxy/default.nix8
-rw-r--r--nixpkgs/pkgs/tools/networking/drill/default.nix33
-rw-r--r--nixpkgs/pkgs/tools/networking/ferm/default.nix26
-rw-r--r--nixpkgs/pkgs/tools/networking/findomain/default.nix6
-rw-r--r--nixpkgs/pkgs/tools/networking/fping/default.nix1
-rw-r--r--nixpkgs/pkgs/tools/networking/frp/default.nix8
-rw-r--r--nixpkgs/pkgs/tools/networking/grpcui/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/networking/guardian-agent/default.nix8
-rw-r--r--nixpkgs/pkgs/tools/networking/gupnp-tools/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/networking/hey/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/networking/httpie/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/networking/httplz/cargo-lock.patch864
-rw-r--r--nixpkgs/pkgs/tools/networking/httplz/default.nix6
-rw-r--r--nixpkgs/pkgs/tools/networking/inadyn/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/networking/isync/default.nix21
-rw-r--r--nixpkgs/pkgs/tools/networking/megatools/default.nix10
-rw-r--r--nixpkgs/pkgs/tools/networking/minio-client/default.nix12
-rw-r--r--nixpkgs/pkgs/tools/networking/mitmproxy/default.nix50
-rw-r--r--nixpkgs/pkgs/tools/networking/mitmproxy/pytest5.patch31
-rw-r--r--nixpkgs/pkgs/tools/networking/modem-manager/default.nix6
-rw-r--r--nixpkgs/pkgs/tools/networking/mosh/bash_completion_datadir.patch19
-rw-r--r--nixpkgs/pkgs/tools/networking/mosh/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/networking/mu/default.nix30
-rw-r--r--nixpkgs/pkgs/tools/networking/nebula/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/networking/netsniff-ng/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/networking/network-manager/strongswan/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/networking/obfs4/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/networking/openfortivpn/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/networking/openvpn/default.nix13
-rw-r--r--nixpkgs/pkgs/tools/networking/pixiecore/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/networking/pykms/default.nix8
-rw-r--r--nixpkgs/pkgs/tools/networking/pykms/log-to-current-directory-by-default.patch20
-rw-r--r--nixpkgs/pkgs/tools/networking/rshijack/default.nix23
-rw-r--r--nixpkgs/pkgs/tools/networking/rtptools/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/networking/shadowfox/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/networking/shadowsocks-rust/default.nix11
-rw-r--r--nixpkgs/pkgs/tools/networking/slimrat/default.nix33
-rw-r--r--nixpkgs/pkgs/tools/networking/slirp4netns/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/networking/sniffglue/default.nix27
-rw-r--r--nixpkgs/pkgs/tools/networking/tendermint/default.nix8
-rw-r--r--nixpkgs/pkgs/tools/networking/termshark/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/networking/tox-node/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/networking/tridactyl-native/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/networking/urlwatch/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/networking/v2ray/generic.nix4
-rw-r--r--nixpkgs/pkgs/tools/networking/vde2/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/networking/wifite2/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/networking/wireguard-go/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/networking/wireguard-go/deps.nix4
-rw-r--r--nixpkgs/pkgs/tools/networking/wireguard-tools/default.nix29
-rw-r--r--nixpkgs/pkgs/tools/networking/wormhole/default.nix33
-rw-r--r--nixpkgs/pkgs/tools/networking/yggdrasil/default.nix8
-rw-r--r--nixpkgs/pkgs/tools/nix/cached-nix-shell/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/nix/nixos-generators/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/nix/nixpkgs-fmt/default.nix10
-rw-r--r--nixpkgs/pkgs/tools/package-management/cargo-about/default.nix6
-rw-r--r--nixpkgs/pkgs/tools/package-management/cargo-audit/default.nix6
-rw-r--r--nixpkgs/pkgs/tools/package-management/cargo-deb/default.nix8
-rw-r--r--nixpkgs/pkgs/tools/package-management/cargo-outdated/default.nix6
-rw-r--r--nixpkgs/pkgs/tools/package-management/clib/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/package-management/emplace/default.nix6
-rw-r--r--nixpkgs/pkgs/tools/package-management/home-manager/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/package-management/morph/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/package-management/mynewt-newt/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/package-management/nfpm/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/package-management/nix-du/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/package-management/nix-prefetch/default.nix79
-rw-r--r--nixpkgs/pkgs/tools/package-management/nix-simple-deploy/default.nix23
-rw-r--r--nixpkgs/pkgs/tools/package-management/nix/default.nix27
-rw-r--r--nixpkgs/pkgs/tools/package-management/nixops/nixops-v1_6_1.nix2
-rw-r--r--nixpkgs/pkgs/tools/package-management/nixpkgs-review/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/security/afl/default.nix7
-rw-r--r--nixpkgs/pkgs/tools/security/afl/libdislocator.nix2
-rw-r--r--nixpkgs/pkgs/tools/security/aflplusplus/default.nix146
-rw-r--r--nixpkgs/pkgs/tools/security/aflplusplus/libdislocator.nix37
-rw-r--r--nixpkgs/pkgs/tools/security/aflplusplus/libtokencap.nix32
-rw-r--r--nixpkgs/pkgs/tools/security/aflplusplus/qemu-no-etc-install.patch13
-rw-r--r--nixpkgs/pkgs/tools/security/aflplusplus/qemu.nix83
-rw-r--r--nixpkgs/pkgs/tools/security/age/default.nix10
-rw-r--r--nixpkgs/pkgs/tools/security/bettercap/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/security/bitwarden_rs/default.nix6
-rw-r--r--nixpkgs/pkgs/tools/security/bitwarden_rs/vault.nix4
-rw-r--r--nixpkgs/pkgs/tools/security/browserpass/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/security/brutespray/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/security/ccid/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/security/crowbar/default.nix42
-rw-r--r--nixpkgs/pkgs/tools/security/doas/default.nix21
-rw-r--r--nixpkgs/pkgs/tools/security/genpass/default.nix25
-rw-r--r--nixpkgs/pkgs/tools/security/ghidra/default.nix15
-rw-r--r--nixpkgs/pkgs/tools/security/gnome-keysign/default.nix11
-rw-r--r--nixpkgs/pkgs/tools/security/gnupg/20.nix4
-rw-r--r--nixpkgs/pkgs/tools/security/gnupg/22.nix4
-rw-r--r--nixpkgs/pkgs/tools/security/gobuster/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/security/gopass/default.nix42
-rw-r--r--nixpkgs/pkgs/tools/security/hcxdumptool/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/security/hcxtools/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/security/jadx/default.nix103
-rw-r--r--nixpkgs/pkgs/tools/security/jwt-cli/default.nix6
-rw-r--r--nixpkgs/pkgs/tools/security/keybase/default.nix6
-rw-r--r--nixpkgs/pkgs/tools/security/keybase/gui.nix8
-rw-r--r--nixpkgs/pkgs/tools/security/keybase/kbfs.nix2
-rw-r--r--nixpkgs/pkgs/tools/security/kpcli/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/security/libacr38u/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/security/notary/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/security/p0f/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/security/pass/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/security/pass/extensions/audit/0001-Make-it-possible-to-run-the-tests-offline.patch175
-rw-r--r--nixpkgs/pkgs/tools/security/pass/extensions/audit/default.nix9
-rw-r--r--nixpkgs/pkgs/tools/security/pass/extensions/import.nix2
-rw-r--r--nixpkgs/pkgs/tools/security/pass/extensions/tomb.nix2
-rw-r--r--nixpkgs/pkgs/tools/security/pass/extensions/update.nix2
-rw-r--r--nixpkgs/pkgs/tools/security/pass/rofi-pass.nix1
-rw-r--r--nixpkgs/pkgs/tools/security/pcsc-cyberjack/default.nix33
-rw-r--r--nixpkgs/pkgs/tools/security/pcsc-scm-scl011/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/security/pdfcrack/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/security/prey/default.nix48
-rw-r--r--nixpkgs/pkgs/tools/security/saml2aws/default.nix17
-rw-r--r--nixpkgs/pkgs/tools/security/sn0int/default.nix32
-rw-r--r--nixpkgs/pkgs/tools/security/sops/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/security/super/default.nix8
-rw-r--r--nixpkgs/pkgs/tools/security/tor/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/security/trufflehog/default.nix20
-rw-r--r--nixpkgs/pkgs/tools/security/vault/default.nix12
-rw-r--r--nixpkgs/pkgs/tools/security/verifpal/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/system/acpica-tools/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/system/bfs/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/system/collectd/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/system/colorls/Gemfile.lock2
-rw-r--r--nixpkgs/pkgs/tools/system/colorls/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/system/colorls/gemset.nix4
-rw-r--r--nixpkgs/pkgs/tools/system/ctop/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/system/facter/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/system/gotop/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/system/hwinfo/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/system/inxi/default.nix38
-rw-r--r--nixpkgs/pkgs/tools/system/jump/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/system/kmon/default.nix6
-rw-r--r--nixpkgs/pkgs/tools/system/localtime/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/system/netdata/go.d.plugin.nix4
-rw-r--r--nixpkgs/pkgs/tools/system/plan9port/default.nix9
-rw-r--r--nixpkgs/pkgs/tools/system/plan9port/tmpdir.patch41
-rw-r--r--nixpkgs/pkgs/tools/system/rsyslog/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/system/stress-ng/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/system/syslog-ng/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/system/thermald/default.nix10
-rw-r--r--nixpkgs/pkgs/tools/system/tre-command/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/system/tuptime/default.nix35
-rw-r--r--nixpkgs/pkgs/tools/system/uefitool/variants.nix8
-rw-r--r--nixpkgs/pkgs/tools/system/ytop/default.nix6
-rw-r--r--nixpkgs/pkgs/tools/text/a2ps/default.nix1
-rw-r--r--nixpkgs/pkgs/tools/text/colordiff/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/text/fanficfare/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/text/gawk/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/text/gjo/default.nix27
-rw-r--r--nixpkgs/pkgs/tools/text/glogg/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/text/languagetool/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/text/nawk/default.nix19
-rw-r--r--nixpkgs/pkgs/tools/text/ocrmypdf/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/text/ripgrep/default.nix18
-rw-r--r--nixpkgs/pkgs/tools/text/sd/default.nix8
-rw-r--r--nixpkgs/pkgs/tools/text/shfmt/default.nix8
-rw-r--r--nixpkgs/pkgs/tools/text/transifex-client/default.nix6
-rw-r--r--nixpkgs/pkgs/tools/typesetting/asciidoctorj/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/typesetting/sile/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/typesetting/tex/texlive/bin.nix29
-rw-r--r--nixpkgs/pkgs/tools/typesetting/tex/texlive/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/virtualization/cri-tools/default.nix33
-rw-r--r--nixpkgs/pkgs/tools/virtualization/distrobuilder/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/virtualization/google-compute-engine-oslogin/default.nix33
-rw-r--r--nixpkgs/pkgs/tools/virtualization/govc/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/virtualization/linode-cli/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/virtualization/vpsfree-client/Gemfile5
-rw-r--r--nixpkgs/pkgs/tools/virtualization/vpsfree-client/Gemfile.lock75
-rw-r--r--nixpkgs/pkgs/tools/virtualization/vpsfree-client/default.nix17
-rw-r--r--nixpkgs/pkgs/tools/virtualization/vpsfree-client/gemset.nix316
371 files changed, 4583 insertions, 2187 deletions
diff --git a/nixpkgs/pkgs/tools/X11/ksuperkey/default.nix b/nixpkgs/pkgs/tools/X11/ksuperkey/default.nix
index 1472e39c83c..d5c2232dce1 100644
--- a/nixpkgs/pkgs/tools/X11/ksuperkey/default.nix
+++ b/nixpkgs/pkgs/tools/X11/ksuperkey/default.nix
@@ -1,27 +1,26 @@
-{ stdenv, fetchgit, libX11, libXtst, pkgconfig, xorgproto, libXi }:
+{ stdenv, fetchFromGitHub, libX11, libXtst, pkgconfig, xorgproto, libXi }:
-stdenv.mkDerivation {
- name = "ksuperkey-git-2015-07-21";
+stdenv.mkDerivation rec {
+ pname = "ksuperkey";
+ version = "0.4";
- nativeBuildInputs = [ pkgconfig ];
- buildInputs = [
- libX11 libXtst xorgproto libXi
- ];
-
- src = fetchgit {
- url = "https://github.com/hanschen/ksuperkey";
- rev = "e75a31a0e3e80b14341e92799a7ce3232ac37639";
- sha256 = "0y4wkak9dvcm14g54ll1ln9aks2az63hx8fv7b8d3nscxjbkxl6g";
+ src = fetchFromGitHub {
+ owner = "hanschen";
+ repo = "ksuperkey";
+ rev = "v${version}";
+ sha256 = "1dvgf356fihfav8pjzww1q6vgd96c5h18dh8vpv022g9iipiwq8a";
};
- preConfigure = ''
- makeFlags="$makeFlags PREFIX=$out"
- '';
+ makeFlags = [ "PREFIX=${placeholder "out"}" ];
+
+ nativeBuildInputs = [ pkgconfig ];
+ buildInputs = [ libX11 libXtst xorgproto libXi ];
- meta = {
+ meta = with stdenv.lib; {
description = "A tool to be able to bind the super key as a key rather than a modifier";
- license = stdenv.lib.licenses.gpl3;
- maintainers = [ stdenv.lib.maintainers.vozz ];
- platforms = stdenv.lib.platforms.linux;
+ homepage = "https://github.com/hanschen/ksuperkey";
+ license = licenses.gpl3;
+ maintainers = [ maintainers.vozz ];
+ platforms = platforms.linux;
};
}
diff --git a/nixpkgs/pkgs/tools/X11/wpgtk/default.nix b/nixpkgs/pkgs/tools/X11/wpgtk/default.nix
index 4125229237a..2aa05935991 100644
--- a/nixpkgs/pkgs/tools/X11/wpgtk/default.nix
+++ b/nixpkgs/pkgs/tools/X11/wpgtk/default.nix
@@ -3,13 +3,13 @@
python3Packages.buildPythonApplication rec {
pname = "wpgtk";
- version = "6.0.13";
+ version = "6.1.0";
src = fetchFromGitHub {
owner = "deviantfero";
repo = "wpgtk";
rev = version;
- sha256 = "1fphv6k2hqfi3fzazjqmvip7sz9fhy5ccsgpqv68vfylrf8g1f92";
+ sha256 = "06z6qbfd9l3acp3wm28rq4vx3m5cxi4lpxgzc2nxvxmiz8rnnmh1";
};
buildInputs = [
diff --git a/nixpkgs/pkgs/tools/X11/xpra/default.nix b/nixpkgs/pkgs/tools/X11/xpra/default.nix
index 1f9efc31061..b33ca52146c 100644
--- a/nixpkgs/pkgs/tools/X11/xpra/default.nix
+++ b/nixpkgs/pkgs/tools/X11/xpra/default.nix
@@ -30,11 +30,11 @@ let
in buildPythonApplication rec {
pname = "xpra";
- version = "3.0.8";
+ version = "3.0.9";
src = fetchurl {
url = "https://xpra.org/src/${pname}-${version}.tar.xz";
- sha256 = "0d78bn7s03nwnyc4ryznxaivbg55kvsb26q75p8747j3562s9p2b";
+ sha256 = "04qskz1x1pvbdfirpxk58d3dfnf1n6dc69q2rdkak0avzl1nlzi7";
};
patches = [
diff --git a/nixpkgs/pkgs/tools/admin/acme.sh/default.nix b/nixpkgs/pkgs/tools/admin/acme.sh/default.nix
index 8d4863757ad..2254f2e22d9 100644
--- a/nixpkgs/pkgs/tools/admin/acme.sh/default.nix
+++ b/nixpkgs/pkgs/tools/admin/acme.sh/default.nix
@@ -1,13 +1,13 @@
{ stdenv, lib, fetchFromGitHub, makeWrapper, curl, openssl, socat, iproute, unixtools, dnsutils }:
stdenv.mkDerivation rec {
pname = "acme.sh";
- version = "2.8.5";
+ version = "2.8.6";
src = fetchFromGitHub {
owner = "Neilpang";
repo = "acme.sh";
rev = version;
- sha256 = "0yxhfdb0jz0wn10ka6c79qvcx07656vsaxmjls8qgcfgc472ymhs";
+ sha256 = "0zbs8vzbh89wxf36h9mvhin2p85n3jrsq6l5i40q1zkzgwi3648n";
};
nativeBuildInputs = [ makeWrapper ];
diff --git a/nixpkgs/pkgs/tools/admin/ansible/default.nix b/nixpkgs/pkgs/tools/admin/ansible/default.nix
index 4af03111869..174aef7c4ba 100644
--- a/nixpkgs/pkgs/tools/admin/ansible/default.nix
+++ b/nixpkgs/pkgs/tools/admin/ansible/default.nix
@@ -1,37 +1,27 @@
{ python3Packages, fetchurl }:
rec {
- ansible = ansible_2_8;
+ ansible = ansible_2_9;
ansible_2_9 = python3Packages.toPythonApplication python3Packages.ansible;
ansible_2_8 = python3Packages.toPythonApplication (python3Packages.ansible.overridePythonAttrs (old: rec {
pname = "ansible";
- version = "2.8.7";
+ version = "2.8.12";
src = fetchurl {
url = "https://releases.ansible.com/ansible/${pname}-${version}.tar.gz";
- sha256 = "0iy90kqxs52nspfkhj1y7z4zf017jfm5qhdb01d8d4jd5g53k0l2";
+ sha256 = "091id1da3hlnmf0hwvrhv2r0mnyna3mc6s7rwdg5kll7yfiy4k1a";
};
}));
ansible_2_7 = python3Packages.toPythonApplication (python3Packages.ansible.overridePythonAttrs (old: rec {
pname = "ansible";
- version = "2.7.15";
+ version = "2.7.18";
src = fetchurl {
url = "https://releases.ansible.com/ansible/${pname}-${version}.tar.gz";
- sha256 = "1kjqr35c11njyi3f2rjab6821bhqcrdykv4285q76gwv0qynigwr";
- };
- }));
-
- ansible_2_6 = python3Packages.toPythonApplication (python3Packages.ansible.overridePythonAttrs (old: rec {
- pname = "ansible";
- version = "2.6.20";
-
- src = fetchurl {
- url = "https://releases.ansible.com/ansible/${pname}-${version}.tar.gz";
- sha256 = "02ra9q2mifyawn0719y78wrbqzik73aymlzwi90fq71jgyfvkkqn";
+ sha256 = "0sgshaaqyjq3i035yi5hivmrrwrq05hxrbjrv1w3hfzmvljn41d1";
};
}));
}
diff --git a/nixpkgs/pkgs/tools/admin/aws-vault/default.nix b/nixpkgs/pkgs/tools/admin/aws-vault/default.nix
index 48a1de61cd8..3163ab4dfcd 100644
--- a/nixpkgs/pkgs/tools/admin/aws-vault/default.nix
+++ b/nixpkgs/pkgs/tools/admin/aws-vault/default.nix
@@ -10,7 +10,7 @@ buildGoModule rec {
sha256 = "04dyibcaijv5011laycf39m4gvprvvsn5zkxslyih1kqd170w3wg";
};
- modSha256 = "1d3hjfmfmlpw2scfyn597zkzz864w97p0wrsxjp49m9mi0pgmhq9";
+ vendorSha256 = "0jlraq480llamns6yw8yjkzxsndyqiyzy120djni8sw5h0bz65j7";
subPackages = [ "." ];
# set the version. see: aws-vault's Makefile
@@ -26,4 +26,4 @@ buildGoModule rec {
license = licenses.mit;
maintainers = with maintainers; [ zimbatm ];
};
-}
+} \ No newline at end of file
diff --git a/nixpkgs/pkgs/tools/admin/awsweeper/default.nix b/nixpkgs/pkgs/tools/admin/awsweeper/default.nix
index 661747c2fd0..372d287cbd2 100644
--- a/nixpkgs/pkgs/tools/admin/awsweeper/default.nix
+++ b/nixpkgs/pkgs/tools/admin/awsweeper/default.nix
@@ -1,17 +1,23 @@
-{ lib, buildGoModule, fetchFromGitHub }:
+{ lib, buildGoModule, fetchurl, fetchFromGitHub }:
buildGoModule rec {
pname = "awsweeper";
- version = "0.6.0";
+ version = "0.7.0";
+
+ # Requires go generate to be run with mockgen, but doesn't check in the results.
+ patches = fetchurl {
+ url = "https://raw.githubusercontent.com/c00w/patches/master/awskeeper.patch";
+ sha256 = "0dz553ffxc37m2iwygrbhxf7pm91hxdriic8a1gjf8q3nyn13npl";
+ };
src = fetchFromGitHub {
owner = "cloudetc";
repo = pname;
rev = "v${version}";
- sha256 = "0sbd1jgzz3rxxwgbni885zvvcznfc51imaxwv7f064290iqlbrv4";
+ sha256 = "1ybrrpnp6rh7rcwihww43cvhfhzzyy51rdk1hwy9ljpkg37k4y28";
};
- modSha256 = "14yvf0svh7xqpc2y7xr94pc6r7d3iv2nsr8qs3f5q29hdc5hv3fs";
+ vendorSha256 = "0hnpb1xp135z2qpn1b6xad59739hffhs8dfpr3n5drmrvajpn4xp";
meta = with lib; {
description = "A tool to clean out your AWS account";
diff --git a/nixpkgs/pkgs/tools/admin/azure-cli/default.nix b/nixpkgs/pkgs/tools/admin/azure-cli/default.nix
index 13fdf6dcd0d..f226a042420 100644
--- a/nixpkgs/pkgs/tools/admin/azure-cli/default.nix
+++ b/nixpkgs/pkgs/tools/admin/azure-cli/default.nix
@@ -1,12 +1,12 @@
{ stdenv, lib, python, fetchFromGitHub, installShellFiles }:
let
- version = "2.2.0";
+ version = "2.4.0";
src = fetchFromGitHub {
owner = "Azure";
repo = "azure-cli";
rev = "azure-cli-${version}";
- sha256 = "0bqkvx1gp4bhpjn5nrjc08lq8wldl1icrz6q1llaxgvqqmc8hcgp";
+ sha256 = "1j0h75cxrxa5yrijr7jfip7q5qrddaaqapd90f0qp2r4k9qb0y41";
};
# put packages that needs to be overriden in the py package scope
@@ -23,8 +23,7 @@ py.pkgs.toPythonApplication (py.pkgs.buildAzureCliPackage {
substituteInPlace setup.py \
--replace "javaproperties==0.5.1" "javaproperties" \
--replace "pytz==2019.1" "pytz" \
- --replace "mock~=2.0" "mock" \
- --replace "azure-mgmt-reservations==0.3.1" "azure-mgmt-reservations~=0.3.1"
+ --replace "mock~=4.0" "mock"
# remove namespace hacks
# remove urllib3 because it was added as 'urllib3[secure]', which doesn't get handled well
@@ -93,6 +92,7 @@ py.pkgs.toPythonApplication (py.pkgs.buildAzureCliPackage {
azure-mgmt-rdbms
azure-mgmt-recoveryservices
azure-mgmt-recoveryservicesbackup
+ azure-mgmt-redhatopenshift
azure-mgmt-redis
azure-mgmt-relay
azure-mgmt-reservations
diff --git a/nixpkgs/pkgs/tools/admin/azure-cli/python-packages.nix b/nixpkgs/pkgs/tools/admin/azure-cli/python-packages.nix
index 3c598e67a71..b43b9bd2cb0 100644
--- a/nixpkgs/pkgs/tools/admin/azure-cli/python-packages.nix
+++ b/nixpkgs/pkgs/tools/admin/azure-cli/python-packages.nix
@@ -55,6 +55,7 @@ let
argcomplete
azure-common
azure-cli-telemetry
+ azure-mgmt-core
azure-mgmt-resource
colorama
humanfriendly
@@ -63,6 +64,7 @@ let
msrest
msrestazure
paramiko
+ pkginfo
psutil
pygments
pyjwt
@@ -111,20 +113,26 @@ let
'';
};
- azure-batch = overrideAzureMgmtPackage super.azure-batch "8.0.0" "zip"
- "1j8nibnics9vakhqiwnjv7bwril7mfyz1svcvvsrb9a4wbdd12wi";
+ azure-batch = overrideAzureMgmtPackage super.azure-batch "9.0.0" "zip"
+ "112d73gxjqng348mcvi36ska6pxyg8qc3qswvhf5x4a0lr86zjj7";
+
+ azure-mgmt-apimanagement = overrideAzureMgmtPackage super.azure-mgmt-apimanagement "0.1.0" "zip"
+ "06bqqkn5mx127x1z7ycm6rl8ajxlrmrm2kcdpgkbl4baii1x6iax";
azure-mgmt-policyinsights = overrideAzureMgmtPackage super.azure-mgmt-policyinsights "0.4.0" "zip"
"1b69rz9wm0jvc54vx3b7h633x8gags51xwxrkp6myar40jggxw6g";
- azure-mgmt-rdbms = overrideAzureMgmtPackage super.azure-mgmt-rdbms "2.0.0" "zip"
- "19z0lpq6bpidlflwa263y51549xgcg4m040k872m7fmy7jm2xcbb";
+ azure-mgmt-rdbms = overrideAzureMgmtPackage super.azure-mgmt-rdbms "2.2.0" "zip"
+ "1iz1pf28ajrzbq8nab1jbjbgfbv0g6ni036xayy6xylvga4l8czr";
+
+ azure-mgmt-recoveryservices = overrideAzureMgmtPackage super.azure-mgmt-recoveryservices "0.4.0" "zip"
+ "0v0ycyjnnx09jqf958hj2q6zfpsn80bxxm98jf59y8rj09v99rz1";
azure-mgmt-recoveryservicesbackup = overrideAzureMgmtPackage super.azure-mgmt-recoveryservicesbackup "0.6.0" "zip"
"13s2k4jl8570bj6jkqzm0w29z29rl7h5i7czd3kr6vqar5wj9xjd";
- azure-mgmt-resource = overrideAzureMgmtPackage super.azure-mgmt-resource "8.0.1" "zip"
- "0gngm7w17r5922ji11pnpa6gp5vh5z6la025v9cda6smsnx0fxx7";
+ azure-mgmt-resource = overrideAzureMgmtPackage super.azure-mgmt-resource "9.0.0" "zip"
+ "00bmdbr7hdwb3ibr9sfbgbmmr6626qlz19cdi84d87rcisczf4nw";
azure-mgmt-appconfiguration = overrideAzureMgmtPackage super.azure-mgmt-appconfiguration "0.4.0" "zip"
"1dn5585nsizszjivx6lp677ka0mrg0ayqgag4yzfdz9ml8mj1xl5";
@@ -132,14 +140,14 @@ let
azure-mgmt-cognitiveservices = overrideAzureMgmtPackage super.azure-mgmt-cognitiveservices "5.0.0" "zip"
"1m7v3rfkvmdgghrpz15fm8pvmmhi40lcwfxdm2kxh7mx01r5l906";
- azure-mgmt-compute = overrideAzureMgmtPackage super.azure-mgmt-compute "11.0.0" "zip"
- "1dnlql4z9wawf8gc1v4rr386pifwcnx3ycr4gdccqwkgimgpsdg4";
+ azure-mgmt-compute = overrideAzureMgmtPackage super.azure-mgmt-compute "12.0.0" "zip"
+ "0vzq93g2fpnij4rykkk3391xq2knhlbz87vhim4zvj8s45sx6z8q";
azure-mgmt-consumption = overrideAzureMgmtPackage super.azure-mgmt-consumption "2.0.0" "zip"
"12ai4qps73ivawh0yzvgb148ksx02r30pqlvfihx497j62gsi1cs";
- azure-mgmt-containerservice = overrideAzureMgmtPackage super.azure-mgmt-containerservice "8.1.0" "zip"
- "07vpzhvi2946v5dn9cb2hkd1b9vj5c6zl32958bg2bxsjg9vvyi1";
+ azure-mgmt-containerservice = overrideAzureMgmtPackage super.azure-mgmt-containerservice "9.0.1" "zip"
+ "11nqjpi9qypb0xvfy63l98q5m5jfv5iqx15mliksm96vkdkmji3y";
azure-mgmt-cosmosdb = overrideAzureMgmtPackage super.azure-mgmt-cosmosdb "0.12.0" "zip"
"07c0hr7nha9789x1wz0ndca0sr0zscq63m9vd8pm1c6y0ss4iyn5";
@@ -150,11 +158,11 @@ let
azure-mgmt-imagebuilder = overrideAzureMgmtPackage super.azure-mgmt-imagebuilder "0.2.1" "zip"
"0mwlvy4x5nr3hsz7wdpdhpzwarzzwz4225bfpd68hr0pcjgzspky";
- azure-mgmt-iothub = overrideAzureMgmtPackage super.azure-mgmt-iothub "0.8.2" "zip"
- "0w3w1d156rnkwjdarv3qvycklxr3z2j7lry7a3jfgj3ykzny12rq";
+ azure-mgmt-iothub = overrideAzureMgmtPackage super.azure-mgmt-iothub "0.11.0" "zip"
+ "11887zf61ji1dh62czrsgxwz8idybw93m6iwahjy777jkdyviyzn";
- azure-mgmt-iotcentral = overrideAzureMgmtPackage super.azure-mgmt-iotcentral "2.0.0" "zip"
- "1fql0j28d2r6slgabb7b438gdga513iskqh4al6c7dsmj1yzdzwa";
+ azure-mgmt-iotcentral = overrideAzureMgmtPackage super.azure-mgmt-iotcentral "3.0.0" "zip"
+ "0iq04hvivq3fvg2lhax95gx0x35avk5hps42227z3qna5i2cznpn";
azure-mgmt-kusto = overrideAzureMgmtPackage super.azure-mgmt-kusto "0.3.0" "zip"
"1pmcdgimd66h964a3d5m2j2fbydshcwhrk87wblhwhfl3xwbgf4y";
@@ -162,14 +170,17 @@ let
azure-mgmt-devtestlabs = overrideAzureMgmtPackage super.azure-mgmt-devtestlabs "2.2.0" "zip"
"15lpyv9z8ss47rjmg1wx5akh22p9br2vckaj7jk3639vi38ac5nl";
- azure-mgmt-netapp = overrideAzureMgmtPackage super.azure-mgmt-netapp "0.7.0" "zip"
- "0cf4pknb5y2yz4jqwg7xm626zkfx8i8hqcr3dkvq21lrx7fz96r3";
+ azure-mgmt-netapp = overrideAzureMgmtPackage super.azure-mgmt-netapp "0.8.0" "zip"
+ "0vbg5mpahrnnnbj80flgzxxiffic94wsc9srm4ir85y2j5rprpv7";
azure-mgmt-dns = overrideAzureMgmtPackage super.azure-mgmt-dns "2.1.0" "zip"
"1l55py4fzzwhxlmnwa41gpmqk9v2ncc79w7zq11sm9a5ynrv2c1p";
- azure-mgmt-network = overrideAzureMgmtPackage super.azure-mgmt-network "9.0.0" "zip"
- "12bsdbh37xiz42hvrp8ghszyqkiali3pk50x44f3aip12pgx6kix";
+ azure-mgmt-loganalytics = overrideAzureMgmtPackage super.azure-mgmt-loganalytics "0.2.0" "zip"
+ "11kx4ck58nhhn9zf5vq0rqh7lfh2yj758s6ainrqyqadxvq5ycf7";
+
+ azure-mgmt-network = overrideAzureMgmtPackage super.azure-mgmt-network "10.1.0" "zip"
+ "0fmsdwzyn167lwh87yyadq1bdc4q6rfz3gj5bh1mgavi9ghhxb75";
azure-mgmt-media = overrideAzureMgmtPackage super.azure-mgmt-media "1.1.1" "zip"
"16wk0ksycrscsn3n14qk4vvf7i567vq6f96lwf5dwbc81wx6n32x";
@@ -180,6 +191,9 @@ let
azure-mgmt-web = overrideAzureMgmtPackage super.azure-mgmt-web "0.44.0" "zip"
"05dqakhfi301k2jnvccxdkigqvwnf9xz858pqg9vsri3dq69f1rw";
+ azure-mgmt-redhatopenshift = overrideAzureMgmtPackage super.azure-mgmt-redhatopenshift "0.1.0" "zip"
+ "1g65lbia1i1jw6qkyjz2ldyl3p90rbr78l8kfryg70sj7z3gnnjn";
+
azure-mgmt-redis = overrideAzureMgmtPackage super.azure-mgmt-redis "7.0.0rc1" "zip"
"086wk31wsl8dx14qpd0g1bly8i9a8fix007djlj9cybva2f2bk6k";
@@ -189,8 +203,8 @@ let
azure-mgmt-security = overrideAzureMgmtPackage super.azure-mgmt-security "0.1.0" "zip"
"1cb466722bs0ribrirb32kc299716pl0pwivz3jyn40dd78cwhhx";
- azure-mgmt-sql = overrideAzureMgmtPackage super.azure-mgmt-sql "0.17.0" "zip"
- "1kp1wzcydgyc2mzkxigfv6rqzwzf3d0cnbqc6w7h907qbb4lw2r0";
+ azure-mgmt-sql = overrideAzureMgmtPackage super.azure-mgmt-sql "0.18.0" "zip"
+ "0i9lnhcx85xccddvz1wdz5j0idm6sw2cn3066dww5993nmg0ijlr";
azure-mgmt-sqlvirtualmachine = overrideAzureMgmtPackage super.azure-mgmt-sqlvirtualmachine "0.5.0" "zip"
"1b9am8raa17hxnz7d5pk2ix0309wsnhnchq1mi22icd728sl5adm";
@@ -204,17 +218,17 @@ let
azure-mgmt-eventhub = overrideAzureMgmtPackage super.azure-mgmt-eventhub "3.0.0" "zip"
"05c6isg13dslds94kv28v6navxj4bp4c5lsd9df0g3ndsxvpdrxp";
- azure-mgmt-keyvault = overrideAzureMgmtPackage super.azure-mgmt-keyvault "2.1.0" "zip"
- "1ikv8b2h1r91fa0srz95ymn54qpqgb5a4faxwp4hf92r5h85c8j9";
+ azure-mgmt-keyvault = overrideAzureMgmtPackage super.azure-mgmt-keyvault "2.2.0" "zip"
+ "1r5ww9ndya6sifafrbp4cr5iyyaww2ns7wrbqm6hc6aqxcpf30qq";
azure-mgmt-cdn = overrideAzureMgmtPackage super.azure-mgmt-cdn "4.1.0rc1" "zip"
"00q5723gvc57kg2w1iyhfchp018skwd89ibrw23p7ngm2bb76g45";
- azure-mgmt-containerregistry = overrideAzureMgmtPackage super.azure-mgmt-containerregistry "3.0.0rc9" "zip"
- "060m4hqi1h5h53imj0vmpbzhqkwis7h91nwinpcvjs422figcv0i";
+ azure-mgmt-containerregistry = overrideAzureMgmtPackage super.azure-mgmt-containerregistry "3.0.0rc11" "zip"
+ "1ixh2wmrbm1v2xlrnmy1l513jpqch6b5vyh9x77flm649x1cff2q";
- azure-mgmt-monitor = overrideAzureMgmtPackage super.azure-mgmt-monitor "0.7.0" "zip"
- "1pprvk5255b6brbw73g0g13zygwa7a2px5x08wy3153rqlzan5l2";
+ azure-mgmt-monitor = overrideAzureMgmtPackage super.azure-mgmt-monitor "0.9.0" "zip"
+ "170jyr1qzwhv5ihyrsg5d8qzjylqmg31dscd31jzi4i7bwqf3sb8";
azure-mgmt-advisor = overrideAzureMgmtPackage super.azure-mgmt-advisor "2.0.1" "zip"
"1wsfkprdrn22mwm24y2zlcms8ppp7jwq3s86r3ymbl29pbaxca8r";
@@ -225,14 +239,14 @@ let
azure-mgmt-authorization = overrideAzureMgmtPackage super.azure-mgmt-authorization "0.52.0" "zip"
"0357laxgldb7lvvws81r8xb6mrq9dwwnr1bnwdnyj4bw6p21i9hn";
- azure-mgmt-storage = overrideAzureMgmtPackage super.azure-mgmt-storage "8.0.0" "zip"
- "0cxcdyy974ya1yi7s14sw54rwpc8qjngxr0jqb8vxki3528phrv3";
+ azure-mgmt-storage = overrideAzureMgmtPackage super.azure-mgmt-storage "9.0.0" "zip"
+ "198r51av2rd1mr3q9j8jibhd14w0v8k59ipc3czsm4g1n44adgkl";
azure-mgmt-servicefabric = overrideAzureMgmtPackage super.azure-mgmt-servicefabric "0.4.0" "zip"
"1x18grkjf2p2r1ihlwv607sna9yjvsr2jwnkjc55askrgrwx5jx2";
- azure-mgmt-hdinsight = overrideAzureMgmtPackage super.azure-mgmt-hdinsight "1.3.0" "zip"
- "1r7isr7hzq2dv1idwwa9xxxgk8wh0ncka45r4rdcsl1p7kd2kqam";
+ azure-mgmt-hdinsight = overrideAzureMgmtPackage super.azure-mgmt-hdinsight "1.4.0" "zip"
+ "0zmmfj7z1zrayjqwqybcn3bwm47d2ngyxm1g6fh2iw5c2f9czycv";
azure-graphrbac = super.azure-graphrbac.overrideAttrs(oldAttrs: rec {
version = "0.60.0";
@@ -297,6 +311,16 @@ let
'';
});
+ knack = super.knack.overridePythonAttrs(oldAttrs: rec {
+ version = "0.7.0rc3";
+
+ src = super.fetchPypi {
+ inherit (oldAttrs) pname;
+ inherit version;
+ sha256 = "1mazy5a3505wqa68fxq7h55m0vbmjygv2wbgmxmrrrgw3w84q5r7";
+ };
+ });
+
};
};
in
diff --git a/nixpkgs/pkgs/tools/admin/berglas/default.nix b/nixpkgs/pkgs/tools/admin/berglas/default.nix
index c1c46da41b7..ecafb139782 100644
--- a/nixpkgs/pkgs/tools/admin/berglas/default.nix
+++ b/nixpkgs/pkgs/tools/admin/berglas/default.nix
@@ -11,7 +11,7 @@ buildGoModule rec {
sha256 = "0y393g36h35zzqyf5b10j6qq2jhvz83j17cmasnv6wbyrb3vnn0n";
};
- modSha256 = "0m2bqx102lf6nihdjbl8a08xcwi80rawvh91j1cav0njm9w5vmmm";
+ vendorSha256 = null;
meta = with stdenv.lib; {
description = "A tool for managing secrets on Google Cloud";
@@ -19,4 +19,4 @@ buildGoModule rec {
license = licenses.asl20;
platforms = platforms.unix;
};
-}
+} \ No newline at end of file
diff --git a/nixpkgs/pkgs/tools/admin/certigo/default.nix b/nixpkgs/pkgs/tools/admin/certigo/default.nix
index 5474cb25429..86873d90514 100644
--- a/nixpkgs/pkgs/tools/admin/certigo/default.nix
+++ b/nixpkgs/pkgs/tools/admin/certigo/default.nix
@@ -11,7 +11,7 @@ buildGoModule rec {
sha256 = "0siwbxxzknmbsjy23d0lvh591ngabqhr2g8mip0siwa7c1y7ivv4";
};
- modSha256 = "1i5n5yh6nvv2i2nm60vqy1gngj8p5w6ma5fcwmp7bl4jxjrzbi83";
+ vendorSha256 = "1l6ajfl04rfbssvijgd5jrppmqc5svfrswdx01x007lr8rvdfd94";
meta = with stdenv.lib; {
description = "A utility to examine and validate certificates in a variety of formats";
@@ -19,4 +19,4 @@ buildGoModule rec {
license = licenses.asl20;
maintainers = [ maintainers.marsam ];
};
-}
+} \ No newline at end of file
diff --git a/nixpkgs/pkgs/tools/admin/clair/default.nix b/nixpkgs/pkgs/tools/admin/clair/default.nix
index 3f4d00736ad..2562dc45fa8 100644
--- a/nixpkgs/pkgs/tools/admin/clair/default.nix
+++ b/nixpkgs/pkgs/tools/admin/clair/default.nix
@@ -11,7 +11,7 @@ buildGoModule rec {
sha256 = "14dh9iv2g138rivvfk135m3l90kk6c1ln1iqxhbi7s99h1jixbqw";
};
- modSha256 = "0rgkrid58kji39nlmiii95r8shbzr6dwalj5m7qwxy5w1rcaljr5";
+ vendorSha256 = "0x31n50vd8660z816as6kms5dkv87b0mhblccpkvd9cbvcv2n37a";
nativeBuildInputs = [ makeWrapper ];
@@ -26,4 +26,4 @@ buildGoModule rec {
license = licenses.asl20;
maintainers = with maintainers; [ marsam ];
};
-}
+} \ No newline at end of file
diff --git a/nixpkgs/pkgs/tools/admin/docker-credential-helpers/default.nix b/nixpkgs/pkgs/tools/admin/docker-credential-helpers/default.nix
index 1f4315afc40..38762b6fd29 100644
--- a/nixpkgs/pkgs/tools/admin/docker-credential-helpers/default.nix
+++ b/nixpkgs/pkgs/tools/admin/docker-credential-helpers/default.nix
@@ -32,11 +32,11 @@ buildGoPackage rec {
installPhase =
if stdenv.isDarwin
then ''
- install -Dm755 -t $bin/bin bin/docker-credential-osxkeychain
+ install -Dm755 -t $out/bin bin/docker-credential-osxkeychain
''
else ''
- install -Dm755 -t $bin/bin bin/docker-credential-pass
- install -Dm755 -t $bin/bin bin/docker-credential-secretservice
+ install -Dm755 -t $out/bin bin/docker-credential-pass
+ install -Dm755 -t $out/bin bin/docker-credential-secretservice
'';
meta = with stdenv.lib; {
diff --git a/nixpkgs/pkgs/tools/admin/eksctl/default.nix b/nixpkgs/pkgs/tools/admin/eksctl/default.nix
index 6bdcedd97ae..18fb37aa41c 100644
--- a/nixpkgs/pkgs/tools/admin/eksctl/default.nix
+++ b/nixpkgs/pkgs/tools/admin/eksctl/default.nix
@@ -2,23 +2,22 @@
buildGoModule rec {
pname = "eksctl";
- version = "0.17.0";
+ version = "0.19.0";
src = fetchFromGitHub {
owner = "weaveworks";
repo = pname;
rev = version;
- sha256 = "0ck096qfj4wp166bymvync8qyb0q2az86hckjk3hrzqdj8vwhrza";
+ sha256 = "0xlr7hsncih4nzydi6sphp7j7k82cbhmi7jb0sd954i8kzl3sc1q";
};
- modSha256 = "024fqknv6f1zzcpxfl3c12d7ya7ynsyy7hf7zsnmpsnrksvbkfvc";
+ vendorSha256 = "14d9hl01z7ixp1wa8kp1zs0z1p3pvz6hkp49z582nqllpb2xjmkx";
subPackages = [ "cmd/eksctl" ];
buildFlags = [ "-tags netgo" "-tags release" ];
- postInstall =
- ''
+ postInstall = ''
mkdir -p "$out/share/"{bash-completion/completions,zsh/site-functions}
$out/bin/eksctl completion bash > "$out/share/bash-completion/completions/eksctl"
diff --git a/nixpkgs/pkgs/tools/admin/exoscale-cli/default.nix b/nixpkgs/pkgs/tools/admin/exoscale-cli/default.nix
new file mode 100644
index 00000000000..a408746c7fd
--- /dev/null
+++ b/nixpkgs/pkgs/tools/admin/exoscale-cli/default.nix
@@ -0,0 +1,32 @@
+{ stdenv, buildGo114Package, fetchFromGitHub }:
+
+buildGo114Package rec {
+ pname = "exoscale-cli";
+ version = "1.12.0";
+
+ src = fetchFromGitHub {
+ owner = "exoscale";
+ repo = "cli";
+ rev = "v${version}";
+ sha256 = "04ym7mfv565icj3lmd2nrvq9asawwmmzg09681pj9py61ws56bxr";
+ };
+
+ goPackagePath = "github.com/exoscale/cli";
+ goDeps = ./deps.nix;
+
+ # ensures only the cli binary is built and we don't clutter bin/ with submodules
+ subPackages = [ "." ];
+
+ # we need to rename the resulting binary but can't use buildFlags with -o here
+ # because these are passed to "go install" which does not recognize -o
+ postBuild = ''
+ mv go/bin/cli go/bin/exo
+ '';
+
+ meta = {
+ description = "Command-line tool for everything at Exoscale: compute, storage, dns";
+ homepage = "https://github.com/exoscale/cli";
+ license = stdenv.lib.licenses.asl20;
+ maintainers = with stdenv.lib.maintainers; [ dramaturg ];
+ };
+}
diff --git a/nixpkgs/pkgs/tools/admin/exoscale-cli/deps.nix b/nixpkgs/pkgs/tools/admin/exoscale-cli/deps.nix
new file mode 100644
index 00000000000..a67ee93a851
--- /dev/null
+++ b/nixpkgs/pkgs/tools/admin/exoscale-cli/deps.nix
@@ -0,0 +1,876 @@
+# file generated from go.mod using vgo2nix (https://github.com/adisbladis/vgo2nix)
+[
+ {
+ goPackagePath = "github.com/BurntSushi/toml";
+ fetch = {
+ type = "git";
+ url = "https://github.com/BurntSushi/toml";
+ rev = "v0.3.1";
+ sha256 = "1fjdwwfzyzllgiwydknf1pwjvy49qxfsczqx5gz3y0izs7as99j6";
+ };
+ }
+ {
+ goPackagePath = "github.com/VividCortex/ewma";
+ fetch = {
+ type = "git";
+ url = "https://github.com/VividCortex/ewma";
+ rev = "v1.1.1";
+ sha256 = "14v2dy5gqchjn7k0sd6cx59ms42v681r6xz7cb1kspp4b28a74rw";
+ };
+ }
+ {
+ goPackagePath = "github.com/alecthomas/assert";
+ fetch = {
+ type = "git";
+ url = "https://github.com/alecthomas/assert";
+ rev = "405dbfeb8e38";
+ sha256 = "1l567pi17k593nrd1qlbmiq8z9jy3qs60px2a16fdpzjsizwqx8l";
+ };
+ }
+ {
+ goPackagePath = "github.com/alecthomas/chroma";
+ fetch = {
+ type = "git";
+ url = "https://github.com/alecthomas/chroma";
+ rev = "v0.6.2";
+ sha256 = "1bcppy1s148iikr78qjm0akahn01ywh83a8pw544prr9yc16jvmz";
+ };
+ }
+ {
+ goPackagePath = "github.com/alecthomas/colour";
+ fetch = {
+ type = "git";
+ url = "https://github.com/alecthomas/colour";
+ rev = "60882d9e2721";
+ sha256 = "0iq566534gbzkd16ixg7fk298wd766821vvs80838yifx9yml5vs";
+ };
+ }
+ {
+ goPackagePath = "github.com/alecthomas/gometalinter";
+ fetch = {
+ type = "git";
+ url = "https://github.com/alecthomas/gometalinter";
+ rev = "v2.0.11";
+ sha256 = "08p7bwvhpgizif8qi59m8mm3mcny70x9msbk8m8vjpphsq55wha4";
+ };
+ }
+ {
+ goPackagePath = "github.com/alecthomas/kong";
+ fetch = {
+ type = "git";
+ url = "https://github.com/alecthomas/kong";
+ rev = "v0.1.15";
+ sha256 = "1llxabcdzlb2hard0h931knqkdnyjyz8dp3k0nli0m0mags7l31b";
+ };
+ }
+ {
+ goPackagePath = "github.com/alecthomas/repr";
+ fetch = {
+ type = "git";
+ url = "https://github.com/alecthomas/repr";
+ rev = "117648cd9897";
+ sha256 = "05v1rgzdqc8razf702laagrvhvx68xd9yxxmzd3dyz0d6425pdrp";
+ };
+ }
+ {
+ goPackagePath = "github.com/alecthomas/units";
+ fetch = {
+ type = "git";
+ url = "https://github.com/alecthomas/units";
+ rev = "2efee857e7cf";
+ sha256 = "1j65b91qb9sbrml9cpabfrcf07wmgzzghrl7809hjjhrmbzri5bl";
+ };
+ }
+ {
+ goPackagePath = "github.com/armon/consul-api";
+ fetch = {
+ type = "git";
+ url = "https://github.com/armon/consul-api";
+ rev = "eb2c6b5be1b6";
+ sha256 = "1j6fdr1sg36qy4n4xjl7brq739fpm5npq98cmvklzjc9qrx98nk9";
+ };
+ }
+ {
+ goPackagePath = "github.com/blang/semver";
+ fetch = {
+ type = "git";
+ url = "https://github.com/blang/semver";
+ rev = "v3.5.1";
+ sha256 = "13ws259bwcibkclbr82ilhk6zadm63kxklxhk12wayklj8ghhsmy";
+ };
+ }
+ {
+ goPackagePath = "github.com/cenkalti/backoff";
+ fetch = {
+ type = "git";
+ url = "https://github.com/cenkalti/backoff";
+ rev = "v2.0.0";
+ sha256 = "0k4899ifpir6kmfxli8a2xfj5zdh0xb2jd0fq2r38wzd4pk25ipr";
+ };
+ }
+ {
+ goPackagePath = "github.com/chzyer/logex";
+ fetch = {
+ type = "git";
+ url = "https://github.com/chzyer/logex";
+ rev = "v1.1.10";
+ sha256 = "08pbjj3wx9acavlwyr055isa8a5hnmllgdv5k6ra60l5y1brmlq4";
+ };
+ }
+ {
+ goPackagePath = "github.com/chzyer/readline";
+ fetch = {
+ type = "git";
+ url = "https://github.com/chzyer/readline";
+ rev = "2972be24d48e";
+ sha256 = "104q8dazj8yf6b089jjr82fy9h1g80zyyzvp3g8b44a7d8ngjj6r";
+ };
+ }
+ {
+ goPackagePath = "github.com/chzyer/test";
+ fetch = {
+ type = "git";
+ url = "https://github.com/chzyer/test";
+ rev = "a1ea475d72b1";
+ sha256 = "0rns2aqk22i9xsgyap0pq8wi4cfaxsri4d9q6xxhhyma8jjsnj2k";
+ };
+ }
+ {
+ goPackagePath = "github.com/client9/misspell";
+ fetch = {
+ type = "git";
+ url = "https://github.com/client9/misspell";
+ rev = "v0.3.4";
+ sha256 = "1vwf33wsc4la25zk9nylpbp9px3svlmldkm0bha4hp56jws4q9cs";
+ };
+ }
+ {
+ goPackagePath = "github.com/coreos/etcd";
+ fetch = {
+ type = "git";
+ url = "https://github.com/coreos/etcd";
+ rev = "v3.3.10";
+ sha256 = "1x2ii1hj8jraba8rbxz6dmc03y3sjxdnzipdvg6fywnlq1f3l3wl";
+ };
+ }
+ {
+ goPackagePath = "github.com/coreos/go-etcd";
+ fetch = {
+ type = "git";
+ url = "https://github.com/coreos/go-etcd";
+ rev = "v2.0.0";
+ sha256 = "1xb34hzaa1lkbq5vkzy9vcz6gqwj7hp6cdbvyack2bf28dwn33jj";
+ };
+ }
+ {
+ goPackagePath = "github.com/coreos/go-semver";
+ fetch = {
+ type = "git";
+ url = "https://github.com/coreos/go-semver";
+ rev = "v0.2.0";
+ sha256 = "1gghi5bnqj50hfxhqc1cxmynqmh2yk9ii7ab9gsm75y5cp94ymk0";
+ };
+ }
+ {
+ goPackagePath = "github.com/cpuguy83/go-md2man";
+ fetch = {
+ type = "git";
+ url = "https://github.com/cpuguy83/go-md2man";
+ rev = "v1.0.8";
+ sha256 = "1w22dfdamsq63b5rvalh9k2y7rbwfkkjs7vm9vd4a13h2ql70lg2";
+ };
+ }
+ {
+ goPackagePath = "github.com/cyberdelia/templates";
+ fetch = {
+ type = "git";
+ url = "https://github.com/cyberdelia/templates";
+ rev = "ca7fffd4298c";
+ sha256 = "1miakwci9pz95p0jps4i3pyv5ws713ks1wwir5bzrl0yg8klrgw1";
+ };
+ }
+ {
+ goPackagePath = "github.com/danwakefield/fnmatch";
+ fetch = {
+ type = "git";
+ url = "https://github.com/danwakefield/fnmatch";
+ rev = "cbb64ac3d964";
+ sha256 = "0cbf511ppsa6hf59mdl7nbyn2b2n71y0bpkzbmfkdqjhanqh1lqz";
+ };
+ }
+ {
+ goPackagePath = "github.com/davecgh/go-spew";
+ fetch = {
+ type = "git";
+ url = "https://github.com/davecgh/go-spew";
+ rev = "v1.1.1";
+ sha256 = "0hka6hmyvp701adzag2g26cxdj47g21x6jz4sc6jjz1mn59d474y";
+ };
+ }
+ {
+ goPackagePath = "github.com/deepmap/oapi-codegen";
+ fetch = {
+ type = "git";
+ url = "https://github.com/deepmap/oapi-codegen";
+ rev = "ee90a3f9f1ae";
+ sha256 = "199nb6aqhllkk891x24h1jffin1x9fx8jdsav9pbc2ki0z8mlji3";
+ };
+ }
+ {
+ goPackagePath = "github.com/dgrijalva/jwt-go";
+ fetch = {
+ type = "git";
+ url = "https://github.com/dgrijalva/jwt-go";
+ rev = "v3.2.0";
+ sha256 = "08m27vlms74pfy5z79w67f9lk9zkx6a9jd68k3c4msxy75ry36mp";
+ };
+ }
+ {
+ goPackagePath = "github.com/dlclark/regexp2";
+ fetch = {
+ type = "git";
+ url = "https://github.com/dlclark/regexp2";
+ rev = "v1.1.6";
+ sha256 = "144s81ndviwhyy20ipxvvfvap8phv5p762glxrz6aqxprkxfarj5";
+ };
+ }
+ {
+ goPackagePath = "github.com/dustin/go-humanize";
+ fetch = {
+ type = "git";
+ url = "https://github.com/dustin/go-humanize";
+ rev = "v1.0.0";
+ sha256 = "1kqf1kavdyvjk7f8kx62pnm7fbypn9z1vbf8v2qdh3y7z7a0cbl3";
+ };
+ }
+ {
+ goPackagePath = "github.com/exoscale/egoscale";
+ fetch = {
+ type = "git";
+ url = "https://github.com/exoscale/egoscale";
+ rev = "v0.24.0";
+ sha256 = "1ls7blpmhwqxz9cfjc5799q4047pawfda1v1mhyicjdlp3b1z1zi";
+ };
+ }
+ {
+ goPackagePath = "github.com/fatih/camelcase";
+ fetch = {
+ type = "git";
+ url = "https://github.com/fatih/camelcase";
+ rev = "v1.0.0";
+ sha256 = "0z7rw6f5j97dkzqya257dqlxf3cm8zl508081gmnr4bsjhkwpz2l";
+ };
+ }
+ {
+ goPackagePath = "github.com/fsnotify/fsnotify";
+ fetch = {
+ type = "git";
+ url = "https://github.com/fsnotify/fsnotify";
+ rev = "v1.4.7";
+ sha256 = "07va9crci0ijlivbb7q57d2rz9h27zgn2fsm60spjsqpdbvyrx4g";
+ };
+ }
+ {
+ goPackagePath = "github.com/getkin/kin-openapi";
+ fetch = {
+ type = "git";
+ url = "https://github.com/getkin/kin-openapi";
+ rev = "v0.2.0";
+ sha256 = "0slv4k55yiqgv5cv51mvfdcckl95wsbvhvrrpmh4wf7q9rk0jkf6";
+ };
+ }
+ {
+ goPackagePath = "github.com/ghodss/yaml";
+ fetch = {
+ type = "git";
+ url = "https://github.com/ghodss/yaml";
+ rev = "v1.0.0";
+ sha256 = "0skwmimpy7hlh7pva2slpcplnm912rp3igs98xnqmn859kwa5v8g";
+ };
+ }
+ {
+ goPackagePath = "github.com/go-chi/chi";
+ fetch = {
+ type = "git";
+ url = "https://github.com/go-chi/chi";
+ rev = "v4.0.2";
+ sha256 = "1ay9yxzj60l21h4wayrq9sv5ajaqaryy5yyf27z7v2k4a83b5qr6";
+ };
+ }
+ {
+ goPackagePath = "github.com/go-ini/ini";
+ fetch = {
+ type = "git";
+ url = "https://github.com/go-ini/ini";
+ rev = "v1.42.0";
+ sha256 = "18ywm8zyv091j1pp5mvx8szl7928chk8lw02br6jy568d7rk4xal";
+ };
+ }
+ {
+ goPackagePath = "github.com/gofrs/uuid";
+ fetch = {
+ type = "git";
+ url = "https://github.com/gofrs/uuid";
+ rev = "v3.2.0";
+ sha256 = "1q63mp7bznhfgyw133c0wc0hpcj1cq9bcf7w1f8r6inkcrils1fz";
+ };
+ }
+ {
+ goPackagePath = "github.com/golang/lint";
+ fetch = {
+ type = "git";
+ url = "https://github.com/golang/lint";
+ rev = "c67002cb31c3";
+ sha256 = "0gymbggskjmphqxqcx4s0vnlcz7mygbix0vhwcwv5r67c0bf6765";
+ };
+ }
+ {
+ goPackagePath = "github.com/golangci/lint-1";
+ fetch = {
+ type = "git";
+ url = "https://github.com/golangci/lint-1";
+ rev = "d2cdd8c08219";
+ sha256 = "0viib12a61338411ng4nnd4na4fscsknghk397jdfn00sigyy4ls";
+ };
+ }
+ {
+ goPackagePath = "github.com/google/shlex";
+ fetch = {
+ type = "git";
+ url = "https://github.com/google/shlex";
+ rev = "c34317bd91bf";
+ sha256 = "00qivza4hkllfkar2vpqmyxybi0fwqipgijv61dgapq4xddxdq0r";
+ };
+ }
+ {
+ goPackagePath = "github.com/gopherjs/gopherjs";
+ fetch = {
+ type = "git";
+ url = "https://github.com/gopherjs/gopherjs";
+ rev = "d547d1d9531e";
+ sha256 = "0rhgxfh8b3qq4imkw6dmv0hxsmflm9pkax8i7a9z8q464z1ixrz7";
+ };
+ }
+ {
+ goPackagePath = "github.com/gordonklaus/ineffassign";
+ fetch = {
+ type = "git";
+ url = "https://github.com/gordonklaus/ineffassign";
+ rev = "1003c8bd00dc";
+ sha256 = "1rkzqvd3z03vq8q8qi9cghvgggsf02ammj9wq8jvpnx6b2sd16nd";
+ };
+ }
+ {
+ goPackagePath = "github.com/hashicorp/hcl";
+ fetch = {
+ type = "git";
+ url = "https://github.com/hashicorp/hcl";
+ rev = "v1.0.0";
+ sha256 = "0q6ml0qqs0yil76mpn4mdx4lp94id8vbv575qm60jzl1ijcl5i66";
+ };
+ }
+ {
+ goPackagePath = "github.com/inconshreveable/mousetrap";
+ fetch = {
+ type = "git";
+ url = "https://github.com/inconshreveable/mousetrap";
+ rev = "v1.0.0";
+ sha256 = "1mn0kg48xkd74brf48qf5hzp0bc6g8cf5a77w895rl3qnlpfw152";
+ };
+ }
+ {
+ goPackagePath = "github.com/jtolds/gls";
+ fetch = {
+ type = "git";
+ url = "https://github.com/jtolds/gls";
+ rev = "v4.20.0";
+ sha256 = "1k7xd2q2ysv2xsh373qs801v6f359240kx0vrl0ydh7731lngvk6";
+ };
+ }
+ {
+ goPackagePath = "github.com/juju/ansiterm";
+ fetch = {
+ type = "git";
+ url = "https://github.com/juju/ansiterm";
+ rev = "720a0952cc2a";
+ sha256 = "0n6j0y7xhashp8gdkdl0r7vlbkdrkymrzxn9hxrx522k2isggs7h";
+ };
+ }
+ {
+ goPackagePath = "github.com/konsorten/go-windows-terminal-sequences";
+ fetch = {
+ type = "git";
+ url = "https://github.com/konsorten/go-windows-terminal-sequences";
+ rev = "v1.0.1";
+ sha256 = "1lchgf27n276vma6iyxa0v1xds68n2g8lih5lavqnx5x6q5pw2ip";
+ };
+ }
+ {
+ goPackagePath = "github.com/kr/pretty";
+ fetch = {
+ type = "git";
+ url = "https://github.com/kr/pretty";
+ rev = "v0.1.0";
+ sha256 = "18m4pwg2abd0j9cn5v3k2ksk9ig4vlwxmlw9rrglanziv9l967qp";
+ };
+ }
+ {
+ goPackagePath = "github.com/kr/pty";
+ fetch = {
+ type = "git";
+ url = "https://github.com/kr/pty";
+ rev = "v1.1.1";
+ sha256 = "0383f0mb9kqjvncqrfpidsf8y6ns5zlrc91c6a74xpyxjwvzl2y6";
+ };
+ }
+ {
+ goPackagePath = "github.com/kr/text";
+ fetch = {
+ type = "git";
+ url = "https://github.com/kr/text";
+ rev = "v0.1.0";
+ sha256 = "1gm5bsl01apvc84bw06hasawyqm4q84vx1pm32wr9jnd7a8vjgj1";
+ };
+ }
+ {
+ goPackagePath = "github.com/labstack/echo";
+ fetch = {
+ type = "git";
+ url = "https://github.com/labstack/echo";
+ rev = "v4.1.11";
+ sha256 = "0b14vgwzznn7wzyjb98xdmq4wjg16l3y62njiwfz4qsm4pwzk405";
+ };
+ }
+ {
+ goPackagePath = "github.com/labstack/gommon";
+ fetch = {
+ type = "git";
+ url = "https://github.com/labstack/gommon";
+ rev = "v0.3.0";
+ sha256 = "18z7akyzm75p6anm4b8qkqgm4iivx50z07hi5wf50w1pbsvbcdi0";
+ };
+ }
+ {
+ goPackagePath = "github.com/lunixbochs/vtclean";
+ fetch = {
+ type = "git";
+ url = "https://github.com/lunixbochs/vtclean";
+ rev = "2d01aacdc34a";
+ sha256 = "1ss88dyx5hr4imvpg5lixvp0cf7c2qm4x9m8mdgshjpm92g5rqmf";
+ };
+ }
+ {
+ goPackagePath = "github.com/magiconair/properties";
+ fetch = {
+ type = "git";
+ url = "https://github.com/magiconair/properties";
+ rev = "v1.8.0";
+ sha256 = "1a10362wv8a8qwb818wygn2z48lgzch940hvpv81hv8gc747ajxn";
+ };
+ }
+ {
+ goPackagePath = "github.com/manifoldco/promptui";
+ fetch = {
+ type = "git";
+ url = "https://github.com/manifoldco/promptui";
+ rev = "v0.3.2";
+ sha256 = "185h0lqm14l9j0yvdsn9njq7jw3j6x3l21jvvczzbcbbrj44q0pl";
+ };
+ }
+ {
+ goPackagePath = "github.com/matryer/moq";
+ fetch = {
+ type = "git";
+ url = "https://github.com/matryer/moq";
+ rev = "6cfb0558e1bd";
+ sha256 = "0x7ss68cvq2aljyw4765iy7divmp8rghpyzlas3nb95qzsfmmpzl";
+ };
+ }
+ {
+ goPackagePath = "github.com/mattn/go-colorable";
+ fetch = {
+ type = "git";
+ url = "https://github.com/mattn/go-colorable";
+ rev = "v0.1.4";
+ sha256 = "1yxcz08kminqr1221zxpibnbzfcgs3fafin0z9zqb3gqvf74jywz";
+ };
+ }
+ {
+ goPackagePath = "github.com/mattn/go-isatty";
+ fetch = {
+ type = "git";
+ url = "https://github.com/mattn/go-isatty";
+ rev = "v0.0.10";
+ sha256 = "0jf4hwfwd2cpxrlyv0jzcia809q2bjw7y1m3ciaj2s8lj2jqyf6r";
+ };
+ }
+ {
+ goPackagePath = "github.com/mattn/go-runewidth";
+ fetch = {
+ type = "git";
+ url = "https://github.com/mattn/go-runewidth";
+ rev = "v0.0.3";
+ sha256 = "0lc39b6xrxv7h3v3y1kgz49cgi5qxwlygs715aam6ba35m48yi7g";
+ };
+ }
+ {
+ goPackagePath = "github.com/minio/minio-go";
+ fetch = {
+ type = "git";
+ url = "https://github.com/minio/minio-go";
+ rev = "v6.0.44";
+ sha256 = "0sfmd2lf24f7ds16imk63mas6izhjnmprbxad0sil9abvk8r23mk";
+ };
+ }
+ {
+ goPackagePath = "github.com/minio/sha256-simd";
+ fetch = {
+ type = "git";
+ url = "https://github.com/minio/sha256-simd";
+ rev = "v0.1.1";
+ sha256 = "1j0iqsckm97g4l79vd4mc7apbmkdar23jpzqpnpdhwpfd834j8lp";
+ };
+ }
+ {
+ goPackagePath = "github.com/mitchellh/go-homedir";
+ fetch = {
+ type = "git";
+ url = "https://github.com/mitchellh/go-homedir";
+ rev = "v1.1.0";
+ sha256 = "0ydzkipf28hwj2bfxqmwlww47khyk6d152xax4bnyh60f4lq3nx1";
+ };
+ }
+ {
+ goPackagePath = "github.com/mitchellh/mapstructure";
+ fetch = {
+ type = "git";
+ url = "https://github.com/mitchellh/mapstructure";
+ rev = "v1.1.2";
+ sha256 = "03bpv28jz9zhn4947saqwi328ydj7f6g6pf1m2d4m5zdh5jlfkrr";
+ };
+ }
+ {
+ goPackagePath = "github.com/nicksnyder/go-i18n";
+ fetch = {
+ type = "git";
+ url = "https://github.com/nicksnyder/go-i18n";
+ rev = "v1.10.0";
+ sha256 = "1nlvq85c232z5yjs86pxpmkv7hk6gb5pa6j4hhzgdz85adk2ma04";
+ };
+ }
+ {
+ goPackagePath = "github.com/olekukonko/tablewriter";
+ fetch = {
+ type = "git";
+ url = "https://github.com/olekukonko/tablewriter";
+ rev = "be2c049b30cc";
+ sha256 = "1fr996vpmh6v5q13kfgf0fbi0hksxqg0fnbvj2nqhlsyfp5s8f4w";
+ };
+ }
+ {
+ goPackagePath = "github.com/pelletier/go-toml";
+ fetch = {
+ type = "git";
+ url = "https://github.com/pelletier/go-toml";
+ rev = "v1.2.0";
+ sha256 = "1fjzpcjng60mc3a4b2ql5a00d5gah84wj740dabv9kq67mpg8fxy";
+ };
+ }
+ {
+ goPackagePath = "github.com/pkg/errors";
+ fetch = {
+ type = "git";
+ url = "https://github.com/pkg/errors";
+ rev = "v0.9.1";
+ sha256 = "1761pybhc2kqr6v5fm8faj08x9bql8427yqg6vnfv6nhrasx1mwq";
+ };
+ }
+ {
+ goPackagePath = "github.com/pmezard/go-difflib";
+ fetch = {
+ type = "git";
+ url = "https://github.com/pmezard/go-difflib";
+ rev = "v1.0.0";
+ sha256 = "0c1cn55m4rypmscgf0rrb88pn58j3ysvc2d0432dp3c6fqg6cnzw";
+ };
+ }
+ {
+ goPackagePath = "github.com/russross/blackfriday";
+ fetch = {
+ type = "git";
+ url = "https://github.com/russross/blackfriday";
+ rev = "v1.5.2";
+ sha256 = "0jzbfzcywqcrnym4gxlz6nphmm1grg6wsl4f0r9x384rn83wkj7c";
+ };
+ }
+ {
+ goPackagePath = "github.com/sergi/go-diff";
+ fetch = {
+ type = "git";
+ url = "https://github.com/sergi/go-diff";
+ rev = "v1.0.0";
+ sha256 = "0swiazj8wphs2zmk1qgq75xza6m19snif94h2m6fi8dqkwqdl7c7";
+ };
+ }
+ {
+ goPackagePath = "github.com/sirupsen/logrus";
+ fetch = {
+ type = "git";
+ url = "https://github.com/sirupsen/logrus";
+ rev = "v1.4.2";
+ sha256 = "087k2lxrr9p9dh68yw71d05h5g9p5v26zbwd6j7lghinjfaw334x";
+ };
+ }
+ {
+ goPackagePath = "github.com/smartystreets/assertions";
+ fetch = {
+ type = "git";
+ url = "https://github.com/smartystreets/assertions";
+ rev = "b2de0cb4f26d";
+ sha256 = "1i7ldgavgl35c7gk25p7bvdr282ckng090zr4ch9mk1705akx09y";
+ };
+ }
+ {
+ goPackagePath = "github.com/smartystreets/goconvey";
+ fetch = {
+ type = "git";
+ url = "https://github.com/smartystreets/goconvey";
+ rev = "68dc04aab96a";
+ sha256 = "1kas5v95fzhr88hg4rjy0vp03y4pzvy3pwwgkfz2yhn5nlj29nk6";
+ };
+ }
+ {
+ goPackagePath = "github.com/spf13/afero";
+ fetch = {
+ type = "git";
+ url = "https://github.com/spf13/afero";
+ rev = "v1.1.2";
+ sha256 = "0miv4faf5ihjfifb1zv6aia6f6ik7h1s4954kcb8n6ixzhx9ck6k";
+ };
+ }
+ {
+ goPackagePath = "github.com/spf13/cast";
+ fetch = {
+ type = "git";
+ url = "https://github.com/spf13/cast";
+ rev = "v1.3.0";
+ sha256 = "0xq1ffqj8y8h7dcnm0m9lfrh0ga7pssnn2c1dnr09chqbpn4bdc5";
+ };
+ }
+ {
+ goPackagePath = "github.com/spf13/cobra";
+ fetch = {
+ type = "git";
+ url = "https://github.com/spf13/cobra";
+ rev = "v0.0.3";
+ sha256 = "1q1nsx05svyv9fv3fy6xv6gs9ffimkyzsfm49flvl3wnvf1ncrkd";
+ };
+ }
+ {
+ goPackagePath = "github.com/spf13/jwalterweatherman";
+ fetch = {
+ type = "git";
+ url = "https://github.com/spf13/jwalterweatherman";
+ rev = "v1.0.0";
+ sha256 = "093fmmvavv84pv4q84hav7ph3fmrq87bvspjj899q0qsx37yvdr8";
+ };
+ }
+ {
+ goPackagePath = "github.com/spf13/pflag";
+ fetch = {
+ type = "git";
+ url = "https://github.com/spf13/pflag";
+ rev = "v1.0.3";
+ sha256 = "1cj3cjm7d3zk0mf1xdybh0jywkbbw7a6yr3y22x9sis31scprswd";
+ };
+ }
+ {
+ goPackagePath = "github.com/spf13/viper";
+ fetch = {
+ type = "git";
+ url = "https://github.com/spf13/viper";
+ rev = "v1.3.1";
+ sha256 = "1190mg04718r03qriav99sf4kx2n7wdgr8vdni15f74bpbzrdjrl";
+ };
+ }
+ {
+ goPackagePath = "github.com/stretchr/objx";
+ fetch = {
+ type = "git";
+ url = "https://github.com/stretchr/objx";
+ rev = "v0.1.1";
+ sha256 = "0iph0qmpyqg4kwv8jsx6a56a7hhqq8swrazv40ycxk9rzr0s8yls";
+ };
+ }
+ {
+ goPackagePath = "github.com/stretchr/testify";
+ fetch = {
+ type = "git";
+ url = "https://github.com/stretchr/testify";
+ rev = "v1.4.0";
+ sha256 = "187i5g88sxfy4vxpm7dw1gwv29pa2qaq475lxrdh5livh69wqfjb";
+ };
+ }
+ {
+ goPackagePath = "github.com/tsenart/deadcode";
+ fetch = {
+ type = "git";
+ url = "https://github.com/tsenart/deadcode";
+ rev = "210d2dc333e9";
+ sha256 = "05kif593f4wygnrq2fdjhn7kkcpdmgjnykcila85d0gqlb1f36g0";
+ };
+ }
+ {
+ goPackagePath = "github.com/ugorji/go";
+ fetch = {
+ type = "git";
+ url = "https://github.com/ugorji/go";
+ rev = "d75b2dcb6bc8";
+ sha256 = "0di1k35gpq9bp958ywranpbskx2vdwlb38s22vl9rybm3wa5g3ps";
+ };
+ }
+ {
+ goPackagePath = "github.com/valyala/bytebufferpool";
+ fetch = {
+ type = "git";
+ url = "https://github.com/valyala/bytebufferpool";
+ rev = "v1.0.0";
+ sha256 = "01lqzjddq6kz9v41nkky7wbgk7f1cw036sa7ldz10d82g5klzl93";
+ };
+ }
+ {
+ goPackagePath = "github.com/valyala/fasttemplate";
+ fetch = {
+ type = "git";
+ url = "https://github.com/valyala/fasttemplate";
+ rev = "v1.1.0";
+ sha256 = "089wm839lqmw9knr3ifbi82iykaybk0zxzp3c02lsh31wax4f8a2";
+ };
+ }
+ {
+ goPackagePath = "github.com/vbauerster/mpb";
+ fetch = {
+ type = "git";
+ url = "https://github.com/vbauerster/mpb";
+ rev = "v4.8.4";
+ sha256 = "0ifz1hp1a5xjxx7x9km5pb0x6p60lcpzwmhnxlg5x4ls6hrs8wd9";
+ };
+ }
+ {
+ goPackagePath = "github.com/xordataexchange/crypt";
+ fetch = {
+ type = "git";
+ url = "https://github.com/xordataexchange/crypt";
+ rev = "b2862e3d0a77";
+ sha256 = "04q3856anpzl4gdfgmg7pbp9cx231nkz3ymq2xp27rnmmwhfxr8y";
+ };
+ }
+ {
+ goPackagePath = "golang.org/x/crypto";
+ fetch = {
+ type = "git";
+ url = "https://go.googlesource.com/crypto";
+ rev = "e1110fd1c708";
+ sha256 = "0n5n7dzlr87mvk3mbcx400al4pa1i85jbbdhbx4s1rhr0rs3kh9a";
+ };
+ }
+ {
+ goPackagePath = "golang.org/x/lint";
+ fetch = {
+ type = "git";
+ url = "https://go.googlesource.com/lint";
+ rev = "c67002cb31c3";
+ sha256 = "0gymbggskjmphqxqcx4s0vnlcz7mygbix0vhwcwv5r67c0bf6765";
+ };
+ }
+ {
+ goPackagePath = "golang.org/x/net";
+ fetch = {
+ type = "git";
+ url = "https://go.googlesource.com/net";
+ rev = "2180aed22343";
+ sha256 = "0hl3pgi8rzij5m6alq4xqfvyvidy7jnf5y85031jv4y1bj85r6pl";
+ };
+ }
+ {
+ goPackagePath = "golang.org/x/sync";
+ fetch = {
+ type = "git";
+ url = "https://go.googlesource.com/sync";
+ rev = "112230192c58";
+ sha256 = "05i2k43j2d0llq768hg5pf3hb2yhfzp9la1w5wp0rsnnzblr0lfn";
+ };
+ }
+ {
+ goPackagePath = "golang.org/x/sys";
+ fetch = {
+ type = "git";
+ url = "https://go.googlesource.com/sys";
+ rev = "52ab43148777";
+ sha256 = "1kakxbqrb1w2vwg7r1896z68qcx2lfvimsl8cs2niiipbgpi6imx";
+ };
+ }
+ {
+ goPackagePath = "golang.org/x/text";
+ fetch = {
+ type = "git";
+ url = "https://go.googlesource.com/text";
+ rev = "v0.3.2";
+ sha256 = "0flv9idw0jm5nm8lx25xqanbkqgfiym6619w575p7nrdh0riqwqh";
+ };
+ }
+ {
+ goPackagePath = "golang.org/x/tools";
+ fetch = {
+ type = "git";
+ url = "https://go.googlesource.com/tools";
+ rev = "a911d9008d1f";
+ sha256 = "118vsliq2a9xfp6rckc310mf9lydfgah6hgiggd88cm3zch4626m";
+ };
+ }
+ {
+ goPackagePath = "golang.org/x/xerrors";
+ fetch = {
+ type = "git";
+ url = "https://go.googlesource.com/xerrors";
+ rev = "a985d3407aa7";
+ sha256 = "00wzr5w8aadipgc3rkk8f11i41znskfj9ix5nhhaxyg7isrslgcj";
+ };
+ }
+ {
+ goPackagePath = "gopkg.in/alecthomas/kingpin.v3-unstable";
+ fetch = {
+ type = "git";
+ url = "https://gopkg.in/alecthomas/kingpin.v3-unstable";
+ rev = "df19058c872c";
+ sha256 = "0nb6925fixs6brdwpmwi32b38acn1s8dv4g0syjy3kpq0wasljy9";
+ };
+ }
+ {
+ goPackagePath = "gopkg.in/check.v1";
+ fetch = {
+ type = "git";
+ url = "https://gopkg.in/check.v1";
+ rev = "788fd7840127";
+ sha256 = "0v3bim0j375z81zrpr5qv42knqs0y2qv2vkjiqi5axvb78slki1a";
+ };
+ }
+ {
+ goPackagePath = "gopkg.in/ini.v1";
+ fetch = {
+ type = "git";
+ url = "https://gopkg.in/ini.v1";
+ rev = "v1.42.0";
+ sha256 = "18ywm8zyv091j1pp5mvx8szl7928chk8lw02br6jy568d7rk4xal";
+ };
+ }
+ {
+ goPackagePath = "gopkg.in/yaml.v2";
+ fetch = {
+ type = "git";
+ url = "https://gopkg.in/yaml.v2";
+ rev = "v2.2.5";
+ sha256 = "08smz8dfyxp02ha74my9iszqa5qzgl3ksi28ilyp8lqipssiq6fg";
+ };
+ }
+]
diff --git a/nixpkgs/pkgs/tools/admin/iamy/default.nix b/nixpkgs/pkgs/tools/admin/iamy/default.nix
index 96c49b58d0b..8e79959ba37 100644
--- a/nixpkgs/pkgs/tools/admin/iamy/default.nix
+++ b/nixpkgs/pkgs/tools/admin/iamy/default.nix
@@ -13,7 +13,7 @@ buildGoModule rec {
sha256 = "1fypc6yjnhlpk7zhb2lvah2ikh2zji9sll55rqjbr3i4j02h484z";
};
- modSha256 = "0akak573zvz3xg5d7vf0ch2mrmj1jkzcdc29v3kn43f7944c2wcl";
+ vendorSha256 = "0c4g1zr0wl118g41hqri0vwvfin39yvgs214w3spw8ggjcj6bzph";
buildFlagsArray = [''-ldflags=
-X main.Version=v${version} -s -w
@@ -25,4 +25,4 @@ buildGoModule rec {
license = licenses.mit;
maintainers = with maintainers; [ suvash ];
};
-}
+} \ No newline at end of file
diff --git a/nixpkgs/pkgs/tools/admin/lego/default.nix b/nixpkgs/pkgs/tools/admin/lego/default.nix
index 72c61ceecaf..025afe25e87 100644
--- a/nixpkgs/pkgs/tools/admin/lego/default.nix
+++ b/nixpkgs/pkgs/tools/admin/lego/default.nix
@@ -2,16 +2,16 @@
buildGoModule rec {
pname = "lego";
- version = "3.5.0";
+ version = "3.7.0";
src = fetchFromGitHub {
owner = "go-acme";
repo = pname;
rev = "v${version}";
- sha256 = "08mh2q426gmhcaz578lw08jbxfqb7qm37cd00ap937dymi1zs9qw";
+ hash = "sha256-hjH1TBw6GHYNI9JSBOzdyEtJmp8NhlwNYydGZwsjAg0=";
};
- modSha256 = "10n8pcbmzlnk63gzsjb1xnmjwxfhxsqx8ffpcbwdzq9fc5yvjiii";
+ vendorSha256 = "14453iiya6algkympyvwm03qgjcwk79z8bbrij7qhnp52qfrbmrp";
subPackages = [ "cmd/lego" ];
buildFlagsArray = [
@@ -22,6 +22,6 @@ buildGoModule rec {
description = "Let's Encrypt client and ACME library written in Go";
license = licenses.mit;
homepage = "https://go-acme.github.io/lego/";
- maintainers = with maintainers; [ andrew-d ];
+ maintainers = teams.acme.members;
};
}
diff --git a/nixpkgs/pkgs/tools/admin/lexicon/default.nix b/nixpkgs/pkgs/tools/admin/lexicon/default.nix
index 31705d1e79c..de967578d5c 100644
--- a/nixpkgs/pkgs/tools/admin/lexicon/default.nix
+++ b/nixpkgs/pkgs/tools/admin/lexicon/default.nix
@@ -5,7 +5,7 @@
python3Packages.buildPythonApplication rec {
pname = "lexicon";
- version = "3.3.17";
+ version = "3.3.22";
propagatedBuildInputs = with python3Packages; [ requests tldextract future cryptography pyyaml boto3 zeep xmltodict beautifulsoup4 dnspython pynamecheap softlayer transip localzone ];
@@ -19,7 +19,7 @@ python3Packages.buildPythonApplication rec {
owner = "AnalogJ";
repo = pname;
rev = "v${version}";
- sha256 = "1wrsw759am6yp2m9b34iv82m371df3ssp2vhdjr18ys3xk7dvj89";
+ sha256 = "1adwqglh3lrx04y0f6slp1l97xzbsqgw0v5i4jll3a54aqyzfz0a";
};
meta = with lib; {
diff --git a/nixpkgs/pkgs/tools/admin/lxd/default.nix b/nixpkgs/pkgs/tools/admin/lxd/default.nix
index f85a61be4a8..f270576e684 100644
--- a/nixpkgs/pkgs/tools/admin/lxd/default.nix
+++ b/nixpkgs/pkgs/tools/admin/lxd/default.nix
@@ -1,23 +1,29 @@
-{ stdenv, pkgconfig, lxc, buildGoPackage, fetchurl
+{ stdenv, hwdata, pkgconfig, lxc, buildGoPackage, fetchurl
, makeWrapper, acl, rsync, gnutar, xz, btrfs-progs, gzip, dnsmasq
, squashfsTools, iproute, iptables, ebtables, libcap, libco-canonical, dqlite
, raft-canonical, sqlite-replication, udev
, writeShellScriptBin, apparmor-profiles, apparmor-parser
, criu
, bash
+, installShellFiles
}:
buildGoPackage rec {
pname = "lxd";
- version = "4.0.0";
+ version = "4.1";
goPackagePath = "github.com/lxc/lxd";
src = fetchurl {
url = "https://github.com/lxc/lxd/releases/download/${pname}-${version}/${pname}-${version}.tar.gz";
- sha256 = "00kydp6aysggng9a7m0q3zj3591yk6jgcibbqxx4ki20pd4vmqnb";
+ sha256 = "0svzj57wwm43d2gnx0myr2p9pzjmkivwhgg0dww6zl169bx32liz";
};
+ postPatch = ''
+ substituteInPlace shared/usbid/load.go \
+ --replace "/usr/share/misc/usb.ids" "${hwdata}/share/hwdata/usb.ids"
+ '';
+
preBuild = ''
# unpack vendor
pushd go/src/github.com/lxc/lxd
@@ -30,20 +36,19 @@ buildGoPackage rec {
postInstall = ''
# test binaries, code generation
- rm $bin/bin/{deps,macaroon-identity,generate}
+ rm $out/bin/{deps,macaroon-identity,generate}
- wrapProgram $bin/bin/lxd --prefix PATH : ${stdenv.lib.makeBinPath [
+ wrapProgram $out/bin/lxd --prefix PATH : ${stdenv.lib.makeBinPath [
acl rsync gnutar xz btrfs-progs gzip dnsmasq squashfsTools iproute iptables ebtables bash criu
(writeShellScriptBin "apparmor_parser" ''
exec '${apparmor-parser}/bin/apparmor_parser' -I '${apparmor-profiles}/etc/apparmor.d' "$@"
'')
]}
- mkdir -p "$bin/share/bash-completion/completions/"
- cp -av go/src/github.com/lxc/lxd/scripts/bash/lxd-client "$bin/share/bash-completion/completions/lxc"
+ installShellCompletion --bash go/src/github.com/lxc/lxd/scripts/bash/lxd-client
'';
- nativeBuildInputs = [ pkgconfig makeWrapper ];
+ nativeBuildInputs = [ installShellFiles pkgconfig makeWrapper ];
buildInputs = [ lxc acl libcap libco-canonical.dev dqlite.dev
raft-canonical.dev sqlite-replication udev.dev ];
diff --git a/nixpkgs/pkgs/tools/admin/nomachine-client/default.nix b/nixpkgs/pkgs/tools/admin/nomachine-client/default.nix
index b999c65f6f6..a4d201fd4c4 100644
--- a/nixpkgs/pkgs/tools/admin/nomachine-client/default.nix
+++ b/nixpkgs/pkgs/tools/admin/nomachine-client/default.nix
@@ -1,29 +1,35 @@
{ stdenv, file, fetchurl, makeWrapper,
autoPatchelfHook, jsoncpp, libpulseaudio }:
let
- versionMajor = "6.9";
- versionMinor = "2";
+ versionMajor = "6.10";
+ versionMinor = "12";
versionBuild_x86_64 = "1";
versionBuild_i686 = "1";
in
stdenv.mkDerivation rec {
pname = "nomachine-client";
version = "${versionMajor}.${versionMinor}";
-
+
src =
if stdenv.hostPlatform.system == "x86_64-linux" then
fetchurl {
- url = "https://download.nomachine.com/download/${versionMajor}/Linux/nomachine_${version}_${versionBuild_x86_64}_x86_64.tar.gz";
- sha256 = "1z2pcfkzicjma4lxrj4qx43xyml993v7qyjd7k8xy8hw85fwnzii";
+ urls = [
+ "https://download.nomachine.com/download/${versionMajor}/Linux/nomachine_${version}_${versionBuild_x86_64}_x86_64.tar.gz"
+ "https://web.archive.org/web/https://download.nomachine.com/download/${versionMajor}/Linux/nomachine_${version}_${versionBuild_x86_64}_x86_64.tar.gz"
+ ];
+ sha256 = "17yb377ry7i7cmkb72xmhyqkfggv1ygqlz55ymvmrs7psbh7ql01";
}
else if stdenv.hostPlatform.system == "i686-linux" then
fetchurl {
- url = "https://download.nomachine.com/download/${versionMajor}/Linux/nomachine_${version}_${versionBuild_i686}_i686.tar.gz";
- sha256 = "03421s0k91c02ga9k6bdvixw71brlgi13q82cinnfayg3fhb0rb6";
+ urls = [
+ "https://download.nomachine.com/download/${versionMajor}/Linux/nomachine_${version}_${versionBuild_i686}_i686.tar.gz"
+ "https://web.archive.org/web/https://download.nomachine.com/download/${versionMajor}/Linux/nomachine_${version}_${versionBuild_i686}_i686.tar.gz"
+ ];
+ sha256 = "0k6dspmwdkm0zf0c2zqlqy0jya8qgsg90wwv9wa12fn4chp66gqg";
}
else
throw "NoMachine client is not supported on ${stdenv.hostPlatform.system}";
-
+
postUnpack = ''
mv $(find . -type f -name nxclient.tar.gz) .
mv $(find . -type f -name nxplayer.tar.gz) .
@@ -32,7 +38,7 @@ in
tar xf nxplayer.tar.gz
rm $(find . -maxdepth 1 -type f)
'';
-
+
nativeBuildInputs = [ file makeWrapper autoPatchelfHook ];
buildInputs = [ jsoncpp libpulseaudio ];
@@ -50,7 +56,7 @@ in
cp "$i"/* "$out/share/icons/hicolor/$(basename $i)/apps/"
fi
done
-
+
mkdir $out/share/applications
cp share/applnk/player/xdg/*.desktop $out/share/applications/
cp share/applnk/client/xdg-mime/*.desktop $out/share/applications/
@@ -62,7 +68,7 @@ in
substituteInPlace "$i" --replace /usr/NX/bin $out/bin
done
'';
-
+
postFixup = ''
makeWrapper $out/bin/nxplayer.bin $out/bin/nxplayer --set NX_SYSTEM $out/NX
makeWrapper $out/bin/nxclient.bin $out/bin/nxclient --set NX_SYSTEM $out/NX
@@ -71,7 +77,7 @@ in
# have a DT_NEEDED entry for it.
patchelf --add-needed libpulse.so.0 $out/NX/lib/libnxcau.so
'';
-
+
dontBuild = true;
dontStrip = true;
@@ -87,4 +93,4 @@ in
platforms = [ "x86_64-linux" "i686-linux" ];
};
}
-
+
diff --git a/nixpkgs/pkgs/tools/admin/pebble/default.nix b/nixpkgs/pkgs/tools/admin/pebble/default.nix
index 5aa220fd89e..4813f86ea64 100644
--- a/nixpkgs/pkgs/tools/admin/pebble/default.nix
+++ b/nixpkgs/pkgs/tools/admin/pebble/default.nix
@@ -4,7 +4,7 @@
}:
let
- version = "v2.2.2";
+ version = "v2.3.0";
pname = "pebble";
in buildGoPackage {
inherit pname version;
@@ -14,13 +14,13 @@ in buildGoPackage {
owner = "letsencrypt";
repo = pname;
rev = version;
- sha256 = "10g6ivdxxp3632wk0gvmp75v9x668kchhmlczbsq8qnsc8sb8pwf";
+ sha256 = "1piwzzfqsdx6s2niczzp4mf4r3qn9nfdgpn7882g52cmmm0vzks2";
};
meta = {
- homepage = "https://github.com/letsencrypt/boulder";
+ homepage = "https://github.com/letsencrypt/pebble";
description = "A miniature version of Boulder, Pebble is a small RFC 8555 ACME test server not suited for a production CA";
license = [ lib.licenses.mpl20 ];
- maintainers = [ ];
+ maintainers = lib.teams.acme.members;
};
}
diff --git a/nixpkgs/pkgs/tools/admin/procs/default.nix b/nixpkgs/pkgs/tools/admin/procs/default.nix
index db6f27a3010..5bfbb6d8c64 100644
--- a/nixpkgs/pkgs/tools/admin/procs/default.nix
+++ b/nixpkgs/pkgs/tools/admin/procs/default.nix
@@ -2,16 +2,16 @@
rustPlatform.buildRustPackage rec {
pname = "procs";
- version = "0.9.20";
+ version = "0.10.3";
src = fetchFromGitHub {
owner = "dalance";
repo = pname;
rev = "v${version}";
- sha256 = "00qqn8nwv791bs88n302hy67dpas5hcacnkakn7law567klnzxfz";
+ sha256 = "0lg4v32jx0fxcjz6cj6cxxlg7rhj75k4p75izpkk4l11xpxqhgjm";
};
- cargoSha256 = "09ib1nlqhzq3mc5wc16mgqbyr652asrwdpbwaax54fm1gd334prl";
+ cargoSha256 = "05qqy6l28ihn7hykkkh1x7z3q58cdrwv76fc22xjcg20985ac2nx";
buildInputs = stdenv.lib.optional stdenv.isDarwin Security;
@@ -19,7 +19,7 @@ rustPlatform.buildRustPackage rec {
description = "A modern replacement for ps written in Rust";
homepage = "https://github.com/dalance/procs";
license = licenses.mit;
- maintainers = with maintainers; [ dalance filalex77 ];
+ maintainers = with maintainers; [ dalance filalex77 ];
platforms = with platforms; linux ++ darwin;
};
}
diff --git a/nixpkgs/pkgs/tools/admin/pulumi/default.nix b/nixpkgs/pkgs/tools/admin/pulumi/default.nix
index 07ad2d95f14..c0547f0c0c8 100644
--- a/nixpkgs/pkgs/tools/admin/pulumi/default.nix
+++ b/nixpkgs/pkgs/tools/admin/pulumi/default.nix
@@ -17,10 +17,11 @@ in stdenv.mkDerivation {
installPhase = ''
mkdir -p $out/bin
cp * $out/bin/
+ '' + optionalString stdenv.isLinux ''
wrapProgram $out/bin/pulumi --set LD_LIBRARY_PATH "${stdenv.cc.cc.lib}/lib"
'';
- buildInputs = optionals stdenv.isLinux [ autoPatchelfHook makeWrapper ];
+ nativeBuildInputs = optionals stdenv.isLinux [ autoPatchelfHook makeWrapper ];
meta = {
homepage = "https://pulumi.io/";
diff --git a/nixpkgs/pkgs/tools/admin/salt/default.nix b/nixpkgs/pkgs/tools/admin/salt/default.nix
index b648cdb2512..f3c375a9966 100644
--- a/nixpkgs/pkgs/tools/admin/salt/default.nix
+++ b/nixpkgs/pkgs/tools/admin/salt/default.nix
@@ -1,21 +1,38 @@
-{
- stdenv, pythonPackages, openssl,
-
+{ lib
+, python3
+, openssl
# Many Salt modules require various Python modules to be installed,
# passing them in this array enables Salt to find them.
- extraInputs ? []
+, extraInputs ? []
}:
+let
+
+ py = python3.override {
+ packageOverrides = self: super: {
+ # Can be unpinned once https://github.com/saltstack/salt/issues/56007 is resolved
+ msgpack = super.msgpack.overridePythonAttrs (
+ oldAttrs: rec {
+ version = "0.6.2";
+ src = oldAttrs.src.override {
+ inherit version;
+ sha256 = "0c0q3vx0x137567msgs5dnizghnr059qi5kfqigxbz26jf2jyg7a";
+ };
+ }
+ );
+ };
+ };
-pythonPackages.buildPythonApplication rec {
+in
+py.pkgs.buildPythonApplication rec {
pname = "salt";
- version = "2019.2.0";
+ version = "3000.3";
- src = pythonPackages.fetchPypi {
+ src = py.pkgs.fetchPypi {
inherit pname version;
- sha256 = "1kgn3lway0zwwysyzpphv05j4xgxk92dk4rv1vybr2527wmvp5an";
+ sha256 = "19yfjhidx93rl9s03lvrfz7kp0xxigyv4d3zb9792zb9bsc4kjpw";
};
- propagatedBuildInputs = with pythonPackages; [
+ propagatedBuildInputs = with py.pkgs; [
jinja2
markupsafe
msgpack
@@ -24,8 +41,6 @@ pythonPackages.buildPythonApplication rec {
pyzmq
requests
tornado_4
- ] ++ stdenv.lib.optionals (!pythonPackages.isPy3k) [
- futures
] ++ extraInputs;
patches = [ ./fix-libcrypto-loading.patch ];
@@ -40,7 +55,7 @@ pythonPackages.buildPythonApplication rec {
# as is it rather long.
doCheck = false;
- meta = with stdenv.lib; {
+ meta = with lib; {
homepage = "https://saltstack.com/";
description = "Portable, distributed, remote execution and configuration management system";
maintainers = with maintainers; [ aneeshusa ];
diff --git a/nixpkgs/pkgs/tools/admin/scaleway-cli/default.nix b/nixpkgs/pkgs/tools/admin/scaleway-cli/default.nix
index 68c20493d19..f9b608ebc4c 100644
--- a/nixpkgs/pkgs/tools/admin/scaleway-cli/default.nix
+++ b/nixpkgs/pkgs/tools/admin/scaleway-cli/default.nix
@@ -2,7 +2,7 @@
buildGoPackage rec{
pname = "scaleway-cli";
- version = "1.17";
+ version = "1.20";
goPackagePath = "github.com/scaleway/scaleway-cli";
@@ -10,7 +10,7 @@ buildGoPackage rec{
owner = "scaleway";
repo = "scaleway-cli";
rev = "v${version}";
- sha256 = "0v50wk6q8537880whi6w83dia9y934v0s2xr1z52cn3mrsjghsnd";
+ sha256 = "14likzp3hl04nq9nmpmh9m5zqjyspy5cyk20dkh03c1nhkd4vcnx";
};
meta = with stdenv.lib; {
diff --git a/nixpkgs/pkgs/tools/admin/sec/default.nix b/nixpkgs/pkgs/tools/admin/sec/default.nix
index c1ae07c0fda..b082f61f875 100644
--- a/nixpkgs/pkgs/tools/admin/sec/default.nix
+++ b/nixpkgs/pkgs/tools/admin/sec/default.nix
@@ -7,7 +7,7 @@ stdenv.mkDerivation rec {
owner = "simple-evcorr";
repo = "sec";
rev = meta.version;
- sha256 = "025cz3mr5yrdgs0i3h8v2znhvjkyh78kba1rzvl03ns2b1c49168";
+ sha256 = "0ryic5ilj1i5l41440i0ss6j3yv796fz3gr0qij5pqyd1z21md83";
};
buildInputs = [ perl ];
@@ -27,6 +27,6 @@ stdenv.mkDerivation rec {
description = "Simple Event Correlator";
maintainers = [ stdenv.lib.maintainers.tv ];
platforms = stdenv.lib.platforms.all;
- version = "2.8.2";
+ version = "2.8.3";
};
}
diff --git a/nixpkgs/pkgs/tools/admin/tigervnc/default.nix b/nixpkgs/pkgs/tools/admin/tigervnc/default.nix
index 9f105a7d5d5..0bb291d797b 100644
--- a/nixpkgs/pkgs/tools/admin/tigervnc/default.nix
+++ b/nixpkgs/pkgs/tools/admin/tigervnc/default.nix
@@ -76,7 +76,7 @@ stdenv.mkDerivation rec {
rm -f $out/lib/xorg/protocol.txt
wrapProgram $out/bin/vncserver \
- --prefix PATH : ${stdenv.lib.makeBinPath (with xorg; [ xterm twm xsetroot ]) }
+ --prefix PATH : ${stdenv.lib.makeBinPath (with xorg; [ xterm twm xsetroot xauth ]) }
'';
buildInputs = with xorg; [
diff --git a/nixpkgs/pkgs/tools/archivers/afio/default.nix b/nixpkgs/pkgs/tools/archivers/afio/default.nix
index e2fe3d90ee6..3b4eb6a5ea5 100644
--- a/nixpkgs/pkgs/tools/archivers/afio/default.nix
+++ b/nixpkgs/pkgs/tools/archivers/afio/default.nix
@@ -1,12 +1,14 @@
-{ stdenv, fetchurl } :
+{ stdenv, fetchFromGitHub } :
stdenv.mkDerivation rec {
version = "2.5.2";
pname = "afio";
- src = fetchurl {
- url = "http://members.chello.nl/~k.holtman/${pname}-${version}.tgz";
- sha256 = "1fa29wlqv76hzf8bxp1qpza1r23pm2f3m7rcf0jpwm6z150s2k66";
+ src = fetchFromGitHub {
+ owner = "kholtman";
+ repo = "afio";
+ rev = "v${version}";
+ sha256 = "1vbxl66r5rp5a1qssjrkfsjqjjgld1cq57c871gd0m4qiq9rmcfy";
};
/*
@@ -18,7 +20,7 @@ stdenv.mkDerivation rec {
installFlags = [ "DESTDIR=$(out)" ];
meta = {
- homepage = "http://members.chello.nl/~k.holtman/afio.html";
+ homepage = "https://github.com/kholtman/afio";
description = "Fault tolerant cpio archiver targeting backups";
platforms = stdenv.lib.platforms.all;
/*
diff --git a/nixpkgs/pkgs/tools/archivers/p7zip/default.nix b/nixpkgs/pkgs/tools/archivers/p7zip/default.nix
index f44791ce021..d6ad699eaa8 100644
--- a/nixpkgs/pkgs/tools/archivers/p7zip/default.nix
+++ b/nixpkgs/pkgs/tools/archivers/p7zip/default.nix
@@ -1,4 +1,4 @@
-{ stdenv, fetchurl }:
+{ stdenv, fetchurl, fetchpatch, lib, enableUnfree ? false }:
stdenv.mkDerivation rec {
pname = "p7zip";
@@ -12,6 +12,16 @@ stdenv.mkDerivation rec {
patches = [
./12-CVE-2016-9296.patch
./13-CVE-2017-17969.patch
+ (fetchpatch {
+ name = "3-CVE-2018-5996.patch";
+ url = "https://raw.githubusercontent.com/termux/termux-packages/master/packages/p7zip/3-CVE-2018-5996.patch";
+ sha256 = "1zivvkazmza0653i498ccp3zbpbpc7dvxl3zxwllbx41b6n589yp";
+ })
+ (fetchpatch {
+ name = "4-CVE-2018-10115.patch";
+ url = "https://raw.githubusercontent.com/termux/termux-packages/master/packages/p7zip/4-CVE-2018-10115.patch";
+ sha256 = "1cr7q8gnrk9yp6dcvxaqi1yhdbgp964nkv65ls41mw1kdfm44zn6";
+ })
];
# Default makefile is full of impurities on Darwin. The patch doesn't hurt Linux so I'm leaving it unconditional
@@ -24,6 +34,11 @@ stdenv.mkDerivation rec {
substituteInPlace makefile.machine \
--replace 'CC=gcc' 'CC=${stdenv.cc.targetPrefix}gcc' \
--replace 'CXX=g++' 'CXX=${stdenv.cc.targetPrefix}g++'
+ '' + lib.optionalString (!enableUnfree) ''
+ # Remove non-free RAR source code
+ # (see DOC/License.txt, https://fedoraproject.org/wiki/Licensing:Unrar)
+ rm -r CPP/7zip/Compress/Rar*
+ find . -name makefile'*' -exec sed -i '/Rar/d' {} +
'';
preConfigure = ''
@@ -42,9 +57,14 @@ stdenv.mkDerivation rec {
meta = {
homepage = "http://p7zip.sourceforge.net/";
description = "A port of the 7-zip archiver";
- # license = stdenv.lib.licenses.lgpl21Plus; + "unRAR restriction"
platforms = stdenv.lib.platforms.unix;
maintainers = [ stdenv.lib.maintainers.raskin ];
- license = stdenv.lib.licenses.lgpl2Plus;
+ knownVulnerabilities = [
+ # p7zip is abandoned, according to this thread on its forums:
+ # https://sourceforge.net/p/p7zip/discussion/383043/thread/fa143cf2/#1817
+ "p7zip is abandoned and may not receive important security fixes"
+ ];
+ # RAR code is under non-free UnRAR license, but we remove it
+ license = if enableUnfree then lib.licenses.unfree else lib.licenses.lgpl2Plus;
};
}
diff --git a/nixpkgs/pkgs/tools/archivers/unar/default.nix b/nixpkgs/pkgs/tools/archivers/unar/default.nix
index 259238cdec5..9fdbada9ab8 100644
--- a/nixpkgs/pkgs/tools/archivers/unar/default.nix
+++ b/nixpkgs/pkgs/tools/archivers/unar/default.nix
@@ -1,52 +1,54 @@
-{ stdenv, fetchurl, gnustep, unzip, bzip2, zlib, icu, openssl }:
+{ stdenv, fetchFromGitHub, installShellFiles, gnustep, bzip2, zlib, icu, openssl, wavpack }:
-let
+stdenv.mkDerivation rec {
pname = "unar";
+ version = "1.10.7";
-in stdenv.mkDerivation rec {
- name = "${pname}-${version}";
- version = "1.10.1";
-
- src = fetchurl {
- url = "http://unarchiver.c3.cx/downloads/${pname}${version}_src.zip";
- sha256 = "0aq9zlar5vzr5qxphws8dm7ax60bsfsw77f4ciwa5dq5lla715j0";
+ src = fetchFromGitHub {
+ owner = "MacPaw";
+ # the unar repo contains a shallow clone of both XADMaster and universal-detector
+ repo = "unar";
+ rev = "v${version}";
+ sha256 = "0p846q1l66k3rnd512sncp26zpv411b8ahi145sghfcsz9w8abc4";
};
- buildInputs = [ gnustep.base bzip2 icu openssl zlib ];
-
- nativeBuildInputs = [ gnustep.make unzip ];
-
- enableParallelBuilding = true;
-
postPatch = ''
for f in Makefile.linux ../UniversalDetector/Makefile.linux ; do
substituteInPlace $f \
- --replace "CC = gcc" "CC=cc" \
- --replace "CXX = g++" "CXX=c++" \
- --replace "OBJCC = gcc" "OBJCC=cc" \
- --replace "OBJCXX = g++" "OBJCXX=c++"
+ --replace "= gcc" "=cc" \
+ --replace "= g++" "=c++"
done
+
+ # we need to build inside this directory as well, so we have to make it writeable
+ chmod +w ../UniversalDetector -R
'';
+ buildInputs = [ gnustep.base bzip2 icu openssl wavpack zlib ];
+
+ nativeBuildInputs = [ gnustep.make installShellFiles ];
+
+ enableParallelBuilding = true;
+
+ dontConfigure = true;
+
makefile = "Makefile.linux";
- sourceRoot = "./The Unarchiver/XADMaster";
+ sourceRoot = "./source/XADMaster";
installPhase = ''
runHook preInstall
- install -Dm755 -t $out/bin lsar unar
- install -Dm644 -t $out/share/man/man1 ../Extra/{lsar,unar}.1
-
- mkdir -p $out/etc/bash_completion.d
- cp ../Extra/lsar.bash_completion $out/etc/bash_completion.d/lsar
- cp ../Extra/unar.bash_completion $out/etc/bash_completion.d/unar
+ install -Dm555 -t $out/bin lsar unar
+ for f in lsar unar; do
+ installManPage ./Extra/$f.?
+ installShellCompletion --bash --name $f ./Extra/$f.bash_completion
+ done
runHook postInstall
'';
meta = with stdenv.lib; {
- homepage = "http://unarchiver.c3.cx/unarchiver";
+ homepage = "https://theunarchiver.com";
description = "An archive unpacker program";
longDescription = ''
The Unarchiver is an archive unpacker program with support for the popular \
@@ -55,7 +57,8 @@ in stdenv.mkDerivation rec {
Compact Pro, Packit, cpio, compress (.Z), ARJ, ARC, PAK, ACE, ZOO, LZH, \
ADF, DMS, LZX, PowerPacker, LBR, Squeeze, Crunch, and other old formats.
'';
- license = with licenses; [ lgpl21Plus ];
+ license = licenses.lgpl21Plus;
+ maintainers = with maintainers; [ peterhoeg ];
platforms = with platforms; linux;
};
}
diff --git a/nixpkgs/pkgs/tools/audio/mpd-mpris/default.nix b/nixpkgs/pkgs/tools/audio/mpd-mpris/default.nix
index 37766a90721..3c736258cbb 100644
--- a/nixpkgs/pkgs/tools/audio/mpd-mpris/default.nix
+++ b/nixpkgs/pkgs/tools/audio/mpd-mpris/default.nix
@@ -11,7 +11,7 @@ buildGoModule rec {
sha256 = "1cr5j2z2ynj1hwkjzi5amcg59vmgazsci41v6vpsj119g7psjmzm";
};
- modSha256 = "1a95kfy8w952269x4llbl0afyxr5fjkg30mxsn81zdh5wr8gabwh";
+ vendorSha256 = "108yjymp64iqx1b2wqjbkmbm2w199wq46g7hrmqhcziv6f4aqljp";
subPackages = [ "cmd/${pname}" ];
@@ -29,5 +29,4 @@ buildGoModule rec {
maintainers = with maintainers; [ doronbehar ];
platforms = platforms.linux;
};
-}
-
+} \ No newline at end of file
diff --git a/nixpkgs/pkgs/tools/audio/pasystray/default.nix b/nixpkgs/pkgs/tools/audio/pasystray/default.nix
index 648dcad42ba..8b0580ba98c 100644
--- a/nixpkgs/pkgs/tools/audio/pasystray/default.nix
+++ b/nixpkgs/pkgs/tools/audio/pasystray/default.nix
@@ -14,6 +14,11 @@ stdenv.mkDerivation rec {
sha256 = "0xx1bm9kimgq11a359ikabdndqg5q54pn1d1dyyjnrj0s41168fk";
};
+ patches = [
+ # https://github.com/christophgysin/pasystray/issues/90#issuecomment-306190701
+ ./fix-wayland.patch
+ ];
+
nativeBuildInputs = [ pkgconfig autoreconfHook wrapGAppsHook ];
buildInputs = [
gnome3.adwaita-icon-theme
diff --git a/nixpkgs/pkgs/tools/audio/pasystray/fix-wayland.patch b/nixpkgs/pkgs/tools/audio/pasystray/fix-wayland.patch
new file mode 100644
index 00000000000..17c4e2e6d65
--- /dev/null
+++ b/nixpkgs/pkgs/tools/audio/pasystray/fix-wayland.patch
@@ -0,0 +1,34 @@
+--- a/src/x11-property.c
++++ b/src/x11-property.c
+@@ -43,11 +43,15 @@ static Window window;
+ void x11_property_init()
+ {
+ display = gdk_x11_get_default_xdisplay();
++ if (!GDK_IS_X11_DISPLAY(display)) return;
++ Screen* scr = ScreenOfDisplay(display, 0);
++
+ window = RootWindow(display, 0);
+ }
+
+ void x11_property_set(const char* key, const char* value)
+ {
++ if (!GDK_IS_X11_DISPLAY(display)) return;
+ g_debug("[x11-property] setting '%s' to '%s'", key, value);
+
+ Atom atom = XInternAtom(display, key, False);
+@@ -57,6 +61,7 @@ void x11_property_set(const char* key, c
+
+ void x11_property_del(const char* key)
+ {
++ if (!GDK_IS_X11_DISPLAY(display)) return;
+ g_debug("[x11-property] deleting '%s'", key);
+
+ Atom atom = XInternAtom(display, key, False);
+@@ -65,6 +70,7 @@ void x11_property_del(const char* key)
+
+ char* x11_property_get(const char* key)
+ {
++ if (!GDK_IS_X11_DISPLAY(display)) return NULL;
+ Atom property = XInternAtom(display, key, False);
+ Atom actual_type;
+ int actual_format;
diff --git a/nixpkgs/pkgs/tools/backup/btrbk/default.nix b/nixpkgs/pkgs/tools/backup/btrbk/default.nix
index ca043692788..0c528bcea1e 100644
--- a/nixpkgs/pkgs/tools/backup/btrbk/default.nix
+++ b/nixpkgs/pkgs/tools/backup/btrbk/default.nix
@@ -46,7 +46,7 @@ stdenv.mkDerivation rec {
homepage = "https://digint.ch/btrbk";
license = licenses.gpl3;
platforms = platforms.unix;
- maintainers = with maintainers; [ asymmetric the-kenny ];
+ maintainers = with maintainers; [ asymmetric ];
inherit version;
};
}
diff --git a/nixpkgs/pkgs/tools/backup/diskrsync/default.nix b/nixpkgs/pkgs/tools/backup/diskrsync/default.nix
index 81209444455..b96d6d75725 100644
--- a/nixpkgs/pkgs/tools/backup/diskrsync/default.nix
+++ b/nixpkgs/pkgs/tools/backup/diskrsync/default.nix
@@ -17,7 +17,7 @@ buildGoPackage rec {
buildInputs = [ makeWrapper ];
preFixup = ''
- wrapProgram "$bin/bin/diskrsync" --argv0 diskrsync --prefix PATH : ${openssh}/bin
+ wrapProgram "$out/bin/diskrsync" --argv0 diskrsync --prefix PATH : ${openssh}/bin
'';
meta = with stdenv.lib; {
diff --git a/nixpkgs/pkgs/tools/backup/duplicacy/default.nix b/nixpkgs/pkgs/tools/backup/duplicacy/default.nix
index 1d754e4324d..b261289f0bf 100644
--- a/nixpkgs/pkgs/tools/backup/duplicacy/default.nix
+++ b/nixpkgs/pkgs/tools/backup/duplicacy/default.nix
@@ -19,7 +19,7 @@ buildGoPackage rec {
'';
installPhase = ''
- install -D duplicacy_main $bin/bin/duplicacy
+ install -D duplicacy_main $out/bin/duplicacy
'';
meta = with lib; {
diff --git a/nixpkgs/pkgs/tools/backup/duplicity/default.nix b/nixpkgs/pkgs/tools/backup/duplicity/default.nix
index e49d87c697c..8e4014eea9d 100644
--- a/nixpkgs/pkgs/tools/backup/duplicity/default.nix
+++ b/nixpkgs/pkgs/tools/backup/duplicity/default.nix
@@ -19,11 +19,11 @@ let
in
pythonPackages.buildPythonApplication rec {
pname = "duplicity";
- version = "0.8.11.1596";
+ version = "0.8.12.1612";
src = fetchurl {
url = "https://code.launchpad.net/duplicity/${majorMinor version}-series/${majorMinorPatch version}/+download/duplicity-${version}.tar.gz";
- sha256 = "1qdaaybwdc13nfwnwrqij4lc23iwy73lyqn5lb4iznq6axp6m0h9";
+ sha256 = "06n58pwqg6kfigckjlslz2kx1lsykz1kn9a0r1cl8r3kn93zhk07";
};
patches = [
diff --git a/nixpkgs/pkgs/tools/backup/httrack/default.nix b/nixpkgs/pkgs/tools/backup/httrack/default.nix
index 6e2b92e8128..9a77153e2ff 100644
--- a/nixpkgs/pkgs/tools/backup/httrack/default.nix
+++ b/nixpkgs/pkgs/tools/backup/httrack/default.nix
@@ -17,7 +17,6 @@ stdenv.mkDerivation rec {
description = "Easy-to-use offline browser / website mirroring utility";
homepage = "http://www.httrack.com";
license = licenses.gpl3;
- maintainers = with maintainers; [ the-kenny ];
platforms = with platforms; unix;
};
}
diff --git a/nixpkgs/pkgs/tools/backup/httrack/qt.nix b/nixpkgs/pkgs/tools/backup/httrack/qt.nix
index fe5b965e570..6ee7f6e6a21 100644
--- a/nixpkgs/pkgs/tools/backup/httrack/qt.nix
+++ b/nixpkgs/pkgs/tools/backup/httrack/qt.nix
@@ -1,7 +1,7 @@
-{ stdenv, fetchurl, cmake, pkgconfig, makeWrapper
+{ mkDerivation, stdenv, fetchurl, cmake, pkgconfig, makeWrapper
, httrack, qtbase, qtmultimedia }:
-stdenv.mkDerivation rec {
+mkDerivation rec {
pname = "httraqt";
version = "1.4.9";
diff --git a/nixpkgs/pkgs/tools/backup/luckybackup/default.nix b/nixpkgs/pkgs/tools/backup/luckybackup/default.nix
index 3e89be15391..7203ba480e6 100644
--- a/nixpkgs/pkgs/tools/backup/luckybackup/default.nix
+++ b/nixpkgs/pkgs/tools/backup/luckybackup/default.nix
@@ -1,10 +1,10 @@
-{ stdenv, fetchurl
+{ mkDerivation, stdenv, fetchurl
, pkgconfig, libtool, qmake
, rsync, ssh
}:
with stdenv.lib;
-stdenv.mkDerivation rec {
+mkDerivation rec {
pname = "luckybackup";
version = "0.5.0";
diff --git a/nixpkgs/pkgs/tools/backup/monolith/default.nix b/nixpkgs/pkgs/tools/backup/monolith/default.nix
index 5d086abf780..f3bcf82e545 100644
--- a/nixpkgs/pkgs/tools/backup/monolith/default.nix
+++ b/nixpkgs/pkgs/tools/backup/monolith/default.nix
@@ -7,16 +7,16 @@
rustPlatform.buildRustPackage rec {
pname = "monolith";
- version = "2.2.2";
+ version = "2.2.5";
src = fetchFromGitHub {
owner = "Y2Z";
repo = pname;
rev = "v${version}";
- sha256 = "08xbpn6kdfiyvz5pwx9hkzbgb40z6dicmiry7frclw0aibal9avi";
+ sha256 = "0w19szxzhwxbgnv4k618p8v29dhbar1fn433bsz1cr1apnrahmkn";
};
- cargoSha256 = "10zwyg54f05m6ldpnchqzxjkb6rlpcl80crdnk8s6wkf18qny4i3";
+ cargoSha256 = "06gc3cpx1m2f6fwrm8brw5nidg1v02q1qwqfxvv3xzmmczbw4345";
nativeBuildInputs = [ pkg-config ];
buildInputs = [ openssl ];
diff --git a/nixpkgs/pkgs/tools/backup/rdiff-backup/default.nix b/nixpkgs/pkgs/tools/backup/rdiff-backup/default.nix
index a23be69f4cf..707ba8a9885 100644
--- a/nixpkgs/pkgs/tools/backup/rdiff-backup/default.nix
+++ b/nixpkgs/pkgs/tools/backup/rdiff-backup/default.nix
@@ -19,6 +19,5 @@ python2Packages.buildPythonApplication {
homepage = "http://rdiff-backup.nongnu.org/";
license = stdenv.lib.licenses.gpl2;
platforms = stdenv.lib.platforms.all;
- maintainers = with stdenv.lib.maintainers; [ the-kenny ];
};
}
diff --git a/nixpkgs/pkgs/tools/backup/restic/default.nix b/nixpkgs/pkgs/tools/backup/restic/default.nix
index f8dbeadff09..f366533f9bf 100644
--- a/nixpkgs/pkgs/tools/backup/restic/default.nix
+++ b/nixpkgs/pkgs/tools/backup/restic/default.nix
@@ -1,4 +1,4 @@
-{ stdenv, lib, buildGoPackage, fetchFromGitHub, nixosTests}:
+{ stdenv, lib, buildGoPackage, fetchFromGitHub, installShellFiles, nixosTests}:
buildGoPackage rec {
pname = "restic";
@@ -13,23 +13,19 @@ buildGoPackage rec {
sha256 = "0lydll93n1lcn1fl669b9cikmzz9d6vfpc8ky3ng5fi8kj3v1dz7";
};
+ subPackages = [ "cmd/restic" ];
+
+ nativeBuildInputs = [ installShellFiles ];
+
passthru.tests.restic = nixosTests.restic;
- # Use a custom install phase here as by default the
- # build-release-binaries and prepare-releases binaries are
- # installed.
- installPhase = ''
- mkdir -p "$bin/bin"
- cp go/bin/restic "$bin/bin"
- '' + lib.optionalString (stdenv.hostPlatform == stdenv.buildPlatform) ''
- mkdir -p \
- $bin/etc/bash_completion.d \
- $bin/share/zsh/vendor-completions \
- $bin/share/man/man1
- $bin/bin/restic generate \
- --bash-completion $bin/etc/bash_completion.d/restic.sh \
- --zsh-completion $bin/share/zsh/vendor-completions/_restic \
- --man $bin/share/man/man1
+ postInstall = lib.optionalString (stdenv.hostPlatform == stdenv.buildPlatform) ''
+ $out/bin/restic generate \
+ --bash-completion restic.bash \
+ --zsh-completion restic.zsh \
+ --man .
+ installShellCompletion restic.{bash,zsh}
+ installManPage *.1
'';
meta = with lib; {
diff --git a/nixpkgs/pkgs/tools/backup/restic/rest-server.nix b/nixpkgs/pkgs/tools/backup/restic/rest-server.nix
index c7f12cb751b..45a4df74b15 100644
--- a/nixpkgs/pkgs/tools/backup/restic/rest-server.nix
+++ b/nixpkgs/pkgs/tools/backup/restic/rest-server.nix
@@ -19,7 +19,7 @@ buildGoPackage rec {
'';
installPhase = ''
- install -Dt $bin/bin rest-server
+ install -Dt $out/bin rest-server
'';
meta = with lib; {
diff --git a/nixpkgs/pkgs/tools/backup/wal-g/default.nix b/nixpkgs/pkgs/tools/backup/wal-g/default.nix
index ad67f7ce880..2f2541c41cb 100644
--- a/nixpkgs/pkgs/tools/backup/wal-g/default.nix
+++ b/nixpkgs/pkgs/tools/backup/wal-g/default.nix
@@ -11,7 +11,7 @@ buildGoModule rec {
sha256 = "1hslhs9i4wib6c74gdq9yail958ff1y11pymjww2xr84wkwd9v7i";
};
- modSha256 = "0kwl5gwc5gc0cq2gldg13nvswp9wd90xiv1qb3g8yxcczywkpmrm";
+ vendorSha256 = "0jjr33k27k6h27sa01ipz0aydch3i9klknqb3yq8f048zkb54gv8";
buildInputs = [ brotli ];
@@ -31,4 +31,4 @@ buildGoModule rec {
description = "An archival restoration tool for PostgreSQL";
maintainers = [ stdenv.lib.maintainers.ocharles ];
};
-}
+} \ No newline at end of file
diff --git a/nixpkgs/pkgs/tools/backup/znapzend/default.nix b/nixpkgs/pkgs/tools/backup/znapzend/default.nix
index 90ed1068ca6..5ca460beb3b 100644
--- a/nixpkgs/pkgs/tools/backup/znapzend/default.nix
+++ b/nixpkgs/pkgs/tools/backup/znapzend/default.nix
@@ -1,27 +1,28 @@
-{ stdenv, fetchFromGitHub, fetchurl, perl, perlPackages, wget, autoconf, automake }:
+{ stdenv, fetchFromGitHub, fetchurl, perl, perlPackages, wget, autoconf, automake, autoreconfHook }:
let
- # when upgrade znapzend, check versions of Perl libs here: https://github.com/oetiker/znapzend/blob/master/PERL_MODULES
- Mojolicious-6-46 = perlPackages.buildPerlPackage rec {
+ # when upgrade znapzend, check versions of Perl libs here: https://github.com/oetiker/znapzend/blob/master/cpanfile
+ # pinned versions are listed at https://github.com/oetiker/znapzend/blob/master/thirdparty/cpanfile-5.26.1.snapshot
+ Mojolicious-8-35 = perlPackages.buildPerlPackage rec {
pname = "Mojolicious";
- version = "6.46";
+ version = "8.35";
src = fetchurl {
url = "mirror://cpan/authors/id/S/SR/SRI/${pname}-${version}.tar.gz";
- sha256 = "0i3axmx4506fx5gms148pj65x6ys7flaz1aqjd8hd9zfkd8pzdfr";
+ sha256 = "1bll0ahh5v1y3x0ql29klwsa68cj46wzqc385srsnn2m8kh2ak8h";
};
};
- MojoIOLoopForkCall-0-17 = perlPackages.buildPerlModule rec {
+ MojoIOLoopForkCall-0-20 = perlPackages.buildPerlModule rec {
pname = "Mojo-IOLoop-ForkCall";
- version = "0.17";
+ version = "0.20";
src = fetchurl {
url = "mirror://cpan/authors/id/J/JB/JBERGER/${pname}-${version}.tar.gz";
- sha256 = "090qxz1nbah2qxvfg4whl6yp6q03qkx7a42751iai521nk1yavc8";
+ sha256 = "19pih5x0ayxs2m8j29qwdpi6ky3w4ghv6vrmax3ix9r59hj6569b";
};
- propagatedBuildInputs = [ perlPackages.IOPipely Mojolicious-6-46 ];
+ propagatedBuildInputs = [ perlPackages.IOPipely Mojolicious-8-35 ];
};
- version = "0.18.0";
- checksum = "1nlvw56viwgafma506slywfg54z6009jmzc9q6wljgr6mqfmmchd";
+ version = "0.20.0";
+ checksum = "15lb5qwksa508m9bj6d3n4rrjpakfaas9qxspg408bcqfp7pqjw3";
in
stdenv.mkDerivation {
pname = "znapzend";
@@ -34,9 +35,9 @@ stdenv.mkDerivation {
sha256 = checksum;
};
- buildInputs = [ wget perl MojoIOLoopForkCall-0-17 perlPackages.TAPParserSourceHandlerpgTAP ];
+ buildInputs = [ wget perl MojoIOLoopForkCall-0-20 perlPackages.TAPParserSourceHandlerpgTAP ];
- nativeBuildInputs = [ autoconf automake ];
+ nativeBuildInputs = [ autoconf automake autoreconfHook ];
preConfigure = ''
sed -i 's/^SUBDIRS =.*$/SUBDIRS = lib/' Makefile.am
@@ -55,23 +56,23 @@ stdenv.mkDerivation {
postInstall = ''
substituteInPlace $out/bin/znapzend --replace "${perl}/bin/perl" \
"${perl}/bin/perl \
- -I${Mojolicious-6-46}/${perl.libPrefix} \
+ -I${Mojolicious-8-35}/${perl.libPrefix} \
-I${perlPackages.TAPParserSourceHandlerpgTAP}/${perl.libPrefix} \
- -I${MojoIOLoopForkCall-0-17}/${perl.libPrefix} \
+ -I${MojoIOLoopForkCall-0-20}/${perl.libPrefix} \
-I${perlPackages.IOPipely}/${perl.libPrefix} \
"
substituteInPlace $out/bin/znapzendzetup --replace "${perl}/bin/perl" \
"${perl}/bin/perl \
- -I${Mojolicious-6-46}/${perl.libPrefix} \
+ -I${Mojolicious-8-35}/${perl.libPrefix} \
-I${perlPackages.TAPParserSourceHandlerpgTAP}/${perl.libPrefix} \
- -I${MojoIOLoopForkCall-0-17}/${perl.libPrefix} \
+ -I${MojoIOLoopForkCall-0-20}/${perl.libPrefix} \
-I${perlPackages.IOPipely}/${perl.libPrefix} \
"
substituteInPlace $out/bin/znapzendztatz --replace "${perl}/bin/perl" \
"${perl}/bin/perl \
- -I${Mojolicious-6-46}/${perl.libPrefix} \
+ -I${Mojolicious-8-35}/${perl.libPrefix} \
-I${perlPackages.TAPParserSourceHandlerpgTAP}/${perl.libPrefix} \
- -I${MojoIOLoopForkCall-0-17}/${perl.libPrefix} \
+ -I${MojoIOLoopForkCall-0-20}/${perl.libPrefix} \
-I${perlPackages.IOPipely}/${perl.libPrefix} \
"
'';
diff --git a/nixpkgs/pkgs/tools/bluetooth/obex-data-server/default.nix b/nixpkgs/pkgs/tools/bluetooth/obex-data-server/default.nix
index 15661d6e360..f95869e789c 100644
--- a/nixpkgs/pkgs/tools/bluetooth/obex-data-server/default.nix
+++ b/nixpkgs/pkgs/tools/bluetooth/obex-data-server/default.nix
@@ -1,4 +1,4 @@
-{ stdenv, fetchurl, pkgconfig, libusb, glib, dbus-glib, bluez, openobex, dbus }:
+{ stdenv, fetchurl, pkgconfig, libusb-compat-0_1, glib, dbus-glib, bluez, openobex, dbus }:
stdenv.mkDerivation rec {
name = "obex-data-server-0.4.6";
@@ -9,7 +9,7 @@ stdenv.mkDerivation rec {
};
nativeBuildInputs = [ pkgconfig ];
- buildInputs = [ libusb glib dbus-glib bluez openobex dbus ];
+ buildInputs = [ libusb-compat-0_1 glib dbus-glib bluez openobex dbus ];
patches = [ ./obex-data-server-0.4.6-build-fixes-1.patch ];
diff --git a/nixpkgs/pkgs/tools/bluetooth/openobex/default.nix b/nixpkgs/pkgs/tools/bluetooth/openobex/default.nix
index ccf2eee1bb1..7ac0234852c 100644
--- a/nixpkgs/pkgs/tools/bluetooth/openobex/default.nix
+++ b/nixpkgs/pkgs/tools/bluetooth/openobex/default.nix
@@ -1,4 +1,4 @@
-{ stdenv, fetchurl, pkgconfig, bluez, libusb, cmake }:
+{ stdenv, fetchurl, pkgconfig, bluez, libusb-compat-0_1, cmake }:
stdenv.mkDerivation rec {
name = "openobex-1.7.2";
@@ -9,7 +9,7 @@ stdenv.mkDerivation rec {
};
nativeBuildInputs = [ pkgconfig cmake ];
- buildInputs = [ bluez libusb ];
+ buildInputs = [ bluez libusb-compat-0_1 ];
configureFlags = [ "--enable-apps" ];
diff --git a/nixpkgs/pkgs/tools/compression/gzip/default.nix b/nixpkgs/pkgs/tools/compression/gzip/default.nix
index 10cfa086860..65760a0b6cc 100644
--- a/nixpkgs/pkgs/tools/compression/gzip/default.nix
+++ b/nixpkgs/pkgs/tools/compression/gzip/default.nix
@@ -17,6 +17,15 @@ stdenv.mkDerivation rec {
makeFlags = [ "SHELL=/bin/sh" "GREP=grep" ];
+ # Many gzip executables are shell scripts that depend upon other gzip
+ # executables being in $PATH. Rather than try to re-write all the
+ # internal cross-references, just add $out/bin to PATH at the top of
+ # all the executables that are shell scripts.
+ preFixup = ''
+ sed -i '1{;/#!\/bin\/sh/aPATH="'$out'/bin:$PATH"
+ }' $out/bin/*
+ '';
+
meta = {
homepage = "https://www.gnu.org/software/gzip/";
description = "GNU zip compression program";
diff --git a/nixpkgs/pkgs/tools/compression/hactool/default.nix b/nixpkgs/pkgs/tools/compression/hactool/default.nix
new file mode 100644
index 00000000000..77382d980e5
--- /dev/null
+++ b/nixpkgs/pkgs/tools/compression/hactool/default.nix
@@ -0,0 +1,30 @@
+{ stdenv, fetchFromGitHub }:
+
+stdenv.mkDerivation {
+ pname = "hactool";
+ version = "1.3.3";
+
+ src = fetchFromGitHub {
+ owner = "SciresM";
+ repo = "hactool";
+ rev = "1.3.3";
+ sha256 = "1qb51fck7liqc1ridms8wdlzgbdbvp6iv4an8jvmzhcj5p5xq631";
+ };
+
+ preBuild = ''
+ mv config.mk.template config.mk
+ '';
+
+ installPhase = ''
+ install -D hactool $out/bin/hactool
+ '';
+
+ meta = with stdenv.lib; {
+ homepage = "https://github.com/SciresM/hactool";
+ description = "A tool to manipulate common file formats for the Nintendo Switch";
+ longDescription = "A tool to view information about, decrypt, and extract common file formats for the Nintendo Switch, especially Nintendo Content Archives";
+ license = licenses.isc;
+ maintainers = with maintainers; [ ivar ];
+ platforms = platforms.unix;
+ };
+}
diff --git a/nixpkgs/pkgs/tools/compression/zopfli/default.nix b/nixpkgs/pkgs/tools/compression/zopfli/default.nix
index 81fdc95d88d..13e1d836938 100644
--- a/nixpkgs/pkgs/tools/compression/zopfli/default.nix
+++ b/nixpkgs/pkgs/tools/compression/zopfli/default.nix
@@ -19,6 +19,7 @@ stdenv.mkDerivation rec {
postInstall = ''
install -Dm444 -t $out/share/doc/zopfli ../README*
+ cp $src/src/zopfli/*.h $dev/include/
'';
enableParallelBuilding = true;
diff --git a/nixpkgs/pkgs/tools/filesystems/avfs/default.nix b/nixpkgs/pkgs/tools/filesystems/avfs/default.nix
index 2df5043867a..eaf9ac634a1 100644
--- a/nixpkgs/pkgs/tools/filesystems/avfs/default.nix
+++ b/nixpkgs/pkgs/tools/filesystems/avfs/default.nix
@@ -2,10 +2,10 @@
stdenv.mkDerivation rec {
pname = "avfs";
- version = "1.1.1";
+ version = "1.1.2";
src = fetchurl {
url = "mirror://sourceforge/avf/${version}/${pname}-${version}.tar.bz2";
- sha256 = "0fxzigpyi08ipqz30ihjcpqmmx8g7r1kqdqq1bnnznvnhrzyygn8";
+ sha256 = "035b6y49nzgswf5n70aph8pm48sbv9nqwlnp3wwbq892c39kk4xn";
};
nativeBuildInputs = [ pkgconfig ];
diff --git a/nixpkgs/pkgs/tools/filesystems/bees/bees-service-wrapper b/nixpkgs/pkgs/tools/filesystems/bees/bees-service-wrapper
index 8ef46afc18f..67c95e8f803 100755
--- a/nixpkgs/pkgs/tools/filesystems/bees/bees-service-wrapper
+++ b/nixpkgs/pkgs/tools/filesystems/bees/bees-service-wrapper
@@ -140,7 +140,11 @@ _setup() {
[[ $bees_uuid ]] || {
# if bees_uuid is not in our .conf file, look it up with findmnt
- read -r bees_uuid fstype < <(findmnt -n -o uuid,fstype "$bees_fsSpec") && [[ $fstype ]] || exit
+ for findmnt_mode in --kernel --mtab --fstab; do
+ read -r bees_uuid fstype < <(findmnt "$findmnt_mode" -n -o uuid,fstype "$bees_fsSpec") ||:
+ [[ $bees_uuid && $fstype ]] && break
+ done
+ [[ $bees_uuid ]] || die "Unable to identify a device matching $bees_fsSpec with findmnt"
[[ $fstype = btrfs ]] || die "Device type is $fstype, not btrfs"
}
diff --git a/nixpkgs/pkgs/tools/filesystems/bindfs/default.nix b/nixpkgs/pkgs/tools/filesystems/bindfs/default.nix
index 065a673eb03..bf6c68072aa 100644
--- a/nixpkgs/pkgs/tools/filesystems/bindfs/default.nix
+++ b/nixpkgs/pkgs/tools/filesystems/bindfs/default.nix
@@ -1,12 +1,12 @@
{ stdenv, fetchurl, fuse, pkgconfig }:
stdenv.mkDerivation rec {
- version = "1.14.4";
+ version = "1.14.5";
pname = "bindfs";
src = fetchurl {
url = "https://bindfs.org/downloads/${pname}-${version}.tar.gz";
- sha256 = "1vk42bq8y13gv4yvajf65qsh59lscwcaw3xv94qpjxld3786i8c7";
+ sha256 = "173c5fcnfbnlw5a437r2x899ax77j3wp8gg8gffhryahcgyn1abq";
};
dontStrip = true;
diff --git a/nixpkgs/pkgs/tools/filesystems/btrfs-progs/default.nix b/nixpkgs/pkgs/tools/filesystems/btrfs-progs/default.nix
index 9b4bf479967..5c73ee945c7 100644
--- a/nixpkgs/pkgs/tools/filesystems/btrfs-progs/default.nix
+++ b/nixpkgs/pkgs/tools/filesystems/btrfs-progs/default.nix
@@ -4,11 +4,11 @@
stdenv.mkDerivation rec {
pname = "btrfs-progs";
- version = "5.4.1";
+ version = "5.6";
src = fetchurl {
url = "mirror://kernel/linux/kernel/people/kdave/btrfs-progs/btrfs-progs-v${version}.tar.xz";
- sha256 = "0scxg9p6z0wss92gmv5a8yxdmr8x449kb5v3bfnvs26n92r7zq7k";
+ sha256 = "0srg276yccfmqz0skmmga3vbqx4wiqsk1l6h86n6ryhxa9viqcm1";
};
nativeBuildInputs = [
diff --git a/nixpkgs/pkgs/tools/filesystems/catcli/default.nix b/nixpkgs/pkgs/tools/filesystems/catcli/default.nix
index 4ac6c1d5b21..25de04467ef 100644
--- a/nixpkgs/pkgs/tools/filesystems/catcli/default.nix
+++ b/nixpkgs/pkgs/tools/filesystems/catcli/default.nix
@@ -7,13 +7,13 @@
buildPythonApplication rec {
pname = "catcli";
- version = "0.5.13";
+ version = "0.6.0";
src = fetchFromGitHub {
owner = "deadc0de6";
repo = pname;
rev = "v${version}";
- sha256 = "04mrkqmm2c8fhi1h1hddc4yh3dqhcvkmcwzhj0ggn34v7wavgb5i";
+ sha256 = "0myhvflph4fayl2bg8m9a7prh5pcnvnb75p0jb4jpmbx7jyn7ihp";
};
propagatedBuildInputs = [ docopt anytree ];
diff --git a/nixpkgs/pkgs/tools/filesystems/ceph/default.nix b/nixpkgs/pkgs/tools/filesystems/ceph/default.nix
index ea610dfcc7f..c2234404d34 100644
--- a/nixpkgs/pkgs/tools/filesystems/ceph/default.nix
+++ b/nixpkgs/pkgs/tools/filesystems/ceph/default.nix
@@ -93,7 +93,7 @@ let
]);
sitePackages = ceph-python-env.python.sitePackages;
- version = "14.2.8";
+ version = "14.2.9";
in rec {
ceph = stdenv.mkDerivation {
pname = "ceph";
@@ -101,7 +101,7 @@ in rec {
src = fetchurl {
url = "http://download.ceph.com/tarballs/ceph-${version}.tar.gz";
- sha256 = "0p7pjycqhxqg1mmix8ykx3xqq01d560p54iiidxps0rcvwfkyyki";
+ sha256 = "0zkh1a23v8g1fa5flqa2d53lv08ancab3li57gybpqpnja90k7il";
};
patches = [
diff --git a/nixpkgs/pkgs/tools/filesystems/ciopfs/default.nix b/nixpkgs/pkgs/tools/filesystems/ciopfs/default.nix
index 5beff7bf1c5..8b633ecbe0f 100644
--- a/nixpkgs/pkgs/tools/filesystems/ciopfs/default.nix
+++ b/nixpkgs/pkgs/tools/filesystems/ciopfs/default.nix
@@ -14,7 +14,7 @@ stdenv.mkDerivation rec {
makeFlags = [ "DESTDIR=$(out)" "PREFIX=" ];
meta = {
- homepage = "http://www.brain-dump.org/projects/ciopfs/";
+ homepage = "https://www.brain-dump.org/projects/ciopfs/";
description = "A case-insensitive filesystem layered on top of any other filesystem";
license = stdenv.lib.licenses.gpl2;
platforms = stdenv.lib.platforms.linux;
diff --git a/nixpkgs/pkgs/tools/filesystems/darling-dmg/default.nix b/nixpkgs/pkgs/tools/filesystems/darling-dmg/default.nix
index 3548cf0a3dc..43823e5b51a 100644
--- a/nixpkgs/pkgs/tools/filesystems/darling-dmg/default.nix
+++ b/nixpkgs/pkgs/tools/filesystems/darling-dmg/default.nix
@@ -18,7 +18,7 @@ stdenv.mkDerivation rec {
CXXFLAGS = [ "-DU_USING_ICU_NAMESPACE=1" ];
meta = {
- homepage = "http://www.darlinghq.org/";
+ homepage = "https://www.darlinghq.org/";
description = "Darling lets you open macOS dmgs on Linux";
platforms = stdenv.lib.platforms.linux;
license = stdenv.lib.licenses.gpl3;
diff --git a/nixpkgs/pkgs/tools/filesystems/fatsort/default.nix b/nixpkgs/pkgs/tools/filesystems/fatsort/default.nix
index dafe4c85176..b8f63a379b1 100644
--- a/nixpkgs/pkgs/tools/filesystems/fatsort/default.nix
+++ b/nixpkgs/pkgs/tools/filesystems/fatsort/default.nix
@@ -1,18 +1,20 @@
{stdenv, fetchurl, help2man}:
stdenv.mkDerivation rec {
- version = "1.5.0.456";
+ version = "1.6.2.605";
pname = "fatsort";
src = fetchurl {
url = "mirror://sourceforge/fatsort/${pname}-${version}.tar.xz";
- sha256 = "15fy2m4p9s8cfvnzdcd5ynkc2js0zklkkf34sjxdac7x2iwb8dd8";
+ sha256 = "1dzzsl3a1ampari424vxkma0i87qkbgkgm2169x9xf3az0vgmjh8";
};
patches = [ ./fatsort-Makefiles.patch ];
buildInputs = [ help2man ];
+ makeFlags = [ "PREFIX=${placeholder "out"}" ];
+
meta = with stdenv.lib; {
homepage = "http://fatsort.sourceforge.net/";
description = "Sorts FAT partition table, for devices that don't do sorting of files";
diff --git a/nixpkgs/pkgs/tools/filesystems/fatsort/fatsort-Makefiles.patch b/nixpkgs/pkgs/tools/filesystems/fatsort/fatsort-Makefiles.patch
index 9c9f58e97ab..51775edfb41 100644
--- a/nixpkgs/pkgs/tools/filesystems/fatsort/fatsort-Makefiles.patch
+++ b/nixpkgs/pkgs/tools/filesystems/fatsort/fatsort-Makefiles.patch
@@ -1,31 +1,34 @@
-diff -uNr fatsort-1.3.365-a/Makefile fatsort-1.3.365-b/Makefile
---- fatsort-1.3.365-a/Makefile 2014-04-08 19:19:36.000000000 +0100
-+++ fatsort-1.3.365-b/Makefile 2014-12-14 18:31:55.982857720 +0000
+diff -uNr fatsort-1.6.2.605.orig/Makefile fatsort-1.6.2.605.new/Makefile
+--- fatsort-1.6.2.605.orig/Makefile 2019-11-16 16:40:27.000000000 +0100
++++ fatsort-1.6.2.605.new/Makefile 2020-05-10 21:34:34.820874026 +0200
@@ -1,4 +1,5 @@
-MANDIR=/usr/local/share/man/man1
-+PREFIX=$(out)
++PREFIX?=/usr/local
+MANDIR=$(PREFIX)/share/man/man1
INSTALL_FLAGS=-m 0755 -p -D
-diff -uNr fatsort-1.3.365-a/src/Makefile fatsort-1.3.365-b/src/Makefile
---- fatsort-1.3.365-a/src/Makefile 2014-04-08 19:19:36.000000000 +0100
-+++ fatsort-1.3.365-b/src/Makefile 2014-12-14 18:32:08.282870461 +0000
-@@ -1,3 +1,5 @@
-+PREFIX=$(out)
-+
- CC=gcc
- LD=gcc
-
-@@ -33,9 +35,9 @@
-
- # Mac OS X does not have a "/usr/local/sbin"
- ifeq ($(UNAME),Darwin)
--SBINDIR=/usr/local/bin
-+SBINDIR=$(PREFIX)/bin
+diff -uNr fatsort-1.6.2.605.orig/src/Makefile fatsort-1.6.2.605.new/src/Makefile
+--- fatsort-1.6.2.605.orig/src/Makefile 2018-11-17 00:40:59.000000000 +0100
++++ fatsort-1.6.2.605.new/src/Makefile 2020-05-10 21:33:52.053391027 +0200
+@@ -30,7 +30,7 @@
+ override CFLAGS += -D __CYGWIN__
+ override CFLAGS += -D __LINUX__
+ override LDFLAGS += -liconv
+- SBINDIR=/usr/local/sbin
++ SBINDIR=$(PREFIX)/sbin
+ endif
else
--SBINDIR=/usr/local/sbin
-+SBINDIR=$(PREFIX)/sbin
+ ifdef MINGW
+@@ -60,9 +60,9 @@
+ # OS X's install does not support the '-D' flag.
+ INSTALL_FLAGS=-m 0755 -p
+ # Mac OS X does not have a "/usr/local/sbin"
+- SBINDIR=/usr/local/bin
++ SBINDIR=$(PREFIX)/bin
+ else
+- SBINDIR=/usr/local/sbin
++ SBINDIR=$(PREFIX)/sbin
+ endif
+ endif
endif
-
- OBJ=fatsort.o FAT_fs.o fileio.o endianness.o signal.o entrylist.o errors.o options.o clusterchain.o sort.o misc.o natstrcmp.o stringlist.o
diff --git a/nixpkgs/pkgs/tools/filesystems/fuse-overlayfs/default.nix b/nixpkgs/pkgs/tools/filesystems/fuse-overlayfs/default.nix
index 02347944788..c3b694c8555 100644
--- a/nixpkgs/pkgs/tools/filesystems/fuse-overlayfs/default.nix
+++ b/nixpkgs/pkgs/tools/filesystems/fuse-overlayfs/default.nix
@@ -1,26 +1,26 @@
-{ stdenv, lib, fetchFromGitHub, autoreconfHook, pkg-config, fuse3 }:
+{ stdenv, fetchFromGitHub, autoreconfHook, pkg-config, fuse3 }:
stdenv.mkDerivation rec {
pname = "fuse-overlayfs";
- version = "0.7.8";
+ version = "1.0.0";
src = fetchFromGitHub {
owner = "containers";
repo = pname;
rev = "v${version}";
- sha256 = "10wsssf9mxgkgcqks3z02y9ya8xh4wd45lsb1jrvw31wmz9zpalc";
+ sha256 = "0h1ay2l7zyiqplh8whanw68mcfri79lc03wjjrhqji5ddwznv6fa";
};
nativeBuildInputs = [ autoreconfHook pkg-config ];
buildInputs = [ fuse3 ];
- meta = with lib; {
+ meta = with stdenv.lib; {
description = "FUSE implementation for overlayfs";
longDescription = "An implementation of overlay+shiftfs in FUSE for rootless containers.";
license = licenses.gpl3;
maintainers = with maintainers; [ ma9e ] ++ teams.podman.members;
- platforms = platforms.unix;
+ platforms = platforms.linux;
inherit (src.meta) homepage;
};
}
diff --git a/nixpkgs/pkgs/tools/filesystems/fuseiso/default.nix b/nixpkgs/pkgs/tools/filesystems/fuseiso/default.nix
index 2d24cb71bbe..0a4472d7123 100644
--- a/nixpkgs/pkgs/tools/filesystems/fuseiso/default.nix
+++ b/nixpkgs/pkgs/tools/filesystems/fuseiso/default.nix
@@ -1,40 +1,55 @@
-{ stdenv, fetchurl, fetchpatch, pkgconfig, fuse, zlib, glib }:
+{ stdenv, fetchurl, fetchpatch, autoreconfHook, pkgconfig, fuse, glib, zlib }:
-stdenv.mkDerivation {
- name = "fuseiso-20070708";
+stdenv.mkDerivation rec {
+ pname = "fuseiso";
+ version = "20070708";
src = fetchurl {
- url = "mirror://sourceforge/project/fuseiso/fuseiso/20070708/fuseiso-20070708.tar.bz2";
+ url = "mirror://sourceforge/project/fuseiso/fuseiso/${version}/fuseiso-${version}.tar.bz2";
sha256 = "127xql52dcdhmh7s5m9xc6q39jdlj3zhbjar1j821kb6gl3jw94b";
};
- nativeBuildInputs = [ pkgconfig ];
- buildInputs = [ fuse zlib glib ];
-
- patches = let fetchPatchFromDebian = { patch, sha256 }:
- fetchpatch {
- inherit sha256;
- url = "https://sources.debian.net/data/main/f/fuseiso/20070708-3.2/debian/patches/${patch}";
- };
- in [
- (fetchPatchFromDebian {
- patch = "00-support_large_iso.patch";
+ patches = [
+ (fetchpatch {
+ name = "00-support_large_iso.patch";
+ url = "https://sources.debian.net/data/main/f/fuseiso/${version}-3.2/debian/patches/00-support_large_iso.patch";
sha256 = "1lmclb1qwzz5f4wlq693g83bblwnjjl73qhgfxbsaac5hnn2shjw";
})
- (fetchPatchFromDebian { # CVE-2015-8837
- patch = "02-prevent-buffer-overflow.patch";
+ (fetchpatch {
+ name = "01-fix_typo.patch";
+ url = "https://sources.debian.net/data/main/f/fuseiso/${version}-3.2/debian/patches/01-fix_typo.patch";
+ sha256 = "14rpxp0yylzsgqv0r19l4wx1h5hvqp617gpv1yg0w48amr9drasa";
+ })
+ (fetchpatch {
+ name = "02-prevent-buffer-overflow_CVE-2015-8837.patch";
+ url = "https://sources.debian.net/data/main/f/fuseiso/${version}-3.2/debian/patches/02-prevent-buffer-overflow.patch";
sha256 = "1ls2pp3mh91pdb51qz1fsd8pwhbky6988bpd156bn7wgfxqzh8ig";
})
- (fetchPatchFromDebian { # CVE-2015-8836
- patch = "03-prevent-integer-overflow.patch";
+ (fetchpatch {
+ name = "03-prevent-integer-overflow_CVE-2015-8836.patch";
+ url = "https://sources.debian.net/data/main/f/fuseiso/${version}-3.2/debian/patches/03-prevent-integer-overflow.patch";
sha256 = "100cw07fk4sa3hl7a1gk2hgz4qsxdw99y20r7wpidwwwzy463zcv";
})
];
- meta = {
- homepage = "https://sourceforge.net/projects/fuseiso";
+ nativeBuildInputs = [ autoreconfHook pkgconfig ];
+
+ buildInputs = [ fuse glib zlib ];
+
+ # after autoreconfHook, glib and zlib are not found, so force link against
+ # them
+ NIX_LDFLAGS = "-lglib-2.0 -lz";
+
+ enableParallelBuilding = true;
+
+ postInstall = ''
+ install -Dm444 -t $out/share/doc/${pname} NEWS README
+ '';
+
+ meta = with stdenv.lib; {
description = "FUSE module to mount ISO filesystem images";
- platforms = stdenv.lib.platforms.linux;
- license = stdenv.lib.licenses.gpl2;
+ homepage = "https://sourceforge.net/projects/fuseiso";
+ license = licenses.gpl2;
+ platforms = platforms.linux;
};
}
diff --git a/nixpkgs/pkgs/tools/filesystems/gcsfuse/default.nix b/nixpkgs/pkgs/tools/filesystems/gcsfuse/default.nix
index f8d955dbfc1..3f0e261b18d 100644
--- a/nixpkgs/pkgs/tools/filesystems/gcsfuse/default.nix
+++ b/nixpkgs/pkgs/tools/filesystems/gcsfuse/default.nix
@@ -16,8 +16,8 @@ buildGoPackage rec {
subPackages = [ "." "tools/mount_gcsfuse" ];
postInstall = ''
- ln -s $bin/bin/mount_gcsfuse $bin/bin/mount.gcsfuse
- ln -s $bin/bin/mount_gcsfuse $bin/bin/mount.fuse.gcsfuse
+ ln -s $out/bin/mount_gcsfuse $out/bin/mount.gcsfuse
+ ln -s $out/bin/mount_gcsfuse $out/bin/mount.fuse.gcsfuse
'';
meta = with lib;{
diff --git a/nixpkgs/pkgs/tools/filesystems/glusterfs/default.nix b/nixpkgs/pkgs/tools/filesystems/glusterfs/default.nix
index 5cc6e5c156b..f02fec85a5b 100644
--- a/nixpkgs/pkgs/tools/filesystems/glusterfs/default.nix
+++ b/nixpkgs/pkgs/tools/filesystems/glusterfs/default.nix
@@ -15,10 +15,10 @@ let
# The command
# find /nix/store/...-glusterfs-.../ -name '*.py' -executable
# can help with finding new Python scripts.
- version = "7.4";
+ version = "7.5";
name="${baseName}-${version}";
url="https://github.com/gluster/glusterfs/archive/v${version}.tar.gz";
- sha256 = "1f7z1dacnx7pd3ri4nka6851fzhdfandbf94blds8bqfqc1263h6";
+ sha256 = "1zahld2v1y920i0p25zcn15a593g3bl5sgnmhkdmn7kvk7mx4p93";
};
buildInputs = [
@@ -73,19 +73,25 @@ stdenv.mkDerivation
postPatch = ''
sed -e '/chmod u+s/d' -i contrib/fuse-util/Makefile.am
+ substituteInPlace libglusterfs/src/glusterfs/lvm-defaults.h \
+ --replace '/sbin/' '${lvm2}/bin/'
+ substituteInPlace libglusterfs/src/glusterfs/compat.h \
+ --replace '/bin/umount' '${utillinux}/bin/umount'
+ substituteInPlace contrib/fuse-lib/mount-gluster-compat.h \
+ --replace '/bin/mount' '${utillinux}/bin/mount'
'';
- # Note that the VERSION file is something that is present in release tarballs
- # but not in git tags (at least not as of writing in v3.10.1).
- # That's why we have to create it.
- # Without this, gluster (at least 3.10.1) will fail very late and cryptically,
- # for example when setting up geo-replication, with a message like
- # Staging of operation 'Volume Geo-replication Create' failed on localhost : Unable to fetch master volume details. Please check the master cluster and master volume.
- # What happens here is that the gverify.sh script tries to compare the versions,
- # but fails when the version is empty.
- # See upstream GlusterFS bug https://bugzilla.redhat.com/show_bug.cgi?id=1452705
- preConfigure = ''
- echo "v${s.version}" > VERSION
+ # Note that the VERSION file is something that is present in release tarballs
+ # but not in git tags (at least not as of writing in v3.10.1).
+ # That's why we have to create it.
+ # Without this, gluster (at least 3.10.1) will fail very late and cryptically,
+ # for example when setting up geo-replication, with a message like
+ # Staging of operation 'Volume Geo-replication Create' failed on localhost : Unable to fetch master volume details. Please check the master cluster and master volume.
+ # What happens here is that the gverify.sh script tries to compare the versions,
+ # but fails when the version is empty.
+ # See upstream GlusterFS bug https://bugzilla.redhat.com/show_bug.cgi?id=1452705
+ preConfigure = ''
+ echo "v${s.version}" > VERSION
./autogen.sh
export PYTHON=${python3}/bin/python
'';
diff --git a/nixpkgs/pkgs/tools/filesystems/irods/common.nix b/nixpkgs/pkgs/tools/filesystems/irods/common.nix
index fa498263baa..fb90c3b0aeb 100644
--- a/nixpkgs/pkgs/tools/filesystems/irods/common.nix
+++ b/nixpkgs/pkgs/tools/filesystems/irods/common.nix
@@ -1,4 +1,4 @@
-{ stdenv, bzip2, zlib, autoconf, automake, cmake, gnumake, help2man , texinfo, libtool , cppzmq , libarchive, avro-cpp, boost, jansson, zeromq, openssl, pam, libiodbc, kerberos, gcc, libcxx, which }:
+{ stdenv, bzip2, zlib, autoconf, automake, cmake, gnumake, help2man , texinfo, libtool , cppzmq , libarchive, avro-cpp, boost, jansson, zeromq, openssl, pam, libiodbc, kerberos, gcc, libcxx, which, catch2 }:
# Common attributes of irods packages
@@ -7,7 +7,7 @@ with stdenv;
{
enableParallelBuilding = true;
- buildInputs = [ bzip2 zlib autoconf automake cmake gnumake help2man texinfo libtool cppzmq libarchive avro-cpp jansson zeromq openssl pam libiodbc kerberos gcc boost libcxx which ];
+ buildInputs = [ bzip2 zlib autoconf automake cmake gnumake help2man texinfo libtool cppzmq libarchive avro-cpp jansson zeromq openssl pam libiodbc kerberos gcc boost libcxx which catch2 ];
cmakeFlags = [
"-DIRODS_EXTERNALS_FULLPATH_CLANG=${stdenv.cc}"
@@ -18,6 +18,7 @@ with stdenv;
"-DIRODS_EXTERNALS_FULLPATH_JANSSON=${jansson}"
"-DIRODS_EXTERNALS_FULLPATH_ZMQ=${zeromq}"
"-DIRODS_EXTERNALS_FULLPATH_CPPZMQ=${cppzmq}"
+ "-DIRODS_EXTERNALS_FULLPATH_CATCH2=${catch2}"
"-DIRODS_LINUX_DISTRIBUTION_NAME=nix"
"-DIRODS_LINUX_DISTRIBUTION_VERSION_MAJOR=${builtins.nixVersion}"
"-DCPACK_GENERATOR=TGZ"
diff --git a/nixpkgs/pkgs/tools/filesystems/irods/default.nix b/nixpkgs/pkgs/tools/filesystems/irods/default.nix
index b6099c099f3..8dfdd96dbeb 100644
--- a/nixpkgs/pkgs/tools/filesystems/irods/default.nix
+++ b/nixpkgs/pkgs/tools/filesystems/irods/default.nix
@@ -1,4 +1,4 @@
-{ stdenv, fetchurl, bzip2, zlib, autoconf, automake, cmake, gnumake, help2man , texinfo, libtool , cppzmq , libarchive, avro-cpp_llvm, boost, jansson, zeromq, openssl , pam, libiodbc, kerberos, gcc, libcxx, which }:
+{ stdenv, fetchFromGitHub, bzip2, zlib, autoconf, automake, cmake, gnumake, help2man , texinfo, libtool , cppzmq , libarchive, avro-cpp_llvm, boost, jansson, zeromq, openssl , pam, libiodbc, kerberos, gcc, libcxx, which, catch2 }:
with stdenv;
@@ -10,19 +10,21 @@ let
inherit stdenv bzip2 zlib autoconf automake cmake gnumake
help2man texinfo libtool cppzmq libarchive jansson
zeromq openssl pam libiodbc kerberos gcc libcxx
- boost avro-cpp which;
+ boost avro-cpp which catch2;
};
in rec {
# irods: libs and server package
irods = stdenv.mkDerivation (common // rec {
- version = "4.2.2";
- prefix = "irods";
- name = "${prefix}-${version}";
-
- src = fetchurl {
- url = "https://github.com/irods/irods/releases/download/${version}/irods-${version}.tar.gz";
- sha256 = "0b89hs7sizwrs2ja7jl521byiwb58g297p0p7zg5frxmv4ig8dw7";
+ version = "4.2.7";
+ pname = "irods";
+
+ src = fetchFromGitHub {
+ owner = "irods";
+ repo = "irods";
+ rev = version;
+ sha256 = "1pd4l42z4igzf0l8xbp7yz0nhzsv47ziv5qj8q1hh6pfhmwlzp9s";
+ fetchSubmodules = true;
};
# Patches:
@@ -41,6 +43,10 @@ in rec {
substituteInPlace cmake/runtime_library.cmake --replace "DESTINATION usr/lib" "DESTINATION lib"
substituteInPlace cmake/development_library.cmake --replace "DESTINATION usr/lib" "DESTINATION lib"
substituteInPlace cmake/development_library.cmake --replace "DESTINATION usr/include" "DESTINATION include"
+ for file in unit_tests/cmake/test_config/*.cmake
+ do
+ substituteInPlace $file --replace "CATCH2}/include" "CATCH2}/include/catch2"
+ done
export cmakeFlags="$cmakeFlags
-DCMAKE_EXE_LINKER_FLAGS=-Wl,-rpath,$out/lib
-DCMAKE_MODULE_LINKER_FLAGS=-Wl,-rpath,$out/lib
@@ -59,13 +65,18 @@ in rec {
# icommands (CLI) package, depends on the irods package
irods-icommands = stdenv.mkDerivation (common // rec {
- version = "4.2.2";
- name = "irods-icommands-${version}";
- src = fetchurl {
- url = "https://github.com/irods/irods_client_icommands/archive/${version}.tar.gz";
- sha256 = "15zcxrx0q5c3rli3snd0b2q4i0hs3zzcrbpnibbhsip855qvs77h";
+ version = "4.2.7";
+ pname = "irods-icommands";
+
+ src = fetchFromGitHub {
+ owner = "irods";
+ repo = "irods_client_icommands";
+ rev = version;
+ sha256 = "08hqrc9iaw0y9rrrcknnl5mzbcrsvqc39pwvm62fipl3vnfqryli";
};
+ patches = [ ./zmqcpp-deprecated-send_recv.patch ];
+
buildInputs = common.buildInputs ++ [ irods ];
preConfigure = common.preConfigure + ''
@@ -84,7 +95,6 @@ in rec {
description = common.meta.description + " CLI clients";
longDescription = common.meta.longDescription + ''
This package provides the CLI clients, called 'icommands'.'';
- broken = true;
};
});
}
diff --git a/nixpkgs/pkgs/tools/filesystems/irods/zmqcpp-deprecated-send_recv.patch b/nixpkgs/pkgs/tools/filesystems/irods/zmqcpp-deprecated-send_recv.patch
new file mode 100644
index 00000000000..8c249dc4745
--- /dev/null
+++ b/nixpkgs/pkgs/tools/filesystems/irods/zmqcpp-deprecated-send_recv.patch
@@ -0,0 +1,21 @@
+diff -r -u source/src/irods-grid.cpp source.new/src/irods-grid.cpp
+--- source/src/irods-grid.cpp 1970-01-01 01:00:01.000000000 +0100
++++ source.new/src/irods-grid.cpp 2020-05-05 16:34:35.566464346 +0200
+@@ -412,7 +412,7 @@
+ data_to_send.data(),
+ data_to_send.size() );
+ try {
+- if (!zmq_skt.send(req)) {
++ if (!zmq_skt.send( req, zmq::send_flags::dontwait )) {
+ std::cerr << "ZeroMQ encountered an error sending a message.\n";
+ return errno;
+ }
+@@ -426,7 +426,7 @@
+ zmq::message_t rep;
+ // wait for the server reponse
+ try {
+- if (!zmq_skt.recv( &rep )) {
++ if (!zmq_skt.recv( rep, zmq::recv_flags::dontwait )) {
+ std::cerr << "ZeroMQ encountered an error receiving a message.\n";
+ return errno;
+ }
diff --git a/nixpkgs/pkgs/tools/filesystems/squashfs-tools-ng/default.nix b/nixpkgs/pkgs/tools/filesystems/squashfs-tools-ng/default.nix
index 767c5168ff2..72b95641d00 100644
--- a/nixpkgs/pkgs/tools/filesystems/squashfs-tools-ng/default.nix
+++ b/nixpkgs/pkgs/tools/filesystems/squashfs-tools-ng/default.nix
@@ -4,11 +4,11 @@
stdenv.mkDerivation rec {
pname = "squashfs-tools-ng";
- version = "0.9";
+ version = "0.9.1";
src = fetchurl {
url = "https://infraroot.at/pub/squashfs/squashfs-tools-ng-${version}.tar.xz";
- sha256 = "1jx6bga0k07cckpv0yk77kwql7rjiicf9wkbadc8yqhp463xn90q";
+ sha256 = "1ilxkrqbpb5whv7xfwfvph76jwyjzf988njjpyyr99h6jv2r77q1";
};
nativeBuildInputs = [ doxygen graphviz pkgconfig perl ];
diff --git a/nixpkgs/pkgs/tools/filesystems/tmsu/default.nix b/nixpkgs/pkgs/tools/filesystems/tmsu/default.nix
index c7d11d415a5..5efa218ed08 100644
--- a/nixpkgs/pkgs/tools/filesystems/tmsu/default.nix
+++ b/nixpkgs/pkgs/tools/filesystems/tmsu/default.nix
@@ -1,55 +1,33 @@
-{ stdenv, fetchgit, fetchFromGitHub, go, fuse }:
+{ stdenv, buildGoPackage, fetchFromGitHub, fuse, installShellFiles }:
-stdenv.mkDerivation rec {
+buildGoPackage rec {
pname = "tmsu";
- version = "0.7.4";
-
- go-sqlite3 = fetchgit {
- url = "git://github.com/mattn/go-sqlite3";
- rev = "c9a0db5d8951646743317f0756da0339fe144dd5";
- sha256 = "1m0q9869fis0dhg34g5wc5xi6pby491spfxi23w461h29higbrqh";
- };
-
- go-fuse = fetchgit {
- url = "git://github.com/hanwen/go-fuse";
- rev = "8c85ded140ac1889372a0e22d8d21e3d10a303bd";
- sha256 = "1iph2hpvby2mfwqg9pp39xjqdl9a09h4442yfdn5l67pznljh2bi";
- };
+ version = "0.7.5";
+ goPackagePath = "github.com/oniony/TMSU";
src = fetchFromGitHub {
owner = "oniony";
repo = "tmsu";
rev = "v${version}";
- sha256 = "1g9gxlll2g4qkqbrshq3888sy1lgw6p5dvcrl5qyh6w73yimi1cq";
+ sha256 = "0834hah7p6ad81w60ifnxyh9zn09ddfgrll04kwjxwp7ypbv38wq";
};
- buildInputs = [ go fuse ];
+ goDeps = ./deps.nix;
- preBuild = ''
- mkdir -p src/github.com/mattn/go-sqlite3/
- ln -s ${go-sqlite3}/* src/github.com/mattn/go-sqlite3
+ buildInputs = [ fuse ];
+ nativeBuildInputs = [ installShellFiles ];
- mkdir -p src/github.com/hanwen/go-fuse
- ln -s ${go-fuse}/* src/github.com/hanwen/go-fuse
-
- mkdir -p src/github.com/oniony/tmsu
- ln -s ${src}/* src/github.com/oniony/tmsu
-
- patchShebangs tests/.
-
- export GOPATH=$PWD
- export GOCACHE=$TMPDIR/go-cache
+ preBuild = ''
+ mv go/src/${goPackagePath} src
+ mv src/src/${goPackagePath} go/src/${goPackagePath}
+ export GOPATH=$PWD:$GOPATH
'';
- installPhase = ''
- mkdir -p $out/bin
- mkdir -p $out/sbin
- mkdir -p $out/share/man/man1
- mkdir -p $out/share/zsh/site-functions
- make install INSTALL_DIR=$out/bin \
- MOUNT_INSTALL_DIR=$out/sbin \
- MAN_INSTALL_DIR=$out/share/man/man1 \
- ZSH_COMP_INSTALL_DIR=$out/share/zsh/site-functions
+ postInstall = ''
+ mv $out/bin/{TMSU,tmsu}
+ cp src/misc/bin/* $out/bin/
+ installManPage src/misc/man/tmsu.1
+ installShellCompletion --zsh src/misc/zsh/_tmsu
'';
meta = with stdenv.lib; {
diff --git a/nixpkgs/pkgs/tools/filesystems/tmsu/deps.nix b/nixpkgs/pkgs/tools/filesystems/tmsu/deps.nix
new file mode 100644
index 00000000000..90e64b434c4
--- /dev/null
+++ b/nixpkgs/pkgs/tools/filesystems/tmsu/deps.nix
@@ -0,0 +1,39 @@
+# This file was generated by https://github.com/kamilchm/go2nix v1.3.0
+[
+ {
+ goPackagePath = "github.com/hanwen/go-fuse";
+ fetch = {
+ type = "git";
+ url = "https://github.com/hanwen/go-fuse";
+ rev = "730713460d4fc41afdc2533bd37ff60c94c0c586";
+ sha256 = "1y44d08fxyis99s6jxdr6dbbw5kv3wb8lkhq3xmr886i4w41lz03";
+ };
+ }
+ {
+ goPackagePath = "github.com/mattn/go-sqlite3";
+ fetch = {
+ type = "git";
+ url = "https://github.com/mattn/go-sqlite3";
+ rev = "98a44bcf5949f178c8116fa30e62c9ac2ef65927";
+ sha256 = "108rk74ringkkyx05zlq5khh32fsfi0przyzrpsr1r5j57xrhxj0";
+ };
+ }
+ {
+ goPackagePath = "golang.org/x/crypto";
+ fetch = {
+ type = "git";
+ url = "https://go.googlesource.com/crypto";
+ rev = "3c4aac89819a5fdc28d906456729d3423fd46969";
+ sha256 = "16q9ay6bl28zrnb377p8lvrs2nd98h7i6y3yi8ccjwzg1czbfdsi";
+ };
+ }
+ {
+ goPackagePath = "golang.org/x/sys";
+ fetch = {
+ type = "git";
+ url = "https://go.googlesource.com/sys";
+ rev = "1957bb5e6d1f523308b49060df02171d06ddfc77";
+ sha256 = "0imqk4l9785rw7ddvywyf8zn7k3ga6f17ky8rmf8wrri7nknr03f";
+ };
+ }
+]
diff --git a/nixpkgs/pkgs/tools/filesystems/unionfs-fuse/default.nix b/nixpkgs/pkgs/tools/filesystems/unionfs-fuse/default.nix
index 695e071effc..359d8b7abbe 100644
--- a/nixpkgs/pkgs/tools/filesystems/unionfs-fuse/default.nix
+++ b/nixpkgs/pkgs/tools/filesystems/unionfs-fuse/default.nix
@@ -2,13 +2,13 @@
stdenv.mkDerivation rec {
pname = "unionfs-fuse";
- version = "2.0";
+ version = "2.1";
src = fetchFromGitHub {
owner = "rpodgorny";
repo = "unionfs-fuse";
rev = "v${version}";
- sha256 = "0lb8zgdxnjy2fjr2284hvdfn7inc1in44ynzgcr66x54bxzvynj6";
+ sha256 = "0bwx70x834qgqh53vqp18bhbxbsny80hz922rbgj8k9wj7cbfilm";
};
patches =
diff --git a/nixpkgs/pkgs/tools/graphics/gifski/default.nix b/nixpkgs/pkgs/tools/graphics/gifski/default.nix
index 3d1e2114196..8c808657f4c 100644
--- a/nixpkgs/pkgs/tools/graphics/gifski/default.nix
+++ b/nixpkgs/pkgs/tools/graphics/gifski/default.nix
@@ -2,16 +2,16 @@
rustPlatform.buildRustPackage rec {
pname = "gifski";
- version = "0.10.2";
+ version = "0.10.4";
src = fetchFromGitHub {
owner = "ImageOptim";
repo = "gifski";
rev = version;
- sha256 = "0gsk1pagg89q1mi3d28q6dsnanncwphw9lrb7qybppw0vyvqlqbx";
+ sha256 = "1ly465y435cha22rmnq632hgq2s7y0akrcna6m30f6l078br8mhn";
};
- cargoSha256 = "0k7pzcll7hn2a354vviyj8dr0kq63cwsldgv303kwklmxji02d0v";
+ cargoSha256 = "0khfkh1ylqv4v5dsb4hsha5fh3b62hcvkp3swplv64h626p3q54s";
nativeBuildInputs = [ pkgconfig ];
diff --git a/nixpkgs/pkgs/tools/graphics/mesa-demos/default.nix b/nixpkgs/pkgs/tools/graphics/mesa-demos/default.nix
new file mode 100644
index 00000000000..12e751e0f08
--- /dev/null
+++ b/nixpkgs/pkgs/tools/graphics/mesa-demos/default.nix
@@ -0,0 +1,24 @@
+{ stdenv, fetchurl, freeglut, glew, libGL, libGLU, libX11, libXext, mesa, pkg-config, wayland }:
+
+stdenv.mkDerivation rec {
+ pname = "mesa-demos";
+ version = "8.4.0";
+
+ src = fetchurl {
+ url = "ftp://ftp.freedesktop.org/pub/mesa/demos/${pname}-${version}.tar.bz2";
+ sha256 = "0zgzbz55a14hz83gbmm0n9gpjnf5zadzi2kjjvkn6khql2a9rs81";
+ };
+
+ buildInputs = [ freeglut glew libX11 libXext libGL libGLU mesa mesa.osmesa wayland ];
+ nativeBuildInputs = [ pkg-config ];
+
+ enableParallelBuilding = true;
+
+ meta = with stdenv.lib; {
+ description = "Collection of demos and test programs for OpenGL and Mesa";
+ homepage = "https://www.mesa3d.org/";
+ license = licenses.mit;
+ platforms = platforms.linux;
+ maintainers = with maintainers; [ andersk ];
+ };
+}
diff --git a/nixpkgs/pkgs/tools/graphics/mscgen/default.nix b/nixpkgs/pkgs/tools/graphics/mscgen/default.nix
index 29f0f224735..f6bec5983c2 100644
--- a/nixpkgs/pkgs/tools/graphics/mscgen/default.nix
+++ b/nixpkgs/pkgs/tools/graphics/mscgen/default.nix
@@ -1,4 +1,15 @@
-{ stdenv, fetchurl, flex, bison, gd, libpng, libjpeg, freetype, zlib, libwebp, runtimeShell }:
+{ stdenv
+, bison
+, fetchurl
+, flex
+, gd
+, libjpeg
+, libpng
+, libwebp
+, pkg-config
+, runtimeShell
+, zlib
+}:
let
version = "0.20";
@@ -12,13 +23,16 @@ stdenv.mkDerivation {
sha256 = "3c3481ae0599e1c2d30b7ed54ab45249127533ab2f20e768a0ae58d8551ddc23";
};
- buildInputs = [ flex bison gd libjpeg libpng freetype zlib libwebp ];
+ nativeBuildInputs = [ bison flex pkg-config ];
+ buildInputs = [ gd libjpeg libpng libwebp zlib ];
doCheck = true;
preCheck = ''
sed -i -e "s|#!/bin/bash|#!${runtimeShell}|" test/renderercheck.sh
'';
+ outputs = [ "out" "man" ];
+
meta = {
homepage = "http://www.mcternan.me.uk/mscgen/";
description = "Convert Message Sequence Chart descriptions into PNG, SVG, or EPS images";
diff --git a/nixpkgs/pkgs/tools/graphics/pfstools/default.nix b/nixpkgs/pkgs/tools/graphics/pfstools/default.nix
index 051adb0742f..1c437a3f05c 100644
--- a/nixpkgs/pkgs/tools/graphics/pfstools/default.nix
+++ b/nixpkgs/pkgs/tools/graphics/pfstools/default.nix
@@ -1,6 +1,6 @@
{ stdenv, fetchurl, cmake, pkgconfig, darwin
, openexr, zlib, imagemagick, libGLU, libGL, freeglut, fftwFloat
-, fftw, gsl, libexif, perl, opencv, qt5, netpbm
+, fftw, gsl, libexif, perl, opencv2, qt5, netpbm
}:
stdenv.mkDerivation rec {
@@ -28,7 +28,7 @@ stdenv.mkDerivation rec {
nativeBuildInputs = [ cmake pkgconfig ];
buildInputs = [
openexr zlib imagemagick fftwFloat
- fftw gsl libexif perl opencv qt5.qtbase netpbm
+ fftw gsl libexif perl opencv2 qt5.qtbase netpbm
] ++ (if stdenv.isDarwin then (with darwin.apple_sdk.frameworks; [
OpenGL GLUT
]) else [
diff --git a/nixpkgs/pkgs/tools/graphics/pgf/default.nix b/nixpkgs/pkgs/tools/graphics/pgf/default.nix
index 88684541fcc..d3f01fa7d1f 100644
--- a/nixpkgs/pkgs/tools/graphics/pgf/default.nix
+++ b/nixpkgs/pkgs/tools/graphics/pgf/default.nix
@@ -27,7 +27,7 @@ stdenv.mkDerivation {
# configureFlags = optional static "--enable-static --disable-shared";
meta = {
- homepage = "http://www.libpgf.org/";
+ homepage = "https://www.libpgf.org/";
description = "Progressive Graphics Format command line program";
license = stdenv.lib.licenses.lgpl21Plus;
platforms = stdenv.lib.platforms.linux;
diff --git a/nixpkgs/pkgs/tools/graphics/pngcheck/default.nix b/nixpkgs/pkgs/tools/graphics/pngcheck/default.nix
index 085b6ae4a95..ba5082ac304 100644
--- a/nixpkgs/pkgs/tools/graphics/pngcheck/default.nix
+++ b/nixpkgs/pkgs/tools/graphics/pngcheck/default.nix
@@ -25,6 +25,5 @@ stdenv.mkDerivation rec {
description = "Verifies the integrity of PNG, JNG and MNG files";
license = stdenv.lib.licenses.free;
platforms = with stdenv.lib.platforms; linux;
- maintainers = with stdenv.lib.maintainers; [ the-kenny ];
};
}
diff --git a/nixpkgs/pkgs/tools/graphics/pngcrush/default.nix b/nixpkgs/pkgs/tools/graphics/pngcrush/default.nix
index 67d3eb15ba1..5bc52b92f0d 100644
--- a/nixpkgs/pkgs/tools/graphics/pngcrush/default.nix
+++ b/nixpkgs/pkgs/tools/graphics/pngcrush/default.nix
@@ -21,6 +21,5 @@ stdenv.mkDerivation rec {
description = "A PNG optimizer";
license = stdenv.lib.licenses.free;
platforms = with stdenv.lib.platforms; linux ++ darwin;
- maintainers = with stdenv.lib.maintainers; [ the-kenny ];
};
}
diff --git a/nixpkgs/pkgs/tools/graphics/rocket/default.nix b/nixpkgs/pkgs/tools/graphics/rocket/default.nix
index 97c400fbc9e..683a2c73f45 100644
--- a/nixpkgs/pkgs/tools/graphics/rocket/default.nix
+++ b/nixpkgs/pkgs/tools/graphics/rocket/default.nix
@@ -1,6 +1,6 @@
-{ stdenv, fetchFromGitHub, qmake, qtbase }:
+{ mkDerivation, stdenv, fetchFromGitHub, qmake, qtbase }:
-stdenv.mkDerivation {
+mkDerivation {
pname = "rocket";
version = "2018-06-09";
diff --git a/nixpkgs/pkgs/tools/graphics/scrot/default.nix b/nixpkgs/pkgs/tools/graphics/scrot/default.nix
index 56df615e575..f9042645be0 100644
--- a/nixpkgs/pkgs/tools/graphics/scrot/default.nix
+++ b/nixpkgs/pkgs/tools/graphics/scrot/default.nix
@@ -3,13 +3,13 @@
stdenv.mkDerivation rec {
pname = "scrot";
- version = "1.2";
+ version = "1.3";
src = fetchFromGitHub {
owner = "resurrecting-open-source-projects";
repo = pname;
rev = version;
- sha256 = "08gkdby0ysx2mki57z81zlm7vfnq9c1gq692xw67cg5vv2p3320w";
+ sha256 = "0x70hd59ik37kqd8xqpwrz46np01jv324iz28x2s0kk36d7sblsj";
};
nativeBuildInputs = [ autoreconfHook autoconf-archive ];
diff --git a/nixpkgs/pkgs/tools/graphics/spirv-cross/default.nix b/nixpkgs/pkgs/tools/graphics/spirv-cross/default.nix
new file mode 100644
index 00000000000..57b447b1ad7
--- /dev/null
+++ b/nixpkgs/pkgs/tools/graphics/spirv-cross/default.nix
@@ -0,0 +1,23 @@
+{ stdenv, fetchFromGitHub, cmake, python3 }:
+
+stdenv.mkDerivation rec {
+ pname = "spirv-cross";
+ version = "2020-04-03";
+
+ src = fetchFromGitHub {
+ owner = "KhronosGroup";
+ repo = "SPIRV-Cross";
+ rev = version;
+ sha256 = "0489s29kqgq20clxqg22y299yxz23p0yjh87yhka705hm9skx4sa";
+ };
+
+ nativeBuildInputs = [ cmake python3 ];
+
+ meta = with stdenv.lib; {
+ description = "A tool designed for parsing and converting SPIR-V to other shader languages";
+ homepage = "https://github.com/KhronosGroup/SPIRV-Cross";
+ platforms = platforms.linux;
+ license = licenses.asl20;
+ maintainers = with maintainers; [ Flakebi ];
+ };
+}
diff --git a/nixpkgs/pkgs/tools/graphics/vips/default.nix b/nixpkgs/pkgs/tools/graphics/vips/default.nix
index 8546c4e8182..1bfb2f88020 100644
--- a/nixpkgs/pkgs/tools/graphics/vips/default.nix
+++ b/nixpkgs/pkgs/tools/graphics/vips/default.nix
@@ -12,9 +12,10 @@
, libjpeg
, libgsf
, libexif
+, libheif
, ApplicationServices
, python27
-, libpng ? null
+, libpng
, fetchFromGitHub
, fetchpatch
, autoreconfHook
@@ -25,7 +26,7 @@
stdenv.mkDerivation rec {
pname = "vips";
- version = "8.9.1";
+ version = "8.9.2";
outputs = [ "bin" "out" "man" "dev" ];
@@ -33,7 +34,7 @@ stdenv.mkDerivation rec {
owner = "libvips";
repo = "libvips";
rev = "v${version}";
- sha256 = "01vgvzlygg3fzpinb0x1rdm2sqvnqxmvxbnlbg73ygdadv3l2s0v";
+ sha256 = "0pgvcp5yjk96izh7kjfprjd9kddx7zqrwwhm8dyalhrwbmj6c2q5";
# Remove unicode file names which leads to different checksums on HFS+
# vs. other filesystems because of unicode normalisation.
extraPostFetch = ''
@@ -41,15 +42,6 @@ stdenv.mkDerivation rec {
'';
};
- patches = [
- # autogen.sh should not run configure
- # https://github.com/libvips/libvips/pull/1566
- (fetchpatch {
- url = "https://github.com/libvips/libvips/commit/97a92e0e6abab652fdf99313b138bfd77d70deb4.patch";
- sha256 = "0w1sm5wmvfp8svdpk8mz57c1n6zzy3snq0g2f8yxjamv0d2gw2dp";
- })
- ];
-
nativeBuildInputs = [
pkgconfig
autoreconfHook
@@ -69,6 +61,8 @@ stdenv.mkDerivation rec {
libjpeg
libgsf
libexif
+ libheif
+ libpng
python27
libpng
expat
diff --git a/nixpkgs/pkgs/tools/graphics/wdisplays/default.nix b/nixpkgs/pkgs/tools/graphics/wdisplays/default.nix
index 60e6b56b2e4..0993a39983e 100644
--- a/nixpkgs/pkgs/tools/graphics/wdisplays/default.nix
+++ b/nixpkgs/pkgs/tools/graphics/wdisplays/default.nix
@@ -1,7 +1,8 @@
{ stdenv, fetchFromGitHub, meson, ninja, pkgconfig, gtk3, epoxy, wayland }:
-stdenv.mkDerivation {
- pname = "wdisplays-unstable";
- version = "2020-03-15";
+
+stdenv.mkDerivation rec {
+ pname = "wdisplays";
+ version = "1.0";
nativeBuildInputs = [ meson ninja pkgconfig ];
@@ -10,8 +11,8 @@ stdenv.mkDerivation {
src = fetchFromGitHub {
owner = "cyclopsian";
repo = "wdisplays";
- rev = "0faafdc04d7dd47d3a4e385f348cb9d267f2e60d";
- sha256 = "1y3bzh4mi6d67n6v0i8j5snpaikpbyr89acayr4m6bx85qnrq4g2";
+ rev = version;
+ sha256 = "1xhgrcihja2i7yg54ghbwr1v6kf8jnsfcp364yb97vkxskc4y21y";
};
meta = let inherit (stdenv) lib; in {
diff --git a/nixpkgs/pkgs/tools/misc/3mux/default.nix b/nixpkgs/pkgs/tools/misc/3mux/default.nix
new file mode 100644
index 00000000000..81ca4d94628
--- /dev/null
+++ b/nixpkgs/pkgs/tools/misc/3mux/default.nix
@@ -0,0 +1,24 @@
+{ stdenv, buildGoModule, fetchFromGitHub }:
+
+buildGoModule rec {
+ pname = "3mux";
+ version = "0.2.0";
+
+ src = fetchFromGitHub {
+ owner = "aaronjanse";
+ repo = pname;
+ rev = "v${version}";
+ sha256 = "02ry066psvlqdyhimci7nskw4sfb70dw5z7ag7s7rz36gmx1vnmr";
+ };
+
+ vendorSha256 = "1hjzpg3q4znvgzk0wbl8rq6cq877xxdsf950bcsks92cs8386847";
+
+ meta = with stdenv.lib; {
+ description = "Terminal multiplexer inspired by i3";
+ homepage = "https://github.com/aaronjanse/3mux";
+ license = licenses.mit;
+ maintainers = with maintainers; [ aaronjanse filalex77 ];
+ # TODO: fix modules build on darwin
+ broken = stdenv.isDarwin;
+ };
+} \ No newline at end of file
diff --git a/nixpkgs/pkgs/tools/misc/agedu/default.nix b/nixpkgs/pkgs/tools/misc/agedu/default.nix
index 6463ed1df28..c9bad789ad2 100644
--- a/nixpkgs/pkgs/tools/misc/agedu/default.nix
+++ b/nixpkgs/pkgs/tools/misc/agedu/default.nix
@@ -1,7 +1,7 @@
{stdenv, fetchgit, autoreconfHook, halibut}:
let
- date = "20180918";
- rev = "80c7beb";
+ date = "20200206";
+ rev = "963bc9d";
in
stdenv.mkDerivation {
name = "agedu-${date}.${rev}";
@@ -9,7 +9,7 @@ stdenv.mkDerivation {
src = fetchgit {
url = "https://git.tartarus.org/simon/agedu.git";
inherit rev;
- sha256 = "0i930izna3s73p2q52qa377ixd14zij5q1n7w3irl7csyy78g0cd";
+ sha256 = "1jmvgg2v6aqgbgpxbndrdhgfhlglrq4yv4sdbjaj6bsz9fb8lqhc";
};
nativeBuildInputs = [autoreconfHook halibut];
diff --git a/nixpkgs/pkgs/tools/misc/aptly/default.nix b/nixpkgs/pkgs/tools/misc/aptly/default.nix
index c163fdad3a1..3c97c168429 100644
--- a/nixpkgs/pkgs/tools/misc/aptly/default.nix
+++ b/nixpkgs/pkgs/tools/misc/aptly/default.nix
@@ -1,4 +1,4 @@
-{ stdenv, buildGoPackage, fetchFromGitHub, makeWrapper, gnupg, bzip2, xz, graphviz }:
+{ stdenv, buildGoPackage, fetchFromGitHub, installShellFiles, makeWrapper, gnupg, bzip2, xz, graphviz }:
let
@@ -29,12 +29,11 @@ buildGoPackage {
goPackagePath = "github.com/aptly-dev/aptly";
- nativeBuildInputs = [ makeWrapper ];
+ nativeBuildInputs = [ installShellFiles makeWrapper ];
postInstall = ''
- mkdir -p $bin/share/bash-completion/completions
- ln -s ${aptlyCompletionSrc}/aptly $bin/share/bash-completion/completions
- wrapProgram "$bin/bin/aptly" \
+ installShellCompletion --bash ${aptlyCompletionSrc}/aptly
+ wrapProgram "$out/bin/aptly" \
--prefix PATH ":" "${stdenv.lib.makeBinPath [ gnupg bzip2 xz graphviz ]}"
'';
diff --git a/nixpkgs/pkgs/tools/misc/autorandr/default.nix b/nixpkgs/pkgs/tools/misc/autorandr/default.nix
index c6f664a1008..9588d0ae948 100644
--- a/nixpkgs/pkgs/tools/misc/autorandr/default.nix
+++ b/nixpkgs/pkgs/tools/misc/autorandr/default.nix
@@ -6,7 +6,7 @@
let
python = python3Packages.python;
- version = "1.9";
+ version = "1.10";
in
stdenv.mkDerivation {
pname = "autorandr";
@@ -49,7 +49,7 @@ in
owner = "phillipberndt";
repo = "autorandr";
rev = version;
- sha256 = "1bb0l7fcm5lcx9y02zdxv7pfdqf4v4gsc5br3v1x9gzjvqj64l7n";
+ sha256 = "0rcgs1n09p0p16lr5y239s0yrw7bch0x2cqwgc2dyh7rz7d9qmwn";
};
meta = with stdenv.lib; {
diff --git a/nixpkgs/pkgs/tools/misc/bat-extras/default.nix b/nixpkgs/pkgs/tools/misc/bat-extras/default.nix
new file mode 100644
index 00000000000..0f98b819b0f
--- /dev/null
+++ b/nixpkgs/pkgs/tools/misc/bat-extras/default.nix
@@ -0,0 +1,147 @@
+{ stdenv, callPackage, fetchFromGitHub, bash, makeWrapper, ncurses, bat
+# batgrep and batwatch
+, less
+# batgrep
+, ripgrep
+# prettybat
+, withShFmt ? shfmt != null, shfmt ? null
+, withPrettier ? nodePackages?prettier, nodePackages ? null
+, withClangTools ? clang-tools != null, clang-tools ? null
+, withRustFmt ? rustfmt != null, rustfmt ? null
+# batwatch
+, withEntr ? entr != null, entr ? null
+ }:
+
+let
+ # Core derivation that all the others are based on.
+ # This includes the complete source so the per-script derivations can run the tests.
+ core = stdenv.mkDerivation rec {
+ pname = "bat-extras";
+ version = "20200408";
+
+ src = fetchFromGitHub {
+ owner = "eth-p";
+ repo = pname;
+ rev = "v${version}";
+ sha256 = "184d5rwasfpgbj2k98alg3wy8jmzna2dgfik98w2a297ky67s51v";
+ fetchSubmodules = true;
+ };
+
+ nativeBuildInputs = [ bash makeWrapper ];
+
+ dontConfigure = true;
+
+ postPatch = ''
+ substituteInPlace lib/constants.sh \
+ --replace 'EXECUTABLE_BAT="bat"' 'EXECUTABLE_BAT="${bat}/bin/bat"'
+
+ patchShebangs --build test.sh test/shimexec .test-framework/bin/best.sh
+ wrapProgram .test-framework/bin/best.sh \
+ --prefix PATH : "${ncurses}/bin"
+ '';
+
+ buildPhase = ''
+ runHook preBuild
+ bash ./build.sh --minify=none --no-verify
+ runHook postBuild
+ '';
+
+ # Run the library tests as they don't have external dependencies
+ doCheck = true;
+ checkPhase = ''
+ runHook preCheck
+ # test list repeats suites. Unique them
+ declare -A test_suites
+ while read -r action arg _; do
+ [[ "$action" == "test_suite" && "$arg" == lib_* ]] &&
+ test_suites+=(["$arg"]=1)
+ done <<<"$(bash ./test.sh --compiled --list --porcelain)"
+ (( ''${#test_suites[@]} != 0 )) || {
+ echo "Couldn't find any library test suites"
+ exit 1
+ }
+ bash ./test.sh --compiled $(printf -- "--suite %q\n" "''${!test_suites[@]}")
+ runHook postCheck
+ '';
+
+ installPhase = ''
+ runHook preInstall
+ cp -a . $out
+ runHook postInstall
+ '';
+
+ # A few random files have shebangs. Don't patch them, they don't make it into the final output.
+ # The per-script derivations will go ahead and patch the files they actually install.
+ dontPatchShebangs = true;
+
+ meta = with stdenv.lib; {
+ description = "Bash scripts that integrate bat with various command line tools";
+ homepage = "https://github.com/eth-p/bat-extras";
+ license = with licenses; [ mit ];
+ maintainers = with maintainers; [ bbigras lilyball ];
+ platforms = platforms.all;
+ };
+ };
+ script =
+ name: # the name of the script
+ dependencies: # the tools we need to prefix onto PATH
+ stdenv.mkDerivation {
+ pname = "${core.pname}-${name}";
+ inherit (core) version;
+
+ src = core;
+
+ nativeBuildInputs = [ bash makeWrapper ];
+ # Make the dependencies available to the tests.
+ buildInputs = dependencies;
+
+ # Patch shebangs now because our tests rely on them
+ postPatch = ''
+ patchShebangs --host bin/${name}
+ '';
+
+ dontConfigure = true;
+ dontBuild = true; # we've already built
+
+ doCheck = true;
+ checkPhase = ''
+ runHook preCheck
+ bash ./test.sh --compiled --suite ${name}
+ runHook postCheck
+ '';
+
+ installPhase = ''
+ runHook preInstall
+ mkdir -p $out/bin
+ cp -p bin/${name} $out/bin/${name}
+ '' + stdenv.lib.optionalString (dependencies != []) ''
+ wrapProgram $out/bin/${name} \
+ --prefix PATH : ${stdenv.lib.makeBinPath dependencies}
+ '' + ''
+ runHook postInstall
+ '';
+
+ # We already patched
+ dontPatchShebangs = true;
+
+ inherit (core) meta;
+ };
+ optionalDep = cond: dep:
+ assert cond -> dep != null;
+ stdenv.lib.optional cond dep;
+in
+{
+ batgrep = script "batgrep" [ less ripgrep ];
+ batman = (script "batman" []).overrideAttrs (drv: {
+ doCheck = stdenv.isDarwin; # test fails on Linux due to SIGPIPE (eth-p/bat-extras#19)
+ });
+ batwatch = script "batwatch" ([ less ] ++ optionalDep withEntr entr);
+ prettybat = (script "prettybat" ([]
+ ++ optionalDep withShFmt shfmt
+ ++ optionalDep withPrettier nodePackages.prettier
+ ++ optionalDep withClangTools clang-tools
+ ++ optionalDep withRustFmt rustfmt)
+ ).overrideAttrs (drv: {
+ doCheck = stdenv.isDarwin; # test fails on Linux due to SIGPIPE (eth-p/bat-extras#19)
+ });
+}
diff --git a/nixpkgs/pkgs/tools/misc/bat/default.nix b/nixpkgs/pkgs/tools/misc/bat/default.nix
index bf84502af2b..95bc44dcce0 100644
--- a/nixpkgs/pkgs/tools/misc/bat/default.nix
+++ b/nixpkgs/pkgs/tools/misc/bat/default.nix
@@ -4,17 +4,22 @@
rustPlatform.buildRustPackage rec {
pname = "bat";
- version = "0.13.0";
+ version = "0.15.1";
src = fetchFromGitHub {
owner = "sharkdp";
repo = pname;
rev = "v${version}";
- sha256 = "1kaa6ps6v1wk9qs63h116k4pbz7y9mfbfxfbq7g89yjhzkjmh6xc";
+ sha256 = "10cs94ja1dmn0f24gqkcy8rf68b3b43k6qpbb5njbg0hcx3x6cyj";
fetchSubmodules = true;
};
- cargoSha256 = "01l1y124gjh6gf9z1jkbpfzh0w92hrgwvsmqkqdw3a9pa4w5f6yg";
+ cargoSha256 = "13cphi08bp6lg054acgliir8dx2jajll4m3c4xxy04skmx555zr8";
+
+ # Disable test that's broken on macOS.
+ # This should probably be removed on the next release.
+ # https://github.com/sharkdp/bat/issues/983
+ patches = [ ./macos.patch ];
nativeBuildInputs = [ pkgconfig llvmPackages.libclang installShellFiles makeWrapper ];
diff --git a/nixpkgs/pkgs/tools/misc/bat/macos.patch b/nixpkgs/pkgs/tools/misc/bat/macos.patch
new file mode 100644
index 00000000000..549782f0c91
--- /dev/null
+++ b/nixpkgs/pkgs/tools/misc/bat/macos.patch
@@ -0,0 +1,13 @@
+diff --git a/src/assets.rs b/src/assets.rs
+index 4f8556f..222abc2 100644
+--- a/src/assets.rs
++++ b/src/assets.rs
+@@ -336,7 +336,7 @@ mod tests {
+ assert_eq!(test.syntax_for_file("Makefile"), "Makefile");
+ }
+
+- #[cfg(unix)]
++ #[cfg(all(unix,not(target_os = "macos")))]
+ #[test]
+ fn syntax_detection_invalid_utf8() {
+ use std::os::unix::ffi::OsStrExt;
diff --git a/nixpkgs/pkgs/tools/misc/bibtool/default.nix b/nixpkgs/pkgs/tools/misc/bibtool/default.nix
index 2f90745785a..041dabeee77 100644
--- a/nixpkgs/pkgs/tools/misc/bibtool/default.nix
+++ b/nixpkgs/pkgs/tools/misc/bibtool/default.nix
@@ -2,11 +2,11 @@
stdenv.mkDerivation rec {
pname = "bibtool";
- version = "2.67";
+ version = "2.68";
src = fetchurl {
url = "http://www.gerd-neugebauer.de/software/TeX/BibTool/BibTool-${version}.tar.gz";
- sha256 = "116pv532mz0q954y5b7c6zipnamc05f0x7g5x1b674jsjxh42v2v";
+ sha256 = "1ymq901ckaysq2n1bplk1064rb2njq9n30pii15w157y0lxcwd3i";
};
# Perl for running test suite.
@@ -15,6 +15,7 @@ stdenv.mkDerivation rec {
installTargets = [ "install" "install.man" ];
doCheck = true;
+ checkTarget = "test";
meta = with stdenv.lib; {
description = "Tool for manipulating BibTeX bibliographies";
diff --git a/nixpkgs/pkgs/tools/misc/blsd/default.nix b/nixpkgs/pkgs/tools/misc/blsd/default.nix
deleted file mode 100644
index 6e6a9b7c5ab..00000000000
--- a/nixpkgs/pkgs/tools/misc/blsd/default.nix
+++ /dev/null
@@ -1,29 +0,0 @@
-{ stdenv, buildGoPackage, fetchFromGitHub, pkgconfig, libgit2 }:
-
-buildGoPackage {
- pname = "blsd";
- version = "2017-07-27";
-
- goPackagePath = "github.com/junegunn/blsd";
-
- src = fetchFromGitHub {
- owner = "junegunn";
- repo = "blsd";
- rev = "a2ac619821e502452abdeae9ebab45026893b9e8";
- sha256 = "0b0q6i4i28cjqgxqmwxbps22gp9rcd3jz562q5wvxrwlpbzlls2h";
- };
-
- goDeps = ./deps.nix;
-
- nativeBuildInputs = [ pkgconfig ];
- buildInputs = [ libgit2 ];
-
- meta = with stdenv.lib; {
- homepage = "https://github.com/junegunn/blsd";
- description = "List directories in breadth-first order";
- license = licenses.mit;
- maintainers = [ maintainers.magnetophon ];
- platforms = platforms.unix;
- broken = true; # since 2020-02-08, libgit2 is incompatible upstream is dead.
- };
-}
diff --git a/nixpkgs/pkgs/tools/misc/blsd/deps.nix b/nixpkgs/pkgs/tools/misc/blsd/deps.nix
deleted file mode 100644
index d212f213a60..00000000000
--- a/nixpkgs/pkgs/tools/misc/blsd/deps.nix
+++ /dev/null
@@ -1,12 +0,0 @@
-# This file was generated by https://github.com/kamilchm/go2nix v1.2.1
-[
- {
- goPackagePath = "github.com/libgit2/git2go";
- fetch = {
- type = "git";
- url = "https://github.com/libgit2/git2go";
- rev = "14280de4da0f392935854a7cbdd67b2a5505c3a8";
- sha256 = "17ppd7byzir8rhdk645dmggi700scb8f401yiwx8zy81q41dk1qi";
- };
- }
-]
diff --git a/nixpkgs/pkgs/tools/misc/broot/default.nix b/nixpkgs/pkgs/tools/misc/broot/default.nix
index 5d31570aacd..bf5d569bab4 100644
--- a/nixpkgs/pkgs/tools/misc/broot/default.nix
+++ b/nixpkgs/pkgs/tools/misc/broot/default.nix
@@ -2,16 +2,16 @@
rustPlatform.buildRustPackage rec {
pname = "broot";
- version = "0.13.5b";
+ version = "0.13.6";
src = fetchFromGitHub {
owner = "Canop";
repo = pname;
rev = "v${version}";
- sha256 = "0gcv9w79r9q3rzrdqiq9xgh68ya653sq84vzgf0fb154zmzjkxfv";
+ sha256 = "08d0zddqqymxj1qcp8c78r7mpii1piy6awaf135jxhzwi775sqqv";
};
- cargoSha256 = "0534jykfnqs1gfnmijkpcf91ddpbggw7p25h4arci14lgd2wrmgd";
+ cargoSha256 = "1cxvx51zkmhszmgwsi0aj469xz98v5nk79zvqfyma27gsnh8jczr";
nativeBuildInputs = [ installShellFiles ];
@@ -23,7 +23,7 @@ rustPlatform.buildRustPackage rec {
postInstall = ''
# install shell completion files
- OUT_DIR=target/release/build/broot-*/out
+ OUT_DIR=$releaseDir/build/broot-*/out
installShellCompletion --bash $OUT_DIR/{br,broot}.bash
installShellCompletion --fish $OUT_DIR/{br,broot}.fish
diff --git a/nixpkgs/pkgs/tools/misc/brotab/default.nix b/nixpkgs/pkgs/tools/misc/brotab/default.nix
index 7e827f007eb..854958dc8a3 100644
--- a/nixpkgs/pkgs/tools/misc/brotab/default.nix
+++ b/nixpkgs/pkgs/tools/misc/brotab/default.nix
@@ -1,14 +1,14 @@
{ lib, fetchFromGitHub, glibcLocales, python }:
python.pkgs.buildPythonApplication rec {
- version = "1.2.1";
+ version = "1.2.2";
pname = "brotab";
src = fetchFromGitHub {
owner = "balta2ar";
repo = pname;
rev = version;
- sha256 = "14yz0szwzdjvwkw24rma34y6iiwnw9qzsm89gkglc0xxa6msg6j3";
+ sha256 = "1c6npyws705qf9rv70mmh7d0almmpxz87a0n65lhw08lms1h3dl2";
};
propagatedBuildInputs = with python.pkgs; [
diff --git a/nixpkgs/pkgs/tools/misc/chafa/default.nix b/nixpkgs/pkgs/tools/misc/chafa/default.nix
index e63ad0e42af..9e1671aec9d 100644
--- a/nixpkgs/pkgs/tools/misc/chafa/default.nix
+++ b/nixpkgs/pkgs/tools/misc/chafa/default.nix
@@ -2,14 +2,14 @@
stdenv.mkDerivation rec{
- version = "1.4.0";
+ version = "1.4.1";
pname = "chafa";
src = fetchFromGitHub {
owner = "hpjansson";
repo = "chafa";
rev = version;
- sha256 = "0vf658dd9sb2d3yh65c8nals9z0z7rykqqigmxq2h92x2ysjbg6x";
+ sha256 = "13vv2xmfh0dr949bh75448lidvzwxks6f1mjawdg1q8qwzxhzry4";
};
nativeBuildInputs = [ autoconf
diff --git a/nixpkgs/pkgs/tools/misc/chezmoi/default.nix b/nixpkgs/pkgs/tools/misc/chezmoi/default.nix
index beb7c41f906..75b10bc32ca 100644
--- a/nixpkgs/pkgs/tools/misc/chezmoi/default.nix
+++ b/nixpkgs/pkgs/tools/misc/chezmoi/default.nix
@@ -2,16 +2,16 @@
buildGoModule rec {
pname = "chezmoi";
- version = "1.7.18";
+ version = "1.8.1";
src = fetchFromGitHub {
owner = "twpayne";
repo = "chezmoi";
rev = "v${version}";
- sha256 = "12gx78cbs7abizlqhs7y2w6lwlk5d1hhvixj0ki8d1d5vdr747bc";
+ sha256 = "1b8y0wq3myhvjdnwl0i4x85iil7i7kmsjajvbw1a47afm83jkbaw";
};
- modSha256 = "15b3hik3nzb7xnd6806dqdb36v7z2a0wmvxbrfwvnbigd8zd2y0j";
+ vendorSha256 = "1za47n08iamhfl4ky928rixgadflmz86vnmnwbczd167bdndh5rq";
buildFlagsArray = [
"-ldflags=-s -w -X main.version=${version} -X main.builtBy=nixpkgs"
@@ -34,4 +34,4 @@ buildGoModule rec {
maintainers = with maintainers; [ jhillyerd ];
platforms = platforms.all;
};
-}
+} \ No newline at end of file
diff --git a/nixpkgs/pkgs/tools/misc/clipman/default.nix b/nixpkgs/pkgs/tools/misc/clipman/default.nix
index 15eeb8b7b86..5146e25da50 100644
--- a/nixpkgs/pkgs/tools/misc/clipman/default.nix
+++ b/nixpkgs/pkgs/tools/misc/clipman/default.nix
@@ -2,16 +2,16 @@
buildGoModule rec {
pname = "clipman";
- version = "1.4.0";
+ version = "1.5.2";
src = fetchFromGitHub {
owner = "yory8";
repo = pname;
rev = "v${version}";
- sha256 = "0d5w94cylrzhwyb4zfgidh6rr1h82dx5y7cxfa37wx5xxcjyyja1";
+ sha256 = "1lf5fbzplyc1mpdqgfwbrn8m5568vhjf48580fvvfgbhz6zcil8n";
};
- modSha256 = "1sim3x794kj3wdw0g432zbgh1cimdmmg1hjgynh9jgm3y8w9q7ij";
+ vendorSha256 = "18jw4z0lcrh00yjr3qdkgvlrpfwqbsm0ncz7fp1h72pzkh41byv7";
nativeBuildInputs = [ makeWrapper ];
@@ -27,4 +27,4 @@ buildGoModule rec {
description = "A simple clipboard manager for Wayland";
platforms = platforms.linux;
};
-}
+} \ No newline at end of file
diff --git a/nixpkgs/pkgs/tools/misc/colord-kde/default.nix b/nixpkgs/pkgs/tools/misc/colord-kde/default.nix
index 8897514783a..33686498112 100644
--- a/nixpkgs/pkgs/tools/misc/colord-kde/default.nix
+++ b/nixpkgs/pkgs/tools/misc/colord-kde/default.nix
@@ -1,11 +1,11 @@
-{ stdenv, lib, fetchurl
+{ mkDerivation, lib, fetchurl
, extra-cmake-modules, ki18n
, kconfig, kconfigwidgets, kcoreaddons, kdbusaddons, kiconthemes, kcmutils
, kio, knotifications, plasma-framework, kwidgetsaddons, kwindowsystem
, kitemviews, lcms2, libXrandr, qtx11extras
}:
-stdenv.mkDerivation rec {
+mkDerivation rec {
pname = "colord-kde";
version = "0.5.0";
diff --git a/nixpkgs/pkgs/tools/misc/datamash/default.nix b/nixpkgs/pkgs/tools/misc/datamash/default.nix
index f66f2b97d14..8e9782506fb 100644
--- a/nixpkgs/pkgs/tools/misc/datamash/default.nix
+++ b/nixpkgs/pkgs/tools/misc/datamash/default.nix
@@ -2,11 +2,11 @@
stdenv.mkDerivation rec {
pname = "datamash";
- version = "1.6";
+ version = "1.7";
src = fetchurl {
url = "mirror://gnu/${pname}/${pname}-${version}.tar.gz";
- sha256 = "1jvqxcyh0aghnqh3m2rk5av1x0038flcmfzd493vasv1k69vgfdr";
+ sha256 = "1cxdlhgz3wzjqlq8bgwad93fgqymk2abbldfzw1ffnhcp4mmjjjp";
};
meta = with stdenv.lib; {
diff --git a/nixpkgs/pkgs/tools/misc/diffoscope/default.nix b/nixpkgs/pkgs/tools/misc/diffoscope/default.nix
index 0ce0e1be325..39a137d3c0e 100644
--- a/nixpkgs/pkgs/tools/misc/diffoscope/default.nix
+++ b/nixpkgs/pkgs/tools/misc/diffoscope/default.nix
@@ -9,13 +9,15 @@
# Note: when upgrading this package, please run the list-missing-tools.sh script as described below!
python3Packages.buildPythonApplication rec {
pname = "diffoscope";
- version = "138";
+ version = "143";
src = fetchurl {
url = "https://diffoscope.org/archive/diffoscope-${version}.tar.bz2";
- sha256 = "171nz5n4dayr7bj04h0x282vdk92kp7lgarnb3x0md91m2i9x997";
+ sha256 = "09vvhzsxxgjvdnd48hdfz50i2svacdnwc2idirj4b27czi7c3czb";
};
+ outputs = [ "out" "man" ];
+
patches = [
./ignore_links.patch
];
diff --git a/nixpkgs/pkgs/tools/misc/direnv/default.nix b/nixpkgs/pkgs/tools/misc/direnv/default.nix
index 3c7e72f6d73..1b6b87984c6 100644
--- a/nixpkgs/pkgs/tools/misc/direnv/default.nix
+++ b/nixpkgs/pkgs/tools/misc/direnv/default.nix
@@ -1,31 +1,27 @@
-{ stdenv, fetchFromGitHub, buildGoPackage, bash }:
+{ stdenv, fetchFromGitHub, buildGoModule, bash }:
-buildGoPackage rec {
+buildGoModule rec {
pname = "direnv";
- version = "2.21.2";
- goPackagePath = "github.com/direnv/direnv";
+ version = "2.21.3";
+
+ vendorSha256 = null;
src = fetchFromGitHub {
owner = "direnv";
repo = "direnv";
rev = "v${version}";
- sha256 = "0afpxx8pwa1zb66l79af57drzjaazn2rp6306w4pxvqfh0zi2bri";
+ sha256 = "1adi6ld9g4zgz0f6q0kkzrywclqrmikyp7yh22zm9lfdvd5hs8wp";
};
- postConfigure = ''
- cd $NIX_BUILD_TOP/go/src/$goPackagePath
- '';
-
# we have no bash at the moment for windows
makeFlags = stdenv.lib.optional (!stdenv.hostPlatform.isWindows) [
"BASH_PATH=${bash}/bin/bash"
];
installPhase = ''
- mkdir -p $out
- make install DESTDIR=$bin
- mkdir -p $bin/share/fish/vendor_conf.d
- echo "eval ($bin/bin/direnv hook fish)" > $bin/share/fish/vendor_conf.d/direnv.fish
+ make install DESTDIR=$out
+ mkdir -p $out/share/fish/vendor_conf.d
+ echo "eval ($out/bin/direnv hook fish)" > $out/share/fish/vendor_conf.d/direnv.fish
'';
meta = with stdenv.lib; {
diff --git a/nixpkgs/pkgs/tools/misc/dmg2img/default.nix b/nixpkgs/pkgs/tools/misc/dmg2img/default.nix
index df084579b79..267983dd432 100644
--- a/nixpkgs/pkgs/tools/misc/dmg2img/default.nix
+++ b/nixpkgs/pkgs/tools/misc/dmg2img/default.nix
@@ -1,4 +1,4 @@
-{ stdenv, fetchurl, zlib, bzip2, openssl }:
+{ stdenv, fetchurl, zlib, bzip2, openssl, fetchpatch }:
stdenv.mkDerivation rec {
name = "dmg2img-1.6.7";
@@ -8,11 +8,20 @@ stdenv.mkDerivation rec {
sha256 = "066hqhg7k90xcw5aq86pgr4l7apzvnb4559vj5s010avbk8adbh2";
};
- buildInputs = [zlib bzip2 openssl];
+ buildInputs = [ zlib bzip2 openssl ];
+
+ patches = [
+ (fetchpatch {
+ url = "https://raw.githubusercontent.com/Homebrew/formula-patches/85fa66a9/dmg2img/openssl-1.1.diff";
+ sha256 = "076sz69hf3ryylplg025vl8sj991cb81g3yazsmrf8anrd7ffmxx";
+ })
+ ];
+
+ patchFlags = [ "-p0" ];
installPhase = ''
- mkdir -p $out/bin
- cp dmg2img $out/bin
+ install -D dmg2img $out/bin/dmg2img
+ install -D vfdecrypt $out/bin/vfdecrypt
'';
meta = {
diff --git a/nixpkgs/pkgs/tools/misc/docui/default.nix b/nixpkgs/pkgs/tools/misc/docui/default.nix
index 0329c1bc4a6..f3f89d0a667 100644
--- a/nixpkgs/pkgs/tools/misc/docui/default.nix
+++ b/nixpkgs/pkgs/tools/misc/docui/default.nix
@@ -11,7 +11,7 @@ buildGoModule rec {
sha256 = "0jya0wdp8scjmsr44krdbbb8q4gplf44gsng1nyn12a6ldqzayxl";
};
- modSha256 = "1wyx05kk4f41mgvwnvfc9xk7vd3x96cbn5xb5ph7p443f70ydnak";
+ vendorSha256 = "1ggdczvv03lj0g6cq26vrk1rba6pk0805n85w9hkbjx9c4r3j577";
meta = with stdenv.lib; {
description = "TUI Client for Docker";
@@ -20,4 +20,4 @@ buildGoModule rec {
platforms = platforms.linux ++ platforms.darwin;
maintainers = with maintainers; [ aethelz ];
};
-}
+} \ No newline at end of file
diff --git a/nixpkgs/pkgs/tools/misc/dua/default.nix b/nixpkgs/pkgs/tools/misc/dua/default.nix
index 2dea0f179a1..cb000b29472 100644
--- a/nixpkgs/pkgs/tools/misc/dua/default.nix
+++ b/nixpkgs/pkgs/tools/misc/dua/default.nix
@@ -2,13 +2,13 @@
rustPlatform.buildRustPackage rec {
pname = "dua";
- version = "2.5.0";
+ version = "2.6.0";
src = fetchFromGitHub {
owner = "Byron";
repo = "dua-cli";
rev = "v${version}";
- sha256 = "1r94fcygp9mmg457dkksx3mjdxfddzfzl6n0rmxasiinsz0hak4c";
+ sha256 = "1697z9j0xd4il01bcvz1xwzkcg5mbkpp207mshb9csdhwi9a50wg";
# Remove unicode file names which leads to different checksums on HFS+
# vs. other filesystems because of unicode normalisation.
extraPostFetch = ''
@@ -16,7 +16,7 @@ rustPlatform.buildRustPackage rec {
'';
};
- cargoSha256 = "15a4hari3my59xvmkll2jlvb1jyf8gg8alp91nvh3bagpajpvdx6";
+ cargoSha256 = "1rczq41jpds7kfyf31nxj4v8rk9rccijjixpznhlriam6xhgm90b";
doCheck = false;
diff --git a/nixpkgs/pkgs/tools/misc/dvtm/dvtm.nix b/nixpkgs/pkgs/tools/misc/dvtm/dvtm.nix
index 61af9fac177..5bb8efb5540 100644
--- a/nixpkgs/pkgs/tools/misc/dvtm/dvtm.nix
+++ b/nixpkgs/pkgs/tools/misc/dvtm/dvtm.nix
@@ -9,6 +9,7 @@ stdenv.mkDerivation {
cp ${builtins.toFile "config.h" customConfig} ./config.h
'';
+ nativeBuildInputs = [ ncurses ];
buildInputs = [ ncurses ];
prePatch = ''
@@ -16,9 +17,7 @@ stdenv.mkDerivation {
--replace /usr/share/terminfo $out/share/terminfo
'';
- installPhase = ''
- make PREFIX=$out install
- '';
+ makeFlags = [ "PREFIX=$(out)" ];
meta = with stdenv.lib; {
description = "Dynamic virtual terminal manager";
diff --git a/nixpkgs/pkgs/tools/misc/entr/default.nix b/nixpkgs/pkgs/tools/misc/entr/default.nix
index aeb88d0c68b..be8134a92a3 100644
--- a/nixpkgs/pkgs/tools/misc/entr/default.nix
+++ b/nixpkgs/pkgs/tools/misc/entr/default.nix
@@ -2,11 +2,11 @@
stdenv.mkDerivation rec {
pname = "entr";
- version = "4.4";
+ version = "4.5";
src = fetchurl {
url = "http://entrproject.org/code/${pname}-${version}.tar.gz";
- sha256 = "1x2hyc8vc5dz6k7b3291vxz36wllhinvqrb0d8zx9bv0ydj6qmjl";
+ sha256 = "08gsd99w20fdi0apppmzsh06z29ga8y89nfcizidil2hkl8b7jyn";
};
postPatch = ''
diff --git a/nixpkgs/pkgs/tools/misc/etcher/default.nix b/nixpkgs/pkgs/tools/misc/etcher/default.nix
index 4944600108a..0d2029fa314 100644
--- a/nixpkgs/pkgs/tools/misc/etcher/default.nix
+++ b/nixpkgs/pkgs/tools/misc/etcher/default.nix
@@ -1,25 +1,19 @@
-{ lib
-, stdenv
+{ stdenv
, fetchurl
, gcc-unwrapped
, dpkg
, polkit
+, utillinux
, bash
, nodePackages
-, electron_3
-, gtk3
-, wrapGAppsHook
+, makeWrapper
+, electron_7
}:
let
- libPath = lib.makeLibraryPath [
- # for libstdc++.so.6
- gcc-unwrapped.lib
- ];
-
sha256 = {
- "x86_64-linux" = "0zb9j34dz7ybjix018bm8g0b6kilw9300q4ahcm22p0ggg528dh7";
- "i686-linux" = "0wsv4mvwrvsaz1pwiqs94b3854h5l8ff2dbb1ybxmvwjbfrkdcqc";
+ "x86_64-linux" = "1yvqi86bw0kym401zwknhwq9041fxg047sbj3aydnfcqf11vrrmk";
+ "i686-linux" = "12lghzhsl16h3jvzm3vw4hrly32fz99z6rdmybl8viralrxy8mb8";
}."${stdenv.system}";
arch = {
@@ -27,26 +21,22 @@ let
"i686-linux" = "i386";
}."${stdenv.system}";
-in stdenv.mkDerivation rec {
+in
+
+stdenv.mkDerivation rec {
pname = "etcher";
- version = "1.5.60";
+ version = "1.5.86";
src = fetchurl {
url = "https://github.com/balena-io/etcher/releases/download/v${version}/balena-etcher-electron_${version}_${arch}.deb";
inherit sha256;
};
- buildInputs = [
- gtk3
- ];
-
- nativeBuildInputs = [
- wrapGAppsHook
- ];
-
dontBuild = true;
dontConfigure = true;
+ nativeBuildInputs = [ makeWrapper ];
+
unpackPhase = ''
${dpkg}/bin/dpkg-deb -x $src .
'';
@@ -55,33 +45,33 @@ in stdenv.mkDerivation rec {
# along with some other paths
patchPhase = ''
${nodePackages.asar}/bin/asar extract opt/balenaEtcher/resources/app.asar tmp
- # Use Nix(OS) paths
+ # use Nix(OS) paths
sed -i "s|/usr/bin/pkexec|/usr/bin/pkexec', '/run/wrappers/bin/pkexec|" tmp/node_modules/sudo-prompt/index.js
sed -i 's|/bin/bash|${bash}/bin/bash|' tmp/node_modules/sudo-prompt/index.js
- sed -i "s|process.resourcesPath|'$out/opt/balenaEtcher/resources/'|" tmp/generated/gui.js
+ sed -i "s|'lsblk'|'${utillinux}/bin/lsblk'|" tmp/node_modules/drivelist/js/lsblk/index.js
+ sed -i "s|process.resourcesPath|'$out/share/${pname}/resources/'|" tmp/generated/gui.js
${nodePackages.asar}/bin/asar pack tmp opt/balenaEtcher/resources/app.asar
rm -rf tmp
- # Fix up .desktop file
- substituteInPlace usr/share/applications/balena-etcher-electron.desktop \
- --replace "/opt/balenaEtcher/balena-etcher-electron" "$out/bin/balena-etcher-electron"
'';
installPhase = ''
- mkdir -p $out/bin
- cp -r opt $out/
- cp -r usr/share $out/
+ runHook preInstall
+
+ mkdir -p $out/bin $out/share/${pname}
+
+ cp -a usr/share/* $out/share
+ cp -a opt/balenaEtcher/{locales,resources} $out/share/${pname}
- # We'll use our Nixpkgs electron_3 instead
- rm $out/opt/balenaEtcher/balena-etcher-electron
+ substituteInPlace $out/share/applications/balena-etcher-electron.desktop \
+ --replace 'Exec=/opt/balenaEtcher/balena-etcher-electron' 'Exec=${pname}'
- ln -s ${electron_3}/bin/electron $out/bin/balena-etcher-electron
+ runHook postInstall
'';
- preFixup = ''
- gappsWrapperArgs+=(
- --add-flags $out/opt/balenaEtcher/resources/app.asar
- --prefix LD_LIBRARY_PATH : ${libPath}
- )
+ postFixup = ''
+ makeWrapper ${electron_7}/bin/electron $out/bin/${pname} \
+ --add-flags $out/share/${pname}/resources/app.asar \
+ --prefix LD_LIBRARY_PATH : "${stdenv.lib.makeLibraryPath [ gcc-unwrapped.lib ]}"
'';
meta = with stdenv.lib; {
diff --git a/nixpkgs/pkgs/tools/misc/fd/default.nix b/nixpkgs/pkgs/tools/misc/fd/default.nix
index 5cc1c12f64c..ab94a8aa6b5 100644
--- a/nixpkgs/pkgs/tools/misc/fd/default.nix
+++ b/nixpkgs/pkgs/tools/misc/fd/default.nix
@@ -18,9 +18,8 @@ rustPlatform.buildRustPackage rec {
preFixup = ''
installManPage "$src/doc/fd.1"
- (cd target/release/build/fd-find-*/out
- installShellCompletion fd.{bash,fish}
- installShellCompletion --zsh _fd)
+ installShellCompletion $releaseDir/build/fd-find-*/out/fd.{bash,fish}
+ installShellCompletion --zsh $releaseDir/build/fd-find-*/out/_fd
'';
meta = with lib; {
diff --git a/nixpkgs/pkgs/tools/misc/ffsend/default.nix b/nixpkgs/pkgs/tools/misc/ffsend/default.nix
index 62c2aa36dc1..fc4c44e01cd 100644
--- a/nixpkgs/pkgs/tools/misc/ffsend/default.nix
+++ b/nixpkgs/pkgs/tools/misc/ffsend/default.nix
@@ -16,16 +16,16 @@ with rustPlatform;
buildRustPackage rec {
pname = "ffsend";
- version = "0.2.59";
+ version = "0.2.61";
src = fetchFromGitLab {
owner = "timvisee";
repo = "ffsend";
rev = "v${version}";
- sha256 = "14a7mb1a1s74hi124v4jscc72m09zq2bd8xrhq5agz9z27plqm2c";
+ sha256 = "1d0rx5gcp9z06kxjknqa1r2b4m5c4vrhp4a9spkawvgiky5a9x07";
};
- cargoSha256 = "1945s3ajpy55fzh5wbl7fchqck0fh69shl18lxni9hvg04smq39i";
+ cargoSha256 = "1bmyhg1y4gz719nsfdfjf4y73f9l6aag17dx9iazfzwnwwaq46m9";
nativeBuildInputs = [ cmake pkgconfig installShellFiles ];
buildInputs = [ openssl ]
diff --git a/nixpkgs/pkgs/tools/misc/figlet/default.nix b/nixpkgs/pkgs/tools/misc/figlet/default.nix
index 7f7fc6f4e08..90fb0981fbd 100644
--- a/nixpkgs/pkgs/tools/misc/figlet/default.nix
+++ b/nixpkgs/pkgs/tools/misc/figlet/default.nix
@@ -11,7 +11,7 @@ stdenv.mkDerivation {
patches = [
(fetchpatch {
- url = "https://git.alpinelinux.org/cgit/aports/plain/main/figlet/musl-fix-cplusplus-decls.patch?h=3.4-stable&id=71776c73a6f04b6f671430f702bcd40b29d48399";
+ url = "https://git.alpinelinux.org/aports/plain/main/figlet/musl-fix-cplusplus-decls.patch?h=3.4-stable&id=71776c73a6f04b6f671430f702bcd40b29d48399";
name = "musl-fix-cplusplus-decls.patch";
sha256 = "1720zgrfk9makznqkbjrnlxm7nnhk6zx7g458fv53337n3g3zn7j";
})
diff --git a/nixpkgs/pkgs/tools/misc/fluent-bit/default.nix b/nixpkgs/pkgs/tools/misc/fluent-bit/default.nix
index 0933e6eae90..38f2145df44 100644
--- a/nixpkgs/pkgs/tools/misc/fluent-bit/default.nix
+++ b/nixpkgs/pkgs/tools/misc/fluent-bit/default.nix
@@ -2,13 +2,13 @@
stdenv.mkDerivation rec {
pname = "fluent-bit";
- version = "1.4.1";
+ version = "1.4.3";
src = fetchFromGitHub {
owner = "fluent";
repo = "fluent-bit";
rev = "v${version}";
- sha256 = "1xfbghaylzsh48ag4aw77nmzm1cds4nx53m4s1fiy0r31sm8vqwl";
+ sha256 = "1x5izsm0b3514i2vl1b3x40chjlzidr5zssn5cpgrw9a8w4jpv6h";
};
nativeBuildInputs = [ cmake flex bison ];
diff --git a/nixpkgs/pkgs/tools/misc/fselect/default.nix b/nixpkgs/pkgs/tools/misc/fselect/default.nix
index e508eb02ad0..d979e1e1a00 100644
--- a/nixpkgs/pkgs/tools/misc/fselect/default.nix
+++ b/nixpkgs/pkgs/tools/misc/fselect/default.nix
@@ -2,16 +2,16 @@
rustPlatform.buildRustPackage rec {
pname = "fselect";
- version = "0.6.9";
+ version = "0.6.10";
src = fetchFromGitHub {
owner = "jhspetersson";
repo = "fselect";
rev = version;
- sha256 = "0cgzvzdsy8vbiapgk1l5dp48c3kq0xmx53yfi486mx8nwvz3ksc0";
+ sha256 = "17dz0qj2981plvzp72yisyrjnyz1sy3pqyvhx76ws2754vjgq4ra";
};
- cargoSha256 = "0mjd9nmaggsszf0kx68yrvy3fqbn35v34c7q3584fv50ipqn6drb";
+ cargoSha256 = "19b05gx717xjg4arn4zgrqh7ckzgzx0ygg9gkfzsg7phz7f01626";
nativeBuildInputs = [ installShellFiles ];
diff --git a/nixpkgs/pkgs/tools/misc/fzf/default.nix b/nixpkgs/pkgs/tools/misc/fzf/default.nix
index d5c75a1e8a7..e875dd77b02 100644
--- a/nixpkgs/pkgs/tools/misc/fzf/default.nix
+++ b/nixpkgs/pkgs/tools/misc/fzf/default.nix
@@ -11,7 +11,7 @@ buildGoModule rec {
sha256 = "0piz1dzczcw1nsff775zicvpm6iy0iw0v0ba7rj7i0xqv9ni1prw";
};
- modSha256 = "16bb0a9z49jqhh9lmq8rvl7x9vh79mi4ygkb9sm04g41g5z6ag1s";
+ vendorSha256 = "1c2iz28hjrw9rig9a6r27wd8clycdhi8fgs3da91c63w4qi140zm";
outputs = [ "out" "man" ];
@@ -63,4 +63,4 @@ buildGoModule rec {
maintainers = with maintainers; [ filalex77 ma27 ];
platforms = platforms.unix;
};
-}
+} \ No newline at end of file
diff --git a/nixpkgs/pkgs/tools/misc/gnokii/default.nix b/nixpkgs/pkgs/tools/misc/gnokii/default.nix
index c0e516a15ad..25c31666191 100644
--- a/nixpkgs/pkgs/tools/misc/gnokii/default.nix
+++ b/nixpkgs/pkgs/tools/misc/gnokii/default.nix
@@ -1,4 +1,4 @@
-{ stdenv, fetchurl, intltool, perl, gettext, libusb, pkgconfig, bluez
+{ stdenv, fetchurl, intltool, perl, gettext, libusb-compat-0_1, pkgconfig, bluez
, readline, pcsclite, libical, gtk2, glib, libXpm }:
stdenv.mkDerivation rec {
@@ -11,7 +11,7 @@ stdenv.mkDerivation rec {
};
buildInputs = [
- perl intltool gettext libusb
+ perl intltool gettext libusb-compat-0_1
glib gtk2 pkgconfig bluez readline
libXpm pcsclite libical
];
diff --git a/nixpkgs/pkgs/tools/misc/gotify-cli/default.nix b/nixpkgs/pkgs/tools/misc/gotify-cli/default.nix
index d4daa64facb..cd50271a2e6 100644
--- a/nixpkgs/pkgs/tools/misc/gotify-cli/default.nix
+++ b/nixpkgs/pkgs/tools/misc/gotify-cli/default.nix
@@ -11,7 +11,7 @@ buildGoModule rec {
sha256 = "131gs6xzfggnrzq5jgyky23zvcmhx3q3hd17xvqxd02s2i9x1mg4";
};
- modSha256 = "1lrsg33zd7m24za2gv407hz02n3lmz9qljfk82whlj44hx7kim1z";
+ vendorSha256 = "1lhhsf944gm1p6qxn05g2s3hdnra5dggj7pdrdq6qr6r2xg7f5qh";
postInstall = ''
mv $out/bin/cli $out/bin/gotify
@@ -23,4 +23,4 @@ buildGoModule rec {
description = "A command line interface for pushing messages to gotify/server.";
maintainers = with maintainers; [ ma27 ];
};
-}
+} \ No newline at end of file
diff --git a/nixpkgs/pkgs/tools/misc/grub/2.0x.nix b/nixpkgs/pkgs/tools/misc/grub/2.0x.nix
index a64df866981..4e00a4ddd49 100644
--- a/nixpkgs/pkgs/tools/misc/grub/2.0x.nix
+++ b/nixpkgs/pkgs/tools/misc/grub/2.0x.nix
@@ -1,5 +1,5 @@
{ stdenv, fetchgit, flex, bison, python, autoconf, automake, gnulib, libtool
-, gettext, ncurses, libusb, freetype, qemu, lvm2, unifont, pkgconfig
+, gettext, ncurses, libusb-compat-0_1, freetype, qemu, lvm2, unifont, pkgconfig
, fuse # only needed for grub-mount
, zfs ? null
, efiSupport ? false
@@ -54,7 +54,7 @@ stdenv.mkDerivation rec {
];
nativeBuildInputs = [ bison flex python pkgconfig autoconf automake ];
- buildInputs = [ ncurses libusb freetype gettext lvm2 fuse libtool ]
+ buildInputs = [ ncurses libusb-compat-0_1 freetype gettext lvm2 fuse libtool ]
++ optional doCheck qemu
++ optional zfsSupport zfs;
diff --git a/nixpkgs/pkgs/tools/misc/grub/trusted.nix b/nixpkgs/pkgs/tools/misc/grub/trusted.nix
index 27676c4745b..f14758a3ae7 100644
--- a/nixpkgs/pkgs/tools/misc/grub/trusted.nix
+++ b/nixpkgs/pkgs/tools/misc/grub/trusted.nix
@@ -1,5 +1,5 @@
{ stdenv, fetchurl, fetchgit, autogen, flex, bison, python, autoconf, automake
-, gettext, ncurses, libusb, freetype, qemu, lvm2
+, gettext, ncurses, libusb-compat-0_1, freetype, qemu, lvm2
, for_HP_laptop ? false
}:
@@ -45,7 +45,7 @@ stdenv.mkDerivation rec {
};
nativeBuildInputs = [ autogen flex bison python autoconf automake ];
- buildInputs = [ ncurses libusb freetype gettext lvm2 ]
+ buildInputs = [ ncurses libusb-compat-0_1 freetype gettext lvm2 ]
++ optional doCheck qemu;
hardeningDisable = [ "stackprotector" "pic" ];
diff --git a/nixpkgs/pkgs/tools/misc/heatseeker/default.nix b/nixpkgs/pkgs/tools/misc/heatseeker/default.nix
index 22a7d8ec4a7..e0b8c02a08e 100644
--- a/nixpkgs/pkgs/tools/misc/heatseeker/default.nix
+++ b/nixpkgs/pkgs/tools/misc/heatseeker/default.nix
@@ -1,4 +1,4 @@
-{ stdenv, fetchFromGitHub, rustPlatform }:
+{ stdenv, fetchFromGitHub, rustPlatform, coreutils }:
rustPlatform.buildRustPackage rec {
pname = "heatseeker";
@@ -13,6 +13,13 @@ rustPlatform.buildRustPackage rec {
cargoSha256 = "0jnlcm7v29m4nc318qgf7r7jvs80s7n04fw83imm506vwr9rxbx9";
+ # https://github.com/rschmitt/heatseeker/issues/42
+ # I've suggested using `/usr/bin/env stty`, but doing that isn't quite as simple
+ # as a substitution, and this works since we have the path to coreutils stty.
+ patchPhase = ''
+ substituteInPlace src/screen/unix.rs --replace "/bin/stty" "${coreutils}/bin/stty"
+ '';
+
# some tests require a tty, this variable turns them off for Travis CI,
# which we can also make use of
TRAVIS = "true";
diff --git a/nixpkgs/pkgs/tools/misc/hpcg/default.nix b/nixpkgs/pkgs/tools/misc/hpcg/default.nix
new file mode 100644
index 00000000000..6274178c266
--- /dev/null
+++ b/nixpkgs/pkgs/tools/misc/hpcg/default.nix
@@ -0,0 +1,35 @@
+{ stdenv, fetchurl, openmpi } :
+
+stdenv.mkDerivation rec {
+ pname = "hpcg";
+ version = "3.1";
+
+ src = fetchurl {
+ url = "http://www.hpcg-benchmark.org/downloads/${pname}-${version}.tar.gz";
+ sha256 = "197lw2nwmzsmfsbvgvi8z7kj69n374kgfzzp8pkmk7mp2vkk991k";
+ };
+
+ dontConfigure = true;
+
+ enableParallelBuilding = true;
+
+ buildInputs = [ openmpi ];
+
+ makeFlags = [ "arch=Linux_MPI" ];
+
+ installPhase = ''
+ mkdir -p $out/bin $out/share/hpcg
+
+ cp bin/xhpcg $out/bin
+ cp bin/hpcg.dat $out/share/hpcg
+ '';
+
+ meta = with stdenv.lib; {
+ description = "HPC conjugate gradient benchmark";
+ homepage = "https://www.hpcg-benchmark.org";
+ platforms = platforms.linux;
+ license = licenses.bsd3;
+ maintainers = [ maintainers.markuskowa ];
+ };
+}
+
diff --git a/nixpkgs/pkgs/tools/misc/hpl/default.nix b/nixpkgs/pkgs/tools/misc/hpl/default.nix
index 6cacbaf0b84..d688f3adf30 100644
--- a/nixpkgs/pkgs/tools/misc/hpl/default.nix
+++ b/nixpkgs/pkgs/tools/misc/hpl/default.nix
@@ -1,4 +1,6 @@
-{ stdenv, fetchurl, openblasCompat, mpi } :
+{ stdenv, fetchurl, blas, lapack, mpi } :
+
+assert (!blas.isILP64) && (!lapack.isILP64);
stdenv.mkDerivation rec {
pname = "hpl";
@@ -18,7 +20,7 @@ stdenv.mkDerivation rec {
install -D testing/ptest/HPL.dat $out/share/hpl/HPL.dat
'';
- buildInputs = [ openblasCompat mpi ];
+ buildInputs = [ blas lapack mpi ];
meta = with stdenv.lib; {
description = "Portable Implementation of the Linpack Benchmark for Distributed-Memory Computers";
@@ -28,4 +30,3 @@ stdenv.mkDerivation rec {
maintainers = [ maintainers.markuskowa ];
};
}
-
diff --git a/nixpkgs/pkgs/tools/misc/html-proofer/Gemfile.lock b/nixpkgs/pkgs/tools/misc/html-proofer/Gemfile.lock
index c3ff0fd210f..0ba32818d21 100644
--- a/nixpkgs/pkgs/tools/misc/html-proofer/Gemfile.lock
+++ b/nixpkgs/pkgs/tools/misc/html-proofer/Gemfile.lock
@@ -6,7 +6,7 @@ GEM
ethon (0.12.0)
ffi (>= 1.3.0)
ffi (1.12.2)
- html-proofer (3.15.2)
+ html-proofer (3.15.3)
addressable (~> 2.3)
mercenary (~> 0.3)
nokogumbo (~> 2.0)
@@ -21,7 +21,7 @@ GEM
nokogumbo (2.0.2)
nokogiri (~> 1.8, >= 1.8.4)
parallel (1.19.1)
- public_suffix (4.0.3)
+ public_suffix (4.0.4)
rainbow (3.0.0)
typhoeus (1.3.1)
ethon (>= 0.9.0)
diff --git a/nixpkgs/pkgs/tools/misc/html-proofer/gemset.nix b/nixpkgs/pkgs/tools/misc/html-proofer/gemset.nix
index 2e3b3a10b3b..c5836bc74ba 100644
--- a/nixpkgs/pkgs/tools/misc/html-proofer/gemset.nix
+++ b/nixpkgs/pkgs/tools/misc/html-proofer/gemset.nix
@@ -37,10 +37,10 @@
platforms = [];
source = {
remotes = ["https://rubygems.org"];
- sha256 = "1b7wx2hnwnml3y10x6yxybl3hy973n2ifq3hbqh0jd72bqs615wp";
+ sha256 = "18afz6rz72j8hnfgzhyr21wh1rfy1x41iyhbcgaq0r1bd7ng1vni";
type = "gem";
};
- version = "3.15.2";
+ version = "3.15.3";
};
mercenary = {
groups = ["default"];
@@ -99,10 +99,10 @@
platforms = [];
source = {
remotes = ["https://rubygems.org"];
- sha256 = "1c6kq6s13idl2036b5lch8r7390f8w82cal8hcp4ml76fm2vdac7";
+ sha256 = "1l1kqw75asziwmzrig8rywxswxz8l91sc3pvns02ffsqac1a3wiz";
type = "gem";
};
- version = "4.0.3";
+ version = "4.0.4";
};
rainbow = {
groups = ["default"];
diff --git a/nixpkgs/pkgs/tools/misc/ili2c/default.nix b/nixpkgs/pkgs/tools/misc/ili2c/default.nix
index 4d78f797f10..43eed8367c4 100644
--- a/nixpkgs/pkgs/tools/misc/ili2c/default.nix
+++ b/nixpkgs/pkgs/tools/misc/ili2c/default.nix
@@ -2,7 +2,7 @@
stdenv.mkDerivation rec {
pname = "ili2c";
- version = "5.0.0";
+ version = "5.0.8";
nativeBuildInputs = [ ant jdk makeWrapper ];
@@ -10,7 +10,7 @@ stdenv.mkDerivation rec {
owner = "claeis";
repo = pname;
rev = "${pname}-${version}";
- sha256 = "0xps2343d5gdr2aj8j3l4cjq4k9zbxxlhnp8sjlhxh1wdczxlwx6";
+ sha256 = "1yhsyh940kb33y2n6xl7zhf0f6q0nrxbyg6c4g5n2imllpn54sgi";
};
buildPhase = "ant jar";
diff --git a/nixpkgs/pkgs/tools/misc/intermodal/default.nix b/nixpkgs/pkgs/tools/misc/intermodal/default.nix
new file mode 100644
index 00000000000..8a2412f86ef
--- /dev/null
+++ b/nixpkgs/pkgs/tools/misc/intermodal/default.nix
@@ -0,0 +1,25 @@
+{ stdenv, rustPlatform, fetchFromGitHub }:
+
+rustPlatform.buildRustPackage rec {
+ pname = "intermodal";
+ version = "0.1.7";
+
+ src = fetchFromGitHub {
+ owner = "casey";
+ repo = pname;
+ rev = "v${version}";
+ sha256 = "05wjzx1ibd7cyl5lgmmn5y8dhsk71wz2bnimbmq7z51ds6cbyw5i";
+ };
+
+ cargoSha256 = "04xqk1mmbrz8bjn36nxabwla3y62wfdly5bckkya6y2dhf1vkdjq";
+
+ # include_hidden test tries to use `chflags` on darwin
+ checkFlagsArray = stdenv.lib.optionals stdenv.isDarwin [ "--skip=subcommand::torrent::create::tests::include_hidden" ];
+
+ meta = with stdenv.lib; {
+ description = "User-friendly and featureful command-line BitTorrent metainfo utility";
+ homepage = "https://github.com/casey/intermodal";
+ license = licenses.cc0;
+ maintainers = with maintainers; [ filalex77 ];
+ };
+}
diff --git a/nixpkgs/pkgs/tools/misc/jdupes/default.nix b/nixpkgs/pkgs/tools/misc/jdupes/default.nix
index 109a84de631..2898cfb6798 100644
--- a/nixpkgs/pkgs/tools/misc/jdupes/default.nix
+++ b/nixpkgs/pkgs/tools/misc/jdupes/default.nix
@@ -15,8 +15,11 @@ stdenv.mkDerivation rec {
extraPostFetch = "rm -r $out/testdir";
};
+ dontConfigure = true;
+
makeFlags = [
"PREFIX=${placeholder "out"}"
+ "HARDEN=1"
] ++ stdenv.lib.optionals stdenv.isLinux [
"ENABLE_DEDUPE=1"
"STATIC_DEDUPE_H=1"
@@ -27,7 +30,7 @@ stdenv.mkDerivation rec {
doCheck = false; # broken Makefile, the above also removes tests
postInstall = ''
- install -Dm644 -t $out/share/doc/jdupes CHANGES LICENSE README.md
+ install -Dm444 -t $out/share/doc/jdupes CHANGES LICENSE README.md
'';
meta = with stdenv.lib; {
@@ -40,6 +43,5 @@ stdenv.mkDerivation rec {
homepage = "https://github.com/jbruchon/jdupes";
license = licenses.mit;
maintainers = with maintainers; [ romildo ];
- platforms = platforms.all;
};
}
diff --git a/nixpkgs/pkgs/tools/misc/jugglinglab/default.nix b/nixpkgs/pkgs/tools/misc/jugglinglab/default.nix
new file mode 100644
index 00000000000..32c45b31a17
--- /dev/null
+++ b/nixpkgs/pkgs/tools/misc/jugglinglab/default.nix
@@ -0,0 +1,30 @@
+{ stdenv, fetchFromGitHub, jre, makeWrapper, ant, jdk }:
+stdenv.mkDerivation rec {
+ version = "1.2.1";
+ name = "jugglinglab";
+ src = fetchFromGitHub {
+ owner = "jkboyce";
+ repo = "jugglinglab";
+ rev = "1908012682d8c39a9b92248a20f285455104c510"; # v1.2.1 does not have a tag on Github
+ sha256 = "0dvcyjwynvapqbjchrln59vdskrm3w6kh0knxcn4bx61vcz3171z";
+ };
+ buildInputs = [ jre ];
+ nativeBuildInputs = [ ant jdk makeWrapper ];
+ buildPhase = "ant";
+
+ installPhase = ''
+ mkdir -p "$out/bin"
+ mkdir -p "$out/lib"
+ cp bin/JugglingLab.jar $out/lib/
+
+ makeWrapper ${jre}/bin/java $out/bin/jugglinglab \
+ --add-flags "-jar $out/lib/JugglingLab.jar"
+ '';
+
+ meta = with stdenv.lib; {
+ description = "A program to visualize different juggling pattens";
+ license = licenses.gpl2;
+ maintainers = with maintainers; [ wnklmnn ];
+ platforms = platforms.all;
+ };
+} \ No newline at end of file
diff --git a/nixpkgs/pkgs/tools/misc/kak-lsp/default.nix b/nixpkgs/pkgs/tools/misc/kak-lsp/default.nix
index 3048b4c9396..2f63eaf4380 100644
--- a/nixpkgs/pkgs/tools/misc/kak-lsp/default.nix
+++ b/nixpkgs/pkgs/tools/misc/kak-lsp/default.nix
@@ -2,16 +2,16 @@
rustPlatform.buildRustPackage rec {
pname = "kak-lsp";
- version = "7.0.0";
+ version = "8.0.0";
src = fetchFromGitHub {
owner = "ul";
repo = pname;
rev = "v${version}";
- sha256 = "1b9v417g0z9q1sqgnms5vy740xggg4fcz0fdwbc4hfvfj6jkyaad";
+ sha256 = "0nka51szivwhlfkimjiyzj67nxh75m784c28ass6ihlfax631w9m";
};
- cargoSha256 = "1cmms8kvh24sjb0w77i1bwl09wkx3x65p49pkg1j0lipwic3apm3";
+ cargoSha256 = "174qy50m9487vv151vm8q6sby79dq3gbqjbz6h4326jwsc9wwi8c";
buildInputs = lib.optional stdenv.isDarwin [ darwin.apple_sdk.frameworks.Security ];
diff --git a/nixpkgs/pkgs/tools/misc/kepubify/default.nix b/nixpkgs/pkgs/tools/misc/kepubify/default.nix
index 0a8f10fa85d..46d75e5086e 100644
--- a/nixpkgs/pkgs/tools/misc/kepubify/default.nix
+++ b/nixpkgs/pkgs/tools/misc/kepubify/default.nix
@@ -11,7 +11,7 @@ buildGoModule rec {
sha256 = "13d3fl53v9pqlm555ly1dm9vc58xwkyik0qmsg173q78ysy2p4q5";
};
- modSha256 = "0jz8v4rnwm5zbxxp49kv96wm4lack6prwyhcrqwsrm79dr9yjcxf";
+ vendorSha256 = "04qpxl4j6v6w25i7r6wghd9xi7jzpy7dynhs9ni35wflq0rlczax";
buildFlagsArray = [ "-ldflags=-s -w -X main.version=${version}" ];
@@ -23,4 +23,4 @@ buildGoModule rec {
license = licenses.mit;
maintainers = with maintainers; [ zowoq ];
};
-}
+} \ No newline at end of file
diff --git a/nixpkgs/pkgs/tools/misc/lf/default.nix b/nixpkgs/pkgs/tools/misc/lf/default.nix
index b1edabad684..8627003db5f 100644
--- a/nixpkgs/pkgs/tools/misc/lf/default.nix
+++ b/nixpkgs/pkgs/tools/misc/lf/default.nix
@@ -11,7 +11,7 @@ buildGoModule rec {
sha256 = "0kl9yrgph1i0jbxhlg3k0411436w80xw1s8dzd7v7h2raygkb4is";
};
- modSha256 = "1c6c6qg8yrhdhqsnqj3jw3x2hi8vrhfm47cp9xlkfnjfrz3nk6jp";
+ vendorSha256 = "1zb2z3c2w4gnq9cjczg1y7r7jg4mlrm2hsb12dqd9w8mh44rvr37";
nativeBuildInputs = [ installShellFiles ];
@@ -47,4 +47,4 @@ buildGoModule rec {
platforms = platforms.unix;
maintainers = with maintainers; [ primeos ];
};
-}
+} \ No newline at end of file
diff --git a/nixpkgs/pkgs/tools/misc/libgen-cli/default.nix b/nixpkgs/pkgs/tools/misc/libgen-cli/default.nix
index c34e934fba4..c92b4ad42e1 100644
--- a/nixpkgs/pkgs/tools/misc/libgen-cli/default.nix
+++ b/nixpkgs/pkgs/tools/misc/libgen-cli/default.nix
@@ -10,7 +10,7 @@ buildGoModule rec {
sha256 = "1lfsnyzin2dqhwhz6phms6yipli88sqiw55ls18dfv7bvx30sqlp";
};
- modSha256 = "1k16zjb7p65g72hr9vsk38jhpsy1yclm7fjgq47qy6jwjd44w1bi";
+ vendorSha256 = "1j45h8p13xfz0qy1nrddlx1xzbr5vqxd3q76hbb0v60636izfk0r";
subPackages = [ "." ];
@@ -27,4 +27,4 @@ buildGoModule rec {
platforms = platforms.all;
maintainers = with maintainers; [ zaninime ];
};
-}
+} \ No newline at end of file
diff --git a/nixpkgs/pkgs/tools/misc/lsd/default.nix b/nixpkgs/pkgs/tools/misc/lsd/default.nix
index 6291ad013ea..73dcbd3bc3c 100644
--- a/nixpkgs/pkgs/tools/misc/lsd/default.nix
+++ b/nixpkgs/pkgs/tools/misc/lsd/default.nix
@@ -19,7 +19,7 @@ rustPlatform.buildRustPackage rec {
nativeBuildInputs = [ installShellFiles ];
postInstall = ''
- installShellCompletion target/release/build/lsd-*/out/{_lsd,lsd.{bash,fish}}
+ installShellCompletion $releaseDir/build/lsd-*/out/{_lsd,lsd.{bash,fish}}
'';
meta = with stdenv.lib; {
diff --git a/nixpkgs/pkgs/tools/misc/mcrypt/default.nix b/nixpkgs/pkgs/tools/misc/mcrypt/default.nix
index 9969148e223..afbe811e7f2 100644
--- a/nixpkgs/pkgs/tools/misc/mcrypt/default.nix
+++ b/nixpkgs/pkgs/tools/misc/mcrypt/default.nix
@@ -9,7 +9,12 @@ stdenv.mkDerivation rec {
sha256 = "5145aa844e54cca89ddab6fb7dd9e5952811d8d787c4f4bf27eb261e6c182098";
};
- patches = [ ./format-string.patch ./overflow.patch ./segv.patch ./sprintf.patch ];
+ patches = [
+ ./format-string_CVE-2012-4426.patch
+ ./overflow_CVE-2012-4409.patch
+ ./segv.patch
+ ./sprintf_CVE-2012-4527.patch
+ ];
buildInputs = [ libmcrypt libmhash ];
diff --git a/nixpkgs/pkgs/tools/misc/mcrypt/format-string.patch b/nixpkgs/pkgs/tools/misc/mcrypt/format-string_CVE-2012-4426.patch
index 322ab473811..322ab473811 100644
--- a/nixpkgs/pkgs/tools/misc/mcrypt/format-string.patch
+++ b/nixpkgs/pkgs/tools/misc/mcrypt/format-string_CVE-2012-4426.patch
diff --git a/nixpkgs/pkgs/tools/misc/mcrypt/overflow.patch b/nixpkgs/pkgs/tools/misc/mcrypt/overflow_CVE-2012-4409.patch
index bf747a58266..bf747a58266 100644
--- a/nixpkgs/pkgs/tools/misc/mcrypt/overflow.patch
+++ b/nixpkgs/pkgs/tools/misc/mcrypt/overflow_CVE-2012-4409.patch
diff --git a/nixpkgs/pkgs/tools/misc/mcrypt/sprintf.patch b/nixpkgs/pkgs/tools/misc/mcrypt/sprintf_CVE-2012-4527.patch
index 1c9ade80777..1c9ade80777 100644
--- a/nixpkgs/pkgs/tools/misc/mcrypt/sprintf.patch
+++ b/nixpkgs/pkgs/tools/misc/mcrypt/sprintf_CVE-2012-4527.patch
diff --git a/nixpkgs/pkgs/tools/misc/memtest86-efi/default.nix b/nixpkgs/pkgs/tools/misc/memtest86-efi/default.nix
index 9f029ee5ded..c33aa074404 100644
--- a/nixpkgs/pkgs/tools/misc/memtest86-efi/default.nix
+++ b/nixpkgs/pkgs/tools/misc/memtest86-efi/default.nix
@@ -1,4 +1,10 @@
-{ fetchzip, lib, p7zip, stdenv }:
+{ stdenv
+, lib
+, fetchzip
+, utillinux
+, jq
+, mtools
+}:
stdenv.mkDerivation rec {
pname = "memtest86-efi";
@@ -22,19 +28,28 @@ stdenv.mkDerivation rec {
stripRoot = false;
};
- nativeBuildInputs = [ p7zip ];
+ nativeBuildInputs = [
+ utillinux
+ jq
+ mtools
+ ];
installPhase = ''
- mkdir -p $out
-
# memtest86 is distributed as a bootable USB image. It contains the actual
# memtest86 EFI app.
#
- # The following command uses p7zip to extract the actual EFI app from the
- # usb image so that it can be installed directly on the hard drive.
- 7z x -o$TEMP/temp-efi-dirs $src/memtest86-usb.img
- 7z x -o$TEMP/memtest86-files $TEMP/temp-efi-dirs/EFI\ System\ Partition.img
- cp -r $TEMP/memtest86-files/EFI/BOOT/* $out/
+ # The following uses sfdisk to calculate the offset of the FAT EFI System
+ # Partition in the disk image, and mcopy to extract the actual EFI app from
+ # the filesystem so that it can be installed directly on the hard drive.
+ IMG=$src/memtest86-usb.img
+ ESP_OFFSET=$(sfdisk --json $IMG | jq -r '
+ # Partition type GUID identifying EFI System Partitions
+ def ESP_GUID: "C12A7328-F81F-11D2-BA4B-00A0C93EC93B";
+ .partitiontable |
+ .sectorsize * (.partitions[] | select(.type == ESP_GUID) | .start)
+ ')
+ mkdir $out
+ mcopy -vsi $IMG@@$ESP_OFFSET ::'/EFI/BOOT/*' $out/
'';
meta = with lib; {
diff --git a/nixpkgs/pkgs/tools/misc/miniserve/default.nix b/nixpkgs/pkgs/tools/misc/miniserve/default.nix
index ea3afdab098..dab44e1eea5 100644
--- a/nixpkgs/pkgs/tools/misc/miniserve/default.nix
+++ b/nixpkgs/pkgs/tools/misc/miniserve/default.nix
@@ -9,16 +9,16 @@
rustPlatform.buildRustPackage rec {
pname = "miniserve";
- version = "0.6.0";
+ version = "0.7.0";
src = fetchFromGitHub {
owner = "svenstaro";
repo = "miniserve";
rev = "v${version}";
- sha256 = "0ybxnxjg0vqm4q60z4zjl3hfls0s2rvy44m6jgyhlj1p6cr3dbyw";
+ sha256 = "06nrb84xfvx02yc4bjn1szfq3bjy8mqgxwwrjghl7vpcw51qhlk5";
};
- cargoSha256 = "0ypxv9wqcnjxjdrvdparddpssrarnifr43dq7kcr4l3fd1anl40a";
+ cargoSha256 = "0mk8hvhjqggfr410yka9ygb41l1bnsizs8py3100xf685yxy5mhl";
RUSTC_BOOTSTRAP = 1;
diff --git a/nixpkgs/pkgs/tools/misc/mongodb-tools/default.nix b/nixpkgs/pkgs/tools/misc/mongodb-tools/default.nix
index f216e358d8a..c3e9a0dc2ff 100644
--- a/nixpkgs/pkgs/tools/misc/mongodb-tools/default.nix
+++ b/nixpkgs/pkgs/tools/misc/mongodb-tools/default.nix
@@ -45,7 +45,7 @@ in buildGoPackage {
runHook preBuild
${stdenv.lib.concatMapStrings (t: ''
- go build -o "$bin/bin/${t}" -tags ssl -ldflags "-s -w" $goPackagePath/${t}/main
+ go build -o "$out/bin/${t}" -tags ssl -ldflags "-s -w" $goPackagePath/${t}/main
'') tools}
runHook postBuild
diff --git a/nixpkgs/pkgs/tools/misc/mutagen/default.nix b/nixpkgs/pkgs/tools/misc/mutagen/default.nix
index 8940fef2a0d..d1716d95caf 100644
--- a/nixpkgs/pkgs/tools/misc/mutagen/default.nix
+++ b/nixpkgs/pkgs/tools/misc/mutagen/default.nix
@@ -11,7 +11,7 @@ buildGoModule rec {
sha256 = "0ykzrxlllip4wvhd9rja5bcr2m72695fjj2q1scwn8ri6jcgfa19";
};
- modSha256 = "1r6b4y6civk75if6nljl66pgv5qm7x05qqby1anf7s7cz7d1rc3g";
+ vendorSha256 = "0szs9yc49fyh55ra1wf8zj76kdah0x49d45cgivk3gqh2hl17j6l";
subPackages = [ "cmd/mutagen" "cmd/mutagen-agent" ];
@@ -22,4 +22,4 @@ buildGoModule rec {
maintainers = [ maintainers.marsam ];
license = licenses.mit;
};
-}
+} \ No newline at end of file
diff --git a/nixpkgs/pkgs/tools/misc/neo-cowsay/default.nix b/nixpkgs/pkgs/tools/misc/neo-cowsay/default.nix
index a4fe58fb107..e50960d063c 100644
--- a/nixpkgs/pkgs/tools/misc/neo-cowsay/default.nix
+++ b/nixpkgs/pkgs/tools/misc/neo-cowsay/default.nix
@@ -11,7 +11,7 @@ buildGoModule rec {
sha256 = "0c6lygdqi26mczij41sn8ckc3g6qaakkkh3iasf10a4d07amxci1";
};
- modSha256 = "063ds35dzv8m4bjk7v1q3f6jwyp7j5jrkrhrl41z1c1mbzzkagkq";
+ vendorSha256 = "1clar59x2dvn7yj4fbylby9nrzy8kdixi48hkbmrv8g5l8n0wdl2";
subPackages = [ "cmd/cowsay" "cmd/cowthink" ];
@@ -21,4 +21,4 @@ buildGoModule rec {
license = with licenses; [artistic1 /* or */ gpl3];
maintainers = with maintainers; [ filalex77 ];
};
-}
+} \ No newline at end of file
diff --git a/nixpkgs/pkgs/tools/misc/nix-direnv/default.nix b/nixpkgs/pkgs/tools/misc/nix-direnv/default.nix
new file mode 100644
index 00000000000..cff7df1801f
--- /dev/null
+++ b/nixpkgs/pkgs/tools/misc/nix-direnv/default.nix
@@ -0,0 +1,36 @@
+{ lib, stdenv, fetchFromGitHub, gnugrep, nix }:
+
+stdenv.mkDerivation rec {
+ pname = "nix-direnv";
+ version = "1.0.0";
+
+ src = fetchFromGitHub {
+ owner = "nix-community";
+ repo = "nix-direnv";
+ rev = "${version}";
+ sha256 = "1lwmg6mn3lf7s0345v53zadxn9v0x8z6pcbj90v5dx3pgrq41gs8";
+ };
+
+ # Substitute instead of wrapping because the resulting file is
+ # getting sourced, not executed:
+ postPatch = ''
+ substituteInPlace direnvrc \
+ --replace "grep" "${gnugrep}/bin/grep" \
+ --replace "nix-shell" "${nix}/bin/nix-shell" \
+ --replace "nix-instantiate" "${nix}/bin/nix-instantiate"
+ '';
+
+ installPhase = ''
+ runHook preInstall
+ install -m500 -D direnvrc $out/share/nix-direnv/direnvrc
+ runHook postInstall
+ '';
+
+ meta = with stdenv.lib; {
+ description = "A fast, persistent use_nix implementation for direnv";
+ homepage = "https://github.com/nix-community/nix-direnv";
+ license = licenses.mit;
+ platforms = platforms.unix;
+ maintainers = with maintainers; [ mic92 ];
+ };
+}
diff --git a/nixpkgs/pkgs/tools/misc/parallel/default.nix b/nixpkgs/pkgs/tools/misc/parallel/default.nix
index d55b2cd6f24..0720ca76f25 100644
--- a/nixpkgs/pkgs/tools/misc/parallel/default.nix
+++ b/nixpkgs/pkgs/tools/misc/parallel/default.nix
@@ -1,11 +1,11 @@
{ fetchurl, stdenv, perl, makeWrapper, procps }:
stdenv.mkDerivation rec {
- name = "parallel-20200322";
+ name = "parallel-20200422";
src = fetchurl {
url = "mirror://gnu/parallel/${name}.tar.bz2";
- sha256 = "0kg95glnfg25i1w7qg2vr5v4671vigsazmz4qdf223l64khq8x10";
+ sha256 = "0c2mr2rzsz0y24q4mbm2zmc2fz6bcda4gbc4qgg59sirrj8vzpjb";
};
outputs = [ "out" "man" ];
diff --git a/nixpkgs/pkgs/tools/misc/patdiff/default.nix b/nixpkgs/pkgs/tools/misc/patdiff/default.nix
index 1c5e5b04474..e0b54e56081 100644
--- a/nixpkgs/pkgs/tools/misc/patdiff/default.nix
+++ b/nixpkgs/pkgs/tools/misc/patdiff/default.nix
@@ -4,7 +4,7 @@ with ocamlPackages;
janePackage {
pname = "patdiff";
- hash = "04krzn6rj2r81z55pms5ayk6bxhlxrm006cbhy0m6rc69a0h00lh";
+ hash = "1yqvxdmkgcwgx3npgncpdqwkpdxiqr1q41wci7589s8z7xi5nwyz";
buildInputs = [ core_extended expect_test_helpers patience_diff ocaml_pcre shell ];
meta = {
description = "File Diff using the Patience Diff algorithm";
diff --git a/nixpkgs/pkgs/tools/misc/pg_flame/default.nix b/nixpkgs/pkgs/tools/misc/pg_flame/default.nix
index fbeba0ff1bd..6fe2e814fa4 100644
--- a/nixpkgs/pkgs/tools/misc/pg_flame/default.nix
+++ b/nixpkgs/pkgs/tools/misc/pg_flame/default.nix
@@ -11,7 +11,7 @@ buildGoModule rec {
sha256 = "1a03vxqnga83mhjp7pkl0klhkyfaby7ncbwm45xbl8c7s6zwhnw2";
};
- modSha256 = "0j7qpvji546z0cfjijdd66l0vsl0jmny6i1n9fsjqjgjpwg26naq";
+ vendorSha256 = "1rkx20winh66y2m7i7q13jpr83044i2d1pfd5p5l5kkpsix5mra5";
meta = with lib; {
description = "Flamegraph generator for Postgres EXPLAIN ANALYZE output";
@@ -19,4 +19,4 @@ buildGoModule rec {
license = licenses.asl20;
maintainers = with maintainers; [ filalex77 ];
};
-}
+} \ No newline at end of file
diff --git a/nixpkgs/pkgs/tools/misc/pgcenter/default.nix b/nixpkgs/pkgs/tools/misc/pgcenter/default.nix
index fbd32cf876d..edcc2cfc2bf 100644
--- a/nixpkgs/pkgs/tools/misc/pgcenter/default.nix
+++ b/nixpkgs/pkgs/tools/misc/pgcenter/default.nix
@@ -11,7 +11,7 @@ buildGoModule rec {
sha256 = "0p8ck4s5jj53nc638darhwbylcsslfmfz72bwy6wxby9iqi9kq6b";
};
- modSha256 = "0kassq52v07zmffs6l066g0d3kfv6wmrh9g5cgk79bmyq13clqjj";
+ vendorSha256 = "1mzvpr12qh9668iz97p62zl4zhlrcyfgwr4a9zg9irj585pkb5x2";
meta = with stdenv.lib; {
homepage = "https://pgcenter.org/";
@@ -19,4 +19,4 @@ buildGoModule rec {
license = licenses.bsd3;
maintainers = [ maintainers.marsam ];
};
-}
+} \ No newline at end of file
diff --git a/nixpkgs/pkgs/tools/misc/pgmetrics/default.nix b/nixpkgs/pkgs/tools/misc/pgmetrics/default.nix
index 632ba452ff9..c78aa6a5315 100644
--- a/nixpkgs/pkgs/tools/misc/pgmetrics/default.nix
+++ b/nixpkgs/pkgs/tools/misc/pgmetrics/default.nix
@@ -11,7 +11,7 @@ buildGoModule rec {
sha256 = "0f7pjagr3zcqmbhmk446j6n7nanyhvyq4rn68f5wljl9g68ni7sj";
};
- modSha256 = "13a969yki47gw4b3mwhsgl0x53xylmflsykcs63f8pmigckw7jac";
+ vendorSha256 = "16x33fmh4q993rw0jr65337yimska4fwgyyw3kmq84q0x28a3zg5";
buildFlagsArray = [ "-ldflags=-s -w -X main.version=${version}" ];
@@ -21,4 +21,4 @@ buildGoModule rec {
license = licenses.asl20;
maintainers = [ maintainers.marsam ];
};
-}
+} \ No newline at end of file
diff --git a/nixpkgs/pkgs/tools/misc/phoronix-test-suite/default.nix b/nixpkgs/pkgs/tools/misc/phoronix-test-suite/default.nix
index 00ed2db1073..0abbcd5c3a2 100644
--- a/nixpkgs/pkgs/tools/misc/phoronix-test-suite/default.nix
+++ b/nixpkgs/pkgs/tools/misc/phoronix-test-suite/default.nix
@@ -1,12 +1,12 @@
-{ stdenv, fetchurl, php, which, gnused, makeWrapper, gnumake, gcc }:
+{ stdenv, fetchurl, php, which, gnused, makeWrapper, gnumake, gcc, callPackage }:
stdenv.mkDerivation rec {
pname = "phoronix-test-suite";
- version = "9.4.1";
+ version = "9.6.0";
src = fetchurl {
url = "https://phoronix-test-suite.com/releases/${pname}-${version}.tar.gz";
- sha256 = "1c33c8aihsfdxaqkwy4isrvmjam5j5rdz98vv2apy73638vx3q04";
+ sha256 = "1wgw5lwpm3ylby2llnjiq356cdb3v1jghj7xq659c722wj617i88";
};
buildInputs = [ php ];
@@ -19,6 +19,10 @@ stdenv.mkDerivation rec {
--prefix PATH : ${stdenv.lib.makeBinPath [ gnumake gcc ]}
'';
+ passthru.tests = {
+ simple-execution = callPackage ./tests.nix { };
+ };
+
meta = with stdenv.lib; {
description = "Open-Source, Automated Benchmarking";
homepage = "https://www.phoronix-test-suite.com/";
diff --git a/nixpkgs/pkgs/tools/misc/phoronix-test-suite/tests.nix b/nixpkgs/pkgs/tools/misc/phoronix-test-suite/tests.nix
new file mode 100644
index 00000000000..06bd9def9aa
--- /dev/null
+++ b/nixpkgs/pkgs/tools/misc/phoronix-test-suite/tests.nix
@@ -0,0 +1,20 @@
+{ runCommand, phoronix-test-suite }:
+
+let
+ inherit (phoronix-test-suite) pname version;
+in
+
+runCommand "${pname}-tests" { meta.timeout = 3; }
+ ''
+ # automatic initial setup to prevent interactive questions
+ ${phoronix-test-suite}/bin/phoronix-test-suite enterprise-setup >/dev/null
+ # get version of installed program and compare with package version
+ if [[ `${phoronix-test-suite}/bin/phoronix-test-suite version` != *"${version}"* ]]; then
+ echo "Error: program version does not match package version"
+ exit 1
+ fi
+ # run dummy command
+ ${phoronix-test-suite}/bin/phoronix-test-suite dummy_module.dummy-command >/dev/null
+ # needed for Nix to register the command as successful
+ touch $out
+ ''
diff --git a/nixpkgs/pkgs/tools/misc/phraseapp-client/default.nix b/nixpkgs/pkgs/tools/misc/phraseapp-client/default.nix
index a66a6688ad4..35bd84005b5 100644
--- a/nixpkgs/pkgs/tools/misc/phraseapp-client/default.nix
+++ b/nixpkgs/pkgs/tools/misc/phraseapp-client/default.nix
@@ -15,7 +15,7 @@ buildGoPackage rec {
};
postInstall = ''
- ln -s $bin/bin/phraseapp-client $bin/bin/phraseapp
+ ln -s $out/bin/phraseapp-client $out/bin/phraseapp
'';
meta = with stdenv.lib; {
diff --git a/nixpkgs/pkgs/tools/misc/pistol/default.nix b/nixpkgs/pkgs/tools/misc/pistol/default.nix
index 17e9dcbc33a..eeb392606ed 100644
--- a/nixpkgs/pkgs/tools/misc/pistol/default.nix
+++ b/nixpkgs/pkgs/tools/misc/pistol/default.nix
@@ -6,16 +6,16 @@
buildGoModule rec {
pname = "pistol";
- version = "0.0.5";
+ version = "0.1.1";
src = fetchFromGitHub {
owner = "doronbehar";
repo = pname;
rev = "v${version}";
- sha256 = "1zxvpmy6c26dhg5wpk5cgaqipw5372crkhm1vaghm8jkiw7sjwvw";
+ sha256 = "1d9c1bhidh781dis4427wramfrla4avqw9y2bmpjp81cqq3nc27d";
};
- modSha256 = "13yxcfd29ziprjsjl2ji7w5i2506hwwl3y0ycaphj2wlcd75rdxs";
+ vendorSha256 = "1f780vhxw0brvnr8hhah4sf6ms8spar29rqmy1kcqf9m75n94g56";
subPackages = [ "cmd/pistol" ];
@@ -29,4 +29,4 @@ buildGoModule rec {
license = licenses.mit;
maintainers = with maintainers; [ doronbehar ];
};
-}
+} \ No newline at end of file
diff --git a/nixpkgs/pkgs/tools/misc/pk2cmd/default.nix b/nixpkgs/pkgs/tools/misc/pk2cmd/default.nix
index 97628da67f7..8c7e5b8bcf2 100644
--- a/nixpkgs/pkgs/tools/misc/pk2cmd/default.nix
+++ b/nixpkgs/pkgs/tools/misc/pk2cmd/default.nix
@@ -1,4 +1,4 @@
-{stdenv, fetchurl, libusb, makeWrapper}:
+{stdenv, fetchurl, libusb-compat-0_1, makeWrapper}:
stdenv.mkDerivation {
name = "pk2cmd-1.20";
@@ -7,7 +7,7 @@ stdenv.mkDerivation {
sha256 = "1yjpi2qshnqfpan4w3ggakkr3znfrx5cxkny92ka7v9na3g2fc4h";
};
- makeFlags = [ "LIBUSB=${libusb.dev}" "linux" ];
+ makeFlags = [ "LIBUSB=${libusb-compat-0_1.dev}" "linux" ];
installPhase = ''
mkdir -p $out/bin $out/share/pk2
@@ -16,7 +16,7 @@ stdenv.mkDerivation {
wrapProgram $out/bin/pk2cmd --prefix PATH : $out/share/pk2
'';
- buildInputs = [ libusb makeWrapper ];
+ buildInputs = [ libusb-compat-0_1 makeWrapper ];
meta = {
homepage = "https://www.microchip.com/pickit2";
diff --git a/nixpkgs/pkgs/tools/misc/plantuml/default.nix b/nixpkgs/pkgs/tools/misc/plantuml/default.nix
index fec1bee160f..df76ddf2662 100644
--- a/nixpkgs/pkgs/tools/misc/plantuml/default.nix
+++ b/nixpkgs/pkgs/tools/misc/plantuml/default.nix
@@ -1,12 +1,12 @@
{ stdenv, fetchurl, makeWrapper, jre, graphviz }:
stdenv.mkDerivation rec {
- version = "1.2020.5";
+ version = "1.2020.8";
pname = "plantuml";
src = fetchurl {
url = "mirror://sourceforge/project/plantuml/${version}/plantuml.${version}.jar";
- sha256 = "1cn1bjah9qvhh3hixa92v804crkgz69mg30k8229a551x3alykhd";
+ sha256 = "0xkv8d31dc0dchr40zzgmjw2wyh4i5vxwdk3fhqpw0pk2frxwc1w";
};
nativeBuildInputs = [ makeWrapper ];
diff --git a/nixpkgs/pkgs/tools/misc/powerline-go/default.nix b/nixpkgs/pkgs/tools/misc/powerline-go/default.nix
index 47336e54d67..33ab2bbc729 100644
--- a/nixpkgs/pkgs/tools/misc/powerline-go/default.nix
+++ b/nixpkgs/pkgs/tools/misc/powerline-go/default.nix
@@ -2,16 +2,16 @@
buildGoModule rec {
pname = "powerline-go";
- version = "1.15.0";
+ version = "1.17.0";
src = fetchFromGitHub {
owner = "justjanne";
repo = pname;
rev = "v${version}";
- sha256 = "06i07m68l24v29j01qp2y91rwsfqh4x1nc8sxkjzrc7q1c7fsc1r";
+ sha256 = "135j18d53nhg6adjd2hax067c5f1py9fyprzfcr3plsxnaki2hrx";
};
- modSha256 = "0mz1qrwar9cgrhrgw4z3gwhjj62bnfnn59ji31zkyvwlc1mqh9an";
+ vendorSha256 = "0dkgp9vlb76la0j439w0rb548qg5v8648zryk3rqgfhd4qywlk11";
meta = with stdenv.lib; {
description = "A Powerline like prompt for Bash, ZSH and Fish";
@@ -19,4 +19,4 @@ buildGoModule rec {
platforms = platforms.unix;
maintainers = with maintainers; [ sifmelcara ];
};
-}
+} \ No newline at end of file
diff --git a/nixpkgs/pkgs/tools/misc/profile-sync-daemon/default.nix b/nixpkgs/pkgs/tools/misc/profile-sync-daemon/default.nix
index ae70a82de4f..790bf73a44d 100644
--- a/nixpkgs/pkgs/tools/misc/profile-sync-daemon/default.nix
+++ b/nixpkgs/pkgs/tools/misc/profile-sync-daemon/default.nix
@@ -1,12 +1,12 @@
-{ stdenv, fetchurl, utillinux}:
+{ stdenv, fetchurl, utillinux, coreutils}:
stdenv.mkDerivation rec {
- version = "6.36";
+ version = "6.38";
pname = "profile-sync-daemon";
src = fetchurl {
url = "https://github.com/graysky2/profile-sync-daemon/archive/v${version}.tar.gz";
- sha256 = "0zw9fqpfiz1ld443cw2vp54y86maksmq4mnjs73nlp00nn5z2047";
+ sha256 = "0mhjgd2b3grdaad64b72m8i5rm9k58yx7kpiqmhmd3kl5qlgxagy";
};
installPhase = ''
@@ -17,7 +17,8 @@ stdenv.mkDerivation rec {
# $HOME detection fails (and is unnecessary)
sed -i '/^HOME/d' $out/bin/profile-sync-daemon
substituteInPlace $out/bin/psd-overlay-helper \
- --replace "PATH=/usr/bin:/bin" "PATH=${utillinux.bin}/bin"
+ --replace "PATH=/usr/bin:/bin" "PATH=${utillinux.bin}/bin:${coreutils}/bin" \
+ --replace "sudo " "/run/wrappers/bin/sudo "
'';
preferLocalBuild = true;
diff --git a/nixpkgs/pkgs/tools/misc/pspg/default.nix b/nixpkgs/pkgs/tools/misc/pspg/default.nix
index 1bd2fc259ee..1bb7f9582c4 100644
--- a/nixpkgs/pkgs/tools/misc/pspg/default.nix
+++ b/nixpkgs/pkgs/tools/misc/pspg/default.nix
@@ -2,13 +2,13 @@
stdenv.mkDerivation rec {
pname = "pspg";
- version = "2.7.1";
+ version = "3.0.7";
src = fetchFromGitHub {
owner = "okbob";
repo = pname;
rev = version;
- sha256 = "1fq8n5naicfv0lsyzfb52c84w40zrsks0x9rrvyyzih4vkhic4vm";
+ sha256 = "10w47hbi6y92imzh1rlwkh5bfj1pnlkfxhbi8lhmy6ggxa62xmf7";
};
nativeBuildInputs = [ pkgconfig ];
diff --git a/nixpkgs/pkgs/tools/misc/shadowenv/default.nix b/nixpkgs/pkgs/tools/misc/shadowenv/default.nix
index a464ea638bd..7c9352d3310 100644
--- a/nixpkgs/pkgs/tools/misc/shadowenv/default.nix
+++ b/nixpkgs/pkgs/tools/misc/shadowenv/default.nix
@@ -2,16 +2,16 @@
rustPlatform.buildRustPackage rec {
pname = "shadowenv";
- version = "2.0.0";
+ version = "2.0.2";
src = fetchFromGitHub {
owner = "Shopify";
repo = pname;
rev = version;
- sha256 = "1fjqm4qr85wb0i3vazp0w74izfzvkycdii7dlpdp5zs8jgb35pdh";
+ sha256 = "1x5i5km6wblqbc0fibdjdlqkamqswxwhy8p6cbfz2nvcia7fgsf1";
};
- cargoSha256 = "1n8qh730nhdmpm08mm2ppcl3nkcgm50cyz9q5h6dlzq4bv4rijp4";
+ cargoSha256 = "1hrsbd6025sfgnwr7smp43yzi7w2lfyfbdxhapgizrpwbq8y7xzd";
nativeBuildInputs = [ installShellFiles ];
@@ -20,6 +20,9 @@ rustPlatform.buildRustPackage rec {
postInstall = ''
installManPage man/man1/shadowenv.1
installManPage man/man5/shadowlisp.5
+ installShellCompletion --bash sh/completions/shadowenv.bash
+ installShellCompletion --fish sh/completions/shadowenv.fish
+ installShellCompletion --zsh sh/completions/_shadowenv
'';
meta = with stdenv.lib; {
diff --git a/nixpkgs/pkgs/tools/misc/silicon/default.nix b/nixpkgs/pkgs/tools/misc/silicon/default.nix
index 7fc1a63c5ab..a59a14d4b90 100644
--- a/nixpkgs/pkgs/tools/misc/silicon/default.nix
+++ b/nixpkgs/pkgs/tools/misc/silicon/default.nix
@@ -16,16 +16,16 @@
rustPlatform.buildRustPackage rec {
pname = "silicon";
- version = "0.3.0";
+ version = "0.3.1";
src = fetchFromGitHub {
owner = "Aloxaf";
repo = "silicon";
rev = "v${version}";
- sha256 = "0j211qrkwgll7rm15dk4fcazmxkcqk2zah0qg2s3y0k7cx65bcxy";
+ sha256 = "1avdzs3v6k4jhkadm8i8dlwg0iffqd99xqpi53smd0zgwks744l5";
};
- cargoSha256 = "1i0y3x5rmg27gxrr2lv04sqq7qyiv1bnazfy24l5zgb4akvdg3r5";
+ cargoSha256 = "0bdb4nadrms5jq3s8pby2qfky7112ynd7vd6mw720mshqklk5zyb";
buildInputs = [ llvmPackages.libclang expat freetype ]
++ lib.optionals stdenv.isLinux [ libxcb ]
diff --git a/nixpkgs/pkgs/tools/misc/sixpair/default.nix b/nixpkgs/pkgs/tools/misc/sixpair/default.nix
index fafee99db5a..f738ed71ec7 100644
--- a/nixpkgs/pkgs/tools/misc/sixpair/default.nix
+++ b/nixpkgs/pkgs/tools/misc/sixpair/default.nix
@@ -1,4 +1,4 @@
-{ stdenv, fetchurl, libusb }:
+{ stdenv, fetchurl, libusb-compat-0_1 }:
stdenv.mkDerivation {
name = "sixpair-2007-04-18";
@@ -10,7 +10,7 @@ stdenv.mkDerivation {
# hcitool is depricated
patches = [ ./hcitool.patch ];
- buildInputs = [ libusb ];
+ buildInputs = [ libusb-compat-0_1 ];
unpackPhase = ''
cp $src sixpair.c
diff --git a/nixpkgs/pkgs/tools/misc/starship/default.nix b/nixpkgs/pkgs/tools/misc/starship/default.nix
index 5503c8ecc56..d6ff65adb4c 100644
--- a/nixpkgs/pkgs/tools/misc/starship/default.nix
+++ b/nixpkgs/pkgs/tools/misc/starship/default.nix
@@ -3,13 +3,13 @@
rustPlatform.buildRustPackage rec {
pname = "starship";
- version = "0.40.1";
+ version = "0.41.3";
src = fetchFromGitHub {
owner = "starship";
repo = pname;
rev = "v${version}";
- sha256 = "0jnm586wx5by1b6v78v78a84qzg05n1ha1hlmnjfyzhgjkbkayp1";
+ sha256 = "0f3d95abivbmjqdzw9pbdbis96sfds26xv3k8k9skxml8iqzq29c";
};
nativeBuildInputs = stdenv.lib.optionals stdenv.isLinux [ pkg-config ];
@@ -22,14 +22,14 @@ rustPlatform.buildRustPackage rec {
--replace "/bin/echo" "echo"
'';
- cargoSha256 = "1jrlzihcq543z6hb1gq8zq6hqvgralzsknj3xnb6gia1n49b3zxz";
+ cargoSha256 = "10h0arvl3gf5hg530d24ypj4yzk3zhm8mgkhz0v61y0jcdy2zdrm";
checkPhase = "cargo test -- --skip directory::home_directory --skip directory::directory_in_root";
meta = with stdenv.lib; {
description = "A minimal, blazing fast, and extremely customizable prompt for any shell";
homepage = "https://starship.rs";
license = licenses.isc;
- maintainers = with maintainers; [ bbigras davidtwco filalex77 ];
+ maintainers = with maintainers; [ bbigras davidtwco filalex77 Frostman ];
platforms = platforms.all;
};
}
diff --git a/nixpkgs/pkgs/tools/misc/statserial/default.nix b/nixpkgs/pkgs/tools/misc/statserial/default.nix
new file mode 100644
index 00000000000..66ae899b9c5
--- /dev/null
+++ b/nixpkgs/pkgs/tools/misc/statserial/default.nix
@@ -0,0 +1,44 @@
+{ stdenv, fetchurl, ncurses, glibc }:
+
+stdenv.mkDerivation rec {
+ pname = "statserial";
+ version = "1.1";
+
+ src = fetchurl {
+ url = "http://www.ibiblio.org/pub/Linux/system/serial/${pname}-${version}.tar.gz";
+ sha256 = "0rrrmxfba5yn836zlgmr8g9xnrpash7cjs7lk2m44ac50vakpks0";
+ };
+
+ postPatch = ''
+ substituteInPlace Makefile \
+ --replace '-lcurses' '-lncurses'
+
+ substituteInPlace Makefile \
+ --replace 'LDFLAGS = -s -N' '#LDFLAGS = -s -N'
+ '';
+
+ buildInputs = [ ncurses glibc stdenv ];
+
+ installPhase = ''
+ mkdir -p $out/bin
+ cp statserial $out/bin
+
+ mkdir -p $out/share/man/man1
+ cp statserial.1 $out/share/man/man1
+ '';
+
+ meta = with stdenv.lib; {
+ homepage = "https://sites.google.com/site/tranter/software";
+ description = "Display serial port modem status lines.";
+ license = licenses.gpl2;
+
+ longDescription =
+ '' Statserial displays a table of the signals on a standard 9-pin or
+ 25-pin serial port, and indicates the status of the handshaking lines. It
+ can be useful for debugging problems with serial ports or modems.
+ '';
+
+ platforms = platforms.unix;
+ maintainers = with maintainers; [ rps ];
+ };
+}
diff --git a/nixpkgs/pkgs/tools/misc/stow/default.nix b/nixpkgs/pkgs/tools/misc/stow/default.nix
index d5cd4ef32ef..80741f0543c 100644
--- a/nixpkgs/pkgs/tools/misc/stow/default.nix
+++ b/nixpkgs/pkgs/tools/misc/stow/default.nix
@@ -31,8 +31,6 @@ stdenv.mkDerivation {
license = stdenv.lib.licenses.gpl3Plus;
homepage = "https://www.gnu.org/software/stow/";
-
- maintainers = with stdenv.lib.maintainers; [ the-kenny ];
platforms = stdenv.lib.platforms.all;
};
}
diff --git a/nixpkgs/pkgs/tools/misc/tewisay/default.nix b/nixpkgs/pkgs/tools/misc/tewisay/default.nix
index d2a8a1d0e87..b4f834bdd1a 100644
--- a/nixpkgs/pkgs/tools/misc/tewisay/default.nix
+++ b/nixpkgs/pkgs/tools/misc/tewisay/default.nix
@@ -18,12 +18,12 @@ buildGoPackage rec {
goDeps = ./deps.nix;
postInstall = ''
- install -D -t $bin/share/tewisay/cows go/src/${goPackagePath}/cows/*.cow
+ install -D -t $out/share/tewisay/cows go/src/${goPackagePath}/cows/*.cow
'';
preFixup = ''
- wrapProgram $bin/bin/tewisay \
- --prefix COWPATH : $bin/share/tewisay/cows
+ wrapProgram $out/bin/tewisay \
+ --prefix COWPATH : $out/share/tewisay/cows
'';
meta = {
diff --git a/nixpkgs/pkgs/tools/misc/tmux/default.nix b/nixpkgs/pkgs/tools/misc/tmux/default.nix
index 1aa221bd59e..12ea456b9f7 100644
--- a/nixpkgs/pkgs/tools/misc/tmux/default.nix
+++ b/nixpkgs/pkgs/tools/misc/tmux/default.nix
@@ -21,7 +21,7 @@ in
stdenv.mkDerivation rec {
pname = "tmux";
- version = "3.0a";
+ version = "3.1b";
outputs = [ "out" "man" ];
@@ -29,7 +29,7 @@ stdenv.mkDerivation rec {
owner = "tmux";
repo = "tmux";
rev = version;
- sha256 = "0y9lv1yr0x50v3k70vzkc8hfr7yijlsi30p7dr7i8akp3lwmmc7h";
+ sha256 = "0jvyq4r691bn0wsr8i6c0q0lzss25vm9nx8sv3fhw9cs63ncq04y";
};
nativeBuildInputs = [
diff --git a/nixpkgs/pkgs/tools/misc/tmuxinator/default.nix b/nixpkgs/pkgs/tools/misc/tmuxinator/default.nix
index d19b9cd5dbf..e631aa9d342 100644
--- a/nixpkgs/pkgs/tools/misc/tmuxinator/default.nix
+++ b/nixpkgs/pkgs/tools/misc/tmuxinator/default.nix
@@ -1,4 +1,4 @@
-{ lib, buildRubyGem, ruby }:
+{ lib, buildRubyGem, ruby, installShellFiles }:
# Cannot use bundleEnv because bundleEnv create stub with
# BUNDLE_FROZEN='1' environment variable set, which broke everything
@@ -8,8 +8,8 @@ buildRubyGem rec {
inherit ruby;
name = "${gemName}-${version}";
gemName = "tmuxinator";
- version = "1.1.4";
- source.sha256 = "06ajfvsmq2040b7nk2ifih3sqxgwzih5j1d25nh4ilgjlrfmha98";
+ version = "2.0.1";
+ source.sha256 = "03q1q6majci0l6kzw6kv7r395jycrl862mlqmyydxcd29y8wm3m2";
erubis = buildRubyGem rec {
inherit ruby;
@@ -37,6 +37,12 @@ buildRubyGem rec {
propagatedBuildInputs = [ erubis thor xdg ];
+ nativeBuildInputs = [ installShellFiles ];
+
+ postInstall = ''
+ installShellCompletion $GEM_HOME/gems/${gemName}-${version}/completion/tmuxinator.{bash,zsh,fish}
+ '';
+
meta = with lib; {
description = "Manage complex tmux sessions easily";
homepage = "https://github.com/tmuxinator/tmuxinator";
diff --git a/nixpkgs/pkgs/tools/misc/topgrade/default.nix b/nixpkgs/pkgs/tools/misc/topgrade/default.nix
index 39882b4e6e6..529252901a4 100644
--- a/nixpkgs/pkgs/tools/misc/topgrade/default.nix
+++ b/nixpkgs/pkgs/tools/misc/topgrade/default.nix
@@ -2,16 +2,16 @@
rustPlatform.buildRustPackage rec {
pname = "topgrade";
- version = "4.3.1";
+ version = "4.5.0";
src = fetchFromGitHub {
owner = "r-darwish";
repo = pname;
rev = "v${version}";
- sha256 = "0r42hrhd33kkkvii9h4896cmr319q728pdnhhamkhzgilvzxrwrz";
+ sha256 = "0df79vlbclv1qx4zwir728c6ggqfawxh2x1py16m5q0ga1hd799j";
};
- cargoSha256 = "041djz3w7qmr19xq4cxgpw0m4qz2368q2wijw5aidvrxqlcz7xg2";
+ cargoSha256 = "0wwxh71i94h68sryckbvrr43gd19qjcs0cgcpycnimkhdcdy8nlj";
buildInputs = lib.optional stdenv.isDarwin Foundation;
diff --git a/nixpkgs/pkgs/tools/misc/ttygif/default.nix b/nixpkgs/pkgs/tools/misc/ttygif/default.nix
index 2fbd4360698..5a14dade01b 100644
--- a/nixpkgs/pkgs/tools/misc/ttygif/default.nix
+++ b/nixpkgs/pkgs/tools/misc/ttygif/default.nix
@@ -2,21 +2,21 @@
stdenv.mkDerivation rec {
pname = "ttygif";
- version = "1.4.0";
+ version = "1.5.0";
src = fetchFromGitHub {
owner = "icholy";
repo = pname;
rev = version;
- sha256 = "18l26iacpfn4xqqv1ai6ncabn83mqv98c48gl265gfld66y7zbzn";
+ sha256 = "1w9c3h6hik2gglwsw8ww63piy66i4zqr3273wh5rc9r2awiwh643";
};
- makeFlags = [ "PREFIX=${placeholder "out"}" ];
+ makeFlags = [ "CC:=$(CC)" "PREFIX=${placeholder "out"}" ];
meta = with stdenv.lib; {
homepage = "https://github.com/icholy/ttygif";
description = "Convert terminal recordings to animated gifs";
- platforms = platforms.linux;
+ platforms = platforms.unix;
license = licenses.mit;
maintainers = with maintainers; [ moaxcp ];
};
diff --git a/nixpkgs/pkgs/tools/misc/up/default.nix b/nixpkgs/pkgs/tools/misc/up/default.nix
index 1e3378305d9..f0f9cf4cee8 100644
--- a/nixpkgs/pkgs/tools/misc/up/default.nix
+++ b/nixpkgs/pkgs/tools/misc/up/default.nix
@@ -4,6 +4,8 @@ buildGoModule rec {
pname = "up";
version = "0.3.2";
+ patches = [ ./gomod.patch ];
+
src = fetchFromGitHub {
owner = "akavel";
repo = "up";
@@ -11,7 +13,7 @@ buildGoModule rec {
sha256 = "1psixyymk98z52yy92lwb75yfins45dw6rif9cxwd7yiascwg2if";
};
- modSha256 = "0nfs190rzabphhhyacypz3ic5c4ajlqpx9jiiincs0vxfkmfwnjd";
+ vendorSha256 = "1h3w4i7dyh6yagqmdclvflfq6fx0z880jdnpf28assv7fxd9rjsx";
meta = with lib; {
description = "Ultimate Plumber is a tool for writing Linux pipes with instant live preview";
@@ -19,4 +21,4 @@ buildGoModule rec {
maintainers = with maintainers; [ ma27 ];
license = licenses.asl20;
};
-}
+} \ No newline at end of file
diff --git a/nixpkgs/pkgs/tools/misc/up/gomod.patch b/nixpkgs/pkgs/tools/misc/up/gomod.patch
new file mode 100644
index 00000000000..f894f14d21f
--- /dev/null
+++ b/nixpkgs/pkgs/tools/misc/up/gomod.patch
@@ -0,0 +1,23 @@
+diff --git a/go.mod b/go.mod
+index ecbfe90..56a1409 100644
+--- a/go.mod
++++ b/go.mod
+@@ -1,11 +1,14 @@
+ module github.com/akavel/up
+
++go 1.14
++
+ require (
+- github.com/gdamore/encoding v0.0.0-20151215212835-b23993cbb635
++ github.com/gdamore/encoding v0.0.0-20151215212835-b23993cbb635 // indirect
+ github.com/gdamore/tcell v0.0.0-20180924055237-493f3b46b3c2
+- github.com/lucasb-eyer/go-colorful v0.0.0-20170903184257-231272389856
++ github.com/lucasb-eyer/go-colorful v0.0.0-20170903184257-231272389856 // indirect
+ github.com/mattn/go-isatty v0.0.3
+- github.com/mattn/go-runewidth v0.0.2
++ github.com/mattn/go-runewidth v0.0.2 // indirect
+ github.com/spf13/pflag v1.0.3
+- golang.org/x/text v0.0.0-20171214130843-f21a4dfb5e38
++ golang.org/x/sys v0.0.0-20200501145240-bc7a7d42d5c3 // indirect
++ golang.org/x/text v0.0.0-20171214130843-f21a4dfb5e38 // indirect
+ )
diff --git a/nixpkgs/pkgs/tools/misc/urjtag/default.nix b/nixpkgs/pkgs/tools/misc/urjtag/default.nix
index 67b25eaca82..2056fb9d0a5 100644
--- a/nixpkgs/pkgs/tools/misc/urjtag/default.nix
+++ b/nixpkgs/pkgs/tools/misc/urjtag/default.nix
@@ -1,5 +1,5 @@
{ stdenv, autoconf, automake, pkgconfig, gettext, libtool, bison
-, flex, which, subversion, fetchsvn, makeWrapper, libftdi, libusb, readline
+, flex, which, subversion, fetchsvn, makeWrapper, libftdi, libusb-compat-0_1, readline
, python3
, svfSupport ? true
, bsdlSupport ? true
@@ -19,7 +19,7 @@ stdenv.mkDerivation {
nativeBuildInputs = [ pkgconfig ];
buildInputs = [ gettext autoconf automake libtool bison flex which
- subversion makeWrapper readline libftdi libusb python3 ];
+ subversion makeWrapper readline libftdi libusb-compat-0_1 python3 ];
configureFlags = [
(stdenv.lib.enableFeature svfSupport "svf")
diff --git a/nixpkgs/pkgs/tools/misc/vdirsyncer/default.nix b/nixpkgs/pkgs/tools/misc/vdirsyncer/default.nix
deleted file mode 100644
index ecf87b7c0a5..00000000000
--- a/nixpkgs/pkgs/tools/misc/vdirsyncer/default.nix
+++ /dev/null
@@ -1,74 +0,0 @@
-{ stdenv, python3Packages, fetchFromGitHub, fetchpatch, rustPlatform, pkgconfig, openssl, CoreServices, Security }:
-
-# Packaging documentation at:
-# https://github.com/untitaker/vdirsyncer/blob/master/docs/packaging.rst
-python3Packages.buildPythonApplication rec {
- version = "unstable-2018-08-05";
- pname = "vdirsyncer";
- name = "${pname}-${version}";
-
- src = fetchFromGitHub {
- owner = "spk";
- repo = pname;
- # fix-build-style branch, see https://github.com/pimutils/vdirsyncer/pull/798
- rev = "2c62d03bd73f8b44a47c2e769ade046697896ae9";
- sha256 = "1q6xvzz5rf5sqdaj3mdvhpgwy5b16isavgg7vardgjwqwv1yal28";
- };
-
- native = rustPlatform.buildRustPackage {
- name = "${name}-native";
- inherit src;
- sourceRoot = "source/rust";
- cargoSha256 = "0cqy0s55pkg6hww86h7qip4xaidh6g8lcypdj84n2x374jq38c5d";
- nativeBuildInputs = [ pkgconfig ];
- buildInputs = [ openssl ] ++ stdenv.lib.optionals stdenv.isDarwin [ CoreServices Security ];
- };
-
- propagatedBuildInputs = with python3Packages; [
- click click-log click-threading
- requests_toolbelt
- requests
- requests_oauthlib # required for google oauth sync
- atomicwrites
- milksnake
- shippai
- ];
-
- nativeBuildInputs = with python3Packages; [ setuptools_scm ];
-
- checkInputs = with python3Packages; [ hypothesis pytest pytest-localserver pytest-subtesthack ];
-
- patches = [
- (fetchpatch {
- url = "https://github.com/pimutils/vdirsyncer/commit/7b636e8e40d69c495901f965b9c0686513659e44.patch";
- sha256 = "0vl942ii5iad47y63v0ngmhfp37n30nxyk4j7h64b95fk38vfwx9";
- })
- ];
-
- postPatch = ''
- # see https://github.com/pimutils/vdirsyncer/pull/805
- substituteInPlace setup.cfg --replace --duration --durations
-
- # for setuptools_scm:
- echo 'Version: ${version}' >PKG-INFO
-
- sed -i 's/spec.add_external_build(cmd=cmd/spec.add_external_build(cmd="true"/g' setup.py
- '';
-
- preBuild = ''
- mkdir -p rust/target/release
- ln -s ${native}/lib/libvdirsyncer_rustext* rust/target/release/
- '';
-
- checkPhase = ''
- rm -rf vdirsyncer
- make DETERMINISTIC_TESTS=true test
- '';
-
- meta = with stdenv.lib; {
- homepage = "https://github.com/pimutils/vdirsyncer";
- description = "Synchronize calendars and contacts";
- maintainers = with maintainers; [ matthiasbeyer gebner ];
- license = licenses.mit;
- };
-}
diff --git a/nixpkgs/pkgs/tools/misc/vdirsyncer/stable.nix b/nixpkgs/pkgs/tools/misc/vdirsyncer/stable.nix
deleted file mode 100644
index d3fe47001d1..00000000000
--- a/nixpkgs/pkgs/tools/misc/vdirsyncer/stable.nix
+++ /dev/null
@@ -1,52 +0,0 @@
-{ lib, python3Packages, fetchpatch }:
-
-# Packaging documentation at:
-# https://github.com/pimutils/vdirsyncer/blob/0.16.7/docs/packaging.rst
-python3Packages.buildPythonApplication rec {
- version = "0.16.7";
- pname = "vdirsyncer";
-
- src = python3Packages.fetchPypi {
- inherit pname version;
- sha256 = "6c9bcfb9bcb01246c83ba6f8551cf54c58af3323210755485fc23bb7848512ef";
- };
-
- propagatedBuildInputs = with python3Packages; [
- click click-log click-threading
- requests_toolbelt
- requests
- requests_oauthlib # required for google oauth sync
- atomicwrites
- ];
-
- nativeBuildInputs = with python3Packages; [ setuptools_scm ];
-
- checkInputs = with python3Packages; [ hypothesis pytest pytest-localserver pytest-subtesthack ];
-
- patches = [
- # Fixes for hypothesis: https://github.com/pimutils/vdirsyncer/pull/779
- (fetchpatch {
- url = "https://github.com/pimutils/vdirsyncer/commit/22ad88a6b18b0979c5d1f1d610c1d2f8f87f4b89.patch";
- sha256 = "0dbzj6jlxhdidnm3i21a758z83sdiwzhpd45pbkhycfhgmqmhjpl";
- })
- ];
-
- postPatch = ''
- # Invalid argument: 'perform_health_check' is not a valid setting
- substituteInPlace tests/conftest.py \
- --replace "perform_health_check=False" ""
- substituteInPlace tests/unit/test_repair.py \
- --replace $'@settings(perform_health_check=False) # Using the random module for UIDs\n' ""
- '';
-
- checkPhase = ''
- make DETERMINISTIC_TESTS=true test
- '';
-
- meta = with lib; {
- homepage = "https://github.com/pimutils/vdirsyncer";
- description = "Synchronize calendars and contacts";
- license = licenses.mit;
- maintainers = with maintainers; [ loewenheim ];
- };
-}
diff --git a/nixpkgs/pkgs/tools/misc/vttest/default.nix b/nixpkgs/pkgs/tools/misc/vttest/default.nix
index 38fedbbf099..6a9a12b2a07 100644
--- a/nixpkgs/pkgs/tools/misc/vttest/default.nix
+++ b/nixpkgs/pkgs/tools/misc/vttest/default.nix
@@ -2,14 +2,14 @@
stdenv.mkDerivation rec {
pname = "vttest";
- version = "20200303";
+ version = "20200420";
src = fetchurl {
urls = [
"https://invisible-mirror.net/archives/${pname}/${pname}-${version}.tgz"
"ftp://ftp.invisible-island.net/${pname}/${pname}-${version}.tgz"
];
- sha256 = "1g27yp37kh57hmwicw3ndnsapsbqzk2cnjccmvyj4zw2z0l5iaj9";
+ sha256 = "03li63v9mbsqn4cw6d769r1a6iaixi80m2c32y32vc9i5k3ik43c";
};
meta = with stdenv.lib; {
diff --git a/nixpkgs/pkgs/tools/misc/websocat/default.nix b/nixpkgs/pkgs/tools/misc/websocat/default.nix
index 14617f207db..7870974531e 100644
--- a/nixpkgs/pkgs/tools/misc/websocat/default.nix
+++ b/nixpkgs/pkgs/tools/misc/websocat/default.nix
@@ -1,4 +1,4 @@
-{ stdenv, fetchFromGitHub, pkgconfig, openssl, rustPlatform, Security }:
+{ stdenv, fetchFromGitHub, pkgconfig, openssl, rustPlatform, Security, makeWrapper, bash }:
rustPlatform.buildRustPackage rec {
pname = "websocat";
@@ -14,9 +14,17 @@ rustPlatform.buildRustPackage rec {
cargoBuildFlags = [ "--features=ssl" ];
cargoSha256 = "09chj0bgf4r8v5cjq0hvb84zvh98nrzrh1m0wdqjy5gi7zc30cis";
- nativeBuildInputs = [ pkgconfig ];
+ nativeBuildInputs = [ pkgconfig makeWrapper ];
buildInputs = [ openssl ] ++ stdenv.lib.optional stdenv.isDarwin Security;
+ # The wrapping is required so that the "sh-c" option of websocat works even
+ # if sh is not in the PATH (as can happen, for instance, when websocat is
+ # started as a systemd service).
+ postInstall = ''
+ wrapProgram $out/bin/websocat \
+ --prefix PATH : ${stdenv.lib.makeBinPath [ bash ]}
+ '';
+
meta = with stdenv.lib; {
description = "Command-line client for WebSockets (like netcat/socat)";
homepage = "https://github.com/vi/websocat";
diff --git a/nixpkgs/pkgs/tools/misc/woeusb/default.nix b/nixpkgs/pkgs/tools/misc/woeusb/default.nix
index 4c235b4866f..991ab622490 100644
--- a/nixpkgs/pkgs/tools/misc/woeusb/default.nix
+++ b/nixpkgs/pkgs/tools/misc/woeusb/default.nix
@@ -1,5 +1,5 @@
{ stdenv, fetchFromGitHub, autoreconfHook, makeWrapper
-, coreutils, dosfstools, findutils, gawk, gnugrep, grub2_light, ncurses, ntfs3g, parted, p7zip, utillinux, wget
+, coreutils, dosfstools, findutils, gawk, gnugrep, grub2_light, ncurses, ntfs3g, parted, utillinux, wget
, wxGTK30 }:
stdenv.mkDerivation rec {
@@ -39,7 +39,7 @@ stdenv.mkDerivation rec {
# should be patched with a less useless default PATH, but for now
# we add everything we need manually.
wrapProgram "$out/bin/woeusb" \
- --set PATH '${stdenv.lib.makeBinPath [ coreutils dosfstools findutils gawk gnugrep grub2_light ncurses ntfs3g parted utillinux wget p7zip ]}'
+ --set PATH '${stdenv.lib.makeBinPath [ coreutils dosfstools findutils gawk gnugrep grub2_light ncurses ntfs3g parted utillinux wget ]}'
'';
doInstallCheck = true;
diff --git a/nixpkgs/pkgs/tools/misc/xburst-tools/default.nix b/nixpkgs/pkgs/tools/misc/xburst-tools/default.nix
index 48045999329..12acbcfbe1c 100644
--- a/nixpkgs/pkgs/tools/misc/xburst-tools/default.nix
+++ b/nixpkgs/pkgs/tools/misc/xburst-tools/default.nix
@@ -1,4 +1,4 @@
-{ stdenv, fetchgit, libusb, libusb1, autoconf, automake, libconfuse, pkgconfig
+{ stdenv, fetchgit, libusb-compat-0_1, libusb1, autoconf, automake, libconfuse, pkgconfig
, gccCross ? null
}:
@@ -30,7 +30,7 @@ stdenv.mkDerivation {
dontCrossStrip = true;
nativeBuildInputs = [ autoconf automake pkgconfig ];
- buildInputs = [ libusb libusb1 libconfuse ] ++
+ buildInputs = [ libusb-compat-0_1 libusb1 libconfuse ] ++
stdenv.lib.optional (gccCross != null) gccCross;
meta = {
diff --git a/nixpkgs/pkgs/tools/misc/youtube-dl/default.nix b/nixpkgs/pkgs/tools/misc/youtube-dl/default.nix
index 7b58ccfa853..4b399abb61e 100644
--- a/nixpkgs/pkgs/tools/misc/youtube-dl/default.nix
+++ b/nixpkgs/pkgs/tools/misc/youtube-dl/default.nix
@@ -18,11 +18,11 @@ buildPythonPackage rec {
# The websites youtube-dl deals with are a very moving target. That means that
# downloads break constantly. Because of that, updates should always be backported
# to the latest stable release.
- version = "2020.03.24";
+ version = "2020.05.08";
src = fetchurl {
url = "https://yt-dl.org/downloads/${version}/${pname}-${version}.tar.gz";
- sha256 = "05l4asakakxn53wrvxn6c03fd80zdizdbj6r2cj8c1ja3sj9i8s5";
+ sha256 = "16zxa8ss2rka7cvkqyi67s8i1h9f4nxx88w9vjbxchbga6w0scc6";
};
nativeBuildInputs = [ installShellFiles makeWrapper ];
diff --git a/nixpkgs/pkgs/tools/misc/yubikey-personalization/default.nix b/nixpkgs/pkgs/tools/misc/yubikey-personalization/default.nix
index 41cb53d9d3b..5ef828762f6 100644
--- a/nixpkgs/pkgs/tools/misc/yubikey-personalization/default.nix
+++ b/nixpkgs/pkgs/tools/misc/yubikey-personalization/default.nix
@@ -1,4 +1,4 @@
-{ stdenv, fetchurl, pkgconfig, libusb, libyubikey, json_c }:
+{ stdenv, fetchurl, pkgconfig, libusb1, libyubikey, json_c }:
stdenv.mkDerivation rec {
pname = "yubikey-personalization";
@@ -10,7 +10,7 @@ stdenv.mkDerivation rec {
};
nativeBuildInputs = [ pkgconfig ];
- buildInputs = [ libusb libyubikey json_c ];
+ buildInputs = [ libusb1 libyubikey json_c ];
configureFlags = [
"--with-backend=libusb-1.0"
diff --git a/nixpkgs/pkgs/tools/misc/zoxide/default.nix b/nixpkgs/pkgs/tools/misc/zoxide/default.nix
index a43d41637b1..d2abd143ce4 100644
--- a/nixpkgs/pkgs/tools/misc/zoxide/default.nix
+++ b/nixpkgs/pkgs/tools/misc/zoxide/default.nix
@@ -6,20 +6,20 @@
rustPlatform.buildRustPackage rec {
pname = "zoxide";
- version = "0.3.1";
+ version = "0.4.0";
src = fetchFromGitHub {
owner = "ajeetdsouza";
repo = "zoxide";
rev = "v${version}";
- sha256 = "1sad18d0pxfdy9gvjmixzgdskg1l7djvzp0aipx7pz0lyi6gs23z";
+ sha256 = "1qkvmjrkcivfzbm6swl5lgvpqz9av9jxcn9i8ms3wz4vfsibmlxv";
};
buildInputs = [
fzf
];
- cargoSha256 = "1sx3s1jnfxylbjr3x6v6j8a6zkl7hfyj4alzlyrsw36b1b64pwqm";
+ cargoSha256 = "1w921f7b6kzc1mjzff1bcs3mg4cp9h48698w2zlv5jzjs7nwgb8n";
meta = with lib; {
description = "A fast cd command that learns your habits";
diff --git a/nixpkgs/pkgs/tools/networking/amass/default.nix b/nixpkgs/pkgs/tools/networking/amass/default.nix
index 6398c4b91f1..1a2cf502651 100644
--- a/nixpkgs/pkgs/tools/networking/amass/default.nix
+++ b/nixpkgs/pkgs/tools/networking/amass/default.nix
@@ -5,16 +5,16 @@
buildGoModule rec {
pname = "amass";
- version = "3.5.4";
+ version = "3.6.0";
src = fetchFromGitHub {
owner = "OWASP";
repo = "Amass";
rev = "v${version}";
- sha256 = "0sxcyrlgqajmlsicr4j2b8hq2fzw8ai1xsq176bz0f33q9m9wvhf";
+ sha256 = "05rh61dx4f9kv5p8sahhwwiyivwq438fl30j9d97i4sagvb5jvvm";
};
- modSha256 = "1yjvwkm2zaf017lai5xl088x1z1ifwsbw56dagyf8z9jk9lhkcj7";
+ vendorSha256 = "1f8za3z5pv1pznbd91fk5j4y8qg93qk5zvnchjl7inyirciawdf6";
outputs = [ "out" "wordlists" ];
diff --git a/nixpkgs/pkgs/tools/networking/aria2/default.nix b/nixpkgs/pkgs/tools/networking/aria2/default.nix
index 6c596e77af8..5ede0db598c 100644
--- a/nixpkgs/pkgs/tools/networking/aria2/default.nix
+++ b/nixpkgs/pkgs/tools/networking/aria2/default.nix
@@ -20,7 +20,12 @@ stdenv.mkDerivation rec {
buildInputs = [ openssl c-ares libxml2 sqlite zlib libssh2 ] ++
stdenv.lib.optional stdenv.isDarwin Security;
- configureFlags = [ "--with-ca-bundle=/etc/ssl/certs/ca-certificates.crt" ];
+ outputs = [ "bin" "dev" "out" "doc" "man" ];
+
+ configureFlags = [
+ "--with-ca-bundle=/etc/ssl/certs/ca-certificates.crt"
+ "--enable-libaria2"
+ ];
prePatch = ''
patchShebangs doc/manual-src/en/mkapiref.py
diff --git a/nixpkgs/pkgs/tools/networking/assh/default.nix b/nixpkgs/pkgs/tools/networking/assh/default.nix
index 9d4230524be..7b796a52e3a 100644
--- a/nixpkgs/pkgs/tools/networking/assh/default.nix
+++ b/nixpkgs/pkgs/tools/networking/assh/default.nix
@@ -10,7 +10,7 @@ buildGoPackage rec {
nativeBuildInputs = [ makeWrapper ];
postInstall = ''
- wrapProgram "$bin/bin/assh" \
+ wrapProgram "$out/bin/assh" \
--prefix PATH : ${openssh}/bin
'';
diff --git a/nixpkgs/pkgs/tools/networking/babeld/default.nix b/nixpkgs/pkgs/tools/networking/babeld/default.nix
index a2f486717da..debd918eb39 100644
--- a/nixpkgs/pkgs/tools/networking/babeld/default.nix
+++ b/nixpkgs/pkgs/tools/networking/babeld/default.nix
@@ -2,11 +2,11 @@
stdenv.mkDerivation rec {
pname = "babeld";
- version = "1.9.1";
+ version = "1.9.2";
src = fetchurl {
url = "http://www.pps.univ-paris-diderot.fr/~jch/software/files/${pname}-${version}.tar.gz";
- sha256 = "1d503igqv9s5pgrhvxp1czjy2xfsjhagyyh2iny7g4cjvl0kq6qy";
+ sha256 = "01vzhrspnm4sy9ggaz9n3bfl5hy3qlynr218j3mdcddzm3h00kqm";
};
preBuild = ''
diff --git a/nixpkgs/pkgs/tools/networking/bandwhich/default.nix b/nixpkgs/pkgs/tools/networking/bandwhich/default.nix
index 7522b1629cc..1a52a7f8987 100644
--- a/nixpkgs/pkgs/tools/networking/bandwhich/default.nix
+++ b/nixpkgs/pkgs/tools/networking/bandwhich/default.nix
@@ -2,16 +2,16 @@
rustPlatform.buildRustPackage rec {
pname = "bandwhich";
- version = "0.13.0";
+ version = "0.14.0";
src = fetchFromGitHub {
owner = "imsnif";
repo = pname;
rev = version;
- sha256 = "0xcn65j2q2pmbvrd5dkjg8anw1r12vizazr1wz4cinhrpsxx8p1p";
+ sha256 = "09lyl9cpb5li7kyh0y78lhgvvb24ssfjmkz65xzbgm5jyrz8rmr4";
};
- cargoSha256 = "16nkmmkla3dlz40qhy04sknm3p2f5qik0ijczcw5ibg5w1jsydfr";
+ cargoSha256 = "0m57cdbghzzjyxr6c0diyrfsjqip1dnqsh0zlapv8myizxy4rrzy";
buildInputs = stdenv.lib.optional stdenv.isDarwin Security;
diff --git a/nixpkgs/pkgs/tools/networking/cassowary/default.nix b/nixpkgs/pkgs/tools/networking/cassowary/default.nix
index 6156f43b04b..be1df339439 100644
--- a/nixpkgs/pkgs/tools/networking/cassowary/default.nix
+++ b/nixpkgs/pkgs/tools/networking/cassowary/default.nix
@@ -11,7 +11,7 @@ buildGoModule rec {
sha256 = "0p5vcs25h5nj36dm9yjmdjymcq0zldm3zlqfppxcjx862h48k8zj";
};
- modSha256 = "1iylnnmj5slji89pkb3shp4xqar1zbpl7bzwddbzpp8y52fmsv1c";
+ vendorSha256 = "1m5jaqf5jrib415k0i7w6rf5bjjwfn572wk94jwfpwjcbbvh8fck";
buildFlagsArray = [ "-ldflags=-s -w -X main.version=${version}" ];
@@ -22,4 +22,4 @@ buildGoModule rec {
maintainers = with maintainers; [ hugoreeves ];
platforms = platforms.unix;
};
-}
+} \ No newline at end of file
diff --git a/nixpkgs/pkgs/tools/networking/cjdns/default.nix b/nixpkgs/pkgs/tools/networking/cjdns/default.nix
index 452181754b1..9a74344d293 100644
--- a/nixpkgs/pkgs/tools/networking/cjdns/default.nix
+++ b/nixpkgs/pkgs/tools/networking/cjdns/default.nix
@@ -1,4 +1,4 @@
-{ stdenv, fetchFromGitHub, nodejs, which, python27, utillinux }:
+{ stdenv, fetchFromGitHub, nodejs, which, python27, utillinux, nixosTests }:
let version = "20.6"; in
stdenv.mkDerivation {
@@ -29,6 +29,8 @@ stdenv.mkDerivation {
cp -R contrib tools node_build node_modules $out/share/cjdns/
'';
+ passthru.tests.basic = nixosTests.cjdns;
+
meta = with stdenv.lib; {
homepage = "https://github.com/cjdelisle/cjdns";
description = "Encrypted networking for regular people";
diff --git a/nixpkgs/pkgs/tools/networking/clash/default.nix b/nixpkgs/pkgs/tools/networking/clash/default.nix
index 12bfad0c8df..af21e9d4fef 100644
--- a/nixpkgs/pkgs/tools/networking/clash/default.nix
+++ b/nixpkgs/pkgs/tools/networking/clash/default.nix
@@ -2,17 +2,17 @@
buildGoModule rec {
pname = "clash";
- version = "0.19.0";
+ version = "0.20.0";
src = fetchFromGitHub {
owner = "Dreamacro";
repo = pname;
rev = "v${version}";
- sha256 = "08zwrnpiihlir83fryani8pr972lmj1sjvhjc5pzlw1hks88i9m2";
+ sha256 = "1nb4hl9x2lj0hy8byz14c2xn6yhrb6pqmhzl002k83qd3zrc6s3p";
};
goPackagePath = "github.com/Dreamacro/clash";
- modSha256 = "05i8mzhxzkgcmaa4gazfl8pq3n8mc4prww0ghl6m28cy7a0vsh7f";
+ vendorSha256 = "0nh3cn31p7yhnhjzqp84dnhzy3hag253bjp70w8q03lw7mkhdgz3";
buildFlagsArray = [
"-ldflags="
@@ -26,4 +26,4 @@ buildGoModule rec {
maintainers = with maintainers; [ contrun filalex77 ];
platforms = platforms.all;
};
-}
+} \ No newline at end of file
diff --git a/nixpkgs/pkgs/tools/networking/corerad/default.nix b/nixpkgs/pkgs/tools/networking/corerad/default.nix
index 7be61d0e853..eef345c8db6 100644
--- a/nixpkgs/pkgs/tools/networking/corerad/default.nix
+++ b/nixpkgs/pkgs/tools/networking/corerad/default.nix
@@ -2,23 +2,25 @@
buildGoModule rec {
pname = "corerad";
- version = "0.2.3";
+ version = "0.2.4";
src = fetchFromGitHub {
owner = "mdlayher";
repo = "corerad";
rev = "v${version}";
- sha256 = "1594qrwrz4bc3iipm4aqb8l1zyi04pwmiz0vdlfn12qn1p7lad5p";
+ sha256 = "1r9kvz1ylrnfc7y5c4knqhx6xngh1p8j1axb8bd7h7p51c4i7jz2";
};
- modSha256 = "1cfhxkvwzf7sn227y6h5h19f27a9ngmpnyqdlfba5km8axqn29vm";
+ vendorSha256 = "0ncwf197dx6mqzg69mnyp0iyad585izmydm0yj8ikd0y8ngpx7a3";
buildFlagsArray = ''
-ldflags=
- -X github.com/mdlayher/corerad/internal/build.linkTimestamp=1586881022
+ -X github.com/mdlayher/corerad/internal/build.linkTimestamp=1589133047
-X github.com/mdlayher/corerad/internal/build.linkVersion=v${version}
'';
+ deleteVendor = true;
+
meta = with stdenv.lib; {
homepage = "https://github.com/mdlayher/corerad";
description = "CoreRAD extensible and observable IPv6 NDP RA daemon";
diff --git a/nixpkgs/pkgs/tools/networking/croc/default.nix b/nixpkgs/pkgs/tools/networking/croc/default.nix
index b4a74b62003..ba31e13c892 100644
--- a/nixpkgs/pkgs/tools/networking/croc/default.nix
+++ b/nixpkgs/pkgs/tools/networking/croc/default.nix
@@ -2,16 +2,16 @@
buildGoModule rec {
pname = "croc";
- version = "8.0.7";
+ version = "8.0.9";
src = fetchFromGitHub {
owner = "schollz";
repo = pname;
rev = "v${version}";
- sha256 = "06iwb2wm9wwcwl88rqhwbrky2ab0kbcyzmcv89vw533glknycw04";
+ sha256 = "0kwpn1nv93f8swzc70j8srddqz7qb33pxc9nhqrd92jhcl4cc7iv";
};
- modSha256 = "1gjigbc9511h3qd12j9ypdnmb5ia4x9f2mk7mxasy9p2xkcfyhpg";
+ vendorSha256 = "1vl5yz3z5z30rxnnxy74g2m5025vbisqyv31nc21kxdfrdqrwp6c";
subPackages = [ "." ];
@@ -34,4 +34,4 @@ buildGoModule rec {
- Does not require a server or port-forwarding
'';
};
-}
+} \ No newline at end of file
diff --git a/nixpkgs/pkgs/tools/networking/curl/default.nix b/nixpkgs/pkgs/tools/networking/curl/default.nix
index d173b42dfc4..ba54b2c5671 100644
--- a/nixpkgs/pkgs/tools/networking/curl/default.nix
+++ b/nixpkgs/pkgs/tools/networking/curl/default.nix
@@ -28,14 +28,14 @@ assert brotliSupport -> brotli != null;
assert gssSupport -> libkrb5 != null;
stdenv.mkDerivation rec {
- name = "curl-7.68.0";
+ name = "curl-7.69.1";
src = fetchurl {
urls = [
"https://curl.haxx.se/download/${name}.tar.bz2"
"https://github.com/curl/curl/releases/download/${lib.replaceStrings ["."] ["_"] name}/${name}.tar.bz2"
];
- sha256 = "1fgf4f33wj25jk6lkpxmrvmfnnxvc66z3k3561rxr8nngn8m8zr0";
+ sha256 = "1s2ddjjif1wkp69vx25nzxklhimgqzaazfzliyl6mpvsa2yybx9g";
};
outputs = [ "bin" "dev" "out" "man" "devdoc" ];
diff --git a/nixpkgs/pkgs/tools/networking/curlie/default.nix b/nixpkgs/pkgs/tools/networking/curlie/default.nix
index 179181fc49c..cb1cf8d97fa 100644
--- a/nixpkgs/pkgs/tools/networking/curlie/default.nix
+++ b/nixpkgs/pkgs/tools/networking/curlie/default.nix
@@ -11,7 +11,7 @@ buildGoModule rec {
sha256 = "09v8alrbw6qva3q3bcqxnyjm7svagfxqvhdff7cqf5pbmkxnhln9";
};
- modSha256 = "18nwq99vv3nbdwfilfn8v64mn58jviwybi93li0lcg7779nxab3d";
+ vendorSha256 = "1mxgf004czf65a2mv99gfp27g98xhllmfcz4ynfv66nfkbfz6a8n";
meta = with lib; {
description = "Curlie is a frontend to curl that adds the ease of use of httpie, without compromising on features and performance";
@@ -19,4 +19,4 @@ buildGoModule rec {
maintainers = with maintainers; [ ma27 ];
license = licenses.mit;
};
-}
+} \ No newline at end of file
diff --git a/nixpkgs/pkgs/tools/networking/davix/default.nix b/nixpkgs/pkgs/tools/networking/davix/default.nix
index 9f1eff220c3..797791e1c0b 100644
--- a/nixpkgs/pkgs/tools/networking/davix/default.nix
+++ b/nixpkgs/pkgs/tools/networking/davix/default.nix
@@ -1,17 +1,17 @@
{ stdenv, fetchurl, cmake, pkgconfig, openssl, libxml2, boost, python3, libuuid }:
stdenv.mkDerivation rec {
- version = "0.7.5";
+ version = "0.7.6";
pname = "davix";
nativeBuildInputs = [ cmake pkgconfig python3 ];
buildInputs = [ openssl libxml2 boost libuuid ];
- # using the url below since the 0.7.5 release did carry a broken CMake file,
+ # using the url below since the 0.7.6 release did carry a broken CMake file,
# supposedly fixed in the next release
# https://github.com/cern-fts/davix/issues/40
src = fetchurl {
url = "http://grid-deployment.web.cern.ch/grid-deployment/dms/lcgutil/tar/davix/${version}/davix-${version}.tar.gz";
- sha256 = "1j3gzsjhzrsk6irxalc3rwgp9cqb52chriadmy1mv1s6d2bwl86r";
+ sha256 = "0wq66spnr616cns72f9dvr2xfvkdvfqqmc6d7dx29fpp57zzvrx2";
};
diff --git a/nixpkgs/pkgs/tools/networking/dd-agent/datadog-agent.nix b/nixpkgs/pkgs/tools/networking/dd-agent/datadog-agent.nix
index 57d7244148d..dc29a95d92b 100644
--- a/nixpkgs/pkgs/tools/networking/dd-agent/datadog-agent.nix
+++ b/nixpkgs/pkgs/tools/networking/dd-agent/datadog-agent.nix
@@ -47,8 +47,8 @@ in buildGoPackage rec {
# DataDog use paths relative to the agent binary, so fix these.
postPatch = ''
- sed -e "s|PyChecksPath =.*|PyChecksPath = \"$bin/${python.sitePackages}\"|" \
- -e "s|distPath =.*|distPath = \"$bin/share/datadog-agent\"|" \
+ sed -e "s|PyChecksPath =.*|PyChecksPath = \"$out/${python.sitePackages}\"|" \
+ -e "s|distPath =.*|distPath = \"$out/share/datadog-agent\"|" \
-i cmd/agent/common/common_nix.go
sed -e "s|/bin/hostname|${lib.getBin hostname}/bin/hostname|" \
-i pkg/util/hostname_nix.go
@@ -57,14 +57,14 @@ in buildGoPackage rec {
# Install the config files and python modules from the "dist" dir
# into standard paths.
postInstall = ''
- mkdir -p $bin/${python.sitePackages} $bin/share/datadog-agent
- cp -R $src/cmd/agent/dist/conf.d $bin/share/datadog-agent
- cp -R $src/cmd/agent/dist/{checks,utils,config.py} $bin/${python.sitePackages}
+ mkdir -p $out/${python.sitePackages} $out/share/datadog-agent
+ cp -R $src/cmd/agent/dist/conf.d $out/share/datadog-agent
+ cp -R $src/cmd/agent/dist/{checks,utils,config.py} $out/${python.sitePackages}
- cp -R $src/pkg/status/dist/templates $bin/share/datadog-agent
+ cp -R $src/pkg/status/dist/templates $out/share/datadog-agent
- wrapProgram "$bin/bin/agent" \
- --set PYTHONPATH "$bin/${python.sitePackages}" \
+ wrapProgram "$out/bin/agent" \
+ --set PYTHONPATH "$out/${python.sitePackages}" \
--prefix LD_LIBRARY_PATH : ${systemd.lib}/lib
'';
diff --git a/nixpkgs/pkgs/tools/networking/dnsmasq/default.nix b/nixpkgs/pkgs/tools/networking/dnsmasq/default.nix
index 667eb9feb0c..055f92141b2 100644
--- a/nixpkgs/pkgs/tools/networking/dnsmasq/default.nix
+++ b/nixpkgs/pkgs/tools/networking/dnsmasq/default.nix
@@ -12,21 +12,13 @@ let
]);
in
stdenv.mkDerivation rec {
- name = "dnsmasq-2.80";
+ name = "dnsmasq-2.81";
src = fetchurl {
url = "http://www.thekelleys.org.uk/dnsmasq/${name}.tar.xz";
- sha256 = "1fv3g8vikj3sn37x1j6qsywn09w1jipvlv34j3q5qrljbrwa5ayd";
+ sha256 = "1yzq6anwgr5rlnwydpszb51cyhp2vjq29b24ck19flbwac1sk73l";
};
- patches = [
- # Fix build with nettle 3.5
- (fetchpatch {
- name = "nettle-3.5.patch";
- url = "thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=patch;h=ab73a746a0d6fcac2e682c5548eeb87fb9c9c82e";
- sha256 = "1hnixij3jp1p6zc3bx2dr92yyf9jp1ahhl9hiiq7bkbhbrw6mbic";
- })
- ];
postPatch = stdenv.lib.optionalString stdenv.hostPlatform.isLinux ''
sed '1i#include <linux/sockios.h>' -i src/dhcp.c
'';
diff --git a/nixpkgs/pkgs/tools/networking/dnsproxy/default.nix b/nixpkgs/pkgs/tools/networking/dnsproxy/default.nix
index 6f57e981239..a2b4f40f5a2 100644
--- a/nixpkgs/pkgs/tools/networking/dnsproxy/default.nix
+++ b/nixpkgs/pkgs/tools/networking/dnsproxy/default.nix
@@ -2,16 +2,16 @@
buildGoModule rec {
pname = "dnsproxy";
- version = "0.24.0";
+ version = "0.27.1";
src = fetchFromGitHub {
owner = "AdguardTeam";
repo = pname;
rev = "v${version}";
- sha256 = "1jwy2qi99ks6zcas6h1n0zq3b0k47036ayas0mprdips60azw0hg";
+ sha256 = "0nsj75aw5dym1pzn18p6fzh17vcryz1xs4xly6ga79dkpyijr9j8";
};
- modSha256 = "0kba3jay6m9ir1pc7i833p7ylbs610g0lkp8kc3gm47xnxy7j4gz";
+ vendorSha256 = null;
meta = with stdenv.lib; {
description = "Simple DNS proxy with DoH, DoT, and DNSCrypt support";
@@ -20,4 +20,4 @@ buildGoModule rec {
maintainers = with maintainers; [ contrun ];
platforms = platforms.all;
};
-}
+} \ No newline at end of file
diff --git a/nixpkgs/pkgs/tools/networking/drill/default.nix b/nixpkgs/pkgs/tools/networking/drill/default.nix
new file mode 100644
index 00000000000..572dc0d8384
--- /dev/null
+++ b/nixpkgs/pkgs/tools/networking/drill/default.nix
@@ -0,0 +1,33 @@
+{ stdenv
+, rustPlatform
+, fetchFromGitHub
+, pkg-config
+, openssl
+, Security
+}:
+
+rustPlatform.buildRustPackage rec {
+ pname = "drill";
+ version = "0.6.0";
+
+ src = fetchFromGitHub {
+ owner = "fcsonline";
+ repo = pname;
+ rev = version;
+ sha256 = "0pcc91nk68z7hlhj7xvh6v3rybxpy6bzv3pzjcyaq7l0szjljrpw";
+ };
+
+ cargoSha256 = "1611w8b60d3x16ik8v96za0mkr5p0f9gdpz0awprfgj6c3r6s16m";
+
+ nativeBuildInputs = stdenv.lib.optionals stdenv.isLinux [ pkg-config ];
+ buildInputs = [ ]
+ ++ stdenv.lib.optionals stdenv.isLinux [ openssl ]
+ ++ stdenv.lib.optionals stdenv.isDarwin [ Security ];
+
+ meta = with stdenv.lib; {
+ description = "HTTP load testing application inspired by Ansible syntax";
+ homepage = "https://github.com/fcsonline/drill";
+ license = licenses.gpl3;
+ maintainers = with maintainers; [ filalex77 ];
+ };
+}
diff --git a/nixpkgs/pkgs/tools/networking/ferm/default.nix b/nixpkgs/pkgs/tools/networking/ferm/default.nix
index dcd3fc6ae99..855a57b7720 100644
--- a/nixpkgs/pkgs/tools/networking/ferm/default.nix
+++ b/nixpkgs/pkgs/tools/networking/ferm/default.nix
@@ -1,23 +1,29 @@
{ stdenv, fetchurl, makeWrapper, perl, ebtables, ipset, iptables, nixosTests }:
-stdenv.mkDerivation rec {
- version = "2.4.1";
+let
+ inherit (stdenv.lib.versions) majorMinor;
+in stdenv.mkDerivation rec {
+ version = "2.5.1";
pname = "ferm";
src = fetchurl {
- url = "http://ferm.foo-projects.org/download/2.4/ferm-${version}.tar.xz";
- sha256 = "1fv8wk513yysp4q0i65rl2m0hg2lxwwgk9ppprsca1xcxrdpsvwa";
+ url = "http://ferm.foo-projects.org/download/${majorMinor version}/ferm-${version}.tar.xz";
+ sha256 = "0awl9s243sxgayr2fcmfks8xydhrmb9gy8bd9sfq738dgq7vybjb";
};
- buildInputs = [ perl ipset ebtables iptables makeWrapper ];
- preConfigure = ''
- substituteInPlace config.mk --replace "PERL = /usr/bin/perl" "PERL = ${perl}/bin/perl"
- substituteInPlace config.mk --replace "PREFIX = /usr" "PREFIX = $out"
- '';
+ # perl is used at build time to gather the ferm version.
+ nativeBuildInputs = [ makeWrapper perl ];
+ buildInputs = [ perl ];
+
+ makeFlags = [
+ "PERL=perl"
+ "PREFIX=${placeholder "out"}"
+ ];
+
postInstall = ''
rm -r $out/lib/systemd
for i in "$out/sbin/"*; do
- wrapProgram "$i" --prefix PATH : "${iptables}/bin:${ipset}/bin:${ebtables}/bin"
+ wrapProgram "$i" --prefix PATH : "${stdenv.lib.makeBinPath [ iptables ipset ebtables ]}"
done
'';
diff --git a/nixpkgs/pkgs/tools/networking/findomain/default.nix b/nixpkgs/pkgs/tools/networking/findomain/default.nix
index d5e801a6f92..e1944257698 100644
--- a/nixpkgs/pkgs/tools/networking/findomain/default.nix
+++ b/nixpkgs/pkgs/tools/networking/findomain/default.nix
@@ -9,16 +9,16 @@
rustPlatform.buildRustPackage rec {
pname = "findomain";
- version = "1.4.5";
+ version = "1.5.0";
src = fetchFromGitHub {
owner = "Edu4rdSHL";
repo = pname;
rev = version;
- sha256 = "1p4ddyqg1v27hf19n1ksmfvj5s6z2c8i13syb0anhlyzqy576hwb";
+ sha256 = "1w3parmk3836v5ghn3cgcxyk0alk05r5ljl3j1fpnly5xvl131rd";
};
- cargoSha256 = "0mdcj4almwziq1ph3imfdx41a96xq19sbjm7wsm9lxlzhvv256br";
+ cargoSha256 = "1cs076cgkzjan6y78a3bhriv2q2s83hp5vzhkjwz4dqn83r6b8hx";
nativeBuildInputs = [ installShellFiles perl ];
buildInputs = lib.optional stdenv.isDarwin Security;
diff --git a/nixpkgs/pkgs/tools/networking/fping/default.nix b/nixpkgs/pkgs/tools/networking/fping/default.nix
index 6d74cd2c78c..6a63a2047b2 100644
--- a/nixpkgs/pkgs/tools/networking/fping/default.nix
+++ b/nixpkgs/pkgs/tools/networking/fping/default.nix
@@ -13,7 +13,6 @@ stdenv.mkDerivation rec {
meta = with stdenv.lib; {
homepage = "http://fping.org/";
description = "Send ICMP echo probes to network hosts";
- maintainers = with maintainers; [ the-kenny ];
license = licenses.bsd0;
platforms = platforms.all;
};
diff --git a/nixpkgs/pkgs/tools/networking/frp/default.nix b/nixpkgs/pkgs/tools/networking/frp/default.nix
index f44e2208646..588f8a8c1cb 100644
--- a/nixpkgs/pkgs/tools/networking/frp/default.nix
+++ b/nixpkgs/pkgs/tools/networking/frp/default.nix
@@ -2,16 +2,16 @@
buildGoModule rec {
pname = "frp";
- version = "0.32.0";
+ version = "0.33.0";
src = fetchFromGitHub {
owner = "fatedier";
repo = pname;
rev = "v${version}";
- sha256 = "1hj3xy7ihwl66hyxc1m8k3fwgz5jyx1bd32f80d7266klhjqf6nw";
+ sha256 = "1z914p20n3i1bf4hx5iq2fylx1s49knb70cbg53ji2n7nrm1q33r";
};
- modSha256 = "1v90w5grc0vjpcp0m56d73zi0qnbswgz1rcvcwrjfa3rwqhigbal";
+ vendorSha256 = "0pi661mb5vwj16wwxnyx9b0ic7gzby6qfs3y4w00agn6sn5nahx2";
subPackages = [ "cmd/frpc" "cmd/frps" ];
@@ -28,4 +28,4 @@ buildGoModule rec {
maintainers = with maintainers; [ filalex77 ];
platforms = platforms.all;
};
-}
+} \ No newline at end of file
diff --git a/nixpkgs/pkgs/tools/networking/grpcui/default.nix b/nixpkgs/pkgs/tools/networking/grpcui/default.nix
index 58e698ed708..6bae95298fe 100644
--- a/nixpkgs/pkgs/tools/networking/grpcui/default.nix
+++ b/nixpkgs/pkgs/tools/networking/grpcui/default.nix
@@ -11,7 +11,7 @@ buildGoModule rec {
sha256 = "0dcah6bamjqyp9354qrd1cykdr5k5l93hh7qcy5b4nkag9531gl0";
};
- modSha256 = "1yq8484cjxad72nqsrim3zppr8hmn7dc6f8rgkw8fg952lqy5jjb";
+ vendorSha256 = "0m9nn8x0ji0n9v3d5w5z3grwv0zh8ijvh92jqjpcfv4bcjr5vsjr";
meta = with lib; {
description = "An interactive web UI for gRPC, along the lines of postman";
@@ -20,4 +20,4 @@ buildGoModule rec {
maintainers = with maintainers; [ pradyuman ];
platforms = platforms.linux ++ platforms.darwin;
};
-}
+} \ No newline at end of file
diff --git a/nixpkgs/pkgs/tools/networking/guardian-agent/default.nix b/nixpkgs/pkgs/tools/networking/guardian-agent/default.nix
index a5e8dc10d34..262234ca67b 100644
--- a/nixpkgs/pkgs/tools/networking/guardian-agent/default.nix
+++ b/nixpkgs/pkgs/tools/networking/guardian-agent/default.nix
@@ -23,14 +23,14 @@ buildGoPackage rec {
goDeps = ./deps.nix;
postInstall = ''
- mkdir -p $bin/bin $out/share/doc/${pname}
- cp -v ./go/src/github.com/StanfordSNR/${pname}/scripts/* $bin/bin/
+ mkdir -p $out/bin $out/share/doc/${pname}
+ cp -v ./go/src/github.com/StanfordSNR/${pname}/scripts/* $out/bin/
cp -vr ./go/src/github.com/StanfordSNR/${pname}/{AUTHORS,doc,LICENSE,README.md} $out/share/doc/guardian-agent
'';
postFixup = ''
- wrapProgram $bin/bin/sga-guard \
- --prefix PATH : "$bin/bin" \
+ wrapProgram $out/bin/sga-guard \
+ --prefix PATH : "$out/bin" \
--prefix PATH : "${autossh}/bin"
'';
diff --git a/nixpkgs/pkgs/tools/networking/gupnp-tools/default.nix b/nixpkgs/pkgs/tools/networking/gupnp-tools/default.nix
index 21857b0f79f..c93873caa07 100644
--- a/nixpkgs/pkgs/tools/networking/gupnp-tools/default.nix
+++ b/nixpkgs/pkgs/tools/networking/gupnp-tools/default.nix
@@ -51,7 +51,7 @@ stdenv.mkDerivation rec {
description = "Set of utilities and demos to work with UPnP";
homepage = "https://wiki.gnome.org/Projects/GUPnP";
license = licenses.gpl2Plus;
- maintainers = gnome3.maintainers;
+ maintainers = teams.gnome.members;
platforms = platforms.linux;
};
}
diff --git a/nixpkgs/pkgs/tools/networking/hey/default.nix b/nixpkgs/pkgs/tools/networking/hey/default.nix
index d65d5c9e323..8ed6ecbbf26 100644
--- a/nixpkgs/pkgs/tools/networking/hey/default.nix
+++ b/nixpkgs/pkgs/tools/networking/hey/default.nix
@@ -11,7 +11,7 @@ buildGoModule rec {
sha256 = "06w5hf0np0ayvjnfy8zgy605yrs5j326nk2gm0fy7amhwx1fzkwv";
};
- modSha256 = "0a00kcyagqczw0vhl8qs2xs1y8myw080y9kjs4qrcmj6kibdy55q";
+ vendorSha256 = null;
meta = with lib; {
description = "HTTP load generator, ApacheBench (ab) replacement";
@@ -19,4 +19,4 @@ buildGoModule rec {
license = licenses.asl20;
maintainers = with maintainers; [ filalex77 ];
};
-}
+} \ No newline at end of file
diff --git a/nixpkgs/pkgs/tools/networking/httpie/default.nix b/nixpkgs/pkgs/tools/networking/httpie/default.nix
index f97d868d7bd..01986bf9321 100644
--- a/nixpkgs/pkgs/tools/networking/httpie/default.nix
+++ b/nixpkgs/pkgs/tools/networking/httpie/default.nix
@@ -2,13 +2,13 @@
python3Packages.buildPythonApplication rec {
pname = "httpie";
- version = "2.0.0";
+ version = "2.1.0";
src = fetchFromGitHub {
owner = "jakubroztocil";
repo = "httpie";
rev = version;
- sha256 = "0d0rsn5i973l9y0ws3xmnzaw4jwxdlryyjbasnlddph5mvkf7dq0";
+ sha256 = "1vwjlzx830q4dcm3r7j9cl8yzka37dw42rl1r05m5ysb1081cbj2";
};
outputs = [ "out" "doc" "man" ];
diff --git a/nixpkgs/pkgs/tools/networking/httplz/cargo-lock.patch b/nixpkgs/pkgs/tools/networking/httplz/cargo-lock.patch
index 5ded54799a7..293d65f7a23 100644
--- a/nixpkgs/pkgs/tools/networking/httplz/cargo-lock.patch
+++ b/nixpkgs/pkgs/tools/networking/httplz/cargo-lock.patch
@@ -1,1269 +1,1275 @@
diff --git a/Cargo.lock b/Cargo.lock
new file mode 100644
-index 0000000..4b798fc
+index 0000000..722bfbd
--- /dev/null
+++ b/Cargo.lock
-@@ -0,0 +1,1263 @@
+@@ -0,0 +1,1269 @@
+# This file is automatically @generated by Cargo.
+# It is not intended for manual editing.
+[[package]]
+name = "adler32"
+version = "1.0.4"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "5d2e7343e7fc9de883d1b0341e0b13970f764c14101234857d2ddafa1cb1cac2"
+
+[[package]]
+name = "aho-corasick"
-+version = "0.7.6"
++version = "0.7.10"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "8716408b8bc624ed7f65d223ddb9ac2d044c0547b6fa4b0d554f3a9540496ada"
+dependencies = [
-+ "memchr 2.3.0 (registry+https://github.com/rust-lang/crates.io-index)",
++ "memchr",
+]
+
+[[package]]
+name = "ansi_term"
+version = "0.11.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "ee49baf6cb617b853aa8d93bf420db2383fab46d314482ca2803b40d5fde979b"
+dependencies = [
-+ "winapi 0.3.8 (registry+https://github.com/rust-lang/crates.io-index)",
++ "winapi",
+]
+
+[[package]]
+name = "antidote"
+version = "1.0.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "34fde25430d87a9388dadbe6e34d7f72a462c8b43ac8d309b42b0a8505d7e2a5"
+
+[[package]]
+name = "atty"
+version = "0.2.14"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "d9b39be18770d11421cdb1b9947a45dd3f37e93092cbf377614828a319d5fee8"
+dependencies = [
-+ "hermit-abi 0.1.6 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "libc 0.2.66 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "winapi 0.3.8 (registry+https://github.com/rust-lang/crates.io-index)",
++ "hermit-abi",
++ "libc",
++ "winapi",
+]
+
+[[package]]
+name = "autocfg"
+version = "0.1.7"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "1d49d90015b3c36167a20fe2810c5cd875ad504b39cff3d4eae7977e6b7c1cb2"
+
+[[package]]
+name = "autocfg"
+version = "1.0.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "f8aac770f1885fd7e387acedd76065302551364496e46b3dd00860b2f8359b9d"
+
+[[package]]
+name = "base64"
+version = "0.9.3"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "489d6c0ed21b11d038c31b6ceccca973e65d73ba3bd8ecb9a2babf5546164643"
+dependencies = [
-+ "byteorder 1.3.2 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "safemem 0.3.3 (registry+https://github.com/rust-lang/crates.io-index)",
++ "byteorder",
++ "safemem",
+]
+
+[[package]]
+name = "base64"
+version = "0.10.1"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "0b25d992356d2eb0ed82172f5248873db5560c4721f564b13cb5193bda5e668e"
+dependencies = [
-+ "byteorder 1.3.2 (registry+https://github.com/rust-lang/crates.io-index)",
++ "byteorder",
+]
+
+[[package]]
+name = "bitflags"
+version = "1.2.1"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "cf1de2fe8c75bc145a2f577add951f8134889b4795d47466a54a5c846d691693"
++
++[[package]]
++name = "bitstring"
++version = "0.1.1"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "3e54f7b7a46d7b183eb41e2d82965261fa8a1597c68b50aced268ee1fc70272d"
+
+[[package]]
+name = "brotli-sys"
+version = "0.3.2"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "4445dea95f4c2b41cde57cc9fee236ae4dbae88d8fcbdb4750fc1bb5d86aaecd"
+dependencies = [
-+ "cc 1.0.50 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "libc 0.2.66 (registry+https://github.com/rust-lang/crates.io-index)",
++ "cc",
++ "libc",
+]
+
+[[package]]
+name = "brotli2"
+version = "0.3.2"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "0cb036c3eade309815c15ddbacec5b22c4d1f3983a774ab2eac2e3e9ea85568e"
+dependencies = [
-+ "brotli-sys 0.3.2 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "libc 0.2.66 (registry+https://github.com/rust-lang/crates.io-index)",
++ "brotli-sys",
++ "libc",
+]
+
+[[package]]
+name = "byteorder"
-+version = "1.3.2"
++version = "1.3.4"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "08c48aae112d48ed9f069b33538ea9e3e90aa263cfa3d1c24309612b1f7472de"
+
+[[package]]
+name = "bzip2"
+version = "0.3.3"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "42b7c3cbf0fa9c1b82308d57191728ca0256cb821220f4e2fd410a72ade26e3b"
+dependencies = [
-+ "bzip2-sys 0.1.7 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "libc 0.2.66 (registry+https://github.com/rust-lang/crates.io-index)",
++ "bzip2-sys",
++ "libc",
+]
+
+[[package]]
+name = "bzip2-sys"
-+version = "0.1.7"
++version = "0.1.8+1.0.8"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "05305b41c5034ff0e93937ac64133d109b5a2660114ec45e9760bc6816d83038"
+dependencies = [
-+ "cc 1.0.50 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "libc 0.2.66 (registry+https://github.com/rust-lang/crates.io-index)",
-+]
-+
-+[[package]]
-+name = "c2-chacha"
-+version = "0.2.3"
-+source = "registry+https://github.com/rust-lang/crates.io-index"
-+dependencies = [
-+ "ppv-lite86 0.2.6 (registry+https://github.com/rust-lang/crates.io-index)",
++ "cc",
++ "libc",
+]
+
+[[package]]
+name = "cc"
-+version = "1.0.50"
++version = "1.0.52"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "c3d87b23d6a92cd03af510a5ade527033f6aa6fa92161e2d5863a907d4c5e31d"
+
+[[package]]
+name = "cfg-if"
+version = "0.1.10"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "4785bdd1c96b2a846b2bd7cc02e86b6b3dbf14e7e53446c4f54c92a361040822"
++
++[[package]]
++name = "cidr"
++version = "0.1.0"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "2da1cf0f275bb8dc1867a7f40cdb3b746951db73a183048e6e37fa89ed81bd01"
++dependencies = [
++ "bitstring",
++]
+
+[[package]]
+name = "clap"
+version = "2.33.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "5067f5bb2d80ef5d68b4c87db81601f0b75bca627bc2ef76b141d7b846a3c6d9"
+dependencies = [
-+ "ansi_term 0.11.0 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "atty 0.2.14 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "bitflags 1.2.1 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "strsim 0.8.0 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "textwrap 0.11.0 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "unicode-width 0.1.7 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "vec_map 0.8.1 (registry+https://github.com/rust-lang/crates.io-index)",
++ "ansi_term",
++ "atty",
++ "bitflags",
++ "strsim",
++ "textwrap",
++ "unicode-width",
++ "vec_map",
+]
+
+[[package]]
+name = "cloudabi"
+version = "0.0.3"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "ddfc5b9aa5d4507acaf872de71051dfd0e309860e88966e1051e462a077aac4f"
+dependencies = [
-+ "bitflags 1.2.1 (registry+https://github.com/rust-lang/crates.io-index)",
++ "bitflags",
+]
+
+[[package]]
+name = "core-foundation"
-+version = "0.6.4"
++version = "0.7.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "57d24c7a13c43e870e37c1556b74555437870a04514f7685f5b354e090567171"
+dependencies = [
-+ "core-foundation-sys 0.6.2 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "libc 0.2.66 (registry+https://github.com/rust-lang/crates.io-index)",
++ "core-foundation-sys",
++ "libc",
+]
+
+[[package]]
+name = "core-foundation-sys"
-+version = "0.6.2"
++version = "0.7.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "b3a71ab494c0b5b860bdc8407ae08978052417070c2ced38573a9157ad75b8ac"
+
+[[package]]
+name = "crc32fast"
+version = "1.2.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "ba125de2af0df55319f41944744ad91c71113bf74a4646efff39afe1f6842db1"
+dependencies = [
-+ "cfg-if 0.1.10 (registry+https://github.com/rust-lang/crates.io-index)",
++ "cfg-if",
+]
+
+[[package]]
+name = "ctrlc"
-+version = "3.1.3"
++version = "3.1.4"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "7a4ba686dff9fa4c1c9636ce1010b0cf98ceb421361b0bb3d6faeec43bd217a7"
+dependencies = [
-+ "nix 0.14.1 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "winapi 0.3.8 (registry+https://github.com/rust-lang/crates.io-index)",
++ "nix",
++ "winapi",
+]
+
+[[package]]
+name = "dtoa"
-+version = "0.4.4"
++version = "0.4.5"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "4358a9e11b9a09cf52383b451b49a169e8d797b68aa02301ff586d70d9661ea3"
+
+[[package]]
+name = "either"
+version = "1.5.3"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "bb1f6b1ce1c140482ea30ddd3335fc0024ac7ee112895426e0a629a6c20adfe3"
+
+[[package]]
+name = "embed-resource"
-+version = "1.3.1"
++version = "1.3.3"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "1f6b0b4403da80c2fd32333937dd468292c001d778c587ae759b75432772715d"
+dependencies = [
-+ "vswhom 0.1.0 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "winreg 0.6.2 (registry+https://github.com/rust-lang/crates.io-index)",
++ "vswhom",
++ "winreg",
+]
+
+[[package]]
+name = "flate2"
-+version = "1.0.13"
++version = "1.0.14"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "2cfff41391129e0a856d6d822600b8d71179d46879e310417eb9c762eb178b42"
+dependencies = [
-+ "cfg-if 0.1.10 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "crc32fast 1.2.0 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "libc 0.2.66 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "miniz_oxide 0.3.5 (registry+https://github.com/rust-lang/crates.io-index)",
++ "cfg-if",
++ "crc32fast",
++ "libc",
++ "miniz_oxide",
+]
+
+[[package]]
+name = "foreign-types"
+version = "0.3.2"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "f6f339eb8adc052cd2ca78910fda869aefa38d22d5cb648e6485e4d3fc06f3b1"
+dependencies = [
-+ "foreign-types-shared 0.1.1 (registry+https://github.com/rust-lang/crates.io-index)",
++ "foreign-types-shared",
+]
+
+[[package]]
+name = "foreign-types-shared"
+version = "0.1.1"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "00b0228411908ca8685dba7fc2cdd70ec9990a6e753e89b6ac91a84c40fbaf4b"
+
+[[package]]
+name = "fuchsia-cprng"
+version = "0.1.1"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "a06f77d526c1a601b7c4cdd98f54b5eaabffc14d5f2f0296febdc7f357c6d3ba"
+
+[[package]]
+name = "gcc"
+version = "0.3.55"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "8f5f3913fa0bfe7ee1fd8248b6b9f42a5af4b9d65ec2dd2c3c26132b950ecfc2"
+
+[[package]]
+name = "getrandom"
+version = "0.1.14"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "7abc8dd8451921606d809ba32e95b6111925cd2906060d2dcc29c070220503eb"
+dependencies = [
-+ "cfg-if 0.1.10 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "libc 0.2.66 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "wasi 0.9.0+wasi-snapshot-preview1 (registry+https://github.com/rust-lang/crates.io-index)",
++ "cfg-if",
++ "libc",
++ "wasi",
+]
+
+[[package]]
+name = "hermit-abi"
-+version = "0.1.6"
++version = "0.1.11"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "8a0d737e0f947a1864e93d33fdef4af8445a00d1ed8dc0c8ddb73139ea6abf15"
+dependencies = [
-+ "libc 0.2.66 (registry+https://github.com/rust-lang/crates.io-index)",
++ "libc",
+]
+
+[[package]]
+name = "httparse"
+version = "1.3.4"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "cd179ae861f0c2e53da70d892f5f3029f9594be0c41dc5269cd371691b1dc2f9"
+
+[[package]]
+name = "https"
-+version = "1.8.0"
-+dependencies = [
-+ "base64 0.10.1 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "brotli2 0.3.2 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "bzip2 0.3.3 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "cc 1.0.50 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "clap 2.33.0 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "ctrlc 3.1.3 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "embed-resource 1.3.1 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "flate2 1.0.13 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "hyper-native-tls 0.3.0 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "iron 0.6.1 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "itertools 0.8.2 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "lazy_static 1.4.0 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "lazysort 0.2.1 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "libc 0.2.66 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "md6 2.0.0 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "mime_guess 1.8.7 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "os-str-generic 0.2.0 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "percent-encoding 2.1.0 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "rand 0.7.3 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "regex 1.3.3 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "rfsapi 0.1.0 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "serde 0.9.15 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "serde_json 0.9.10 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "tabwriter 1.2.1 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "time 0.1.42 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "trivial_colours 0.3.0 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "unicase 2.6.0 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "walkdir 2.3.1 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "winapi 0.3.8 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "xml-rs 0.8.0 (registry+https://github.com/rust-lang/crates.io-index)",
++version = "1.9.2"
++dependencies = [
++ "base64 0.10.1",
++ "brotli2",
++ "bzip2",
++ "cc",
++ "cidr",
++ "clap",
++ "ctrlc",
++ "embed-resource",
++ "flate2",
++ "hyper-native-tls",
++ "iron",
++ "itertools",
++ "lazy_static",
++ "lazysort",
++ "libc",
++ "md6",
++ "mime_guess",
++ "os-str-generic",
++ "percent-encoding 2.1.0",
++ "rand 0.7.3",
++ "regex",
++ "rfsapi",
++ "serde",
++ "serde_json",
++ "tabwriter",
++ "time",
++ "trivial_colours",
++ "unicase 2.6.0",
++ "walkdir",
++ "winapi",
++ "xml-rs",
+]
+
+[[package]]
+name = "hyper"
+version = "0.10.16"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "0a0652d9a2609a968c14be1a9ea00bf4b1d64e2e1f53a1b51b6fff3a6e829273"
+dependencies = [
-+ "base64 0.9.3 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "httparse 1.3.4 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "language-tags 0.2.2 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "log 0.3.9 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "mime 0.2.6 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "num_cpus 1.12.0 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "time 0.1.42 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "traitobject 0.1.0 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "typeable 0.1.2 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "unicase 1.4.2 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "url 1.7.2 (registry+https://github.com/rust-lang/crates.io-index)",
++ "base64 0.9.3",
++ "httparse",
++ "language-tags",
++ "log 0.3.9",
++ "mime",
++ "num_cpus",
++ "time",
++ "traitobject",
++ "typeable",
++ "unicase 1.4.2",
++ "url",
+]
+
+[[package]]
+name = "hyper-native-tls"
+version = "0.3.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "6d375598f442742b0e66208ee12501391f1c7ac0bafb90b4fe53018f81f06068"
+dependencies = [
-+ "antidote 1.0.0 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "hyper 0.10.16 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "native-tls 0.2.3 (registry+https://github.com/rust-lang/crates.io-index)",
++ "antidote",
++ "hyper",
++ "native-tls",
+]
+
+[[package]]
+name = "idna"
+version = "0.1.5"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "38f09e0f0b1fb55fdee1f17470ad800da77af5186a1a76c026b679358b7e844e"
+dependencies = [
-+ "matches 0.1.8 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "unicode-bidi 0.3.4 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "unicode-normalization 0.1.12 (registry+https://github.com/rust-lang/crates.io-index)",
++ "matches",
++ "unicode-bidi",
++ "unicode-normalization",
+]
+
+[[package]]
+name = "iron"
+version = "0.6.1"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "c6d308ca2d884650a8bf9ed2ff4cb13fbb2207b71f64cda11dc9b892067295e8"
+dependencies = [
-+ "hyper 0.10.16 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "hyper-native-tls 0.3.0 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "log 0.3.9 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "mime_guess 1.8.7 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "modifier 0.1.0 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "num_cpus 1.12.0 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "plugin 0.2.6 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "typemap 0.3.3 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "url 1.7.2 (registry+https://github.com/rust-lang/crates.io-index)",
++ "hyper",
++ "hyper-native-tls",
++ "log 0.3.9",
++ "mime_guess",
++ "modifier",
++ "num_cpus",
++ "plugin",
++ "typemap",
++ "url",
+]
+
+[[package]]
+name = "itertools"
+version = "0.8.2"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "f56a2d0bc861f9165be4eb3442afd3c236d8a98afd426f65d92324ae1091a484"
+dependencies = [
-+ "either 1.5.3 (registry+https://github.com/rust-lang/crates.io-index)",
++ "either",
+]
+
+[[package]]
+name = "itoa"
+version = "0.3.4"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "8324a32baf01e2ae060e9de58ed0bc2320c9a2833491ee36cd3b4c414de4db8c"
+
+[[package]]
+name = "language-tags"
+version = "0.2.2"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "a91d884b6667cd606bb5a69aa0c99ba811a115fc68915e7056ec08a46e93199a"
+
+[[package]]
+name = "lazy_static"
+version = "1.4.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "e2abad23fbc42b3700f2f279844dc832adb2b2eb069b2df918f455c4e18cc646"
+
+[[package]]
+name = "lazysort"
+version = "0.2.1"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "d0e22ff43b231e0e2f87d74984e53ebc73b90ae13397e041214fb07efc64168f"
+
+[[package]]
+name = "libc"
-+version = "0.2.66"
++version = "0.2.69"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "99e85c08494b21a9054e7fe1374a732aeadaff3980b6990b94bfd3a70f690005"
+
+[[package]]
+name = "log"
+version = "0.3.9"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "e19e8d5c34a3e0e2223db8e060f9e8264aeeb5c5fc64a4ee9965c062211c024b"
+dependencies = [
-+ "log 0.4.8 (registry+https://github.com/rust-lang/crates.io-index)",
++ "log 0.4.8",
+]
+
+[[package]]
+name = "log"
+version = "0.4.8"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "14b6052be84e6b71ab17edffc2eeabf5c2c3ae1fdb464aae35ac50c67a44e1f7"
+dependencies = [
-+ "cfg-if 0.1.10 (registry+https://github.com/rust-lang/crates.io-index)",
++ "cfg-if",
+]
+
+[[package]]
+name = "matches"
+version = "0.1.8"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "7ffc5c5338469d4d3ea17d269fa8ea3512ad247247c30bd2df69e68309ed0a08"
+
+[[package]]
+name = "md6"
-+version = "2.0.0"
++version = "2.0.1"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "21baf112ff708069b0d0544843236583c9c18675cc1af78ba4ace0f60f63fb31"
+dependencies = [
-+ "gcc 0.3.55 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "libc 0.2.66 (registry+https://github.com/rust-lang/crates.io-index)",
++ "gcc",
++ "libc",
+]
+
+[[package]]
+name = "memchr"
-+version = "2.3.0"
++version = "2.3.3"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "3728d817d99e5ac407411fa471ff9800a778d88a24685968b36824eaf4bee400"
+
+[[package]]
+name = "mime"
+version = "0.2.6"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "ba626b8a6de5da682e1caa06bdb42a335aee5a84db8e5046a3e8ab17ba0a3ae0"
+dependencies = [
-+ "log 0.3.9 (registry+https://github.com/rust-lang/crates.io-index)",
++ "log 0.3.9",
+]
+
+[[package]]
+name = "mime_guess"
-+version = "1.8.7"
++version = "1.8.8"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "216929a5ee4dd316b1702eedf5e74548c123d370f47841ceaac38ca154690ca3"
+dependencies = [
-+ "mime 0.2.6 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "phf 0.7.24 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "phf_codegen 0.7.24 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "unicase 1.4.2 (registry+https://github.com/rust-lang/crates.io-index)",
++ "mime",
++ "phf",
++ "phf_codegen",
++ "unicase 1.4.2",
+]
+
+[[package]]
+name = "miniz_oxide"
-+version = "0.3.5"
++version = "0.3.6"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "aa679ff6578b1cddee93d7e82e263b94a575e0bfced07284eb0c037c1d2416a5"
+dependencies = [
-+ "adler32 1.0.4 (registry+https://github.com/rust-lang/crates.io-index)",
++ "adler32",
+]
+
+[[package]]
+name = "modifier"
+version = "0.1.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "41f5c9112cb662acd3b204077e0de5bc66305fa8df65c8019d5adb10e9ab6e58"
+
+[[package]]
+name = "native-tls"
-+version = "0.2.3"
++version = "0.2.4"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "2b0d88c06fe90d5ee94048ba40409ef1d9315d86f6f38c2efdaad4fb50c58b2d"
+dependencies = [
-+ "lazy_static 1.4.0 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "libc 0.2.66 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "log 0.4.8 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "openssl 0.10.26 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "openssl-probe 0.1.2 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "openssl-sys 0.9.53 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "schannel 0.1.16 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "security-framework 0.3.4 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "security-framework-sys 0.3.3 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "tempfile 3.1.0 (registry+https://github.com/rust-lang/crates.io-index)",
++ "lazy_static",
++ "libc",
++ "log 0.4.8",
++ "openssl",
++ "openssl-probe",
++ "openssl-sys",
++ "schannel",
++ "security-framework",
++ "security-framework-sys",
++ "tempfile",
+]
+
+[[package]]
+name = "nix"
-+version = "0.14.1"
++version = "0.17.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "50e4785f2c3b7589a0d0c1dd60285e1188adac4006e8abd6dd578e1567027363"
+dependencies = [
-+ "bitflags 1.2.1 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "cc 1.0.50 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "cfg-if 0.1.10 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "libc 0.2.66 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "void 1.0.2 (registry+https://github.com/rust-lang/crates.io-index)",
++ "bitflags",
++ "cc",
++ "cfg-if",
++ "libc",
++ "void",
+]
+
+[[package]]
+name = "num-traits"
+version = "0.1.43"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "92e5113e9fd4cc14ded8e499429f396a20f98c772a47cc8622a736e1ec843c31"
+dependencies = [
-+ "num-traits 0.2.11 (registry+https://github.com/rust-lang/crates.io-index)",
++ "num-traits 0.2.11",
+]
+
+[[package]]
+name = "num-traits"
+version = "0.2.11"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "c62be47e61d1842b9170f0fdeec8eba98e60e90e5446449a0545e5152acd7096"
+dependencies = [
-+ "autocfg 1.0.0 (registry+https://github.com/rust-lang/crates.io-index)",
++ "autocfg 1.0.0",
+]
+
+[[package]]
+name = "num_cpus"
-+version = "1.12.0"
++version = "1.13.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "05499f3756671c15885fee9034446956fff3f243d6077b91e5767df161f766b3"
+dependencies = [
-+ "hermit-abi 0.1.6 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "libc 0.2.66 (registry+https://github.com/rust-lang/crates.io-index)",
++ "hermit-abi",
++ "libc",
+]
+
+[[package]]
+name = "openssl"
-+version = "0.10.26"
++version = "0.10.29"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "cee6d85f4cb4c4f59a6a85d5b68a233d280c82e29e822913b9c8b129fbf20bdd"
+dependencies = [
-+ "bitflags 1.2.1 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "cfg-if 0.1.10 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "foreign-types 0.3.2 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "lazy_static 1.4.0 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "libc 0.2.66 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "openssl-sys 0.9.53 (registry+https://github.com/rust-lang/crates.io-index)",
++ "bitflags",
++ "cfg-if",
++ "foreign-types",
++ "lazy_static",
++ "libc",
++ "openssl-sys",
+]
+
+[[package]]
+name = "openssl-probe"
+version = "0.1.2"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "77af24da69f9d9341038eba93a073b1fdaaa1b788221b00a69bce9e762cb32de"
+
+[[package]]
+name = "openssl-sys"
-+version = "0.9.53"
++version = "0.9.55"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "7717097d810a0f2e2323f9e5d11e71608355e24828410b55b9d4f18aa5f9a5d8"
+dependencies = [
-+ "autocfg 0.1.7 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "cc 1.0.50 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "libc 0.2.66 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "pkg-config 0.3.17 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "vcpkg 0.2.8 (registry+https://github.com/rust-lang/crates.io-index)",
++ "autocfg 1.0.0",
++ "cc",
++ "libc",
++ "pkg-config",
++ "vcpkg",
+]
+
+[[package]]
+name = "os-str-generic"
+version = "0.2.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "78f3d620827b89763f54b7f1da3029bd4e0ca7eb1ae61a5c4d3b0bc0dca5157e"
+
+[[package]]
+name = "percent-encoding"
+version = "1.0.1"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "31010dd2e1ac33d5b46a5b413495239882813e0369f8ed8a5e266f173602f831"
+
+[[package]]
+name = "percent-encoding"
+version = "2.1.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "d4fd5641d01c8f18a23da7b6fe29298ff4b55afcccdf78973b24cf3175fee32e"
+
+[[package]]
+name = "phf"
+version = "0.7.24"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "b3da44b85f8e8dfaec21adae67f95d93244b2ecf6ad2a692320598dcc8e6dd18"
+dependencies = [
-+ "phf_shared 0.7.24 (registry+https://github.com/rust-lang/crates.io-index)",
++ "phf_shared",
+]
+
+[[package]]
+name = "phf_codegen"
+version = "0.7.24"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "b03e85129e324ad4166b06b2c7491ae27fe3ec353af72e72cd1654c7225d517e"
+dependencies = [
-+ "phf_generator 0.7.24 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "phf_shared 0.7.24 (registry+https://github.com/rust-lang/crates.io-index)",
++ "phf_generator",
++ "phf_shared",
+]
+
+[[package]]
+name = "phf_generator"
+version = "0.7.24"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "09364cc93c159b8b06b1f4dd8a4398984503483891b0c26b867cf431fb132662"
+dependencies = [
-+ "phf_shared 0.7.24 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "rand 0.6.5 (registry+https://github.com/rust-lang/crates.io-index)",
++ "phf_shared",
++ "rand 0.6.5",
+]
+
+[[package]]
+name = "phf_shared"
+version = "0.7.24"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "234f71a15de2288bcb7e3b6515828d22af7ec8598ee6d24c3b526fa0a80b67a0"
+dependencies = [
-+ "siphasher 0.2.3 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "unicase 1.4.2 (registry+https://github.com/rust-lang/crates.io-index)",
++ "siphasher",
++ "unicase 1.4.2",
+]
+
+[[package]]
+name = "pkg-config"
+version = "0.3.17"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "05da548ad6865900e60eaba7f589cc0783590a92e940c26953ff81ddbab2d677"
+
+[[package]]
+name = "plugin"
+version = "0.2.6"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "1a6a0dc3910bc8db877ffed8e457763b317cf880df4ae19109b9f77d277cf6e0"
+dependencies = [
-+ "typemap 0.3.3 (registry+https://github.com/rust-lang/crates.io-index)",
++ "typemap",
+]
+
+[[package]]
+name = "ppv-lite86"
+version = "0.2.6"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "74490b50b9fbe561ac330df47c08f3f33073d2d00c150f719147d7c54522fa1b"
+
+[[package]]
+name = "quote"
+version = "0.3.15"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "7a6e920b65c65f10b2ae65c831a81a073a89edd28c7cce89475bff467ab4167a"
+
+[[package]]
+name = "rand"
+version = "0.6.5"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "6d71dacdc3c88c1fde3885a3be3fbab9f35724e6ce99467f7d9c5026132184ca"
+dependencies = [
-+ "autocfg 0.1.7 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "libc 0.2.66 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "rand_chacha 0.1.1 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "rand_core 0.4.2 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "rand_hc 0.1.0 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "rand_isaac 0.1.1 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "rand_jitter 0.1.4 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "rand_os 0.1.3 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "rand_pcg 0.1.2 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "rand_xorshift 0.1.1 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "winapi 0.3.8 (registry+https://github.com/rust-lang/crates.io-index)",
++ "autocfg 0.1.7",
++ "libc",
++ "rand_chacha 0.1.1",
++ "rand_core 0.4.2",
++ "rand_hc 0.1.0",
++ "rand_isaac",
++ "rand_jitter",
++ "rand_os",
++ "rand_pcg",
++ "rand_xorshift",
++ "winapi",
+]
+
+[[package]]
+name = "rand"
+version = "0.7.3"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "6a6b1679d49b24bbfe0c803429aa1874472f50d9b363131f0e89fc356b544d03"
+dependencies = [
-+ "getrandom 0.1.14 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "libc 0.2.66 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "rand_chacha 0.2.1 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "rand_core 0.5.1 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "rand_hc 0.2.0 (registry+https://github.com/rust-lang/crates.io-index)",
++ "getrandom",
++ "libc",
++ "rand_chacha 0.2.2",
++ "rand_core 0.5.1",
++ "rand_hc 0.2.0",
+]
+
+[[package]]
+name = "rand_chacha"
+version = "0.1.1"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "556d3a1ca6600bfcbab7c7c91ccb085ac7fbbcd70e008a98742e7847f4f7bcef"
+dependencies = [
-+ "autocfg 0.1.7 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "rand_core 0.3.1 (registry+https://github.com/rust-lang/crates.io-index)",
++ "autocfg 0.1.7",
++ "rand_core 0.3.1",
+]
+
+[[package]]
+name = "rand_chacha"
-+version = "0.2.1"
++version = "0.2.2"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "f4c8ed856279c9737206bf725bf36935d8666ead7aa69b52be55af369d193402"
+dependencies = [
-+ "c2-chacha 0.2.3 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "rand_core 0.5.1 (registry+https://github.com/rust-lang/crates.io-index)",
++ "ppv-lite86",
++ "rand_core 0.5.1",
+]
+
+[[package]]
+name = "rand_core"
+version = "0.3.1"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "7a6fdeb83b075e8266dcc8762c22776f6877a63111121f5f8c7411e5be7eed4b"
+dependencies = [
-+ "rand_core 0.4.2 (registry+https://github.com/rust-lang/crates.io-index)",
++ "rand_core 0.4.2",
+]
+
+[[package]]
+name = "rand_core"
+version = "0.4.2"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "9c33a3c44ca05fa6f1807d8e6743f3824e8509beca625669633be0acbdf509dc"
+
+[[package]]
+name = "rand_core"
+version = "0.5.1"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "90bde5296fc891b0cef12a6d03ddccc162ce7b2aff54160af9338f8d40df6d19"
+dependencies = [
-+ "getrandom 0.1.14 (registry+https://github.com/rust-lang/crates.io-index)",
++ "getrandom",
+]
+
+[[package]]
+name = "rand_hc"
+version = "0.1.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "7b40677c7be09ae76218dc623efbf7b18e34bced3f38883af07bb75630a21bc4"
+dependencies = [
-+ "rand_core 0.3.1 (registry+https://github.com/rust-lang/crates.io-index)",
++ "rand_core 0.3.1",
+]
+
+[[package]]
+name = "rand_hc"
+version = "0.2.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "ca3129af7b92a17112d59ad498c6f81eaf463253766b90396d39ea7a39d6613c"
+dependencies = [
-+ "rand_core 0.5.1 (registry+https://github.com/rust-lang/crates.io-index)",
++ "rand_core 0.5.1",
+]
+
+[[package]]
+name = "rand_isaac"
+version = "0.1.1"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "ded997c9d5f13925be2a6fd7e66bf1872597f759fd9dd93513dd7e92e5a5ee08"
+dependencies = [
-+ "rand_core 0.3.1 (registry+https://github.com/rust-lang/crates.io-index)",
++ "rand_core 0.3.1",
+]
+
+[[package]]
+name = "rand_jitter"
+version = "0.1.4"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "1166d5c91dc97b88d1decc3285bb0a99ed84b05cfd0bc2341bdf2d43fc41e39b"
+dependencies = [
-+ "libc 0.2.66 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "rand_core 0.4.2 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "winapi 0.3.8 (registry+https://github.com/rust-lang/crates.io-index)",
++ "libc",
++ "rand_core 0.4.2",
++ "winapi",
+]
+
+[[package]]
+name = "rand_os"
+version = "0.1.3"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "7b75f676a1e053fc562eafbb47838d67c84801e38fc1ba459e8f180deabd5071"
+dependencies = [
-+ "cloudabi 0.0.3 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "fuchsia-cprng 0.1.1 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "libc 0.2.66 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "rand_core 0.4.2 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "rdrand 0.4.0 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "winapi 0.3.8 (registry+https://github.com/rust-lang/crates.io-index)",
++ "cloudabi",
++ "fuchsia-cprng",
++ "libc",
++ "rand_core 0.4.2",
++ "rdrand",
++ "winapi",
+]
+
+[[package]]
+name = "rand_pcg"
+version = "0.1.2"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "abf9b09b01790cfe0364f52bf32995ea3c39f4d2dd011eac241d2914146d0b44"
+dependencies = [
-+ "autocfg 0.1.7 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "rand_core 0.4.2 (registry+https://github.com/rust-lang/crates.io-index)",
++ "autocfg 0.1.7",
++ "rand_core 0.4.2",
+]
+
+[[package]]
+name = "rand_xorshift"
+version = "0.1.1"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "cbf7e9e623549b0e21f6e97cf8ecf247c1a8fd2e8a992ae265314300b2455d5c"
+dependencies = [
-+ "rand_core 0.3.1 (registry+https://github.com/rust-lang/crates.io-index)",
++ "rand_core 0.3.1",
+]
+
+[[package]]
+name = "rdrand"
+version = "0.4.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "678054eb77286b51581ba43620cc911abf02758c91f93f479767aed0f90458b2"
+dependencies = [
-+ "rand_core 0.3.1 (registry+https://github.com/rust-lang/crates.io-index)",
++ "rand_core 0.3.1",
+]
+
+[[package]]
+name = "redox_syscall"
+version = "0.1.56"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "2439c63f3f6139d1b57529d16bc3b8bb855230c8efcc5d3a896c8bea7c3b1e84"
+
+[[package]]
+name = "regex"
-+version = "1.3.3"
++version = "1.3.7"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "a6020f034922e3194c711b82a627453881bc4682166cabb07134a10c26ba7692"
+dependencies = [
-+ "aho-corasick 0.7.6 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "memchr 2.3.0 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "regex-syntax 0.6.13 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "thread_local 1.0.1 (registry+https://github.com/rust-lang/crates.io-index)",
++ "aho-corasick",
++ "memchr",
++ "regex-syntax",
++ "thread_local",
+]
+
+[[package]]
+name = "regex-syntax"
-+version = "0.6.13"
++version = "0.6.17"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "7fe5bd57d1d7414c6b5ed48563a2c855d995ff777729dcd91c369ec7fea395ae"
+
+[[package]]
+name = "remove_dir_all"
+version = "0.5.2"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "4a83fa3702a688b9359eccba92d153ac33fd2e8462f9e0e3fdf155239ea7792e"
+dependencies = [
-+ "winapi 0.3.8 (registry+https://github.com/rust-lang/crates.io-index)",
++ "winapi",
+]
+
+[[package]]
+name = "rfsapi"
+version = "0.1.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "1b6fbc119d00459f80252adb96e554766d75de071ed5d3c49f46a000d137cd49"
+dependencies = [
-+ "hyper 0.10.16 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "mime 0.2.6 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "serde 0.9.15 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "serde_derive 0.9.15 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "time 0.1.42 (registry+https://github.com/rust-lang/crates.io-index)",
++ "hyper",
++ "mime",
++ "serde",
++ "serde_derive",
++ "time",
+]
+
+[[package]]
+name = "safemem"
+version = "0.3.3"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "ef703b7cb59335eae2eb93ceb664c0eb7ea6bf567079d843e09420219668e072"
+
+[[package]]
+name = "same-file"
+version = "1.0.6"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "93fc1dc3aaa9bfed95e02e6eadabb4baf7e3078b0bd1b4d7b6b0b68378900502"
+dependencies = [
-+ "winapi-util 0.1.3 (registry+https://github.com/rust-lang/crates.io-index)",
++ "winapi-util",
+]
+
+[[package]]
+name = "schannel"
-+version = "0.1.16"
++version = "0.1.18"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "039c25b130bd8c1321ee2d7de7fde2659fa9c2744e4bb29711cfc852ea53cd19"
+dependencies = [
-+ "lazy_static 1.4.0 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "winapi 0.3.8 (registry+https://github.com/rust-lang/crates.io-index)",
++ "lazy_static",
++ "winapi",
+]
+
+[[package]]
+name = "security-framework"
-+version = "0.3.4"
++version = "0.4.3"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "3f331b9025654145cd425b9ded0caf8f5ae0df80d418b326e2dc1c3dc5eb0620"
+dependencies = [
-+ "core-foundation 0.6.4 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "core-foundation-sys 0.6.2 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "libc 0.2.66 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "security-framework-sys 0.3.3 (registry+https://github.com/rust-lang/crates.io-index)",
++ "bitflags",
++ "core-foundation",
++ "core-foundation-sys",
++ "libc",
++ "security-framework-sys",
+]
+
+[[package]]
+name = "security-framework-sys"
-+version = "0.3.3"
++version = "0.4.3"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "17bf11d99252f512695eb468de5516e5cf75455521e69dfe343f3b74e4748405"
+dependencies = [
-+ "core-foundation-sys 0.6.2 (registry+https://github.com/rust-lang/crates.io-index)",
++ "core-foundation-sys",
++ "libc",
+]
+
+[[package]]
+name = "serde"
+version = "0.9.15"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "34b623917345a631dc9608d5194cc206b3fe6c3554cd1c75b937e55e285254af"
+
+[[package]]
+name = "serde_codegen_internals"
+version = "0.14.2"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "bc888bd283bd2420b16ad0d860e35ad8acb21941180a83a189bb2046f9d00400"
+dependencies = [
-+ "syn 0.11.11 (registry+https://github.com/rust-lang/crates.io-index)",
++ "syn",
+]
+
+[[package]]
+name = "serde_derive"
+version = "0.9.15"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "978fd866f4d4872084a81ccc35e275158351d3b9fe620074e7d7504b816b74ba"
+dependencies = [
-+ "quote 0.3.15 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "serde_codegen_internals 0.14.2 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "syn 0.11.11 (registry+https://github.com/rust-lang/crates.io-index)",
++ "quote",
++ "serde_codegen_internals",
++ "syn",
+]
+
+[[package]]
+name = "serde_json"
+version = "0.9.10"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "ad8bcf487be7d2e15d3d543f04312de991d631cfe1b43ea0ade69e6a8a5b16a1"
+dependencies = [
-+ "dtoa 0.4.4 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "itoa 0.3.4 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "num-traits 0.1.43 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "serde 0.9.15 (registry+https://github.com/rust-lang/crates.io-index)",
++ "dtoa",
++ "itoa",
++ "num-traits 0.1.43",
++ "serde",
+]
+
+[[package]]
+name = "siphasher"
+version = "0.2.3"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "0b8de496cf83d4ed58b6be86c3a275b8602f6ffe98d3024a869e124147a9a3ac"
+
+[[package]]
+name = "smallvec"
-+version = "1.1.0"
++version = "1.4.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "c7cb5678e1615754284ec264d9bb5b4c27d2018577fd90ac0ceb578591ed5ee4"
+
+[[package]]
+name = "strsim"
+version = "0.8.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "8ea5119cdb4c55b55d432abb513a0429384878c15dde60cc77b1c99de1a95a6a"
+
+[[package]]
+name = "syn"
+version = "0.11.11"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "d3b891b9015c88c576343b9b3e41c2c11a51c219ef067b264bd9c8aa9b441dad"
+dependencies = [
-+ "quote 0.3.15 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "synom 0.11.3 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "unicode-xid 0.0.4 (registry+https://github.com/rust-lang/crates.io-index)",
++ "quote",
++ "synom",
++ "unicode-xid",
+]
+
+[[package]]
+name = "synom"
+version = "0.11.3"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "a393066ed9010ebaed60b9eafa373d4b1baac186dd7e008555b0f702b51945b6"
+dependencies = [
-+ "unicode-xid 0.0.4 (registry+https://github.com/rust-lang/crates.io-index)",
++ "unicode-xid",
+]
+
+[[package]]
+name = "tabwriter"
+version = "1.2.1"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "36205cfc997faadcc4b0b87aaef3fbedafe20d38d4959a7ca6ff803564051111"
+dependencies = [
-+ "unicode-width 0.1.7 (registry+https://github.com/rust-lang/crates.io-index)",
++ "unicode-width",
+]
+
+[[package]]
+name = "tempfile"
+version = "3.1.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "7a6e24d9338a0a5be79593e2fa15a648add6138caa803e2d5bc782c371732ca9"
+dependencies = [
-+ "cfg-if 0.1.10 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "libc 0.2.66 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "rand 0.7.3 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "redox_syscall 0.1.56 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "remove_dir_all 0.5.2 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "winapi 0.3.8 (registry+https://github.com/rust-lang/crates.io-index)",
++ "cfg-if",
++ "libc",
++ "rand 0.7.3",
++ "redox_syscall",
++ "remove_dir_all",
++ "winapi",
+]
+
+[[package]]
+name = "textwrap"
+version = "0.11.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "d326610f408c7a4eb6f51c37c330e496b08506c9457c9d34287ecc38809fb060"
+dependencies = [
-+ "unicode-width 0.1.7 (registry+https://github.com/rust-lang/crates.io-index)",
++ "unicode-width",
+]
+
+[[package]]
+name = "thread_local"
+version = "1.0.1"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "d40c6d1b69745a6ec6fb1ca717914848da4b44ae29d9b3080cbee91d72a69b14"
+dependencies = [
-+ "lazy_static 1.4.0 (registry+https://github.com/rust-lang/crates.io-index)",
++ "lazy_static",
+]
+
+[[package]]
+name = "time"
-+version = "0.1.42"
++version = "0.1.43"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "ca8a50ef2360fbd1eeb0ecd46795a87a19024eb4b53c5dc916ca1fd95fe62438"
+dependencies = [
-+ "libc 0.2.66 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "redox_syscall 0.1.56 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "winapi 0.3.8 (registry+https://github.com/rust-lang/crates.io-index)",
++ "libc",
++ "winapi",
+]
+
+[[package]]
+name = "traitobject"
+version = "0.1.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "efd1f82c56340fdf16f2a953d7bda4f8fdffba13d93b00844c25572110b26079"
+
+[[package]]
+name = "trivial_colours"
+version = "0.3.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "7153365ea16c5a0ce2eebc4da1b33339a6b21d90c49f670e82130639656bb458"
+
+[[package]]
+name = "typeable"
+version = "0.1.2"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "1410f6f91f21d1612654e7cc69193b0334f909dcf2c790c4826254fbb86f8887"
+
+[[package]]
+name = "typemap"
+version = "0.3.3"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "653be63c80a3296da5551e1bfd2cca35227e13cdd08c6668903ae2f4f77aa1f6"
+dependencies = [
-+ "unsafe-any 0.4.2 (registry+https://github.com/rust-lang/crates.io-index)",
++ "unsafe-any",
+]
+
+[[package]]
+name = "unicase"
+version = "1.4.2"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "7f4765f83163b74f957c797ad9253caf97f103fb064d3999aea9568d09fc8a33"
+dependencies = [
-+ "version_check 0.1.5 (registry+https://github.com/rust-lang/crates.io-index)",
++ "version_check 0.1.5",
+]
+
+[[package]]
+name = "unicase"
+version = "2.6.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "50f37be617794602aabbeee0be4f259dc1778fabe05e2d67ee8f79326d5cb4f6"
+dependencies = [
-+ "version_check 0.9.1 (registry+https://github.com/rust-lang/crates.io-index)",
++ "version_check 0.9.1",
+]
+
+[[package]]
+name = "unicode-bidi"
+version = "0.3.4"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "49f2bd0c6468a8230e1db229cff8029217cf623c767ea5d60bfbd42729ea54d5"
+dependencies = [
-+ "matches 0.1.8 (registry+https://github.com/rust-lang/crates.io-index)",
++ "matches",
+]
+
+[[package]]
+name = "unicode-normalization"
+version = "0.1.12"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "5479532badd04e128284890390c1e876ef7a993d0570b3597ae43dfa1d59afa4"
+dependencies = [
-+ "smallvec 1.1.0 (registry+https://github.com/rust-lang/crates.io-index)",
++ "smallvec",
+]
+
+[[package]]
+name = "unicode-width"
+version = "0.1.7"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "caaa9d531767d1ff2150b9332433f32a24622147e5ebb1f26409d5da67afd479"
+
+[[package]]
+name = "unicode-xid"
+version = "0.0.4"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "8c1f860d7d29cf02cb2f3f359fd35991af3d30bac52c57d265a3c461074cb4dc"
+
+[[package]]
+name = "unsafe-any"
+version = "0.4.2"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "f30360d7979f5e9c6e6cea48af192ea8fab4afb3cf72597154b8f08935bc9c7f"
+dependencies = [
-+ "traitobject 0.1.0 (registry+https://github.com/rust-lang/crates.io-index)",
++ "traitobject",
+]
+
+[[package]]
+name = "url"
+version = "1.7.2"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "dd4e7c0d531266369519a4aa4f399d748bd37043b00bde1e4ff1f60a120b355a"
+dependencies = [
-+ "idna 0.1.5 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "matches 0.1.8 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "percent-encoding 1.0.1 (registry+https://github.com/rust-lang/crates.io-index)",
++ "idna",
++ "matches",
++ "percent-encoding 1.0.1",
+]
+
+[[package]]
+name = "vcpkg"
+version = "0.2.8"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "3fc439f2794e98976c88a2a2dafce96b930fe8010b0a256b3c2199a773933168"
+
+[[package]]
+name = "vec_map"
+version = "0.8.1"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "05c78687fb1a80548ae3250346c3db86a80a7cdd77bda190189f2d0a0987c81a"
+
+[[package]]
+name = "version_check"
+version = "0.1.5"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "914b1a6776c4c929a602fafd8bc742e06365d4bcbe48c30f9cca5824f70dc9dd"
+
+[[package]]
+name = "version_check"
+version = "0.9.1"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "078775d0255232fb988e6fccf26ddc9d1ac274299aaedcedce21c6f72cc533ce"
+
+[[package]]
+name = "void"
+version = "1.0.2"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "6a02e4885ed3bc0f2de90ea6dd45ebcbb66dacffe03547fadbb0eeae2770887d"
+
+[[package]]
+name = "vswhom"
+version = "0.1.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "be979b7f07507105799e854203b470ff7c78a1639e330a58f183b5fea574608b"
+dependencies = [
-+ "libc 0.2.66 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "vswhom-sys 0.1.0 (registry+https://github.com/rust-lang/crates.io-index)",
++ "libc",
++ "vswhom-sys",
+]
+
+[[package]]
+name = "vswhom-sys"
+version = "0.1.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "fc2f5402d3d0e79a069714f7b48e3ecc60be7775a2c049cb839457457a239532"
+dependencies = [
-+ "cc 1.0.50 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "libc 0.2.66 (registry+https://github.com/rust-lang/crates.io-index)",
++ "cc",
++ "libc",
+]
+
+[[package]]
+name = "walkdir"
+version = "2.3.1"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "777182bc735b6424e1a57516d35ed72cb8019d85c8c9bf536dccb3445c1a2f7d"
+dependencies = [
-+ "same-file 1.0.6 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "winapi 0.3.8 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "winapi-util 0.1.3 (registry+https://github.com/rust-lang/crates.io-index)",
++ "same-file",
++ "winapi",
++ "winapi-util",
+]
+
+[[package]]
+name = "wasi"
+version = "0.9.0+wasi-snapshot-preview1"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "cccddf32554fecc6acb585f82a32a72e28b48f8c4c1883ddfeeeaa96f7d8e519"
+
+[[package]]
+name = "winapi"
+version = "0.3.8"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "8093091eeb260906a183e6ae1abdba2ef5ef2257a21801128899c3fc699229c6"
+dependencies = [
-+ "winapi-i686-pc-windows-gnu 0.4.0 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "winapi-x86_64-pc-windows-gnu 0.4.0 (registry+https://github.com/rust-lang/crates.io-index)",
++ "winapi-i686-pc-windows-gnu",
++ "winapi-x86_64-pc-windows-gnu",
+]
+
+[[package]]
+name = "winapi-i686-pc-windows-gnu"
+version = "0.4.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "ac3b87c63620426dd9b991e5ce0329eff545bccbbb34f3be09ff6fb6ab51b7b6"
+
+[[package]]
+name = "winapi-util"
-+version = "0.1.3"
++version = "0.1.5"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "70ec6ce85bb158151cae5e5c87f95a8e97d2c0c4b001223f33a334e3ce5de178"
+dependencies = [
-+ "winapi 0.3.8 (registry+https://github.com/rust-lang/crates.io-index)",
++ "winapi",
+]
+
+[[package]]
+name = "winapi-x86_64-pc-windows-gnu"
+version = "0.4.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "712e227841d057c1ee1cd2fb22fa7e5a5461ae8e48fa2ca79ec42cfc1931183f"
+
+[[package]]
+name = "winreg"
+version = "0.6.2"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "b2986deb581c4fe11b621998a5e53361efe6b48a151178d0cd9eeffa4dc6acc9"
+dependencies = [
-+ "winapi 0.3.8 (registry+https://github.com/rust-lang/crates.io-index)",
++ "winapi",
+]
+
+[[package]]
+name = "xml-rs"
-+version = "0.8.0"
++version = "0.8.2"
+source = "registry+https://github.com/rust-lang/crates.io-index"
-+
-+[metadata]
-+"checksum adler32 1.0.4 (registry+https://github.com/rust-lang/crates.io-index)" = "5d2e7343e7fc9de883d1b0341e0b13970f764c14101234857d2ddafa1cb1cac2"
-+"checksum aho-corasick 0.7.6 (registry+https://github.com/rust-lang/crates.io-index)" = "58fb5e95d83b38284460a5fda7d6470aa0b8844d283a0b614b8535e880800d2d"
-+"checksum ansi_term 0.11.0 (registry+https://github.com/rust-lang/crates.io-index)" = "ee49baf6cb617b853aa8d93bf420db2383fab46d314482ca2803b40d5fde979b"
-+"checksum antidote 1.0.0 (registry+https://github.com/rust-lang/crates.io-index)" = "34fde25430d87a9388dadbe6e34d7f72a462c8b43ac8d309b42b0a8505d7e2a5"
-+"checksum atty 0.2.14 (registry+https://github.com/rust-lang/crates.io-index)" = "d9b39be18770d11421cdb1b9947a45dd3f37e93092cbf377614828a319d5fee8"
-+"checksum autocfg 0.1.7 (registry+https://github.com/rust-lang/crates.io-index)" = "1d49d90015b3c36167a20fe2810c5cd875ad504b39cff3d4eae7977e6b7c1cb2"
-+"checksum autocfg 1.0.0 (registry+https://github.com/rust-lang/crates.io-index)" = "f8aac770f1885fd7e387acedd76065302551364496e46b3dd00860b2f8359b9d"
-+"checksum base64 0.10.1 (registry+https://github.com/rust-lang/crates.io-index)" = "0b25d992356d2eb0ed82172f5248873db5560c4721f564b13cb5193bda5e668e"
-+"checksum base64 0.9.3 (registry+https://github.com/rust-lang/crates.io-index)" = "489d6c0ed21b11d038c31b6ceccca973e65d73ba3bd8ecb9a2babf5546164643"
-+"checksum bitflags 1.2.1 (registry+https://github.com/rust-lang/crates.io-index)" = "cf1de2fe8c75bc145a2f577add951f8134889b4795d47466a54a5c846d691693"
-+"checksum brotli-sys 0.3.2 (registry+https://github.com/rust-lang/crates.io-index)" = "4445dea95f4c2b41cde57cc9fee236ae4dbae88d8fcbdb4750fc1bb5d86aaecd"
-+"checksum brotli2 0.3.2 (registry+https://github.com/rust-lang/crates.io-index)" = "0cb036c3eade309815c15ddbacec5b22c4d1f3983a774ab2eac2e3e9ea85568e"
-+"checksum byteorder 1.3.2 (registry+https://github.com/rust-lang/crates.io-index)" = "a7c3dd8985a7111efc5c80b44e23ecdd8c007de8ade3b96595387e812b957cf5"
-+"checksum bzip2 0.3.3 (registry+https://github.com/rust-lang/crates.io-index)" = "42b7c3cbf0fa9c1b82308d57191728ca0256cb821220f4e2fd410a72ade26e3b"
-+"checksum bzip2-sys 0.1.7 (registry+https://github.com/rust-lang/crates.io-index)" = "6584aa36f5ad4c9247f5323b0a42f37802b37a836f0ad87084d7a33961abe25f"
-+"checksum c2-chacha 0.2.3 (registry+https://github.com/rust-lang/crates.io-index)" = "214238caa1bf3a496ec3392968969cab8549f96ff30652c9e56885329315f6bb"
-+"checksum cc 1.0.50 (registry+https://github.com/rust-lang/crates.io-index)" = "95e28fa049fda1c330bcf9d723be7663a899c4679724b34c81e9f5a326aab8cd"
-+"checksum cfg-if 0.1.10 (registry+https://github.com/rust-lang/crates.io-index)" = "4785bdd1c96b2a846b2bd7cc02e86b6b3dbf14e7e53446c4f54c92a361040822"
-+"checksum clap 2.33.0 (registry+https://github.com/rust-lang/crates.io-index)" = "5067f5bb2d80ef5d68b4c87db81601f0b75bca627bc2ef76b141d7b846a3c6d9"
-+"checksum cloudabi 0.0.3 (registry+https://github.com/rust-lang/crates.io-index)" = "ddfc5b9aa5d4507acaf872de71051dfd0e309860e88966e1051e462a077aac4f"
-+"checksum core-foundation 0.6.4 (registry+https://github.com/rust-lang/crates.io-index)" = "25b9e03f145fd4f2bf705e07b900cd41fc636598fe5dc452fd0db1441c3f496d"
-+"checksum core-foundation-sys 0.6.2 (registry+https://github.com/rust-lang/crates.io-index)" = "e7ca8a5221364ef15ce201e8ed2f609fc312682a8f4e0e3d4aa5879764e0fa3b"
-+"checksum crc32fast 1.2.0 (registry+https://github.com/rust-lang/crates.io-index)" = "ba125de2af0df55319f41944744ad91c71113bf74a4646efff39afe1f6842db1"
-+"checksum ctrlc 3.1.3 (registry+https://github.com/rust-lang/crates.io-index)" = "c7dfd2d8b4c82121dfdff120f818e09fc4380b0b7e17a742081a89b94853e87f"
-+"checksum dtoa 0.4.4 (registry+https://github.com/rust-lang/crates.io-index)" = "ea57b42383d091c85abcc2706240b94ab2a8fa1fc81c10ff23c4de06e2a90b5e"
-+"checksum either 1.5.3 (registry+https://github.com/rust-lang/crates.io-index)" = "bb1f6b1ce1c140482ea30ddd3335fc0024ac7ee112895426e0a629a6c20adfe3"
-+"checksum embed-resource 1.3.1 (registry+https://github.com/rust-lang/crates.io-index)" = "bbaba4684ab0af1cbb3ef0b1f540ddc4b57b31940c920ea594efe09ab86e2a6c"
-+"checksum flate2 1.0.13 (registry+https://github.com/rust-lang/crates.io-index)" = "6bd6d6f4752952feb71363cffc9ebac9411b75b87c6ab6058c40c8900cf43c0f"
-+"checksum foreign-types 0.3.2 (registry+https://github.com/rust-lang/crates.io-index)" = "f6f339eb8adc052cd2ca78910fda869aefa38d22d5cb648e6485e4d3fc06f3b1"
-+"checksum foreign-types-shared 0.1.1 (registry+https://github.com/rust-lang/crates.io-index)" = "00b0228411908ca8685dba7fc2cdd70ec9990a6e753e89b6ac91a84c40fbaf4b"
-+"checksum fuchsia-cprng 0.1.1 (registry+https://github.com/rust-lang/crates.io-index)" = "a06f77d526c1a601b7c4cdd98f54b5eaabffc14d5f2f0296febdc7f357c6d3ba"
-+"checksum gcc 0.3.55 (registry+https://github.com/rust-lang/crates.io-index)" = "8f5f3913fa0bfe7ee1fd8248b6b9f42a5af4b9d65ec2dd2c3c26132b950ecfc2"
-+"checksum getrandom 0.1.14 (registry+https://github.com/rust-lang/crates.io-index)" = "7abc8dd8451921606d809ba32e95b6111925cd2906060d2dcc29c070220503eb"
-+"checksum hermit-abi 0.1.6 (registry+https://github.com/rust-lang/crates.io-index)" = "eff2656d88f158ce120947499e971d743c05dbcbed62e5bd2f38f1698bbc3772"
-+"checksum httparse 1.3.4 (registry+https://github.com/rust-lang/crates.io-index)" = "cd179ae861f0c2e53da70d892f5f3029f9594be0c41dc5269cd371691b1dc2f9"
-+"checksum hyper 0.10.16 (registry+https://github.com/rust-lang/crates.io-index)" = "0a0652d9a2609a968c14be1a9ea00bf4b1d64e2e1f53a1b51b6fff3a6e829273"
-+"checksum hyper-native-tls 0.3.0 (registry+https://github.com/rust-lang/crates.io-index)" = "6d375598f442742b0e66208ee12501391f1c7ac0bafb90b4fe53018f81f06068"
-+"checksum idna 0.1.5 (registry+https://github.com/rust-lang/crates.io-index)" = "38f09e0f0b1fb55fdee1f17470ad800da77af5186a1a76c026b679358b7e844e"
-+"checksum iron 0.6.1 (registry+https://github.com/rust-lang/crates.io-index)" = "c6d308ca2d884650a8bf9ed2ff4cb13fbb2207b71f64cda11dc9b892067295e8"
-+"checksum itertools 0.8.2 (registry+https://github.com/rust-lang/crates.io-index)" = "f56a2d0bc861f9165be4eb3442afd3c236d8a98afd426f65d92324ae1091a484"
-+"checksum itoa 0.3.4 (registry+https://github.com/rust-lang/crates.io-index)" = "8324a32baf01e2ae060e9de58ed0bc2320c9a2833491ee36cd3b4c414de4db8c"
-+"checksum language-tags 0.2.2 (registry+https://github.com/rust-lang/crates.io-index)" = "a91d884b6667cd606bb5a69aa0c99ba811a115fc68915e7056ec08a46e93199a"
-+"checksum lazy_static 1.4.0 (registry+https://github.com/rust-lang/crates.io-index)" = "e2abad23fbc42b3700f2f279844dc832adb2b2eb069b2df918f455c4e18cc646"
-+"checksum lazysort 0.2.1 (registry+https://github.com/rust-lang/crates.io-index)" = "d0e22ff43b231e0e2f87d74984e53ebc73b90ae13397e041214fb07efc64168f"
-+"checksum libc 0.2.66 (registry+https://github.com/rust-lang/crates.io-index)" = "d515b1f41455adea1313a4a2ac8a8a477634fbae63cc6100e3aebb207ce61558"
-+"checksum log 0.3.9 (registry+https://github.com/rust-lang/crates.io-index)" = "e19e8d5c34a3e0e2223db8e060f9e8264aeeb5c5fc64a4ee9965c062211c024b"
-+"checksum log 0.4.8 (registry+https://github.com/rust-lang/crates.io-index)" = "14b6052be84e6b71ab17edffc2eeabf5c2c3ae1fdb464aae35ac50c67a44e1f7"
-+"checksum matches 0.1.8 (registry+https://github.com/rust-lang/crates.io-index)" = "7ffc5c5338469d4d3ea17d269fa8ea3512ad247247c30bd2df69e68309ed0a08"
-+"checksum md6 2.0.0 (registry+https://github.com/rust-lang/crates.io-index)" = "54e5826684849cecd3fa05a6a5052c50a3542f163a9917ff0b91379426a2e45d"
-+"checksum memchr 2.3.0 (registry+https://github.com/rust-lang/crates.io-index)" = "3197e20c7edb283f87c071ddfc7a2cca8f8e0b888c242959846a6fce03c72223"
-+"checksum mime 0.2.6 (registry+https://github.com/rust-lang/crates.io-index)" = "ba626b8a6de5da682e1caa06bdb42a335aee5a84db8e5046a3e8ab17ba0a3ae0"
-+"checksum mime_guess 1.8.7 (registry+https://github.com/rust-lang/crates.io-index)" = "0d977de9ee851a0b16e932979515c0f3da82403183879811bc97d50bd9cc50f7"
-+"checksum miniz_oxide 0.3.5 (registry+https://github.com/rust-lang/crates.io-index)" = "6f3f74f726ae935c3f514300cc6773a0c9492abc5e972d42ba0c0ebb88757625"
-+"checksum modifier 0.1.0 (registry+https://github.com/rust-lang/crates.io-index)" = "41f5c9112cb662acd3b204077e0de5bc66305fa8df65c8019d5adb10e9ab6e58"
-+"checksum native-tls 0.2.3 (registry+https://github.com/rust-lang/crates.io-index)" = "4b2df1a4c22fd44a62147fd8f13dd0f95c9d8ca7b2610299b2a2f9cf8964274e"
-+"checksum nix 0.14.1 (registry+https://github.com/rust-lang/crates.io-index)" = "6c722bee1037d430d0f8e687bbdbf222f27cc6e4e68d5caf630857bb2b6dbdce"
-+"checksum num-traits 0.1.43 (registry+https://github.com/rust-lang/crates.io-index)" = "92e5113e9fd4cc14ded8e499429f396a20f98c772a47cc8622a736e1ec843c31"
-+"checksum num-traits 0.2.11 (registry+https://github.com/rust-lang/crates.io-index)" = "c62be47e61d1842b9170f0fdeec8eba98e60e90e5446449a0545e5152acd7096"
-+"checksum num_cpus 1.12.0 (registry+https://github.com/rust-lang/crates.io-index)" = "46203554f085ff89c235cd12f7075f3233af9b11ed7c9e16dfe2560d03313ce6"
-+"checksum openssl 0.10.26 (registry+https://github.com/rust-lang/crates.io-index)" = "3a3cc5799d98e1088141b8e01ff760112bbd9f19d850c124500566ca6901a585"
-+"checksum openssl-probe 0.1.2 (registry+https://github.com/rust-lang/crates.io-index)" = "77af24da69f9d9341038eba93a073b1fdaaa1b788221b00a69bce9e762cb32de"
-+"checksum openssl-sys 0.9.53 (registry+https://github.com/rust-lang/crates.io-index)" = "465d16ae7fc0e313318f7de5cecf57b2fbe7511fd213978b457e1c96ff46736f"
-+"checksum os-str-generic 0.2.0 (registry+https://github.com/rust-lang/crates.io-index)" = "78f3d620827b89763f54b7f1da3029bd4e0ca7eb1ae61a5c4d3b0bc0dca5157e"
-+"checksum percent-encoding 1.0.1 (registry+https://github.com/rust-lang/crates.io-index)" = "31010dd2e1ac33d5b46a5b413495239882813e0369f8ed8a5e266f173602f831"
-+"checksum percent-encoding 2.1.0 (registry+https://github.com/rust-lang/crates.io-index)" = "d4fd5641d01c8f18a23da7b6fe29298ff4b55afcccdf78973b24cf3175fee32e"
-+"checksum phf 0.7.24 (registry+https://github.com/rust-lang/crates.io-index)" = "b3da44b85f8e8dfaec21adae67f95d93244b2ecf6ad2a692320598dcc8e6dd18"
-+"checksum phf_codegen 0.7.24 (registry+https://github.com/rust-lang/crates.io-index)" = "b03e85129e324ad4166b06b2c7491ae27fe3ec353af72e72cd1654c7225d517e"
-+"checksum phf_generator 0.7.24 (registry+https://github.com/rust-lang/crates.io-index)" = "09364cc93c159b8b06b1f4dd8a4398984503483891b0c26b867cf431fb132662"
-+"checksum phf_shared 0.7.24 (registry+https://github.com/rust-lang/crates.io-index)" = "234f71a15de2288bcb7e3b6515828d22af7ec8598ee6d24c3b526fa0a80b67a0"
-+"checksum pkg-config 0.3.17 (registry+https://github.com/rust-lang/crates.io-index)" = "05da548ad6865900e60eaba7f589cc0783590a92e940c26953ff81ddbab2d677"
-+"checksum plugin 0.2.6 (registry+https://github.com/rust-lang/crates.io-index)" = "1a6a0dc3910bc8db877ffed8e457763b317cf880df4ae19109b9f77d277cf6e0"
-+"checksum ppv-lite86 0.2.6 (registry+https://github.com/rust-lang/crates.io-index)" = "74490b50b9fbe561ac330df47c08f3f33073d2d00c150f719147d7c54522fa1b"
-+"checksum quote 0.3.15 (registry+https://github.com/rust-lang/crates.io-index)" = "7a6e920b65c65f10b2ae65c831a81a073a89edd28c7cce89475bff467ab4167a"
-+"checksum rand 0.6.5 (registry+https://github.com/rust-lang/crates.io-index)" = "6d71dacdc3c88c1fde3885a3be3fbab9f35724e6ce99467f7d9c5026132184ca"
-+"checksum rand 0.7.3 (registry+https://github.com/rust-lang/crates.io-index)" = "6a6b1679d49b24bbfe0c803429aa1874472f50d9b363131f0e89fc356b544d03"
-+"checksum rand_chacha 0.1.1 (registry+https://github.com/rust-lang/crates.io-index)" = "556d3a1ca6600bfcbab7c7c91ccb085ac7fbbcd70e008a98742e7847f4f7bcef"
-+"checksum rand_chacha 0.2.1 (registry+https://github.com/rust-lang/crates.io-index)" = "03a2a90da8c7523f554344f921aa97283eadf6ac484a6d2a7d0212fa7f8d6853"
-+"checksum rand_core 0.3.1 (registry+https://github.com/rust-lang/crates.io-index)" = "7a6fdeb83b075e8266dcc8762c22776f6877a63111121f5f8c7411e5be7eed4b"
-+"checksum rand_core 0.4.2 (registry+https://github.com/rust-lang/crates.io-index)" = "9c33a3c44ca05fa6f1807d8e6743f3824e8509beca625669633be0acbdf509dc"
-+"checksum rand_core 0.5.1 (registry+https://github.com/rust-lang/crates.io-index)" = "90bde5296fc891b0cef12a6d03ddccc162ce7b2aff54160af9338f8d40df6d19"
-+"checksum rand_hc 0.1.0 (registry+https://github.com/rust-lang/crates.io-index)" = "7b40677c7be09ae76218dc623efbf7b18e34bced3f38883af07bb75630a21bc4"
-+"checksum rand_hc 0.2.0 (registry+https://github.com/rust-lang/crates.io-index)" = "ca3129af7b92a17112d59ad498c6f81eaf463253766b90396d39ea7a39d6613c"
-+"checksum rand_isaac 0.1.1 (registry+https://github.com/rust-lang/crates.io-index)" = "ded997c9d5f13925be2a6fd7e66bf1872597f759fd9dd93513dd7e92e5a5ee08"
-+"checksum rand_jitter 0.1.4 (registry+https://github.com/rust-lang/crates.io-index)" = "1166d5c91dc97b88d1decc3285bb0a99ed84b05cfd0bc2341bdf2d43fc41e39b"
-+"checksum rand_os 0.1.3 (registry+https://github.com/rust-lang/crates.io-index)" = "7b75f676a1e053fc562eafbb47838d67c84801e38fc1ba459e8f180deabd5071"
-+"checksum rand_pcg 0.1.2 (registry+https://github.com/rust-lang/crates.io-index)" = "abf9b09b01790cfe0364f52bf32995ea3c39f4d2dd011eac241d2914146d0b44"
-+"checksum rand_xorshift 0.1.1 (registry+https://github.com/rust-lang/crates.io-index)" = "cbf7e9e623549b0e21f6e97cf8ecf247c1a8fd2e8a992ae265314300b2455d5c"
-+"checksum rdrand 0.4.0 (registry+https://github.com/rust-lang/crates.io-index)" = "678054eb77286b51581ba43620cc911abf02758c91f93f479767aed0f90458b2"
-+"checksum redox_syscall 0.1.56 (registry+https://github.com/rust-lang/crates.io-index)" = "2439c63f3f6139d1b57529d16bc3b8bb855230c8efcc5d3a896c8bea7c3b1e84"
-+"checksum regex 1.3.3 (registry+https://github.com/rust-lang/crates.io-index)" = "b5508c1941e4e7cb19965abef075d35a9a8b5cdf0846f30b4050e9b55dc55e87"
-+"checksum regex-syntax 0.6.13 (registry+https://github.com/rust-lang/crates.io-index)" = "e734e891f5b408a29efbf8309e656876276f49ab6a6ac208600b4419bd893d90"
-+"checksum remove_dir_all 0.5.2 (registry+https://github.com/rust-lang/crates.io-index)" = "4a83fa3702a688b9359eccba92d153ac33fd2e8462f9e0e3fdf155239ea7792e"
-+"checksum rfsapi 0.1.0 (registry+https://github.com/rust-lang/crates.io-index)" = "1b6fbc119d00459f80252adb96e554766d75de071ed5d3c49f46a000d137cd49"
-+"checksum safemem 0.3.3 (registry+https://github.com/rust-lang/crates.io-index)" = "ef703b7cb59335eae2eb93ceb664c0eb7ea6bf567079d843e09420219668e072"
-+"checksum same-file 1.0.6 (registry+https://github.com/rust-lang/crates.io-index)" = "93fc1dc3aaa9bfed95e02e6eadabb4baf7e3078b0bd1b4d7b6b0b68378900502"
-+"checksum schannel 0.1.16 (registry+https://github.com/rust-lang/crates.io-index)" = "87f550b06b6cba9c8b8be3ee73f391990116bf527450d2556e9b9ce263b9a021"
-+"checksum security-framework 0.3.4 (registry+https://github.com/rust-lang/crates.io-index)" = "8ef2429d7cefe5fd28bd1d2ed41c944547d4ff84776f5935b456da44593a16df"
-+"checksum security-framework-sys 0.3.3 (registry+https://github.com/rust-lang/crates.io-index)" = "e31493fc37615debb8c5090a7aeb4a9730bc61e77ab10b9af59f1a202284f895"
-+"checksum serde 0.9.15 (registry+https://github.com/rust-lang/crates.io-index)" = "34b623917345a631dc9608d5194cc206b3fe6c3554cd1c75b937e55e285254af"
-+"checksum serde_codegen_internals 0.14.2 (registry+https://github.com/rust-lang/crates.io-index)" = "bc888bd283bd2420b16ad0d860e35ad8acb21941180a83a189bb2046f9d00400"
-+"checksum serde_derive 0.9.15 (registry+https://github.com/rust-lang/crates.io-index)" = "978fd866f4d4872084a81ccc35e275158351d3b9fe620074e7d7504b816b74ba"
-+"checksum serde_json 0.9.10 (registry+https://github.com/rust-lang/crates.io-index)" = "ad8bcf487be7d2e15d3d543f04312de991d631cfe1b43ea0ade69e6a8a5b16a1"
-+"checksum siphasher 0.2.3 (registry+https://github.com/rust-lang/crates.io-index)" = "0b8de496cf83d4ed58b6be86c3a275b8602f6ffe98d3024a869e124147a9a3ac"
-+"checksum smallvec 1.1.0 (registry+https://github.com/rust-lang/crates.io-index)" = "44e59e0c9fa00817912ae6e4e6e3c4fe04455e75699d06eedc7d85917ed8e8f4"
-+"checksum strsim 0.8.0 (registry+https://github.com/rust-lang/crates.io-index)" = "8ea5119cdb4c55b55d432abb513a0429384878c15dde60cc77b1c99de1a95a6a"
-+"checksum syn 0.11.11 (registry+https://github.com/rust-lang/crates.io-index)" = "d3b891b9015c88c576343b9b3e41c2c11a51c219ef067b264bd9c8aa9b441dad"
-+"checksum synom 0.11.3 (registry+https://github.com/rust-lang/crates.io-index)" = "a393066ed9010ebaed60b9eafa373d4b1baac186dd7e008555b0f702b51945b6"
-+"checksum tabwriter 1.2.1 (registry+https://github.com/rust-lang/crates.io-index)" = "36205cfc997faadcc4b0b87aaef3fbedafe20d38d4959a7ca6ff803564051111"
-+"checksum tempfile 3.1.0 (registry+https://github.com/rust-lang/crates.io-index)" = "7a6e24d9338a0a5be79593e2fa15a648add6138caa803e2d5bc782c371732ca9"
-+"checksum textwrap 0.11.0 (registry+https://github.com/rust-lang/crates.io-index)" = "d326610f408c7a4eb6f51c37c330e496b08506c9457c9d34287ecc38809fb060"
-+"checksum thread_local 1.0.1 (registry+https://github.com/rust-lang/crates.io-index)" = "d40c6d1b69745a6ec6fb1ca717914848da4b44ae29d9b3080cbee91d72a69b14"
-+"checksum time 0.1.42 (registry+https://github.com/rust-lang/crates.io-index)" = "db8dcfca086c1143c9270ac42a2bbd8a7ee477b78ac8e45b19abfb0cbede4b6f"
-+"checksum traitobject 0.1.0 (registry+https://github.com/rust-lang/crates.io-index)" = "efd1f82c56340fdf16f2a953d7bda4f8fdffba13d93b00844c25572110b26079"
-+"checksum trivial_colours 0.3.0 (registry+https://github.com/rust-lang/crates.io-index)" = "7153365ea16c5a0ce2eebc4da1b33339a6b21d90c49f670e82130639656bb458"
-+"checksum typeable 0.1.2 (registry+https://github.com/rust-lang/crates.io-index)" = "1410f6f91f21d1612654e7cc69193b0334f909dcf2c790c4826254fbb86f8887"
-+"checksum typemap 0.3.3 (registry+https://github.com/rust-lang/crates.io-index)" = "653be63c80a3296da5551e1bfd2cca35227e13cdd08c6668903ae2f4f77aa1f6"
-+"checksum unicase 1.4.2 (registry+https://github.com/rust-lang/crates.io-index)" = "7f4765f83163b74f957c797ad9253caf97f103fb064d3999aea9568d09fc8a33"
-+"checksum unicase 2.6.0 (registry+https://github.com/rust-lang/crates.io-index)" = "50f37be617794602aabbeee0be4f259dc1778fabe05e2d67ee8f79326d5cb4f6"
-+"checksum unicode-bidi 0.3.4 (registry+https://github.com/rust-lang/crates.io-index)" = "49f2bd0c6468a8230e1db229cff8029217cf623c767ea5d60bfbd42729ea54d5"
-+"checksum unicode-normalization 0.1.12 (registry+https://github.com/rust-lang/crates.io-index)" = "5479532badd04e128284890390c1e876ef7a993d0570b3597ae43dfa1d59afa4"
-+"checksum unicode-width 0.1.7 (registry+https://github.com/rust-lang/crates.io-index)" = "caaa9d531767d1ff2150b9332433f32a24622147e5ebb1f26409d5da67afd479"
-+"checksum unicode-xid 0.0.4 (registry+https://github.com/rust-lang/crates.io-index)" = "8c1f860d7d29cf02cb2f3f359fd35991af3d30bac52c57d265a3c461074cb4dc"
-+"checksum unsafe-any 0.4.2 (registry+https://github.com/rust-lang/crates.io-index)" = "f30360d7979f5e9c6e6cea48af192ea8fab4afb3cf72597154b8f08935bc9c7f"
-+"checksum url 1.7.2 (registry+https://github.com/rust-lang/crates.io-index)" = "dd4e7c0d531266369519a4aa4f399d748bd37043b00bde1e4ff1f60a120b355a"
-+"checksum vcpkg 0.2.8 (registry+https://github.com/rust-lang/crates.io-index)" = "3fc439f2794e98976c88a2a2dafce96b930fe8010b0a256b3c2199a773933168"
-+"checksum vec_map 0.8.1 (registry+https://github.com/rust-lang/crates.io-index)" = "05c78687fb1a80548ae3250346c3db86a80a7cdd77bda190189f2d0a0987c81a"
-+"checksum version_check 0.1.5 (registry+https://github.com/rust-lang/crates.io-index)" = "914b1a6776c4c929a602fafd8bc742e06365d4bcbe48c30f9cca5824f70dc9dd"
-+"checksum version_check 0.9.1 (registry+https://github.com/rust-lang/crates.io-index)" = "078775d0255232fb988e6fccf26ddc9d1ac274299aaedcedce21c6f72cc533ce"
-+"checksum void 1.0.2 (registry+https://github.com/rust-lang/crates.io-index)" = "6a02e4885ed3bc0f2de90ea6dd45ebcbb66dacffe03547fadbb0eeae2770887d"
-+"checksum vswhom 0.1.0 (registry+https://github.com/rust-lang/crates.io-index)" = "be979b7f07507105799e854203b470ff7c78a1639e330a58f183b5fea574608b"
-+"checksum vswhom-sys 0.1.0 (registry+https://github.com/rust-lang/crates.io-index)" = "fc2f5402d3d0e79a069714f7b48e3ecc60be7775a2c049cb839457457a239532"
-+"checksum walkdir 2.3.1 (registry+https://github.com/rust-lang/crates.io-index)" = "777182bc735b6424e1a57516d35ed72cb8019d85c8c9bf536dccb3445c1a2f7d"
-+"checksum wasi 0.9.0+wasi-snapshot-preview1 (registry+https://github.com/rust-lang/crates.io-index)" = "cccddf32554fecc6acb585f82a32a72e28b48f8c4c1883ddfeeeaa96f7d8e519"
-+"checksum winapi 0.3.8 (registry+https://github.com/rust-lang/crates.io-index)" = "8093091eeb260906a183e6ae1abdba2ef5ef2257a21801128899c3fc699229c6"
-+"checksum winapi-i686-pc-windows-gnu 0.4.0 (registry+https://github.com/rust-lang/crates.io-index)" = "ac3b87c63620426dd9b991e5ce0329eff545bccbbb34f3be09ff6fb6ab51b7b6"
-+"checksum winapi-util 0.1.3 (registry+https://github.com/rust-lang/crates.io-index)" = "4ccfbf554c6ad11084fb7517daca16cfdcaccbdadba4fc336f032a8b12c2ad80"
-+"checksum winapi-x86_64-pc-windows-gnu 0.4.0 (registry+https://github.com/rust-lang/crates.io-index)" = "712e227841d057c1ee1cd2fb22fa7e5a5461ae8e48fa2ca79ec42cfc1931183f"
-+"checksum winreg 0.6.2 (registry+https://github.com/rust-lang/crates.io-index)" = "b2986deb581c4fe11b621998a5e53361efe6b48a151178d0cd9eeffa4dc6acc9"
-+"checksum xml-rs 0.8.0 (registry+https://github.com/rust-lang/crates.io-index)" = "541b12c998c5b56aa2b4e6f18f03664eef9a4fd0a246a55594efae6cc2d964b5"
++checksum = "2bb76e5c421bbbeb8924c60c030331b345555024d56261dae8f3e786ed817c23"
diff --git a/nixpkgs/pkgs/tools/networking/httplz/default.nix b/nixpkgs/pkgs/tools/networking/httplz/default.nix
index c4f003f884f..bf0a5b90388 100644
--- a/nixpkgs/pkgs/tools/networking/httplz/default.nix
+++ b/nixpkgs/pkgs/tools/networking/httplz/default.nix
@@ -3,13 +3,13 @@
rustPlatform.buildRustPackage rec {
pname = "httplz";
- version = "1.8.0";
+ version = "1.9.2";
src = fetchFromGitHub {
owner = "thecoshman";
repo = "http";
rev = "v${version}";
- sha256 = "0i41hqig8v6w1qb6498239iix1rss0lznm5lcl9m3i439c2zv7pw";
+ sha256 = "154alxxclz78r29m656c8yahnzq0vd64s4sp19h0ca92dfw4s46y";
};
nativeBuildInputs = [ makeWrapper pkgconfig ];
@@ -19,7 +19,7 @@ rustPlatform.buildRustPackage rec {
cargoBuildFlags = [ "--bin httplz" ];
cargoPatches = [ ./cargo-lock.patch ];
- cargoSha256 = "13hk9m09jff3bxbixsjvksiir4j4mak4ckvlq45bx5d5lh8sapxl";
+ cargoSha256 = "1rpwzrr9bvw375vn97y5fqhraqz35d3ani9kfflvn2758x3g8gwf";
postInstall = ''
wrapProgram $out/bin/httplz \
diff --git a/nixpkgs/pkgs/tools/networking/inadyn/default.nix b/nixpkgs/pkgs/tools/networking/inadyn/default.nix
index 9f7d79bdd88..2a551c56768 100644
--- a/nixpkgs/pkgs/tools/networking/inadyn/default.nix
+++ b/nixpkgs/pkgs/tools/networking/inadyn/default.nix
@@ -3,13 +3,13 @@
stdenv.mkDerivation rec {
pname = "inadyn";
- version = "2.6";
+ version = "2.7";
src = fetchFromGitHub {
owner = "troglobit";
repo = "inadyn";
rev = "v${version}";
- sha256 = "013kxlglxliajv3lrsix4w88w40g709rvycajb6ad6gbh8giqv47";
+ sha256 = "00jhayx0hfl9dw78d58bdxa5390bvxq73lz26q9h1gg1xw76adan";
};
nativeBuildInputs = [ autoreconfHook pkgconfig ];
diff --git a/nixpkgs/pkgs/tools/networking/isync/default.nix b/nixpkgs/pkgs/tools/networking/isync/default.nix
index 0373b05ede0..49efeac02a9 100644
--- a/nixpkgs/pkgs/tools/networking/isync/default.nix
+++ b/nixpkgs/pkgs/tools/networking/isync/default.nix
@@ -1,22 +1,31 @@
-{ fetchurl, stdenv, openssl, pkgconfig, db, zlib, cyrus_sasl, perl }:
+{ stdenv, fetchurl, pkg-config, perl
+, openssl, db, zlib, cyrus_sasl
+}:
stdenv.mkDerivation rec {
- name = "isync-1.3.1";
+ pname = "isync";
+ version = "1.3.1";
src = fetchurl {
- url = "mirror://sourceforge/isync/${name}.tar.gz";
+ url = "mirror://sourceforge/isync/${pname}-${version}.tar.gz";
sha256 = "1sphd30jplii58y2zmw365bckm6pszmapcy905zhjll1sm1ldjv8";
};
- nativeBuildInputs = [ pkgconfig perl ];
+ nativeBuildInputs = [ pkg-config perl ];
buildInputs = [ openssl db cyrus_sasl zlib ];
meta = with stdenv.lib; {
homepage = "http://isync.sourceforge.net/";
+ # https://sourceforge.net/projects/isync/
+ changelog = "https://sourceforge.net/p/isync/isync/ci/v${version}/tree/NEWS";
description = "Free IMAP and MailDir mailbox synchronizer";
+ longDescription = ''
+ mbsync (formerly isync) is a command line application which synchronizes
+ mailboxes. Currently Maildir and IMAP4 mailboxes are supported. New
+ messages, message deletions and flag changes can be propagated both ways.
+ '';
license = licenses.gpl2Plus;
-
- maintainers = with maintainers; [ the-kenny ];
platforms = platforms.unix;
+ maintainers = with maintainers; [ primeos ];
};
}
diff --git a/nixpkgs/pkgs/tools/networking/megatools/default.nix b/nixpkgs/pkgs/tools/networking/megatools/default.nix
index 76ce71ac9c8..b729e996185 100644
--- a/nixpkgs/pkgs/tools/networking/megatools/default.nix
+++ b/nixpkgs/pkgs/tools/networking/megatools/default.nix
@@ -1,18 +1,18 @@
-{ stdenv, fetchgit, autoreconfHook, pkgconfig, glib, fuse, curl, glib-networking
+{ stdenv, fetchgit, autoreconfHook, pkg-config, glib, fuse, curl, glib-networking
, asciidoc, libxml2, docbook_xsl, docbook_xml_dtd_45, libxslt, wrapGAppsHook }:
stdenv.mkDerivation rec {
pname = "megatools";
- version = "1.10.2";
+ version = "1.10.3";
src = fetchgit {
url = "https://megous.com/git/megatools";
- rev = version;
- sha256 = "001hw8j36ld03wwaphq3xdaazf2dpl36h84k8xmk524x8vlia8lk";
+ rev = "5581d06e447b84d0101d36dc96ab72920eec1017";
+ sha256 = "1fh456kjsmdvpmvklkpi06h720yvhahd4rxa6cm5x818pl44p1r4";
};
nativeBuildInputs = [
- autoreconfHook pkgconfig wrapGAppsHook asciidoc libxml2
+ autoreconfHook pkg-config wrapGAppsHook asciidoc libxml2
docbook_xsl docbook_xml_dtd_45 libxslt
];
buildInputs = [ glib glib-networking curl ]
diff --git a/nixpkgs/pkgs/tools/networking/minio-client/default.nix b/nixpkgs/pkgs/tools/networking/minio-client/default.nix
index b3b150d4b83..4e81321dc62 100644
--- a/nixpkgs/pkgs/tools/networking/minio-client/default.nix
+++ b/nixpkgs/pkgs/tools/networking/minio-client/default.nix
@@ -2,22 +2,20 @@
buildGoModule rec {
pname = "minio-client";
- version = "2020-03-06T23-29-45Z";
+ version = "2020-04-25T00-43-23Z";
src = fetchFromGitHub {
owner = "minio";
repo = "mc";
rev = "RELEASE.${version}";
- sha256 = "1vqvp7mn841s5g9vvas3c8j4y9lp90maw5y49hdv7zcsqncqvzkv";
+ sha256 = "0ff2fyr3787zp0lpgbph064am33py2wzjikzmxd3zwp3y0dic770";
};
- modSha256 = "1qjfsqmcc6i0nixwvdmm3vnnv19yvqaaza096cpdf5rl35knsp5i";
+ vendorSha256 = "0nfcxz47v5gl0wih59xarhz82nd8wy61c3ijvg2v08ipk29zivcc";
subPackages = [ "." ];
- preBuild = ''
- buildFlagsArray+=("-ldflags=-X github.com/minio/mc/cmd.Version=${version}")
- '';
+ buildFlagsArray = [ "-ldflags=-s -w -X github.com/minio/mc/cmd.Version=${version}" ];
meta = with stdenv.lib; {
homepage = "https://github.com/minio/mc";
@@ -26,4 +24,4 @@ buildGoModule rec {
platforms = platforms.unix;
license = licenses.asl20;
};
-}
+} \ No newline at end of file
diff --git a/nixpkgs/pkgs/tools/networking/mitmproxy/default.nix b/nixpkgs/pkgs/tools/networking/mitmproxy/default.nix
index 7a623ab69a6..b9d873fad6a 100644
--- a/nixpkgs/pkgs/tools/networking/mitmproxy/default.nix
+++ b/nixpkgs/pkgs/tools/networking/mitmproxy/default.nix
@@ -4,47 +4,15 @@ with python3Packages;
buildPythonPackage rec {
pname = "mitmproxy";
- version = "4.0.4";
+ version = "5.1.1";
src = fetchFromGitHub {
owner = pname;
repo = pname;
rev = "v${version}";
- sha256 = "14i9dkafvyl15rq2qa8xldscn5lmkk2g52kbi2hl63nzx9yibx6r";
+ sha256 = "1lirlckpvd3c6s6q3p32w4k4yfna5mlgr1x9g39lhzzq0sdiz3lk";
};
- patches = [
- (fetchpatch {
- # Tests failed due to expired test certificates,
- # https://github.com/mitmproxy/mitmproxy/issues/3316
- # TODO: remove on next update
- name = "test-certificates.patch";
- url = "https://github.com/mitmproxy/mitmproxy/commit/1b6a8d6acd3d70f9b9627ad4ae9def08103f8250.patch";
- sha256 = "03y79c25yir7d8xj79czdc81y3irqq1i3ks9ca0mv1az8b7xsvfv";
- })
- (fetchpatch {
- # 0.13 <= wsproto < 0.14 patch
- # https://github.com/mitmproxy/mitmproxy/issues/3459
- # TODO: remove on next update
- name = "wsproto-0.13.patch";
- url = "https://github.com/mitmproxy/mitmproxy/commit/70777a1b6ed64af9cafcdef223a8a260ecc96864.patch";
- sha256 = "1ddxdr7js510kzyq3gyks4k5k1n8zb1i9amxw7wzmi1dcg8kqw9a";
- # We strip these bounds anyway
- excludes = [ "setup.py" ];
- })
- (fetchpatch {
- # Fix for newer pytest disallowing calling fixtures
- # https://github.com/mitmproxy/mitmproxy/issues/3403
- # TODO: remove on next update
- name = "dont-call-fixtures.patch";
- url = "https://github.com/mitmproxy/mitmproxy/commit/ce28721458c8cc71de86513a5110676e9763041b.patch";
- sha256 = "05pljr28lx7l1xgswqr9sz8dnhvc7npzh8xg2p9hignf159kd54d";
- # Irrelevant in nixpkgs
- excludes = [ "setup.py" "setup.cfg" "release/docker/*" ];
- })
- ./pytest5.patch
- ];
-
postPatch = ''
# remove dependency constraints
sed 's/>=\([0-9]\.\?\)\+\( \?, \?<\([0-9]\.\?\)\+\)\?//' -i setup.py
@@ -61,17 +29,21 @@ buildPythonPackage rec {
'';
propagatedBuildInputs = [
- blinker click certifi cryptography
- h2 hyperframe kaitaistruct passlib
- pyasn1 pyopenssl pyparsing pyperclip
- ruamel_yaml tornado urwid brotlipy
- sortedcontainers ldap3 wsproto setuptools
+ blinker brotli certifi cffi
+ click cryptography flask h11
+ h2 hpack hyperframe itsdangerous
+ jinja2 kaitaistruct ldap3 markupsafe
+ passlib protobuf publicsuffix2 pyasn1
+ pycparser pyopenssl pyparsing pyperclip
+ ruamel_yaml setuptools six sortedcontainers
+ tornado urwid werkzeug wsproto zstandard
];
checkInputs = [
beautifulsoup4 flask pytest
requests glibcLocales
asynctest parver pytest-asyncio
+ hypothesis
];
meta = with stdenv.lib; {
diff --git a/nixpkgs/pkgs/tools/networking/mitmproxy/pytest5.patch b/nixpkgs/pkgs/tools/networking/mitmproxy/pytest5.patch
deleted file mode 100644
index bfbf7253b9c..00000000000
--- a/nixpkgs/pkgs/tools/networking/mitmproxy/pytest5.patch
+++ /dev/null
@@ -1,31 +0,0 @@
-diff --git a/test/mitmproxy/net/test_tls.py b/test/mitmproxy/net/test_tls.py
-index 489bf89f..c78472e3 100644
---- a/test/mitmproxy/net/test_tls.py
-+++ b/test/mitmproxy/net/test_tls.py
-@@ -87,14 +87,16 @@ def test_get_client_hello():
- rfile = io.BufferedReader(io.BytesIO(
- FULL_CLIENT_HELLO_NO_EXTENSIONS[:30]
- ))
-- with pytest.raises(exceptions.TlsProtocolException, message="Unexpected EOF"):
-+ with pytest.raises(exceptions.TlsProtocolException):
- tls.get_client_hello(rfile)
-+ pytest.fail("Unexpected EOF")
-
- rfile = io.BufferedReader(io.BytesIO(
- b"GET /"
- ))
-- with pytest.raises(exceptions.TlsProtocolException, message="Expected TLS record"):
-+ with pytest.raises(exceptions.TlsProtocolException):
- tls.get_client_hello(rfile)
-+ pytest.fail("Expected TLS record")
-
-
- class TestClientHello:
-@@ -153,5 +155,6 @@ class TestClientHello:
- b"\x01\x00\x00\x03" + # handshake header
- b"foo"
- ))
-- with pytest.raises(exceptions.TlsProtocolException, message='Cannot parse Client Hello'):
-+ with pytest.raises(exceptions.TlsProtocolException):
- tls.ClientHello.from_file(rfile)
-+ pytest.fail('Cannot parse Client Hello')
diff --git a/nixpkgs/pkgs/tools/networking/modem-manager/default.nix b/nixpkgs/pkgs/tools/networking/modem-manager/default.nix
index e9d925fb930..7329d78c2c8 100644
--- a/nixpkgs/pkgs/tools/networking/modem-manager/default.nix
+++ b/nixpkgs/pkgs/tools/networking/modem-manager/default.nix
@@ -3,12 +3,12 @@
stdenv.mkDerivation rec {
pname = "modem-manager";
- version = "1.12.6";
+ version = "1.12.8";
package = "ModemManager";
src = fetchurl {
url = "https://www.freedesktop.org/software/${package}/${package}-${version}.tar.xz";
- sha256 = "0k32rjh06p3q9yq054gxya6c7n39bilhi4s23p2hb02iwlz3bcrf";
+ sha256 = "1zrsf57bn9rmaa2qvavr1aisci76vwlx0viqpwmkw3ds2l33vdb8";
};
nativeBuildInputs = [ vala gobject-introspection gettext pkgconfig ];
@@ -30,6 +30,8 @@ stdenv.mkDerivation rec {
export G_TEST_DBUS_DAEMON="${dbus.daemon}/bin/dbus-daemon"
'';
+ enableParallelBuilding = true;
+
doCheck = true;
meta = with stdenv.lib; {
diff --git a/nixpkgs/pkgs/tools/networking/mosh/bash_completion_datadir.patch b/nixpkgs/pkgs/tools/networking/mosh/bash_completion_datadir.patch
new file mode 100644
index 00000000000..4b71f125d28
--- /dev/null
+++ b/nixpkgs/pkgs/tools/networking/mosh/bash_completion_datadir.patch
@@ -0,0 +1,19 @@
+diff --git a/configure.ac b/configure.ac
+index 3ad983d..ff8ff96 100644
+--- a/configure.ac
++++ b/configure.ac
+@@ -476,13 +476,7 @@ AS_IF([echo "$protobuf_LIBS" | grep -q -- -pthread],
+
+ # Bash completion needs to ask where it goes if >= 2.0 is installed.
+ AS_IF([test "$install_completion" != no],
+- [PKG_CHECK_MODULES([BASH_COMPLETION], [bash-completion >= 2.0],
+- [if test "$prefix" = "NONE"; then
+- completions="`pkg-config --variable=completionsdir bash-completion`"
+- else
+- completions="`pkg-config --define-variable=prefix=$prefix --variable=completionsdir bash-completion`"
+- fi],
+- [completions="${sysconfdir}/bash_completion.d"])
++ [completions="`pkg-config --define-variable=datadir=$datadir --variable=completionsdir bash-completion`"]
+ AC_SUBST([completions])])
+
+ AC_CONFIG_FILES([
diff --git a/nixpkgs/pkgs/tools/networking/mosh/default.nix b/nixpkgs/pkgs/tools/networking/mosh/default.nix
index 648fdb9d20e..26c9035cd79 100644
--- a/nixpkgs/pkgs/tools/networking/mosh/default.nix
+++ b/nixpkgs/pkgs/tools/networking/mosh/default.nix
@@ -25,6 +25,8 @@ stdenv.mkDerivation rec {
url = "https://github.com/mobile-shell/mosh/commit/e5f8a826ef9ff5da4cfce3bb8151f9526ec19db0.patch";
sha256 = "15518rb0r5w1zn4s6981bf1sz6ins6gpn2saizfzhmr13hw4gmhm";
})
+ # Fix build with bash-completion 2.10
+ ./bash_completion_datadir.patch
];
postPatch = ''
substituteInPlace scripts/mosh.pl \
diff --git a/nixpkgs/pkgs/tools/networking/mu/default.nix b/nixpkgs/pkgs/tools/networking/mu/default.nix
index 2e6a401350c..98dec71f456 100644
--- a/nixpkgs/pkgs/tools/networking/mu/default.nix
+++ b/nixpkgs/pkgs/tools/networking/mu/default.nix
@@ -1,27 +1,31 @@
{ stdenv, fetchFromGitHub, sqlite, pkgconfig, autoreconfHook, pmccabe
, xapian, glib, gmime3, texinfo , emacs, guile
, gtk3, webkitgtk, libsoup, icu
-, withMug ? false }:
+, withMug ? false
+, batchSize ? null }:
stdenv.mkDerivation rec {
pname = "mu";
- version = "1.2";
+ version = "1.4.5";
src = fetchFromGitHub {
owner = "djcb";
repo = "mu";
rev = version;
- sha256 = "0yhjlj0z23jw3cf2wfnl98y8q6gikvmhkb8vdm87bd7jw0bdnrfz";
+ sha256 = "18y672cqaicp30zymxr88spmzcn0x7rcv14nbdmd8hzp52rscpj7";
};
- # test-utils coredumps so don't run those
- postPatch = ''
- sed -i -e '/test-utils/d' lib/parser/Makefile.am
+ postPatch = stdenv.lib.optionalString (batchSize != null) ''
+ sed -i lib/mu-store.cc --regexp-extended \
+ -e 's@(constexpr auto BatchSize).*@\1 = ${toString batchSize};@'
'';
buildInputs = [
- sqlite xapian glib gmime3 texinfo emacs guile libsoup icu
- ] ++ stdenv.lib.optionals withMug [ gtk3 webkitgtk ];
+ sqlite xapian glib gmime3 texinfo emacs libsoup icu
+ ]
+ # Workaround for https://github.com/djcb/mu/issues/1641
+ ++ stdenv.lib.optional (!stdenv.isDarwin) guile
+ ++ stdenv.lib.optionals withMug [ gtk3 webkitgtk ];
nativeBuildInputs = [ pkgconfig autoreconfHook pmccabe ];
@@ -31,15 +35,11 @@ stdenv.mkDerivation rec {
# Fix mu4e-builddir (set it to $out)
substituteInPlace mu4e/mu4e-meta.el.in \
--replace "@abs_top_builddir@" "$out"
-
- # We install msg2pdf to bin/msg2pdf, fix its location in elisp
- substituteInPlace mu4e/mu4e-actions.el \
- --replace "/toys/msg2pdf/" "/bin/"
'';
- # Install mug and msg2pdf
+ # Install mug
postInstall = stdenv.lib.optionalString withMug ''
- for f in msg2pdf mug ; do
+ for f in mug ; do
install -m755 toys/$f/$f $out/bin/$f
done
'';
@@ -50,7 +50,7 @@ stdenv.mkDerivation rec {
description = "A collection of utilties for indexing and searching Maildirs";
license = licenses.gpl3Plus;
homepage = "https://www.djcbsoftware.nl/code/mu/";
+ maintainers = with maintainers; [ antono peterhoeg ];
platforms = platforms.mesaPlatforms;
- maintainers = with maintainers; [ antono the-kenny peterhoeg ];
};
}
diff --git a/nixpkgs/pkgs/tools/networking/nebula/default.nix b/nixpkgs/pkgs/tools/networking/nebula/default.nix
index ec94fc97997..69fc3e7a8b0 100644
--- a/nixpkgs/pkgs/tools/networking/nebula/default.nix
+++ b/nixpkgs/pkgs/tools/networking/nebula/default.nix
@@ -11,7 +11,7 @@ buildGoModule rec {
sha256 = "0xrki9w83b4b3l5adq1rxz374f124wf388sdyvy7ngc3b04k7qlb";
};
- modSha256 = "0v45ikw0bl00412krg4v6sr9bggvsrvl0h6clihkh4mdfz6kwa47";
+ vendorSha256 = "094mn1r69c40w7k3lsggjh0dpws9l0j7mgiyjy1lpblkvkyk2azm";
subPackages = [ "cmd/nebula" "cmd/nebula-cert" ];
@@ -40,4 +40,4 @@ buildGoModule rec {
platforms = platforms.all;
};
-}
+} \ No newline at end of file
diff --git a/nixpkgs/pkgs/tools/networking/netsniff-ng/default.nix b/nixpkgs/pkgs/tools/networking/netsniff-ng/default.nix
index c0c7b6782df..9eb9afcb0e7 100644
--- a/nixpkgs/pkgs/tools/networking/netsniff-ng/default.nix
+++ b/nixpkgs/pkgs/tools/networking/netsniff-ng/default.nix
@@ -4,14 +4,14 @@
stdenv.mkDerivation rec {
pname = "netsniff-ng";
- version = "0.6.6";
+ version = "0.6.7";
# Upstream recommends and supports git
src = fetchFromGitHub {
repo = pname;
owner = pname;
rev = "v${version}";
- sha256 = "0spp8dl4i5xcqfbqxxcpdf3gwcmyf4ywl1dd79w6gzbr07p894p5";
+ sha256 = "1jvihq30cwlpjqwny0lcrciysn40wscq6xik3s9b81nw2s7wiyqr";
};
nativeBuildInputs = [ pkgconfig makeWrapper bison flex ];
diff --git a/nixpkgs/pkgs/tools/networking/network-manager/strongswan/default.nix b/nixpkgs/pkgs/tools/networking/network-manager/strongswan/default.nix
index 4f0a516b420..a1c6962d3f9 100644
--- a/nixpkgs/pkgs/tools/networking/network-manager/strongswan/default.nix
+++ b/nixpkgs/pkgs/tools/networking/network-manager/strongswan/default.nix
@@ -3,11 +3,11 @@
stdenv.mkDerivation rec {
pname = "NetworkManager-strongswan";
- version = "1.4.5";
+ version = "1.5.0";
src = fetchurl {
url = "https://download.strongswan.org/NetworkManager/${pname}-${version}.tar.bz2";
- sha256 = "015xcj42pd84apa0j0n9r3fhldp42mj72dqvl2xf4r9gwg5nhfrl";
+ sha256 = "1x6hivr1v76fxy1dn82xrj9rj8k3r097kf4yiblqq16y631hxzy4";
};
buildInputs = [ networkmanager strongswanNM libsecret gtk3 libnma ];
diff --git a/nixpkgs/pkgs/tools/networking/obfs4/default.nix b/nixpkgs/pkgs/tools/networking/obfs4/default.nix
index 02820c0a74f..784c6d5c638 100644
--- a/nixpkgs/pkgs/tools/networking/obfs4/default.nix
+++ b/nixpkgs/pkgs/tools/networking/obfs4/default.nix
@@ -10,7 +10,7 @@ buildGoModule rec {
sha256 = "05aqmw8x8s0yqyqmdj5zcsq06gsbcmrlcd52gaqm20m1pg9503ad";
};
- modSha256 = "150kg22kznrdj5icjxk3qd70g7wpq8zd2zklw1y2fgvrggw8zvyv";
+ vendorSha256 = "0h3gjxv26pc6cysvy1hny2f4abw6i847dk8fx0m113ixx9qghk87";
meta = with lib; {
description = "A pluggable transport proxy";
@@ -18,4 +18,4 @@ buildGoModule rec {
repositories.git = "https://git.torproject.org/pluggable-transports/obfs4.git";
maintainers = with maintainers; [ phreedom thoughtpolice ];
};
-}
+} \ No newline at end of file
diff --git a/nixpkgs/pkgs/tools/networking/openfortivpn/default.nix b/nixpkgs/pkgs/tools/networking/openfortivpn/default.nix
index 6e6e8fbf23c..b0be2ab5e6d 100644
--- a/nixpkgs/pkgs/tools/networking/openfortivpn/default.nix
+++ b/nixpkgs/pkgs/tools/networking/openfortivpn/default.nix
@@ -3,7 +3,7 @@
with stdenv.lib;
let repo = "openfortivpn";
- version = "1.13.1";
+ version = "1.13.3";
in stdenv.mkDerivation {
name = "${repo}-${version}";
@@ -12,7 +12,7 @@ in stdenv.mkDerivation {
owner = "adrienverge";
inherit repo;
rev = "v${version}";
- sha256 = "1sfqi169xf0wmlpzri9frkgsh99fgjvcpbdkd42vsm10qa1dnpk5";
+ sha256 = "1y3b3zwzig520nyky7xnr0l0zf68i4w698bysyngpkada14d8dv3";
};
nativeBuildInputs = [ autoreconfHook pkgconfig ];
diff --git a/nixpkgs/pkgs/tools/networking/openvpn/default.nix b/nixpkgs/pkgs/tools/networking/openvpn/default.nix
index 88ed0599c2c..09ad8db46ea 100644
--- a/nixpkgs/pkgs/tools/networking/openvpn/default.nix
+++ b/nixpkgs/pkgs/tools/networking/openvpn/default.nix
@@ -19,11 +19,11 @@ let
in stdenv.mkDerivation rec {
pname = "openvpn";
- version = "2.4.7";
+ version = "2.4.9";
src = fetchurl {
url = "https://swupdate.openvpn.net/community/releases/${pname}-${version}.tar.xz";
- sha256 = "0j7na936isk9j8nsdrrbw7wmy09inmjqvsb8mw8az7k61xbm6bx4";
+ sha256 = "1qpbllwlha7cffsd5dlddb8rl22g9rar5zflkz1wrcllhvfkl7v4";
};
nativeBuildInputs = [ pkgconfig ];
@@ -33,13 +33,6 @@ in stdenv.mkDerivation rec {
++ optional useSystemd systemd
++ optional pkcs11Support pkcs11helper;
- patches = [
- ( fetchpatch {
- url = "https://sources.debian.org/data/main/o/openvpn/2.4.7-1/debian/patches/fix-pkcs11-helper-hang.patch";
- sha256 = "0c8jzbfsmb0mm9f7kkjxac1hk8q6igm267s687vx3mdqs1wys6bm";
- })
- ];
-
configureFlags = optionals stdenv.isLinux [
"--enable-iproute2"
"IPROUTE=${iproute}/sbin/ip" ]
@@ -68,7 +61,7 @@ in stdenv.mkDerivation rec {
meta = with stdenv.lib; {
description = "A robust and highly flexible tunneling application";
- downloadPage = "https://openvpn.net/index.php/open-source/downloads.html";
+ downloadPage = "https://openvpn.net/community-downloads/";
homepage = "https://openvpn.net/";
license = licenses.gpl2;
maintainers = with maintainers; [ viric ];
diff --git a/nixpkgs/pkgs/tools/networking/pixiecore/default.nix b/nixpkgs/pkgs/tools/networking/pixiecore/default.nix
index bc8ec7da169..60d2a0986b1 100644
--- a/nixpkgs/pkgs/tools/networking/pixiecore/default.nix
+++ b/nixpkgs/pkgs/tools/networking/pixiecore/default.nix
@@ -12,7 +12,7 @@ buildGoModule rec {
sha256 = "14dslmx3gk08h9gqfjw5y27x7d2c6r8ir7mjd7l9ybysagpzr02a";
};
- modSha256 = "1waqaglm6f9zy5296z309ppkck2vmydhk9gjnxrgzmhqld5lcq4f";
+ vendorSha256 = "08n3m6fkwh8jmmzky3ygij4gxlcqidqk5ywi8ki8bkyzzs2lqaw7";
subPackages = [ "cmd/pixiecore" ];
meta = {
@@ -22,4 +22,4 @@ buildGoModule rec {
maintainers = with stdenv.lib.maintainers; [ bbigras danderson ];
platforms = stdenv.lib.platforms.linux;
};
-}
+} \ No newline at end of file
diff --git a/nixpkgs/pkgs/tools/networking/pykms/default.nix b/nixpkgs/pkgs/tools/networking/pykms/default.nix
index e1a13b73120..345999c00bc 100644
--- a/nixpkgs/pkgs/tools/networking/pykms/default.nix
+++ b/nixpkgs/pkgs/tools/networking/pykms/default.nix
@@ -44,16 +44,14 @@ in buildPythonApplication rec {
propagatedBuildInputs = [ systemd pytz tzlocal ];
+ # Fix https://github.com/SystemRage/py-kms/issues/64 :
+ patches = [ ./log-to-current-directory-by-default.patch ];
+
postPatch = ''
siteDir=$out/${python3.sitePackages}
substituteInPlace pykms_DB2Dict.py \
--replace "'KmsDataBase.xml'" "'$siteDir/KmsDataBase.xml'"
-
- # we are logging to journal
- sed -i pykms_Misc.py \
- -e '6ifrom systemd import journal' \
- -e 's/log_obj.addHandler(log_handler)/log_obj.addHandler(journal.JournalHandler())/'
'';
format = "other";
diff --git a/nixpkgs/pkgs/tools/networking/pykms/log-to-current-directory-by-default.patch b/nixpkgs/pkgs/tools/networking/pykms/log-to-current-directory-by-default.patch
new file mode 100644
index 00000000000..7c8c65b63a2
--- /dev/null
+++ b/nixpkgs/pkgs/tools/networking/pykms/log-to-current-directory-by-default.patch
@@ -0,0 +1,20 @@
+# By default, create log files in current directory, instead of the script directory.
+--- ../original/py-kms/pykms_Client.py
++++ py-kms/pykms_Client.py
+@@ -48,5 +48,5 @@
+ 'choi' : ["CRITICAL", "ERROR", "WARNING", "INFO", "DEBUG", "MINI"]},
+ 'lfile' : {'help' : 'Use this option to set an output log file. The default is \"pykms_logclient.log\" or type \"STDOUT\" to view log info on stdout.',
+- 'def' : os.path.dirname(os.path.abspath( __file__ )) + "/pykms_logclient.log", 'des' : "logfile"},
++ 'def' : "pykms_logclient.log", 'des' : "logfile"},
+ 'lsize' : {'help' : 'Use this flag to set a maximum size (in MB) to the output log file. Desactivated by default.', 'def' : 0, 'des': "logsize"},
+ }
+--- ../original/py-kms/pykms_Server.py
++++ py-kms/pykms_Server.py
+@@ -85,5 +85,5 @@
+ 'choi' : ["CRITICAL", "ERROR", "WARNING", "INFO", "DEBUG", "MINI"]},
+ 'lfile' : {'help' : 'Use this option to set or not an output log file. The default is \"pykms_logserver.log\" or type \"STDOUT\" to view log info on stdout.',
+- 'def' : os.path.dirname(os.path.abspath( __file__ )) + "/pykms_logserver.log", 'des' : "logfile"},
++ 'def' : "pykms_logserver.log", 'des' : "logfile"},
+ 'lsize' : {'help' : 'Use this flag to set a maximum size (in MB) to the output log file. Desactivated by default.', 'def' : 0, 'des': "logsize"},
+ }
+ '');
diff --git a/nixpkgs/pkgs/tools/networking/rshijack/default.nix b/nixpkgs/pkgs/tools/networking/rshijack/default.nix
new file mode 100644
index 00000000000..59558028c01
--- /dev/null
+++ b/nixpkgs/pkgs/tools/networking/rshijack/default.nix
@@ -0,0 +1,23 @@
+{ lib, fetchFromGitHub, rustPlatform }:
+
+rustPlatform.buildRustPackage rec {
+ pname = "rshijack";
+ version = "0.3.0";
+
+ src = fetchFromGitHub {
+ owner = "kpcyrd";
+ repo = pname;
+ rev = "v${version}";
+ sha256 = "0y01hi3jpfawqlqs8ka0vwfhjw5j5gkhk2nz5m13ns2h27bw20v7";
+ };
+
+ cargoSha256 = "0l1kavacnjvi22l6pawgkqqxnjaizi3pddqkhwjshw4pzzixzvli";
+
+ meta = with lib; {
+ description = "TCP connection hijacker";
+ homepage = "https://github.com/kpcyrd/rshijack";
+ license = licenses.gpl3;
+ maintainers = with maintainers; [ xrelkd ];
+ platforms = platforms.linux;
+ };
+}
diff --git a/nixpkgs/pkgs/tools/networking/rtptools/default.nix b/nixpkgs/pkgs/tools/networking/rtptools/default.nix
index a713331d7c2..5d439f183d2 100644
--- a/nixpkgs/pkgs/tools/networking/rtptools/default.nix
+++ b/nixpkgs/pkgs/tools/networking/rtptools/default.nix
@@ -8,7 +8,7 @@ stdenv.mkDerivation rec {
};
meta = {
description = "A number of small applications that can be used for processing RTP data";
- homepage = "http://www.cs.columbia.edu/irt/software/rtptools/";
+ homepage = "https://www.cs.columbia.edu/irt/software/rtptools/";
maintainers = [ lib.maintainers.lheckemann ];
platforms = lib.platforms.unix;
license = lib.licenses.bsd3;
diff --git a/nixpkgs/pkgs/tools/networking/shadowfox/default.nix b/nixpkgs/pkgs/tools/networking/shadowfox/default.nix
index f2ae143e1b9..f4cc57c9c8b 100644
--- a/nixpkgs/pkgs/tools/networking/shadowfox/default.nix
+++ b/nixpkgs/pkgs/tools/networking/shadowfox/default.nix
@@ -13,7 +13,7 @@ buildGoModule rec {
goPackagePath = "github.com/SrKomodo/shadowfox-updater";
- modSha256 = "0hcc87mzacqwbw10l49kx0sxl4mivdr88c40wh6hdfvrbam2w86r";
+ vendorSha256 = "06ar9ivry9b01609izjbl6hqgg0cy7aqd8n2cqpyq0g7my0l0lbj";
buildFlags = [ "--tags" "release" ];
@@ -27,4 +27,4 @@ buildGoModule rec {
platforms = platforms.all;
maintainers = with maintainers; [ infinisil ];
};
-}
+} \ No newline at end of file
diff --git a/nixpkgs/pkgs/tools/networking/shadowsocks-rust/default.nix b/nixpkgs/pkgs/tools/networking/shadowsocks-rust/default.nix
index 36f6b584959..ba90a7cacb7 100644
--- a/nixpkgs/pkgs/tools/networking/shadowsocks-rust/default.nix
+++ b/nixpkgs/pkgs/tools/networking/shadowsocks-rust/default.nix
@@ -2,24 +2,23 @@
rustPlatform.buildRustPackage rec {
pname = "shadowsocks-rust";
- version = "1.7.2";
+ version = "1.8.11";
src = fetchFromGitHub {
rev = "v${version}";
owner = "shadowsocks";
repo = pname;
- sha256 = "0w7ysha46ml3j1i1knvll4pmqg291z8a2ypcy650m61dhrvkh2ng";
+ sha256 = "0imnvx3v0msk9qf72zy1qg5q52dmc8xfs9iwdwa2q13scjslgmwn";
};
- cargoSha256 = "0srmn8ndy7vdvcysyb7a5pjly0m3jchq0zrqzhrwicynm291w56h";
+ cargoSha256 = "1aqqx0pdq3vp5c06pjwsrbrqfkz5dhxnpvv3vnr3pqfm62xrffgg";
+
+ SODIUM_USE_PKG_CONFIG = 1;
buildInputs = [ openssl libsodium ]
++ stdenv.lib.optionals stdenv.isDarwin [ Security ];
nativeBuildInputs = [ pkgconfig ];
- # tries to read /etc/resolv.conf, hence fails in sandbox
- doCheck = false;
-
meta = with stdenv.lib; {
homepage = "https://github.com/shadowsocks/shadowsocks-rust";
description = "A Rust port of shadowsocks";
diff --git a/nixpkgs/pkgs/tools/networking/slimrat/default.nix b/nixpkgs/pkgs/tools/networking/slimrat/default.nix
deleted file mode 100644
index 1c26dc27b3f..00000000000
--- a/nixpkgs/pkgs/tools/networking/slimrat/default.nix
+++ /dev/null
@@ -1,33 +0,0 @@
-{stdenv, fetchurl, perlPackages, makeWrapper}:
-
-stdenv.mkDerivation {
- name = "slimrat-1.0";
- src = fetchurl {
- url = "https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/slimrat/slimrat-1.0.tar.bz2";
- sha256 = "139b71d45k4b1y47iq62a9732cnaqqbh8s4knkrgq2hx0jxpsk5a";
- };
-
- buildInputs = [ makeWrapper ] ++ (with perlPackages; [ perl WWWMechanize LWP ]);
-
- patchPhase = ''
- sed -e 's,#!.*,#!${perlPackages.perl}/bin/perl,' -i src/{slimrat,slimrat-gui}
- '';
-
- installPhase = ''
- mkdir -p $out/share/slimrat $out/bin
- cp -R src/* $out/share/slimrat
- # slimrat-gui does not work (it needs the Gtk2 perl package)
- for i in slimrat; do
- makeWrapper $out/share/slimrat/$i $out/bin/$i \
- --prefix PERL5LIB : $PERL5LIB
- done
- '';
-
- meta = {
- homepage = "https://code.google.com/archive/p/slimrat/";
- description = "Linux Rapidshare downloader";
- license = stdenv.lib.licenses.mit;
- platforms = stdenv.lib.platforms.unix;
- broken = true; # officially abandonned upstream
- };
-}
diff --git a/nixpkgs/pkgs/tools/networking/slirp4netns/default.nix b/nixpkgs/pkgs/tools/networking/slirp4netns/default.nix
index f3bd0a23d58..6b9279a8190 100644
--- a/nixpkgs/pkgs/tools/networking/slirp4netns/default.nix
+++ b/nixpkgs/pkgs/tools/networking/slirp4netns/default.nix
@@ -10,13 +10,13 @@
stdenv.mkDerivation rec {
pname = "slirp4netns";
- version = "1.0.0";
+ version = "1.0.1";
src = fetchFromGitHub {
owner = "rootless-containers";
repo = "slirp4netns";
rev = "v${version}";
- sha256 = "152wmccz47anvx5w88qcz8higw80l17jl7i24xfj5574adviqnv2";
+ sha256 = "1p5cvq0jsjkl136b8cz3j552x01g96j38ygh6m8ss62bmyzb8ayc";
};
nativeBuildInputs = [ autoreconfHook pkg-config ];
diff --git a/nixpkgs/pkgs/tools/networking/sniffglue/default.nix b/nixpkgs/pkgs/tools/networking/sniffglue/default.nix
new file mode 100644
index 00000000000..83f1e372aa5
--- /dev/null
+++ b/nixpkgs/pkgs/tools/networking/sniffglue/default.nix
@@ -0,0 +1,27 @@
+{ lib, fetchFromGitHub, rustPlatform, libpcap, libseccomp, pkgconfig }:
+
+rustPlatform.buildRustPackage rec {
+ pname = "sniffglue";
+ version = "0.10.1";
+
+ src = fetchFromGitHub {
+ owner = "kpcyrd";
+ repo = pname;
+ rev = "v${version}";
+ sha256 = "0vyxlqwh90shihp80fk0plnkjix9i37n2dnypzyz6nx44xd5737s";
+ };
+
+ cargoSha256 = "162p3a696k281cygqpl6gg4makwk2v0g2jnf1gd108dnz4jya11l";
+
+ nativeBuildInputs = [ pkgconfig ];
+
+ buildInputs = [ libpcap libseccomp ];
+
+ meta = with lib; {
+ description = "Secure multithreaded packet sniffer";
+ homepage = "https://github.com/kpcyrd/sniffglue";
+ license = licenses.gpl3;
+ maintainers = with maintainers; [ xrelkd ];
+ platforms = platforms.linux;
+ };
+}
diff --git a/nixpkgs/pkgs/tools/networking/tendermint/default.nix b/nixpkgs/pkgs/tools/networking/tendermint/default.nix
index 2bf907380e0..97f9b141767 100644
--- a/nixpkgs/pkgs/tools/networking/tendermint/default.nix
+++ b/nixpkgs/pkgs/tools/networking/tendermint/default.nix
@@ -2,16 +2,16 @@
buildGoModule rec {
pname = "tendermint";
- version = "0.32.10";
+ version = "0.32.11";
src = fetchFromGitHub {
owner = "tendermint";
repo = pname;
rev = "v${version}";
- sha256 = "0rf00fqbf8xvxbxnhki93knwdp4bqjvv548ia8c0w6cryj07plyg";
+ sha256 = "17p7khfiv5aflpl4imbqp8v7gignd6v6a7g80xlnzgix5ismh84l";
};
- modSha256 = "08f03haxzpi57gaxymsbzs0nbbgnf6z4gmpal476xy3gvc0dyi3r";
+ vendorSha256 = "1vhd3s6yxfhirgipxcy0rh8sk55cdzirr8n8r31sijgyak92mq0l";
meta = with stdenv.lib; {
description = "Byzantine-Fault Tolerant State Machines. Or Blockchain, for short.";
@@ -20,4 +20,4 @@ buildGoModule rec {
maintainers = with maintainers; [ alexfmpe ];
platforms = platforms.linux ++ platforms.darwin;
};
-}
+} \ No newline at end of file
diff --git a/nixpkgs/pkgs/tools/networking/termshark/default.nix b/nixpkgs/pkgs/tools/networking/termshark/default.nix
index ea1ef86f979..7933cad687a 100644
--- a/nixpkgs/pkgs/tools/networking/termshark/default.nix
+++ b/nixpkgs/pkgs/tools/networking/termshark/default.nix
@@ -14,7 +14,7 @@ buildGoModule rec {
nativeBuildInputs = [ makeWrapper ];
buildInputs = [ wireshark-cli ];
- modSha256 = "0lp4gky76di7as78421p3lsirfr7mic3z204ildvj6gf6d15svpr";
+ vendorSha256 = "14apff3vcbndr30765lzi4qswakavb4396bjixxvpxv6i5c04dq7";
postFixup = ''
wrapProgram $out/bin/termshark --prefix PATH : ${stdenv.lib.makeBinPath [ wireshark-cli ]}
@@ -31,4 +31,4 @@ buildGoModule rec {
license = licenses.mit;
maintainers = with maintainers; [ winpat elseym ];
};
-}
+} \ No newline at end of file
diff --git a/nixpkgs/pkgs/tools/networking/tox-node/default.nix b/nixpkgs/pkgs/tools/networking/tox-node/default.nix
index 1124c2ab557..feeceef81f4 100644
--- a/nixpkgs/pkgs/tools/networking/tox-node/default.nix
+++ b/nixpkgs/pkgs/tools/networking/tox-node/default.nix
@@ -24,7 +24,7 @@ buildRustPackage rec {
installPhase = ''
runHook preInstall
- install -D target/release/tox-node $out/bin/tox-node
+ install -D $releaseDir/tox-node $out/bin/tox-node
runHook postInstall
'';
diff --git a/nixpkgs/pkgs/tools/networking/tridactyl-native/default.nix b/nixpkgs/pkgs/tools/networking/tridactyl-native/default.nix
index 5efca2cb7fd..bca0fcb81c7 100644
--- a/nixpkgs/pkgs/tools/networking/tridactyl-native/default.nix
+++ b/nixpkgs/pkgs/tools/networking/tridactyl-native/default.nix
@@ -7,13 +7,13 @@ stdenv.mkDerivation rec {
pname = "tridactyl-native";
# this is actually the version of tridactyl itself; the native messenger will
# probably not change with every tridactyl version
- version = "1.17.1";
+ version = "1.18.1";
src = fetchFromGitHub {
owner = "tridactyl";
repo = "tridactyl";
rev = version;
- sha256 = "197vh3k9nh58djl6ph0lznkdb2schqlksxxr93xjkk4xsc7k6j1g";
+ sha256 = "0f4agsh0gqpyhl3nysv4x9f74hlnch27gp3l8bpl645kbbfkg0di";
};
sourceRoot = "source/native";
diff --git a/nixpkgs/pkgs/tools/networking/urlwatch/default.nix b/nixpkgs/pkgs/tools/networking/urlwatch/default.nix
index e7cbaa73cce..639bea38f0a 100644
--- a/nixpkgs/pkgs/tools/networking/urlwatch/default.nix
+++ b/nixpkgs/pkgs/tools/networking/urlwatch/default.nix
@@ -2,13 +2,13 @@
python3Packages.buildPythonApplication rec {
name = "urlwatch-${version}";
- version = "2.17";
+ version = "2.18";
src = fetchFromGitHub {
owner = "thp";
repo = "urlwatch";
rev = version;
- sha256 = "1865p3yczgpq8gvgh4cpgbx2ibc1fwycd7pagga9sj8r3q0giqyk";
+ sha256 = "14dmyk95v3kajhn1w2lpil3rjs78y0wxylsxclv6zjxgjcc1xsi3";
};
propagatedBuildInputs = with python3Packages; [
diff --git a/nixpkgs/pkgs/tools/networking/v2ray/generic.nix b/nixpkgs/pkgs/tools/networking/v2ray/generic.nix
index bf6e6cd55ae..e4831f5dced 100644
--- a/nixpkgs/pkgs/tools/networking/v2ray/generic.nix
+++ b/nixpkgs/pkgs/tools/networking/v2ray/generic.nix
@@ -13,7 +13,7 @@ let
pname = "v2ray-core";
inherit version src;
- modSha256 = "11gsncy3449a7y6w6pr7acqabyj2q2a1q52f8fcl5cdz1vjbmmxi";
+ vendorSha256 = "1lh8382gyss01frq4gxyx9p26p5m8f158qfw55sy5wb7ddrafcc2";
buildPhase = ''
runHook preBuild
@@ -47,4 +47,4 @@ in runCommand "v2ray-${version}" {
makeWrapper "$file" "$out/bin/$(basename "$file")" \
--set-default V2RAY_LOCATION_ASSET ${assetsDrv}
done
-''
+'' \ No newline at end of file
diff --git a/nixpkgs/pkgs/tools/networking/vde2/default.nix b/nixpkgs/pkgs/tools/networking/vde2/default.nix
index be3d1267861..b10ec5c1695 100644
--- a/nixpkgs/pkgs/tools/networking/vde2/default.nix
+++ b/nixpkgs/pkgs/tools/networking/vde2/default.nix
@@ -17,7 +17,7 @@ stdenv.mkDerivation rec {
})
] ++ stdenv.lib.optional stdenv.hostPlatform.isMusl [
(fetchpatch {
- url = "https://git.alpinelinux.org/cgit/aports/plain/main/vde2/musl-build-fix.patch?id=ddee2f86a48e087867d4a2c12849b2e3baccc238";
+ url = "https://git.alpinelinux.org/aports/plain/main/vde2/musl-build-fix.patch?id=ddee2f86a48e087867d4a2c12849b2e3baccc238";
sha256 = "0b5382v541bkxhqylilcy34bh83ag96g71f39m070jzvi84kx8af";
})
];
diff --git a/nixpkgs/pkgs/tools/networking/wifite2/default.nix b/nixpkgs/pkgs/tools/networking/wifite2/default.nix
index 8ff0c6d84ab..505e461e480 100644
--- a/nixpkgs/pkgs/tools/networking/wifite2/default.nix
+++ b/nixpkgs/pkgs/tools/networking/wifite2/default.nix
@@ -3,14 +3,14 @@
, hcxdumptool, pyrit, which }:
python3.pkgs.buildPythonApplication rec {
- version = "2.5.2";
+ version = "2.5.3";
pname = "wifite2";
src = fetchFromGitHub {
owner = "kimocoder";
repo = "wifite2";
rev = version;
- sha256 = "0hsb59d86szn27s3hynpzkp49rmw4g692vrl67nal7rfcdvpp8hb";
+ sha256 = "080hbjpbgdnzr6jkmg5cb8dvzxm57zpi4c9x0y92yy472vqll3ax";
};
patches = [
diff --git a/nixpkgs/pkgs/tools/networking/wireguard-go/default.nix b/nixpkgs/pkgs/tools/networking/wireguard-go/default.nix
index 1fa8bac33e2..41946b88471 100644
--- a/nixpkgs/pkgs/tools/networking/wireguard-go/default.nix
+++ b/nixpkgs/pkgs/tools/networking/wireguard-go/default.nix
@@ -2,13 +2,13 @@
buildGoPackage rec {
pname = "wireguard-go";
- version = "0.0.20200121";
+ version = "0.0.20200320";
goPackagePath = "golang.zx2c4.com/wireguard";
src = fetchzip {
url = "https://git.zx2c4.com/wireguard-go/snapshot/wireguard-go-${version}.tar.xz";
- sha256 = "04ca1j8lcbyg1qg7ls23yy90s17k97i912ksxfpads0sdd3r2yc9";
+ sha256 = "0fy4qsss3i3pkq1rpgjds4aipbwlh1dr9hbbf7jn2a1c63kfks0r";
};
patches = [ ./0001-Fix-darwin-build.patch ];
diff --git a/nixpkgs/pkgs/tools/networking/wireguard-go/deps.nix b/nixpkgs/pkgs/tools/networking/wireguard-go/deps.nix
index b1a92582b7c..859b8572f82 100644
--- a/nixpkgs/pkgs/tools/networking/wireguard-go/deps.nix
+++ b/nixpkgs/pkgs/tools/networking/wireguard-go/deps.nix
@@ -23,8 +23,8 @@
fetch = {
type = "git";
url = "https://go.googlesource.com/sys";
- rev = "c178f38b412c";
- sha256 = "1r6v8xnvb4z5vdckbj6vd08kn6h4ivr9hvdpgq4drj6l1mp79rf7";
+ rev = "5c8b2ff67527";
+ sha256 = "0r5s7f4w7crrbcf5ydpr2xzsq0svjm332vsds41yp58kwi2lvh2v";
};
}
{
diff --git a/nixpkgs/pkgs/tools/networking/wireguard-tools/default.nix b/nixpkgs/pkgs/tools/networking/wireguard-tools/default.nix
index 0a86d7dec8f..4b6e2aa9f18 100644
--- a/nixpkgs/pkgs/tools/networking/wireguard-tools/default.nix
+++ b/nixpkgs/pkgs/tools/networking/wireguard-tools/default.nix
@@ -1,23 +1,23 @@
-{
- stdenv, fetchzip,
-
- iptables ? null,
- iproute ? null,
- makeWrapper ? null,
- openresolv ? null,
- procps ? null,
- wireguard-go ? null,
+{ stdenv
+, fetchzip
+, nixosTests
+, iptables ? null
+, iproute ? null
+, makeWrapper ? null
+, openresolv ? null
+, procps ? null
+, wireguard-go ? null
}:
with stdenv.lib;
stdenv.mkDerivation rec {
pname = "wireguard-tools";
- version = "1.0.20200319";
+ version = "1.0.20200510";
src = fetchzip {
url = "https://git.zx2c4.com/wireguard-tools/snapshot/wireguard-tools-${version}.tar.xz";
- sha256 = "0g9vlngg9dnh7qqfhaycw35fq8ij5hfz6p1cykh4ncjgr93i7rbx";
+ sha256 = "0xqchidfn1j3jq5w7ck570aib12q9z0mfvwhmnyzqxx7d3qh76j6";
};
outputs = [ "out" "man" ];
@@ -47,7 +47,12 @@ stdenv.mkDerivation rec {
done
'';
- passthru.updateScript = ./update.sh;
+ passthru = {
+ updateScript = ./update.sh;
+ tests = {
+ inherit (nixosTests) wireguard wg-quick wireguard-generated wireguard-namespaces;
+ };
+ };
meta = {
description = "Tools for the WireGuard secure network tunnel";
diff --git a/nixpkgs/pkgs/tools/networking/wormhole/default.nix b/nixpkgs/pkgs/tools/networking/wormhole/default.nix
new file mode 100644
index 00000000000..2b826224f42
--- /dev/null
+++ b/nixpkgs/pkgs/tools/networking/wormhole/default.nix
@@ -0,0 +1,33 @@
+{ stdenv
+, rustPlatform
+, fetchFromGitHub
+, openssl
+, pkg-config
+, Security
+}:
+
+rustPlatform.buildRustPackage rec {
+ pname = "wormhole";
+ version = "0.1.5";
+
+ src = fetchFromGitHub {
+ owner = "agrinman";
+ repo = pname;
+ rev = version;
+ sha256 = "0aq2myzqd9xqz4zdl03jhdd7f22y9k39xdhiark6ymhwcxijsq8y";
+ };
+
+ cargoSha256 = "1gjqiv8sgdab0i461v72zcvh91cpqmmpcc3qyx3svq0391rwzp46";
+
+ nativeBuildInputs = stdenv.lib.optionals stdenv.isLinux [ pkg-config ];
+ buildInputs = [ ]
+ ++ stdenv.lib.optionals stdenv.isLinux [ openssl ]
+ ++ stdenv.lib.optionals stdenv.isDarwin [ Security ];
+
+ meta = with stdenv.lib; {
+ description = "Expose your local web server to the internet with a public URL";
+ homepage = "https://tunnelto.dev";
+ license = licenses.mit;
+ maintainers = with maintainers; [ filalex77 ];
+ };
+}
diff --git a/nixpkgs/pkgs/tools/networking/yggdrasil/default.nix b/nixpkgs/pkgs/tools/networking/yggdrasil/default.nix
index 91b08015327..438d620d2b5 100644
--- a/nixpkgs/pkgs/tools/networking/yggdrasil/default.nix
+++ b/nixpkgs/pkgs/tools/networking/yggdrasil/default.nix
@@ -1,4 +1,4 @@
-{ lib, buildGoModule, fetchFromGitHub }:
+{ lib, buildGoModule, fetchFromGitHub, nixosTests }:
buildGoModule rec {
pname = "yggdrasil";
@@ -11,7 +11,7 @@ buildGoModule rec {
sha256 = "147kl2kvv1rn3yk0mlvd998a2yayjl07csxxkjvs6264j6csb860";
};
- modSha256 = "1ffp7q7kbkm1312sz6xnpc7342iczy9vj3m76lflirr1ljmw0dnb";
+ vendorSha256 = "09xv2p9rydnsb185x61fxhyjqx41wz285c1gdd47ad3s08ay1qc7";
# Change the default location of the management socket on Linux
# systems so that the yggdrasil system service unit does not have to
@@ -27,6 +27,8 @@ buildGoModule rec {
-s -w
'';
+ passthru.tests.basic = nixosTests.yggdrasil;
+
meta = with lib; {
description =
"An experiment in scalable routing as an encrypted IPv6 overlay network";
@@ -35,4 +37,4 @@ buildGoModule rec {
platforms = platforms.all;
maintainers = with maintainers; [ ehmry gazally lassulus ];
};
-}
+} \ No newline at end of file
diff --git a/nixpkgs/pkgs/tools/nix/cached-nix-shell/default.nix b/nixpkgs/pkgs/tools/nix/cached-nix-shell/default.nix
index dc69d3f030d..03f6bc2b117 100644
--- a/nixpkgs/pkgs/tools/nix/cached-nix-shell/default.nix
+++ b/nixpkgs/pkgs/tools/nix/cached-nix-shell/default.nix
@@ -34,7 +34,7 @@ in rustPlatform.buildRustPackage rec {
postInstall = ''
mkdir -p $out/lib $out/share/cached-nix-shell $out/share/man/man1 $out/var/empty
- cp target/release/build/cached-nix-shell-*/out/trace-nix.so $out/lib
+ cp $releaseDir/build/cached-nix-shell-*/out/trace-nix.so $out/lib
cp rcfile.sh $out/share/cached-nix-shell/rcfile.sh
cp cached-nix-shell.1 $out/share/man/man1
'';
diff --git a/nixpkgs/pkgs/tools/nix/nixos-generators/default.nix b/nixpkgs/pkgs/tools/nix/nixos-generators/default.nix
index 4e51b9b46dd..c1e84494609 100644
--- a/nixpkgs/pkgs/tools/nix/nixos-generators/default.nix
+++ b/nixpkgs/pkgs/tools/nix/nixos-generators/default.nix
@@ -2,12 +2,12 @@
stdenv.mkDerivation rec {
pname = "nixos-generators";
- version = "1.0.0";
+ version = "1.1.0";
src = fetchFromGitHub {
owner = "nix-community";
repo = "nixos-generators";
rev = version;
- sha256 = "10xncifdfhilxclxyf72h7dcfn8yn1h34qbkvdq9l76ghv5qjniq";
+ sha256 = "04cfhj42c2m7lafir9ksh36n3nhx3x20lhamyk4zc5p3pm1xdbs6";
};
nativeBuildInputs = [ makeWrapper ];
installFlags = [ "PREFIX=$(out)" ];
diff --git a/nixpkgs/pkgs/tools/nix/nixpkgs-fmt/default.nix b/nixpkgs/pkgs/tools/nix/nixpkgs-fmt/default.nix
index dfd7eb63b12..53e70ad7bd7 100644
--- a/nixpkgs/pkgs/tools/nix/nixpkgs-fmt/default.nix
+++ b/nixpkgs/pkgs/tools/nix/nixpkgs-fmt/default.nix
@@ -1,16 +1,16 @@
-{ lib, rustPlatform, fetchFromGitHub }:
+{ lib, rustPlatform, fetchFromGitHub, fetchpatch }:
rustPlatform.buildRustPackage rec {
pname = "nixpkgs-fmt";
- version = "0.7.0";
+ version = "0.9.0";
src = fetchFromGitHub {
owner = "nix-community";
repo = pname;
rev = "v${version}";
- sha256 = "0b9wwv77bpq24yxky44ndgvxsx2zgsl15lvl6wklbkr41mwz3xis";
+ sha256 = "1kkw87c63nx5pqsxcwn6iw27k02j9ls21zyhb5dvf0zaqd9sz7ad";
};
-
- cargoSha256 = "1vv2gypbmgd9lksrk5h2z3agcs1269p1i3im9529nhcsl62ckj7n";
+
+ cargoSha256 = "1wybvm9qckx9cd656gx9zrbszmaj66ihh2kk6qqdb6maixcq5k0x";
meta = with lib; {
description = "Nix code formatter for nixpkgs";
diff --git a/nixpkgs/pkgs/tools/package-management/cargo-about/default.nix b/nixpkgs/pkgs/tools/package-management/cargo-about/default.nix
index 82da6b7b93c..84bea234c20 100644
--- a/nixpkgs/pkgs/tools/package-management/cargo-about/default.nix
+++ b/nixpkgs/pkgs/tools/package-management/cargo-about/default.nix
@@ -1,16 +1,16 @@
{ lib, rustPlatform, fetchFromGitHub }:
rustPlatform.buildRustPackage rec {
pname = "cargo-about";
- version = "0.2.0";
+ version = "0.2.2";
src = fetchFromGitHub {
owner = "EmbarkStudios";
repo = "cargo-about";
rev = "${version}";
- sha256 = "0bsay1vqi5b3z7qjwbkwx3ikmpjzc0kswbajm50xmcwlg8jrn420";
+ sha256 = "00ing1v6vjqfvirp3mbayn8rwvxf72wnhz9249k2iifw8bl2r2hd";
};
- cargoSha256 = "1ynalwaqa70ihgras3frp5l3xniz58hwp108wkxn6zj8lwxbxfgx";
+ cargoSha256 = "1wmw7knkx79fbwizaj9qkcnw0ld1lsfhca8mfpn5f0daxa5v5y97";
meta = with lib; {
description = "Cargo plugin to generate list of all licenses for a crate";
diff --git a/nixpkgs/pkgs/tools/package-management/cargo-audit/default.nix b/nixpkgs/pkgs/tools/package-management/cargo-audit/default.nix
index fba2b82ff32..01acc2ed6ed 100644
--- a/nixpkgs/pkgs/tools/package-management/cargo-audit/default.nix
+++ b/nixpkgs/pkgs/tools/package-management/cargo-audit/default.nix
@@ -1,16 +1,16 @@
{ stdenv, lib, rustPlatform, fetchFromGitHub, openssl, pkg-config, Security, libiconv }:
rustPlatform.buildRustPackage rec {
pname = "cargo-audit";
- version = "0.11.2";
+ version = "0.12.0";
src = fetchFromGitHub {
owner = "RustSec";
repo = "cargo-audit";
rev = "v${version}";
- sha256 = "0py4z50ld4vs0g7vh8ga6v5h11nz2yfcpr3xqzpihf4p7sg1mdf4";
+ sha256 = "0zby9bd64bmrkb229ic7ckn2ycf9bpwsisx2a7z0id0j4mjaca4k";
};
- cargoSha256 = "0n4q8767aby6fgq0z7wj966zgqydlwirrzgyahf234dz6arsxw2l";
+ cargoSha256 = "1w4618w5yj1205d7s2hq273fb35qfcd7cnxdwxn4pq8x3ahgy4kx";
buildInputs = [ openssl libiconv ] ++ lib.optionals stdenv.isDarwin [ Security ];
nativeBuildInputs = [ pkg-config ];
diff --git a/nixpkgs/pkgs/tools/package-management/cargo-deb/default.nix b/nixpkgs/pkgs/tools/package-management/cargo-deb/default.nix
index 623c8e2065c..c6e8b4803cc 100644
--- a/nixpkgs/pkgs/tools/package-management/cargo-deb/default.nix
+++ b/nixpkgs/pkgs/tools/package-management/cargo-deb/default.nix
@@ -6,18 +6,18 @@
rustPlatform.buildRustPackage rec {
pname = "cargo-deb";
- version = "1.23.2";
+ version = "1.24.0";
src = fetchFromGitHub {
owner = "mmstick";
repo = pname;
- rev = "367910e0020de93f45c175c92a37a53ee401978f";
- sha256 = "1s0xv818rlafdzpb70c1ldv5iq3hh2jxj7g3l6p7v20q1wx0nnvv";
+ rev = "b49351f6770aa7aeb053dd1d4a02d6b086caad2a";
+ sha256 = "1hs96yv0awgi7ggpxp7k3n21jpv642sm0529b21hs9ib6kp4vs8s";
};
buildInputs = lib.optionals stdenv.isDarwin [ Security ];
- cargoSha256 = "0ffzq2gm0f56vyfkmdzxfs5z1xsdj2kcsyc1fdrk4k1cylqn2f47";
+ cargoSha256 = "1vqnnqn6rzkdi239bh3lk7gaxr7w6v3c4ws4ya1ah04g6v9hkzlw";
meta = with lib; {
description = "Generate Debian packages from information in Cargo.toml";
diff --git a/nixpkgs/pkgs/tools/package-management/cargo-outdated/default.nix b/nixpkgs/pkgs/tools/package-management/cargo-outdated/default.nix
index 41b6d26d02d..1a20c6b9ab6 100644
--- a/nixpkgs/pkgs/tools/package-management/cargo-outdated/default.nix
+++ b/nixpkgs/pkgs/tools/package-management/cargo-outdated/default.nix
@@ -2,16 +2,16 @@
rustPlatform.buildRustPackage rec {
pname = "cargo-outdated";
- version = "0.9.9";
+ version = "0.9.10";
src = fetchFromGitHub {
owner = "kbknapp";
repo = pname;
rev = "v${version}";
- sha256 = "01yvkfclrynv7gpvdckzbcv03xr28yb4v6333a6nv6gy05p26g3a";
+ sha256 = "1aj76wwpnvniv5xdygfv17kj74rxxkvngkvw2019qinm2nv81c3p";
};
- cargoSha256 = "152f2f16d5vlww51aldvh1r2r4kx8ad5d48dc30xsfj669zzw24h";
+ cargoSha256 = "0nzxx31nlmrcrcs67z1wci0d4n6kdq83z2ld4bq8xgp6p916f4sl";
nativeBuildInputs = [ pkg-config ];
buildInputs = [ openssl ]
diff --git a/nixpkgs/pkgs/tools/package-management/clib/default.nix b/nixpkgs/pkgs/tools/package-management/clib/default.nix
index 5fdf6d66362..c7e3c0fb665 100644
--- a/nixpkgs/pkgs/tools/package-management/clib/default.nix
+++ b/nixpkgs/pkgs/tools/package-management/clib/default.nix
@@ -1,14 +1,14 @@
{ stdenv, fetchFromGitHub, curl }:
stdenv.mkDerivation rec {
- version = "1.11.2";
+ version = "1.11.3";
pname = "clib";
src = fetchFromGitHub {
rev = version;
owner = "clibs";
repo = "clib";
- sha256 = "03q5l873zc1dm478f35ibqandypakf47hzqb5gjpnpbcyb2m2jxz";
+ sha256 = "0qwds9w9y2dy39bwh2523wra5dj820cjl11ynkshh7k94fk7qgpm";
};
hardeningDisable = [ "fortify" ];
diff --git a/nixpkgs/pkgs/tools/package-management/emplace/default.nix b/nixpkgs/pkgs/tools/package-management/emplace/default.nix
index bb91697ab57..4c591777691 100644
--- a/nixpkgs/pkgs/tools/package-management/emplace/default.nix
+++ b/nixpkgs/pkgs/tools/package-management/emplace/default.nix
@@ -2,16 +2,16 @@
rustPlatform.buildRustPackage rec {
pname = "emplace";
- version = "0.2.15";
+ version = "0.3.1";
src = fetchFromGitHub {
owner = "tversteeg";
repo = pname;
rev = "v${version}";
- sha256 = "1h1z18m504kflzv9wcybkgc4xr5w9l9d7qsjri0an57lxv6dpv0f";
+ sha256 = "0wg8wavbs063dnpjia7wd60nf97v7pl4lm6s9xndpai1r1c99c2d";
};
- cargoSha256 = "1wfxy4py2xwf1m0i52jq1f9xgzc7v5m55crl0xbp8f0raflksaxk";
+ cargoSha256 = "0igq8aml22c26w43zgk2gii8yl8mhs8ikfh0bn32ajwigqfk4vaq";
meta = with lib; {
description = "Mirror installed software on multiple machines";
diff --git a/nixpkgs/pkgs/tools/package-management/home-manager/default.nix b/nixpkgs/pkgs/tools/package-management/home-manager/default.nix
index 8c70a5a4724..e569d5a3de9 100644
--- a/nixpkgs/pkgs/tools/package-management/home-manager/default.nix
+++ b/nixpkgs/pkgs/tools/package-management/home-manager/default.nix
@@ -35,7 +35,7 @@ stdenv.mkDerivation rec {
meta = with stdenv.lib; {
description = "A user environment configurator";
- maintainers = with maintainers; [ rycee ];
+ homepage = "https://rycee.gitlab.io/home-manager/";
platforms = platforms.unix;
license = licenses.mit;
};
diff --git a/nixpkgs/pkgs/tools/package-management/morph/default.nix b/nixpkgs/pkgs/tools/package-management/morph/default.nix
index a1d2f15ad13..130bf2bb2e5 100644
--- a/nixpkgs/pkgs/tools/package-management/morph/default.nix
+++ b/nixpkgs/pkgs/tools/package-management/morph/default.nix
@@ -29,10 +29,10 @@ buildGoPackage rec {
postInstall = ''
mkdir -p $lib
cp -v $src/data/*.nix $lib
- wrapProgram $bin/bin/morph --prefix PATH : ${lib.makeBinPath [ openssh ]};
+ wrapProgram $out/bin/morph --prefix PATH : ${lib.makeBinPath [ openssh ]};
'';
- outputs = [ "out" "bin" "lib" ];
+ outputs = [ "out" "lib" ];
meta = with lib; {
description = "Morph is a NixOS host manager written in Golang.";
diff --git a/nixpkgs/pkgs/tools/package-management/mynewt-newt/default.nix b/nixpkgs/pkgs/tools/package-management/mynewt-newt/default.nix
index 54435b76947..ce155b72fc3 100644
--- a/nixpkgs/pkgs/tools/package-management/mynewt-newt/default.nix
+++ b/nixpkgs/pkgs/tools/package-management/mynewt-newt/default.nix
@@ -22,7 +22,7 @@ buildGoModule rec {
})
];
- modSha256 = "068r8wa2pgd68jv50x0l1w8n96f97b3mgv7z6f85280ahgywaasq";
+ vendorSha256 = "1sh9mx3lc28fzvc1yrhz58rlbaac7aq1dqyvxwj98vld3kigpv1z";
meta = with stdenv.lib; {
homepage = "https://mynewt.apache.org/";
@@ -36,4 +36,4 @@ buildGoModule rec {
maintainers = with maintainers; [ pjones ];
platforms = platforms.unix;
};
-}
+} \ No newline at end of file
diff --git a/nixpkgs/pkgs/tools/package-management/nfpm/default.nix b/nixpkgs/pkgs/tools/package-management/nfpm/default.nix
index 0b5f5edf399..b1a44d7458b 100644
--- a/nixpkgs/pkgs/tools/package-management/nfpm/default.nix
+++ b/nixpkgs/pkgs/tools/package-management/nfpm/default.nix
@@ -11,7 +11,7 @@ buildGoModule rec {
sha256 = "0zl8xf74k5is8rxbirrqb5cnfgrlppr1gchfqm31305mnpicr92s";
};
- modSha256 = "14izjwadl4ify0wrz0yinqvayar79h0pxxqj5n69a5dgbx09fp0l";
+ vendorSha256 = "07xg8cm7pqpnb96drcmzk7rj2dhfn4pd8vr2a7nxqizd3qk6d5bf";
buildFlagsArray = [ "-ldflags=-s -w -X main.version=${version}" ];
@@ -21,4 +21,4 @@ buildGoModule rec {
maintainers = [ maintainers.marsam ];
license = licenses.mit;
};
-}
+} \ No newline at end of file
diff --git a/nixpkgs/pkgs/tools/package-management/nix-du/default.nix b/nixpkgs/pkgs/tools/package-management/nix-du/default.nix
index fa1394242d2..417962733af 100644
--- a/nixpkgs/pkgs/tools/package-management/nix-du/default.nix
+++ b/nixpkgs/pkgs/tools/package-management/nix-du/default.nix
@@ -14,7 +14,7 @@ rustPlatform.buildRustPackage rec {
cargoSha256 = "1a6svl89dcdb5fpvs2i32i6agyhl0sx7kkkw70rqr17fyzl5psai";
doCheck = true;
- checkInputs = [ graphviz ];
+ checkInputs = [ nix graphviz ];
buildInputs = [
boost
diff --git a/nixpkgs/pkgs/tools/package-management/nix-prefetch/default.nix b/nixpkgs/pkgs/tools/package-management/nix-prefetch/default.nix
index 19a40b7395f..1a750da6930 100644
--- a/nixpkgs/pkgs/tools/package-management/nix-prefetch/default.nix
+++ b/nixpkgs/pkgs/tools/package-management/nix-prefetch/default.nix
@@ -1,67 +1,74 @@
-{ stdenv, fetchFromGitHub, makeWrapper
-, asciidoc, docbook_xml_dtd_45, docbook_xsl, libxml2, libxslt
-, coreutils, gawk, gnugrep, gnused, jq, nix }:
+{ stdenv, fetchFromGitHub, installShellFiles, makeWrapper, asciidoc
+, docbook_xml_dtd_45, git, docbook_xsl, libxml2, libxslt, coreutils, gawk
+, gnugrep, gnused, jq, nix }:
-stdenv.mkDerivation rec {
+let
+ binPath = stdenv.lib.makeBinPath [ coreutils gawk git gnugrep gnused jq nix ];
+
+in stdenv.mkDerivation rec {
pname = "nix-prefetch";
- version = "0.3.0";
+ version = "0.3.1";
src = fetchFromGitHub {
owner = "msteen";
repo = "nix-prefetch";
rev = version;
- sha256 = "0b9gdi7xzmfq0j258x724xsll8gi31m0m4pzfjkqinlm6zwr3sgm";
+ sha256 = "15h6f743nn6sdq8l771sjxh92cyzqznkcs7szrc7nm066xvx8rd4";
+ # the stat call has to be in a subshell or we get the current date
+ extraPostFetch = ''
+ echo $(stat -c %Y $out) > $out/.timestamp
+ '';
};
+ postPatch = ''
+ lib=$out/lib/${pname}
+
+ substituteInPlace doc/nix-prefetch.1.asciidoc \
+ --subst-var-by version $version
+
+ substituteInPlace src/main.sh \
+ --subst-var-by lib $lib \
+ --subst-var-by version $version
+
+ substituteInPlace src/tests.sh \
+ --subst-var-by bin $out/bin
+ '';
+
nativeBuildInputs = [
+ asciidoc
+ docbook_xml_dtd_45
+ docbook_xsl
+ installShellFiles
+ libxml2
+ libxslt
makeWrapper
- asciidoc docbook_xml_dtd_45 docbook_xsl libxml2 libxslt
];
- configurePhase = ''
- . configure.sh
- '';
+ dontConfigure = true;
buildPhase = ''
- a2x -f manpage doc/nix-prefetch.1.asciidoc
+ a2x -a revdate=$(date --utc --date=@$(cat $src/.timestamp) +%d/%m/%Y) \
+ -f manpage doc/nix-prefetch.1.asciidoc
'';
installPhase = ''
- lib=$out/lib/${pname}
- mkdir -p $lib
- substitute src/main.sh $lib/main.sh \
- --subst-var-by lib $lib \
- --subst-var-by version '${version}'
- chmod +x $lib/main.sh
- patchShebangs $lib/main.sh
- cp lib/*.nix $lib/
-
- mkdir -p $out/bin
+ install -Dm555 -t $lib src/*.sh
+ install -Dm444 -t $lib lib/*
makeWrapper $lib/main.sh $out/bin/${pname} \
- --prefix PATH : '${stdenv.lib.makeBinPath [ coreutils gawk gnugrep gnused jq nix ]}'
-
- substitute src/tests.sh $lib/tests.sh \
- --subst-var-by bin $out/bin
- chmod +x $lib/tests.sh
- patchShebangs $lib/tests.sh
+ --prefix PATH : ${binPath}
- mkdir -p $out/share/man/man1
- substitute doc/nix-prefetch.1 $out/share/man/man1/nix-prefetch.1 \
- --subst-var-by version '${version}' \
- --replace '01/01/1970' "$date"
+ installManPage doc/nix-prefetch.?
- install -D contrib/nix-prefetch-completion.bash $out/share/bash-completion/completions/nix-prefetch
- install -D contrib/nix-prefetch-completion.zsh $out/share/zsh/site-functions/_nix_prefetch
+ installShellCompletion --name ${pname} contrib/nix-prefetch-completion.{bash,zsh}
mkdir -p $out/share/doc/${pname}/contrib
- cp -r contrib/hello_rs $out/share/doc/${pname}/contrib/
+ cp -r contrib/hello_rs $out/share/doc/${pname}/contrib
'';
meta = with stdenv.lib; {
description = "Prefetch any fetcher function call, e.g. package sources";
- homepage = "https://github.com/msteen/nix-prefetch";
license = licenses.mit;
maintainers = with maintainers; [ msteen ];
- platforms = platforms.all;
+ inherit (src.meta) homepage;
};
}
diff --git a/nixpkgs/pkgs/tools/package-management/nix-simple-deploy/default.nix b/nixpkgs/pkgs/tools/package-management/nix-simple-deploy/default.nix
new file mode 100644
index 00000000000..3bc0b35c0f1
--- /dev/null
+++ b/nixpkgs/pkgs/tools/package-management/nix-simple-deploy/default.nix
@@ -0,0 +1,23 @@
+{ stdenv, fetchFromGitHub, rustPlatform }:
+
+rustPlatform.buildRustPackage rec {
+ pname = "nix-simple-deploy";
+ version = "0.1.1";
+
+ src = fetchFromGitHub {
+ owner = "misuzu";
+ repo = pname;
+ rev = version;
+ sha256 = "12g0sbgs2dfnk0agp1kagfi1yhk26ga98zygxxrjhjxrqb2n5w80";
+ };
+
+ cargoSha256 = "0svnz9r0lrmz333qpbpdddjd46vh9i74qchws8aifa2qwnqy0kmn";
+
+ meta = with stdenv.lib; {
+ description = "Deploy software or an entire NixOS system configuration to another NixOS system";
+ homepage = "https://github.com/misuzu/nix-simple-deploy";
+ license = with licenses; [ asl20 /* OR */ mit ];
+ platforms = platforms.all;
+ maintainers = with maintainers; [ misuzu ];
+ };
+}
diff --git a/nixpkgs/pkgs/tools/package-management/nix/default.nix b/nixpkgs/pkgs/tools/package-management/nix/default.nix
index 96fd1bebdd4..c44c7d4c96d 100644
--- a/nixpkgs/pkgs/tools/package-management/nix/default.nix
+++ b/nixpkgs/pkgs/tools/package-management/nix/default.nix
@@ -14,6 +14,8 @@ common =
, pkgconfig, boehmgc, perlPackages, libsodium, brotli, boost, editline, nlohmann_json
, autoreconfHook, autoconf-archive, bison, flex, libxml2, libxslt, docbook5, docbook_xsl_ns
, jq, libarchive, rustc, cargo
+ # Used by tests
+ , gmock
, busybox-sandbox-shell
, storeDir
, stateDir
@@ -39,7 +41,8 @@ common =
nativeBuildInputs =
[ pkgconfig ]
- ++ lib.optionals is24 [ autoreconfHook autoconf-archive bison flex libxml2 libxslt docbook5 docbook_xsl_ns jq ];
+ ++ lib.optionals is24 [ autoreconfHook autoconf-archive bison flex libxml2 libxslt
+ docbook5 docbook_xsl_ns jq gmock ];
buildInputs =
[ curl openssl sqlite xz bzip2 nlohmann_json
@@ -177,7 +180,7 @@ in rec {
nixStable = callPackage common (rec {
name = "nix-2.3.4";
src = fetchurl {
- url = "http://nixos.org/releases/nix/${name}/${name}.tar.xz";
+ url = "https://nixos.org/releases/nix/${name}/${name}.tar.xz";
sha256 = "1c626a0de0acc69830b1891ec4d3c96aabe673b2a9fd04cef84f2304d05ad00d";
};
@@ -188,18 +191,18 @@ in rec {
nixUnstable = lib.lowPrio (callPackage common rec {
name = "nix-2.4${suffix}";
- suffix = "pre7346_5e7ccdc9";
+ suffix = "pre7534_b92f58f6";
src = fetchFromGitHub {
owner = "NixOS";
repo = "nix";
- rev = "5e7ccdc9e3ddd61dc85e20c898001345bfb497a5";
- sha256 = "10jg0rq92xbigbbri7harn4b75blqaf6rjgq4hhvlnggf2w9iprg";
+ rev = "b92f58f6d9e44f97002d1722bd77bad939824c1c";
+ sha256 = "1p791961y5v04kpz37g6hm98f1ig7i34inxl9dcj3pbqhf5kicxg";
};
crates = fetchurl {
- url = "https://hydra.nixos.org/build/115942497/download/1/nix-vendored-crates-2.4pre20200403_3473b19.tar.xz";
- sha256 = "a83785553bb4bc5b28220562153e201ec555a00171466ac08b716f0c97aee45a";
+ url = "https://hydra.nixos.org/build/118797694/download/1/nix-vendored-crates-2.4pre7534_b92f58f6.tar.xz";
+ sha256 = "a4c2612bbd81732bbb899bc0c230e07b16f6b6150ffbb19c4907dedbbc2bf9fc";
};
inherit storeDir stateDir confDir boehmgc;
@@ -207,18 +210,18 @@ in rec {
nixFlakes = lib.lowPrio (callPackage common rec {
name = "nix-2.4${suffix}";
- suffix = "pre20200403_3473b19";
+ suffix = "pre20200501_941f952";
src = fetchFromGitHub {
owner = "NixOS";
repo = "nix";
- rev = "3473b1950a90d596a3baa080fdfdb080f55a5cc0";
- sha256 = "1bb7a8a5lzmb3pzq80zxd3s9y3qv757q7032s5wvp75la9wgvmvr";
+ rev = "941f95284ab57e9baa317791327cf1715d8564b5";
+ sha256 = "0d99jl5baxji5dmqb4fwmbffx0z04k0naanms5zzbwvxdmzn3yhs";
};
crates = fetchurl {
- url = "https://hydra.nixos.org/build/115942497/download/1/nix-vendored-crates-2.4pre20200403_3473b19.tar.xz";
- sha256 = "a83785553bb4bc5b28220562153e201ec555a00171466ac08b716f0c97aee45a";
+ url = "https://hydra.nixos.org/build/118093786/download/1/nix-vendored-crates-2.4pre20200501_941f952.tar.xz";
+ sha256 = "060f4n5srdbb8vsj0m14aqch7im79a4h5g3nrs41p1xc602vhcdl";
};
inherit storeDir stateDir confDir boehmgc;
diff --git a/nixpkgs/pkgs/tools/package-management/nixops/nixops-v1_6_1.nix b/nixpkgs/pkgs/tools/package-management/nixops/nixops-v1_6_1.nix
index e6e30b26240..dc0c733ca7b 100644
--- a/nixpkgs/pkgs/tools/package-management/nixops/nixops-v1_6_1.nix
+++ b/nixpkgs/pkgs/tools/package-management/nixops/nixops-v1_6_1.nix
@@ -3,7 +3,7 @@
callPackage ./generic.nix (rec {
version = "1.6.1";
src = fetchurl {
- url = "http://nixos.org/releases/nixops/nixops-${version}/nixops-${version}.tar.bz2";
+ url = "https://nixos.org/releases/nixops/nixops-${version}/nixops-${version}.tar.bz2";
sha256 = "0lfx5fhyg3z6725ydsk0ibg5qqzp5s0x9nbdww02k8s307axiah3";
};
nixopsAzurePackages = with python2Packages; [
diff --git a/nixpkgs/pkgs/tools/package-management/nixpkgs-review/default.nix b/nixpkgs/pkgs/tools/package-management/nixpkgs-review/default.nix
index d8811b2a7e2..922546009fc 100644
--- a/nixpkgs/pkgs/tools/package-management/nixpkgs-review/default.nix
+++ b/nixpkgs/pkgs/tools/package-management/nixpkgs-review/default.nix
@@ -8,13 +8,13 @@
python3.pkgs.buildPythonApplication rec {
pname = "nixpkgs-review";
- version = "2.2.0";
+ version = "2.3.1";
src = fetchFromGitHub {
owner = "Mic92";
repo = "nixpkgs-review";
rev = version;
- sha256 = "0qsvrcxl97nih1yprydzlqc6n1ppg726664d6harx5kjzp5776mr";
+ sha256 = "1v988jsxx2r82q6mf3503130cny088hin2as00yi26jzxjkrjcli";
};
makeWrapperArgs = [
diff --git a/nixpkgs/pkgs/tools/security/afl/default.nix b/nixpkgs/pkgs/tools/security/afl/default.nix
index df5e3728943..e32aa034874 100644
--- a/nixpkgs/pkgs/tools/security/afl/default.nix
+++ b/nixpkgs/pkgs/tools/security/afl/default.nix
@@ -47,6 +47,11 @@ let
# has totally different semantics in that case(?) - and also set a
# proper AFL_CC and AFL_CXX so we don't pick up the wrong one out
# of $PATH.
+ # first though we need to replace the afl-clang-fast++ symlink with
+ # a real copy to prevent wrapProgram skipping the symlink and confusing
+ # nix's cc wrapper
+ rm $out/bin/afl-clang-fast++
+ cp $out/bin/afl-clang-fast $out/bin/afl-clang-fast++
for x in $out/bin/afl-clang-fast $out/bin/afl-clang-fast++; do
wrapProgram $x \
--prefix AFL_PATH : "$out/lib/afl" \
@@ -68,7 +73,7 @@ let
also useful for seeding other, more labor or resource-intensive
testing regimes down the road.
'';
- homepage = "http://lcamtuf.coredump.cx/afl/";
+ homepage = "https://lcamtuf.coredump.cx/afl/";
license = stdenv.lib.licenses.asl20;
platforms = ["x86_64-linux" "i686-linux"];
maintainers = with stdenv.lib.maintainers; [ thoughtpolice ris ];
diff --git a/nixpkgs/pkgs/tools/security/afl/libdislocator.nix b/nixpkgs/pkgs/tools/security/afl/libdislocator.nix
index 953c59e435c..103786d1244 100644
--- a/nixpkgs/pkgs/tools/security/afl/libdislocator.nix
+++ b/nixpkgs/pkgs/tools/security/afl/libdislocator.nix
@@ -22,7 +22,7 @@ stdenv.mkDerivation {
'';
meta = with stdenv.lib; {
- homepage = "http://lcamtuf.coredump.cx/afl/";
+ homepage = "https://lcamtuf.coredump.cx/afl/";
description = ''
Drop-in replacement for the libc allocator which improves
the odds of bumping into heap-related security bugs in
diff --git a/nixpkgs/pkgs/tools/security/aflplusplus/default.nix b/nixpkgs/pkgs/tools/security/aflplusplus/default.nix
new file mode 100644
index 00000000000..f99be6d7575
--- /dev/null
+++ b/nixpkgs/pkgs/tools/security/aflplusplus/default.nix
@@ -0,0 +1,146 @@
+{ stdenv, stdenvNoCC, fetchFromGitHub, callPackage, makeWrapper
+, clang_9, llvm_9, gcc, which, libcgroup, python, perl, gmp
+, file, cmocka, wine ? null, fetchpatch
+}:
+
+# wine fuzzing is only known to work for win32 binaries, and using a mixture of
+# 32 and 64-bit libraries ... complicates things, so it's recommended to build
+# a full 32bit version of this package if you want to do wine fuzzing
+assert (wine != null) -> (stdenv.targetPlatform.system == "i686-linux");
+
+let
+ aflplusplus-qemu = callPackage ./qemu.nix { inherit aflplusplus; };
+ qemu-exe-name = if stdenv.targetPlatform.system == "x86_64-linux" then "qemu-x86_64"
+ else if stdenv.targetPlatform.system == "i686-linux" then "qemu-i386"
+ else throw "aflplusplus: no support for ${stdenv.targetPlatform.system}!";
+ libdislocator = callPackage ./libdislocator.nix { inherit aflplusplus; };
+ libtokencap = callPackage ./libtokencap.nix { inherit aflplusplus; };
+ aflplusplus = stdenvNoCC.mkDerivation rec {
+ pname = "aflplusplus";
+ version = "2.64c";
+
+ src = fetchFromGitHub {
+ owner = "AFLplusplus";
+ repo = "AFLplusplus";
+ rev = version;
+ sha256 = "0n618pk6nlmkcbv1qm05fny4mnhcprrw0ppmra1phvk1y22iildj";
+ };
+ enableParallelBuilding = true;
+
+ # build of unsigaction32 broken in 2.64c:
+ # https://github.com/AFLplusplus/AFLplusplus/commit/079fdbf9bc5be1adba19e4bd08be965bd4dd79dc#commitcomment-38428357
+ # The applied patch fixes it.
+ patches = [
+ (fetchpatch {
+ url = "https://github.com/AFLplusplus/AFLplusplus/commit/5b9928f1a9d4b017ea04365ca8b522fde71236eb.patch";
+ sha256 = "1m4w9w4jaxb2mjkwvr6r4qa2j5cdzzpchjphpwd95861h0zvb6hh";
+ })
+ ];
+
+ # Note: libcgroup isn't needed for building, just for the afl-cgroup
+ # script.
+ nativeBuildInputs = [ makeWrapper which clang_9 gcc ];
+ buildInputs = [ llvm_9 python gmp ]
+ ++ stdenv.lib.optional (wine != null) python.pkgs.wrapPython;
+
+
+ postPatch = ''
+ # Replace the CLANG_BIN variables with the correct path
+ substituteInPlace llvm_mode/afl-clang-fast.c \
+ --replace "CLANGPP_BIN" '"${clang_9}/bin/clang++"' \
+ --replace "CLANG_BIN" '"${clang_9}/bin/clang"' \
+ --replace 'getenv("AFL_PATH")' "(getenv(\"AFL_PATH\") ? getenv(\"AFL_PATH\") : \"$out/lib/afl\")"
+
+ # Replace "gcc" and friends with full paths in afl-gcc
+ # Prevents afl-gcc picking up any (possibly incorrect) gcc from the path
+ substituteInPlace src/afl-gcc.c \
+ --replace '"gcc"' '"${gcc}/bin/gcc"' \
+ --replace '"g++"' '"${gcc}/bin/g++"' \
+ --replace '"gcj"' '"gcj-UNSUPPORTED"' \
+ --replace '"clang"' '"clang-UNSUPPORTED"' \
+ --replace '"clang++"' '"clang++-UNSUPPORTED"'
+ '';
+
+ makeFlags = [ "PREFIX=$(out)" ];
+ buildPhase = ''
+ common="$makeFlags -j$NIX_BUILD_CORES"
+ make all $common
+ make radamsa $common
+ make -C gcc_plugin CC=${gcc}/bin/gcc CXX=${gcc}/bin/g++ $common
+ make -C llvm_mode $common
+ make -C qemu_mode/libcompcov $common
+ make -C qemu_mode/unsigaction $common
+ '';
+
+ postInstall = ''
+ # remove afl-clang(++) which are just symlinks to afl-clang-fast
+ rm $out/bin/afl-clang $out/bin/afl-clang++
+
+ # the makefile neglects to install unsigaction
+ cp qemu_mode/unsigaction/unsigaction*.so $out/lib/afl/
+
+ # Install the custom QEMU emulator for binary blob fuzzing.
+ cp ${aflplusplus-qemu}/bin/${qemu-exe-name} $out/bin/afl-qemu-trace
+
+ # give user a convenient way of accessing libcompconv.so, libdislocator.so, libtokencap.so
+ cat > $out/bin/get-afl-qemu-libcompcov-so <<END
+ #!${stdenv.shell}
+ echo $out/lib/afl/libcompcov.so
+ END
+ chmod +x $out/bin/get-afl-qemu-libcompcov-so
+ cp ${libdislocator}/bin/get-libdislocator-so $out/bin/
+ cp ${libtokencap}/bin/get-libtokencap-so $out/bin/
+
+ # Install the cgroups wrapper for asan-based fuzzing.
+ cp examples/asan_cgroups/limit_memory.sh $out/bin/afl-cgroup
+ chmod +x $out/bin/afl-cgroup
+ substituteInPlace $out/bin/afl-cgroup \
+ --replace "cgcreate" "${libcgroup}/bin/cgcreate" \
+ --replace "cgexec" "${libcgroup}/bin/cgexec" \
+ --replace "cgdelete" "${libcgroup}/bin/cgdelete"
+
+ patchShebangs $out/bin
+
+ '' + stdenv.lib.optionalString (wine != null) ''
+ substitute afl-wine-trace $out/bin/afl-wine-trace \
+ --replace "qemu_mode/unsigaction" "$out/lib/afl"
+ chmod +x $out/bin/afl-wine-trace
+
+ # qemu needs to be fed ELFs, not wrapper scripts, so we have to cheat a bit if we
+ # detect a wrapped wine
+ for winePath in ${wine}/bin/.wine ${wine}/bin/wine; do
+ if [ -x $winePath ]; then break; fi
+ done
+ makeWrapperArgs="--set-default 'AFL_WINE_PATH' '$winePath'" \
+ wrapPythonProgramsIn $out/bin ${python.pkgs.pefile}
+ '';
+
+ installCheckInputs = [ perl file cmocka ];
+ doInstallCheck = true;
+ installCheckPhase = ''
+ # replace references to tools in build directory with references to installed locations
+ substituteInPlace test/test.sh \
+ --replace '../libcompcov.so' '`$out/bin/get-afl-qemu-libcompcov-so`' \
+ --replace '../libdislocator.so' '`$out/bin/get-libdislocator-so`' \
+ --replace '../libtokencap.so' '`$out/bin/get-libtokencap-so`'
+ perl -pi -e 's|(?<!\.)(\.\./)([^\s\/]+?)(?<!\.c)(?<!\.s?o)(?=\s)|\$out/bin/\2|g' test/test.sh
+ cd test && ./test.sh
+ '';
+
+ passthru = {
+ inherit libdislocator libtokencap;
+ qemu = aflplusplus-qemu;
+ };
+
+ meta = {
+ description = ''
+ AFL++ is a heavily enhanced version of AFL, incorporating many features and
+ improvements from the community.
+ '';
+ homepage = "https://aflplus.plus";
+ license = stdenv.lib.licenses.asl20;
+ platforms = ["x86_64-linux" "i686-linux"];
+ maintainers = with stdenv.lib.maintainers; [ ris mindavi ];
+ };
+ };
+in aflplusplus
diff --git a/nixpkgs/pkgs/tools/security/aflplusplus/libdislocator.nix b/nixpkgs/pkgs/tools/security/aflplusplus/libdislocator.nix
new file mode 100644
index 00000000000..6f947a7280a
--- /dev/null
+++ b/nixpkgs/pkgs/tools/security/aflplusplus/libdislocator.nix
@@ -0,0 +1,37 @@
+{ stdenv, aflplusplus}:
+
+stdenv.mkDerivation {
+ version = stdenv.lib.getVersion aflplusplus;
+ pname = "libdislocator";
+
+ src = aflplusplus.src;
+ postUnpack = "chmod -R +w ${aflplusplus.src.name}";
+ sourceRoot = "${aflplusplus.src.name}/libdislocator";
+
+ makeFlags = [ "PREFIX=$(out)" ];
+
+ preInstall = ''
+ mkdir -p $out/lib/afl
+ # issue is fixed upstream: https://github.com/AFLplusplus/AFLplusplus/commit/2a60ceb6944a7ca273057ddf64dcf837bf7f9521
+ sed -i 's/README\.dislocator\.md/README\.md/g' Makefile
+ '';
+ postInstall = ''
+ mkdir $out/bin
+ cat > $out/bin/get-libdislocator-so <<END
+ #!${stdenv.shell}
+ echo $out/lib/afl/libdislocator.so
+ END
+ chmod +x $out/bin/get-libdislocator-so
+ '';
+
+ meta = with stdenv.lib; {
+ homepage = "https://github.com/vanhauser-thc/AFLplusplus";
+ description = ''
+ Drop-in replacement for the libc allocator which improves
+ the odds of bumping into heap-related security bugs in
+ several ways.
+ '';
+ license = stdenv.lib.licenses.asl20;
+ maintainers = with maintainers; [ ris ];
+ };
+}
diff --git a/nixpkgs/pkgs/tools/security/aflplusplus/libtokencap.nix b/nixpkgs/pkgs/tools/security/aflplusplus/libtokencap.nix
new file mode 100644
index 00000000000..9421ee0d1e2
--- /dev/null
+++ b/nixpkgs/pkgs/tools/security/aflplusplus/libtokencap.nix
@@ -0,0 +1,32 @@
+{ stdenv, aflplusplus}:
+
+stdenv.mkDerivation {
+ version = stdenv.lib.getVersion aflplusplus;
+ pname = "libtokencap";
+
+ src = aflplusplus.src;
+ postUnpack = "chmod -R +w ${aflplusplus.src.name}";
+ sourceRoot = "${aflplusplus.src.name}/libtokencap";
+
+ makeFlags = [ "PREFIX=$(out)" ];
+
+ preInstall = ''
+ mkdir -p $out/lib/afl
+ mkdir -p $out/share/doc/afl
+ '';
+ postInstall = ''
+ mkdir $out/bin
+ cat > $out/bin/get-libtokencap-so <<END
+ #!${stdenv.shell}
+ echo $out/lib/afl/libtokencap.so
+ END
+ chmod +x $out/bin/get-libtokencap-so
+ '';
+
+ meta = with stdenv.lib; {
+ homepage = "https://github.com/vanhauser-thc/AFLplusplus";
+ description = "strcmp & memcmp token capture library";
+ license = stdenv.lib.licenses.asl20;
+ maintainers = with maintainers; [ ris ];
+ };
+}
diff --git a/nixpkgs/pkgs/tools/security/aflplusplus/qemu-no-etc-install.patch b/nixpkgs/pkgs/tools/security/aflplusplus/qemu-no-etc-install.patch
new file mode 100644
index 00000000000..5dfbfd780f1
--- /dev/null
+++ b/nixpkgs/pkgs/tools/security/aflplusplus/qemu-no-etc-install.patch
@@ -0,0 +1,13 @@
+diff --git a/Makefile b/Makefile
+index d6b9dc1..ce7c493 100644
+--- a/Makefile
++++ b/Makefile
+@@ -601,7 +601,7 @@ install-localstatedir:
+ endif
+
+
+-install: all $(if $(BUILD_DOCS),install-doc) install-datadir install-localstatedir
++install: all $(if $(BUILD_DOCS),install-doc) install-datadir
+ ifneq ($(TOOLS),)
+ $(call install-prog,$(subst qemu-ga,qemu-ga$(EXESUF),$(TOOLS)),$(DESTDIR)$(bindir))
+ endif
diff --git a/nixpkgs/pkgs/tools/security/aflplusplus/qemu.nix b/nixpkgs/pkgs/tools/security/aflplusplus/qemu.nix
new file mode 100644
index 00000000000..c51c839afe8
--- /dev/null
+++ b/nixpkgs/pkgs/tools/security/aflplusplus/qemu.nix
@@ -0,0 +1,83 @@
+{ stdenv, fetchurl, aflplusplus, python2, zlib, pkgconfig, glib, perl
+, texinfo, libuuid, flex, bison, pixman, autoconf
+}:
+
+with stdenv.lib;
+
+let
+ qemuName = "qemu-3.1.0";
+ cpuTarget = if stdenv.targetPlatform.system == "x86_64-linux" then "x86_64-linux-user"
+ else if stdenv.targetPlatform.system == "i686-linux" then "i386-linux-user"
+ else throw "aflplusplus: no support for ${stdenv.targetPlatform.system}!";
+in
+stdenv.mkDerivation {
+ name = "aflplusplus-${qemuName}";
+
+ srcs = [
+ (fetchurl {
+ url = "http://wiki.qemu.org/download/${qemuName}.tar.bz2";
+ sha256 = "08frr1fdjx8qcfh3fafn10kibdwbvkqqvfl7hpqbm7i9dg4f1zlq";
+ })
+ aflplusplus.src
+ ];
+
+ sourceRoot = qemuName;
+
+ postUnpack = ''
+ chmod -R +w ${aflplusplus.src.name}
+ for f in ${aflplusplus.src.name}/qemu_mode/patches/* ; do
+ sed -E -i 's|(\.\./)+patches/([a-z-]+\.h)|\2|g' $f
+ sed -E -i 's|\.\./\.\./config\.h|afl-config.h|g' $f
+ sed -E -i 's|\.\./\.\./include/cmplog\.h|afl-cmplog.h|g' $f
+ done
+ cp ${aflplusplus.src.name}/qemu_mode/patches/*.h $sourceRoot/
+ cp ${aflplusplus.src.name}/types.h $sourceRoot/afl-types.h
+ substitute ${aflplusplus.src.name}/config.h $sourceRoot/afl-config.h \
+ --replace "types.h" "afl-types.h"
+ substitute ${aflplusplus.src.name}/include/cmplog.h $sourceRoot/afl-cmplog.h \
+ --replace "config.h" "afl-config.h" \
+ --replace "forkserver.h" "afl-forkserver.h"
+ substitute ${aflplusplus.src.name}/include/forkserver.h $sourceRoot/afl-forkserver.h \
+ --replace "types.h" "afl-types.h"
+
+ cat ${aflplusplus.src.name}/qemu_mode/patches/*.diff > all.patch
+ '';
+
+ nativeBuildInputs = [
+ python2 perl pkgconfig flex bison autoconf texinfo
+ ];
+
+ buildInputs = [
+ zlib glib pixman libuuid
+ ];
+
+ enableParallelBuilding = true;
+
+ patches = [
+ # patches extracted from aflplusplus source
+ "../all.patch"
+ # nix-specific patches to make installation more well-behaved
+ ./qemu-no-etc-install.patch
+ ];
+
+ configureFlags =
+ [ "--disable-system"
+ "--enable-linux-user"
+ "--disable-gtk"
+ "--disable-sdl"
+ "--disable-vnc"
+ "--disable-kvm"
+ "--target-list=${cpuTarget}"
+ "--enable-pie"
+ "--sysconfdir=/etc"
+ "--localstatedir=/var"
+ ];
+
+ meta = with stdenv.lib; {
+ homepage = "https://www.qemu.org/";
+ description = "Fork of QEMU with AFL++ instrumentation support";
+ license = licenses.gpl2Plus;
+ maintainers = with maintainers; [ ris ];
+ platforms = platforms.linux;
+ };
+}
diff --git a/nixpkgs/pkgs/tools/security/age/default.nix b/nixpkgs/pkgs/tools/security/age/default.nix
index bde597ba9f3..c3756b545e3 100644
--- a/nixpkgs/pkgs/tools/security/age/default.nix
+++ b/nixpkgs/pkgs/tools/security/age/default.nix
@@ -2,9 +2,9 @@
buildGoModule rec {
pname = "age";
- version = "1.0.0-beta2";
+ version = "unstable-2020-03-25";
goPackagePath = "github.com/FiloSottile/age";
- modSha256 = "0kwdwhkxgqjd8h1p7pm4h4xidp2vk840h1j4qya4qz8bjf9vskl9";
+ vendorSha256 = "0km7a2826j3fk2nrkmgc990chrkcfz006wfw14yilsa4p2hmfl7m";
subPackages = [
"cmd/age"
@@ -14,8 +14,8 @@ buildGoModule rec {
src = fetchFromGitHub {
owner = "FiloSottile";
repo = "age";
- rev = "v${version}";
- sha256 = "1n1ww8yjw0mg00dvnfmggww9kwp1hls0a85iv6vx9k89mzv8mdrq";
+ rev = "f0f8092d60bb96737fa096c29ec6d8adb5810390";
+ sha256 = "079kfc8d1pr39hr4qnx48kviyzwg4p8m4pz0bdkypns4aq8ppbfk";
};
meta = with lib; {
@@ -24,4 +24,4 @@ buildGoModule rec {
license = licenses.bsd3;
maintainers = with maintainers; [ tazjin ];
};
-}
+} \ No newline at end of file
diff --git a/nixpkgs/pkgs/tools/security/bettercap/default.nix b/nixpkgs/pkgs/tools/security/bettercap/default.nix
index 0560f91b22b..8acb5fb9f83 100644
--- a/nixpkgs/pkgs/tools/security/bettercap/default.nix
+++ b/nixpkgs/pkgs/tools/security/bettercap/default.nix
@@ -19,7 +19,7 @@ buildGoModule rec {
sha256 = "18hwz9m16pxlb7wp78iqmdi0kimrx3h05fs0zhzm8qhzancq8alf";
};
- modSha256 = "1qhmrjb3fvw6maxrl7hb3bizrw6szhwx6s2g59p5pj3dz4x8jajn";
+ vendorSha256 = "1j272w0zdndcz4fmh9fzbk2q8wmyfi70vn0p6d8cg0r0l231sbyx";
nativeBuildInputs = [ pkg-config ];
buildInputs = [ libpcap libnfnetlink libnetfilter_queue libusb1 ];
@@ -34,4 +34,4 @@ buildGoModule rec {
maintainers = with maintainers; [ y0no ];
platforms = platforms.all;
};
-}
+} \ No newline at end of file
diff --git a/nixpkgs/pkgs/tools/security/bitwarden_rs/default.nix b/nixpkgs/pkgs/tools/security/bitwarden_rs/default.nix
index 6accefa58a4..6d3c4bccef9 100644
--- a/nixpkgs/pkgs/tools/security/bitwarden_rs/default.nix
+++ b/nixpkgs/pkgs/tools/security/bitwarden_rs/default.nix
@@ -8,13 +8,13 @@ let
in rustPlatform.buildRustPackage rec {
pname = "bitwarden_rs";
- version = "1.14.1";
+ version = "1.14.2";
src = fetchFromGitHub {
owner = "dani-garcia";
repo = pname;
rev = version;
- sha256 = "10fi5vvckmdbjvlg6mlaqh2dsm33sbkq1z1b6gmz8qjbijc8i7gw";
+ sha256 = "0413yjbnj4k917x48h1gnj64kygbr6c1n55f23qkvj0hgbxpgssz";
};
nativeBuildInputs = [ pkgconfig ];
@@ -25,7 +25,7 @@ in rustPlatform.buildRustPackage rec {
RUSTC_BOOTSTRAP = 1;
- cargoSha256 = "1p8wpndj1aydhcjl15z3xhjf52a0l5rh5cy9qs6w4776crya2jjr";
+ cargoSha256 = "09747f9g7yyq9c8wbfdb3hwxii5xq23ynhba0vc01nhjpjyn0ksd";
cargoBuildFlags = [ featuresFlag ];
checkPhase = ''
diff --git a/nixpkgs/pkgs/tools/security/bitwarden_rs/vault.nix b/nixpkgs/pkgs/tools/security/bitwarden_rs/vault.nix
index 43d8d3a9b11..0c60ab62106 100644
--- a/nixpkgs/pkgs/tools/security/bitwarden_rs/vault.nix
+++ b/nixpkgs/pkgs/tools/security/bitwarden_rs/vault.nix
@@ -2,11 +2,11 @@
stdenv.mkDerivation rec {
pname = "bitwarden_rs-vault";
- version = "2.13.2";
+ version = "2.13.2b";
src = fetchurl {
url = "https://github.com/dani-garcia/bw_web_builds/releases/download/v${version}/bw_web_v${version}.tar.gz";
- sha256 = "1000iqjr670imm1dlw9r003d8psp5sq0m0p62sjnll7wnycd805r";
+ sha256 = "1pba3d04gfnviv8r98anpv7m8r9r417s352r5fz8qzg8lr070540";
};
buildCommand = ''
diff --git a/nixpkgs/pkgs/tools/security/browserpass/default.nix b/nixpkgs/pkgs/tools/security/browserpass/default.nix
index a02d04e1333..2dd03bc465d 100644
--- a/nixpkgs/pkgs/tools/security/browserpass/default.nix
+++ b/nixpkgs/pkgs/tools/security/browserpass/default.nix
@@ -12,7 +12,7 @@ buildGoModule rec {
nativeBuildInputs = [ makeWrapper ];
- modSha256 = "13yw7idgw8l48yvm4jjha0kbx6q22m2zp13y006mikavynqsr5kj";
+ vendorSha256 = "1wcbn0ip596f2dp68y6jmxgv20l0dgrcxg5cwclkawigj05416zj";
postPatch = ''
# Because this Makefile will be installed to be used by the user, patch
@@ -51,4 +51,4 @@ buildGoModule rec {
platforms = platforms.all;
maintainers = with maintainers; [ rvolosatovs infinisil ];
};
-}
+} \ No newline at end of file
diff --git a/nixpkgs/pkgs/tools/security/brutespray/default.nix b/nixpkgs/pkgs/tools/security/brutespray/default.nix
index be7c99f5252..78dd789047d 100644
--- a/nixpkgs/pkgs/tools/security/brutespray/default.nix
+++ b/nixpkgs/pkgs/tools/security/brutespray/default.nix
@@ -2,13 +2,13 @@
stdenv.mkDerivation rec {
pname = "brutespray";
- version = "1.6.6";
+ version = "1.6.8";
src = fetchFromGitHub {
owner = "x90skysn3k";
repo = pname;
rev = "brutespray-${version}";
- sha256 = "1rj8fkq1xz4ph1pmldphlsa25mg6xl7i7dranb0qjx00jhfxjxjh";
+ sha256 = "1pi4d5vcvvjsby39dq995dlhpxdicmfhqsiw23hr25m38ccfm3rh";
};
postPatch = ''
diff --git a/nixpkgs/pkgs/tools/security/ccid/default.nix b/nixpkgs/pkgs/tools/security/ccid/default.nix
index b9cffc7f769..e74e1b61438 100644
--- a/nixpkgs/pkgs/tools/security/ccid/default.nix
+++ b/nixpkgs/pkgs/tools/security/ccid/default.nix
@@ -2,11 +2,11 @@
stdenv.mkDerivation rec {
pname = "ccid";
- version = "1.4.31";
+ version = "1.4.32";
src = fetchurl {
url = "https://ccid.apdu.fr/files/${pname}-${version}.tar.bz2";
- sha256 = "1xz8ikr6vk73w3xnwb931yq8lqc1zrj8c3v34n6h63irwjvdfj3b";
+ sha256 = "0f8nzk7379ip4x2ii5vn6h67jyx733pq0ywnnsj2llbxi2vllpsl";
};
postPatch = ''
diff --git a/nixpkgs/pkgs/tools/security/crowbar/default.nix b/nixpkgs/pkgs/tools/security/crowbar/default.nix
new file mode 100644
index 00000000000..cd4e7db8718
--- /dev/null
+++ b/nixpkgs/pkgs/tools/security/crowbar/default.nix
@@ -0,0 +1,42 @@
+{ fetchFromGitHub
+, freerdp
+, nmap
+, openvpn
+, python3Packages
+, stdenv
+, tigervnc
+}:
+
+python3Packages.buildPythonApplication rec {
+ pname = "crowbar";
+ version = "unstable-2020-04-23";
+
+ src = fetchFromGitHub {
+ owner = "galkan";
+ repo = pname;
+ rev = "500d633ff5ddfcbc70eb6d0b4d2181e5b8d3c535";
+ sha256 = "05m9vywr9976pc7il0ak8nl26mklzxlcqx0p8rlfyx1q766myqzf";
+ };
+
+ propagatedBuildInputs = [ python3Packages.paramiko ];
+
+ patchPhase = ''
+ sed -i 's,/usr/bin/xfreerdp,${freerdp}/bin/xfreerdp,g' lib/main.py
+ sed -i 's,/usr/bin/vncviewer,${tigervnc}/bin/vncviewer,g' lib/main.py
+ sed -i 's,/usr/sbin/openvpn,${openvpn}/bin/openvpn,g' lib/main.py
+
+ sed -i 's,/usr/bin/nmap,${nmap}/bin/nmap,g' lib/nmap.py
+ '';
+
+ # Sanity check
+ checkPhase = ''
+ $out/bin/crowbar --help > /dev/null
+ '';
+
+ meta = with stdenv.lib; {
+ homepage = "https://github.com/galkan/crowbar";
+ description = "A brute forcing tool that can be used during penetration tests";
+ license = licenses.mit;
+ maintainers = with maintainers; [ pamplemousse ];
+ };
+}
diff --git a/nixpkgs/pkgs/tools/security/doas/default.nix b/nixpkgs/pkgs/tools/security/doas/default.nix
index ce8b5825647..8cc9017a8fe 100644
--- a/nixpkgs/pkgs/tools/security/doas/default.nix
+++ b/nixpkgs/pkgs/tools/security/doas/default.nix
@@ -1,20 +1,31 @@
-{ stdenv, lib, fetchFromGitHub, bison, pam }:
+{ stdenv
+, lib
+, fetchFromGitHub
+, bison
+, pam
+
+, withTimestamp ? true
+}:
stdenv.mkDerivation rec {
pname = "doas";
-
- version = "6.0";
+ version = "6.6.1";
src = fetchFromGitHub {
owner = "Duncaen";
repo = "OpenDoas";
rev = "v${version}";
- sha256 = "1j50l3jvbgvg8vmp1nx6vrjxkbj5bvfh3m01bymzfn25lkwwhz1x";
+ sha256 = "07kkc5729p654jrgfsc8zyhiwicgmq38yacmwfvay2b3gmy728zn";
};
# otherwise confuses ./configure
dontDisableStatic = true;
+ configureFlags = [
+ (lib.optionalString withTimestamp "--with-timestamp") # to allow the "persist" setting
+ "--pamdir=${placeholder "out"}/etc/pam.d"
+ ];
+
postPatch = ''
sed -i '/\(chown\|chmod\)/d' bsd.prog.mk
'';
@@ -26,6 +37,6 @@ stdenv.mkDerivation rec {
homepage = "https://github.com/Duncaen/OpenDoas";
license = licenses.isc;
platforms = platforms.linux;
- maintainers = with maintainers; [ cstrahan ];
+ maintainers = with maintainers; [ cole-h cstrahan ];
};
}
diff --git a/nixpkgs/pkgs/tools/security/genpass/default.nix b/nixpkgs/pkgs/tools/security/genpass/default.nix
new file mode 100644
index 00000000000..ee3eebac991
--- /dev/null
+++ b/nixpkgs/pkgs/tools/security/genpass/default.nix
@@ -0,0 +1,25 @@
+{ stdenv
+, fetchFromGitHub
+, rustPlatform
+}:
+rustPlatform.buildRustPackage rec {
+ pname = "genpass";
+ version = "0.4.1";
+
+ src = fetchFromGitHub {
+ owner = "cyplo";
+ repo = pname;
+ rev = "v${version}";
+ sha256 = "1b22m7g55k5ry0vwyd8pakh8rmfkhk37qy5r74cn3n5pv3fcwini";
+ };
+
+ cargoSha256 = "1p6l64s9smhwka8bh3pamqimamxziad859i62nrmxzqc49nq5s7m";
+
+ meta = with stdenv.lib; {
+ description = "A simple yet robust commandline random password generator.";
+ homepage = "https://github.com/cyplo/genpass";
+ license = licenses.agpl3;
+ platforms = platforms.all;
+ maintainers = with maintainers; [ cyplo ];
+ };
+}
diff --git a/nixpkgs/pkgs/tools/security/ghidra/default.nix b/nixpkgs/pkgs/tools/security/ghidra/default.nix
index 63fbca8f446..d31e1f2c275 100644
--- a/nixpkgs/pkgs/tools/security/ghidra/default.nix
+++ b/nixpkgs/pkgs/tools/security/ghidra/default.nix
@@ -1,4 +1,4 @@
-{ stdenv, fetchurl, unzip, lib, makeWrapper, autoPatchelfHook
+{ stdenv, fetchzip, lib, makeWrapper, autoPatchelfHook
, openjdk11, pam, makeDesktopItem, icoutils
}: let
@@ -16,23 +16,22 @@
in stdenv.mkDerivation {
- name = "ghidra-9.1";
+ name = "ghidra-9.1.2";
- src = fetchurl {
- url = "https://ghidra-sre.org/ghidra_9.1_PUBLIC_20191023.zip";
- sha256 = "0pl7s59008gvgwz4mxp7rz3xr3vaa12a6s5zvx2yr9jxx3gk1l99";
+ src = fetchzip {
+ url = "https://ghidra-sre.org/ghidra_9.1.2_PUBLIC_20200212.zip";
+ sha256 = "0j48pijypg44bw06azbrgfqjkigb13ljfdxib70sxwyqia3vkbbm";
};
nativeBuildInputs = [
makeWrapper
autoPatchelfHook
- unzip
+ icoutils
];
buildInputs = [
stdenv.cc.cc.lib
pam
- icoutils
];
dontStrip = true;
@@ -42,7 +41,7 @@ in stdenv.mkDerivation {
mkdir -p "${pkg_path}" "$out/share/applications"
cp -a * "${pkg_path}"
ln -s ${desktopItem}/share/applications/* $out/share/applications
-
+
icotool -x "${pkg_path}/support/ghidra.ico"
rm ghidra_4_40x40x32.png
for f in ghidra_*.png; do
diff --git a/nixpkgs/pkgs/tools/security/gnome-keysign/default.nix b/nixpkgs/pkgs/tools/security/gnome-keysign/default.nix
index 9f87684cae3..4b9a6fb0e32 100644
--- a/nixpkgs/pkgs/tools/security/gnome-keysign/default.nix
+++ b/nixpkgs/pkgs/tools/security/gnome-keysign/default.nix
@@ -6,7 +6,6 @@
, gobject-introspection
, gtk3
, glib
-, gnome3
, gst_all_1
}:
@@ -53,7 +52,7 @@ python3.pkgs.buildPythonApplication rec {
gst_all_1.gstreamer
gst_all_1.gst-plugins-base
(gst_all_1.gst-plugins-good.override { gtkSupport = true; })
- gst_all_1.gst-plugins-bad # for zbar plug-in
+ (gst_all_1.gst-plugins-bad.override { enableZbar = true; }) # for zbar plug-in
];
propagatedBuildInputs = with python3.pkgs; [
@@ -68,12 +67,6 @@ python3.pkgs.buildPythonApplication rec {
twisted
];
- passthru = {
- updateScript = gnome3.updateScript {
- packageName = pname;
- };
- };
-
# https://github.com/NixOS/nixpkgs/issues/56943
strictDeps = false;
@@ -84,7 +77,7 @@ python3.pkgs.buildPythonApplication rec {
description = "GTK/GNOME application to use GnuPG for signing other peoples’ keys";
homepage = "https://wiki.gnome.org/Apps/Keysign";
license = licenses.gpl3Plus;
- maintainers = gnome3.maintainers;
+ maintainers = teams.gnome.members;
platforms = platforms.linux;
};
}
diff --git a/nixpkgs/pkgs/tools/security/gnupg/20.nix b/nixpkgs/pkgs/tools/security/gnupg/20.nix
index ea900160752..f5b693fed35 100644
--- a/nixpkgs/pkgs/tools/security/gnupg/20.nix
+++ b/nixpkgs/pkgs/tools/security/gnupg/20.nix
@@ -4,7 +4,7 @@
# Each of the dependencies below are optional.
# Gnupg can be built without them at the cost of reduced functionality.
, pinentry ? null, guiSupport ? false
-, openldap ? null, bzip2 ? null, libusb ? null, curl ? null
+, openldap ? null, bzip2 ? null, libusb-compat-0_1 ? null, curl ? null
}:
with stdenv.lib;
@@ -22,7 +22,7 @@ stdenv.mkDerivation rec {
buildInputs
= [ readline zlib libgpgerror libgcrypt libassuan libksba pth
- openldap bzip2 libusb curl libiconv ];
+ openldap bzip2 libusb-compat-0_1 curl libiconv ];
patches = [ ./gpgkey2ssh-20.patch ];
diff --git a/nixpkgs/pkgs/tools/security/gnupg/22.nix b/nixpkgs/pkgs/tools/security/gnupg/22.nix
index f87e985c95a..7c095cffa31 100644
--- a/nixpkgs/pkgs/tools/security/gnupg/22.nix
+++ b/nixpkgs/pkgs/tools/security/gnupg/22.nix
@@ -4,7 +4,7 @@
# Each of the dependencies below are optional.
# Gnupg can be built without them at the cost of reduced functionality.
, guiSupport ? true, enableMinimal ? false
-, adns ? null , bzip2 ? null , gnutls ? null , libusb ? null , openldap ? null
+, adns ? null , bzip2 ? null , gnutls ? null , libusb1 ? null , openldap ? null
, pcsclite ? null , pinentry ? null , readline ? null , sqlite ? null , zlib ?
null
}:
@@ -27,7 +27,7 @@ stdenv.mkDerivation rec {
nativeBuildInputs = [ pkgconfig texinfo ];
buildInputs = [
libgcrypt libassuan libksba libiconv npth gettext
- readline libusb gnutls adns openldap zlib bzip2 sqlite
+ readline libusb1 gnutls adns openldap zlib bzip2 sqlite
];
patches = [
diff --git a/nixpkgs/pkgs/tools/security/gobuster/default.nix b/nixpkgs/pkgs/tools/security/gobuster/default.nix
index c3426bee965..8b808551149 100644
--- a/nixpkgs/pkgs/tools/security/gobuster/default.nix
+++ b/nixpkgs/pkgs/tools/security/gobuster/default.nix
@@ -14,7 +14,7 @@ buildGoModule rec {
sha256 = "0q8ighqykh8qyvidnm6az6dc9mp32bbmhkmkqzl1ybbw6paa8pym";
};
- modSha256 = "0jq0z5s05vqdvq7v1gdjwlqqwbl1j2rv9f16k52idl50vdiqviql";
+ vendorSha256 = "0kr9i2nm5csf3070hwaiss137pfa3088xbw2zigp7aqb2naky036";
meta = with lib; {
description = "Tool used to brute-force URIs, DNS subdomains, Virtual Host names on target web servers";
@@ -22,4 +22,4 @@ buildGoModule rec {
license = licenses.asl20;
maintainers = with maintainers; [ pamplemousse ];
};
-}
+} \ No newline at end of file
diff --git a/nixpkgs/pkgs/tools/security/gopass/default.nix b/nixpkgs/pkgs/tools/security/gopass/default.nix
index 8af24bf7ab5..6b9042e5691 100644
--- a/nixpkgs/pkgs/tools/security/gopass/default.nix
+++ b/nixpkgs/pkgs/tools/security/gopass/default.nix
@@ -1,20 +1,29 @@
-{ stdenv, buildGoPackage, fetchFromGitHub, git, gnupg, xclip, wl-clipboard, makeWrapper }:
+{ stdenv, makeWrapper
+, buildGoModule, fetchFromGitHub, installShellFiles
+, git
+, gnupg
+, xclip
+, wl-clipboard
+, passAlias ? false
+}:
-buildGoPackage rec {
+buildGoModule rec {
pname = "gopass";
- version = "1.8.6";
+ version = "1.9.2";
- goPackagePath = "github.com/gopasspw/gopass";
-
- nativeBuildInputs = [ makeWrapper ];
+ nativeBuildInputs = [ installShellFiles makeWrapper ];
src = fetchFromGitHub {
owner = "gopasspw";
repo = pname;
rev = "v${version}";
- sha256 = "0v3sx9hb03bdn4rvsv2r0jzif6p1rx47hrkpsbnwva31k396mck2";
+ sha256 = "066dphw8xq0g72kj64sdai2yyllnr6ca27bfy5sxhk8x69j97rvz";
};
+ vendorSha256 = "1wn20bh7ma4pblsf6qnlbz5bx4p9apig3d1yz7cpsqv4z3w07baw";
+
+ buildFlagsArray = [ "-ldflags=-s -w -X main.version=${version} -X main.commit=${src.rev}" ];
+
wrapperPath = stdenv.lib.makeBinPath ([
git
gnupg
@@ -22,17 +31,16 @@ buildGoPackage rec {
] ++ stdenv.lib.optional stdenv.isLinux wl-clipboard);
postInstall = ''
- mkdir -p \
- $bin/share/bash-completion/completions \
- $bin/share/zsh/site-functions \
- $bin/share/fish/vendor_completions.d
- $bin/bin/gopass completion bash > $bin/share/bash-completion/completions/_gopass
- $bin/bin/gopass completion zsh > $bin/share/zsh/site-functions/_gopass
- $bin/bin/gopass completion fish > $bin/share/fish/vendor_completions.d/gopass.fish
+ for shell in bash fish zsh; do
+ $out/bin/gopass completion $shell > gopass.$shell
+ installShellCompletion gopass.$shell
+ done
+ '' + stdenv.lib.optionalString passAlias ''
+ ln -s $out/bin/gopass $out/bin/pass
'';
postFixup = ''
- wrapProgram $bin/bin/gopass \
+ wrapProgram $out/bin/gopass \
--prefix PATH : "${wrapperPath}"
'';
@@ -40,7 +48,7 @@ buildGoPackage rec {
description = "The slightly more awesome Standard Unix Password Manager for Teams. Written in Go.";
homepage = "https://www.gopass.pw/";
license = licenses.mit;
- maintainers = with maintainers; [ andir ];
+ maintainers = with maintainers; [ andir rvolosatovs ];
platforms = platforms.unix;
longDescription = ''
@@ -53,4 +61,4 @@ buildGoPackage rec {
well, providing a stellar user experience and a sane, simple interface.
'';
};
-}
+} \ No newline at end of file
diff --git a/nixpkgs/pkgs/tools/security/hcxdumptool/default.nix b/nixpkgs/pkgs/tools/security/hcxdumptool/default.nix
index f1c2cee9f3a..6a2eee47143 100644
--- a/nixpkgs/pkgs/tools/security/hcxdumptool/default.nix
+++ b/nixpkgs/pkgs/tools/security/hcxdumptool/default.nix
@@ -1,7 +1,7 @@
{ stdenv, lib, fetchFromGitHub, openssl }:
stdenv.mkDerivation rec {
- pname = "hxcdumptool";
+ pname = "hcxdumptool";
version = "6.0.5";
src = fetchFromGitHub {
diff --git a/nixpkgs/pkgs/tools/security/hcxtools/default.nix b/nixpkgs/pkgs/tools/security/hcxtools/default.nix
index 84517ce2bd8..5634ee6cff0 100644
--- a/nixpkgs/pkgs/tools/security/hcxtools/default.nix
+++ b/nixpkgs/pkgs/tools/security/hcxtools/default.nix
@@ -2,13 +2,13 @@
stdenv.mkDerivation rec {
pname = "hcxtools";
- version = "6.0.1";
+ version = "6.0.2";
src = fetchFromGitHub {
owner = "ZerBea";
repo = pname;
rev = version;
- sha256 = "0r7pjz89chgb7zl2pqgw3zb1z8cgwp0nxmqvmkv0jn1m9dw3f44f";
+ sha256 = "0a36184igdgs2h83zr4zihc5acps91ipmgph37jakvzwrsn64ma6";
};
buildInputs = [ curl openssl zlib ];
diff --git a/nixpkgs/pkgs/tools/security/jadx/default.nix b/nixpkgs/pkgs/tools/security/jadx/default.nix
new file mode 100644
index 00000000000..961f1e6954a
--- /dev/null
+++ b/nixpkgs/pkgs/tools/security/jadx/default.nix
@@ -0,0 +1,103 @@
+{ stdenv, fetchFromGitHub, gradle, jdk, makeWrapper, perl }:
+
+let
+ pname = "jadx";
+ version = "1.1.0";
+
+ src = fetchFromGitHub {
+ owner = "skylot";
+ repo = pname;
+ rev = "v${version}";
+ sha256 = "1dx3g0sm46qy57gggpg8bpmin5glzbxdbf0qzvha9r2dwh4mrwlg";
+ };
+
+ deps = stdenv.mkDerivation {
+ name = "${pname}-deps";
+ inherit src;
+
+ nativeBuildInputs = [ gradle jdk perl ];
+
+ buildPhase = ''
+ export GRADLE_USER_HOME=$(mktemp -d)
+ export JADX_VERSION=${version}
+ gradle --no-daemon jar
+ '';
+
+ # Mavenize dependency paths
+ # e.g. org.codehaus.groovy/groovy/2.4.0/{hash}/groovy-2.4.0.jar -> org/codehaus/groovy/groovy/2.4.0/groovy-2.4.0.jar
+ installPhase = ''
+ find $GRADLE_USER_HOME/caches/modules-2 -type f -regex '.*\.\(jar\|pom\)' \
+ | perl -pe 's#(.*/([^/]+)/([^/]+)/([^/]+)/[0-9a-f]{30,40}/([^/\s]+))$# ($x = $2) =~ tr|\.|/|; "install -Dm444 $1 \$out/$x/$3/$4/$5" #e' \
+ | sh
+ '';
+
+ outputHashAlgo = "sha256";
+ outputHashMode = "recursive";
+ outputHash = "083r4hg6m9cxzm2m8nckf10awq8kh901v5i39r60x47xk5yw84ps";
+ };
+in stdenv.mkDerivation {
+ inherit pname version src;
+
+ nativeBuildInputs = [ gradle jdk makeWrapper ];
+
+ buildPhase = ''
+ # The installDist Gradle build phase tries to copy some dependency .jar
+ # files multiple times into the build directory. This ends up failing when
+ # the dependencies are read directly from the Nix store since they are not
+ # marked as chmod +w. To work around this, get a local copy of the
+ # dependency store, and give write permissions.
+ depsDir=$(mktemp -d)
+ cp -R ${deps}/* $depsDir
+ chmod -R u+w $depsDir
+
+ gradleInit=$(mktemp)
+ cat >$gradleInit <<EOF
+ gradle.projectsLoaded {
+ rootProject.allprojects {
+ buildscript {
+ repositories {
+ clear()
+ maven { url '$depsDir' }
+ }
+ }
+ repositories {
+ clear()
+ maven { url '$depsDir' }
+ }
+ }
+ }
+
+ settingsEvaluated { settings ->
+ settings.pluginManagement {
+ repositories {
+ maven { url '$depsDir' }
+ }
+ }
+ }
+ EOF
+
+ export GRADLE_USER_HOME=$(mktemp -d)
+ export JADX_VERSION=${version}
+ gradle --offline --no-daemon --info --init-script $gradleInit pack
+ '';
+
+ installPhase = ''
+ mkdir $out $out/bin
+ cp -R build/jadx/lib $out
+ for prog in jadx jadx-gui; do
+ cp build/jadx/bin/$prog $out/bin
+ wrapProgram $out/bin/$prog --set JAVA_HOME ${jdk.home}
+ done
+ '';
+
+ meta = with stdenv.lib; {
+ description = "Dex to Java decompiler";
+ longDescription = ''
+ Command line and GUI tools for produce Java source code from Android Dex
+ and Apk files.
+ '';
+ license = licenses.asl20;
+ platforms = platforms.unix;
+ maintainers = with maintainers; [ delroth ];
+ };
+}
diff --git a/nixpkgs/pkgs/tools/security/jwt-cli/default.nix b/nixpkgs/pkgs/tools/security/jwt-cli/default.nix
index f2314d7a0e8..2161aa5f1cd 100644
--- a/nixpkgs/pkgs/tools/security/jwt-cli/default.nix
+++ b/nixpkgs/pkgs/tools/security/jwt-cli/default.nix
@@ -2,16 +2,16 @@
rustPlatform.buildRustPackage rec {
pname = "jwt-cli";
- version = "3.0.1";
+ version = "3.1.0";
src = fetchFromGitHub {
owner = "mike-engel";
repo = pname;
rev = version;
- sha256 = "108pwk0h6zcbfmp0k8rhjxaa9yk8rhb78aaql22x48n11fnjl27i";
+ sha256 = "0pmxis3m3madwnmswz9hn0i8fz6a9bg11slgrrwql7mx23ijqf6y";
};
- cargoSha256 = "1xh2ylx5fqblhlrs8yhl3zf8kvgrqnwdwmix6yzch9bi5mv5c11w";
+ cargoSha256 = "165g1v0c8jxs8ddm8ld0hh7k8mvk3566ig43pf99hnw009fg1yc2";
buildInputs = stdenv.lib.optional stdenv.isDarwin Security;
diff --git a/nixpkgs/pkgs/tools/security/keybase/default.nix b/nixpkgs/pkgs/tools/security/keybase/default.nix
index 2d8957a9d54..bbc99c2ac41 100644
--- a/nixpkgs/pkgs/tools/security/keybase/default.nix
+++ b/nixpkgs/pkgs/tools/security/keybase/default.nix
@@ -6,7 +6,7 @@
buildGoPackage rec {
pname = "keybase";
- version = "5.3.1";
+ version = "5.4.2";
goPackagePath = "github.com/keybase/client";
subPackages = [ "go/kbnm" "go/keybase" ];
@@ -17,7 +17,7 @@ buildGoPackage rec {
owner = "keybase";
repo = "client";
rev = "v${version}";
- sha256 = "1a1h2c8jr4r20w4gyvyrpsslmh69bl8syl3jbr0fcr2kka7vqnzg";
+ sha256 = "08lw5aw962f75xi42bwbgba94hiql2n2jnsxrkx84czi0ijs1wlr";
};
patches = [
@@ -35,7 +35,7 @@ buildGoPackage rec {
homepage = "https://www.keybase.io/";
description = "The Keybase official command-line utility and service.";
platforms = platforms.linux ++ platforms.darwin;
- maintainers = with maintainers; [ carlsverre np rvolosatovs filalex77 ];
+ maintainers = with maintainers; [ avaq carlsverre np rvolosatovs filalex77 ];
license = licenses.bsd3;
};
}
diff --git a/nixpkgs/pkgs/tools/security/keybase/gui.nix b/nixpkgs/pkgs/tools/security/keybase/gui.nix
index 9c34d78aee8..05490784390 100644
--- a/nixpkgs/pkgs/tools/security/keybase/gui.nix
+++ b/nixpkgs/pkgs/tools/security/keybase/gui.nix
@@ -4,16 +4,16 @@
, runtimeShell, gsettings-desktop-schemas }:
let
- versionSuffix = "20200320154633.3e235215b3";
+ versionSuffix = "20200424214931.7b0bbf1e3c";
in
stdenv.mkDerivation rec {
pname = "keybase-gui";
- version = "5.3.1"; # Find latest version from https://prerelease.keybase.io/deb/dists/stable/main/binary-amd64/Packages
+ version = "5.4.2"; # Find latest version from https://prerelease.keybase.io/deb/dists/stable/main/binary-amd64/Packages
src = fetchurl {
url = "https://s3.amazonaws.com/prerelease.keybase.io/linux_binaries/deb/keybase_${version + "-" + versionSuffix}_amd64.deb";
- sha256 = "00k1xg27arbqpa836c55fhkxjvjbhjgkf6jqzprjzz76zksfdcx4";
+ sha256 = "06iksmrr959mlzxc3nwd70apmvhij1xarxvvflys5qa31vravizs";
};
nativeBuildInputs = [
@@ -108,7 +108,7 @@ stdenv.mkDerivation rec {
homepage = "https://www.keybase.io/";
description = "The Keybase official GUI";
platforms = platforms.linux;
- maintainers = with maintainers; [ rvolosatovs puffnfresh np filalex77 ];
+ maintainers = with maintainers; [ avaq rvolosatovs puffnfresh np filalex77 ];
license = licenses.bsd3;
};
}
diff --git a/nixpkgs/pkgs/tools/security/keybase/kbfs.nix b/nixpkgs/pkgs/tools/security/keybase/kbfs.nix
index 20fadee6a40..e9284e7230f 100644
--- a/nixpkgs/pkgs/tools/security/keybase/kbfs.nix
+++ b/nixpkgs/pkgs/tools/security/keybase/kbfs.nix
@@ -16,7 +16,7 @@ buildGoPackage {
homepage = "https://keybase.io/docs/kbfs";
description = "The Keybase filesystem";
platforms = platforms.unix;
- maintainers = with maintainers; [ rvolosatovs bennofs np ];
+ maintainers = with maintainers; [ avaq rvolosatovs bennofs np ];
license = licenses.bsd3;
};
}
diff --git a/nixpkgs/pkgs/tools/security/kpcli/default.nix b/nixpkgs/pkgs/tools/security/kpcli/default.nix
index f56bd59cd9a..09916f85f9e 100644
--- a/nixpkgs/pkgs/tools/security/kpcli/default.nix
+++ b/nixpkgs/pkgs/tools/security/kpcli/default.nix
@@ -1,12 +1,12 @@
{ stdenv, fetchurl, makeWrapper, perl, perlPackages }:
stdenv.mkDerivation rec {
- version = "3.3";
+ version = "3.4";
pname = "kpcli";
src = fetchurl {
url = "mirror://sourceforge/kpcli/${pname}-${version}.pl";
- sha256 = "1z6dy70d3ag16vgzzafcnxb8gap3wahfmy4vd22fpgbrdd6riph4";
+ sha256 = "0s46cni16ph93havmkrlai3k13mdppyca1s2bqm751a6rirmsgj0";
};
buildInputs = [ makeWrapper perl ];
diff --git a/nixpkgs/pkgs/tools/security/libacr38u/default.nix b/nixpkgs/pkgs/tools/security/libacr38u/default.nix
index 45d0279099f..b56c15af3d6 100644
--- a/nixpkgs/pkgs/tools/security/libacr38u/default.nix
+++ b/nixpkgs/pkgs/tools/security/libacr38u/default.nix
@@ -1,4 +1,4 @@
-{ stdenv, fetchurl, pkgconfig, pcsclite , libusb }:
+{ stdenv, fetchurl, pkgconfig, pcsclite , libusb-compat-0_1 }:
stdenv.mkDerivation {
version = "1.7.11";
@@ -12,7 +12,7 @@ stdenv.mkDerivation {
doCheck = true;
nativeBuildInputs = [ pkgconfig ];
- buildInputs = [ pcsclite libusb ];
+ buildInputs = [ pcsclite libusb-compat-0_1 ];
preBuild = ''
makeFlagsArray=(usbdropdir="$out/pcsc/drivers");
diff --git a/nixpkgs/pkgs/tools/security/notary/default.nix b/nixpkgs/pkgs/tools/security/notary/default.nix
index 4f0b5f2c954..15797fc8665 100644
--- a/nixpkgs/pkgs/tools/security/notary/default.nix
+++ b/nixpkgs/pkgs/tools/security/notary/default.nix
@@ -26,7 +26,7 @@ buildGoPackage rec {
installPhase = ''
runHook preInstall
- install -D bin/notary $bin/bin/notary
+ install -D bin/notary $out/bin/notary
runHook postInstall
'';
diff --git a/nixpkgs/pkgs/tools/security/p0f/default.nix b/nixpkgs/pkgs/tools/security/p0f/default.nix
index 1e618cdce1a..02d888b725f 100644
--- a/nixpkgs/pkgs/tools/security/p0f/default.nix
+++ b/nixpkgs/pkgs/tools/security/p0f/default.nix
@@ -33,7 +33,7 @@ stdenv.mkDerivation rec {
meta = {
description = "Passive network reconnaissance and fingerprinting tool";
- homepage = "http://lcamtuf.coredump.cx/p0f3/";
+ homepage = "https://lcamtuf.coredump.cx/p0f3/";
license = stdenv.lib.licenses.lgpl21;
platforms = stdenv.lib.platforms.linux;
maintainers = [ stdenv.lib.maintainers.thoughtpolice ];
diff --git a/nixpkgs/pkgs/tools/security/pass/default.nix b/nixpkgs/pkgs/tools/security/pass/default.nix
index 46dfafa8151..76b90d5b885 100644
--- a/nixpkgs/pkgs/tools/security/pass/default.nix
+++ b/nixpkgs/pkgs/tools/security/pass/default.nix
@@ -144,7 +144,7 @@ stdenv.mkDerivation rec {
description = "Stores, retrieves, generates, and synchronizes passwords securely";
homepage = "https://www.passwordstore.org/";
license = licenses.gpl2Plus;
- maintainers = with maintainers; [ lovek323 the-kenny fpletz tadfisher globin ma27 ];
+ maintainers = with maintainers; [ lovek323 fpletz tadfisher globin ma27 ];
platforms = platforms.unix;
longDescription = ''
diff --git a/nixpkgs/pkgs/tools/security/pass/extensions/audit/0001-Make-it-possible-to-run-the-tests-offline.patch b/nixpkgs/pkgs/tools/security/pass/extensions/audit/0001-Make-it-possible-to-run-the-tests-offline.patch
deleted file mode 100644
index 36faf3140cc..00000000000
--- a/nixpkgs/pkgs/tools/security/pass/extensions/audit/0001-Make-it-possible-to-run-the-tests-offline.patch
+++ /dev/null
@@ -1,175 +0,0 @@
-From 37c2b4d2940476555aeec20fe1e5e3fa0492a94e Mon Sep 17 00:00:00 2001
-From: Maximilian Bosch <maximilian@mbosch.me>
-Date: Sun, 15 Mar 2020 19:58:53 +0100
-Subject: [PATCH] Make it possible to run the tests offline
-
-Helpful when developing without network access, also makes sure that
-the test actually depend on the API's data like number of breaches
-(which will change in time).
----
- tests/commons.py | 25 +++++++++++++++++++++++++
- tests/test_audit.py | 8 +++++---
- tests/test_pass_audit.py | 10 +++++++++-
- tests/test_pwned.py | 8 +++++---
- 4 files changed, 44 insertions(+), 7 deletions(-)
-
-diff --git a/tests/commons.py b/tests/commons.py
-index 13c4cb1..4f1ecd8 100644
---- a/tests/commons.py
-+++ b/tests/commons.py
-@@ -56,3 +56,28 @@ class TestPass(TestBase):
- for path in self.store.list(root):
- data[path] = self.store.show(path)
- return data
-+
-+
-+def mock_request(*args, **kwargs):
-+ class MockResponse:
-+ def __init__(self):
-+ data = [
-+ "D5EE0CB1A41071812CCED2F1930E6E1A5D2:2",
-+ "2DC183F740EE76F27B78EB39C8AD972A757:52579",
-+ "CF164D7A51A1FD864B1BF9E1CE8A3EC171B:4",
-+ "D0B910E7A3028703C0B30039795E908CEB2:7",
-+ "AD6438836DBE526AA231ABDE2D0EEF74D42:3",
-+ "EBAB0A7CE978E0194608B572E4F9404AA21:3",
-+ "17727EAB0E800E62A776C76381DEFBC4145:120",
-+ "5370372AC65308F03F6ED75EC6068C8E1BE:1386",
-+ "1E4C9B93F3F0682250B6CF8331B7EE68FD8:3730471",
-+ "437FAA5A7FCE15D1DDCB9EAEAEA377667B8:123422",
-+ "944C22589AC652B0F47918D58CA0CDCCB63:411"
-+ ]
-+
-+ self.text = "\r\n".join(data)
-+
-+ def raise_for_status(self):
-+ pass
-+
-+ return MockResponse()
-diff --git a/tests/test_audit.py b/tests/test_audit.py
-index d8c7a9a..5e0a9cf 100644
---- a/tests/test_audit.py
-+++ b/tests/test_audit.py
-@@ -17,12 +17,13 @@
- #
-
- from .. import pass_audit
--from tests.commons import TestPass
--
-+from tests.commons import TestPass, mock_request
-+from unittest import mock
-
- class TestPassAudit(TestPass):
- passwords_nb = 7
-
-+ @mock.patch('requests.get', mock_request)
- def test_password_notpwned(self):
- """Testing: pass audit for password not breached with K-anonymity method."""
- data = self._getdata("Password/notpwned")
-@@ -30,9 +31,10 @@ class TestPassAudit(TestPass):
- breached = audit.password()
- self.assertTrue(len(breached) == 0)
-
-+ @mock.patch('requests.get', mock_request)
- def test_password_pwned(self):
- """Testing: pass audit for password breached with K-anonymity method."""
-- ref_counts = [51259, 3, 114, 1352, 3645804, 78773, 396]
-+ ref_counts = [52579, 3, 120, 1386, 3730471, 123422, 411]
- data = self._getdata("Password/pwned")
- audit = pass_audit.PassAudit(data)
- breached = audit.password()
-diff --git a/tests/test_pass_audit.py b/tests/test_pass_audit.py
-index 4c10f87..2c949f7 100644
---- a/tests/test_pass_audit.py
-+++ b/tests/test_pass_audit.py
-@@ -19,7 +19,8 @@
- import os
-
- from .. import pass_audit
--from tests.commons import TestPass
-+from tests.commons import TestPass, mock_request
-+from unittest import mock
-
-
- class TestPassAuditCMD(TestPass):
-@@ -47,6 +48,7 @@ class TestPassAuditCMD(TestPass):
- cmd = ['--not-an-option', '-q']
- self._passaudit(cmd, 2)
-
-+ @mock.patch('requests.get', mock_request)
- def test_pass_audit_StoreNotInitialized(self):
- """Testing: store not initialized."""
- cmd = ['Password/', '-v']
-@@ -56,6 +58,7 @@ class TestPassAuditCMD(TestPass):
- os.rename(os.path.join(self.store.prefix, 'backup.gpg-id'),
- os.path.join(self.store.prefix, '.gpg-id'))
-
-+ @mock.patch('requests.get', mock_request)
- def test_pass_audit_InvalidID(self):
- """Testing: invalid user ID."""
- os.rename(os.path.join(self.store.prefix, '.gpg-id'),
-@@ -66,26 +69,31 @@ class TestPassAuditCMD(TestPass):
- os.rename(os.path.join(self.store.prefix, 'backup.gpg-id'),
- os.path.join(self.store.prefix, '.gpg-id'))
-
-+ @mock.patch('requests.get', mock_request)
- def test_pass_audit_NotAFile(self):
- """Testing: pass audit not_a_file."""
- cmd = ['not_a_file']
- self._passaudit(cmd, 1)
-
-+ @mock.patch('requests.get', mock_request)
- def test_pass_audit_passwords_notpwned(self):
- """Testing: pass audit Password/notpwned."""
- cmd = ['Password/notpwned']
- self._passaudit(cmd)
-
-+ @mock.patch('requests.get', mock_request)
- def test_pass_audit_passwords_pwned(self):
- """Testing: pass audit Password/pwned."""
- cmd = ['Password/pwned']
- self._passaudit(cmd)
-
-+ @mock.patch('requests.get', mock_request)
- def test_pass_audit_passwords_good(self):
- """Testing: pass audit Password/good."""
- cmd = ['Password/good']
- self._passaudit(cmd)
-
-+ @mock.patch('requests.get', mock_request)
- def test_pass_audit_passwords_all(self):
- """Testing: pass audit ."""
- cmd = ['']
-diff --git a/tests/test_pwned.py b/tests/test_pwned.py
-index 5ce6bc6..c28939a 100644
---- a/tests/test_pwned.py
-+++ b/tests/test_pwned.py
-@@ -17,7 +17,8 @@
- #
-
- from .. import pass_audit
--from tests.commons import TestPass
-+from tests.commons import TestPass, mock_request
-+from unittest import mock
-
-
- class TestPwnedAPI(TestPass):
-@@ -25,12 +26,13 @@ class TestPwnedAPI(TestPass):
- def setUp(self):
- self.api = pass_audit.PwnedAPI()
-
-+ @mock.patch('requests.get', mock_request)
- def test_password_range(self):
- """Testing: https://api.haveibeenpwned.com/range API."""
- prefix = '21BD1'
- Hash = '21BD12DC183F740EE76F27B78EB39C8AD972A757'
- hashes, counts = self.api.password_range(prefix)
- self.assertIn(Hash, hashes)
-- self.assertTrue(counts[hashes.index(Hash)] == 51259)
-+ self.assertTrue(counts[hashes.index(Hash)] == 52579)
- self.assertTrue(len(hashes) == len(counts))
-- self.assertTrue(len(hashes) == 527)
-+ self.assertTrue(len(hashes) == 11)
---
-2.25.0
-
diff --git a/nixpkgs/pkgs/tools/security/pass/extensions/audit/default.nix b/nixpkgs/pkgs/tools/security/pass/extensions/audit/default.nix
index 5f8e0f7b1c6..144d13238f2 100644
--- a/nixpkgs/pkgs/tools/security/pass/extensions/audit/default.nix
+++ b/nixpkgs/pkgs/tools/security/pass/extensions/audit/default.nix
@@ -5,23 +5,24 @@ let
in stdenv.mkDerivation rec {
pname = "pass-audit";
- version = "1.0.1";
+ version = "1.1";
src = fetchFromGitHub {
owner = "roddhjav";
repo = "pass-audit";
rev = "v${version}";
- sha256 = "1mdckw0dwcnv8smp1za96y0zmdnykbkw2606v7mzfnzbz4zjdlwl";
+ sha256 = "1vapymgpab91kh798mirgs1nb7j9qln0gm2d3321cmsghhb7xs45";
};
patches = [
- ./0001-Make-it-possible-to-run-the-tests-offline.patch
./0002-Fix-audit.bash-setup.patch
];
postPatch = ''
substituteInPlace audit.bash \
- --replace '/usr/bin/env python3' "${pythonEnv}/bin/python3"
+ --replace 'python3' "${pythonEnv}/bin/python3"
+ substituteInPlace Makefile \
+ --replace "install --root" "install --prefix ''' --root"
'';
outputs = [ "out" "man" ];
diff --git a/nixpkgs/pkgs/tools/security/pass/extensions/import.nix b/nixpkgs/pkgs/tools/security/pass/extensions/import.nix
index c2fc2cff881..cc5f0c94e11 100644
--- a/nixpkgs/pkgs/tools/security/pass/extensions/import.nix
+++ b/nixpkgs/pkgs/tools/security/pass/extensions/import.nix
@@ -53,7 +53,7 @@ in stdenv.mkDerivation rec {
description = "Pass extension for importing data from existing password managers";
homepage = "https://github.com/roddhjav/pass-import";
license = licenses.gpl3Plus;
- maintainers = with maintainers; [ lovek323 the-kenny fpletz tadfisher ];
+ maintainers = with maintainers; [ lovek323 fpletz tadfisher ];
platforms = platforms.unix;
};
}
diff --git a/nixpkgs/pkgs/tools/security/pass/extensions/tomb.nix b/nixpkgs/pkgs/tools/security/pass/extensions/tomb.nix
index f5b61207de6..43c74a9029b 100644
--- a/nixpkgs/pkgs/tools/security/pass/extensions/tomb.nix
+++ b/nixpkgs/pkgs/tools/security/pass/extensions/tomb.nix
@@ -26,7 +26,7 @@ stdenv.mkDerivation rec {
description = "Pass extension that keeps the password store encrypted inside a tomb";
homepage = "https://github.com/roddhjav/pass-tomb";
license = licenses.gpl3Plus;
- maintainers = with maintainers; [ lovek323 the-kenny fpletz tadfisher ];
+ maintainers = with maintainers; [ lovek323 fpletz tadfisher ];
platforms = platforms.unix;
};
}
diff --git a/nixpkgs/pkgs/tools/security/pass/extensions/update.nix b/nixpkgs/pkgs/tools/security/pass/extensions/update.nix
index 5bc88d394e7..b2f331f1375 100644
--- a/nixpkgs/pkgs/tools/security/pass/extensions/update.nix
+++ b/nixpkgs/pkgs/tools/security/pass/extensions/update.nix
@@ -24,7 +24,7 @@ stdenv.mkDerivation rec {
description = "Pass extension that provides an easy flow for updating passwords";
homepage = "https://github.com/roddhjav/pass-update";
license = licenses.gpl3Plus;
- maintainers = with maintainers; [ lovek323 the-kenny fpletz tadfisher ];
+ maintainers = with maintainers; [ lovek323 fpletz tadfisher ];
platforms = platforms.unix;
};
}
diff --git a/nixpkgs/pkgs/tools/security/pass/rofi-pass.nix b/nixpkgs/pkgs/tools/security/pass/rofi-pass.nix
index 7daf42ab6c7..b3c08648862 100644
--- a/nixpkgs/pkgs/tools/security/pass/rofi-pass.nix
+++ b/nixpkgs/pkgs/tools/security/pass/rofi-pass.nix
@@ -50,7 +50,6 @@ stdenv.mkDerivation rec {
meta = {
description = "A script to make rofi work with password-store";
homepage = "https://github.com/carnager/rofi-pass";
- maintainers = with stdenv.lib.maintainers; [ the-kenny ];
license = stdenv.lib.licenses.gpl3;
platforms = with stdenv.lib.platforms; linux;
};
diff --git a/nixpkgs/pkgs/tools/security/pcsc-cyberjack/default.nix b/nixpkgs/pkgs/tools/security/pcsc-cyberjack/default.nix
index 6683caecbe9..7ae062547aa 100644
--- a/nixpkgs/pkgs/tools/security/pcsc-cyberjack/default.nix
+++ b/nixpkgs/pkgs/tools/security/pcsc-cyberjack/default.nix
@@ -1,25 +1,28 @@
-{ stdenv, fetchurl, pkgconfig, libusb1, pcsclite }:
+{ stdenv, fetchurl, autoreconfHook, pkgconfig, libusb1, pcsclite }:
-stdenv.mkDerivation rec {
+let
+ version = "3.99.5";
+ suffix = "SP13";
+ tarBall = "${version}final.${suffix}";
+
+in stdenv.mkDerivation rec {
pname = "pcsc-cyberjack";
- version = "3.99.5_SP12";
-
- src = with stdenv.lib; let
- splittedVer = splitString "_" version;
- mainVer = if length splittedVer >= 1 then head splittedVer else version;
- spVer = optionalString (length splittedVer >= 1) ("." + last splittedVer);
- tarballVersion = "${mainVer}final${spVer}";
- in fetchurl {
- url = "http://support.reiner-sct.de/downloads/LINUX/V${version}"
- + "/pcsc-cyberjack-${tarballVersion}.tar.bz2";
- sha256 = "04pkmybal56s5xnjld09vl1s1h6qf8mvhm41b758d6hi240kgp1j";
+ inherit version;
+
+ src = fetchurl {
+ url =
+ "http://support.reiner-sct.de/downloads/LINUX/V${version}_${suffix}/${pname}_${tarBall}.tar.gz";
+ sha256 = "1lx4bfz4riz7j77sl65akyxzww0ygm63w0c1b75knr1pijlv8d3b";
};
outputs = [ "out" "tools" ];
- nativeBuildInputs = [ pkgconfig ];
+ nativeBuildInputs = [ autoreconfHook pkgconfig ];
+
buildInputs = [ libusb1 pcsclite ];
+ enableParallelBuilding = true;
+
configureFlags = [
"--with-usbdropdir=${placeholder "out"}/pcsc/drivers"
"--bindir=${placeholder "tools"}/bin"
@@ -31,7 +34,7 @@ stdenv.mkDerivation rec {
description = "REINER SCT cyberJack USB chipcard reader user space driver";
homepage = "https://www.reiner-sct.com/";
license = licenses.gpl2Plus;
- platforms = platforms.linux;
maintainers = with maintainers; [ aszlig ];
+ platforms = platforms.linux;
};
}
diff --git a/nixpkgs/pkgs/tools/security/pcsc-scm-scl011/default.nix b/nixpkgs/pkgs/tools/security/pcsc-scm-scl011/default.nix
index b400d628fd7..62f4c3e8556 100644
--- a/nixpkgs/pkgs/tools/security/pcsc-scm-scl011/default.nix
+++ b/nixpkgs/pkgs/tools/security/pcsc-scm-scl011/default.nix
@@ -1,4 +1,4 @@
-{ stdenv, fetchurl, unzip, libusb }:
+{ stdenv, fetchurl, unzip, libusb-compat-0_1 }:
let
arch = if stdenv.hostPlatform.system == "i686-linux" then "32"
@@ -30,7 +30,7 @@ stdenv.mkDerivation rec {
cp -r proprietary/*.bundle $out/pcsc/drivers
'';
- libPath = stdenv.lib.makeLibraryPath [ libusb ];
+ libPath = stdenv.lib.makeLibraryPath [ libusb-compat-0_1 ];
fixupPhase = ''
patchelf --set-rpath $libPath \
diff --git a/nixpkgs/pkgs/tools/security/pdfcrack/default.nix b/nixpkgs/pkgs/tools/security/pdfcrack/default.nix
index 9d05304cf2f..afef0d4c472 100644
--- a/nixpkgs/pkgs/tools/security/pdfcrack/default.nix
+++ b/nixpkgs/pkgs/tools/security/pdfcrack/default.nix
@@ -2,11 +2,11 @@
stdenv.mkDerivation rec {
pname = "pdfcrack";
- version = "0.18";
+ version = "0.19";
src = fetchurl {
url = "mirror://sourceforge/pdfcrack/pdfcrack/pdfcrack-${version}.tar.gz";
- sha256 = "035s3jzrs3ci0i53x04dzpqp9225c4s52cd722d6zqra5b2sw8w2";
+ sha256 = "1vf0l83xk627fg0a3b10wabgqxy08q4vbm0xjw9xzkdpk1lj059i";
};
installPhase = ''
diff --git a/nixpkgs/pkgs/tools/security/prey/default.nix b/nixpkgs/pkgs/tools/security/prey/default.nix
deleted file mode 100644
index c6675601231..00000000000
--- a/nixpkgs/pkgs/tools/security/prey/default.nix
+++ /dev/null
@@ -1,48 +0,0 @@
-{ stdenv, fetchurl, fetchgit, curl, scrot, imagemagick, xawtv, inetutils, makeWrapper, coreutils
-, apiKey ? ""
-, deviceKey ? "" }:
-
-# TODO: this should assert keys are set, somehow if set through .override assertion fails
-#assert apiKey != "";
-#assert deviceKey != "";
-
-let
- modulesSrc = fetchgit {
- url = "git://github.com/prey/prey-bash-client-modules.git";
- rev = "aba260ef110834cb2e92923a31f50c15970639ee";
- sha256 = "9cb1ad813d052a0a3e3bbdd329a8711ae3272e340379489511f7dd578d911e30";
- };
-in stdenv.mkDerivation rec {
- pname = "prey-bash-client";
- version = "0.6.0";
-
- src = fetchurl {
- url = "https://github.com/prey/prey-bash-client/archive/v${version}.tar.gz";
- sha256 = "09cb15jh4jdwvix9nx048ajkw2r5jaflk68y3rkha541n8n0qwh0";
- };
-
- buildInputs = [ curl scrot imagemagick xawtv makeWrapper ];
-
- phases = "unpackPhase installPhase";
-
- installPhase = ''
- substituteInPlace config --replace api_key=\'\' "api_key='${apiKey}'"
- substituteInPlace config --replace device_key=\'\' "device_key='${deviceKey}'"
-
- substituteInPlace prey.sh --replace /bin/bash $(type -Pp bash)
- mkdir -p $out/modules
- cp -R . $out
- cp -R ${modulesSrc}/* $out/modules/
- wrapProgram "$out/prey.sh" \
- --prefix PATH ":" "${stdenv.lib.makeBinPath [ xawtv imagemagick curl scrot inetutils coreutils ]}" \
- --set CURL_CA_BUNDLE "/etc/ssl/certs/ca-certificates.crt"
- '';
-
- meta = with stdenv.lib; {
- homepage = "https://preyproject.com";
- description = "Proven tracking software that helps you find, lock and recover your devices when stolen or missing";
- maintainers = with maintainers; [ domenkozar ];
- license = licenses.gpl3;
- platforms = with platforms; linux;
- };
-}
diff --git a/nixpkgs/pkgs/tools/security/saml2aws/default.nix b/nixpkgs/pkgs/tools/security/saml2aws/default.nix
index 4373abdb9a4..42845705ff6 100644
--- a/nixpkgs/pkgs/tools/security/saml2aws/default.nix
+++ b/nixpkgs/pkgs/tools/security/saml2aws/default.nix
@@ -11,7 +11,20 @@ buildGoModule rec {
sha256 = "12aidylamrq4rvy2cfdz669lr1p20yqrshigcc5x1hrlhh9y64xc";
};
- modSha256 = "1kcj5065yy52p1jy4fad5lsz3y4spqc40k1qsirm53qqixhrhvag";
+ hid = fetchFromGitHub {
+ owner = "karalabe";
+ repo = "hid";
+ rev = "9c14560f9ee858c43f40b5cd01392b167aacf4e8";
+ sha256 = "0xc7b8mwha64j7l2fr2g5zy8pz7cqi0vrxx60gii52b6ii31xncx";
+ };
+
+ vendorSha256 = "0mns5clykvj33krf29yjh8lkf05nih42ka5ji7miq0iaikqyyc78";
+ overrideModAttrs = (_: {
+ postBuild = ''
+ cp -r --reflink=auto ${hid}/libusb vendor/github.com/karalabe/hid
+ cp -r --reflink=auto ${hid}/hidapi vendor/github.com/karalabe/hid
+ '';
+ });
subPackages = [ "." "cmd/saml2aws" ];
@@ -26,4 +39,4 @@ buildGoModule rec {
platforms = stdenv.lib.platforms.unix;
maintainers = [ stdenv.lib.maintainers.pmyjavec ];
};
-}
+} \ No newline at end of file
diff --git a/nixpkgs/pkgs/tools/security/sn0int/default.nix b/nixpkgs/pkgs/tools/security/sn0int/default.nix
new file mode 100644
index 00000000000..9e9cbe2bb3a
--- /dev/null
+++ b/nixpkgs/pkgs/tools/security/sn0int/default.nix
@@ -0,0 +1,32 @@
+{ lib, fetchFromGitHub, rustPlatform,
+ libsodium, libseccomp, sqlite, pkgconfig }:
+
+rustPlatform.buildRustPackage rec {
+ pname = "sn0int";
+ version = "0.18.2";
+
+ src = fetchFromGitHub {
+ owner = "kpcyrd";
+ repo = pname;
+ rev = "v${version}";
+ sha256 = "0b21b0ryq03zrhqailg2iajirn30l358aj3k44lfnravr4h9zwkj";
+ };
+
+ cargoSha256 = "1pvn0sc325b5fh29m2l6cack4qfssa4lp3zhyb1qzkb3fmw3lgcy";
+
+ nativeBuildInputs = [ pkgconfig ];
+
+ buildInputs = [ libsodium libseccomp sqlite ];
+
+ # One of the dependencies (chrootable-https) tries to read "/etc/resolv.conf"
+ # in "checkPhase", hence fails in sandbox of "nix".
+ doCheck = false;
+
+ meta = with lib; {
+ description = "Semi-automatic OSINT framework and package manager";
+ homepage = "https://github.com/kpcyrd/sn0int";
+ license = licenses.gpl3;
+ maintainers = with maintainers; [ xrelkd ];
+ platforms = platforms.linux;
+ };
+}
diff --git a/nixpkgs/pkgs/tools/security/sops/default.nix b/nixpkgs/pkgs/tools/security/sops/default.nix
index 8aa2e219e7d..55dde8438c8 100644
--- a/nixpkgs/pkgs/tools/security/sops/default.nix
+++ b/nixpkgs/pkgs/tools/security/sops/default.nix
@@ -11,7 +11,7 @@ buildGoModule rec {
sha256 = "1515bk0fl0pvdkp402l51gdg63bmqlh89sglss6prc1qqvv5v2xy";
};
- modSha256 = "0vhxd3dschj5i9sig6vpxzbl59cas1qa843akzmjnfjrrafb916y";
+ vendorSha256 = "0yryc799k4563wy53z7amraj89cyprklj0lfv207530hwv5i5gm6";
meta = with stdenv.lib; {
homepage = "https://github.com/mozilla/sops";
@@ -19,4 +19,4 @@ buildGoModule rec {
maintainers = [ maintainers.marsam ];
license = licenses.mpl20;
};
-}
+} \ No newline at end of file
diff --git a/nixpkgs/pkgs/tools/security/super/default.nix b/nixpkgs/pkgs/tools/security/super/default.nix
index 73321fd618e..07051731069 100644
--- a/nixpkgs/pkgs/tools/security/super/default.nix
+++ b/nixpkgs/pkgs/tools/security/super/default.nix
@@ -17,9 +17,11 @@ stdenv.mkDerivation rec {
'';
patches = [
- (fetchpatch { url = "https://salsa.debian.org/debian/super/raw/debian/3.30.0-7/debian/patches/14-Fix-unchecked-setuid-call.patch";
- sha256 = "08m9hw4kyfjv0kqns1cqha4v5hkgp4s4z0q1rgif1fnk14xh7wqh";
- })
+ (fetchpatch {
+ name = "CVE-2014-0470.patch";
+ url = "https://salsa.debian.org/debian/super/raw/debian/3.30.0-7/debian/patches/14-Fix-unchecked-setuid-call.patch";
+ sha256 = "08m9hw4kyfjv0kqns1cqha4v5hkgp4s4z0q1rgif1fnk14xh7wqh";
+ })
];
NIX_CFLAGS_COMPILE = "-D_GNU_SOURCE";
diff --git a/nixpkgs/pkgs/tools/security/tor/default.nix b/nixpkgs/pkgs/tools/security/tor/default.nix
index 215ab63328f..e6cd74eda4b 100644
--- a/nixpkgs/pkgs/tools/security/tor/default.nix
+++ b/nixpkgs/pkgs/tools/security/tor/default.nix
@@ -30,6 +30,10 @@ stdenv.mkDerivation rec {
patches = [ ./disable-monotonic-timer-tests.patch ];
+ # cross compiles correctly but needs the following
+ configureFlags = stdenv.lib.optional (stdenv.hostPlatform != stdenv.buildPlatform)
+ "--disable-tool-name-check";
+
NIX_CFLAGS_LINK = stdenv.lib.optionalString stdenv.cc.isGNU "-lgcc_s";
postPatch = ''
diff --git a/nixpkgs/pkgs/tools/security/trufflehog/default.nix b/nixpkgs/pkgs/tools/security/trufflehog/default.nix
index a0205970366..353590ed87c 100644
--- a/nixpkgs/pkgs/tools/security/trufflehog/default.nix
+++ b/nixpkgs/pkgs/tools/security/trufflehog/default.nix
@@ -1,22 +1,22 @@
-{ lib, pythonPackages }:
+{ lib, python3Packages }:
let
- truffleHogRegexes = pythonPackages.buildPythonPackage rec {
+ truffleHogRegexes = python3Packages.buildPythonPackage rec {
pname = "truffleHogRegexes";
- version = "0.0.4";
- src = pythonPackages.fetchPypi {
+ version = "0.0.7";
+ src = python3Packages.fetchPypi {
inherit pname version;
- sha256 = "09vrscbb4h4w01gmamlzghxx6cvrqdscylrbdcnbjsd05xl7zh4z";
+ sha256 = "b81dfc60c86c1e353f436a0e201fd88edb72d5a574615a7858485c59edf32405";
};
};
in
- pythonPackages.buildPythonApplication rec {
+ python3Packages.buildPythonApplication rec {
pname = "truffleHog";
- version = "2.0.97";
+ version = "2.1.11";
- src = pythonPackages.fetchPypi {
+ src = python3Packages.fetchPypi {
inherit pname version;
- sha256 = "034kpv1p4m90286slvc6d4mlrzaf0b5jbd4qaj87hj65wbpcpg8r";
+ sha256 = "53619f0c5be082abd377f987291ace80bc3b88f864972b1a30494780980f769e";
};
# Relax overly restricted version constraint
@@ -24,7 +24,7 @@ in
substituteInPlace setup.py --replace "GitPython ==" "GitPython >= "
'';
- propagatedBuildInputs = [ pythonPackages.GitPython truffleHogRegexes ];
+ propagatedBuildInputs = [ python3Packages.GitPython truffleHogRegexes ];
# Test cases run git clone and require network access
doCheck = false;
diff --git a/nixpkgs/pkgs/tools/security/vault/default.nix b/nixpkgs/pkgs/tools/security/vault/default.nix
index 54be477cfe2..515b5884999 100644
--- a/nixpkgs/pkgs/tools/security/vault/default.nix
+++ b/nixpkgs/pkgs/tools/security/vault/default.nix
@@ -1,28 +1,30 @@
-{ stdenv, fetchFromGitHub, buildGoPackage }:
+{ stdenv, fetchFromGitHub, buildGoPackage, installShellFiles }:
buildGoPackage rec {
pname = "vault";
- version = "1.4.0";
+ version = "1.4.1";
src = fetchFromGitHub {
owner = "hashicorp";
repo = "vault";
rev = "v${version}";
- sha256 = "13ycg9shara4ycbi79wj28z6nimnsqgisbf35ca3q9w066ac0ja2";
+ sha256 = "0fbbvihvlzh95rrk65bwxfcam6y57q0yffq8dzvcbm3i0ap7ndar";
};
goPackagePath = "github.com/hashicorp/vault";
subPackages = [ "." ];
+ nativeBuildInputs = [ installShellFiles ];
+
buildFlagsArray = [
"-tags='vault'"
"-ldflags=\"-X github.com/hashicorp/vault/sdk/version.GitCommit='v${version}'\""
];
postInstall = ''
- mkdir -p $bin/share/bash-completion/completions
- echo "complete -C $bin/bin/vault vault" > $bin/share/bash-completion/completions/vault
+ echo "complete -C $out/bin/vault vault" > vault.bash
+ installShellCompletion vault.bash
'';
meta = with stdenv.lib; {
diff --git a/nixpkgs/pkgs/tools/security/verifpal/default.nix b/nixpkgs/pkgs/tools/security/verifpal/default.nix
index 95afb580d4e..e1e5e100bd1 100644
--- a/nixpkgs/pkgs/tools/security/verifpal/default.nix
+++ b/nixpkgs/pkgs/tools/security/verifpal/default.nix
@@ -28,8 +28,8 @@ buildGoPackage rec {
'';
installPhase = ''
- mkdir -p $bin/bin
- cp go/src/$goPackagePath/build/bin/linux/verifpal $bin/bin/
+ mkdir -p $out/bin
+ cp go/src/$goPackagePath/build/bin/linux/verifpal $out/bin/
'';
meta = {
diff --git a/nixpkgs/pkgs/tools/system/acpica-tools/default.nix b/nixpkgs/pkgs/tools/system/acpica-tools/default.nix
index 583bbd2ebd9..62b1be61965 100644
--- a/nixpkgs/pkgs/tools/system/acpica-tools/default.nix
+++ b/nixpkgs/pkgs/tools/system/acpica-tools/default.nix
@@ -2,11 +2,11 @@
stdenv.mkDerivation rec {
pname = "acpica-tools";
- version = "20200326";
+ version = "20200430";
src = fetchurl {
url = "https://acpica.org/sites/acpica/files/acpica-unix-${version}.tar.gz";
- sha256 = "1zr2sziiy5jvwgmxpgy2imzsmmb6hlncfd816i7qxrixg2ag7ycr";
+ sha256 = "0z19bniqsa8y0n1qrxmb6gz7m63jpwx22zgk5ablyriixhfpz07v";
};
NIX_CFLAGS_COMPILE = "-O3";
diff --git a/nixpkgs/pkgs/tools/system/bfs/default.nix b/nixpkgs/pkgs/tools/system/bfs/default.nix
index 50146f0aad3..78e92e01c6e 100644
--- a/nixpkgs/pkgs/tools/system/bfs/default.nix
+++ b/nixpkgs/pkgs/tools/system/bfs/default.nix
@@ -2,13 +2,13 @@
stdenv.mkDerivation rec {
pname = "bfs";
- version = "1.6";
+ version = "1.7";
src = fetchFromGitHub {
repo = "bfs";
owner = "tavianator";
rev = version;
- sha256 = "0qrxd1vdz2crk7jf7cdda5bhm1f841hjvin7fn497wymwr5qyjah";
+ sha256 = "1jkz99i10y6dwc4dyh2vp3p549jscgwjdp6x17mcw561bnam2287";
};
buildInputs = stdenv.lib.optionals stdenv.isLinux [ libcap acl ];
diff --git a/nixpkgs/pkgs/tools/system/collectd/default.nix b/nixpkgs/pkgs/tools/system/collectd/default.nix
index 9118fc55ea9..f625a441ba3 100644
--- a/nixpkgs/pkgs/tools/system/collectd/default.nix
+++ b/nixpkgs/pkgs/tools/system/collectd/default.nix
@@ -8,12 +8,12 @@ let
plugins = callPackage ./plugins.nix args;
in
stdenv.mkDerivation rec {
- version = "5.10.0";
+ version = "5.11.0";
pname = "collectd";
src = fetchurl {
url = "https://collectd.org/files/${pname}-${version}.tar.bz2";
- sha256 = "0nrpq09q6vbbv0hjc1vfa36z8j5802500hy75m678gh2cgsmjcx0";
+ sha256 = "1cjxksxdqcqdccz1nbnc2fp6yy84qq361ynaq5q8bailds00mc9p";
};
nativeBuildInputs = [ pkgconfig autoreconfHook ];
diff --git a/nixpkgs/pkgs/tools/system/colorls/Gemfile.lock b/nixpkgs/pkgs/tools/system/colorls/Gemfile.lock
index ebbcd0fdb03..1b84a550e48 100644
--- a/nixpkgs/pkgs/tools/system/colorls/Gemfile.lock
+++ b/nixpkgs/pkgs/tools/system/colorls/Gemfile.lock
@@ -2,7 +2,7 @@ GEM
remote: https://rubygems.org/
specs:
clocale (0.0.4)
- colorls (1.2.0)
+ colorls (1.3.3)
clocale (~> 0)
filesize (~> 0)
manpages (~> 0)
diff --git a/nixpkgs/pkgs/tools/system/colorls/default.nix b/nixpkgs/pkgs/tools/system/colorls/default.nix
index 4401d841ff6..8243590cd7d 100644
--- a/nixpkgs/pkgs/tools/system/colorls/default.nix
+++ b/nixpkgs/pkgs/tools/system/colorls/default.nix
@@ -12,7 +12,7 @@ bundlerApp {
description = "Prettified LS";
homepage = "https://github.com/athityakumar/colorls";
license = with licenses; mit;
- maintainers = with maintainers; [ lukebfox nicknovitski ];
+ maintainers = with maintainers; [ lukebfox nicknovitski cbley ];
platforms = ruby.meta.platforms;
};
}
diff --git a/nixpkgs/pkgs/tools/system/colorls/gemset.nix b/nixpkgs/pkgs/tools/system/colorls/gemset.nix
index e7264a895a2..c16f87f457f 100644
--- a/nixpkgs/pkgs/tools/system/colorls/gemset.nix
+++ b/nixpkgs/pkgs/tools/system/colorls/gemset.nix
@@ -15,10 +15,10 @@
platforms = [];
source = {
remotes = ["https://rubygems.org"];
- sha256 = "0bcrig88ipzj43lnkrb5qmimdrml4lx15rcrhr6m2hxb0pks8932";
+ sha256 = "07rvm3g65slnqzal718qwfmgsjnkysx00jn8dnv96317yx0mxfx6";
type = "gem";
};
- version = "1.2.0";
+ version = "1.3.3";
};
filesize = {
groups = ["default"];
diff --git a/nixpkgs/pkgs/tools/system/ctop/default.nix b/nixpkgs/pkgs/tools/system/ctop/default.nix
index 4f492def162..1c46caaf932 100644
--- a/nixpkgs/pkgs/tools/system/ctop/default.nix
+++ b/nixpkgs/pkgs/tools/system/ctop/default.nix
@@ -11,7 +11,7 @@ buildGoModule rec {
sha256 = "0y72l65xgfqrgghzbm1zcy776l5m31z0gn6vfr689zyi3k3f4kh8";
};
- modSha256 = "0wxv6yzlgki7047qszx9p9xpph95bg097jkgaa0b3wbpx8vg7qml";
+ vendorSha256 = "1x4li44vg0l1x205v9a971cgphplxhsrn59q97gmj9cfy4m7jdfw";
buildFlagsArray = [ "-ldflags=-s -w -X main.version=${version} -X main.build=v${version}" ];
@@ -21,4 +21,4 @@ buildGoModule rec {
license = licenses.mit;
maintainers = with maintainers; [ apeyroux marsam ];
};
-}
+} \ No newline at end of file
diff --git a/nixpkgs/pkgs/tools/system/facter/default.nix b/nixpkgs/pkgs/tools/system/facter/default.nix
index d6f7a782824..0d2d704ea6c 100644
--- a/nixpkgs/pkgs/tools/system/facter/default.nix
+++ b/nixpkgs/pkgs/tools/system/facter/default.nix
@@ -2,10 +2,10 @@
stdenv.mkDerivation rec {
pname = "facter";
- version = "3.14.9";
+ version = "3.14.10";
src = fetchFromGitHub {
- sha256 = "1c8g4fg8c9x816xx3m33njfn9h6ksl8g4rmc20y39v1y9jn72vxk";
+ sha256 = "0yblz8k30kv9jpfs6bd0hcx5nfr23l7nxyw0q7p7c4ygkx3mb1ji";
rev = version;
repo = pname;
owner = "puppetlabs";
diff --git a/nixpkgs/pkgs/tools/system/gotop/default.nix b/nixpkgs/pkgs/tools/system/gotop/default.nix
index 44ef60c70f3..2964efd067d 100644
--- a/nixpkgs/pkgs/tools/system/gotop/default.nix
+++ b/nixpkgs/pkgs/tools/system/gotop/default.nix
@@ -11,7 +11,7 @@ buildGoModule rec {
sha256 = "01a2y2604dh2zfy5f2fxr306id0fbq0df91fpz2m8w7rpaszd6xr";
};
- modSha256 = "1gbpxq2vyshln97gij5y9qsjyf3mkwfqwwhikc0cck3mnwiv87dd";
+ vendorSha256 = "1ais548gii4q7xzysnw2ykjxyzb7azszsqdlp9hgiwp0bax9nj2n";
meta = with stdenv.lib; {
description = "A terminal based graphical activity monitor inspired by gtop and vtop";
@@ -20,4 +20,4 @@ buildGoModule rec {
maintainers = [ maintainers.magnetophon ];
platforms = platforms.unix;
};
-}
+} \ No newline at end of file
diff --git a/nixpkgs/pkgs/tools/system/hwinfo/default.nix b/nixpkgs/pkgs/tools/system/hwinfo/default.nix
index b8bbe09fcb7..6b6aa40a0f7 100644
--- a/nixpkgs/pkgs/tools/system/hwinfo/default.nix
+++ b/nixpkgs/pkgs/tools/system/hwinfo/default.nix
@@ -2,13 +2,13 @@
stdenv.mkDerivation rec {
pname = "hwinfo";
- version = "21.69";
+ version = "21.70";
src = fetchFromGitHub {
owner = "opensuse";
repo = "hwinfo";
rev = version;
- sha256 = "01lmxyqhx092ahbls7z9gwgmsinlqcv8zb7xvklbwyhzy5c02fxx";
+ sha256 = "13vvsxj06wy86m7fy6bwy63ga49a2k4chdnk8jj3klj2cnh7ql8z";
};
patchPhase = ''
diff --git a/nixpkgs/pkgs/tools/system/inxi/default.nix b/nixpkgs/pkgs/tools/system/inxi/default.nix
index f5b5d4ef7a2..36456501618 100644
--- a/nixpkgs/pkgs/tools/system/inxi/default.nix
+++ b/nixpkgs/pkgs/tools/system/inxi/default.nix
@@ -1,14 +1,34 @@
-{ stdenv, fetchFromGitHub, perl, perlPackages, makeWrapper }:
+{ lib, stdenv, fetchFromGitHub, perl, perlPackages, makeWrapper
+, ps, dnsutils # dig is recommended for multiple categories
+, withRecommends ? false # Install (almost) all recommended tools (see --recommends)
+, withRecommendedSystemPrograms ? withRecommends, utillinuxMinimal, dmidecode
+, file, hddtemp, iproute, ipmitool, usbutils, kmod, lm_sensors, smartmontools
+, binutils, tree, upower
+, withRecommendedDisplayInformationPrograms ? withRecommends, glxinfo, xorg
+}:
-stdenv.mkDerivation rec {
+let
+ prefixPath = programs:
+ "--prefix PATH ':' '${stdenv.lib.makeBinPath programs}'";
+ recommendedSystemPrograms = lib.optionals withRecommendedSystemPrograms [
+ utillinuxMinimal dmidecode file hddtemp iproute ipmitool usbutils kmod
+ lm_sensors smartmontools binutils tree upower
+ ];
+ recommendedDisplayInformationPrograms = lib.optionals
+ withRecommendedDisplayInformationPrograms
+ ([ glxinfo ] ++ (with xorg; [ xdpyinfo xprop xrandr ]));
+ programs = [ ps dnsutils ] # Core programs
+ ++ recommendedSystemPrograms
+ ++ recommendedDisplayInformationPrograms;
+in stdenv.mkDerivation rec {
pname = "inxi";
- version = "3.0.38-1";
+ version = "3.1.00-1";
src = fetchFromGitHub {
owner = "smxi";
repo = "inxi";
rev = version;
- sha256 = "1qw3sxgd3ly916bzzl3873s3flngwd3vh57slw0shsj7ivz8bfnm";
+ sha256 = "0md6yfd297l8695g0rsbs4mm74dc3k00rfjl4x2n4i33mkylp6qa";
};
buildInputs = [ perl makeWrapper ];
@@ -17,13 +37,21 @@ stdenv.mkDerivation rec {
mkdir -p $out/bin
cp inxi $out/bin/
wrapProgram $out/bin/inxi \
- --set PERL5LIB "${perlPackages.makePerlPath (with perlPackages; [ CpanelJSONXS ])}"
+ --set PERL5LIB "${perlPackages.makePerlPath (with perlPackages; [ CpanelJSONXS ])}" \
+ ${prefixPath programs}
mkdir -p $out/share/man/man1
cp inxi.1 $out/share/man/man1/
'';
meta = with stdenv.lib; {
description = "A full featured CLI system information tool";
+ longDescription = ''
+ inxi is a command line system information script built for console and
+ IRC. It is also used a debugging tool for forum technical support to
+ quickly ascertain users' system configurations and hardware. inxi shows
+ system hardware, CPU, drivers, Xorg, Desktop, Kernel, gcc version(s),
+ Processes, RAM usage, and a wide variety of other useful information.
+ '';
homepage = "https://smxi.org/docs/inxi.htm";
changelog = "https://github.com/smxi/inxi/blob/${version}/inxi.changelog";
license = licenses.gpl3Plus;
diff --git a/nixpkgs/pkgs/tools/system/jump/default.nix b/nixpkgs/pkgs/tools/system/jump/default.nix
index bc2adb22c4f..fe0138783d3 100644
--- a/nixpkgs/pkgs/tools/system/jump/default.nix
+++ b/nixpkgs/pkgs/tools/system/jump/default.nix
@@ -11,7 +11,7 @@ buildGoModule rec {
sha256 = "0mph3bqfjnw3yf0a6ml3ccmkr1shviwvvq4d04ky4gppfy6z51jy";
};
- modSha256 = "1fzsm85c31vkdw80kijxmjhk8jyhjz8b21npgks2qrnizhm6iaf8";
+ vendorSha256 = "1500vim2lmkkls758pwhlx3piqbw6ap0nnhdwz9pcxih4s4as2nk";
outputs = [ "out" "man"];
postInstall = ''
@@ -37,4 +37,4 @@ buildGoModule rec {
platforms = platforms.all;
maintainers = with maintainers; [ sondr3 ];
};
-}
+} \ No newline at end of file
diff --git a/nixpkgs/pkgs/tools/system/kmon/default.nix b/nixpkgs/pkgs/tools/system/kmon/default.nix
index c1e511fa0c2..afb59b25059 100644
--- a/nixpkgs/pkgs/tools/system/kmon/default.nix
+++ b/nixpkgs/pkgs/tools/system/kmon/default.nix
@@ -2,16 +2,16 @@
rustPlatform.buildRustPackage rec {
pname = "kmon";
- version = "1.0.1";
+ version = "1.2.0";
src = fetchFromGitHub {
owner = "orhun";
repo = pname;
rev = "v${version}";
- sha256 = "0kmkcs13cccmjjfbl25bs3m54zcjcs38fiv84q0vy09a4dnx3gn8";
+ sha256 = "1l2zdp5f9spkfx1dhxyj32791kgvc8hqjr1kk75vds4c1wgwq8gk";
};
- cargoSha256 = "0l1yq9k6lyk0ww1nzk93axylgrwipkmmqh9r6fq4a31wjlblrkkb";
+ cargoSha256 = "08a7gr70a3rh7a52gglck16qlwngb6ap723lg3b3mxmkyigdf6i6";
nativeBuildInputs = [ python3 ];
diff --git a/nixpkgs/pkgs/tools/system/localtime/default.nix b/nixpkgs/pkgs/tools/system/localtime/default.nix
index 4dcb6afb00f..805a70c74e9 100644
--- a/nixpkgs/pkgs/tools/system/localtime/default.nix
+++ b/nixpkgs/pkgs/tools/system/localtime/default.nix
@@ -16,7 +16,7 @@ buildGoPackage rec {
makeFlags = [
"PREFIX=${placeholder "out"}"
- "BINDIR=${placeholder "bin"}/bin"
+ "BINDIR=${placeholder "out"}/bin"
];
buildPhase = ''
diff --git a/nixpkgs/pkgs/tools/system/netdata/go.d.plugin.nix b/nixpkgs/pkgs/tools/system/netdata/go.d.plugin.nix
index cada1eb65c3..2e397da8a81 100644
--- a/nixpkgs/pkgs/tools/system/netdata/go.d.plugin.nix
+++ b/nixpkgs/pkgs/tools/system/netdata/go.d.plugin.nix
@@ -11,7 +11,7 @@ buildGoModule rec {
sha256 = "15h4075lwqh58ssdgyq34jj8r4dga0sz7h18dzy4nir75p8a0s7b";
};
- modSha256 = "1386qhk1yr47h7qv15k0abc8mfif96pqapw0v4wrf3pl1z9mzl2n";
+ vendorSha256 = "1pw9pb3rdjzf2dx1p1jiqxs7qhlpjki7fy74nyxza5wzrv4317sj";
buildFlagsArray = [ "-ldflags=-s -w -X main.version=${version}" ];
@@ -26,4 +26,4 @@ buildGoModule rec {
license = licenses.gpl3;
maintainers = [ maintainers.lethalman ];
};
-}
+} \ No newline at end of file
diff --git a/nixpkgs/pkgs/tools/system/plan9port/default.nix b/nixpkgs/pkgs/tools/system/plan9port/default.nix
index db206fa0b33..54e88f5d069 100644
--- a/nixpkgs/pkgs/tools/system/plan9port/default.nix
+++ b/nixpkgs/pkgs/tools/system/plan9port/default.nix
@@ -11,17 +11,16 @@
stdenv.mkDerivation {
pname = "plan9port";
- version = "2019-02-25";
+ version = "2020-01-08";
src = fetchFromGitHub {
owner = "9fans";
repo = "plan9port";
- rev = "047fd921744f39a82a86d9370e03f7af511e6e84";
- sha256 = "1lp17948q7vpl8rc2bf5a45bc8jqyj0s3zffmks9r25ai42vgb43";
+ rev = "cc3d97d52a72d7eaceb5b636bcdf81c3e19f7a2e";
+ sha256 = "0gb55kj0gzx1kdhiwcrbr7xcgz1im21dyxgxhfhh6d0q9rw0c17g";
};
patches = [
- ./tmpdir.patch
./darwin-sw_vers.patch
./darwin-cfframework.patch
];
@@ -90,7 +89,7 @@ stdenv.mkDerivation {
license = licenses.lpl-102;
maintainers = with maintainers; [ AndersonTorres bbarker
ftrvxmtrx kovirobi ];
- platforms = platforms.unix;
+ platforms = remove "aarch64-linux" platforms.unix;
};
}
# TODO: investigate the mouse chording support patch
diff --git a/nixpkgs/pkgs/tools/system/plan9port/tmpdir.patch b/nixpkgs/pkgs/tools/system/plan9port/tmpdir.patch
deleted file mode 100644
index e8200a177a2..00000000000
--- a/nixpkgs/pkgs/tools/system/plan9port/tmpdir.patch
+++ /dev/null
@@ -1,41 +0,0 @@
-From c762625549ff367b54bcd8281d1ce248a69b4401 Mon Sep 17 00:00:00 2001
-From: Jason Felice <jason.m.felice@gmail.com>
-Date: Mon, 1 Jul 2019 15:01:21 -0400
-Subject: [PATCH] Use $TMPDIR if available
-
-NixOS sandboxed builds (at least on Mac) don't have access to /tmp,
-and this should be better POSIX.
----
- bin/9c | 2 +-
- bin/9l | 2 +-
- 2 files changed, 2 insertions(+), 2 deletions(-)
-
-diff --git a/bin/9c b/bin/9c
-index 3ffb716c..88c47887 100755
---- a/bin/9c
-+++ b/bin/9c
-@@ -133,7 +133,7 @@ case "$tag" in
- esac
-
- # N.B. Must use temp file to avoid pipe; pipe loses status.
--xtmp=/tmp/9c.$$.$USER.out
-+xtmp=${TMPDIR-/tmp}/9c.$$.$USER.out
- $cc -DPLAN9PORT -I$PLAN9/include $cflags "$@" 2>$xtmp
- status=$?
- quiet $xtmp
-diff --git a/bin/9l b/bin/9l
-index 6195815f..717a540a 100755
---- a/bin/9l
-+++ b/bin/9l
-@@ -346,7 +346,7 @@ then
- echo $ld -L$PLAN9/lib "$@" $libsl $extralibs $frameworks
- fi
-
--xtmp=/tmp/9l.$$.$USER.out
-+xtmp="${TMPDIR-/tmp}/9l.$$.$USER.out"
- xxout() {
- sed 's/.*: In function `[^:]*: *//' $xtmp | egrep . |
- egrep -v 'is (often|almost always) misused|is dangerous, better use|text-based stub'
---
-2.21.0
-
diff --git a/nixpkgs/pkgs/tools/system/rsyslog/default.nix b/nixpkgs/pkgs/tools/system/rsyslog/default.nix
index a5ced1e325d..1739e0ad784 100644
--- a/nixpkgs/pkgs/tools/system/rsyslog/default.nix
+++ b/nixpkgs/pkgs/tools/system/rsyslog/default.nix
@@ -14,11 +14,11 @@ let
in
stdenv.mkDerivation rec {
pname = "rsyslog";
- version = "8.2002.0";
+ version = "8.2004.0";
src = fetchurl {
url = "https://www.rsyslog.com/files/download/rsyslog/${pname}-${version}.tar.gz";
- sha256 = "1y414g61j93dgm5xg0ni985a99cyag0flvv1fqn2188dhr6w31py";
+ sha256 = "1n97kx6cyyzd4zh6q01fyqi2wq1ah68h95kdc109m1zhfnvxghsz";
};
#patches = [ ./fix-gnutls-detection.patch ];
diff --git a/nixpkgs/pkgs/tools/system/stress-ng/default.nix b/nixpkgs/pkgs/tools/system/stress-ng/default.nix
index 6645639bcf0..883305b1d54 100644
--- a/nixpkgs/pkgs/tools/system/stress-ng/default.nix
+++ b/nixpkgs/pkgs/tools/system/stress-ng/default.nix
@@ -4,11 +4,11 @@
stdenv.mkDerivation rec {
pname = "stress-ng";
- version = "0.11.07";
+ version = "0.11.08";
src = fetchurl {
url = "https://kernel.ubuntu.com/~cking/tarballs/${pname}/${pname}-${version}.tar.xz";
- sha256 = "1kyxkwn18y4161yyvxw3hd9xlzwlp270sn4gpnzvmr6rwxhr0nvh";
+ sha256 = "1xy5m5r4icc10h957ank0amnh46v2v47z4n1z43d9s7lmvahw287";
};
postPatch = ''
diff --git a/nixpkgs/pkgs/tools/system/syslog-ng/default.nix b/nixpkgs/pkgs/tools/system/syslog-ng/default.nix
index ed104f3a9ba..238c9ac1f68 100644
--- a/nixpkgs/pkgs/tools/system/syslog-ng/default.nix
+++ b/nixpkgs/pkgs/tools/system/syslog-ng/default.nix
@@ -7,11 +7,11 @@
stdenv.mkDerivation rec {
pname = "syslog-ng";
- version = "3.26.1";
+ version = "3.27.1";
src = fetchurl {
url = "https://github.com/${pname}/${pname}/releases/download/${pname}-${version}/${pname}-${version}.tar.gz";
- sha256 = "1kb2rdhfw4vcdxpvr7rcpg5ysr14ib43bfqdm3755wjdhqil48ch";
+ sha256 = "1cv1kn4jpqyhlhx8w5v557jyc4b2ly2dgkv1hbb8vzgpjwy66k65";
};
nativeBuildInputs = [ pkgconfig which ];
diff --git a/nixpkgs/pkgs/tools/system/thermald/default.nix b/nixpkgs/pkgs/tools/system/thermald/default.nix
index 560985a94f3..51a443b9bde 100644
--- a/nixpkgs/pkgs/tools/system/thermald/default.nix
+++ b/nixpkgs/pkgs/tools/system/thermald/default.nix
@@ -1,19 +1,19 @@
{ stdenv, fetchFromGitHub, autoconf, automake, libtool
-, pkgconfig, dbus, dbus-glib, libxml2 }:
+, pkgconfig, dbus, dbus-glib, libxml2, autoconf-archive }:
stdenv.mkDerivation rec {
pname = "thermald";
- version = "1.9.1";
+ version = "2.1";
src = fetchFromGitHub {
- owner = "01org";
+ owner = "intel";
repo = "thermal_daemon";
rev = "v${version}";
- sha256 = "0iagc3jqpnh6q2fa1gx4wx6r8qg0556j60xr159zqg95djr4dv99";
+ sha256 = "1k8svy03k57ld6p5d29i0ccrd1gics6kbyx1bkfmw9fh1bbljyf7";
};
nativeBuildInputs = [ pkgconfig ];
- buildInputs = [ autoconf automake libtool dbus dbus-glib libxml2 ];
+ buildInputs = [ autoconf automake libtool dbus dbus-glib libxml2 autoconf-archive ];
patchPhase = ''sed -e 's/upstartconfdir = \/etc\/init/upstartconfdir = $(out)\/etc\/init/' -i data/Makefile.am'';
diff --git a/nixpkgs/pkgs/tools/system/tre-command/default.nix b/nixpkgs/pkgs/tools/system/tre-command/default.nix
index 0cbe87ccd37..bc0fa7ea988 100644
--- a/nixpkgs/pkgs/tools/system/tre-command/default.nix
+++ b/nixpkgs/pkgs/tools/system/tre-command/default.nix
@@ -2,7 +2,7 @@
rustPlatform.buildRustPackage rec {
pname = "tre";
- version = "0.2.2";
+ version = "0.2.3";
src = fetchFromGitHub {
owner = "dduan";
@@ -11,7 +11,7 @@ rustPlatform.buildRustPackage rec {
sha256 = "1fazw2wn738iknbv54gv7qll7d4q2gy9bq1s3f3cv21cdv6bqral";
};
- cargoSha256 = "1m3ccp5ncafkifg8sxyxczsg3ja1gvq8wmgni68bgzm2lwxh2qgw";
+ cargoSha256 = "16bvnwgjf3kj99d77j1pkldbasxfwy55sj9sv9vf2z6llfmzfabd";
meta = with stdenv.lib; {
description = "Tree command, improved";
diff --git a/nixpkgs/pkgs/tools/system/tuptime/default.nix b/nixpkgs/pkgs/tools/system/tuptime/default.nix
new file mode 100644
index 00000000000..acc96998952
--- /dev/null
+++ b/nixpkgs/pkgs/tools/system/tuptime/default.nix
@@ -0,0 +1,35 @@
+{ stdenv, fetchFromGitHub, python3 }:
+
+stdenv.mkDerivation rec {
+ pname = "tuptime";
+ version = "4.1.0";
+
+ src = fetchFromGitHub {
+ owner = "rfrail3";
+ repo = "tuptime";
+ rev = version;
+ sha256 = "0p5v1jp6bl0hjv04q3gh11q6dx9z0x61h6svcbvwp5ni0h1bkz1a";
+ };
+
+ buildInputs = [ python3 ];
+
+ installPhase = ''
+ mkdir -p $out/bin
+ install -m 755 src/tuptime $out/bin/
+
+ mkdir -p $out/share/man/man1
+ cp src/man/tuptime.1 $out/share/man/man1/
+
+ # upstream only ships this, there are more scripts there...
+ mkdir -p $out/usr/share/doc/tuptime/contrib
+ cp misc/scripts/uptimed-to-tuptime.py $out/usr/share/doc/tuptime/contrib/
+ '';
+
+ meta = with stdenv.lib; {
+ description = "Total uptime & downtime statistics utility";
+ homepage = "https://github.com/rfrail3/tuptime";
+ license = licenses.gpl2;
+ platforms = platforms.all;
+ maintainers = [ maintainers.evils ];
+ };
+}
diff --git a/nixpkgs/pkgs/tools/system/uefitool/variants.nix b/nixpkgs/pkgs/tools/system/uefitool/variants.nix
index cced17e6ddd..470c8a0ca4d 100644
--- a/nixpkgs/pkgs/tools/system/uefitool/variants.nix
+++ b/nixpkgs/pkgs/tools/system/uefitool/variants.nix
@@ -3,13 +3,13 @@ let
common = opts: libsForQt5.callPackage (import ./common.nix opts) {};
in rec {
new-engine = common rec {
- version = "A56";
- sha256 = "0sxmjkrwcchxg2qmcjsw2vr42s7cdcg2fxkwb8axq2r2z23465gp";
+ version = "A57";
+ sha256 = "0algfdlxfjs582hsqmagbcmw06p8qlh0k5xczfkscs3prdn2vm7n";
installFiles = [ "UEFITool/UEFITool" "UEFIFind/UEFIFind" "UEFIExtract/UEFIExtract" ];
};
old-engine = common rec {
- version = "0.27.0";
- sha256 = "1i1p823qld927p4f1wcphqcnivb9mq7fi5xmzibxc3g9zzgnyc2h";
+ version = "0.28.0";
+ sha256 = "1n2hd2dysi5bv2iyq40phh1jxc48gdwzs414vfbxvcharcwapnja";
installFiles = [ "UEFITool" "UEFIReplace/UEFIReplace" "UEFIPatch/UEFIPatch" ];
};
}
diff --git a/nixpkgs/pkgs/tools/system/ytop/default.nix b/nixpkgs/pkgs/tools/system/ytop/default.nix
index de1678958db..64c3bf93aaa 100644
--- a/nixpkgs/pkgs/tools/system/ytop/default.nix
+++ b/nixpkgs/pkgs/tools/system/ytop/default.nix
@@ -4,18 +4,18 @@ assert stdenv.isDarwin -> IOKit != null;
rustPlatform.buildRustPackage rec {
pname = "ytop";
- version = "0.5.1";
+ version = "0.6.2";
src = fetchFromGitHub {
owner = "cjbassi";
repo = pname;
rev = version;
- sha256 = "1wpxn8i5112pzs8b03shl627r2yz70lvzjhd6f5crwhsnir06h5x";
+ sha256 = "02cpn5257yrmbakx3mlqs97kfambbn9ljb60jbqr1b9w24kd6zgf";
};
buildInputs = stdenv.lib.optionals stdenv.isDarwin [ IOKit ];
- cargoSha256 = "0wmlmkq4y2923i5kjhprw2hd2v5qls49ncs6h8g9rdlmwd7qdl86";
+ cargoSha256 = "0alqzy9gbj9m4l7xj1jsrnl09pv6z7c73gq787cqwn0gj93aaj19";
meta = with stdenv.lib; {
description = "A TUI system monitor written in Rust";
diff --git a/nixpkgs/pkgs/tools/text/a2ps/default.nix b/nixpkgs/pkgs/tools/text/a2ps/default.nix
index 39f1b7e5bc2..c29060cb82f 100644
--- a/nixpkgs/pkgs/tools/text/a2ps/default.nix
+++ b/nixpkgs/pkgs/tools/text/a2ps/default.nix
@@ -17,6 +17,7 @@ stdenv.mkDerivation rec {
sha256 = "0grqqsc3m45niac56m19m5gx7gc0m8zvia5iman1l4rlq31shf8s";
})
(fetchpatch {
+ name = "CVE-2015-8107.patch";
url = "https://sources.debian.net/data/main/a/a2ps/1:4.14-1.3/debian/patches/fix-format-security.diff";
sha256 = "0pq7zl41gf2kc6ahwyjnzn93vbxb4jc2c5g8j20isp4vw6dqrnwv";
})
diff --git a/nixpkgs/pkgs/tools/text/colordiff/default.nix b/nixpkgs/pkgs/tools/text/colordiff/default.nix
index 1ba1db1f7cb..c3da9a60555 100644
--- a/nixpkgs/pkgs/tools/text/colordiff/default.nix
+++ b/nixpkgs/pkgs/tools/text/colordiff/default.nix
@@ -1,14 +1,14 @@
{ stdenv, fetchurl, perl /*, xmlto */}:
stdenv.mkDerivation rec {
- name = "colordiff-1.0.18";
+ name = "colordiff-1.0.19";
src = fetchurl {
urls = [
"https://www.colordiff.org/${name}.tar.gz"
"http://www.colordiff.org/archive/${name}.tar.gz"
];
- sha256 = "1q6n60n4b9fnzccxyxv04mxjsql4ddq17vl2c74ijvjdhpcfrkr9";
+ sha256 = "069vzzgs7b44bmfh3ks2psrdb26s1w19gp9w4xxbgi7nhx6w3s26";
};
buildInputs = [ perl /* xmlto */ ];
diff --git a/nixpkgs/pkgs/tools/text/fanficfare/default.nix b/nixpkgs/pkgs/tools/text/fanficfare/default.nix
index ac90b4d7792..6fc27bdf00c 100644
--- a/nixpkgs/pkgs/tools/text/fanficfare/default.nix
+++ b/nixpkgs/pkgs/tools/text/fanficfare/default.nix
@@ -2,11 +2,11 @@
python3Packages.buildPythonApplication rec {
pname = "FanFicFare";
- version = "3.17.0";
+ version = "3.19.0";
src = python3Packages.fetchPypi {
inherit pname version;
- sha256 = "1h7kzlw516w9qk5vcn0rqibxbhvzbmxgnf9l6yjxj30x53ynrvzj";
+ sha256 = "01cr4941sg6is6k6sajlbr6hs5s47aq9xhp7gadhq4h3x6dilj40";
};
propagatedBuildInputs = with python3Packages; [
diff --git a/nixpkgs/pkgs/tools/text/gawk/default.nix b/nixpkgs/pkgs/tools/text/gawk/default.nix
index 58dea610c39..73e2b8a6de4 100644
--- a/nixpkgs/pkgs/tools/text/gawk/default.nix
+++ b/nixpkgs/pkgs/tools/text/gawk/default.nix
@@ -19,11 +19,11 @@ let
inherit (stdenv.lib) optional;
in
stdenv.mkDerivation rec {
- name = "gawk-5.0.1";
+ name = "gawk-5.1.0";
src = fetchurl {
url = "mirror://gnu/gawk/${name}.tar.xz";
- sha256 = "15570p7g2x54asvr2fsc56sxzmm08fbk4mzpcs5n92fp9vq8cklf";
+ sha256 = "1gc2cccqy1x1bf6rhwlmd8q7dz7gnam6nwgl38bxapv6qm5flpyg";
};
# When we do build separate interactive version, it makes sense to always include man.
diff --git a/nixpkgs/pkgs/tools/text/gjo/default.nix b/nixpkgs/pkgs/tools/text/gjo/default.nix
new file mode 100644
index 00000000000..74a5c87a760
--- /dev/null
+++ b/nixpkgs/pkgs/tools/text/gjo/default.nix
@@ -0,0 +1,27 @@
+{ stdenv
+, buildGoModule
+, fetchFromGitHub
+}:
+
+buildGoModule rec {
+ pname = "gjo";
+ version = "1.0.3";
+
+ src = fetchFromGitHub {
+ owner = "skanehira";
+ repo = "gjo";
+ rev = version;
+ sha256 = "07halr0jzds4rya6hlvp45bjf7vg4yf49w5q60mch05hk8qkjjdw";
+ };
+
+ doCheck = true;
+
+ vendorSha256 = "0sjjj9z1dhilhpc8pq4154czrb79z9cm044jvn75kxcjv6v5l2m5";
+
+ meta = with stdenv.lib; {
+ description = "Small utility to create JSON objects";
+ homepage = "https://github.com/skanehira/gjo";
+ license = licenses.mit;
+ maintainers = with maintainers; [ doronbehar ];
+ };
+} \ No newline at end of file
diff --git a/nixpkgs/pkgs/tools/text/glogg/default.nix b/nixpkgs/pkgs/tools/text/glogg/default.nix
index 9dec057dfe9..90c1419ef30 100644
--- a/nixpkgs/pkgs/tools/text/glogg/default.nix
+++ b/nixpkgs/pkgs/tools/text/glogg/default.nix
@@ -1,6 +1,6 @@
-{ stdenv, fetchurl, qmake, boost }:
+{ mkDerivation, stdenv, fetchurl, qmake, boost }:
-stdenv.mkDerivation rec {
+mkDerivation rec {
pname = "glogg";
version = "1.1.4";
diff --git a/nixpkgs/pkgs/tools/text/languagetool/default.nix b/nixpkgs/pkgs/tools/text/languagetool/default.nix
index 154e099d3dd..fccd2174a6d 100644
--- a/nixpkgs/pkgs/tools/text/languagetool/default.nix
+++ b/nixpkgs/pkgs/tools/text/languagetool/default.nix
@@ -2,11 +2,11 @@
stdenv.mkDerivation rec {
pname = "LanguageTool";
- version = "4.9";
+ version = "4.9.1";
src = fetchzip {
url = "https://www.languagetool.org/download/${pname}-${version}.zip";
- sha256 = "05jqqamdvi5x35yy9bqw6wf7qagrm1r9488f7cfbbv764zfirz17";
+ sha256 = "0hvzckb92yijzmp2vphjp1wgql3xqq0xd83v5x6pbhziq9yxc5yh";
};
nativeBuildInputs = [ makeWrapper ];
buildInputs = [ jre ];
diff --git a/nixpkgs/pkgs/tools/text/nawk/default.nix b/nixpkgs/pkgs/tools/text/nawk/default.nix
index 57f036a47f0..aafce117ee4 100644
--- a/nixpkgs/pkgs/tools/text/nawk/default.nix
+++ b/nixpkgs/pkgs/tools/text/nawk/default.nix
@@ -1,21 +1,18 @@
-{ stdenv, fetchurl, yacc }:
+{ stdenv, fetchFromGitHub, yacc }:
stdenv.mkDerivation rec {
- name = "nawk-20121220";
+ pname = "nawk";
+ version = "20180827";
- src = fetchurl {
- url = "https://www.cs.princeton.edu/~bwk/btl.mirror/awk.tar.gz";
- sha256 = "10wvdn7xwc5bbp5h7l0b9fxby3bds21n8a34z54i8kjsbhb95h4d";
+ src = fetchFromGitHub {
+ owner = "onetrueawk";
+ repo = "awk";
+ rev = version;
+ sha256 = "0qcsxhcwg6g3c0zxmbipqa8d8d5n8zxrq0hymb8yavsaz103fcl6";
};
nativeBuildInputs = [ yacc ];
- unpackPhase = ''
- mkdir build
- cd build
- tar xvf ${src}
- '';
-
patchPhase = ''
substituteInPlace ./makefile \
--replace "YACC = yacc -d -S" ""
diff --git a/nixpkgs/pkgs/tools/text/ocrmypdf/default.nix b/nixpkgs/pkgs/tools/text/ocrmypdf/default.nix
index 83d0bdd92c7..19690e270af 100644
--- a/nixpkgs/pkgs/tools/text/ocrmypdf/default.nix
+++ b/nixpkgs/pkgs/tools/text/ocrmypdf/default.nix
@@ -29,14 +29,14 @@ let
in buildPythonApplication rec {
pname = "ocrmypdf";
- version = "9.6.1";
+ version = "9.8.0";
disabled = ! python3Packages.isPy3k;
src = fetchFromGitHub {
owner = "jbarlow83";
repo = "OCRmyPDF";
rev = "v${version}";
- sha256 = "0lbld11r8zds79183hh5y2f5fi7cacl7bx9f7f2g58j38y1c65vj";
+ sha256 = "1l4bwnbd3g0wmdx8yv8hi5wm2z2q67y9mwrvrc4xxmkdrb5y8jcd";
};
nativeBuildInputs = with python3Packages; [
diff --git a/nixpkgs/pkgs/tools/text/ripgrep/default.nix b/nixpkgs/pkgs/tools/text/ripgrep/default.nix
index c794b4ba33c..ab589eb87fc 100644
--- a/nixpkgs/pkgs/tools/text/ripgrep/default.nix
+++ b/nixpkgs/pkgs/tools/text/ripgrep/default.nix
@@ -1,9 +1,7 @@
{ stdenv
, fetchFromGitHub
, rustPlatform
-, asciidoc
-, docbook_xsl
-, libxslt
+, asciidoctor
, installShellFiles
, Security
, withPCRE2 ? true
@@ -12,27 +10,27 @@
rustPlatform.buildRustPackage rec {
pname = "ripgrep";
- version = "12.0.1";
+ version = "12.1.0";
src = fetchFromGitHub {
owner = "BurntSushi";
repo = pname;
rev = version;
- sha256 = "1c0v51s05kbg9825n6mvpizhkkgz38wl7hp8f3vzbjfg4i8l8wb0";
+ sha256 = "1vgkk78c25ia9y4q5psrh7xrlbfdn7dz7bc20kci40n8zr0vjwww";
};
- cargoSha256 = "0i8x2xgri8f8mzrlkc8l2yzcgczl35nw4bmwg09d343mjkmk6d8y";
+ cargoSha256 = "143lnf4yah9ik7v8rphv7gbvr2ckhjpmy8zfgqml1n3fqxiqvxnb";
cargoBuildFlags = stdenv.lib.optional withPCRE2 "--features pcre2";
- nativeBuildInputs = [ asciidoc docbook_xsl libxslt installShellFiles ];
+ nativeBuildInputs = [ asciidoctor installShellFiles ];
buildInputs = (stdenv.lib.optional withPCRE2 pcre2)
++ (stdenv.lib.optional stdenv.isDarwin Security);
preFixup = ''
- (cd target/release/build/ripgrep-*/out
- installManPage rg.1
- installShellCompletion rg.{bash,fish})
+ installManPage $releaseDir/build/ripgrep-*/out/rg.1
+
+ installShellCompletion $releaseDir/build/ripgrep-*/out/rg.{bash,fish}
installShellCompletion --zsh "$src/complete/_rg"
'';
diff --git a/nixpkgs/pkgs/tools/text/sd/default.nix b/nixpkgs/pkgs/tools/text/sd/default.nix
index a12f07d6da6..a540918e56d 100644
--- a/nixpkgs/pkgs/tools/text/sd/default.nix
+++ b/nixpkgs/pkgs/tools/text/sd/default.nix
@@ -3,16 +3,16 @@
rustPlatform.buildRustPackage rec {
pname = "sd";
- version = "0.7.2";
+ version = "0.7.5";
src = fetchFromGitHub {
owner = "chmln";
repo = pname;
rev = "v${version}";
- sha256 = "15siv3p22v7lj37b74pjsy360qx97d40q2xdzdg2srbi8svjgg27";
+ sha256 = "04jsni80jzhbb106283df34cdyp5p362l6m29kp30hnc6x49853q";
};
- cargoSha256 = "1sa7ki7kyg98l2gcrdzk7182ghm1clyqljjb596mhzh48g8kddn5";
+ cargoSha256 = "1gwb76zys7gky42clzjs5g4hhgpfvzcw63chw9mnj703c7h0cgfh";
buildInputs = stdenv.lib.optionals stdenv.isDarwin [ Security ];
@@ -21,6 +21,6 @@ rustPlatform.buildRustPackage rec {
homepage = "https://github.com/chmln/sd";
license = licenses.mit;
platforms = platforms.all;
- maintainers = [ maintainers.amar1729 ];
+ maintainers = with maintainers; [ amar1729 filalex77 ];
};
}
diff --git a/nixpkgs/pkgs/tools/text/shfmt/default.nix b/nixpkgs/pkgs/tools/text/shfmt/default.nix
index 71f79724b9c..ab96392a95d 100644
--- a/nixpkgs/pkgs/tools/text/shfmt/default.nix
+++ b/nixpkgs/pkgs/tools/text/shfmt/default.nix
@@ -2,16 +2,16 @@
buildGoModule rec {
pname = "shfmt";
- version = "3.1.0";
+ version = "3.1.1";
src = fetchFromGitHub {
owner = "mvdan";
repo = "sh";
rev = "v${version}";
- sha256 = "1k0bq4b4rv6wrh24jvcnpg1mfqrzqhl90zg4zibxzv3zkhjdskzh";
+ sha256 = "0zlk1jjk65jwd9cx0xarz4yg2r2h86kd5g00gcnsav6dp6rx3aw8";
};
- modSha256 = "080k8d5rp8kyg0x7vjxm758b9ya9z336yd4rcqws7yhqawxiv55z";
+ vendorSha256 = "1jq2x4yxshsy4ahp7nrry8dc9cyjj46mljs447rq57sgix4ndpq8";
subPackages = ["cmd/shfmt"];
buildFlagsArray = [ "-ldflags=-s -w -X main.version=${version}" ];
@@ -25,4 +25,4 @@ buildGoModule rec {
'';
license = licenses.bsd3;
};
-}
+} \ No newline at end of file
diff --git a/nixpkgs/pkgs/tools/text/transifex-client/default.nix b/nixpkgs/pkgs/tools/text/transifex-client/default.nix
index 403adaf71b6..ac10564c9f7 100644
--- a/nixpkgs/pkgs/tools/text/transifex-client/default.nix
+++ b/nixpkgs/pkgs/tools/text/transifex-client/default.nix
@@ -3,7 +3,7 @@
buildPythonApplication rec {
pname = "transifex-client";
- version = "0.13.6";
+ version = "0.13.9";
propagatedBuildInputs = [
urllib3 requests python-slugify six setuptools
@@ -11,13 +11,13 @@ buildPythonApplication rec {
src = fetchPypi {
inherit pname version;
- sha256 = "0y6pprlmkmi7wfqr3k70sb913qa70p3i90q5mravrai7cr32y1w8";
+ sha256 = "0lgd77vrddvyn8afkxr7a7hblmp4k5sr0i9i1032xdih2bipdd9f";
};
prePatch = ''
substituteInPlace requirements.txt --replace "urllib3<1.24" "urllib3>=1.24" \
--replace "six==1.11.0" "six>=1.11.0" \
- --replace "python-slugify==1.2.6" "python-slugify>=1.2.6"
+ --replace "python-slugify<2.0.0" "python-slugify>2.0.0"
'';
# Requires external resources
diff --git a/nixpkgs/pkgs/tools/typesetting/asciidoctorj/default.nix b/nixpkgs/pkgs/tools/typesetting/asciidoctorj/default.nix
index 80b99284e49..ba46d36814a 100644
--- a/nixpkgs/pkgs/tools/typesetting/asciidoctorj/default.nix
+++ b/nixpkgs/pkgs/tools/typesetting/asciidoctorj/default.nix
@@ -2,11 +2,11 @@
stdenv.mkDerivation rec {
pname = "asciidoctorj";
- version = "2.2.0";
+ version = "2.3.0";
src = fetchzip {
url = "http://dl.bintray.com/asciidoctor/maven/org/asciidoctor/${pname}/${version}/${pname}-${version}-bin.zip";
- sha256 = "0akxzfibfa8msnardvyy9hkj2z6sqn7pnwphz6avixdcclg6yxa5";
+ sha256 = "1hmra1pg79hj9kqbj6702y5b03vyvfzqf6hq65jg1vxjqlq7h3xx";
};
nativeBuildInputs = [ makeWrapper ];
diff --git a/nixpkgs/pkgs/tools/typesetting/sile/default.nix b/nixpkgs/pkgs/tools/typesetting/sile/default.nix
index 5bb4c5b7fb2..a8969fd4598 100644
--- a/nixpkgs/pkgs/tools/typesetting/sile/default.nix
+++ b/nixpkgs/pkgs/tools/typesetting/sile/default.nix
@@ -13,11 +13,11 @@ in
stdenv.mkDerivation rec {
pname = "sile";
- version = "0.10.3";
+ version = "0.10.4";
src = fetchurl {
url = "https://github.com/sile-typesetter/sile/releases/download/v${version}/${pname}-${version}.tar.bz2";
- sha256 = "d89d5ce7d2bf46fb062e5299ffd8b5d821dc3cb3462a0e7c1109edeee111d856";
+ sha256 = "08j2vv6spnzz8bsh62wbdv1pjiziiba71cadscsy5hw6pklzndni";
};
configureFlags = [ "--with-system-luarocks" ];
diff --git a/nixpkgs/pkgs/tools/typesetting/tex/texlive/bin.nix b/nixpkgs/pkgs/tools/typesetting/tex/texlive/bin.nix
index fc3c5b32480..c0ae6b8e187 100644
--- a/nixpkgs/pkgs/tools/typesetting/tex/texlive/bin.nix
+++ b/nixpkgs/pkgs/tools/typesetting/tex/texlive/bin.nix
@@ -26,10 +26,7 @@ let
sha256 = "1dfps39q6bdr1zsbp9p74mvalmy3bycihv19sb9c6kg30kprz8nj";
};
- patches = [
- ];
-
- postPatch = let
+ prePatch = let
# The source compatible with Poppler ${popplerVersion} not yet available in TeXLive ${year}
# so we need to use files introduced in https://www.tug.org/svn/texlive?view=revision&revision=52959
popplerVersion = "0.83.0";
@@ -68,10 +65,26 @@ let
done
cp -pv ${pdftoepdf} texk/web2c/pdftexdir/pdftoepdf.cc
cp -pv ${pdftosrc} texk/web2c/pdftexdir/pdftosrc.cc
+ '';
+ patches = [
# poppler 0.84 compat fixups, use 0.83 files otherwise
- patch -p1 -i ${./poppler84.patch}
- '';
+ ./poppler84.patch
+
+ (fetchpatch {
+ name = "texlive-poppler-0.86.patch";
+ url = "https://git.archlinux.org/svntogit/packages.git/plain/trunk/texlive-poppler-0.86.patch?h=packages/texlive-bin&id=60244e41bb6f1501e8ed1fc9e6b7ba8d3f283398";
+ sha256 = "0pdvhaqc3zgz7hp0x3a4qs0nh26fkvgmr6w1cjljqhp1nyiw2f1l";
+ })
+
+ # Needed for ghostscript>=9.50
+ (fetchpatch {
+ name = "xdvipdfm-fix.patch";
+ url = "https://www.tug.org/svn/texlive/trunk/Build/source/texk/dvipdfm-x/spc_dvips.c?view=patch&r1=52765&r2=52764&pathrev=52765";
+ sha256 = "0qvrc7yxhbl5f4g340z8aql388bwib0m2gxd473skbmviy5bjr3f";
+ stripLen = 2;
+ })
+ ];
# remove when removing synctex-missing-header.patch
preAutoreconf = "pushd texk/web2c";
@@ -108,7 +121,7 @@ core = stdenv.mkDerivation rec {
pname = "texlive-bin";
inherit version;
- inherit (common) src patches postPatch preAutoreconf postAutoreconf;
+ inherit (common) src patches prePatch preAutoreconf postAutoreconf;
outputs = [ "out" "doc" ];
@@ -201,7 +214,7 @@ core-big = stdenv.mkDerivation { #TODO: upmendex
pname = "texlive-core-big.bin";
inherit version;
- inherit (common) src patches postPatch preAutoreconf postAutoreconf;
+ inherit (common) src patches prePatch preAutoreconf postAutoreconf;
hardeningDisable = [ "format" ];
diff --git a/nixpkgs/pkgs/tools/typesetting/tex/texlive/default.nix b/nixpkgs/pkgs/tools/typesetting/tex/texlive/default.nix
index 52a10711875..bb6432fc3e6 100644
--- a/nixpkgs/pkgs/tools/typesetting/tex/texlive/default.nix
+++ b/nixpkgs/pkgs/tools/typesetting/tex/texlive/default.nix
@@ -1,6 +1,6 @@
/* TeX Live user docs
- source: ../../../../../doc/languages-frameworks/texlive.xml
- - current html: http://nixos.org/nixpkgs/manual/#sec-language-texlive
+ - current html: https://nixos.org/nixpkgs/manual/#sec-language-texlive
*/
{ stdenv, lib, fetchurl, runCommand, writeText, buildEnv
, callPackage, ghostscriptX, harfbuzz, poppler_min
diff --git a/nixpkgs/pkgs/tools/virtualization/cri-tools/default.nix b/nixpkgs/pkgs/tools/virtualization/cri-tools/default.nix
index 2aa23f04fe4..ef622f055ee 100644
--- a/nixpkgs/pkgs/tools/virtualization/cri-tools/default.nix
+++ b/nixpkgs/pkgs/tools/virtualization/cri-tools/default.nix
@@ -1,26 +1,41 @@
-{ buildGoPackage, fetchFromGitHub, lib }:
+{ lib
+, buildGoModule
+, fetchFromGitHub
+, installShellFiles
+}:
-buildGoPackage rec {
+buildGoModule rec {
pname = "cri-tools";
- version = "1.17.0";
+ version = "1.18.0";
+
src = fetchFromGitHub {
owner = "kubernetes-sigs";
repo = pname;
rev = "v${version}";
- sha256 = "0h9gry56graif761lmcy91q9fzwvmwb15wcx8245927yfg5j0zgh";
+ sha256 = "06sxjhjpd893fn945c1s4adri2bf7s50ddvcw5pnwb6qndzfljw6";
};
- goPackagePath = "github.com/kubernetes-sigs/cri-tools";
+ vendorSha256 = null;
+
+ nativeBuildInputs = [ installShellFiles ];
buildPhase = ''
- pushd go/src/${goPackagePath}
- make all install BINDIR=$bin/bin
+ make binaries VERSION=${version}
+ '';
+
+ installPhase = ''
+ make install BINDIR=$out/bin
+
+ for shell in bash fish zsh; do
+ $out/bin/crictl completion $shell > crictl.$shell
+ installShellCompletion crictl.$shell
+ done
'';
meta = with lib; {
description = "CLI and validation tools for Kubelet Container Runtime Interface (CRI)";
homepage = "https://github.com/kubernetes-sigs/cri-tools";
- license = lib.licenses.asl20;
- maintainers = with maintainers; [ saschagrunert ];
+ license = licenses.asl20;
+ maintainers = with maintainers; [ ] ++ teams.podman.members;
};
}
diff --git a/nixpkgs/pkgs/tools/virtualization/distrobuilder/default.nix b/nixpkgs/pkgs/tools/virtualization/distrobuilder/default.nix
index a781f3a4424..6ad8c355ee2 100644
--- a/nixpkgs/pkgs/tools/virtualization/distrobuilder/default.nix
+++ b/nixpkgs/pkgs/tools/virtualization/distrobuilder/default.nix
@@ -23,7 +23,7 @@ buildGoPackage rec {
goDeps = ./deps.nix;
postInstall = ''
- wrapProgram $bin/bin/distrobuilder --prefix PATH ":" ${binPath}
+ wrapProgram $out/bin/distrobuilder --prefix PATH ":" ${binPath}
'';
nativeBuildInputs = [ pkgconfig makeWrapper ];
diff --git a/nixpkgs/pkgs/tools/virtualization/google-compute-engine-oslogin/default.nix b/nixpkgs/pkgs/tools/virtualization/google-compute-engine-oslogin/default.nix
index 31ea1cb2a94..2c2444de4e5 100644
--- a/nixpkgs/pkgs/tools/virtualization/google-compute-engine-oslogin/default.nix
+++ b/nixpkgs/pkgs/tools/virtualization/google-compute-engine-oslogin/default.nix
@@ -1,4 +1,5 @@
{ stdenv
+, lib
, fetchFromGitHub
, curl
, json_c
@@ -8,22 +9,20 @@
stdenv.mkDerivation rec {
pname = "google-compute-engine-oslogin";
- version = "1.5.3";
- # from packages/google-compute-engine-oslogin/packaging/debian/changelog
+ version = "20200325.00";
src = fetchFromGitHub {
owner = "GoogleCloudPlatform";
- repo = "compute-image-packages";
- rev = "20190522";
- sha256 = "16jbbrnz49g843h813r408dbvfa2hicf8canxwbfxr2kzhv7ycmm";
+ repo = "guest-oslogin";
+ rev = version;
+ sha256 = "03hk95pgzcgy6ginp8zdy0fbk88m6n65qq22jq490z1xwbjffm8r";
};
- sourceRoot = "source/packages/google-compute-engine-oslogin";
postPatch = ''
# change sudoers dir from /var/google-sudoers.d to /run/google-sudoers.d (managed through systemd-tmpfiles)
- substituteInPlace pam_module/pam_oslogin_admin.cc --replace /var/google-sudoers.d /run/google-sudoers.d
+ substituteInPlace src/pam/pam_oslogin_admin.cc --replace /var/google-sudoers.d /run/google-sudoers.d
# fix "User foo not allowed because shell /bin/bash does not exist"
- substituteInPlace compat.h --replace /bin/bash ${bashInteractive}/bin/bash
+ substituteInPlace src/include/compat.h --replace /bin/bash ${bashInteractive}/bin/bash
'';
buildInputs = [ curl.dev pam ];
@@ -31,15 +30,15 @@ stdenv.mkDerivation rec {
NIX_CFLAGS_COMPILE="-I${json_c.dev}/include/json-c";
NIX_CFLAGS_LINK="-L${json_c}/lib";
- installPhase = ''
- mkdir -p $out/{bin,lib}
-
- install -Dm755 libnss_cache_google-compute-engine-oslogin-${version}.so $out/lib/libnss_cache_oslogin.so.2
- install -Dm755 libnss_google-compute-engine-oslogin-${version}.so $out/lib/libnss_oslogin.so.2
-
- install -Dm755 pam_oslogin_admin.so pam_oslogin_login.so $out/lib
- install -Dm755 google_{oslogin_nss_cache,authorized_keys} $out/bin
- '';
+ makeFlags = [
+ "VERSION=${version}"
+ "DESTDIR=${placeholder "out"}"
+ "PREFIX=/"
+ "BINDIR=/bin"
+ "LIBDIR=/lib"
+ "PAMDIR=/lib"
+ "MANDIR=/share/man"
+ ];
enableParallelBuilding = true;
diff --git a/nixpkgs/pkgs/tools/virtualization/govc/default.nix b/nixpkgs/pkgs/tools/virtualization/govc/default.nix
index 1595af84770..e3329ea13f1 100644
--- a/nixpkgs/pkgs/tools/virtualization/govc/default.nix
+++ b/nixpkgs/pkgs/tools/virtualization/govc/default.nix
@@ -2,7 +2,7 @@
buildGoPackage rec {
pname = "govc";
- version = "0.21.0";
+ version = "0.22.1";
goPackagePath = "github.com/vmware/govmomi";
@@ -12,7 +12,7 @@ buildGoPackage rec {
rev = "v${version}";
owner = "vmware";
repo = "govmomi";
- sha256 = "0mig8w0szxqcii3gihrsm8n8hzziq9l6axc5z32nw9kiy9bi4130";
+ sha256 = "1z4am6143jrrls0023flnqgadm1z9p60w09cp1j5pnslm60vvw78";
};
meta = {
diff --git a/nixpkgs/pkgs/tools/virtualization/linode-cli/default.nix b/nixpkgs/pkgs/tools/virtualization/linode-cli/default.nix
index bcb0c545d45..c16eb003d8d 100644
--- a/nixpkgs/pkgs/tools/virtualization/linode-cli/default.nix
+++ b/nixpkgs/pkgs/tools/virtualization/linode-cli/default.nix
@@ -13,8 +13,8 @@
let
spec = fetchurl {
- url = "https://developers.linode.com/api/docs/v4/openapi.yaml";
- sha256 = "1l2fahdcmv7sp1qkwr5nv2vls8fypvlybwylqfzhyjmn7jqkw4hq";
+ url = "https://raw.githubusercontent.com/linode/linode-api-docs/v4.63.1/openapi.yaml";
+ sha256 = "03ngzbq24zazfqmfd7xjmxixkcb9vv1jgamplsj633j7sjj708s0";
};
in
diff --git a/nixpkgs/pkgs/tools/virtualization/vpsfree-client/Gemfile b/nixpkgs/pkgs/tools/virtualization/vpsfree-client/Gemfile
new file mode 100644
index 00000000000..87c9aeebb90
--- /dev/null
+++ b/nixpkgs/pkgs/tools/virtualization/vpsfree-client/Gemfile
@@ -0,0 +1,5 @@
+# frozen_string_literal: true
+
+source "https://rubygems.org"
+
+gem "vpsfree-client"
diff --git a/nixpkgs/pkgs/tools/virtualization/vpsfree-client/Gemfile.lock b/nixpkgs/pkgs/tools/virtualization/vpsfree-client/Gemfile.lock
new file mode 100644
index 00000000000..9b8fd4b918a
--- /dev/null
+++ b/nixpkgs/pkgs/tools/virtualization/vpsfree-client/Gemfile.lock
@@ -0,0 +1,75 @@
+GEM
+ remote: https://rubygems.org/
+ specs:
+ activesupport (6.0.2.2)
+ concurrent-ruby (~> 1.0, >= 1.0.2)
+ i18n (>= 0.7, < 2)
+ minitest (~> 5.1)
+ tzinfo (~> 1.1)
+ zeitwerk (~> 2.2)
+ addressable (2.7.0)
+ public_suffix (>= 2.0.2, < 5.0)
+ concurrent-ruby (1.1.6)
+ cookiejar (0.3.3)
+ curses (1.3.2)
+ domain_name (0.5.20190701)
+ unf (>= 0.0.5, < 1.0.0)
+ em-http-request (1.1.5)
+ addressable (>= 2.3.4)
+ cookiejar (!= 0.3.1)
+ em-socksify (>= 0.3)
+ eventmachine (>= 1.0.3)
+ http_parser.rb (>= 0.6.0)
+ em-socksify (0.3.2)
+ eventmachine (>= 1.0.0.beta.4)
+ eventmachine (1.0.9.1)
+ haveapi-client (0.13.2)
+ activesupport (>= 4.0)
+ highline (~> 1.7.8)
+ json
+ require_all (~> 2.0.0)
+ rest-client (~> 2.0.2)
+ ruby-progressbar (~> 1.7.5)
+ highline (1.7.10)
+ http-cookie (1.0.3)
+ domain_name (~> 0.5)
+ http_parser.rb (0.6.0)
+ i18n (1.8.2)
+ concurrent-ruby (~> 1.0)
+ json (2.3.0)
+ mime-types (3.3.1)
+ mime-types-data (~> 3.2015)
+ mime-types-data (3.2020.0425)
+ minitest (5.14.0)
+ netrc (0.11.0)
+ public_suffix (4.0.4)
+ require_all (2.0.0)
+ rest-client (2.0.2)
+ http-cookie (>= 1.0.2, < 2.0)
+ mime-types (>= 1.16, < 4.0)
+ netrc (~> 0.8)
+ ruby-progressbar (1.7.5)
+ thread_safe (0.3.6)
+ tzinfo (1.2.7)
+ thread_safe (~> 0.1)
+ unf (0.1.4)
+ unf_ext
+ unf_ext (0.0.7.7)
+ vpsadmin-client (3.0.0.master.20190517.pre.0.3ab5ddfe)
+ curses
+ em-http-request (~> 1.1.3)
+ eventmachine (~> 1.0.3)
+ haveapi-client (~> 0.13.0)
+ json
+ vpsfree-client (0.11.0)
+ vpsadmin-client (= 3.0.0.master.20190517.pre.0.3ab5ddfe)
+ zeitwerk (2.3.0)
+
+PLATFORMS
+ ruby
+
+DEPENDENCIES
+ vpsfree-client
+
+BUNDLED WITH
+ 2.1.4
diff --git a/nixpkgs/pkgs/tools/virtualization/vpsfree-client/default.nix b/nixpkgs/pkgs/tools/virtualization/vpsfree-client/default.nix
new file mode 100644
index 00000000000..17d57041488
--- /dev/null
+++ b/nixpkgs/pkgs/tools/virtualization/vpsfree-client/default.nix
@@ -0,0 +1,17 @@
+{ lib, bundlerApp, bundlerUpdateScript }:
+
+bundlerApp {
+ pname = "vpsfree-client";
+ gemdir = ./.;
+ exes = [ "vpsfreectl" ];
+
+ passthru.updateScript = bundlerUpdateScript "vpsfree-client";
+
+ meta = with lib; {
+ description = "Ruby API and CLI for the vpsFree.cz API";
+ homepage = "https://github.com/vpsfreecz/vpsfree-client";
+ maintainers = with maintainers; [ zimbatm ];
+ license = licenses.gpl3;
+ platforms = platforms.unix;
+ };
+}
diff --git a/nixpkgs/pkgs/tools/virtualization/vpsfree-client/gemset.nix b/nixpkgs/pkgs/tools/virtualization/vpsfree-client/gemset.nix
new file mode 100644
index 00000000000..366c5836bd3
--- /dev/null
+++ b/nixpkgs/pkgs/tools/virtualization/vpsfree-client/gemset.nix
@@ -0,0 +1,316 @@
+{
+ activesupport = {
+ dependencies = ["concurrent-ruby" "i18n" "minitest" "tzinfo" "zeitwerk"];
+ groups = ["default"];
+ platforms = [];
+ source = {
+ remotes = ["https://rubygems.org"];
+ sha256 = "1md98dkbirc8mq5nbz1vqq3hwqjiv7b54q7180w8wyxgd4k1awwb";
+ type = "gem";
+ };
+ version = "6.0.2.2";
+ };
+ addressable = {
+ dependencies = ["public_suffix"];
+ groups = ["default"];
+ platforms = [];
+ source = {
+ remotes = ["https://rubygems.org"];
+ sha256 = "1fvchp2rhp2rmigx7qglf69xvjqvzq7x0g49naliw29r2bz656sy";
+ type = "gem";
+ };
+ version = "2.7.0";
+ };
+ concurrent-ruby = {
+ groups = ["default"];
+ platforms = [];
+ source = {
+ remotes = ["https://rubygems.org"];
+ sha256 = "094387x4yasb797mv07cs3g6f08y56virc2rjcpb1k79rzaj3nhl";
+ type = "gem";
+ };
+ version = "1.1.6";
+ };
+ cookiejar = {
+ groups = ["default"];
+ platforms = [];
+ source = {
+ remotes = ["https://rubygems.org"];
+ sha256 = "0q0kmbks9l3hl0wdq744hzy97ssq9dvlzywyqv9k9y1p3qc9va2a";
+ type = "gem";
+ };
+ version = "0.3.3";
+ };
+ curses = {
+ groups = ["default"];
+ platforms = [];
+ source = {
+ remotes = ["https://rubygems.org"];
+ sha256 = "0hic9kq09dhh8jqjx3k1991rnqhlj3glz82w0g7ndcri52m1hgqg";
+ type = "gem";
+ };
+ version = "1.3.2";
+ };
+ domain_name = {
+ dependencies = ["unf"];
+ groups = ["default"];
+ platforms = [];
+ source = {
+ remotes = ["https://rubygems.org"];
+ sha256 = "0lcqjsmixjp52bnlgzh4lg9ppsk52x9hpwdjd53k8jnbah2602h0";
+ type = "gem";
+ };
+ version = "0.5.20190701";
+ };
+ em-http-request = {
+ dependencies = ["addressable" "cookiejar" "em-socksify" "eventmachine" "http_parser.rb"];
+ groups = ["default"];
+ platforms = [];
+ source = {
+ remotes = ["https://rubygems.org"];
+ sha256 = "13rxmbi0fv91n4sg300v3i9iiwd0jxv0i6xd0sp81dx3jlx7kasx";
+ type = "gem";
+ };
+ version = "1.1.5";
+ };
+ em-socksify = {
+ dependencies = ["eventmachine"];
+ groups = ["default"];
+ platforms = [];
+ source = {
+ remotes = ["https://rubygems.org"];
+ sha256 = "0rk43ywaanfrd8180d98287xv2pxyl7llj291cwy87g1s735d5nk";
+ type = "gem";
+ };
+ version = "0.3.2";
+ };
+ eventmachine = {
+ groups = ["default"];
+ platforms = [];
+ source = {
+ remotes = ["https://rubygems.org"];
+ sha256 = "17jr1caa3ggg696dd02g2zqzdjqj9x9q2nl7va82l36f7c5v6k4z";
+ type = "gem";
+ };
+ version = "1.0.9.1";
+ };
+ haveapi-client = {
+ dependencies = ["activesupport" "highline" "json" "require_all" "rest-client" "ruby-progressbar"];
+ groups = ["default"];
+ platforms = [];
+ source = {
+ remotes = ["https://rubygems.org"];
+ sha256 = "1wn5zvyy3w3q74m2fsb4jwxfdbdnpyyzxdf9iklpggcdmjhb78z0";
+ type = "gem";
+ };
+ version = "0.13.2";
+ };
+ highline = {
+ groups = ["default"];
+ platforms = [];
+ source = {
+ remotes = ["https://rubygems.org"];
+ sha256 = "01ib7jp85xjc4gh4jg0wyzllm46hwv8p0w1m4c75pbgi41fps50y";
+ type = "gem";
+ };
+ version = "1.7.10";
+ };
+ http-cookie = {
+ dependencies = ["domain_name"];
+ groups = ["default"];
+ platforms = [];
+ source = {
+ remotes = ["https://rubygems.org"];
+ sha256 = "004cgs4xg5n6byjs7qld0xhsjq3n6ydfh897myr2mibvh6fjc49g";
+ type = "gem";
+ };
+ version = "1.0.3";
+ };
+ "http_parser.rb" = {
+ groups = ["default"];
+ platforms = [];
+ source = {
+ remotes = ["https://rubygems.org"];
+ sha256 = "15nidriy0v5yqfjsgsra51wmknxci2n2grliz78sf9pga3n0l7gi";
+ type = "gem";
+ };
+ version = "0.6.0";
+ };
+ i18n = {
+ dependencies = ["concurrent-ruby"];
+ groups = ["default"];
+ platforms = [];
+ source = {
+ remotes = ["https://rubygems.org"];
+ sha256 = "0jwrd1l4mxz06iyx6053lr6hz2zy7ah2k3ranfzisvych5q19kwm";
+ type = "gem";
+ };
+ version = "1.8.2";
+ };
+ json = {
+ groups = ["default"];
+ platforms = [];
+ source = {
+ remotes = ["https://rubygems.org"];
+ sha256 = "0nrmw2r4nfxlfgprfgki3hjifgrcrs3l5zvm3ca3gb4743yr25mn";
+ type = "gem";
+ };
+ version = "2.3.0";
+ };
+ mime-types = {
+ dependencies = ["mime-types-data"];
+ groups = ["default"];
+ platforms = [];
+ source = {
+ remotes = ["https://rubygems.org"];
+ sha256 = "1zj12l9qk62anvk9bjvandpa6vy4xslil15wl6wlivyf51z773vh";
+ type = "gem";
+ };
+ version = "3.3.1";
+ };
+ mime-types-data = {
+ groups = ["default"];
+ platforms = [];
+ source = {
+ remotes = ["https://rubygems.org"];
+ sha256 = "1zin0q26wc5p7zb7glpwary7ms60s676vcq987yv22jgm6hnlwlh";
+ type = "gem";
+ };
+ version = "3.2020.0425";
+ };
+ minitest = {
+ groups = ["default"];
+ platforms = [];
+ source = {
+ remotes = ["https://rubygems.org"];
+ sha256 = "0g73x65hmjph8dg1h3rkzfg7ys3ffxm35hj35grw75fixmq53qyz";
+ type = "gem";
+ };
+ version = "5.14.0";
+ };
+ netrc = {
+ groups = ["default"];
+ platforms = [];
+ source = {
+ remotes = ["https://rubygems.org"];
+ sha256 = "0gzfmcywp1da8nzfqsql2zqi648mfnx6qwkig3cv36n9m0yy676y";
+ type = "gem";
+ };
+ version = "0.11.0";
+ };
+ public_suffix = {
+ groups = ["default"];
+ platforms = [];
+ source = {
+ remotes = ["https://rubygems.org"];
+ sha256 = "1l1kqw75asziwmzrig8rywxswxz8l91sc3pvns02ffsqac1a3wiz";
+ type = "gem";
+ };
+ version = "4.0.4";
+ };
+ require_all = {
+ groups = ["default"];
+ platforms = [];
+ source = {
+ remotes = ["https://rubygems.org"];
+ sha256 = "0sjf2vigdg4wq7z0xlw14zyhcz4992s05wgr2s58kjgin12bkmv8";
+ type = "gem";
+ };
+ version = "2.0.0";
+ };
+ rest-client = {
+ dependencies = ["http-cookie" "mime-types" "netrc"];
+ groups = ["default"];
+ platforms = [];
+ source = {
+ remotes = ["https://rubygems.org"];
+ sha256 = "1hzcs2r7b5bjkf2x2z3n8z6082maz0j8vqjiciwgg3hzb63f958j";
+ type = "gem";
+ };
+ version = "2.0.2";
+ };
+ ruby-progressbar = {
+ groups = ["default"];
+ platforms = [];
+ source = {
+ remotes = ["https://rubygems.org"];
+ sha256 = "0hynaavnqzld17qdx9r7hfw00y16ybldwq730zrqfszjwgi59ivi";
+ type = "gem";
+ };
+ version = "1.7.5";
+ };
+ thread_safe = {
+ groups = ["default"];
+ platforms = [];
+ source = {
+ remotes = ["https://rubygems.org"];
+ sha256 = "0nmhcgq6cgz44srylra07bmaw99f5271l0dpsvl5f75m44l0gmwy";
+ type = "gem";
+ };
+ version = "0.3.6";
+ };
+ tzinfo = {
+ dependencies = ["thread_safe"];
+ groups = ["default"];
+ platforms = [];
+ source = {
+ remotes = ["https://rubygems.org"];
+ sha256 = "1i3jh086w1kbdj3k5l60lc3nwbanmzdf8yjj3mlrx9b2gjjxhi9r";
+ type = "gem";
+ };
+ version = "1.2.7";
+ };
+ unf = {
+ dependencies = ["unf_ext"];
+ groups = ["default"];
+ platforms = [];
+ source = {
+ remotes = ["https://rubygems.org"];
+ sha256 = "0bh2cf73i2ffh4fcpdn9ir4mhq8zi50ik0zqa1braahzadx536a9";
+ type = "gem";
+ };
+ version = "0.1.4";
+ };
+ unf_ext = {
+ groups = ["default"];
+ platforms = [];
+ source = {
+ remotes = ["https://rubygems.org"];
+ sha256 = "0wc47r23h063l8ysws8sy24gzh74mks81cak3lkzlrw4qkqb3sg4";
+ type = "gem";
+ };
+ version = "0.0.7.7";
+ };
+ vpsadmin-client = {
+ dependencies = ["curses" "em-http-request" "eventmachine" "haveapi-client" "json"];
+ groups = ["default"];
+ platforms = [];
+ source = {
+ remotes = ["https://rubygems.org"];
+ sha256 = "0ki3204pkg3f9wk9plbq5n9lrnsmc364smfxyrbq32gi8ag2y2s8";
+ type = "gem";
+ };
+ version = "3.0.0.master.20190517.pre.0.3ab5ddfe";
+ };
+ vpsfree-client = {
+ dependencies = ["vpsadmin-client"];
+ groups = ["default"];
+ platforms = [];
+ source = {
+ remotes = ["https://rubygems.org"];
+ sha256 = "0cs2ibl9kl39hnpzyhyczaqv4i58pn106vx2m6lds9p3av5mcbxs";
+ type = "gem";
+ };
+ version = "0.11.0";
+ };
+ zeitwerk = {
+ groups = ["default"];
+ platforms = [];
+ source = {
+ remotes = ["https://rubygems.org"];
+ sha256 = "1akpm3pwvyiack2zk6giv9yn3cqb8pw6g40p4394pdc3xmy3s4k0";
+ type = "gem";
+ };
+ version = "2.3.0";
+ };
+} \ No newline at end of file