aboutsummaryrefslogtreecommitdiff
path: root/nixpkgs/pkgs/tools
diff options
context:
space:
mode:
Diffstat (limited to 'nixpkgs/pkgs/tools')
-rw-r--r--nixpkgs/pkgs/tools/X11/hsetroot/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/X11/imwheel/default.nix13
-rw-r--r--nixpkgs/pkgs/tools/X11/oblogout/default.nix36
-rw-r--r--nixpkgs/pkgs/tools/X11/oblogout/oblogout-0.3-fixes.patch66
-rw-r--r--nixpkgs/pkgs/tools/X11/setroot/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/X11/srandrd/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/X11/winswitch/default.nix47
-rw-r--r--nixpkgs/pkgs/tools/X11/xbrightness/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/X11/xcwd/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/X11/xdotool/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/X11/xnee/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/X11/xpointerbarrier/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/X11/xpra/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/X11/xsecurelock/default.nix9
-rw-r--r--nixpkgs/pkgs/tools/X11/xzoom/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/admin/ansible/default.nix8
-rw-r--r--nixpkgs/pkgs/tools/admin/aws_shell/default.nix5
-rw-r--r--nixpkgs/pkgs/tools/admin/awscli/default.nix19
-rw-r--r--nixpkgs/pkgs/tools/admin/awsweeper/default.nix22
-rw-r--r--nixpkgs/pkgs/tools/admin/azure-cli/default.nix10
-rw-r--r--nixpkgs/pkgs/tools/admin/azure-cli/python-packages.nix107
-rw-r--r--nixpkgs/pkgs/tools/admin/berglas/default.nix8
-rw-r--r--nixpkgs/pkgs/tools/admin/bubblewrap/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/admin/certbot/0001-Don-t-use-distutils.StrictVersion-that-cannot-handle.patch18
-rw-r--r--nixpkgs/pkgs/tools/admin/certbot/0001-pebble_artifacts-hardcode-pebble-location.patch24
-rw-r--r--nixpkgs/pkgs/tools/admin/certbot/default.nix22
-rw-r--r--nixpkgs/pkgs/tools/admin/clair/default.nix18
-rw-r--r--nixpkgs/pkgs/tools/admin/docker-credential-helpers/default.nix49
-rw-r--r--nixpkgs/pkgs/tools/admin/eksctl/default.nix6
-rw-r--r--nixpkgs/pkgs/tools/admin/fastlane/default.nix14
-rw-r--r--nixpkgs/pkgs/tools/admin/lego/default.nix7
-rw-r--r--nixpkgs/pkgs/tools/admin/procs/default.nix16
-rw-r--r--nixpkgs/pkgs/tools/admin/salt/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/admin/simp_le/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/admin/swiftclient/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/admin/tigervnc/default.nix12
-rw-r--r--nixpkgs/pkgs/tools/archivers/afio/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/archivers/sharutils/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/archivers/undmg/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/archivers/unrar/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/archivers/unzip/default.nix14
-rw-r--r--nixpkgs/pkgs/tools/archivers/zip/default.nix7
-rw-r--r--nixpkgs/pkgs/tools/audio/abcmidi/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/audio/beets/beet-check-tests.patch17
-rw-r--r--nixpkgs/pkgs/tools/audio/beets/check-plugin.nix35
-rw-r--r--nixpkgs/pkgs/tools/audio/beets/default.nix8
-rw-r--r--nixpkgs/pkgs/tools/audio/gvolicon/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/audio/mpdris2/default.nix48
-rw-r--r--nixpkgs/pkgs/tools/audio/trx/default.nix15
-rw-r--r--nixpkgs/pkgs/tools/audio/volctl/default.nix58
-rw-r--r--nixpkgs/pkgs/tools/backup/duplicati/default.nix6
-rw-r--r--nixpkgs/pkgs/tools/backup/hpe-ltfs/default.nix30
-rw-r--r--nixpkgs/pkgs/tools/backup/lvmsync/default.nix25
-rw-r--r--nixpkgs/pkgs/tools/backup/restic/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/backup/rsnapshot/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/bluetooth/obexfs/default.nix8
-rw-r--r--nixpkgs/pkgs/tools/bluetooth/obexftp/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/cd-dvd/cdrdao/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/cd-dvd/cdrkit/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/cd-dvd/isomd5sum/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/cd-dvd/vobcopy/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/compression/advancecomp/default.nix17
-rw-r--r--nixpkgs/pkgs/tools/compression/lbzip2/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/compression/pbzip2/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/compression/zstd/default.nix51
-rw-r--r--nixpkgs/pkgs/tools/filesystems/bees/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/filesystems/bindfs/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/filesystems/blobfuse/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/filesystems/btrfs-progs/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/filesystems/ceph/default.nix8
-rw-r--r--nixpkgs/pkgs/tools/filesystems/ciopfs/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/filesystems/davfs2/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/filesystems/e2fsprogs/default.nix6
-rw-r--r--nixpkgs/pkgs/tools/filesystems/fatresize/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/filesystems/fuse-overlayfs/default.nix9
-rw-r--r--nixpkgs/pkgs/tools/filesystems/glusterfs/default.nix6
-rw-r--r--nixpkgs/pkgs/tools/filesystems/grive2/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/filesystems/irods/default.nix7
-rw-r--r--nixpkgs/pkgs/tools/filesystems/moosefs/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/filesystems/mtdutils/default.nix9
-rw-r--r--nixpkgs/pkgs/tools/filesystems/nixpart/0.4/blivet.nix2
-rw-r--r--nixpkgs/pkgs/tools/filesystems/nixpart/0.4/lvm2.nix2
-rw-r--r--nixpkgs/pkgs/tools/filesystems/reiser4progs/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/filesystems/sasquatch/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/filesystems/squashfs/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/filesystems/sshfs-fuse/default.nix14
-rw-r--r--nixpkgs/pkgs/tools/graphics/appleseed/default.nix3
-rw-r--r--nixpkgs/pkgs/tools/graphics/argyllcms/default.nix6
-rw-r--r--nixpkgs/pkgs/tools/graphics/asymptote/default.nix6
-rw-r--r--nixpkgs/pkgs/tools/graphics/dcraw/default.nix11
-rw-r--r--nixpkgs/pkgs/tools/graphics/dpic/default.nix6
-rw-r--r--nixpkgs/pkgs/tools/graphics/enblend-enfuse/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/graphics/fim/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/graphics/gifsicle/default.nix9
-rw-r--r--nixpkgs/pkgs/tools/graphics/glee/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/graphics/gmic-qt/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/graphics/gmic/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/graphics/gnuplot/default.nix11
-rw-r--r--nixpkgs/pkgs/tools/graphics/graphviz/base.nix12
-rw-r--r--nixpkgs/pkgs/tools/graphics/graphviz/default.nix6
-rw-r--r--nixpkgs/pkgs/tools/graphics/ifm/default.nix25
-rw-r--r--nixpkgs/pkgs/tools/graphics/kst/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/graphics/logstalgia/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/graphics/luxcorerender/default.nix6
-rw-r--r--nixpkgs/pkgs/tools/graphics/nifskope/default.nix9
-rw-r--r--nixpkgs/pkgs/tools/graphics/nifskope/no-sse-on-arm.patch19
-rw-r--r--nixpkgs/pkgs/tools/graphics/pfstools/default.nix8
-rw-r--r--nixpkgs/pkgs/tools/graphics/pngcheck/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/graphics/quirc/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/graphics/vips/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/graphics/zbar/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/inputmethods/fcitx/unwrapped.nix28
-rw-r--r--nixpkgs/pkgs/tools/inputmethods/fusuma/Gemfile.lock4
-rw-r--r--nixpkgs/pkgs/tools/inputmethods/fusuma/default.nix8
-rw-r--r--nixpkgs/pkgs/tools/inputmethods/fusuma/gemset.nix6
-rw-r--r--nixpkgs/pkgs/tools/inputmethods/gebaar-libinput/default.nix25
-rw-r--r--nixpkgs/pkgs/tools/inputmethods/ibus-engines/ibus-anthy/default.nix56
-rw-r--r--nixpkgs/pkgs/tools/inputmethods/ibus-engines/ibus-hangul/default.nix11
-rw-r--r--nixpkgs/pkgs/tools/inputmethods/ibus-engines/ibus-libpinyin/default.nix59
-rw-r--r--nixpkgs/pkgs/tools/inputmethods/ibus-engines/ibus-m17n/default.nix53
-rw-r--r--nixpkgs/pkgs/tools/inputmethods/ibus-engines/ibus-table/default.nix3
-rw-r--r--nixpkgs/pkgs/tools/inputmethods/ibus-engines/ibus-typing-booster/default.nix6
-rw-r--r--nixpkgs/pkgs/tools/inputmethods/ibus-engines/ibus-uniemoji/allow-wrapping.patch13
-rw-r--r--nixpkgs/pkgs/tools/inputmethods/ibus-engines/ibus-uniemoji/default.nix57
-rw-r--r--nixpkgs/pkgs/tools/inputmethods/ibus/default.nix146
-rw-r--r--nixpkgs/pkgs/tools/inputmethods/ibus/fix-paths.patch2
-rw-r--r--nixpkgs/pkgs/tools/inputmethods/touchegg/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/misc/3llo/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/misc/arp-scan/default.nix12
-rw-r--r--nixpkgs/pkgs/tools/misc/automirror/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/misc/autorandr/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/misc/bash_unit/default.nix27
-rw-r--r--nixpkgs/pkgs/tools/misc/bat/default.nix13
-rw-r--r--nixpkgs/pkgs/tools/misc/bibtool/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/misc/birdfont/xmlbird.nix4
-rw-r--r--nixpkgs/pkgs/tools/misc/bonfire/default.nix7
-rw-r--r--nixpkgs/pkgs/tools/misc/byobu/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/misc/chezmoi/default.nix6
-rw-r--r--nixpkgs/pkgs/tools/misc/ckb-next/default.nix7
-rw-r--r--nixpkgs/pkgs/tools/misc/ckb-next/install-dirs.patch37
-rw-r--r--nixpkgs/pkgs/tools/misc/ckb-next/modprobe.patch36
-rw-r--r--nixpkgs/pkgs/tools/misc/ckb-next/systemd-service.patch45
-rw-r--r--nixpkgs/pkgs/tools/misc/cloc/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/misc/cpulimit/default.nix7
-rw-r--r--nixpkgs/pkgs/tools/misc/ddcutil/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/misc/debianutils/default.nix5
-rw-r--r--nixpkgs/pkgs/tools/misc/diffoscope/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/misc/dua/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/misc/dust/default.nix6
-rw-r--r--nixpkgs/pkgs/tools/misc/dylibbundler/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/misc/ent/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/misc/entr/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/misc/etcher/default.nix94
-rw-r--r--nixpkgs/pkgs/tools/misc/ethminer/default.nix23
-rw-r--r--nixpkgs/pkgs/tools/misc/eva/Cargo.lock.patch213
-rw-r--r--nixpkgs/pkgs/tools/misc/eva/default.nix20
-rw-r--r--nixpkgs/pkgs/tools/misc/exa/default.nix11
-rw-r--r--nixpkgs/pkgs/tools/misc/fdupes/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/misc/ffsend/default.nix8
-rw-r--r--nixpkgs/pkgs/tools/misc/file/default.nix17
-rw-r--r--nixpkgs/pkgs/tools/misc/fluent-bit/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/misc/fondu/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/misc/fontforge/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/misc/fselect/default.nix8
-rw-r--r--nixpkgs/pkgs/tools/misc/fwup/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/misc/fzf/default.nix13
-rw-r--r--nixpkgs/pkgs/tools/misc/fzy/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/misc/geekbench/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/misc/hashit/default.nix6
-rw-r--r--nixpkgs/pkgs/tools/misc/heimdall/default.nix3
-rw-r--r--nixpkgs/pkgs/tools/misc/html-proofer/Gemfile.lock12
-rw-r--r--nixpkgs/pkgs/tools/misc/html-proofer/gemset.nix29
-rw-r--r--nixpkgs/pkgs/tools/misc/hyperfine/default.nix8
-rw-r--r--nixpkgs/pkgs/tools/misc/kisslicer/default.nix6
-rw-r--r--nixpkgs/pkgs/tools/misc/lazydocker/default.nix8
-rw-r--r--nixpkgs/pkgs/tools/misc/ldmtool/default.nix52
-rw-r--r--nixpkgs/pkgs/tools/misc/lf/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/misc/licensor/default.nix6
-rw-r--r--nixpkgs/pkgs/tools/misc/lnav/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/misc/logstash/7.x.nix4
-rw-r--r--nixpkgs/pkgs/tools/misc/lorri/default.nix3
-rw-r--r--nixpkgs/pkgs/tools/misc/man-db/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/misc/memtest86+/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/misc/miniserve/default.nix11
-rw-r--r--nixpkgs/pkgs/tools/misc/mktorrent/default.nix10
-rw-r--r--nixpkgs/pkgs/tools/misc/moreutils/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/misc/multitail/default.nix6
-rw-r--r--nixpkgs/pkgs/tools/misc/multitime/default.nix39
-rw-r--r--nixpkgs/pkgs/tools/misc/neo-cowsay/default.nix24
-rw-r--r--nixpkgs/pkgs/tools/misc/noti/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/misc/ocz-ssd-guru/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/misc/onefetch/default.nix14
-rw-r--r--nixpkgs/pkgs/tools/misc/osm2pgsql/default.nix6
-rw-r--r--nixpkgs/pkgs/tools/misc/pal/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/misc/paps/default.nix12
-rw-r--r--nixpkgs/pkgs/tools/misc/parallel/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/misc/parcellite/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/misc/parted/default.nix36
-rw-r--r--nixpkgs/pkgs/tools/misc/parted/gpt-unicode-test-fix.patch34
-rw-r--r--nixpkgs/pkgs/tools/misc/partition-manager/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/misc/pfetch/default.nix28
-rw-r--r--nixpkgs/pkgs/tools/misc/phoronix-test-suite/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/misc/pipelight/default.nix6
-rw-r--r--nixpkgs/pkgs/tools/misc/plantuml/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/misc/ponysay/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/misc/powerline-go/default.nix6
-rw-r--r--nixpkgs/pkgs/tools/misc/pspg/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/misc/pws/default.nix18
-rw-r--r--nixpkgs/pkgs/tools/misc/qjoypad/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/misc/rename/default.nix1
-rw-r--r--nixpkgs/pkgs/tools/misc/reredirect/default.nix29
-rw-r--r--nixpkgs/pkgs/tools/misc/rlwrap/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/misc/slop/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/misc/snapper/default.nix14
-rw-r--r--nixpkgs/pkgs/tools/misc/starship/default.nix20
-rw-r--r--nixpkgs/pkgs/tools/misc/svtplay-dl/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/misc/teleconsole/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/misc/termplay/default.nix9
-rw-r--r--nixpkgs/pkgs/tools/misc/termtosvg/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/misc/timidity/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/misc/tio/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/misc/tmate/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/misc/tmpwatch/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/misc/tmux-xpanes/default.nix33
-rw-r--r--nixpkgs/pkgs/tools/misc/tmux/default.nix32
-rw-r--r--nixpkgs/pkgs/tools/misc/tmuxp/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/misc/topgrade/default.nix6
-rw-r--r--nixpkgs/pkgs/tools/misc/toybox/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/misc/trash-cli/default.nix6
-rw-r--r--nixpkgs/pkgs/tools/misc/ttfautohint/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/misc/tty-clock/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/misc/txr/default.nix9
-rw-r--r--nixpkgs/pkgs/tools/misc/uutils-coreutils/default.nix10
-rw-r--r--nixpkgs/pkgs/tools/misc/vdirsyncer/default.nix11
-rw-r--r--nixpkgs/pkgs/tools/misc/vector/default.nix34
-rw-r--r--nixpkgs/pkgs/tools/misc/vivid/default.nix6
-rw-r--r--nixpkgs/pkgs/tools/misc/vmtouch/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/misc/wakatime/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/misc/websocat/default.nix23
-rw-r--r--nixpkgs/pkgs/tools/misc/wob/default.nix9
-rw-r--r--nixpkgs/pkgs/tools/misc/wyrd/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/misc/xdo/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/misc/xilinx-bootgen/default.nix37
-rw-r--r--nixpkgs/pkgs/tools/misc/xsel/default.nix6
-rw-r--r--nixpkgs/pkgs/tools/misc/youtube-dl/default.nix6
-rw-r--r--nixpkgs/pkgs/tools/networking/6tunnel/default.nix23
-rw-r--r--nixpkgs/pkgs/tools/networking/acme-client/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/networking/aircrack-ng/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/networking/airfield/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/networking/altermime/default.nix3
-rw-r--r--nixpkgs/pkgs/tools/networking/argus/default.nix12
-rw-r--r--nixpkgs/pkgs/tools/networking/atinout/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/networking/babeld/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/networking/bandwhich/default.nix32
-rw-r--r--nixpkgs/pkgs/tools/networking/bwm-ng/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/networking/chrony/allow-clock_adjtime.patch26
-rw-r--r--nixpkgs/pkgs/tools/networking/chrony/default.nix7
-rw-r--r--nixpkgs/pkgs/tools/networking/chrony/fix-seccomp-build.patch13
-rw-r--r--nixpkgs/pkgs/tools/networking/cjdns/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/networking/clash/default.nix29
-rw-r--r--nixpkgs/pkgs/tools/networking/connman/connman-notify/default.nix38
-rw-r--r--nixpkgs/pkgs/tools/networking/corerad/default.nix24
-rw-r--r--nixpkgs/pkgs/tools/networking/croc/default.nix8
-rw-r--r--nixpkgs/pkgs/tools/networking/curl/default.nix9
-rw-r--r--nixpkgs/pkgs/tools/networking/curlie/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/networking/dd-agent/datadog-agent.nix4
-rw-r--r--nixpkgs/pkgs/tools/networking/dhcp/default.nix8
-rw-r--r--nixpkgs/pkgs/tools/networking/dhcpcd/default.nix14
-rw-r--r--nixpkgs/pkgs/tools/networking/eternal-terminal/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/networking/findomain/default.nix37
-rw-r--r--nixpkgs/pkgs/tools/networking/frp/default.nix31
-rw-r--r--nixpkgs/pkgs/tools/networking/gnirehtet/default.nix8
-rw-r--r--nixpkgs/pkgs/tools/networking/haproxy/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/networking/ifstat-legacy/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/networking/iodine/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/networking/ipv6calc/default.nix10
-rw-r--r--nixpkgs/pkgs/tools/networking/keepalived/default.nix22
-rw-r--r--nixpkgs/pkgs/tools/networking/lftp/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/networking/libreswan/default.nix26
-rw-r--r--nixpkgs/pkgs/tools/networking/libreswan/libreswan-3.18-glibc-2.26.patch36
-rw-r--r--nixpkgs/pkgs/tools/networking/lldpd/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/networking/mailutils/default.nix14
-rw-r--r--nixpkgs/pkgs/tools/networking/mailutils/fix-test-ali-awk.patch16
-rw-r--r--nixpkgs/pkgs/tools/networking/maphosts/default.nix6
-rw-r--r--nixpkgs/pkgs/tools/networking/mcrcon/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/networking/miniupnpc/default.nix5
-rw-r--r--nixpkgs/pkgs/tools/networking/mu/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/networking/nebula/default.nix43
-rw-r--r--nixpkgs/pkgs/tools/networking/network-manager/applet.nix2
-rw-r--r--nixpkgs/pkgs/tools/networking/network-manager/default.nix11
-rw-r--r--nixpkgs/pkgs/tools/networking/network-manager/fortisslvpn/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/networking/network-manager/iodine/default.nix6
-rw-r--r--nixpkgs/pkgs/tools/networking/network-manager/openvpn/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/networking/network-manager/strongswan.nix6
-rw-r--r--nixpkgs/pkgs/tools/networking/network-manager/vpnc/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/networking/nfstrace/default.nix9
-rw-r--r--nixpkgs/pkgs/tools/networking/ngrok-2/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/networking/ntopng/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/networking/ocserv/default.nix6
-rw-r--r--nixpkgs/pkgs/tools/networking/offlineimap/default.nix8
-rw-r--r--nixpkgs/pkgs/tools/networking/openapi-generator-cli/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/networking/openfortivpn/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/networking/openresolv/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/networking/openssh/default.nix12
-rw-r--r--nixpkgs/pkgs/tools/networking/p2p/amule/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/networking/packetdrill/default.nix6
-rw-r--r--nixpkgs/pkgs/tools/networking/pirate-get/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/networking/pmacct/default.nix62
-rw-r--r--nixpkgs/pkgs/tools/networking/ppp/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/networking/ratools/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/networking/shadowfox/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/networking/shadowsocks-libev/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/networking/shorewall/default.nix130
-rw-r--r--nixpkgs/pkgs/tools/networking/slirp4netns/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/networking/snabb/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/networking/sslsplit/default.nix31
-rw-r--r--nixpkgs/pkgs/tools/networking/ssmtp/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/networking/stunnel/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/networking/subfinder/default.nix20
-rw-r--r--nixpkgs/pkgs/tools/networking/subfinder/deps.nix145
-rw-r--r--nixpkgs/pkgs/tools/networking/swaks/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/networking/tracebox/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/networking/traceroute/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/networking/uget/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/networking/unbound/default.nix8
-rw-r--r--nixpkgs/pkgs/tools/networking/uwimap/default.nix8
-rw-r--r--nixpkgs/pkgs/tools/networking/v2ray/default.nix36
-rw-r--r--nixpkgs/pkgs/tools/networking/v2ray/generic.nix50
-rwxr-xr-xnixpkgs/pkgs/tools/networking/v2ray/update.sh53
-rw-r--r--nixpkgs/pkgs/tools/networking/vde2/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/networking/whois/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/networking/wireguard-go/0001-Fix-darwin-build.patch26
-rw-r--r--nixpkgs/pkgs/tools/networking/wireguard-go/default.nix6
-rw-r--r--nixpkgs/pkgs/tools/networking/wireguard-go/deps.nix12
-rw-r--r--nixpkgs/pkgs/tools/networking/wireguard-tools/default.nix12
-rw-r--r--nixpkgs/pkgs/tools/networking/wrk/default.nix6
-rw-r--r--nixpkgs/pkgs/tools/networking/yggdrasil/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/networking/zerotierone/default.nix15
-rw-r--r--nixpkgs/pkgs/tools/package-management/cargo-deb/default.nix6
-rw-r--r--nixpkgs/pkgs/tools/package-management/cargo-edit/default.nix15
-rw-r--r--nixpkgs/pkgs/tools/package-management/cargo-license/add-Cargo.lock.patch368
-rw-r--r--nixpkgs/pkgs/tools/package-management/cargo-license/default.nix6
-rw-r--r--nixpkgs/pkgs/tools/package-management/cargo-outdated/cargo-lock.patch1283
-rw-r--r--nixpkgs/pkgs/tools/package-management/cargo-outdated/default.nix11
-rwxr-xr-xnixpkgs/pkgs/tools/package-management/cargo-outdated/update-cargo-lock.sh18
-rw-r--r--nixpkgs/pkgs/tools/package-management/cargo-release/default.nix11
-rw-r--r--nixpkgs/pkgs/tools/package-management/cargo-tree/default.nix10
-rw-r--r--nixpkgs/pkgs/tools/package-management/clib/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/package-management/disnix/default.nix6
-rw-r--r--nixpkgs/pkgs/tools/package-management/emplace/default.nix23
-rw-r--r--nixpkgs/pkgs/tools/package-management/home-manager/default.nix6
-rw-r--r--nixpkgs/pkgs/tools/package-management/librepo/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/package-management/nfpm/default.nix6
-rw-r--r--nixpkgs/pkgs/tools/package-management/nix-index/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/package-management/nix/default.nix10
-rw-r--r--nixpkgs/pkgs/tools/package-management/nixpkgs-review/default.nix (renamed from nixpkgs/pkgs/tools/package-management/nix-review/default.nix)10
-rw-r--r--nixpkgs/pkgs/tools/package-management/opkg/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/package-management/pacman/default.nix12
-rw-r--r--nixpkgs/pkgs/tools/package-management/protontricks/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/package-management/reuse/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/package-management/xbps/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/security/afl/README.md4
-rw-r--r--nixpkgs/pkgs/tools/security/afl/default.nix12
-rw-r--r--nixpkgs/pkgs/tools/security/afl/libdislocator.nix2
-rw-r--r--nixpkgs/pkgs/tools/security/afl/qemu-patches/qemu-2.10.0-glibc-2.27.patch28
-rw-r--r--nixpkgs/pkgs/tools/security/afl/qemu.nix18
-rw-r--r--nixpkgs/pkgs/tools/security/age/default.nix27
-rw-r--r--nixpkgs/pkgs/tools/security/aws-okta/default.nix11
-rw-r--r--nixpkgs/pkgs/tools/security/bitwarden-cli/default.nix18
-rwxr-xr-xnixpkgs/pkgs/tools/security/bitwarden-cli/generate.sh8
-rw-r--r--nixpkgs/pkgs/tools/security/bitwarden-cli/node-packages-generated.nix1407
-rw-r--r--nixpkgs/pkgs/tools/security/bitwarden-cli/node-packages.json3
-rw-r--r--nixpkgs/pkgs/tools/security/bitwarden-cli/node-packages.nix17
-rw-r--r--nixpkgs/pkgs/tools/security/bruteforce-luks/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/security/chaps/default.nix16
-rw-r--r--nixpkgs/pkgs/tools/security/crunch/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/security/enchive/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/security/enpass/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/security/fail2ban/default.nix27
-rw-r--r--nixpkgs/pkgs/tools/security/fprintd/default.nix14
-rw-r--r--nixpkgs/pkgs/tools/security/fwknop/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/security/ghidra/default.nix29
-rw-r--r--nixpkgs/pkgs/tools/security/gnupg/22.nix4
-rw-r--r--nixpkgs/pkgs/tools/security/gobuster/default.nix25
-rw-r--r--nixpkgs/pkgs/tools/security/gpgstats/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/security/hcxtools/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/security/ibm-sw-tpm2/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/security/jd-gui/default.nix50
-rw-r--r--nixpkgs/pkgs/tools/security/john/default.nix11
-rw-r--r--nixpkgs/pkgs/tools/security/keybase/fix-paths-kbfs.patch48
-rw-r--r--nixpkgs/pkgs/tools/security/keybase/kbfs.nix9
-rw-r--r--nixpkgs/pkgs/tools/security/meo/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/security/monkeysphere/default.nix8
-rw-r--r--nixpkgs/pkgs/tools/security/nitrokey-app/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/security/notary/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/security/opensc/default.nix22
-rw-r--r--nixpkgs/pkgs/tools/security/pass/extensions/genphrase.nix2
-rw-r--r--nixpkgs/pkgs/tools/security/pbis/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/security/pcsclite/default.nix6
-rw-r--r--nixpkgs/pkgs/tools/security/pcsctools/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/security/phrasendrescher/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/security/pius/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/security/proxmark3/default.nix78
-rw-r--r--nixpkgs/pkgs/tools/security/rarcrack/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/security/rhash/default.nix7
-rw-r--r--nixpkgs/pkgs/tools/security/ripasso/cursive.nix23
-rw-r--r--nixpkgs/pkgs/tools/security/rng-tools/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/security/spectre-meltdown-checker/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/security/step-ca/default.nix25
-rw-r--r--nixpkgs/pkgs/tools/security/step-ca/deps.nix291
-rw-r--r--nixpkgs/pkgs/tools/security/stoken/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/security/sudo/default.nix10
-rw-r--r--nixpkgs/pkgs/tools/security/super/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/security/tboot/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/security/tor/default.nix6
-rw-r--r--nixpkgs/pkgs/tools/security/tpm-quote-tools/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/security/tpm2-tools/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/security/vault/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/security/vulnix/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/security/wpscan/Gemfile.lock46
-rw-r--r--nixpkgs/pkgs/tools/security/wpscan/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/security/wpscan/gemset.nix82
-rw-r--r--nixpkgs/pkgs/tools/system/augeas/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/system/bootchart/default.nix31
-rw-r--r--nixpkgs/pkgs/tools/system/clinfo/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/system/collectd/plugins.nix6
-rw-r--r--nixpkgs/pkgs/tools/system/ctop/default.nix12
-rw-r--r--nixpkgs/pkgs/tools/system/ctop/go-1.13-deps.patch90
-rw-r--r--nixpkgs/pkgs/tools/system/daemon/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/system/di/default.nix6
-rw-r--r--nixpkgs/pkgs/tools/system/efivar/default.nix10
-rw-r--r--nixpkgs/pkgs/tools/system/facter/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/system/fcron/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/system/fio/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/system/gdmap/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/system/hwinfo/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/system/ioping/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/system/ipmitool/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/system/ipmiutil/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/system/java-service-wrapper/default.nix41
-rw-r--r--nixpkgs/pkgs/tools/system/lr/default.nix6
-rw-r--r--nixpkgs/pkgs/tools/system/minijail/default.nix28
-rw-r--r--nixpkgs/pkgs/tools/system/netdata/default.nix14
-rw-r--r--nixpkgs/pkgs/tools/system/netdata/no-files-in-etc-and-var.patch98
-rw-r--r--nixpkgs/pkgs/tools/system/nq/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/system/opencl-info/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/system/osquery/0001-Fix-CMake-configuration-for-Nix.patch41
-rw-r--r--nixpkgs/pkgs/tools/system/pciutils/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/system/plan9port/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/system/rowhammer-test/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/system/rsyslog/default.nix14
-rw-r--r--nixpkgs/pkgs/tools/system/setserial/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/system/stress-ng/default.nix6
-rw-r--r--nixpkgs/pkgs/tools/system/testdisk/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/system/thermald/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/system/uefitool/common.nix39
-rw-r--r--nixpkgs/pkgs/tools/system/uefitool/variants.nix15
-rw-r--r--nixpkgs/pkgs/tools/system/vboot_reference/default.nix9
-rw-r--r--nixpkgs/pkgs/tools/system/xe/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/text/amber/default.nix6
-rw-r--r--nixpkgs/pkgs/tools/text/ansifilter/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/text/boxes/default.nix47
-rw-r--r--nixpkgs/pkgs/tools/text/catdoc/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/text/diffstat/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/text/discount/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/text/dos2unix/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/text/gawk/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/text/gawk/gawk-with-extensions.nix12
-rw-r--r--nixpkgs/pkgs/tools/text/gawk/gawkextlib.nix149
-rw-r--r--nixpkgs/pkgs/tools/text/gawk/setup-hook.sh6
-rw-r--r--nixpkgs/pkgs/tools/text/groff/0001-Fix-cross-compilation-by-looking-for-ar.patch46
-rw-r--r--nixpkgs/pkgs/tools/text/groff/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/text/highlight/default.nix85
-rw-r--r--nixpkgs/pkgs/tools/text/kytea/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/text/mdcat/default.nix14
-rw-r--r--nixpkgs/pkgs/tools/text/multitran/libmtquery/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/text/numdiff/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/text/ocrmypdf/default.nix9
-rw-r--r--nixpkgs/pkgs/tools/text/qgrep/default.nix17
-rw-r--r--nixpkgs/pkgs/tools/text/reckon/default.nix14
-rw-r--r--nixpkgs/pkgs/tools/text/replace/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/text/ripgrep-all/default.nix30
-rw-r--r--nixpkgs/pkgs/tools/text/ripgrep/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/text/sgml/jade/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/text/smu/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/text/snippetpixie/default.nix89
-rw-r--r--nixpkgs/pkgs/tools/text/untex/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/text/wgetpaste/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/text/xurls/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/text/zimreader/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/typesetting/asciidoc/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/typesetting/fop/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/typesetting/hevea/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/typesetting/pdf2djvu/default.nix14
-rw-r--r--nixpkgs/pkgs/tools/typesetting/pygmentex/default.nix56
-rw-r--r--nixpkgs/pkgs/tools/typesetting/tectonic/default.nix6
-rw-r--r--nixpkgs/pkgs/tools/typesetting/tex/texlive/bin.nix117
-rw-r--r--nixpkgs/pkgs/tools/typesetting/tex/texlive/combine.nix7
-rw-r--r--nixpkgs/pkgs/tools/typesetting/tex/texlive/default.nix12
-rw-r--r--nixpkgs/pkgs/tools/typesetting/tex/texlive/dvisvgm-fix.patch16
-rw-r--r--nixpkgs/pkgs/tools/video/bento4/default.nix4
-rw-r--r--nixpkgs/pkgs/tools/video/mjpegtools/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/video/rav1e/default.nix45
-rw-r--r--nixpkgs/pkgs/tools/video/vncrec/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/video/yamdi/default.nix2
-rw-r--r--nixpkgs/pkgs/tools/virtualization/amazon-ecs-cli/default.nix19
-rw-r--r--nixpkgs/pkgs/tools/virtualization/cri-tools/default.nix4
507 files changed, 6302 insertions, 3888 deletions
diff --git a/nixpkgs/pkgs/tools/X11/hsetroot/default.nix b/nixpkgs/pkgs/tools/X11/hsetroot/default.nix
index 239dfa0963b..6bae355812c 100644
--- a/nixpkgs/pkgs/tools/X11/hsetroot/default.nix
+++ b/nixpkgs/pkgs/tools/X11/hsetroot/default.nix
@@ -22,7 +22,7 @@ stdenv.mkDerivation rec {
patches = [ underlinkingPatch ];
- patchFlags = "-p0";
+ patchFlags = [ "-p0" ];
preConfigure = "./autogen.sh";
diff --git a/nixpkgs/pkgs/tools/X11/imwheel/default.nix b/nixpkgs/pkgs/tools/X11/imwheel/default.nix
index f33e15e59cc..efed00f9639 100644
--- a/nixpkgs/pkgs/tools/X11/imwheel/default.nix
+++ b/nixpkgs/pkgs/tools/X11/imwheel/default.nix
@@ -10,10 +10,15 @@ stdenv.mkDerivation rec {
buildInputs = [ libX11 libXext libXi libXmu libXt libXtst ];
- postPatch = ''
- substituteInPlace Makefile.in --replace "ETCDIR = " "ETCDIR = $out"
- substituteInPlace util.c --replace "/etc/X11/imwheel" "$out/etc/X11/imwheel"
- '';
+ makeFlags = [
+ "sysconfdir=/etc"
+ "ETCDIR=/etc"
+ ];
+
+ installFlags = [
+ "sysconfdir=${placeholder "out"}/etc"
+ "ETCDIR=${placeholder "out"}/etc"
+ ];
meta = with stdenv.lib; {
homepage = "http://imwheel.sourceforge.net/";
diff --git a/nixpkgs/pkgs/tools/X11/oblogout/default.nix b/nixpkgs/pkgs/tools/X11/oblogout/default.nix
deleted file mode 100644
index 9acd113d0ab..00000000000
--- a/nixpkgs/pkgs/tools/X11/oblogout/default.nix
+++ /dev/null
@@ -1,36 +0,0 @@
-{ stdenv, fetchFromGitHub, intltool, file, pythonPackages, cairo }:
-
-pythonPackages.buildPythonApplication {
- pname = "oblogout-unstable";
- version = "2009-11-18";
-
- src = fetchFromGitHub {
- owner = "nikdoof";
- repo = "oblogout";
- rev = "ee023158c03dee720a1af9b1307b14ed5a95f5a0";
- sha256 = "0nj87q94idb5ki4wnb2xipfgc6k6clr3rmm4xxh46b58z4zhhbmj";
- };
-
- nativeBuildInputs = [ intltool file pythonPackages.distutils_extra ];
-
- buildInputs = [ cairo ];
-
- propagatedBuildInputs = [ pythonPackages.pygtk pythonPackages.pillow pythonPackages.dbus-python ];
-
- patches = [ ./oblogout-0.3-fixes.patch ];
-
- postPatch = ''
- substituteInPlace data/oblogout --replace sys.prefix \"$out/${pythonPackages.python.sitePackages}\"
- substituteInPlace oblogout/__init__.py --replace sys.prefix \"$out\"
- mkdir -p $out/share/doc
- cp -a README $out/share/doc
- '';
-
- meta = {
- description = "Openbox logout script";
- homepage = https://launchpad.net/oblogout;
- license = stdenv.lib.licenses.gpl2;
- platforms = stdenv.lib.platforms.linux;
- maintainers = [ stdenv.lib.maintainers.romildo ];
- };
-}
diff --git a/nixpkgs/pkgs/tools/X11/oblogout/oblogout-0.3-fixes.patch b/nixpkgs/pkgs/tools/X11/oblogout/oblogout-0.3-fixes.patch
deleted file mode 100644
index c58103c6d40..00000000000
--- a/nixpkgs/pkgs/tools/X11/oblogout/oblogout-0.3-fixes.patch
+++ /dev/null
@@ -1,66 +0,0 @@
-diff --git a/data/oblogout b/data/oblogout
-index 8058c4a..dfe5285 100755
---- a/data/oblogout
-+++ b/data/oblogout
-@@ -77,8 +77,10 @@ def main(argv = None):
- config = 'data/oblogout.conf'
- elif os.path.isfile('%s/.config/oblogout.conf' % os.getenv("HOME")):
- config = '%s/.config/oblogout.conf' % os.getenv("HOME")
-- else:
-+ elif os.path.isfile('/etc/oblogout.conf'):
- config = '/etc/oblogout.conf'
-+ else:
-+ config = sys.prefix + '/etc/oblogout.conf'
-
- # Check config in local path, if it exists pass it on
- if not os.path.isfile(config):
-diff --git a/data/oblogout.conf b/data/oblogout.conf
-index 810872c..b1c1009 100644
---- a/data/oblogout.conf
-+++ b/data/oblogout.conf
-@@ -1,11 +1,11 @@
- [settings]
--usehal = true
-+usehal = false
-
- [looks]
- opacity = 70
- bgcolor = black
- buttontheme = simplistic
--buttons = cancel, logout, restart, shutdown, suspend, lock
-+buttons = cancel, logout, restart, shutdown, suspend
-
- [shortcuts]
- cancel = Escape
-@@ -17,11 +17,11 @@ lock = K
- hibernate = H
-
- [commands]
--shutdown = shutdown -h now
--restart = reboot
--suspend = pmi action suspend
--hibernate = pmi action hibernate
--safesuspend = safesuspend
--lock = gnome-screensaver-command -l
--switchuser = gdm-control --switch-user
-+shutdown = systemctl poweroff
-+restart = systemctl reboot
-+suspend = systemctl suspend
-+hibernate = systemctl hibernate
-+# safesuspend = safesuspend
-+# lock = gnome-screensaver-command -l
-+# switchuser = gdm-control --switch-user
- logout = openbox --exit
-diff --git a/oblogout/__init__.py b/oblogout/__init__.py
-index b9e4e01..12f521f 100644
---- a/oblogout/__init__.py
-+++ b/oblogout/__init__.py
-@@ -138,7 +138,7 @@ class OpenboxLogout():
- self.logger.debug("Rendering Fade")
- # Convert Pixbuf to PIL Image
- wh = (pb.get_width(),pb.get_height())
-- pilimg = Image.fromstring("RGB", wh, pb.get_pixels())
-+ pilimg = Image.frombytes("RGB", wh, pb.get_pixels())
-
- pilimg = pilimg.point(lambda p: (p * self.opacity) / 255 )
-
diff --git a/nixpkgs/pkgs/tools/X11/setroot/default.nix b/nixpkgs/pkgs/tools/X11/setroot/default.nix
index bb113c90849..a9b5f17af83 100644
--- a/nixpkgs/pkgs/tools/X11/setroot/default.nix
+++ b/nixpkgs/pkgs/tools/X11/setroot/default.nix
@@ -18,9 +18,9 @@ stdenv.mkDerivation rec {
buildInputs = [ libX11 imlib2 ]
++ stdenv.lib.optional enableXinerama libXinerama;
- buildFlags = "CC=cc " + (if enableXinerama then "xinerama=1" else "xinerama=0");
+ buildFlags = [ "CC=cc" (if enableXinerama then "xinerama=1" else "xinerama=0") ] ;
- installFlags = "DESTDIR=$(out) PREFIX=";
+ installFlags = [ "DESTDIR=$(out)" "PREFIX=" ];
meta = with stdenv.lib; {
description = "Simple X background setter inspired by imlibsetroot and feh";
diff --git a/nixpkgs/pkgs/tools/X11/srandrd/default.nix b/nixpkgs/pkgs/tools/X11/srandrd/default.nix
index af9394a84fa..6d5fa0f3d98 100644
--- a/nixpkgs/pkgs/tools/X11/srandrd/default.nix
+++ b/nixpkgs/pkgs/tools/X11/srandrd/default.nix
@@ -18,7 +18,7 @@ stdenv.mkDerivation rec {
buildInputs = [ libX11 libXrandr libXinerama ];
- makeFlags = "PREFIX=$(out)";
+ makeFlags = [ "PREFIX=$(out)" ];
meta = with stdenv.lib; {
homepage = "https://github.com/jceb/srandrd";
diff --git a/nixpkgs/pkgs/tools/X11/winswitch/default.nix b/nixpkgs/pkgs/tools/X11/winswitch/default.nix
deleted file mode 100644
index 404cef72a3e..00000000000
--- a/nixpkgs/pkgs/tools/X11/winswitch/default.nix
+++ /dev/null
@@ -1,47 +0,0 @@
-{ stdenv, fetchurl, pythonPackages
-, which, xpra, xmodmap }:
-
-let
- base = pythonPackages.buildPythonApplication rec {
- pname = "winswitch";
- namePrefix = "";
- version = "0.12.23";
-
- src = fetchurl {
- url = "http://winswitch.org/src/${pname}-${version}.src.tar.bz2";
- sha256 = "1m0akjcdlsgng426rwvzlcl76kjm993icj0pggvha40cizig1yd9";
- };
-
- propagatedBuildInputs = with pythonPackages; [
- pygtk twisted pycrypto pyasn1 which xpra xmodmap
- ];
-
- patchPhase = ''
- sed -i -r -e 's|(PREFIX_DIR *= *).*|\1"'"$out"'"|' \
- -e 's|(PREFIX_SEARCH_ORDER *= *).*|\1["'"$out"'"]|' \
- -e 's|(ETC_SEARCH_ORDER *= *).*|\1["'"$out/etc"'"]|' \
- -e 's|(BIN_SEARCH_ORDER *= *).*|\1["'"$out/bin"'"]|' \
- winswitch/util/paths.py
-
- sed -i -e '/elif *LINUX:/,/distro_helper/{
- s/elif *LINUX:.*/else: name = "NixOS"/p
- /distro_helper/!d
- }' winswitch/util/distro_packaging_util.py
- '';
-
- preInstall = ''
- # see https://bitbucket.org/pypa/setuptools/issue/130/install_data-doesnt-respect-prefix
- python setup.py install_data --install-dir=$out --root=$out
- sed -i '/data_files = data_files/d' setup.py
- '';
-
- doCheck = false;
-
- meta.platforms = stdenv.lib.platforms.linux;
- meta.broken = true;
- };
-in stdenv.lib.overrideDerivation base (b: {
- postFixup = b.postFixup + ''
- sed -i -e 's/\''${PATH:+:}\$PATH//g' "$out/bin"/*
- '';
-})
diff --git a/nixpkgs/pkgs/tools/X11/xbrightness/default.nix b/nixpkgs/pkgs/tools/X11/xbrightness/default.nix
index 2857ea6c7be..e196411ce41 100644
--- a/nixpkgs/pkgs/tools/X11/xbrightness/default.nix
+++ b/nixpkgs/pkgs/tools/X11/xbrightness/default.nix
@@ -13,7 +13,7 @@ stdenv.mkDerivation {
buildInputs = [ libX11 libXaw libXext libXmu libXpm libXxf86vm ];
makeFlags = [ "BINDIR=$(out)/bin" "MANPATH=$(out)/share/man" ];
- installTargets = "install install.man";
+ installTargets = [ "install" "install.man" ];
meta = {
description = "X11 brigthness and gamma software control";
diff --git a/nixpkgs/pkgs/tools/X11/xcwd/default.nix b/nixpkgs/pkgs/tools/X11/xcwd/default.nix
index 48cab6529cc..d50a7c006c8 100644
--- a/nixpkgs/pkgs/tools/X11/xcwd/default.nix
+++ b/nixpkgs/pkgs/tools/X11/xcwd/default.nix
@@ -13,7 +13,7 @@ stdenv.mkDerivation {
buildInputs = [ libX11 ];
- makeFlags = "prefix=$(out)";
+ makeFlags = [ "prefix=$(out)" ];
installPhase = ''
install -D xcwd "$out/bin/xcwd"
diff --git a/nixpkgs/pkgs/tools/X11/xdotool/default.nix b/nixpkgs/pkgs/tools/X11/xdotool/default.nix
index d20714befba..6fa185dfeab 100644
--- a/nixpkgs/pkgs/tools/X11/xdotool/default.nix
+++ b/nixpkgs/pkgs/tools/X11/xdotool/default.nix
@@ -16,7 +16,7 @@ stdenv.mkDerivation rec {
mkdir -p $out/lib
'';
- makeFlags = "PREFIX=$(out)";
+ makeFlags = [ "PREFIX=$(out)" ];
meta = {
homepage = https://www.semicomplete.com/projects/xdotool/;
diff --git a/nixpkgs/pkgs/tools/X11/xnee/default.nix b/nixpkgs/pkgs/tools/X11/xnee/default.nix
index 58569dcd59c..f8f48ea4cdb 100644
--- a/nixpkgs/pkgs/tools/X11/xnee/default.nix
+++ b/nixpkgs/pkgs/tools/X11/xnee/default.nix
@@ -29,7 +29,7 @@ stdenv.mkDerivation rec {
# `cnee' is linked without `-lXi' and as a consequence has a RUNPATH that
# lacks libXi.
- makeFlags = "LDFLAGS=-lXi";
+ makeFlags = [ "LDFLAGS=-lXi" ];
# XXX: Actually tests require an X server.
doCheck = true;
@@ -49,7 +49,7 @@ stdenv.mkDerivation rec {
homepage = https://www.gnu.org/software/xnee/;
- maintainers = with stdenv.lib.maintainers; [ fuuzetsu ];
+ maintainers = with stdenv.lib.maintainers; [ ];
platforms = stdenv.lib.platforms.gnu ++ stdenv.lib.platforms.linux; # arbitrary choice
};
}
diff --git a/nixpkgs/pkgs/tools/X11/xpointerbarrier/default.nix b/nixpkgs/pkgs/tools/X11/xpointerbarrier/default.nix
index dfac2cf88a5..4dbe31df03c 100644
--- a/nixpkgs/pkgs/tools/X11/xpointerbarrier/default.nix
+++ b/nixpkgs/pkgs/tools/X11/xpointerbarrier/default.nix
@@ -10,7 +10,7 @@ stdenv.mkDerivation rec {
buildInputs = [ xorg.libX11 xorg.libXfixes xorg.libXrandr ];
- makeFlags = "prefix=$(out)";
+ makeFlags = [ "prefix=$(out)" ];
meta = {
homepage = https://uninformativ.de/git/xpointerbarrier;
diff --git a/nixpkgs/pkgs/tools/X11/xpra/default.nix b/nixpkgs/pkgs/tools/X11/xpra/default.nix
index ffede7d58b2..da7bfb445a9 100644
--- a/nixpkgs/pkgs/tools/X11/xpra/default.nix
+++ b/nixpkgs/pkgs/tools/X11/xpra/default.nix
@@ -60,10 +60,8 @@ in buildPythonApplication rec {
ipaddress idna
];
- NIX_CFLAGS_COMPILE = [
# error: 'import_cairo' defined but not used
- "-Wno-error=unused-function"
- ];
+ NIX_CFLAGS_COMPILE = "-Wno-error=unused-function";
setupPyBuildFlags = [
"--with-Xdummy"
diff --git a/nixpkgs/pkgs/tools/X11/xsecurelock/default.nix b/nixpkgs/pkgs/tools/X11/xsecurelock/default.nix
index 6e6aa1fb60e..8349953f4ff 100644
--- a/nixpkgs/pkgs/tools/X11/xsecurelock/default.nix
+++ b/nixpkgs/pkgs/tools/X11/xsecurelock/default.nix
@@ -4,13 +4,13 @@
stdenv.mkDerivation rec {
pname = "xsecurelock";
- version = "1.5.1";
+ version = "1.6.0";
src = fetchFromGitHub {
owner = "google";
repo = "xsecurelock";
rev = "v${version}";
- sha256 = "1if8byaby18ydkrk4k5yy8n0981x1dfqikq59gfpb7c2rv0vgi7i";
+ sha256 = "0zdwszscdw0p7kwpqqv1dywn00bq1wak2x602lb6hdmkffspi8bg";
};
nativeBuildInputs = [
@@ -32,11 +32,6 @@ stdenv.mkDerivation rec {
EOF
'';
- preInstall = ''
- substituteInPlace helpers/saver_blank \
- --replace 'protect xset' 'protect ${xset}/bin/xset'
- '';
-
meta = with lib; {
description = "X11 screen lock utility with security in mind";
homepage = https://github.com/google/xsecurelock;
diff --git a/nixpkgs/pkgs/tools/X11/xzoom/default.nix b/nixpkgs/pkgs/tools/X11/xzoom/default.nix
index 31f2c014557..ed7828f37e2 100644
--- a/nixpkgs/pkgs/tools/X11/xzoom/default.nix
+++ b/nixpkgs/pkgs/tools/X11/xzoom/default.nix
@@ -26,7 +26,7 @@ stdenv.mkDerivation rec {
"BINDIR=$(out)/bin"
"MANPATH=$(out)/share/man"
];
- installTargets = "install install.man";
+ installTargets = [ "install" "install.man" ];
meta = {
inherit version;
diff --git a/nixpkgs/pkgs/tools/admin/ansible/default.nix b/nixpkgs/pkgs/tools/admin/ansible/default.nix
index eaba5225150..5b724fb0bf9 100644
--- a/nixpkgs/pkgs/tools/admin/ansible/default.nix
+++ b/nixpkgs/pkgs/tools/admin/ansible/default.nix
@@ -7,21 +7,21 @@
ansible_2_7 = with python3Packages; toPythonApplication (ansible.overridePythonAttrs(old: rec {
pname = "ansible";
- version = "2.7.11";
+ version = "2.7.15";
src = fetchurl {
url = "https://releases.ansible.com/ansible/${pname}-${version}.tar.gz";
- sha256 = "0zipzm9al6k74h88b6zkddpcbxqs4cms7lidid6wn1vx3d3dxrp7";
+ sha256 = "1kjqr35c11njyi3f2rjab6821bhqcrdykv4285q76gwv0qynigwr";
};
}));
ansible_2_6 = with python3Packages; toPythonApplication (ansible.overridePythonAttrs(old: rec {
pname = "ansible";
- version = "2.6.17";
+ version = "2.6.20";
src = fetchurl {
url = "https://releases.ansible.com/ansible/${pname}-${version}.tar.gz";
- sha256 = "0ixr3g1nb02xblqyk87bzag8sj8phy37m24xflabfl1k2zfh0313";
+ sha256 = "02ra9q2mifyawn0719y78wrbqzik73aymlzwi90fq71jgyfvkkqn";
};
}));
}
diff --git a/nixpkgs/pkgs/tools/admin/aws_shell/default.nix b/nixpkgs/pkgs/tools/admin/aws_shell/default.nix
index 95f1df39576..b9169691808 100644
--- a/nixpkgs/pkgs/tools/admin/aws_shell/default.nix
+++ b/nixpkgs/pkgs/tools/admin/aws_shell/default.nix
@@ -23,6 +23,11 @@ buildPythonPackage rec {
pyyaml
];
+ postPatch = ''
+ substituteInPlace setup.py \
+ --replace "prompt-toolkit>=1.0.0,<1.1.0" "prompt-toolkit"
+ '';
+
#Checks are failing due to missing TTY, which won't exist.
doCheck = false;
preCheck = ''
diff --git a/nixpkgs/pkgs/tools/admin/awscli/default.nix b/nixpkgs/pkgs/tools/admin/awscli/default.nix
index 02a27b0fe48..f38d4cd1a1d 100644
--- a/nixpkgs/pkgs/tools/admin/awscli/default.nix
+++ b/nixpkgs/pkgs/tools/admin/awscli/default.nix
@@ -2,7 +2,6 @@
, python3
, groff
, less
-, fetchpatch
}:
let
@@ -15,7 +14,23 @@ let
sha256 = "25df4e10c263fb88b5ace923dd84bf9aa7f5019687b5e55382ffcdb8bede9db5";
};
});
- prompt_toolkit = self.callPackage ../../../development/python-modules/prompt_toolkit/1.nix { };
+
+ pyyaml = super.pyyaml.overridePythonAttrs (oldAttrs: rec {
+ version = "5.1.2";
+ src = oldAttrs.src.override {
+ inherit version;
+ sha256 = "1r5faspz73477hlbjgilw05xsms0glmsa371yqdd26znqsvg1b81";
+ };
+ });
+
+ colorama = super.colorama.overridePythonAttrs (oldAttrs: rec {
+ version = "0.4.1";
+ src = oldAttrs.src.override {
+ inherit version;
+ sha256 = "0ba247bx5pc60hcpbf3rjsqk0whilg241i9qdfnlcwij5qgdgvh5";
+ };
+ });
+
};
};
diff --git a/nixpkgs/pkgs/tools/admin/awsweeper/default.nix b/nixpkgs/pkgs/tools/admin/awsweeper/default.nix
new file mode 100644
index 00000000000..91ef7ee022e
--- /dev/null
+++ b/nixpkgs/pkgs/tools/admin/awsweeper/default.nix
@@ -0,0 +1,22 @@
+{ lib, buildGoModule, fetchFromGitHub }:
+
+buildGoModule rec {
+ pname = "awsweeper";
+ version = "0.4.1";
+
+ src = fetchFromGitHub {
+ owner = "cloudetc";
+ repo = pname;
+ rev = "v${version}";
+ sha256 = "0if2sfxd28m832zyiy40grwa4may45zq20h35yxf8bq0wxvp0q3f";
+ };
+
+ modSha256 = "0nzc8ib2c3wlwk97qq45kgpnval69v8nbxhkfabcx0idipx3pbvk";
+
+ meta = with lib; {
+ description = "A tool to clean out your AWS account";
+ homepage = "https://github.com/cloudetc/awsweeper/";
+ license = licenses.mpl20;
+ maintainers = [ maintainers.marsam ];
+ };
+}
diff --git a/nixpkgs/pkgs/tools/admin/azure-cli/default.nix b/nixpkgs/pkgs/tools/admin/azure-cli/default.nix
index 3a80b4752c2..1a492c41aee 100644
--- a/nixpkgs/pkgs/tools/admin/azure-cli/default.nix
+++ b/nixpkgs/pkgs/tools/admin/azure-cli/default.nix
@@ -1,16 +1,16 @@
-{ lib, python, fetchFromGitHub, installShellFiles }:
+{ stdenv, lib, python, fetchFromGitHub, installShellFiles }:
let
- version = "2.0.76";
+ version = "2.0.79";
src = fetchFromGitHub {
owner = "Azure";
repo = "azure-cli";
rev = "azure-cli-${version}";
- sha256 = "0zfy8nhw4nx0idh94qidr06vsfxgdk2ky0ih76s27121pdwr05aa";
+ sha256 = "0fzpq5fnqxkjghsjk4hi3jng5lgywpvj3fzb5sb7nb7ymvkvhad2";
};
# put packages that needs to be overriden in the py package scope
- py = import ./python-packages.nix { inherit python lib src version; };
+ py = import ./python-packages.nix { inherit stdenv python lib src version; };
in
py.pkgs.toPythonApplication (py.pkgs.buildAzureCliPackage {
pname = "azure-cli";
@@ -45,6 +45,7 @@ py.pkgs.toPythonApplication (py.pkgs.buildAzureCliPackage {
azure-functions-devops-build
azure-graphrbac
azure-keyvault
+ azure-loganalytics
azure-mgmt-advisor
azure-mgmt-apimanagement
azure-mgmt-applicationinsights
@@ -173,6 +174,7 @@ py.pkgs.toPythonApplication (py.pkgs.buildAzureCliPackage {
"azure_functions_devops_build"
"azure.graphrbac"
"azure.keyvault"
+ "azure.loganalytics"
"azure.mgmt.advisor"
"azure.mgmt.apimanagement"
"azure.mgmt.applicationinsights"
diff --git a/nixpkgs/pkgs/tools/admin/azure-cli/python-packages.nix b/nixpkgs/pkgs/tools/admin/azure-cli/python-packages.nix
index 06886ba4c79..ac0e633cb96 100644
--- a/nixpkgs/pkgs/tools/admin/azure-cli/python-packages.nix
+++ b/nixpkgs/pkgs/tools/admin/azure-cli/python-packages.nix
@@ -1,4 +1,4 @@
-{ python, lib, src, version }:
+{ stdenv, python, lib, src, version }:
let
buildAzureCliPackage = with py.pkgs; attrs: buildPythonPackage (attrs // {
@@ -53,31 +53,37 @@ let
propagatedBuildInputs = with self; [
adal
argcomplete
+ azure-common
azure-cli-telemetry
+ azure-mgmt-resource
colorama
- jmespath
humanfriendly
+ jmespath
knack
msrest
msrestazure
paramiko
+ psutil
pygments
pyjwt
pyopenssl
+ pyperclip
pyyaml
requests
six
- azure-mgmt-resource
tabulate
- pyperclip
- psutil
]
++ lib.optionals isPy3k [ antlr4-python3-runtime ]
++ lib.optionals (!isPy3k) [ enum34 futures antlr4-python2-runtime ndg-httpsclient ];
+ doCheck = stdenv.isLinux;
# ignore test that does network call
checkPhase = ''
- HOME=$TMPDIR pytest --ignore=azure/cli/core/tests/test_profile.py
+ rm azure/{,cli/}__init__.py
+ python -c 'import azure.common; print(azure.common)'
+ PYTHONPATH=$PWD:$PYTHONPATH HOME=$TMPDIR pytest \
+ --ignore=azure/cli/core/tests/test_profile.py \
+ --ignore=azure/cli/core/tests/test_generic_update.py
'';
pythonImportsCheck = [
@@ -105,32 +111,41 @@ let
'';
};
- azure-mgmt-resource = overrideAzureMgmtPackage super.azure-mgmt-resource "4.0.0" "zip"
- "0gy89bi89ikg5hps8rvnq28r33lixci3sk2m86jvziv9fh9rz41b";
+ azure-mgmt-recoveryservicesbackup = overrideAzureMgmtPackage super.azure-mgmt-recoveryservicesbackup "0.5.0" "zip"
+ "0jhq8fi3dn2cncyv2rrgr4kldd254f30zgwf6p85rdgvg2p9k4hl";
- azure-mgmt-compute = overrideAzureMgmtPackage super.azure-mgmt-compute "8.0.0" "zip"
- "06hmf9iq2yqpmmvw7pr9zm4v427q03i436lnin3aczizfndrk76i";
+ azure-mgmt-resource = overrideAzureMgmtPackage super.azure-mgmt-resource "6.0.0" "zip"
+ "08n6r6ja7p20qlhb9pp51nwwxz2mal19an98zry276i8z5x8ckp0";
+
+ azure-mgmt-compute = overrideAzureMgmtPackage super.azure-mgmt-compute "10.0.0" "zip"
+ "1s3bx6knxw5dxycp43yimvgrh0i19drzd09asglcwz2x5mr3bpyg";
azure-mgmt-consumption = overrideAzureMgmtPackage super.azure-mgmt-consumption "2.0.0" "zip"
"12ai4qps73ivawh0yzvgb148ksx02r30pqlvfihx497j62gsi1cs";
- azure-mgmt-containerservice = overrideAzureMgmtPackage super.azure-mgmt-containerservice "7.0.0" "zip"
- "104w7rxv7hy84yzddbbpkjqha04ghr0zz9qy788n3wl69cj4cv1a";
+ azure-mgmt-containerservice = overrideAzureMgmtPackage super.azure-mgmt-containerservice "8.0.0" "zip"
+ "0akpm12xj453dp84dfdpi06phr4q0hknr5l7bz96zbc8iand78wg";
+
+ azure-mgmt-cosmosdb = overrideAzureMgmtPackage super.azure-mgmt-cosmosdb "0.11.0" "zip"
+ "05j0s2ng6ck35lw85cbjf5cm6canc71c41aagr68cmiqj1li6v1z";
- azure-mgmt-cosmosdb = overrideAzureMgmtPackage super.azure-mgmt-cosmosdb "0.8.0" "zip"
- "0iakxb2rr1w9171802m9syjzqas02vjah711mpagbgcj549mjysb";
+ azure-mgmt-imagebuilder = overrideAzureMgmtPackage super.azure-mgmt-imagebuilder "0.2.1" "zip"
+ "0mwlvy4x5nr3hsz7wdpdhpzwarzzwz4225bfpd68hr0pcjgzspky";
azure-mgmt-iothub = overrideAzureMgmtPackage super.azure-mgmt-iothub "0.8.2" "zip"
"0w3w1d156rnkwjdarv3qvycklxr3z2j7lry7a3jfgj3ykzny12rq";
+ azure-mgmt-iotcentral = overrideAzureMgmtPackage super.azure-mgmt-iotcentral "1.0.0" "zip"
+ "1s1x0pzynz0sd0l4k1kvkph9i1y03y9qd6afbw0nafcr3znqib4s";
+
azure-mgmt-kusto = overrideAzureMgmtPackage super.azure-mgmt-kusto "0.3.0" "zip"
"1pmcdgimd66h964a3d5m2j2fbydshcwhrk87wblhwhfl3xwbgf4y";
azure-mgmt-devtestlabs = overrideAzureMgmtPackage super.azure-mgmt-devtestlabs "2.2.0" "zip"
"15lpyv9z8ss47rjmg1wx5akh22p9br2vckaj7jk3639vi38ac5nl";
- azure-mgmt-netapp = overrideAzureMgmtPackage super.azure-mgmt-netapp "0.6.0" "zip"
- "10ymvyj386z9bjdm2g1b5a4vfnn87ig2zm6xn2xddvbpy0jxnyfv";
+ azure-mgmt-netapp = overrideAzureMgmtPackage super.azure-mgmt-netapp "0.7.0" "zip"
+ "0cf4pknb5y2yz4jqwg7xm626zkfx8i8hqcr3dkvq21lrx7fz96r3";
azure-mgmt-dns = overrideAzureMgmtPackage super.azure-mgmt-dns "2.1.0" "zip"
"1l55py4fzzwhxlmnwa41gpmqk9v2ncc79w7zq11sm9a5ynrv2c1p";
@@ -138,18 +153,30 @@ let
azure-mgmt-network = overrideAzureMgmtPackage super.azure-mgmt-network "7.0.0" "zip"
"0ss5yc9k3dh78lb88nfh3z98yz1pcd8d7d7cfjlxmv4n3dlr1kij";
+ azure-mgmt-media = overrideAzureMgmtPackage super.azure-mgmt-media "1.1.1" "zip"
+ "16wk0ksycrscsn3n14qk4vvf7i567vq6f96lwf5dwbc81wx6n32x";
+
azure-mgmt-msi = overrideAzureMgmtPackage super.azure-mgmt-msi "0.2.0" "zip"
"0rvik03njz940x2hvqg6iiq8k0d88gyygsr86w8s0sa12sdbq8l6";
azure-mgmt-web = overrideAzureMgmtPackage super.azure-mgmt-web "0.42.0" "zip"
"0vp40i9aaw5ycz7s7qqir6jq7327f7zg9j9i8g31qkfl1h1c7pdn";
- azure-mgmt-reservations = overrideAzureMgmtPackage super.azure-mgmt-reservations "0.3.2" "zip"
- "0nksxjh5kh09dr0zw667fg8mzik4ymvfq3dipwag6pynbqr9ls4l";
+ azure-mgmt-redis = overrideAzureMgmtPackage super.azure-mgmt-redis "7.0.0rc1" "zip"
+ "086wk31wsl8dx14qpd0g1bly8i9a8fix007djlj9cybva2f2bk6k";
+
+ azure-mgmt-reservations = overrideAzureMgmtPackage super.azure-mgmt-reservations "0.6.0" "zip"
+ "16ycni3cjl9c0mv419gy5rgbrlg8zp0vnr6aj8z8p2ypdw6sgac3";
azure-mgmt-security = overrideAzureMgmtPackage super.azure-mgmt-security "0.1.0" "zip"
"1cb466722bs0ribrirb32kc299716pl0pwivz3jyn40dd78cwhhx";
+ azure-mgmt-sql = overrideAzureMgmtPackage super.azure-mgmt-sql "0.15.0" "zip"
+ "0qv58xraznv2ldhd34cvznhz045x3ncfgam9c12gxyj4q0k3pyc9";
+
+ azure-mgmt-sqlvirtualmachine = overrideAzureMgmtPackage super.azure-mgmt-sqlvirtualmachine "0.5.0" "zip"
+ "1b9am8raa17hxnz7d5pk2ix0309wsnhnchq1mi22icd728sl5adm";
+
azure-mgmt-datamigration = overrideAzureMgmtPackage super.azure-mgmt-datamigration "0.1.0" "zip"
"1pq5rn32yvrf5kqjafnj0kc92gpfg435w2l0k7cm8gvlja4r4m77";
@@ -162,11 +189,14 @@ let
azure-mgmt-keyvault = overrideAzureMgmtPackage super.azure-mgmt-keyvault "1.1.0" "zip"
"16a0d3j5dilbp7pd7gbwf8jr46vzbjim1p9alcmisi12m4km7885";
+ azure-mgmt-cdn = overrideAzureMgmtPackage super.azure-mgmt-cdn "3.1.0" "zip"
+ "1qvnksmvsg8cw1ac6vbdxjdqsm7s1sak27k8xy24hm7c9a8y1nqc";
+
azure-mgmt-containerregistry = overrideAzureMgmtPackage super.azure-mgmt-containerregistry "3.0.0rc7" "zip"
"1bzfpbz186dhnxn0blgr20xxnk67gkr8ysn2b3f1r41bq9hz97xp";
- azure-mgmt-monitor = overrideAzureMgmtPackage super.azure-mgmt-monitor "0.5.2" "zip"
- "1r01aq5rbynbc1my4qljdifjdj9h65bh8cdzgd7vm4ij7r48v9gi";
+ azure-mgmt-monitor = overrideAzureMgmtPackage super.azure-mgmt-monitor "0.7.0" "zip"
+ "1pprvk5255b6brbw73g0g13zygwa7a2px5x08wy3153rqlzan5l2";
azure-mgmt-advisor = overrideAzureMgmtPackage super.azure-mgmt-advisor "2.0.1" "zip"
"1wsfkprdrn22mwm24y2zlcms8ppp7jwq3s86r3ymbl29pbaxca8r";
@@ -177,14 +207,14 @@ let
azure-mgmt-authorization = overrideAzureMgmtPackage super.azure-mgmt-authorization "0.52.0" "zip"
"0357laxgldb7lvvws81r8xb6mrq9dwwnr1bnwdnyj4bw6p21i9hn";
- azure-mgmt-storage = overrideAzureMgmtPackage super.azure-mgmt-storage "5.0.0" "zip"
- "1gzsscfnnfb8gxs34dq9hs339hidlzas7kgivw0234v3qz4gy9yx";
+ azure-mgmt-storage = overrideAzureMgmtPackage super.azure-mgmt-storage "7.0.0" "zip"
+ "01f17fb1myskj72zarc67i1sxfvk66lid9zn12gwjrz2vqc6npkz";
azure-mgmt-servicefabric = overrideAzureMgmtPackage super.azure-mgmt-servicefabric "0.2.0" "zip"
"1bcq6fcgrsvmk6q7v8mxzn1180jm2qijdqkqbv1m117zp1wj5gxj";
- azure-mgmt-hdinsight = overrideAzureMgmtPackage super.azure-mgmt-hdinsight "1.1.0" "zip"
- "0lj9dhb14dx4ag5pgd2zvrmn9y5ziq2qywvw38ccbv9g3bxpglkn";
+ azure-mgmt-hdinsight = overrideAzureMgmtPackage super.azure-mgmt-hdinsight "1.3.0" "zip"
+ "1r7isr7hzq2dv1idwwa9xxxgk8wh0ncka45r4rdcsl1p7kd2kqam";
azure-graphrbac = super.azure-graphrbac.overrideAttrs(oldAttrs: rec {
version = "0.60.0";
@@ -215,6 +245,24 @@ let
};
});
+ azure-keyvault = super.azure-keyvault.overrideAttrs(oldAttrs: rec {
+ version = "1.1.0";
+ src = super.fetchPypi {
+ inherit (oldAttrs) pname;
+ inherit version;
+ extension = "zip";
+ sha256 = "0jfxm8lx8dzs3v2b04ljizk8gfckbm5l2v86rm7k0npbfvryba1p";
+ };
+
+ propagatedBuildInputs = with self; [
+ azure-common azure-nspkg msrest msrestazure cryptography
+ ];
+ postInstall = ''
+ rm -f $out/${self.python.sitePackages}/azure/__init__.py
+ '';
+ pythonImportsCheck = [ ];
+ });
+
# part of azure.mgmt.datalake namespace
azure-mgmt-datalake-analytics = super.azure-mgmt-datalake-analytics.overrideAttrs(oldAttrs: rec {
version = "0.2.1";
@@ -233,17 +281,6 @@ let
'';
});
-
-
-
-
-
-
-
-
-
-
-
};
};
in
diff --git a/nixpkgs/pkgs/tools/admin/berglas/default.nix b/nixpkgs/pkgs/tools/admin/berglas/default.nix
index d75c317187b..aaca67baa16 100644
--- a/nixpkgs/pkgs/tools/admin/berglas/default.nix
+++ b/nixpkgs/pkgs/tools/admin/berglas/default.nix
@@ -3,16 +3,16 @@
buildGoModule rec {
name = "berglas-${version}";
- version = "0.2.1";
+ version = "0.5.0";
src = fetchFromGitHub {
owner = "GoogleCloudPlatform";
repo = "berglas";
- rev = "v0.2.1";
- sha256 = "1m34rxiynmgsris1avjn7am50b8sds77515zlnna9qvsrywbzljc";
+ rev = "v0.5.0";
+ sha256 = "1y5w2czipwj069w4zxnyb9xqv5mx0yjjramykf3vm3q478bk3rm7";
};
- modSha256 = "0lfcrsb4r5hxxd652cxff23fnbrphp3lgwp5anpaddzcjcd2qyj8";
+ modSha256 = "0y4ajii3pv25s4gjazf6fl0b9wax17cmwhbmiybqhp61annca7kr";
meta = with stdenv.lib; {
description = "A tool for managing secrets on Google Cloud";
diff --git a/nixpkgs/pkgs/tools/admin/bubblewrap/default.nix b/nixpkgs/pkgs/tools/admin/bubblewrap/default.nix
index e4b27d98dff..8e2ef7c87e1 100644
--- a/nixpkgs/pkgs/tools/admin/bubblewrap/default.nix
+++ b/nixpkgs/pkgs/tools/admin/bubblewrap/default.nix
@@ -2,11 +2,11 @@
stdenv.mkDerivation rec {
pname = "bubblewrap";
- version = "0.3.3";
+ version = "0.4.0";
src = fetchurl {
url = "https://github.com/projectatomic/bubblewrap/releases/download/v${version}/${pname}-${version}.tar.xz";
- sha256 = "1zsd6rxryg97dkkhibr0fvq16x3s75qj84rvhdv8p42ag58mz966";
+ sha256 = "08r0f4c3fjkb4zjrb4kkax1zfcgcgic702vb62sjjw5xfhppvzp5";
};
nativeBuildInputs = [ libcap libxslt docbook_xsl ];
diff --git a/nixpkgs/pkgs/tools/admin/certbot/0001-Don-t-use-distutils.StrictVersion-that-cannot-handle.patch b/nixpkgs/pkgs/tools/admin/certbot/0001-Don-t-use-distutils.StrictVersion-that-cannot-handle.patch
index 81c1dd0e6a3..62351a70160 100644
--- a/nixpkgs/pkgs/tools/admin/certbot/0001-Don-t-use-distutils.StrictVersion-that-cannot-handle.patch
+++ b/nixpkgs/pkgs/tools/admin/certbot/0001-Don-t-use-distutils.StrictVersion-that-cannot-handle.patch
@@ -1,6 +1,6 @@
-From 411b8a413baf39e9b967949b17a992e81a11abfe Mon Sep 17 00:00:00 2001
+From 0de195de31dc311976af52a7c2b547bc23af2691 Mon Sep 17 00:00:00 2001
From: Frederik Rietdijk <fridh@fridh.nl>
-Date: Tue, 29 Oct 2019 14:08:07 +0100
+Date: Sat, 14 Dec 2019 19:27:14 +0100
Subject: [PATCH] Don't use distutils.StrictVersion that cannot handle certain
versions
@@ -18,13 +18,13 @@ line 137, in parse
ValueError: invalid version number '41.4.0.post20191022'
```
---
- setup.py | 15 +--------------
+ certbot/setup.py | 15 +--------------
1 file changed, 1 insertion(+), 14 deletions(-)
-diff --git a/setup.py b/setup.py
-index 1f4838c90..831528d77 100644
---- a/setup.py
-+++ b/setup.py
+diff --git a/certbot/setup.py b/certbot/setup.py
+index c1bf914..7456bf2 100644
+--- a/certbot/setup.py
++++ b/certbot/setup.py
@@ -3,7 +3,6 @@ import os
import re
import sys
@@ -40,7 +40,7 @@ index 1f4838c90..831528d77 100644
-# However environment markers are supported only with setuptools >= 36.2.
-# So this dependency is not added for old Linux distributions with old setuptools,
-# in order to allow these systems to build certbot from sources.
- pywin32_req = 'pywin32>=224'
+ pywin32_req = 'pywin32>=227' # do not forget to edit pywin32 dependency accordingly in windows-installer/construct.py
-if StrictVersion(setuptools_version) >= StrictVersion('36.2'):
- install_requires.append(pywin32_req + " ; sys_platform == 'win32'")
-elif 'bdist_wheel' in sys.argv[1:]:
@@ -56,5 +56,5 @@ index 1f4838c90..831528d77 100644
dev_extras = [
'astroid==1.6.5',
--
-2.23.0
+2.24.1
diff --git a/nixpkgs/pkgs/tools/admin/certbot/0001-pebble_artifacts-hardcode-pebble-location.patch b/nixpkgs/pkgs/tools/admin/certbot/0001-pebble_artifacts-hardcode-pebble-location.patch
deleted file mode 100644
index 33f0cd216c1..00000000000
--- a/nixpkgs/pkgs/tools/admin/certbot/0001-pebble_artifacts-hardcode-pebble-location.patch
+++ /dev/null
@@ -1,24 +0,0 @@
-From 8ddf2697508eca514a0dde4646ad14ac3ba34b2a Mon Sep 17 00:00:00 2001
-From: Florian Klink <flokli@flokli.de>
-Date: Fri, 18 Oct 2019 16:06:50 +0200
-Subject: [PATCH] pebble_artifacts: hardcode pebble location
-
----
- certbot-ci/certbot_integration_tests/utils/pebble_artifacts.py | 1 +
- 1 file changed, 1 insertion(+)
-
-diff --git a/certbot-ci/certbot_integration_tests/utils/pebble_artifacts.py b/certbot-ci/certbot_integration_tests/utils/pebble_artifacts.py
-index 2b1557928..d2603c51a 100644
---- a/certbot-ci/certbot_integration_tests/utils/pebble_artifacts.py
-+++ b/certbot-ci/certbot_integration_tests/utils/pebble_artifacts.py
-@@ -22,6 +22,7 @@ def fetch(workspace):
-
-
- def _fetch_asset(asset, suffix):
-+ return "@pebble@"
- asset_path = os.path.join(ASSETS_PATH, '{0}_{1}_{2}'.format(asset, PEBBLE_VERSION, suffix))
- if not os.path.exists(asset_path):
- asset_url = ('https://github.com/letsencrypt/pebble/releases/download/{0}/{1}_{2}'
---
-2.23.0
-
diff --git a/nixpkgs/pkgs/tools/admin/certbot/default.nix b/nixpkgs/pkgs/tools/admin/certbot/default.nix
index 7d3d019e81f..8fdbfd12778 100644
--- a/nixpkgs/pkgs/tools/admin/certbot/default.nix
+++ b/nixpkgs/pkgs/tools/admin/certbot/default.nix
@@ -1,19 +1,18 @@
-{ stdenv, python37Packages, fetchFromGitHub, fetchurl, dialog, autoPatchelfHook, nginx, pebble }:
+{ stdenv, python37Packages, fetchFromGitHub, fetchurl, dialog, autoPatchelfHook }:
python37Packages.buildPythonApplication rec {
pname = "certbot";
- version = "0.39.0";
+ version = "1.0.0";
src = fetchFromGitHub {
owner = pname;
repo = pname;
rev = "v${version}";
- sha256 = "1s32xg2ljz7ci78wc8rqkjvgrz7vprb7fkznrlf9a4blm55pp54c";
+ sha256 = "180x7gcpfbrzw8k654s7b5nxdy2yg61lq513dykyn3wz4gssw465";
};
patches = [
- ./0001-pebble_artifacts-hardcode-pebble-location.patch
./0001-Don-t-use-distutils.StrictVersion-that-cannot-handle.patch
];
@@ -43,9 +42,8 @@ python37Packages.buildPythonApplication rec {
];
postPatch = ''
- substituteInPlace certbot/notify.py --replace "/usr/sbin/sendmail" "/run/wrappers/bin/sendmail"
- substituteInPlace certbot/util.py --replace "sw_vers" "/usr/bin/sw_vers"
- substituteInPlace certbot-ci/certbot_integration_tests/utils/pebble_artifacts.py --replace "@pebble@" "${pebble}/bin/pebble"
+ cd certbot
+ substituteInPlace certbot/_internal/notify.py --replace "/usr/sbin/sendmail" "/run/wrappers/bin/sendmail"
'';
postInstall = ''
@@ -55,15 +53,7 @@ python37Packages.buildPythonApplication rec {
done
'';
- # tests currently time out, because they're trying to do network access
- # Upstream issue: https://github.com/certbot/certbot/issues/7450
- doCheck = false;
-
- checkPhase = ''
- PATH="$out/bin:${nginx}/bin:$PATH" pytest certbot-ci/certbot_integration_tests
- '';
-
- dontUseSetuptoolsCheck = true;
+ doCheck = true;
meta = with stdenv.lib; {
homepage = src.meta.homepage;
diff --git a/nixpkgs/pkgs/tools/admin/clair/default.nix b/nixpkgs/pkgs/tools/admin/clair/default.nix
index 25c14712094..3f4d00736ad 100644
--- a/nixpkgs/pkgs/tools/admin/clair/default.nix
+++ b/nixpkgs/pkgs/tools/admin/clair/default.nix
@@ -1,28 +1,28 @@
-{ lib, buildGoPackage, fetchFromGitHub, makeWrapper, rpm, xz }:
+{ lib, buildGoModule, fetchFromGitHub, makeWrapper, rpm, xz }:
-buildGoPackage rec {
+buildGoModule rec {
pname = "clair";
- version = "2.0.9";
-
- goPackagePath = "github.com/coreos/clair";
+ version = "2.1.2";
src = fetchFromGitHub {
- owner = "coreos";
+ owner = "quay";
repo = pname;
rev = "v${version}";
- sha256 = "1lcrqka4daqqjagx2mbfzg3z8wxg669mw1lb450nrlc33ji2iwdm";
+ sha256 = "14dh9iv2g138rivvfk135m3l90kk6c1ln1iqxhbi7s99h1jixbqw";
};
+ modSha256 = "0rgkrid58kji39nlmiii95r8shbzr6dwalj5m7qwxy5w1rcaljr5";
+
nativeBuildInputs = [ makeWrapper ];
postInstall = ''
- wrapProgram $bin/bin/clair \
+ wrapProgram $out/bin/clair \
--prefix PATH : "${lib.makeBinPath [ rpm xz ]}"
'';
meta = with lib; {
description = "Vulnerability Static Analysis for Containers";
- homepage = "https://github.com/coreos/clair";
+ homepage = "https://github.com/quay/clair";
license = licenses.asl20;
maintainers = with maintainers; [ marsam ];
};
diff --git a/nixpkgs/pkgs/tools/admin/docker-credential-helpers/default.nix b/nixpkgs/pkgs/tools/admin/docker-credential-helpers/default.nix
new file mode 100644
index 00000000000..1f4315afc40
--- /dev/null
+++ b/nixpkgs/pkgs/tools/admin/docker-credential-helpers/default.nix
@@ -0,0 +1,49 @@
+{ stdenv, buildGoPackage, fetchFromGitHub, pkg-config, libsecret }:
+
+buildGoPackage rec {
+ pname = "docker-credential-helpers";
+ version = "0.6.3";
+
+ goPackagePath = "github.com/docker/docker-credential-helpers";
+
+ src = fetchFromGitHub {
+ owner = "docker";
+ repo = pname;
+ rev = "v${version}";
+ sha256 = "0xgmwjva3j1s0cqkbajbamj13bgzh5jkf2ir54m9a7w8gjnsh6dx";
+ };
+
+ nativeBuildInputs = stdenv.lib.optionals stdenv.isLinux [ pkg-config ];
+
+ buildInputs = stdenv.lib.optionals stdenv.isLinux [ libsecret ];
+
+ buildPhase =
+ if stdenv.isDarwin
+ then ''
+ cd go/src/${goPackagePath}
+ go build -ldflags -s -o bin/docker-credential-osxkeychain osxkeychain/cmd/main_darwin.go
+ ''
+ else ''
+ cd go/src/${goPackagePath}
+ go build -o bin/docker-credential-secretservice secretservice/cmd/main_linux.go
+ go build -o bin/docker-credential-pass pass/cmd/main_linux.go
+ '';
+
+ installPhase =
+ if stdenv.isDarwin
+ then ''
+ install -Dm755 -t $bin/bin bin/docker-credential-osxkeychain
+ ''
+ else ''
+ install -Dm755 -t $bin/bin bin/docker-credential-pass
+ install -Dm755 -t $bin/bin bin/docker-credential-secretservice
+ '';
+
+ meta = with stdenv.lib; {
+ description = "Suite of programs to use native stores to keep Docker credentials safe";
+ homepage = "https://github.com/docker/docker-credential-helpers";
+ license = licenses.mit;
+ maintainers = [ maintainers.marsam ];
+ platforms = platforms.linux ++ platforms.darwin;
+ };
+}
diff --git a/nixpkgs/pkgs/tools/admin/eksctl/default.nix b/nixpkgs/pkgs/tools/admin/eksctl/default.nix
index b7208d7b867..e5fcf3933eb 100644
--- a/nixpkgs/pkgs/tools/admin/eksctl/default.nix
+++ b/nixpkgs/pkgs/tools/admin/eksctl/default.nix
@@ -2,16 +2,16 @@
buildGoModule rec {
pname = "eksctl";
- version = "0.10.2";
+ version = "0.11.1";
src = fetchFromGitHub {
owner = "weaveworks";
repo = pname;
rev = version;
- sha256 = "0j1kzll23rj87nabzjjhxydg95cnxlwbkqp3qivf96bv1xlby75k";
+ sha256 = "197lf6cb1maam1yxy29wgp4dkakaavmwqvq2d9i4qxhscalrdra5";
};
- modSha256 = "18n4aimf9diy9w7f2k08cd7xr8jay6pid5mwrc24y2pqkjhgpyp7";
+ modSha256 = "04ba3dyfwlf0m6kn7yp7qyp3h2qdwp17y1f9pa79y3c6sd2nadk2";
subPackages = [ "cmd/eksctl" ];
diff --git a/nixpkgs/pkgs/tools/admin/fastlane/default.nix b/nixpkgs/pkgs/tools/admin/fastlane/default.nix
index afb044ad583..1cdc969ea2e 100644
--- a/nixpkgs/pkgs/tools/admin/fastlane/default.nix
+++ b/nixpkgs/pkgs/tools/admin/fastlane/default.nix
@@ -6,15 +6,15 @@ stdenv.mkDerivation rec {
nativeBuildInputs = [ makeWrapper ];
- env = bundlerEnv {
- name = "${pname}-${version}-gems";
- inherit pname ruby;
- gemdir = ./.;
- };
-
phases = [ "installPhase" ];
- installPhase = ''
+ installPhase = let
+ env = bundlerEnv {
+ name = "${pname}-${version}-gems";
+ inherit pname ruby;
+ gemdir = ./.;
+ };
+ in ''
mkdir -p $out/bin
makeWrapper ${env}/bin/fastlane $out/bin/fastlane \
--set FASTLANE_SKIP_UPDATE_CHECK 1
diff --git a/nixpkgs/pkgs/tools/admin/lego/default.nix b/nixpkgs/pkgs/tools/admin/lego/default.nix
index bf4261682cf..fa7c3876a28 100644
--- a/nixpkgs/pkgs/tools/admin/lego/default.nix
+++ b/nixpkgs/pkgs/tools/admin/lego/default.nix
@@ -2,16 +2,17 @@
buildGoModule rec {
pname = "lego";
- version = "3.0.2";
+ version = "3.2.0";
src = fetchFromGitHub {
owner = "go-acme";
repo = pname;
rev = "v${version}";
- sha256 = "0q73522yblcjsyscsppwnxfw6m249zr9whb93bhv5i5z012gy6mx";
+ sha256 = "1djvwyjg30f9bj61pf3y2k2w055pj39v0sif4rjqg8cz0j382a2z";
};
- modSha256 = "00pl8l8h01rfxyd0l4487x55kfqhpm0ls84kxmgz3vph7irm6hcq";
+ modSha256 = "0k3p11cji3p4nzr8aia8hp01wyx1qfx84259dwbfwg1b32ln8rkc";
+ subPackages = [ "cmd/lego" ];
meta = with lib; {
description = "Let's Encrypt client and ACME library written in Go";
diff --git a/nixpkgs/pkgs/tools/admin/procs/default.nix b/nixpkgs/pkgs/tools/admin/procs/default.nix
index 24f8036b428..20e9c8b3d47 100644
--- a/nixpkgs/pkgs/tools/admin/procs/default.nix
+++ b/nixpkgs/pkgs/tools/admin/procs/default.nix
@@ -1,22 +1,30 @@
-{ stdenv, fetchFromGitHub, rustPlatform
+{ stdenv, fetchFromGitHub, rustPlatform, fetchpatch
, Security
}:
rustPlatform.buildRustPackage rec {
pname = "procs";
- version = "0.8.13";
+ version = "0.8.16";
src = fetchFromGitHub {
owner = "dalance";
repo = pname;
rev = "v${version}";
- sha256 = "0yy41v2crds9500fa4r0kqiddciqkilr2h13nrjqy44ckvw2mi5y";
+ sha256 = "0l4n3gr1sc7wfa21p8yh7idaii0mnfpyqp4cg7f9l4345isy94vq";
};
- cargoSha256 = "1gnl97h0l9k8xnrwl6807qlbx13vd45kmla02mk9p1h52sr0din5";
+ cargoSha256 = "03c63dlzvag341n6la1s61ccri1avlprd91m11z9zzjhi9b46kcr";
buildInputs = stdenv.lib.optional stdenv.isDarwin Security;
+ patches = [
+ # Fix tests on darwin. Remove with the next release
+ (fetchpatch {
+ url = "https://github.com/dalance/procs/commit/bb554e247b5b339bc00fa5dd2e771b0d7cb09cd5.patch";
+ sha256 = "1szvvifa4pdbgdsmdj5f0zq6qzf1lh6wwc6ipawblfzwmg7d9wvk";
+ })
+ ];
+
meta = with stdenv.lib; {
description = "A modern replacement for ps written in Rust";
homepage = "https://github.com/dalance/procs";
diff --git a/nixpkgs/pkgs/tools/admin/salt/default.nix b/nixpkgs/pkgs/tools/admin/salt/default.nix
index 13bba0860c4..c94686c93c1 100644
--- a/nixpkgs/pkgs/tools/admin/salt/default.nix
+++ b/nixpkgs/pkgs/tools/admin/salt/default.nix
@@ -24,7 +24,7 @@ pythonPackages.buildPythonApplication rec {
pyzmq
requests
tornado_4
- ] ++ stdenv.lib.optional (!pythonPackages.isPy3k) [
+ ] ++ stdenv.lib.optionals (!pythonPackages.isPy3k) [
futures
] ++ extraInputs;
diff --git a/nixpkgs/pkgs/tools/admin/simp_le/default.nix b/nixpkgs/pkgs/tools/admin/simp_le/default.nix
index 37f627a18f5..eaefba36545 100644
--- a/nixpkgs/pkgs/tools/admin/simp_le/default.nix
+++ b/nixpkgs/pkgs/tools/admin/simp_le/default.nix
@@ -2,11 +2,11 @@
python3Packages.buildPythonApplication rec {
pname = "simp_le-client";
- version = "0.16.0";
+ version = "0.17.0";
src = python3Packages.fetchPypi {
inherit pname version;
- sha256 = "17azqlb1xsnh9p0m75apb19j7pramgj00cf5k6fwzz2zqz0x0hpp";
+ sha256 = "0m1jynar4calaffp2zdxr5yy9vnhw2qf2hsfxwzfwf8fqb5h7bjb";
};
postPatch = ''
diff --git a/nixpkgs/pkgs/tools/admin/swiftclient/default.nix b/nixpkgs/pkgs/tools/admin/swiftclient/default.nix
index ae8e5cac68c..788a64f928a 100644
--- a/nixpkgs/pkgs/tools/admin/swiftclient/default.nix
+++ b/nixpkgs/pkgs/tools/admin/swiftclient/default.nix
@@ -1,4 +1,4 @@
-{ lib, buildPythonApplication, fetchPypi, requests, six, pbr }:
+{ lib, buildPythonApplication, fetchPypi, requests, six, pbr, setuptools }:
buildPythonApplication rec {
pname = "python-swiftclient";
@@ -9,7 +9,7 @@ buildPythonApplication rec {
sha256 = "0sv6z72zdwzwdjng0djk3l2maryn9pz3khf69yq5ig2ycz8hh0qv";
};
- propagatedBuildInputs = [ requests six pbr ];
+ propagatedBuildInputs = [ requests six pbr setuptools ];
# For the tests the following requirements are needed:
# https://github.com/openstack/python-swiftclient/blob/master/test-requirements.txt
diff --git a/nixpkgs/pkgs/tools/admin/tigervnc/default.nix b/nixpkgs/pkgs/tools/admin/tigervnc/default.nix
index 5a964a7fe70..1c2243d04f1 100644
--- a/nixpkgs/pkgs/tools/admin/tigervnc/default.nix
+++ b/nixpkgs/pkgs/tools/admin/tigervnc/default.nix
@@ -5,20 +5,20 @@
, cmake, gettext, libtool
, libGLU
, gnutls, pam, nettle
-, xterm, openssh
+, xterm, openssh, perl
, makeWrapper}:
with stdenv.lib;
stdenv.mkDerivation rec {
- version = "1.9.0";
+ version = "1.10.1";
pname = "tigervnc";
src = fetchFromGitHub {
owner = "TigerVNC";
repo = "tigervnc";
- rev = "v1.9.0";
- sha256 = "0b47fg3741qs3zdpl2zr0s6jz46dypp2j6gqrappbzm3ywnnmm1x";
+ rev = "v1.10.1";
+ sha256 = "001n189d2f3psn7nxgl8188ml6f7jbk26cxn2835y3mnlk5lmhgr";
};
inherit fontDirectories;
@@ -79,7 +79,7 @@ stdenv.mkDerivation rec {
buildInputs = with xorg; [
libjpeg_turbo fltk pixman
- gnutls pam nettle
+ gnutls pam nettle perl
xorgproto
utilmacros libXtst libXext libX11 libXext libICE libXi libSM libXft
libxkbfile libXfont2 libpciaccess
@@ -94,7 +94,7 @@ stdenv.mkDerivation rec {
enableParallelBuilding = true;
meta = {
- homepage = http://www.tigervnc.org/;
+ homepage = "https://tigervnc.org/";
license = stdenv.lib.licenses.gpl2Plus;
description = "Fork of tightVNC, made in cooperation with VirtualGL";
maintainers = with stdenv.lib.maintainers; [viric];
diff --git a/nixpkgs/pkgs/tools/archivers/afio/default.nix b/nixpkgs/pkgs/tools/archivers/afio/default.nix
index 13da95a28b5..8d1e28fed29 100644
--- a/nixpkgs/pkgs/tools/archivers/afio/default.nix
+++ b/nixpkgs/pkgs/tools/archivers/afio/default.nix
@@ -15,7 +15,7 @@ stdenv.mkDerivation rec {
*/
patches = [ ./0001-makefile-fix-installation.patch ];
- installFlags = "DESTDIR=$(out)";
+ installFlags = [ "DESTDIR=$(out)" ];
meta = {
homepage = http://members.chello.nl/~k.holtman/afio.html;
diff --git a/nixpkgs/pkgs/tools/archivers/sharutils/default.nix b/nixpkgs/pkgs/tools/archivers/sharutils/default.nix
index a03c9610e35..0dfd234bc75 100644
--- a/nixpkgs/pkgs/tools/archivers/sharutils/default.nix
+++ b/nixpkgs/pkgs/tools/archivers/sharutils/default.nix
@@ -62,7 +62,7 @@ stdenv.mkDerivation rec {
'';
homepage = https://www.gnu.org/software/sharutils/;
license = licenses.gpl3Plus;
- maintainers = [ maintainers.ndowens ];
+ maintainers = [];
platforms = platforms.all;
};
}
diff --git a/nixpkgs/pkgs/tools/archivers/undmg/default.nix b/nixpkgs/pkgs/tools/archivers/undmg/default.nix
index 9d072c9bb19..72be49d9792 100644
--- a/nixpkgs/pkgs/tools/archivers/undmg/default.nix
+++ b/nixpkgs/pkgs/tools/archivers/undmg/default.nix
@@ -16,7 +16,7 @@ stdenv.mkDerivation rec {
setupHook = ./setup-hook.sh;
- makeFlags = "PREFIX=$(out)";
+ makeFlags = [ "PREFIX=$(out)" ];
meta = with stdenv.lib; {
homepage = https://github.com/matthewbauer/undmg;
diff --git a/nixpkgs/pkgs/tools/archivers/unrar/default.nix b/nixpkgs/pkgs/tools/archivers/unrar/default.nix
index 4b3a2f60c4f..0fe8f2f5866 100644
--- a/nixpkgs/pkgs/tools/archivers/unrar/default.nix
+++ b/nixpkgs/pkgs/tools/archivers/unrar/default.nix
@@ -2,11 +2,11 @@
stdenv.mkDerivation rec {
pname = "unrar";
- version = "5.8.4";
+ version = "5.8.5";
src = fetchurl {
url = "https://www.rarlab.com/rar/unrarsrc-${version}.tar.gz";
- sha256 = "15igz4xkzxlf81kl9p1n447rp2zrzpi6qdwn2iimzrppgqqb4z0b";
+ sha256 = "0abvz6vv8kr416fphysfbwgxc6hyf1bpnd0aczfv7j3vc8x949d7";
};
postPatch = ''
diff --git a/nixpkgs/pkgs/tools/archivers/unzip/default.nix b/nixpkgs/pkgs/tools/archivers/unzip/default.nix
index 7bbcc906292..b8f649fbdcb 100644
--- a/nixpkgs/pkgs/tools/archivers/unzip/default.nix
+++ b/nixpkgs/pkgs/tools/archivers/unzip/default.nix
@@ -13,7 +13,7 @@ stdenv.mkDerivation {
hardeningDisable = [ "format" ];
- patchFlags = "-p1 -F3";
+ patchFlags = [ "-p1" "-F3" ];
patches = [
./CVE-2014-8139.diff
@@ -53,15 +53,21 @@ stdenv.mkDerivation {
makefile = "unix/Makefile";
- NIX_LDFLAGS = [ "-lbz2" ] ++ stdenv.lib.optional enableNLS "-lnatspec";
+ NIX_LDFLAGS = "-lbz2" + stdenv.lib.optionalString enableNLS " -lnatspec";
- buildFlags = "generic D_USE_BZ2=-DUSE_BZIP2 L_BZ2=-lbz2";
+ buildFlags = [
+ "generic"
+ "D_USE_BZ2=-DUSE_BZIP2"
+ "L_BZ2=-lbz2"
+ ];
preConfigure = ''
sed -i -e 's@CF="-O3 -Wall -I. -DASM_CRC $(LOC)"@CF="-O3 -Wall -I. -DASM_CRC -DLARGEFILE_SOURCE -D_FILE_OFFSET_BITS=64 $(LOC)"@' unix/Makefile
'';
- installFlags = "prefix=$(out)";
+ installFlags = [
+ "prefix=${placeholder ''out''}"
+ ];
setupHook = ./setup-hook.sh;
diff --git a/nixpkgs/pkgs/tools/archivers/zip/default.nix b/nixpkgs/pkgs/tools/archivers/zip/default.nix
index 20d85405bba..09ba6510707 100644
--- a/nixpkgs/pkgs/tools/archivers/zip/default.nix
+++ b/nixpkgs/pkgs/tools/archivers/zip/default.nix
@@ -19,8 +19,11 @@ stdenv.mkDerivation {
hardeningDisable = [ "format" ];
makefile = "unix/Makefile";
- buildFlags = if stdenv.isCygwin then "cygwin" else "generic";
- installFlags = "prefix=$(out) INSTALL=cp";
+ buildFlags = if stdenv.isCygwin then [ "cygwin" ] else [ "generic" ];
+ installFlags = [
+ "prefix=${placeholder ''out''}"
+ "INSTALL=cp"
+ ];
patches = if (enableNLS && !stdenv.isCygwin) then [ ./natspec-gentoo.patch.bz2 ] else [];
diff --git a/nixpkgs/pkgs/tools/audio/abcmidi/default.nix b/nixpkgs/pkgs/tools/audio/abcmidi/default.nix
index 8d990f3a3a8..804f9f3ed24 100644
--- a/nixpkgs/pkgs/tools/audio/abcmidi/default.nix
+++ b/nixpkgs/pkgs/tools/audio/abcmidi/default.nix
@@ -2,11 +2,11 @@
stdenv.mkDerivation rec {
pname = "abcMIDI";
- version = "2019.10.13";
+ version = "2019.11.11";
src = fetchzip {
url = "https://ifdo.ca/~seymour/runabc/${pname}-${version}.zip";
- sha256 = "1i2gpfrzi12smrlni25fcah6a8rb5l7p358r60jbysc2bpzxwd9l";
+ sha256 = "0xid13jqhbknrs31j74iwgjm0h0c64w3kqk9g9am1pkjwxh8d460";
};
# There is also a file called "makefile" which seems to be preferred by the standard build phase
diff --git a/nixpkgs/pkgs/tools/audio/beets/beet-check-tests.patch b/nixpkgs/pkgs/tools/audio/beets/beet-check-tests.patch
new file mode 100644
index 00000000000..2de97b86c8b
--- /dev/null
+++ b/nixpkgs/pkgs/tools/audio/beets/beet-check-tests.patch
@@ -0,0 +1,17 @@
+diff --git a/test/cli_test.py b/test/cli_test.py
+index 26df140..2eb913c 100644
+--- a/test/cli_test.py
++++ b/test/cli_test.py
+@@ -372,12 +372,6 @@ class ToolListTest(TestHelper, TestCase):
+ self.assertIn('flac', stdout.getvalue())
+ self.assertIn('oggz-validate', stdout.getvalue())
+
+- def test_found_mp3val(self):
+- shutil.copy('/bin/echo', os.path.join(self.temp_dir, 'mp3val'))
+- with captureStdout() as stdout:
+- beets.ui._raw_main(['check', '--list-tools'])
+- self.assertRegexpMatches(stdout.getvalue(), r'mp3val *found')
+-
+ def test_oggz_validate_not_found(self):
+ with captureStdout() as stdout:
+ beets.ui._raw_main(['check', '--list-tools'])
diff --git a/nixpkgs/pkgs/tools/audio/beets/check-plugin.nix b/nixpkgs/pkgs/tools/audio/beets/check-plugin.nix
new file mode 100644
index 00000000000..49ee97ead06
--- /dev/null
+++ b/nixpkgs/pkgs/tools/audio/beets/check-plugin.nix
@@ -0,0 +1,35 @@
+{ stdenv, fetchFromGitHub, beets, pythonPackages, flac, liboggz, mp3val }:
+
+pythonPackages.buildPythonApplication rec {
+ name = "beets-check";
+ version = "0.12.0";
+
+ src = fetchFromGitHub {
+ repo = "beets-check";
+ owner = "geigerzaehler";
+ rev = "v${version}";
+ sha256 = "0b2ijjf0gycs6b40sm33ida3sjygjiv4spb5mba52vysc7iwmnjn";
+ };
+
+ nativeBuildInputs = [ beets ];
+ checkInputs = [ pythonPackages.nose flac liboggz mp3val ];
+ propagatedBuildInputs = [ flac liboggz mp3val ];
+
+ # patch out broken tests
+ patches = [ ./beet-check-tests.patch ];
+
+ # patch out futures dependency, it is only needed for Python2 which we don't
+ # support.
+ prePatch = ''
+ sed -i "/futures/d" setup.py
+ '';
+
+ checkPhase = "nosetests";
+
+ meta = with stdenv.lib; {
+ description = "Beets plugin to Verify and store checksums in your library";
+ homepage = https://github.com/geigerzaehler/beets-check;
+ license = licenses.mit;
+ maintainers = with maintainers; [ lovesegfault ];
+ };
+}
diff --git a/nixpkgs/pkgs/tools/audio/beets/default.nix b/nixpkgs/pkgs/tools/audio/beets/default.nix
index 9509eccabdc..b4dfa71ca96 100644
--- a/nixpkgs/pkgs/tools/audio/beets/default.nix
+++ b/nixpkgs/pkgs/tools/audio/beets/default.nix
@@ -29,6 +29,7 @@
# External plugins
, enableAlternatives ? false
+, enableCheck ? false, liboggz ? null
, enableCopyArtifacts ? false
, bashInteractive, bash-completion
@@ -37,6 +38,7 @@
assert enableAbsubmit -> essentia-extractor != null;
assert enableAcoustid -> pythonPackages.pyacoustid != null;
assert enableBadfiles -> flac != null && mp3val != null;
+assert enableCheck -> flac != null && mp3val != null && liboggz != null;
assert enableConvert -> ffmpeg != null;
assert enableDiscogs -> pythonPackages.discogs_client != null;
assert enableFetchart -> pythonPackages.responses != null;
@@ -106,6 +108,7 @@ let
plugins = {
alternatives = callPackage ./alternatives-plugin.nix pluginArgs;
+ check = callPackage ./check-plugin.nix pluginArgs;
copyartifacts = callPackage ./copyartifacts-plugin.nix pluginArgs;
};
@@ -142,6 +145,7 @@ in pythonPackages.buildPythonApplication rec {
|| enableSubsonicupdate
|| enableAcousticbrainz)
pythonPackages.requests
+ ++ optional enableCheck plugins.check
++ optional enableConvert ffmpeg
++ optional enableDiscogs pythonPackages.discogs_client
++ optional enableGmusic pythonPackages.gmusicapi
@@ -246,6 +250,10 @@ in pythonPackages.buildPythonApplication rec {
makeWrapperArgs = [ "--set GI_TYPELIB_PATH \"$GI_TYPELIB_PATH\"" "--set GST_PLUGIN_SYSTEM_PATH_1_0 \"$GST_PLUGIN_SYSTEM_PATH_1_0\"" ];
+ passthru = {
+ externalPlugins = plugins;
+ };
+
meta = {
description = "Music tagger and library organizer";
homepage = http://beets.io;
diff --git a/nixpkgs/pkgs/tools/audio/gvolicon/default.nix b/nixpkgs/pkgs/tools/audio/gvolicon/default.nix
index c66c6bc1f7e..9029eb38b06 100644
--- a/nixpkgs/pkgs/tools/audio/gvolicon/default.nix
+++ b/nixpkgs/pkgs/tools/audio/gvolicon/default.nix
@@ -16,7 +16,7 @@ stdenv.mkDerivation {
makeFlags = [ "PREFIX=$(out)" ];
- NIX_CFLAGS_COMPILE = [ "-D_POSIX_C_SOURCE" ];
+ NIX_CFLAGS_COMPILE = "-D_POSIX_C_SOURCE";
meta = {
description = "A simple and lightweight volume icon that sits in your system tray";
diff --git a/nixpkgs/pkgs/tools/audio/mpdris2/default.nix b/nixpkgs/pkgs/tools/audio/mpdris2/default.nix
index d13dfbe8f43..0dbdcd7d25a 100644
--- a/nixpkgs/pkgs/tools/audio/mpdris2/default.nix
+++ b/nixpkgs/pkgs/tools/audio/mpdris2/default.nix
@@ -1,31 +1,55 @@
-{ stdenv, fetchurl, autoreconfHook, intltool
-, pythonPackages
+{ stdenv
+, autoreconfHook
+, fetchFromGitHub
+, glib
+, gobject-introspection
+, intltool
+, libnotify
+, python3
+, wrapGAppsHook
}:
-stdenv.mkDerivation rec {
+python3.pkgs.buildPythonApplication rec {
pname = "mpDris2";
version = "0.8";
+ format = "other";
+ strictDeps = false; # https://github.com/NixOS/nixpkgs/issues/56943
- src = fetchurl {
- url = "https://github.com/eonpatapon/${pname}/archive/${version}.tar.gz";
- sha256 = "14a3va3929qaq1sp9hs9w4bs6lykdvshkbc58kbsc5nzvlgmrcdn";
+ src = fetchFromGitHub {
+ owner = "eonpatapon";
+ repo = pname;
+ rev = version;
+ sha256 = "048b8acsd1b8kcxzd9fsh5p9g2an9c4rznicfcpyrsjz5syv894h";
};
preConfigure = ''
intltoolize -f
'';
- nativeBuildInputs = [ autoreconfHook ];
- buildInputs = [ intltool pythonPackages.wrapPython ];
- propagatedBuildInputs = with pythonPackages; [ python pygtk dbus-python ];
- pythonPath = with pythonPackages; [ mpd pygtk dbus-python notify mutagen ];
- postInstall = "wrapPythonPrograms";
+ nativeBuildInputs = [
+ autoreconfHook
+ gobject-introspection
+ intltool
+ wrapGAppsHook
+ ];
+
+ buildInputs = [
+ glib
+ libnotify
+ ];
+
+ propagatedBuildInputs = with python3.pkgs; [
+ dbus-python
+ mpd2
+ mutagen
+ pygobject3
+ ];
meta = with stdenv.lib; {
description = "MPRIS 2 support for mpd";
homepage = https://github.com/eonpatapon/mpDris2/;
license = licenses.gpl3;
+ maintainers = with maintainers; [];
platforms = platforms.unix;
- maintainers = with maintainers; [ pjones ];
};
}
diff --git a/nixpkgs/pkgs/tools/audio/trx/default.nix b/nixpkgs/pkgs/tools/audio/trx/default.nix
index 5d31193ee8d..1d052adbba9 100644
--- a/nixpkgs/pkgs/tools/audio/trx/default.nix
+++ b/nixpkgs/pkgs/tools/audio/trx/default.nix
@@ -1,13 +1,12 @@
-{ stdenv, fetchgit, alsaLib, libopus, ortp, bctoolbox }:
+{ stdenv, fetchurl, alsaLib, libopus, ortp, bctoolbox }:
-stdenv.mkDerivation {
- pname = "trx-unstable";
- version = "2018-01-23";
+stdenv.mkDerivation rec {
+ pname = "trx";
+ version = "0.4";
- src = fetchgit {
- url = "http://www.pogo.org.uk/~mark/trx.git";
- rev = "66b4707a24172751a131e24d2a800496c699137f";
- sha256 = "0w0960p25944b30lkc8n4lj14xgsf0fjpmxqwlz2r8wl642bqnfm";
+ src = fetchurl {
+ url = "https://www.pogo.org.uk/~mark/trx/releases/${pname}-${version}.tar.gz";
+ sha256 = "1wsrkbqc090px8i9p8awz38znxjcqjb1dzjjdd8xkjmiprayjhkl";
};
buildInputs = [ alsaLib libopus ortp bctoolbox ];
diff --git a/nixpkgs/pkgs/tools/audio/volctl/default.nix b/nixpkgs/pkgs/tools/audio/volctl/default.nix
new file mode 100644
index 00000000000..7b4cdd6b531
--- /dev/null
+++ b/nixpkgs/pkgs/tools/audio/volctl/default.nix
@@ -0,0 +1,58 @@
+{ stdenv, fetchFromGitHub, pythonPackages, libpulseaudio, glib, gtk3, gobject-introspection, wrapGAppsHook }:
+
+pythonPackages.buildPythonApplication rec {
+ pname = "volctl";
+ version = "0.6.2";
+
+ src = fetchFromGitHub {
+ owner = "buzz";
+ repo = pname;
+ rev = version;
+ sha256 = "1bqq5mrpi7qxzl37z6fj67pqappjmwhi8d8db95j3lmf16svm2xk";
+ };
+
+ nativeBuildInputs = [
+ gobject-introspection
+ wrapGAppsHook
+ ];
+
+ buildInputs = [
+ glib
+ gtk3
+ libpulseaudio
+ ];
+
+ pythonPath = with pythonPackages; [
+ pygobject3
+ ];
+
+ strictDeps = false;
+
+ postPatch = ''
+ # The user can set a mixer application in the preferences. The
+ # default is pavucontrol. Do not hard code its path and hope it
+ # can be found in $PATH.
+
+ substituteInPlace volctl/app.py --replace /usr/bin/pavucontrol pavucontrol
+ '';
+
+ preBuild = ''
+ export LD_LIBRARY_PATH=${libpulseaudio}/lib
+ '';
+
+ preFixup = ''
+ glib-compile-schemas ${glib.makeSchemaPath "$out" "${pname}-${version}"}
+
+ gappsWrapperArgs+=(
+ --prefix LD_LIBRARY_PATH : "${libpulseaudio}/lib"
+ )
+ '';
+
+ meta = with stdenv.lib; {
+ description = "PulseAudio enabled volume control featuring per-app sliders";
+ homepage = https://buzz.github.io/volctl/;
+ license = licenses.gpl2;
+ platforms = platforms.linux;
+ maintainers = [ maintainers.romildo ];
+ };
+}
diff --git a/nixpkgs/pkgs/tools/backup/duplicati/default.nix b/nixpkgs/pkgs/tools/backup/duplicati/default.nix
index be039fa47c0..bb24cb35d87 100644
--- a/nixpkgs/pkgs/tools/backup/duplicati/default.nix
+++ b/nixpkgs/pkgs/tools/backup/duplicati/default.nix
@@ -2,13 +2,13 @@
stdenv.mkDerivation rec {
pname = "duplicati";
- version = "2.0.4.5";
+ version = "2.0.4.23";
channel = "beta";
- build_date = "2018-11-28";
+ build_date = "2019-07-14";
src = fetchzip {
url = "https://github.com/duplicati/duplicati/releases/download/v${version}-${version}_${channel}_${build_date}/duplicati-${version}_${channel}_${build_date}.zip";
- sha256 = "118rhzm8vk1092214vq7kxnmrnz4jl32lk8j90965a8pg05m53gn";
+ sha256 = "1m2448vgl1fc2hkxkyasvdfgl728rqv16b41niznv5rsxv5643w2";
stripRoot = false;
};
diff --git a/nixpkgs/pkgs/tools/backup/hpe-ltfs/default.nix b/nixpkgs/pkgs/tools/backup/hpe-ltfs/default.nix
new file mode 100644
index 00000000000..d289febe1f0
--- /dev/null
+++ b/nixpkgs/pkgs/tools/backup/hpe-ltfs/default.nix
@@ -0,0 +1,30 @@
+{ stdenv, fetchFromGitHub, fuse, icu, pkgconfig, libxml2, libuuid }:
+
+stdenv.mkDerivation rec {
+ version = "3.4.2_Z7550-02501";
+ pname = "hpe-ltfs";
+
+ src = fetchFromGitHub {
+ rev = version;
+ owner = "nix-community";
+ repo = "hpe-ltfs";
+ sha256 = "193593hsc8nf5dn1fkxhzs1z4fpjh64hdkc8q6n9fgplrpxdlr4s";
+ };
+
+ sourceRoot = "source/ltfs";
+
+ nativeBuildInputs = [ pkgconfig ];
+
+ buildInputs = [
+ fuse icu libxml2 libuuid
+ ];
+
+ meta = with stdenv.lib; {
+ description = "HPE's implementation of the open-source tape filesystem standard ltfs";
+ homepage = https://support.hpe.com/hpesc/public/km/product/1009214665/Product;
+ license = licenses.lgpl21;
+ maintainers = [ maintainers.redvers ];
+ platforms = platforms.linux;
+ downloadPage = https://github.com/nix-community/hpe-ltfs;
+ };
+}
diff --git a/nixpkgs/pkgs/tools/backup/lvmsync/default.nix b/nixpkgs/pkgs/tools/backup/lvmsync/default.nix
index 8c23d804d0b..a52c6bf1ba7 100644
--- a/nixpkgs/pkgs/tools/backup/lvmsync/default.nix
+++ b/nixpkgs/pkgs/tools/backup/lvmsync/default.nix
@@ -1,27 +1,22 @@
{ stdenv, bundlerEnv, ruby, bundlerUpdateScript, makeWrapper }:
-let
-
+stdenv.mkDerivation rec {
pname = "lvmsync";
version = (import ./gemset.nix).${pname}.version;
-in stdenv.mkDerivation rec {
-
- name = "${pname}-${version}";
-
- env = bundlerEnv {
- name = "${pname}-${version}-gems";
- ruby = ruby;
- gemfile = ./Gemfile;
- lockfile = ./Gemfile.lock;
- gemset = ./gemset.nix;
- };
-
buildInputs = [ makeWrapper ];
phases = ["installPhase"];
- installPhase = ''
+ installPhase = let
+ env = bundlerEnv {
+ name = "${pname}-${version}-gems";
+ ruby = ruby;
+ gemfile = ./Gemfile;
+ lockfile = ./Gemfile.lock;
+ gemset = ./gemset.nix;
+ };
+ in ''
mkdir -p $out/bin
makeWrapper ${env}/bin/lvmsync $out/bin/lvmsync
'';
diff --git a/nixpkgs/pkgs/tools/backup/restic/default.nix b/nixpkgs/pkgs/tools/backup/restic/default.nix
index b78fc9b61f7..26f05d41954 100644
--- a/nixpkgs/pkgs/tools/backup/restic/default.nix
+++ b/nixpkgs/pkgs/tools/backup/restic/default.nix
@@ -2,7 +2,7 @@
buildGoPackage rec {
pname = "restic";
- version = "0.9.5";
+ version = "0.9.6";
goPackagePath = "github.com/restic/restic";
@@ -10,7 +10,7 @@ buildGoPackage rec {
owner = "restic";
repo = "restic";
rev = "v${version}";
- sha256 = "1bhn3xwlycpnjg2qbqblwxn3apj43lr5cakgkmrblk13yfwfv5xv";
+ sha256 = "0lydll93n1lcn1fl669b9cikmzz9d6vfpc8ky3ng5fi8kj3v1dz7";
};
buildPhase = ''
diff --git a/nixpkgs/pkgs/tools/backup/rsnapshot/default.nix b/nixpkgs/pkgs/tools/backup/rsnapshot/default.nix
index 6abd7002f8d..9f6204db2d8 100644
--- a/nixpkgs/pkgs/tools/backup/rsnapshot/default.nix
+++ b/nixpkgs/pkgs/tools/backup/rsnapshot/default.nix
@@ -1,11 +1,11 @@
{ fetchurl, stdenv, perl, openssh, rsync, logger }:
stdenv.mkDerivation rec {
- name = "rsnapshot-1.4.2";
+ name = "rsnapshot-1.4.3";
src = fetchurl {
url = "http://rsnapshot.org/downloads/${name}.tar.gz";
- sha256 = "05jfy99a0xs6lvsjfp3wz21z0myqhmwl2grn3jr9clijbg282ah4";
+ sha256 = "1lavqmmsf53pim0nvming7fkng6p0nk2a51k2c2jdq0l7snpl31b";
};
propagatedBuildInputs = [perl openssh rsync logger];
diff --git a/nixpkgs/pkgs/tools/bluetooth/obexfs/default.nix b/nixpkgs/pkgs/tools/bluetooth/obexfs/default.nix
index 94c011152da..81d0849b408 100644
--- a/nixpkgs/pkgs/tools/bluetooth/obexfs/default.nix
+++ b/nixpkgs/pkgs/tools/bluetooth/obexfs/default.nix
@@ -1,15 +1,15 @@
-{ stdenv, fetchurl, pkgconfig, fuse, obexftp }:
-
+{ stdenv, fetchurl, pkgconfig, bluez, fuse, obexftp }:
+
stdenv.mkDerivation rec {
name = "obexfs-0.12";
-
+
src = fetchurl {
url = "mirror://sourceforge/openobex/${name}.tar.gz";
sha256 = "1g3krpygk6swa47vbmp9j9s8ahqqcl9ra8r25ybgzv2d9pmjm9kj";
};
nativeBuildInputs = [ pkgconfig ];
- buildInputs = [ fuse obexftp ];
+ buildInputs = [ fuse obexftp bluez ];
meta = with stdenv.lib; {
homepage = http://dev.zuckschwerdt.org/openobex/wiki/ObexFs;
diff --git a/nixpkgs/pkgs/tools/bluetooth/obexftp/default.nix b/nixpkgs/pkgs/tools/bluetooth/obexftp/default.nix
index 12b021d5d3b..3e40c7d8ef6 100644
--- a/nixpkgs/pkgs/tools/bluetooth/obexftp/default.nix
+++ b/nixpkgs/pkgs/tools/bluetooth/obexftp/default.nix
@@ -1,11 +1,11 @@
{ stdenv, fetchurl, pkgconfig, openobex, bluez, cmake }:
stdenv.mkDerivation rec {
- name = "obexftp-0.24";
+ name = "obexftp-0.24.2";
src = fetchurl {
url = "mirror://sourceforge/openobex/${name}-Source.tar.gz";
- sha256 = "0szy7p3y75bd5h4af0j5kf0fpzx2w560fpy4kg3603mz11b9c1xr";
+ sha256 = "18w9r78z78ri5qc8fjym4nk1jfbrkyr789sq7rxrkshf1a7b83yl";
};
nativeBuildInputs = [ pkgconfig cmake ];
diff --git a/nixpkgs/pkgs/tools/cd-dvd/cdrdao/default.nix b/nixpkgs/pkgs/tools/cd-dvd/cdrdao/default.nix
index a17b0302503..908808b79f3 100644
--- a/nixpkgs/pkgs/tools/cd-dvd/cdrdao/default.nix
+++ b/nixpkgs/pkgs/tools/cd-dvd/cdrdao/default.nix
@@ -8,7 +8,7 @@ stdenv.mkDerivation {
sha256 = "0pmpgx91j984snrsxbq1dgf3ximks2dfh1sqqmic72lrls7wp4w1";
};
- makeFlags = "RM=rm LN=ln MV=mv";
+ makeFlags = [ "RM=rm" "LN=ln" "MV=mv" ];
nativeBuildInputs = [ pkgconfig ];
buildInputs = [ libvorbis libmad libao ];
diff --git a/nixpkgs/pkgs/tools/cd-dvd/cdrkit/default.nix b/nixpkgs/pkgs/tools/cd-dvd/cdrkit/default.nix
index 81bd4f60f43..7de086dba60 100644
--- a/nixpkgs/pkgs/tools/cd-dvd/cdrkit/default.nix
+++ b/nixpkgs/pkgs/tools/cd-dvd/cdrkit/default.nix
@@ -21,7 +21,7 @@ stdenv.mkDerivation rec {
ln -s $out/bin/wodim $out/bin/cdrecord
'';
- makeFlags = "PREFIX=\$(out)";
+ makeFlags = [ "PREFIX=\$(out)" ];
meta = {
description = "Portable command-line CD/DVD recorder software, mostly compatible with cdrtools";
diff --git a/nixpkgs/pkgs/tools/cd-dvd/isomd5sum/default.nix b/nixpkgs/pkgs/tools/cd-dvd/isomd5sum/default.nix
index 90315540aba..3bc1f886ccd 100644
--- a/nixpkgs/pkgs/tools/cd-dvd/isomd5sum/default.nix
+++ b/nixpkgs/pkgs/tools/cd-dvd/isomd5sum/default.nix
@@ -26,7 +26,7 @@ stdenv.mkDerivation rec {
makeFlags = [ "DESTDIR=${placeholder "out"}" ];
# we don't install python stuff as it borks up directories
- installTargets = "install-bin install-devel";
+ installTargets = [ "install-bin" "install-devel" ];
meta = with stdenv.lib; {
homepage = https://github.com/rhinstaller/isomd5sum;
diff --git a/nixpkgs/pkgs/tools/cd-dvd/vobcopy/default.nix b/nixpkgs/pkgs/tools/cd-dvd/vobcopy/default.nix
index f181ab71edf..48a58c0c7d1 100644
--- a/nixpkgs/pkgs/tools/cd-dvd/vobcopy/default.nix
+++ b/nixpkgs/pkgs/tools/cd-dvd/vobcopy/default.nix
@@ -9,7 +9,7 @@ stdenv.mkDerivation rec {
};
buildInputs = [libdvdread libdvdcss];
- makeFlags = "DESTDIR=$(out) PREFIX=/";
+ makeFlags = [ "DESTDIR=$(out)" "PREFIX=/" ];
meta = {
description = "Copies DVD .vob files to harddisk, decrypting them on the way";
diff --git a/nixpkgs/pkgs/tools/compression/advancecomp/default.nix b/nixpkgs/pkgs/tools/compression/advancecomp/default.nix
index 8bee8059fe2..46c8f4338c6 100644
--- a/nixpkgs/pkgs/tools/compression/advancecomp/default.nix
+++ b/nixpkgs/pkgs/tools/compression/advancecomp/default.nix
@@ -1,5 +1,9 @@
-{ stdenv, fetchFromGitHub
-, autoreconfHook, zlib }:
+{ stdenv
+, fetchFromGitHub
+, fetchpatch
+, autoreconfHook
+, zlib
+}:
stdenv.mkDerivation rec {
pname = "advancecomp";
@@ -15,6 +19,15 @@ stdenv.mkDerivation rec {
nativeBuildInputs = [ autoreconfHook ];
buildInputs = [ zlib ];
+ patches = [
+ (fetchpatch {
+ name = "CVE-2019-9210.patch";
+ url = "https://github.com/amadvance/advancecomp/commit/fcf71a89265c78fc26243574dda3a872574a5c02.patch";
+ sha256 = "0cdv9g87c1y8zwhqkd9ba2zjw4slcvg7yzcqv43idvnwb5fl29n7";
+ excludes = [ "doc/history.d" ];
+ })
+ ];
+
meta = with stdenv.lib; {
description = ''A set of tools to optimize deflate-compressed files'';
license = licenses.gpl3 ;
diff --git a/nixpkgs/pkgs/tools/compression/lbzip2/default.nix b/nixpkgs/pkgs/tools/compression/lbzip2/default.nix
index cf616a21e0a..7e9cc055abf 100644
--- a/nixpkgs/pkgs/tools/compression/lbzip2/default.nix
+++ b/nixpkgs/pkgs/tools/compression/lbzip2/default.nix
@@ -9,7 +9,7 @@ stdenv.mkDerivation rec {
};
meta = with stdenv.lib; {
- homepage = http://lbzip2.org/;
+ homepage = "https://github.com/kjn/lbzip2"; # Formerly http://lbzip2.org/
description = "Parallel bzip2 compression utility";
license = licenses.gpl3;
maintainers = with maintainers; [ abbradar ];
diff --git a/nixpkgs/pkgs/tools/compression/pbzip2/default.nix b/nixpkgs/pkgs/tools/compression/pbzip2/default.nix
index 94ca5eb58b1..3314544084f 100644
--- a/nixpkgs/pkgs/tools/compression/pbzip2/default.nix
+++ b/nixpkgs/pkgs/tools/compression/pbzip2/default.nix
@@ -16,7 +16,7 @@ stdenv.mkDerivation rec {
preBuild = "substituteInPlace Makefile --replace g++ c++";
- installFlags = "PREFIX=$(out)";
+ installFlags = [ "PREFIX=$(out)" ];
NIX_CFLAGS_COMPILE = stdenv.lib.optionalString stdenv.cc.isClang "-Wno-error=reserved-user-defined-literal";
diff --git a/nixpkgs/pkgs/tools/compression/zstd/default.nix b/nixpkgs/pkgs/tools/compression/zstd/default.nix
index a3aecf88c90..82a6a3a8a53 100644
--- a/nixpkgs/pkgs/tools/compression/zstd/default.nix
+++ b/nixpkgs/pkgs/tools/compression/zstd/default.nix
@@ -1,7 +1,8 @@
-{ stdenv, fetchFromGitHub, fetchpatch, gnugrep
+{ stdenv, fetchFromGitHub, fetchpatch, cmake, gnugrep
, fixDarwinDylibNames
, file
-, legacySupport ? false }:
+, legacySupport ? false
+, enableShared ? true }:
stdenv.mkDerivation rec {
pname = "zstd";
@@ -14,56 +15,46 @@ stdenv.mkDerivation rec {
owner = "facebook";
};
+ nativeBuildInputs = [ cmake ]
+ ++ stdenv.lib.optional stdenv.isDarwin fixDarwinDylibNames;
+
patches = [
- # All 3 from https://github.com/facebook/zstd/pull/1883
+ # From https://github.com/facebook/zstd/pull/1883
(fetchpatch {
url = "https://github.com/facebook/zstd/commit/106278e7e5fafaea3b7deb4147bdc8071562d2f0.diff";
sha256 = "13z7id1qbc05cv1rmak7c8xrchp7jh1i623bq5pwcihg57wzcyr8";
})
- (fetchpatch {
- url = "https://github.com/facebook/zstd/commit/0ede342acc2c26f87ae962fa88e158904d4198c4.diff";
- sha256 = "12l5xbvnzkvr76mvl1ls767paqfwbd9q1pzq44ckacfpz4f6iaap";
- excludes = [
- # I think line endings are causing problems, or something like that
- "programs/windres/generate_res.bat"
- ];
- })
- (fetchpatch {
- url = "https://github.com/facebook/zstd/commit/10552eaffef84c011f67af0e04f0780b50a5ab26.diff";
- sha256 = "1s27ravar3rn7q8abybp9733jhpsfcaci51k04da94ahahvxwiqw";
- })
] # This I didn't upstream because if you use posix threads with MinGW it will
# work find, and I'm not sure how to write the condition.
++ stdenv.lib.optional stdenv.hostPlatform.isWindows ./mcfgthreads-no-pthread.patch;
- nativeBuildInputs = stdenv.lib.optional stdenv.isDarwin fixDarwinDylibNames;
-
- makeFlags = [
- "ZSTD_LEGACY_SUPPORT=${if legacySupport then "1" else "0"}"
- ] ++ stdenv.lib.optional stdenv.hostPlatform.isWindows "OS=Windows";
+ cmakeFlags = [
+ "-DZSTD_BUILD_SHARED:BOOL=${if enableShared then "ON" else "OFF"}"
+ "-DZSTD_LEGACY_SUPPORT:BOOL=${if legacySupport then "ON" else "OFF"}"
+ "-DZSTD_BUILD_TESTS:BOOL=ON"
+ ];
+ cmakeDir = "../build/cmake";
+ dontUseCmakeBuildDir = true;
+ preConfigure = ''
+ mkdir -p build_ && cd $_
+ '';
checkInputs = [ file ];
doCheck = true;
preCheck = ''
- substituteInPlace tests/playTests.sh \
+ substituteInPlace ../tests/playTests.sh \
--replace 'MD5SUM="md5 -r"' 'MD5SUM="md5sum"'
'';
- installFlags = [
- "PREFIX=$(out)"
- ];
-
- preInstall = ''
- substituteInPlace programs/zstdgrep \
+ preInstall = stdenv.lib.optionalString enableShared ''
+ substituteInPlace ../programs/zstdgrep \
--replace ":-grep" ":-${gnugrep}/bin/grep" \
--replace ":-zstdcat" ":-$out/bin/zstdcat"
- substituteInPlace programs/zstdless \
+ substituteInPlace ../programs/zstdless \
--replace "zstdcat" "$out/bin/zstdcat"
'';
- enableParallelBuilding = true;
-
meta = with stdenv.lib; {
description = "Zstandard real-time compression algorithm";
longDescription = ''
diff --git a/nixpkgs/pkgs/tools/filesystems/bees/default.nix b/nixpkgs/pkgs/tools/filesystems/bees/default.nix
index 94573bcd201..c6bb07e7b87 100644
--- a/nixpkgs/pkgs/tools/filesystems/bees/default.nix
+++ b/nixpkgs/pkgs/tools/filesystems/bees/default.nix
@@ -2,8 +2,8 @@
let
- version = "0.6.1";
- sha256 = "0h7idclmhyp14mq6786x7f2237vqpn70gyi88ik4g70xl84yfgyh";
+ version = "0.6.2";
+ sha256 = "05niv9rivd3j3cwcx3n3vjr85wr0l5i76giq9n54d2vdwmn8qjib";
bees = stdenv.mkDerivation {
pname = "bees";
diff --git a/nixpkgs/pkgs/tools/filesystems/bindfs/default.nix b/nixpkgs/pkgs/tools/filesystems/bindfs/default.nix
index a8849e6af22..d0f68fac7ca 100644
--- a/nixpkgs/pkgs/tools/filesystems/bindfs/default.nix
+++ b/nixpkgs/pkgs/tools/filesystems/bindfs/default.nix
@@ -1,12 +1,12 @@
{ stdenv, fetchurl, fuse, pkgconfig }:
stdenv.mkDerivation rec {
- version = "1.14.1";
+ version = "1.14.2";
pname = "bindfs";
src = fetchurl {
url = "https://bindfs.org/downloads/${pname}-${version}.tar.gz";
- sha256 = "111i4ba4px3idmrr5qhgq01926fas1rs2yx2shnwgdk3ziqcszxl";
+ sha256 = "0zn5fjrm9la5w1p66xhy87aasqsdky36dgc447jp2yp7nh18v339";
};
dontStrip = true;
diff --git a/nixpkgs/pkgs/tools/filesystems/blobfuse/default.nix b/nixpkgs/pkgs/tools/filesystems/blobfuse/default.nix
index 6fc0e3a7f21..3c6f6228329 100644
--- a/nixpkgs/pkgs/tools/filesystems/blobfuse/default.nix
+++ b/nixpkgs/pkgs/tools/filesystems/blobfuse/default.nix
@@ -11,7 +11,7 @@ stdenv.mkDerivation rec {
sha256 = "1qh04z1fsj1l6l12sz9yl2sy9hwlrnzac54hwrr7wvsgv90n9gbp";
};
- NIX_CFLAGS_COMPILE = [ "-Wno-error=catch-value" ];
+ NIX_CFLAGS_COMPILE = "-Wno-error=catch-value";
buildInputs = [ curl gnutls libgcrypt libuuid fuse ];
nativeBuildInputs = [ cmake pkgconfig ];
diff --git a/nixpkgs/pkgs/tools/filesystems/btrfs-progs/default.nix b/nixpkgs/pkgs/tools/filesystems/btrfs-progs/default.nix
index e04b9efe48f..1da8470280b 100644
--- a/nixpkgs/pkgs/tools/filesystems/btrfs-progs/default.nix
+++ b/nixpkgs/pkgs/tools/filesystems/btrfs-progs/default.nix
@@ -4,11 +4,11 @@
stdenv.mkDerivation rec {
pname = "btrfs-progs";
- version = "5.3.1";
+ version = "5.4";
src = fetchurl {
url = "mirror://kernel/linux/kernel/people/kdave/btrfs-progs/btrfs-progs-v${version}.tar.xz";
- sha256 = "0f6s1iwiqbncrvxp74k50s88x6zqf85sjxg04kyni82l1vk1m8xz";
+ sha256 = "1ykhasv0jc3qi3xrm5841mzkmlbkjw6rm70gl4aww90jj6ak55qg";
};
nativeBuildInputs = [
diff --git a/nixpkgs/pkgs/tools/filesystems/ceph/default.nix b/nixpkgs/pkgs/tools/filesystems/ceph/default.nix
index 3066be27772..9c770441025 100644
--- a/nixpkgs/pkgs/tools/filesystems/ceph/default.nix
+++ b/nixpkgs/pkgs/tools/filesystems/ceph/default.nix
@@ -10,6 +10,7 @@
, cunit, snappy
, rocksdb, makeWrapper
, leveldb, oathToolkit
+, libnl, libcap_ng
# Optional Dependencies
, yasm ? null, fcgi ? null, expat ? null
@@ -88,9 +89,10 @@ let
ps.webob
ps.bcrypt
ps.six
+ ps.pyyaml
]);
- version = "14.2.4";
+ version = "14.2.5";
in rec {
ceph = stdenv.mkDerivation {
pname = "ceph";
@@ -98,7 +100,7 @@ in rec {
src = fetchurl {
url = "http://download.ceph.com/tarballs/ceph-${version}.tar.gz";
- sha256 = "1y6hixh6srd5aswhzq0sf0dbygwhx0ardx3w3f7qazf5rapvd03i";
+ sha256 = "0wbkdplxs8higmlj57a7rydmx9rq08h0arjrmxmp0s80bn0v5x2c";
};
patches = [
@@ -116,7 +118,7 @@ in rec {
buildInputs = cryptoLibsMap.${cryptoStr} ++ [
boost ceph-python-env libxml2 optYasm optLibatomic_ops optLibs3
malloc zlib openldap lttng-ust babeltrace gperf gtest cunit
- snappy rocksdb lz4 oathToolkit leveldb
+ snappy rocksdb lz4 oathToolkit leveldb libnl libcap_ng
] ++ optionals stdenv.isLinux [
linuxHeaders utillinux libuuid udev keyutils optLibaio optLibxfs optZfs
# ceph 14
diff --git a/nixpkgs/pkgs/tools/filesystems/ciopfs/default.nix b/nixpkgs/pkgs/tools/filesystems/ciopfs/default.nix
index 4a8c767e44a..533bb2322e7 100644
--- a/nixpkgs/pkgs/tools/filesystems/ciopfs/default.nix
+++ b/nixpkgs/pkgs/tools/filesystems/ciopfs/default.nix
@@ -11,7 +11,7 @@ stdenv.mkDerivation rec {
nativeBuildInputs = [ pkgconfig ];
buildInputs = [ fuse glib attr ];
- makeFlags = "DESTDIR=$(out) PREFIX=";
+ makeFlags = [ "DESTDIR=$(out)" "PREFIX=" ];
meta = {
homepage = http://www.brain-dump.org/projects/ciopfs/;
diff --git a/nixpkgs/pkgs/tools/filesystems/davfs2/default.nix b/nixpkgs/pkgs/tools/filesystems/davfs2/default.nix
index 512b5ce8567..a0d2cfd4ef7 100644
--- a/nixpkgs/pkgs/tools/filesystems/davfs2/default.nix
+++ b/nixpkgs/pkgs/tools/filesystems/davfs2/default.nix
@@ -1,11 +1,11 @@
{ stdenv, fetchurl, neon, zlib }:
stdenv.mkDerivation rec {
- name = "davfs2-1.5.5";
+ name = "davfs2-1.5.6";
src = fetchurl {
url = "mirror://savannah/davfs2/${name}.tar.gz";
- sha256 = "0bxd62268pix7w1lg7f9y94v34f4l45fdf6clyarj43qmljnlz2q";
+ sha256 = "00fqadhmhi2bmdar5a48nicmjcagnmaj9wgsvjr6cffmrz6pcx21";
};
buildInputs = [ neon zlib ];
diff --git a/nixpkgs/pkgs/tools/filesystems/e2fsprogs/default.nix b/nixpkgs/pkgs/tools/filesystems/e2fsprogs/default.nix
index eb17e9fc60c..0fd7062ac6c 100644
--- a/nixpkgs/pkgs/tools/filesystems/e2fsprogs/default.nix
+++ b/nixpkgs/pkgs/tools/filesystems/e2fsprogs/default.nix
@@ -1,4 +1,4 @@
-{ stdenv, buildPackages, fetchurl, fetchpatch, pkgconfig, libuuid, gettext, texinfo }:
+{ stdenv, buildPackages, fetchurl, fetchpatch, pkgconfig, libuuid, gettext, texinfo, shared ? true }:
stdenv.mkDerivation rec {
pname = "e2fsprogs";
@@ -36,7 +36,9 @@ stdenv.mkDerivation rec {
configureFlags =
if stdenv.isLinux then [
- "--enable-elf-shlibs"
+ # It seems that the e2fsprogs is one of the few packages that cannot be
+ # build with shared and static libs.
+ (if shared then "--enable-elf-shlibs" else "--disable-elf-shlibs")
"--enable-symlink-install"
"--enable-relative-symlinks"
"--with-crond-dir=no"
diff --git a/nixpkgs/pkgs/tools/filesystems/fatresize/default.nix b/nixpkgs/pkgs/tools/filesystems/fatresize/default.nix
index a00104510bf..5a60f8c055e 100644
--- a/nixpkgs/pkgs/tools/filesystems/fatresize/default.nix
+++ b/nixpkgs/pkgs/tools/filesystems/fatresize/default.nix
@@ -25,9 +25,7 @@ stdenv.mkDerivation rec {
# Filesystem resize functions were reintroduced in parted 3.1 due to no other available free alternatives
# but in a sepparate library -> libparted-fs-resize --- that's why the added LDFLAG
- makeFlags = ''
- LDFLAGS=-lparted-fs-resize
- '';
+ makeFlags = [ "LDFLAGS=-lparted-fs-resize" ];
propagatedBuildInputs = [ parted utillinux ];
diff --git a/nixpkgs/pkgs/tools/filesystems/fuse-overlayfs/default.nix b/nixpkgs/pkgs/tools/filesystems/fuse-overlayfs/default.nix
index c65b2a63f2d..0d7bcdcd0f2 100644
--- a/nixpkgs/pkgs/tools/filesystems/fuse-overlayfs/default.nix
+++ b/nixpkgs/pkgs/tools/filesystems/fuse-overlayfs/default.nix
@@ -2,24 +2,25 @@
stdenv.mkDerivation rec {
pname = "fuse-overlayfs";
- version = "0.7";
+ version = "0.7.2";
src = fetchFromGitHub {
owner = "containers";
repo = pname;
rev = "v${version}";
- sha256 = "1nhqy1fdzhkjhqs54nq66zj5bf85n3gr4k6zl0hswdvhg6flkg75";
+ sha256 = "1ybrki63ixrkraynms5i4jiil9901whwxs6p61h2c2ild8w2ir8n";
};
nativeBuildInputs = [ autoreconfHook pkgconfig ];
+
buildInputs = [ fuse3 ];
meta = with lib; {
- homepage = https://github.com/containers/fuse-overlayfs;
description = "FUSE implementation for overlayfs";
longDescription = "An implementation of overlay+shiftfs in FUSE for rootless containers.";
license = licenses.gpl3;
+ maintainers = with maintainers; [ ma9e ];
platforms = platforms.unix;
- maintainers = [ maintainers.ma9e ];
+ inherit (src.meta) homepage;
};
}
diff --git a/nixpkgs/pkgs/tools/filesystems/glusterfs/default.nix b/nixpkgs/pkgs/tools/filesystems/glusterfs/default.nix
index 1afefc71465..b5fc12024b1 100644
--- a/nixpkgs/pkgs/tools/filesystems/glusterfs/default.nix
+++ b/nixpkgs/pkgs/tools/filesystems/glusterfs/default.nix
@@ -15,10 +15,10 @@ let
# The command
# find /nix/store/...-glusterfs-.../ -name '*.py' -executable
# can help with finding new Python scripts.
- version = "7.0";
+ version = "7.1";
name="${baseName}-${version}";
url="https://github.com/gluster/glusterfs/archive/v${version}.tar.gz";
- sha256 = "0ynh7wrgpnmwah9r2ll32dmicdivz13ijjxg2vj1qcaxgy0b5ivm";
+ sha256 = "11v5hwijbb08xq3dd4m6bkspa3v4vjzcnw6j1qyh0gjmc7yy4ml3";
};
buildInputs = [
@@ -94,7 +94,7 @@ stdenv.mkDerivation
''--localstatedir=/var''
];
- makeFlags = "DESTDIR=$(out)";
+ makeFlags = [ "DESTDIR=$(out)" ];
enableParallelBuilding = true;
diff --git a/nixpkgs/pkgs/tools/filesystems/grive2/default.nix b/nixpkgs/pkgs/tools/filesystems/grive2/default.nix
index 59ee358e028..f325fc97e32 100644
--- a/nixpkgs/pkgs/tools/filesystems/grive2/default.nix
+++ b/nixpkgs/pkgs/tools/filesystems/grive2/default.nix
@@ -1,14 +1,14 @@
{ stdenv, fetchFromGitHub, pkgconfig, yajl, cmake, libgcrypt, curl, expat, boost, libiberty }:
stdenv.mkDerivation rec {
- version = "0.5.0";
+ version = "0.5.1";
pname = "grive2";
src = fetchFromGitHub {
owner = "vitalif";
repo = "grive2";
rev = "v${version}";
- sha256 = "0gyic9228j25l5x8qj9xxxp2cgbw6y4skxqx0xrq6qilhv4lj23c";
+ sha256 = "1kv34ys8qarjsxpb1kd8dp7b3b4ycyiwjzd6mg97d3jk7405g6nm";
};
nativeBuildInputs = [ cmake pkgconfig ];
diff --git a/nixpkgs/pkgs/tools/filesystems/irods/default.nix b/nixpkgs/pkgs/tools/filesystems/irods/default.nix
index 56fc2e40ba2..b6099c099f3 100644
--- a/nixpkgs/pkgs/tools/filesystems/irods/default.nix
+++ b/nixpkgs/pkgs/tools/filesystems/irods/default.nix
@@ -30,11 +30,8 @@ in rec {
# but we don't use /usr with nix, so remove only 2 items.
patches = [ ./irods_root_path.patch ];
- NIX_CFLAGS_COMPILE = [
- # fix build with recent llvm versions
- "-Wno-deprecated-register"
- "-Wno-deprecated-declarations"
- ];
+ # fix build with recent llvm versions
+ NIX_CFLAGS_COMPILE = "-Wno-deprecated-register -Wno-deprecated-declarations";
preConfigure = common.preConfigure + ''
patchShebangs ./test
diff --git a/nixpkgs/pkgs/tools/filesystems/moosefs/default.nix b/nixpkgs/pkgs/tools/filesystems/moosefs/default.nix
index 1e89b5729c7..5d3c2d15fb2 100644
--- a/nixpkgs/pkgs/tools/filesystems/moosefs/default.nix
+++ b/nixpkgs/pkgs/tools/filesystems/moosefs/default.nix
@@ -10,13 +10,13 @@
stdenv.mkDerivation rec {
pname = "moosefs";
- version = "3.0.105";
+ version = "3.0.109";
src = fetchFromGitHub {
owner = pname;
repo = pname;
rev = "v${version}";
- sha256 = "0wphpdll0j4i6d4yxykaz2bamv83y0sj7j3cfv4br1zamdyprfwx";
+ sha256 = "1pwackc511fzx28w3an5qk738ykhpspvc1063w2hv901f213xjzw";
};
nativeBuildInputs = [ pkgconfig makeWrapper ];
diff --git a/nixpkgs/pkgs/tools/filesystems/mtdutils/default.nix b/nixpkgs/pkgs/tools/filesystems/mtdutils/default.nix
index 0461c732e1a..3b355c92226 100644
--- a/nixpkgs/pkgs/tools/filesystems/mtdutils/default.nix
+++ b/nixpkgs/pkgs/tools/filesystems/mtdutils/default.nix
@@ -9,13 +9,16 @@ stdenv.mkDerivation rec {
sha256 = "1lijl89l7hljx8xx70vrz9srd3h41v5gh4b0lvqnlv831yvyh5cd";
};
- nativeBuildInputs = [ autoreconfHook cmocka pkgconfig ];
+ nativeBuildInputs = [ autoreconfHook pkgconfig ] ++ stdenv.lib.optional doCheck cmocka;
buildInputs = [ acl libuuid lzo zlib zstd ];
- configureFlags = [ "--enable-unit-tests" "--enable-tests" ];
+ configureFlags = [
+ (stdenv.lib.enableFeature doCheck "unit-tests")
+ (stdenv.lib.enableFeature doCheck "tests")
+ ];
enableParallelBuilding = true;
- doCheck = true;
+ doCheck = stdenv.hostPlatform == stdenv.buildPlatform;
meta = {
description = "Tools for MTD filesystems";
diff --git a/nixpkgs/pkgs/tools/filesystems/nixpart/0.4/blivet.nix b/nixpkgs/pkgs/tools/filesystems/nixpart/0.4/blivet.nix
index 48a72c5dd62..da2dff6b77a 100644
--- a/nixpkgs/pkgs/tools/filesystems/nixpart/0.4/blivet.nix
+++ b/nixpkgs/pkgs/tools/filesystems/nixpart/0.4/blivet.nix
@@ -3,6 +3,7 @@
{ stdenv, fetchurl, buildPythonApplication, pykickstart, pyparted, pyblock
, libselinux, cryptsetup, multipath_tools, lsof, utillinux
, useNixUdev ? true, systemd ? null
+# useNixUdev is here for bw compatibility
}:
assert useNixUdev -> systemd != null;
@@ -28,7 +29,6 @@ buildPythonApplication rec {
}' blivet/formats/__init__.py
sed -i -e 's|"lsof"|"${lsof}/bin/lsof"|' blivet/formats/fs.py
sed -i -r -e 's|"(u?mount)"|"${utillinux.bin}/bin/\1"|' blivet/util.py
- '' + stdenv.lib.optionalString useNixUdev ''
sed -i -e '/find_library/,/find_library/ {
c libudev = "${systemd.lib}/lib/libudev.so.1"
}' blivet/pyudev.py
diff --git a/nixpkgs/pkgs/tools/filesystems/nixpart/0.4/lvm2.nix b/nixpkgs/pkgs/tools/filesystems/nixpart/0.4/lvm2.nix
index 7c92dc95268..804b052b61a 100644
--- a/nixpkgs/pkgs/tools/filesystems/nixpart/0.4/lvm2.nix
+++ b/nixpkgs/pkgs/tools/filesystems/nixpart/0.4/lvm2.nix
@@ -40,7 +40,7 @@ stdenv.mkDerivation {
#patches = [ ./purity.patch ];
# To prevent make install from failing.
- preInstall = "installFlags=\"OWNER= GROUP= confdir=$out/etc\"";
+ installFlags = [ "OWNER=" "GROUP=" "confdir=${placeholder "out"}/etc" ];
# Install systemd stuff.
#installTargets = "install install_systemd_generators install_systemd_units install_tmpfiles_configuration";
diff --git a/nixpkgs/pkgs/tools/filesystems/reiser4progs/default.nix b/nixpkgs/pkgs/tools/filesystems/reiser4progs/default.nix
index c9af30f873b..dbc391d0082 100644
--- a/nixpkgs/pkgs/tools/filesystems/reiser4progs/default.nix
+++ b/nixpkgs/pkgs/tools/filesystems/reiser4progs/default.nix
@@ -1,13 +1,13 @@
{stdenv, fetchurl, libaal}:
-let version = "1.2.1"; in
+let version = "2.0.0"; in
stdenv.mkDerivation rec {
pname = "reiser4progs";
inherit version;
src = fetchurl {
url = "mirror://sourceforge/reiser4/reiser4-utils/${pname}-${version}.tar.gz";
- sha256 = "03vdqvpyd48wxrpqpb9kg76giaffw9b8k334kr4wc0zxgybknhl7";
+ sha256 = "00kx9prz3d5plp1hn4xdkkd99cw42sanlsjnjhj0fsrlmi9yfs8n";
};
buildInputs = [libaal];
diff --git a/nixpkgs/pkgs/tools/filesystems/sasquatch/default.nix b/nixpkgs/pkgs/tools/filesystems/sasquatch/default.nix
index c393c65a720..36ac3630e54 100644
--- a/nixpkgs/pkgs/tools/filesystems/sasquatch/default.nix
+++ b/nixpkgs/pkgs/tools/filesystems/sasquatch/default.nix
@@ -38,7 +38,7 @@ stdenv.mkDerivation rec {
cd squashfs-tools
'';
- installFlags = "INSTALL_DIR=\${out}/bin";
+ installFlags = [ "INSTALL_DIR=\${out}/bin" ];
makeFlags = [ "XZ_SUPPORT=1" ]
++ stdenv.lib.optional lz4Support "LZ4_SUPPORT=1";
diff --git a/nixpkgs/pkgs/tools/filesystems/squashfs/default.nix b/nixpkgs/pkgs/tools/filesystems/squashfs/default.nix
index 15a535eed3b..f02a913bc25 100644
--- a/nixpkgs/pkgs/tools/filesystems/squashfs/default.nix
+++ b/nixpkgs/pkgs/tools/filesystems/squashfs/default.nix
@@ -29,7 +29,7 @@ stdenv.mkDerivation {
preBuild = "cd squashfs-tools";
- installFlags = "INSTALL_DIR=\${out}/bin";
+ installFlags = [ "INSTALL_DIR=\${out}/bin" ];
makeFlags = [ "XZ_SUPPORT=1" "ZSTD_SUPPORT=1" ]
++ stdenv.lib.optional lz4Support "LZ4_SUPPORT=1";
diff --git a/nixpkgs/pkgs/tools/filesystems/sshfs-fuse/default.nix b/nixpkgs/pkgs/tools/filesystems/sshfs-fuse/default.nix
index 33fc5ce2ab6..018dfe7858e 100644
--- a/nixpkgs/pkgs/tools/filesystems/sshfs-fuse/default.nix
+++ b/nixpkgs/pkgs/tools/filesystems/sshfs-fuse/default.nix
@@ -1,30 +1,26 @@
-{ stdenv, fetchFromGitHub, fetchpatch, meson, pkgconfig, ninja, docutils, makeWrapper
+{ stdenv, fetchFromGitHub
+, meson, pkgconfig, ninja, docutils, makeWrapper
, fuse3, glib
, which, python3Packages
, openssh
}:
stdenv.mkDerivation rec {
- version = "3.6.0";
+ version = "3.7.0";
pname = "sshfs-fuse";
src = fetchFromGitHub {
owner = "libfuse";
repo = "sshfs";
rev = "sshfs-${version}";
- sha256 = "0l4a6azsp920fhl4safxjam6821b77zxhw8mjgm33f60pksslww0";
+ sha256 = "119qvjaai3nqs2psqk2kv4gxjchrnrcfnmlwk7yxnj3v59pgyxhv";
};
- patches = [ (fetchpatch {
- url = "https://github.com/libfuse/sshfs/commit/a548abd1f33a8423bec72724a5f48eb96fa55dd2.patch";
- sha256 = "19p94aw7nvydd7p2bd1f5cqhlhhamjhda31k22sg06xaqyl893jm";
- }) ];
-
nativeBuildInputs = [ meson pkgconfig ninja docutils makeWrapper ];
buildInputs = [ fuse3 glib ];
checkInputs = [ which python3Packages.pytest ];
- NIX_CFLAGS_COMPILE = stdenv.lib.optional
+ NIX_CFLAGS_COMPILE = stdenv.lib.optionalString
(stdenv.hostPlatform.system == "i686-linux")
"-D_FILE_OFFSET_BITS=64";
diff --git a/nixpkgs/pkgs/tools/graphics/appleseed/default.nix b/nixpkgs/pkgs/tools/graphics/appleseed/default.nix
index d7603c42fca..cafe0bb7b11 100644
--- a/nixpkgs/pkgs/tools/graphics/appleseed/default.nix
+++ b/nixpkgs/pkgs/tools/graphics/appleseed/default.nix
@@ -24,7 +24,7 @@ in stdenv.mkDerivation rec {
osl seexpr makeWrapper
];
- NIX_CFLAGS_COMPILE = [
+ NIX_CFLAGS_COMPILE = toString [
"-I${openexr.dev}/include/OpenEXR"
"-I${ilmbase.dev}/include/OpenEXR"
"-I${openimageio.dev}/include/OpenImageIO"
@@ -33,6 +33,7 @@ in stdenv.mkDerivation rec {
"-Wno-error=class-memaccess"
"-Wno-error=maybe-uninitialized"
"-Wno-error=catch-value"
+ "-Wno-error=stringop-truncation"
];
cmakeFlags = [
diff --git a/nixpkgs/pkgs/tools/graphics/argyllcms/default.nix b/nixpkgs/pkgs/tools/graphics/argyllcms/default.nix
index 160b77229b3..1326d045459 100644
--- a/nixpkgs/pkgs/tools/graphics/argyllcms/default.nix
+++ b/nixpkgs/pkgs/tools/graphics/argyllcms/default.nix
@@ -94,9 +94,11 @@ stdenv.mkDerivation rec {
libXrender libXScrnSaver libXdmcp libXau openssl
];
- buildFlags = "PREFIX=$(out) all";
+ buildFlags = [ "all" ];
- installFlags = "PREFIX=$(out)";
+ makeFlags = [
+ "PREFIX=${placeholder ''out''}"
+ ];
# Install udev rules, but remove lines that set up the udev-acl
# stuff, since that is handled by udev's own rules (70-udev-acl.rules)
diff --git a/nixpkgs/pkgs/tools/graphics/asymptote/default.nix b/nixpkgs/pkgs/tools/graphics/asymptote/default.nix
index 9b7c4010791..31bdba26783 100644
--- a/nixpkgs/pkgs/tools/graphics/asymptote/default.nix
+++ b/nixpkgs/pkgs/tools/graphics/asymptote/default.nix
@@ -9,14 +9,14 @@
}:
stdenv.mkDerivation rec {
- version = "2.60";
+ version = "2.61";
pname = "asymptote";
src = fetchFromGitHub {
owner = "vectorgraphics";
repo = pname;
rev = version;
- sha256 = "1sr31r80jfswlx9a0p5bn85p6h7mq28fw8ihhnlbhphii6w8z2j9";
+ sha256 = "0nblcxqzaxv1286zl2fjkivgp478l0nf3m0wnk78rd99lscjlw71";
};
nativeBuildInputs = [
@@ -54,7 +54,7 @@ stdenv.mkDerivation rec {
"--with-context=$out/share/texmf/tex/context/third"
];
- NIX_CFLAGS_COMPILE = [ "-I${boehmgc.dev}/include/gc" ];
+ NIX_CFLAGS_COMPILE = "-I${boehmgc.dev}/include/gc";
postInstall = ''
mv $out/share/info/asymptote/*.info $out/share/info/
diff --git a/nixpkgs/pkgs/tools/graphics/dcraw/default.nix b/nixpkgs/pkgs/tools/graphics/dcraw/default.nix
index e4ceff36f92..11ff4b743dd 100644
--- a/nixpkgs/pkgs/tools/graphics/dcraw/default.nix
+++ b/nixpkgs/pkgs/tools/graphics/dcraw/default.nix
@@ -4,7 +4,7 @@ stdenv.mkDerivation rec {
name = "dcraw-9.28.0";
src = fetchurl {
- url = "https://www.cybercom.net/~dcoffin/dcraw/archive/${name}.tar.gz";
+ url = "https://www.dechifro.org/dcraw/archive/${name}.tar.gz";
sha256 = "1fdl3xa1fbm71xzc3760rsjkvf0x5jdjrvdzyg2l9ka24vdc7418";
};
@@ -23,10 +23,17 @@ stdenv.mkDerivation rec {
'';
meta = {
- homepage = http://www.cybercom.net/~dcoffin/dcraw/;
+ homepage = https://www.dechifro.org/dcraw/;
description = "Decoder for many camera raw picture formats";
license = stdenv.lib.licenses.free;
platforms = stdenv.lib.platforms.unix; # Once had cygwin problems
maintainers = [ ];
+ knownVulnerabilities = [
+ "CVE-2018-19655"
+ "CVE-2018-19565"
+ "CVE-2018-19566"
+ "CVE-2018-19567"
+ "CVE-2018-19568"
+ ];
};
}
diff --git a/nixpkgs/pkgs/tools/graphics/dpic/default.nix b/nixpkgs/pkgs/tools/graphics/dpic/default.nix
index 7a9217302d6..62fa83800cb 100644
--- a/nixpkgs/pkgs/tools/graphics/dpic/default.nix
+++ b/nixpkgs/pkgs/tools/graphics/dpic/default.nix
@@ -2,16 +2,16 @@
stdenv.mkDerivation rec {
pname = "dpic";
- version = "2019.08.30";
+ version = "2019.11.30";
src = fetchurl {
url = "https://ece.uwaterloo.ca/~aplevich/dpic/${pname}-${version}.tar.gz";
- sha256 = "059m53cppw67hwygm7l03ciaxbnaldx63bqdhx1vzbx3kiwz8iw2";
+ sha256 = "0rgd31mdbaqbm9rz49872s17n25n5ajxcn61xailz3f0kzr4f3dg";
};
phases = [ "unpackPhase" "buildPhase" "installPhase" ];
- makeFlags = "CC=${stdenv.cc.outPath}/bin/cc";
+ makeFlags = [ "CC=${stdenv.cc.outPath}/bin/cc" ];
installPhase = ''
mkdir -p $out/bin
diff --git a/nixpkgs/pkgs/tools/graphics/enblend-enfuse/default.nix b/nixpkgs/pkgs/tools/graphics/enblend-enfuse/default.nix
index 79c90575653..8c46e8154c1 100644
--- a/nixpkgs/pkgs/tools/graphics/enblend-enfuse/default.nix
+++ b/nixpkgs/pkgs/tools/graphics/enblend-enfuse/default.nix
@@ -1,5 +1,5 @@
{ stdenv, fetchurl
-, boost, freeglut, glew, gsl, lcms2, libpng, libtiff, libGLU_combined, vigra
+, boost, freeglut, glew, gsl, lcms2, libpng, libtiff, libGLU, libGL, vigra
, help2man, pkgconfig, perl, texlive }:
stdenv.mkDerivation rec {
@@ -11,7 +11,7 @@ stdenv.mkDerivation rec {
sha256 = "0j5x011ilalb47ssah50ag0a4phgh1b0wdgxdbbp1gcyjcjf60w7";
};
- buildInputs = [ boost freeglut glew gsl lcms2 libpng libtiff libGLU_combined vigra ];
+ buildInputs = [ boost freeglut glew gsl lcms2 libpng libtiff libGLU libGL vigra ];
nativeBuildInputs = [ help2man perl pkgconfig texlive.combined.scheme-small ];
diff --git a/nixpkgs/pkgs/tools/graphics/fim/default.nix b/nixpkgs/pkgs/tools/graphics/fim/default.nix
index 296ba43a5ed..3fc82a9c72a 100644
--- a/nixpkgs/pkgs/tools/graphics/fim/default.nix
+++ b/nixpkgs/pkgs/tools/graphics/fim/default.nix
@@ -35,7 +35,7 @@ stdenv.mkDerivation rec {
++ optional jpegSupport libjpeg
++ optional pngSupport libpng;
- NIX_CFLAGS_COMPILE = stdenv.lib.optional x11Support "-lSDL";
+ NIX_CFLAGS_COMPILE = stdenv.lib.optionalString x11Support "-lSDL";
meta = with stdenv.lib; {
description = "A lightweight, highly customizable and scriptable image viewer";
diff --git a/nixpkgs/pkgs/tools/graphics/gifsicle/default.nix b/nixpkgs/pkgs/tools/graphics/gifsicle/default.nix
index 7d2323c6d48..9b3836b9dec 100644
--- a/nixpkgs/pkgs/tools/graphics/gifsicle/default.nix
+++ b/nixpkgs/pkgs/tools/graphics/gifsicle/default.nix
@@ -11,12 +11,11 @@ stdenv.mkDerivation rec {
sha256 = "0rffpzxcak19k6cngpxn73khvm3z1gswrqs90ycdzzb53p05ddas";
};
- buildInputs = optional gifview [ xorgproto libXt libX11 ];
+ buildInputs = optionals gifview [ xorgproto libXt libX11 ];
- configureFlags = []
- ++ optional (!gifview) [ "--disable-gifview" ];
+ configureFlags = optional (!gifview) "--disable-gifview";
- LDFLAGS = optional static "-static";
+ LDFLAGS = optionalString static "-static";
doCheck = true;
checkPhase = ''
@@ -28,6 +27,6 @@ stdenv.mkDerivation rec {
homepage = https://www.lcdf.org/gifsicle/;
license = stdenv.lib.licenses.gpl2;
platforms = platforms.all;
- maintainers = with stdenv.lib.maintainers; [ fuuzetsu zimbatm ];
+ maintainers = with stdenv.lib.maintainers; [ zimbatm ];
};
}
diff --git a/nixpkgs/pkgs/tools/graphics/glee/default.nix b/nixpkgs/pkgs/tools/graphics/glee/default.nix
index ae6291811a4..a68e64c0894 100644
--- a/nixpkgs/pkgs/tools/graphics/glee/default.nix
+++ b/nixpkgs/pkgs/tools/graphics/glee/default.nix
@@ -1,4 +1,4 @@
-{stdenv, fetchgit, cmake, libGLU_combined, xorg }:
+{stdenv, fetchgit, cmake, libGLU, libGL, xorg }:
stdenv.mkDerivation rec {
pname = "glee";
@@ -13,7 +13,7 @@ stdenv.mkDerivation rec {
nativeBuildInputs = [ cmake ];
- buildInputs = [ libGLU_combined xorg.libX11 ];
+ buildInputs = [ libGLU libGL xorg.libX11 ];
configureScript = ''
cmake
diff --git a/nixpkgs/pkgs/tools/graphics/gmic-qt/default.nix b/nixpkgs/pkgs/tools/graphics/gmic-qt/default.nix
index cb0862c6373..a8dd35ce7b0 100644
--- a/nixpkgs/pkgs/tools/graphics/gmic-qt/default.nix
+++ b/nixpkgs/pkgs/tools/graphics/gmic-qt/default.nix
@@ -7,7 +7,7 @@
, fetchFromGitLab
, cmake
, pkgconfig
-, opencv
+, opencv3
, openexr
, graphicsmagick
, fftw
@@ -120,7 +120,7 @@ mkDerivation rec {
libjpeg
libtiff
libpng
- opencv
+ opencv3
openexr
graphicsmagick
curl
diff --git a/nixpkgs/pkgs/tools/graphics/gmic/default.nix b/nixpkgs/pkgs/tools/graphics/gmic/default.nix
index 54b140cdb3e..3f181d12ba0 100644
--- a/nixpkgs/pkgs/tools/graphics/gmic/default.nix
+++ b/nixpkgs/pkgs/tools/graphics/gmic/default.nix
@@ -3,7 +3,7 @@
, cmake
, ninja
, pkgconfig
-, opencv
+, opencv3
, openexr
, graphicsmagick
, fftw
@@ -36,7 +36,7 @@ stdenv.mkDerivation rec {
libjpeg
libtiff
libpng
- opencv
+ opencv3
openexr
graphicsmagick
];
diff --git a/nixpkgs/pkgs/tools/graphics/gnuplot/default.nix b/nixpkgs/pkgs/tools/graphics/gnuplot/default.nix
index 7e823711e33..0ac1c1a2155 100644
--- a/nixpkgs/pkgs/tools/graphics/gnuplot/default.nix
+++ b/nixpkgs/pkgs/tools/graphics/gnuplot/default.nix
@@ -11,19 +11,20 @@
, fontconfig ? null
, gnused ? null
, coreutils ? null
-, withQt ? false, qttools, qtbase, qtsvg
+, withQt ? false, mkDerivation, qttools, qtbase, qtsvg
}:
assert libX11 != null -> (fontconfig != null && gnused != null && coreutils != null);
let
withX = libX11 != null && !aquaterm && !stdenv.isDarwin;
in
-stdenv.mkDerivation rec {
- name = "gnuplot-5.2.7";
+(if withQt then mkDerivation else stdenv.mkDerivation) rec {
+ pname = "gnuplot";
+ version = "5.2.8";
src = fetchurl {
- url = "mirror://sourceforge/gnuplot/${name}.tar.gz";
- sha256 = "1vglp4la40f5dpj0zdj63zprrkyjgzy068p35bz5dqxjyczm1zlp";
+ url = "mirror://sourceforge/gnuplot/${pname}-${version}.tar.gz";
+ sha256 = "0dxc52d17mpyb2xm24da1nvhlacryv0irwa0q5l1cjj0rx67d9k0";
};
nativeBuildInputs = [ makeWrapper pkgconfig texinfo ] ++ lib.optional withQt qttools;
diff --git a/nixpkgs/pkgs/tools/graphics/graphviz/base.nix b/nixpkgs/pkgs/tools/graphics/graphviz/base.nix
index cd2302efd16..3b9d8a4cca5 100644
--- a/nixpkgs/pkgs/tools/graphics/graphviz/base.nix
+++ b/nixpkgs/pkgs/tools/graphics/graphviz/base.nix
@@ -7,7 +7,7 @@
assert stdenv.isDarwin -> ApplicationServices != null;
let
- inherit (stdenv.lib) optionals optionalString;
+ inherit (stdenv.lib) optional optionals optionalString;
raw_patch =
# https://gitlab.com/graphviz/graphviz/issues/1367 CVE-2018-10196
fetchpatch {
@@ -17,11 +17,13 @@ let
excludes = ["tests/*"]; # we don't run them and they don't apply
};
# the patch needs a small adaption for older versions
- patch = if stdenv.lib.versionAtLeast version "2.37" then raw_patch else
+ patchToUse = if stdenv.lib.versionAtLeast version "2.37" then raw_patch else
stdenv.mkDerivation {
inherit (raw_patch) name;
buildCommand = "sed s/dot_root/agroot/g ${raw_patch} > $out";
};
+ # 2.42 has the patch included
+ patches = optional (stdenv.lib.versionOlder version "2.42") patchToUse;
in
stdenv.mkDerivation {
@@ -50,11 +52,9 @@ stdenv.mkDerivation {
configureFlags = [
"--with-ltdl-lib=${libtool.lib}/lib"
"--with-ltdl-include=${libtool}/include"
- ] ++ stdenv.lib.optional (xorg == null) [ "--without-x" ];
+ ] ++ stdenv.lib.optional (xorg == null) "--without-x";
- patches = [
- patch
- ];
+ inherit patches;
postPatch = ''
for f in $(find . -name Makefile.in); do
diff --git a/nixpkgs/pkgs/tools/graphics/graphviz/default.nix b/nixpkgs/pkgs/tools/graphics/graphviz/default.nix
index 7249a6cdaad..c79fe3aaf4d 100644
--- a/nixpkgs/pkgs/tools/graphics/graphviz/default.nix
+++ b/nixpkgs/pkgs/tools/graphics/graphviz/default.nix
@@ -1,5 +1,5 @@
import ./base.nix rec {
- rev = "67cd2e5121379a38e0801cc05cce5033f8a2a609";
- version = "2.40.1";
- sha256 = "1xjqq3g2n6jgwp5xzyvibgrxawlskkpam69fjjz9ksrrjas2qwzj";
+ rev = "da4c2ec6f24ca1b6d1752c6b5bc4389e55682147"; # use rev as tags have disappeared before
+ version = "2.42.2";
+ sha256 = "0lacl11amyvj04j78m63qifljl4c0nkyy50z4bkg8mg9j4hjdy0x";
}
diff --git a/nixpkgs/pkgs/tools/graphics/ifm/default.nix b/nixpkgs/pkgs/tools/graphics/ifm/default.nix
new file mode 100644
index 00000000000..c6e8df31dd0
--- /dev/null
+++ b/nixpkgs/pkgs/tools/graphics/ifm/default.nix
@@ -0,0 +1,25 @@
+{ lib, stdenv, fetchzip, autoreconfHook, bison, flex, help2man, perl, tk }:
+
+stdenv.mkDerivation rec {
+ pname = "ifm";
+ version = "2015-11-08";
+
+ src = fetchzip {
+ url = "https://bitbucket.org/zondo/ifm/get/dca0774e4d3a.zip";
+ sha256 = "14af21qjd5jvsscm6vxpsdrnipdr33g6niagzmykrhyfhwcbjahi";
+ };
+
+ nativeBuildInputs = [ autoreconfHook bison flex help2man ];
+
+ buildInputs = [ perl tk ]; # perl and wish are not run but written as shebangs.
+
+ enableParallelBuilding = false; # ifm-scan.l:16:10: fatal error: ifm-parse.h: No such file or directory
+
+ meta = with lib; {
+ homepage = https://bitbucket.org/zondo/ifm;
+ description = "Interactive fiction mapper";
+ license = licenses.gpl2;
+ platforms = platforms.linux;
+ maintainers = with maintainers; [ orivej ];
+ };
+}
diff --git a/nixpkgs/pkgs/tools/graphics/kst/default.nix b/nixpkgs/pkgs/tools/graphics/kst/default.nix
index 24d678e1142..480ae328cd3 100644
--- a/nixpkgs/pkgs/tools/graphics/kst/default.nix
+++ b/nixpkgs/pkgs/tools/graphics/kst/default.nix
@@ -11,7 +11,7 @@ stdenv.mkDerivation rec {
nativeBuildInputs = [ cmake pkgconfig ];
buildInputs = [ qtbase gsl getdata netcdf muparser matio ];
- cmakeFlags = "-Dkst_qt5=1 -Dkst_release=1";
+ cmakeFlags = [ "-Dkst_qt5=1" "-Dkst_release=1" ];
postInstall = ''
mkdir -p $out
diff --git a/nixpkgs/pkgs/tools/graphics/logstalgia/default.nix b/nixpkgs/pkgs/tools/graphics/logstalgia/default.nix
index 1f1da8df3f2..aed8b0573ba 100644
--- a/nixpkgs/pkgs/tools/graphics/logstalgia/default.nix
+++ b/nixpkgs/pkgs/tools/graphics/logstalgia/default.nix
@@ -1,5 +1,5 @@
{ stdenv, fetchurl, SDL2, ftgl, pkgconfig, libpng, libjpeg, pcre, SDL2_image, glew
-, libGLU_combined, boost, glm, freetype }:
+, libGLU, libGL, boost, glm, freetype }:
stdenv.mkDerivation rec {
pname = "logstalgia";
@@ -11,7 +11,7 @@ stdenv.mkDerivation rec {
};
nativeBuildInputs = [ pkgconfig ];
- buildInputs = [ glew SDL2 ftgl libpng libjpeg pcre SDL2_image libGLU_combined boost
+ buildInputs = [ glew SDL2 ftgl libpng libjpeg pcre SDL2_image libGLU libGL boost
glm freetype ];
meta = with stdenv.lib; {
diff --git a/nixpkgs/pkgs/tools/graphics/luxcorerender/default.nix b/nixpkgs/pkgs/tools/graphics/luxcorerender/default.nix
index 4826bd64984..6a0db954da6 100644
--- a/nixpkgs/pkgs/tools/graphics/luxcorerender/default.nix
+++ b/nixpkgs/pkgs/tools/graphics/luxcorerender/default.nix
@@ -1,7 +1,7 @@
{ stdenv, fetchFromGitHub, cmake, boost165, pkgconfig, python35
, tbb, openimageio, libjpeg, libpng, zlib, libtiff, ilmbase
, freetype, openexr, libXdmcp, libxkbcommon, epoxy, at-spi2-core
-, dbus, doxygen, qt5, c-blosc, libGLU, gnome3, gtk3, pcre
+, dbus, doxygen, qt5, c-blosc, libGLU, gnome3, dconf, gtk3, pcre
, bison, flex, libpthreadstubs, libX11
, embree2, makeWrapper, gsettings-desktop-schemas, glib
, withOpenCL ? true , opencl-headers, ocl-icd, opencl-clhpp
@@ -35,7 +35,7 @@ in stdenv.mkDerivation {
# needed for XDG_ICON_DIRS
gnome3.adwaita-icon-theme
makeWrapper
- (stdenv.lib.getLib gnome3.dconf)
+ (stdenv.lib.getLib dconf)
] ++ stdenv.lib.optionals withOpenCL [opencl-headers ocl-icd opencl-clhpp];
cmakeFlags = [
@@ -66,7 +66,7 @@ in stdenv.mkDerivation {
wrapProgram "$out/bin/luxcoreui" \
--prefix XDG_DATA_DIRS : "$GSETTINGS_SCHEMAS_PATH" \
--suffix XDG_DATA_DIRS : '${gnome3.adwaita-icon-theme}/share' \
- --prefix GIO_EXTRA_MODULES : "${stdenv.lib.getLib gnome3.dconf}/lib/gio/modules"
+ --prefix GIO_EXTRA_MODULES : "${stdenv.lib.getLib dconf}/lib/gio/modules"
'';
meta = with stdenv.lib; {
diff --git a/nixpkgs/pkgs/tools/graphics/nifskope/default.nix b/nixpkgs/pkgs/tools/graphics/nifskope/default.nix
index 0e545fbfab9..65ccfecedd6 100644
--- a/nixpkgs/pkgs/tools/graphics/nifskope/default.nix
+++ b/nixpkgs/pkgs/tools/graphics/nifskope/default.nix
@@ -1,4 +1,4 @@
-{ stdenv, fetchFromGitHub, qmake, qtbase, qttools, substituteAll, libGLU, wrapQtAppsHook }:
+{ stdenv, fetchFromGitHub, qmake, qtbase, qttools, substituteAll, libGLU, wrapQtAppsHook, fetchpatch }:
stdenv.mkDerivation {
pname = "nifskope";
@@ -18,7 +18,12 @@ stdenv.mkDerivation {
src = ./qttools-bins.patch;
qttools = "${qttools.dev}/bin";
})
- ];
+ (fetchpatch {
+ name = "qt512-build-fix.patch";
+ url = "https://github.com/niftools/nifskope/commit/30954e7f01f3d779a2a1fd37d363e8a6ad560bd3.patch";
+ sha256 = "0d6xjj2mjjhdd7w1aig5f75jksjni16jyj0lxsz51pys6xqb6fpj";
+ })
+ ] ++ (stdenv.lib.optional stdenv.isAarch64 ./no-sse-on-arm.patch);
buildInputs = [ qtbase qttools libGLU.dev ];
nativeBuildInputs = [ qmake wrapQtAppsHook ];
diff --git a/nixpkgs/pkgs/tools/graphics/nifskope/no-sse-on-arm.patch b/nixpkgs/pkgs/tools/graphics/nifskope/no-sse-on-arm.patch
new file mode 100644
index 00000000000..452fb1a76d5
--- /dev/null
+++ b/nixpkgs/pkgs/tools/graphics/nifskope/no-sse-on-arm.patch
@@ -0,0 +1,19 @@
+diff --git a/NifSkope.pro b/NifSkope.pro
+index cc29fc5..b17bb6e 100644
+--- a/NifSkope.pro
++++ b/NifSkope.pro
+@@ -428,13 +428,10 @@ win32 {
+ # Optimization flags
+ QMAKE_CXXFLAGS_DEBUG -= -O0 -g
+ QMAKE_CXXFLAGS_DEBUG *= -Og -g3
+- QMAKE_CXXFLAGS_RELEASE *= -O3 -mfpmath=sse
++ QMAKE_CXXFLAGS_RELEASE *= -O3
+
+ # C++11 Support
+ QMAKE_CXXFLAGS_RELEASE *= -std=c++14
+-
+- # Extension flags
+- QMAKE_CXXFLAGS_RELEASE *= -msse2 -msse
+ }
+
+ win32 {
diff --git a/nixpkgs/pkgs/tools/graphics/pfstools/default.nix b/nixpkgs/pkgs/tools/graphics/pfstools/default.nix
index 068aea54595..6a0385614e8 100644
--- a/nixpkgs/pkgs/tools/graphics/pfstools/default.nix
+++ b/nixpkgs/pkgs/tools/graphics/pfstools/default.nix
@@ -1,5 +1,5 @@
{ stdenv, fetchurl, cmake, pkgconfig, darwin
-, openexr, zlib, imagemagick, libGLU_combined, freeglut, fftwFloat
+, openexr, zlib, imagemagick, libGLU, libGL, freeglut, fftwFloat
, fftw, gsl, libexif, perl, opencv, qt5, netpbm
}:
@@ -14,9 +14,7 @@ stdenv.mkDerivation rec {
outputs = [ "out" "dev" "man"];
- cmakeFlags = ''
- -DWITH_MATLAB=false
- '';
+ cmakeFlags = [ "-DWITH_MATLAB=false" ];
preConfigure = ''
rm cmake/FindNETPBM.cmake
@@ -34,7 +32,7 @@ stdenv.mkDerivation rec {
] ++ (if stdenv.isDarwin then (with darwin.apple_sdk.frameworks; [
OpenGL GLUT
]) else [
- libGLU_combined freeglut
+ libGLU libGL freeglut
]);
patches = [ ./threads.patch ./pfstools.patch ./pfsalign.patch ];
diff --git a/nixpkgs/pkgs/tools/graphics/pngcheck/default.nix b/nixpkgs/pkgs/tools/graphics/pngcheck/default.nix
index 6814a06e3b9..f7bd8d520c8 100644
--- a/nixpkgs/pkgs/tools/graphics/pngcheck/default.nix
+++ b/nixpkgs/pkgs/tools/graphics/pngcheck/default.nix
@@ -11,7 +11,7 @@ stdenv.mkDerivation rec {
hardeningDisable = [ "format" ];
makefile = "Makefile.unx";
- makeFlags = "ZPATH=${zlib.static}/lib";
+ makeFlags = [ "ZPATH=${zlib.static}/lib" ];
buildInputs = [ zlib ];
diff --git a/nixpkgs/pkgs/tools/graphics/quirc/default.nix b/nixpkgs/pkgs/tools/graphics/quirc/default.nix
index 9891ea5e52b..4b610ebbfef 100644
--- a/nixpkgs/pkgs/tools/graphics/quirc/default.nix
+++ b/nixpkgs/pkgs/tools/graphics/quirc/default.nix
@@ -28,7 +28,7 @@ stdenv.mkDerivation {
mkdir -p "$out"/{bin,lib,include}
find . -maxdepth 1 -type f -perm -0100 -exec cp '{}' "$out"/bin ';'
'';
- makeFlags = "PREFIX=$(out)";
+ makeFlags = [ "PREFIX=$(out)" ];
meta = {
inherit (s) version;
description = ''A small QR code decoding library'';
diff --git a/nixpkgs/pkgs/tools/graphics/vips/default.nix b/nixpkgs/pkgs/tools/graphics/vips/default.nix
index 3efbd6e0765..e551fc382fb 100644
--- a/nixpkgs/pkgs/tools/graphics/vips/default.nix
+++ b/nixpkgs/pkgs/tools/graphics/vips/default.nix
@@ -10,13 +10,13 @@
stdenv.mkDerivation rec {
pname = "vips";
- version = "8.8.3";
+ version = "8.8.4";
src = fetchFromGitHub {
owner = "libvips";
repo = "libvips";
rev = "v${version}";
- sha256 = "0wlwcgcp7d3vhjdbi3xlpvnj4jl4321vac9v1sr1mis4aivwzsrn";
+ sha256 = "1gw8srjf5r6dhg6g5hh91if302mcr44dzy87mv230ar7027kwwbi";
# Remove unicode file names which leads to different checksums on HFS+
# vs. other filesystems because of unicode normalisation.
extraPostFetch = ''
diff --git a/nixpkgs/pkgs/tools/graphics/zbar/default.nix b/nixpkgs/pkgs/tools/graphics/zbar/default.nix
index 9a071e6150f..7610b4e56fb 100644
--- a/nixpkgs/pkgs/tools/graphics/zbar/default.nix
+++ b/nixpkgs/pkgs/tools/graphics/zbar/default.nix
@@ -53,7 +53,7 @@ stdenv.mkDerivation rec {
];
# Disable assertions which include -dev QtBase file paths.
- NIX_CFLAGS_COMPILE = [ "-DQT_NO_DEBUG" ];
+ NIX_CFLAGS_COMPILE = "-DQT_NO_DEBUG";
configureFlags = [
"--without-python"
diff --git a/nixpkgs/pkgs/tools/inputmethods/fcitx/unwrapped.nix b/nixpkgs/pkgs/tools/inputmethods/fcitx/unwrapped.nix
index 636cb518fd2..60de9e6910e 100644
--- a/nixpkgs/pkgs/tools/inputmethods/fcitx/unwrapped.nix
+++ b/nixpkgs/pkgs/tools/inputmethods/fcitx/unwrapped.nix
@@ -75,20 +75,20 @@ stdenv.mkDerivation rec {
libxkbcommon libxml2 dbus cairo gtk2 gtk3 pango qt4 libuuid
];
- cmakeFlags = ''
- -DENABLE_QT_IM_MODULE=ON
- -DENABLE_GTK2_IM_MODULE=ON
- -DENABLE_GTK3_IM_MODULE=ON
- -DENABLE_GIR=OFF
- -DENABLE_OPENCC=OFF
- -DENABLE_PRESAGE=OFF
- -DENABLE_XDGAUTOSTART=OFF
- -DENABLE_PINYIN=${if withPinyin then "ON" else "OFF"}
- -DENABLE_TABLE=ON
- -DENABLE_SPELL=ON
- -DENABLE_QT_GUI=ON
- -DXKB_RULES_XML_FILE='${xkeyboard_config}/share/X11/xkb/rules/evdev.xml'
- '';
+ cmakeFlags = [
+ "-DENABLE_QT_IM_MODULE=ON"
+ "-DENABLE_GTK2_IM_MODULE=ON"
+ "-DENABLE_GTK3_IM_MODULE=ON"
+ "-DENABLE_GIR=OFF"
+ "-DENABLE_OPENCC=OFF"
+ "-DENABLE_PRESAGE=OFF"
+ "-DENABLE_XDGAUTOSTART=OFF"
+ "-DENABLE_PINYIN=${if withPinyin then "ON" else "OFF"}"
+ "-DENABLE_TABLE=ON"
+ "-DENABLE_SPELL=ON"
+ "-DENABLE_QT_GUI=ON"
+ "-DXKB_RULES_XML_FILE='${xkeyboard_config}/share/X11/xkb/rules/evdev.xml'"
+ ];
meta = with stdenv.lib; {
homepage = https://github.com/fcitx/fcitx;
diff --git a/nixpkgs/pkgs/tools/inputmethods/fusuma/Gemfile.lock b/nixpkgs/pkgs/tools/inputmethods/fusuma/Gemfile.lock
index 4038b50b44f..c35e7658d63 100644
--- a/nixpkgs/pkgs/tools/inputmethods/fusuma/Gemfile.lock
+++ b/nixpkgs/pkgs/tools/inputmethods/fusuma/Gemfile.lock
@@ -1,7 +1,7 @@
GEM
remote: https://rubygems.org/
specs:
- fusuma (0.10.2)
+ fusuma (1.3.0)
PLATFORMS
ruby
@@ -10,4 +10,4 @@ DEPENDENCIES
fusuma
BUNDLED WITH
- 1.16.3
+ 1.17.3
diff --git a/nixpkgs/pkgs/tools/inputmethods/fusuma/default.nix b/nixpkgs/pkgs/tools/inputmethods/fusuma/default.nix
index b410a21cd6b..a8901dfb0e4 100644
--- a/nixpkgs/pkgs/tools/inputmethods/fusuma/default.nix
+++ b/nixpkgs/pkgs/tools/inputmethods/fusuma/default.nix
@@ -16,9 +16,9 @@ bundlerApp {
meta = with lib; {
description = "Multitouch gestures with libinput driver on X11, Linux";
- homepage = https://github.com/iberianpig/fusuma;
- license = licenses.mit;
- maintainers = with maintainers; [ jfrankenau nicknovitski ];
- platforms = platforms.linux;
+ homepage = "https://github.com/iberianpig/fusuma";
+ license = licenses.mit;
+ maintainers = with maintainers; [ jfrankenau nicknovitski filalex77 ];
+ platforms = platforms.linux;
};
}
diff --git a/nixpkgs/pkgs/tools/inputmethods/fusuma/gemset.nix b/nixpkgs/pkgs/tools/inputmethods/fusuma/gemset.nix
index 2edf9c0886f..2dd9af421ba 100644
--- a/nixpkgs/pkgs/tools/inputmethods/fusuma/gemset.nix
+++ b/nixpkgs/pkgs/tools/inputmethods/fusuma/gemset.nix
@@ -1,10 +1,12 @@
{
fusuma = {
+ groups = ["default"];
+ platforms = [];
source = {
remotes = ["https://rubygems.org"];
- sha256 = "0hj64kafxj29gk53vj2syhs3vdywl3h9cpiknaqqm4srjx9g04a0";
+ sha256 = "150jc8jyqj3w4k13lf1ihqmm2sld1yawp4jwnf43jixnc9rmzx6f";
type = "gem";
};
- version = "0.10.2";
+ version = "1.3.0";
};
} \ No newline at end of file
diff --git a/nixpkgs/pkgs/tools/inputmethods/gebaar-libinput/default.nix b/nixpkgs/pkgs/tools/inputmethods/gebaar-libinput/default.nix
new file mode 100644
index 00000000000..6d4947e517e
--- /dev/null
+++ b/nixpkgs/pkgs/tools/inputmethods/gebaar-libinput/default.nix
@@ -0,0 +1,25 @@
+{ stdenv, lib, fetchFromGitHub, pkgconfig, cmake, libinput, zlib }:
+
+stdenv.mkDerivation rec {
+ pname = "gebaar-libinput";
+ version = "0.0.5";
+
+ src = fetchFromGitHub {
+ owner = "Coffee2CodeNL";
+ repo = pname;
+ rev = "v${version}";
+ sha256 = "1kqcgwkia1p195xr082838dvj1gqif9d63i8a52jb0lc32zzizh6";
+ fetchSubmodules = true;
+ };
+
+ nativeBuildInputs = [ pkgconfig cmake ];
+ buildInputs = [ libinput zlib ];
+
+ meta = with lib; {
+ description = "Gebaar, A Super Simple WM Independent Touchpad Gesture Daemon for libinput";
+ homepage = "https://github.com/Coffee2CodeNL/gebaar-libinput";
+ license = licenses.gpl3;
+ platforms = platforms.linux;
+ maintainers = with maintainers; [ colemickens lovesegfault ];
+ };
+}
diff --git a/nixpkgs/pkgs/tools/inputmethods/ibus-engines/ibus-anthy/default.nix b/nixpkgs/pkgs/tools/inputmethods/ibus-engines/ibus-anthy/default.nix
index d2f68fd5269..cfdfa85ad9f 100644
--- a/nixpkgs/pkgs/tools/inputmethods/ibus-engines/ibus-anthy/default.nix
+++ b/nixpkgs/pkgs/tools/inputmethods/ibus-engines/ibus-anthy/default.nix
@@ -1,35 +1,57 @@
-{ stdenv, fetchurl, intltool, pkgconfig
-, anthy, ibus, glib, gobject-introspection, gtk3, python3
+{ stdenv
+, fetchurl
+, gettext
+, pkgconfig
+, wrapGAppsHook
+, anthy
+, ibus
+, glib
+, gobject-introspection
+, gtk3
+, python3
}:
stdenv.mkDerivation rec {
pname = "ibus-anthy";
version = "1.5.11";
- meta = with stdenv.lib; {
- isIbusEngine = true;
- description = "IBus interface to the anthy input method";
- homepage = https://github.com/fujiwarat/ibus-anthy;
- license = licenses.gpl2Plus;
- platforms = platforms.linux;
- maintainers = with maintainers; [ gebner ericsagnes ];
+ src = fetchurl {
+ url = "https://github.com/ibus/ibus-anthy/releases/download/${version}/${pname}-${version}.tar.gz";
+ sha256 = "1zwgswpibh67sgbza8kvg03v06maxc08ihkgm5hmh333sjq9d5c0";
};
- configureFlags = [ "--with-anthy-zipcode=${anthy}/share/anthy/zipcode.t" ];
-
buildInputs = [
- anthy glib gobject-introspection gtk3 ibus (python3.withPackages (ps: [ps.pygobject3]))
+ anthy
+ glib
+ gtk3
+ ibus
+ (python3.withPackages (ps: [
+ ps.pygobject3
+ (ps.toPythonModule ibus)
+ ]))
+ ];
+
+ nativeBuildInputs = [
+ gettext
+ gobject-introspection
+ pkgconfig
+ wrapGAppsHook
];
- nativeBuildInputs = [ intltool pkgconfig python3.pkgs.wrapPython ];
+ configureFlags = [
+ "--with-anthy-zipcode=${anthy}/share/anthy/zipcode.t"
+ ];
postFixup = ''
- wrapPythonPrograms
substituteInPlace $out/share/ibus/component/anthy.xml --replace \$\{exec_prefix\} $out
'';
- src = fetchurl {
- url = "https://github.com/ibus/ibus-anthy/releases/download/${version}/${pname}-${version}.tar.gz";
- sha256 = "1zwgswpibh67sgbza8kvg03v06maxc08ihkgm5hmh333sjq9d5c0";
+ meta = with stdenv.lib; {
+ isIbusEngine = true;
+ description = "IBus interface to the anthy input method";
+ homepage = https://github.com/fujiwarat/ibus-anthy;
+ license = licenses.gpl2Plus;
+ platforms = platforms.linux;
+ maintainers = with maintainers; [ gebner ericsagnes ];
};
}
diff --git a/nixpkgs/pkgs/tools/inputmethods/ibus-engines/ibus-hangul/default.nix b/nixpkgs/pkgs/tools/inputmethods/ibus-engines/ibus-hangul/default.nix
index 0a38ccfa3bd..d5e2f50299e 100644
--- a/nixpkgs/pkgs/tools/inputmethods/ibus-engines/ibus-hangul/default.nix
+++ b/nixpkgs/pkgs/tools/inputmethods/ibus-engines/ibus-hangul/default.nix
@@ -1,7 +1,8 @@
{ stdenv
, fetchurl
, substituteAll
-, intltool
+, appstream-glib
+, gettext
, pkgconfig
, wrapGAppsHook
, gtk3
@@ -12,11 +13,11 @@
stdenv.mkDerivation rec {
pname = "ibus-hangul";
- version = "1.5.1";
+ version = "1.5.3";
src = fetchurl {
url = "https://github.com/choehwanjin/ibus-hangul/releases/download/${version}/${pname}-${version}.tar.gz";
- sha256 = "0gha8dfdf54rx8fv3yfikbgdg6lqq6l883lhg7q68ybvkjx9bwbs";
+ sha256 = "1400ba2p34vr9q285lqvjm73f6m677cgfdymmjpiwyrjgbbiqrjy";
};
patches = [
@@ -27,9 +28,9 @@ stdenv.mkDerivation rec {
];
nativeBuildInputs = [
- intltool
+ appstream-glib
+ gettext
pkgconfig
- python3.pkgs.wrapPython
wrapGAppsHook
];
diff --git a/nixpkgs/pkgs/tools/inputmethods/ibus-engines/ibus-libpinyin/default.nix b/nixpkgs/pkgs/tools/inputmethods/ibus-engines/ibus-libpinyin/default.nix
index fc4677e06b0..2c1d558f04d 100644
--- a/nixpkgs/pkgs/tools/inputmethods/ibus-engines/ibus-libpinyin/default.nix
+++ b/nixpkgs/pkgs/tools/inputmethods/ibus-engines/ibus-libpinyin/default.nix
@@ -1,33 +1,54 @@
-{ stdenv, fetchFromGitHub, autoreconfHook
-, intltool, pkgconfig, sqlite, libpinyin, db
-, ibus, glib, gtk3, python3
+{ stdenv
+, fetchFromGitHub
+, autoreconfHook
+, gettext
+, pkgconfig
+, wrapGAppsHook
+, sqlite
+, libpinyin
+, db
+, ibus
+, glib
+, gtk3
+, python3
}:
stdenv.mkDerivation rec {
pname = "ibus-libpinyin";
- version = "1.10.0";
+ version = "1.11.1";
src = fetchFromGitHub {
- owner = "libpinyin";
- repo = "ibus-libpinyin";
- rev = version;
- sha256 = "0zkzz6ig74nws8phqxbsggnpf5g5f2hxi0mdyn2m3s4nm14q3ma6";
+ owner = "libpinyin";
+ repo = "ibus-libpinyin";
+ rev = version;
+ sha256 = "0b8rilk9zil9gvfhlk3rphcby6ph11dw66j175wp0na6h6hjlaf2";
};
- buildInputs = [ ibus glib sqlite libpinyin python3 gtk3 db ];
- nativeBuildInputs = [ autoreconfHook intltool pkgconfig python3.pkgs.wrapPython ];
+ nativeBuildInputs = [
+ autoreconfHook
+ gettext
+ pkgconfig
+ wrapGAppsHook
+ ];
- postAutoreconf = ''
- intltoolize
- '';
-
- postFixup = "wrapPythonPrograms";
+ buildInputs = [
+ ibus
+ glib
+ sqlite
+ libpinyin
+ (python3.withPackages (pypkgs: with pypkgs; [
+ pygobject3
+ (toPythonModule ibus)
+ ]))
+ gtk3
+ db
+ ];
meta = with stdenv.lib; {
isIbusEngine = true;
- description = "IBus interface to the libpinyin input method";
- license = licenses.gpl2;
- maintainers = with maintainers; [ ericsagnes ];
- platforms = platforms.linux;
+ description = "IBus interface to the libpinyin input method";
+ license = licenses.gpl2;
+ maintainers = with maintainers; [ ericsagnes ];
+ platforms = platforms.linux;
};
}
diff --git a/nixpkgs/pkgs/tools/inputmethods/ibus-engines/ibus-m17n/default.nix b/nixpkgs/pkgs/tools/inputmethods/ibus-engines/ibus-m17n/default.nix
index 01b227f6f1b..c026a9d1a81 100644
--- a/nixpkgs/pkgs/tools/inputmethods/ibus-engines/ibus-m17n/default.nix
+++ b/nixpkgs/pkgs/tools/inputmethods/ibus-engines/ibus-m17n/default.nix
@@ -1,6 +1,14 @@
-{ stdenv, fetchFromGitHub
-, autoreconfHook, pkgconfig
-, ibus, m17n_lib, m17n_db, gettext, python3
+{ stdenv
+, fetchFromGitHub
+, autoreconfHook
+, pkgconfig
+, ibus
+, gtk3
+, m17n_lib
+, m17n_db
+, gettext
+, python3
+, wrapGAppsHook
}:
stdenv.mkDerivation rec {
@@ -8,27 +16,40 @@ stdenv.mkDerivation rec {
version = "1.4.1";
src = fetchFromGitHub {
- owner = "ibus";
- repo = "ibus-m17n";
- rev = version;
+ owner = "ibus";
+ repo = "ibus-m17n";
+ rev = version;
sha256 = "1xl7swqn46nhi43rka0zx666mpk667ykag3sz07x0zqrwi41frps";
};
- buildInputs = [
- ibus m17n_lib m17n_db gettext
- python3
+ nativeBuildInputs = [
+ autoreconfHook
+ gettext
+ pkgconfig
+ wrapGAppsHook
];
- nativeBuildInputs = [ autoreconfHook pkgconfig python3.pkgs.wrapPython ];
+ buildInputs = [
+ ibus
+ gtk3
+ m17n_lib
+ m17n_db
+ (python3.withPackages (ps: [
+ ps.pygobject3
+ (ps.toPythonModule ibus)
+ ]))
+ ];
- postFixup = "wrapPythonPrograms";
+ configureFlags = [
+ "--with-gtk=3.0"
+ ];
meta = with stdenv.lib; {
isIbusEngine = true;
- description = "m17n engine for ibus";
- homepage = https://github.com/ibus/ibus-m17n;
- license = licenses.gpl2;
- platforms = platforms.linux;
- maintainers = with maintainers; [ ericsagnes ];
+ description = "m17n engine for ibus";
+ homepage = https://github.com/ibus/ibus-m17n;
+ license = licenses.gpl2;
+ platforms = platforms.linux;
+ maintainers = with maintainers; [ ericsagnes ];
};
}
diff --git a/nixpkgs/pkgs/tools/inputmethods/ibus-engines/ibus-table/default.nix b/nixpkgs/pkgs/tools/inputmethods/ibus-engines/ibus-table/default.nix
index 8e34cb860a6..c95a9c1651c 100644
--- a/nixpkgs/pkgs/tools/inputmethods/ibus-engines/ibus-table/default.nix
+++ b/nixpkgs/pkgs/tools/inputmethods/ibus-engines/ibus-table/default.nix
@@ -32,7 +32,6 @@ stdenv.mkDerivation rec {
buildInputs = [
dconf
gtk3
- gobject-introspection
ibus
(python3.withPackages (pypkgs: with pypkgs; [
pygobject3
@@ -44,7 +43,7 @@ stdenv.mkDerivation rec {
autoreconfHook
docbook2x
pkgconfig
- python3.pkgs.wrapPython
+ gobject-introspection
wrapGAppsHook
];
diff --git a/nixpkgs/pkgs/tools/inputmethods/ibus-engines/ibus-typing-booster/default.nix b/nixpkgs/pkgs/tools/inputmethods/ibus-engines/ibus-typing-booster/default.nix
index 6980478f685..f1ca4226b47 100644
--- a/nixpkgs/pkgs/tools/inputmethods/ibus-engines/ibus-typing-booster/default.nix
+++ b/nixpkgs/pkgs/tools/inputmethods/ibus-engines/ibus-typing-booster/default.nix
@@ -13,13 +13,13 @@ in
stdenv.mkDerivation rec {
pname = "ibus-typing-booster";
- version = "2.7.0";
+ version = "2.7.4";
src = fetchFromGitHub {
owner = "mike-fabian";
repo = "ibus-typing-booster";
rev = version;
- sha256 = "1rd9dkjc9s15mxifcbr12944rsh8z66p0j6abh3iw8vkiylk674s";
+ sha256 = "0wp9y6cgxsb2z1hk899q7wybl7v49vkgx6x5zl4l706jm3w9qmg8";
};
patches = [ ./hunspell-dirs.patch ];
@@ -35,7 +35,7 @@ stdenv.mkDerivation rec {
homepage = https://mike-fabian.github.io/ibus-typing-booster/;
license = licenses.gpl3Plus;
description = "A typing booster engine for the IBus platform";
- maintainers = with maintainers; [ ma27 ];
+ maintainers = with maintainers; [ ];
isIbusEngine = true;
};
}
diff --git a/nixpkgs/pkgs/tools/inputmethods/ibus-engines/ibus-uniemoji/allow-wrapping.patch b/nixpkgs/pkgs/tools/inputmethods/ibus-engines/ibus-uniemoji/allow-wrapping.patch
new file mode 100644
index 00000000000..434c85d3dbe
--- /dev/null
+++ b/nixpkgs/pkgs/tools/inputmethods/ibus-engines/ibus-uniemoji/allow-wrapping.patch
@@ -0,0 +1,13 @@
+diff --git a/uniemoji.xml.in b/uniemoji.xml.in
+index 5fbfd0f..6fb8ad3 100644
+--- a/uniemoji.xml.in
++++ b/uniemoji.xml.in
+@@ -7,7 +7,7 @@
+ <license>GPL</license>
+ <author>Lalo Martins &lt;lalo.martins@gmail.com&gt;</author>
+ <homepage>https://github.com/salty-horse/ibus-uniemoji</homepage>
+- <exec>@PYTHON@ @DATADIR@/ibus-uniemoji/uniemoji.py --ibus</exec>
++ <exec>@DATADIR@/ibus-uniemoji/uniemoji.py --ibus</exec>
+ <textdomain>uniemoji</textdomain>
+ <engines>
+ <engine>
diff --git a/nixpkgs/pkgs/tools/inputmethods/ibus-engines/ibus-uniemoji/default.nix b/nixpkgs/pkgs/tools/inputmethods/ibus-engines/ibus-uniemoji/default.nix
index 107c8c60271..435d1154d4a 100644
--- a/nixpkgs/pkgs/tools/inputmethods/ibus-engines/ibus-uniemoji/default.nix
+++ b/nixpkgs/pkgs/tools/inputmethods/ibus-engines/ibus-uniemoji/default.nix
@@ -1,8 +1,19 @@
-{ stdenv, fetchFromGitHub
-, python3Packages
+{ stdenv
+, fetchFromGitHub
+, gobject-introspection
+, wrapGAppsHook
+, python3
+, ibus
}:
-stdenv.mkDerivation rec {
+let
+ python = python3.withPackages (ps: with ps; [
+ pygobject3
+ (toPythonModule ibus)
+ pyxdg
+ python-Levenshtein
+ ]);
+in stdenv.mkDerivation rec {
pname = "ibus-uniemoji";
version = "0.6.0";
@@ -13,25 +24,39 @@ stdenv.mkDerivation rec {
sha256 = "121zh3q0li1k537fcvbd4ns4jgl9bbb9gm9ihy8cfxgirv38lcfa";
};
- propagatedBuildInputs = with python3Packages; [ pyxdg python-Levenshtein pygobject3 ];
+ patches = [
+ # Do not run wrapper script with Python,
+ # the wrapped script will have Python in shebang anyway.
+ ./allow-wrapping.patch
+ ];
- nativeBuildInputs = [ python3Packages.wrapPython ];
+
+ nativeBuildInputs = [
+ wrapGAppsHook
+ gobject-introspection
+ ];
+
+ buildInputs = [
+ python
+ ibus
+ ];
+
+ makeFlags = [
+ "PREFIX=${placeholder ''out''}"
+ "SYSCONFDIR=${placeholder ''out''}/etc"
+ "PYTHON=${python.interpreter}"
+ ];
postFixup = ''
- buildPythonPath $out
- patchPythonScript $out/share/ibus-uniemoji/uniemoji.py
+ wrapGApp $out/share/ibus-uniemoji/uniemoji.py
'';
- makeFlags = [ "PREFIX=$(out)" "SYSCONFDIR=$(out)/etc"
- "PYTHON=${python3Packages.python.interpreter}"
- ];
-
meta = with stdenv.lib; {
isIbusEngine = true;
- description = "Input method (ibus) for entering unicode symbols and emoji by name";
- homepage = "https://github.com/salty-horse/ibus-uniemoji";
- license = with licenses; [ gpl3 mit ];
- platforms = platforms.linux;
- maintainers = with maintainers; [ aske ];
+ description = "Input method (ibus) for entering unicode symbols and emoji by name";
+ homepage = "https://github.com/salty-horse/ibus-uniemoji";
+ license = with licenses; [ gpl3 mit ];
+ platforms = platforms.linux;
+ maintainers = with maintainers; [ aske ];
};
}
diff --git a/nixpkgs/pkgs/tools/inputmethods/ibus/default.nix b/nixpkgs/pkgs/tools/inputmethods/ibus/default.nix
index 0dc339e51c6..4951074bc43 100644
--- a/nixpkgs/pkgs/tools/inputmethods/ibus/default.nix
+++ b/nixpkgs/pkgs/tools/inputmethods/ibus/default.nix
@@ -1,74 +1,43 @@
-{ stdenv, substituteAll, fetchurl, fetchFromGitHub, autoreconfHook, gettext, makeWrapper, pkgconfig
-, vala, wrapGAppsHook, dbus, dconf ? null, glib, gdk-pixbuf, gobject-introspection, gtk2
-, gtk3, gtk-doc, isocodes, python3, json-glib, libnotify ? null, enablePython2Library ? false
-, enableUI ? true, withWayland ? false, libxkbcommon ? null, wayland ? null
-, buildPackages, runtimeShell }:
+{ stdenv
+, substituteAll
+, fetchurl
+, fetchFromGitHub
+, autoreconfHook
+, gettext
+, makeWrapper
+, pkgconfig
+, vala
+, wrapGAppsHook
+, dbus
+, dconf ? null
+, glib
+, gdk-pixbuf
+, gobject-introspection
+, gtk2
+, gtk3
+, gtk-doc
+, isocodes
+, cldr-emoji-annotation
+, unicode-character-database
+, unicode-emoji
+, python3
+, json-glib
+, libnotify ? null
+, enablePython2Library ? false
+, enableUI ? true
+, withWayland ? false
+, libxkbcommon ? null
+, wayland ? null
+, buildPackages
+, runtimeShell
+, nixosTests
+}:
assert withWayland -> wayland != null && libxkbcommon != null;
with stdenv.lib;
let
- emojiSrcs = {
- data = fetchurl {
- url = "http://unicode.org/Public/emoji/5.0/emoji-data.txt";
- sha256 = "11jfz5rrvyc2ixliqfcjgmch4cn9mfy0x96qnpfcyz5fy1jvfyxf";
- };
- sequences = fetchurl {
- url = "http://unicode.org/Public/emoji/5.0/emoji-sequences.txt";
- sha256 = "09bii7f5mmladg0kl3n80fa9qaix6bv5ylm92x52j7wygzv0szb1";
- };
- variation-sequences = fetchurl {
- url = "http://unicode.org/Public/emoji/5.0/emoji-variation-sequences.txt";
- sha256 = "1wlg4gbq7spmpppjfy5zdl82sj0hc836p8gljgfrjmwsjgybq286";
- };
- zwj-sequences = fetchurl {
- url = "http://unicode.org/Public/emoji/5.0/emoji-zwj-sequences.txt";
- sha256 = "16gvzv76mjv9g81lm1m6cr3rpfqyn2k4hb9a62xd329252dhl25q";
- };
- test = fetchurl {
- url = "http://unicode.org/Public/emoji/5.0/emoji-test.txt";
- sha256 = "031qk2v8xdnba7hfinmgrmpglc9l8ll2hds6mw885p0hngdb3dgw";
- };
- };
- emojiData = stdenv.mkDerivation {
- name = "emoji-data-5.0";
- dontUnpack = true;
- installPhase = ''
- mkdir $out
- ${builtins.toString (flip mapAttrsToList emojiSrcs (k: v: "cp ${v} $out/emoji-${k}.txt;"))}
- '';
- };
- cldrEmojiAnnotation = stdenv.mkDerivation rec {
- pname = "cldr-emoji-annotation";
- version = "31.90.0_1";
- src = fetchFromGitHub {
- owner = "fujiwarat";
- repo = "cldr-emoji-annotation";
- rev = version;
- sha256 = "1vsj32bg8ab4d80rz0fxy6sj2lv31inzyjnddjm079bnvlaf2kih";
- };
- nativeBuildInputs = [ autoreconfHook ];
- };
- ucdVersion = "12.0.0";
- ucdSrcs = {
- NamesList = fetchurl {
- url = "https://www.unicode.org/Public/${ucdVersion}/ucd/NamesList.txt";
- sha256 = "c17c7726f562bd9ef869096807f0297e1edef9a58fdae1fbae487378fa43586f";
- };
- Blocks = fetchurl {
- url = "https://www.unicode.org/Public/${ucdVersion}/ucd/Blocks.txt";
- sha256 = "a1a3ca4381eb91f7b65afe7cb7df615cdcf67993fef4b486585f66b349993a10";
- };
- };
- ucd = stdenv.mkDerivation {
- name = "ucd-${ucdVersion}";
- dontUnpack = true;
- installPhase = ''
- mkdir $out
- ${builtins.toString (flip mapAttrsToList ucdSrcs (k: v: "cp ${v} $out/${k}.txt;"))}
- '';
- };
python3Runtime = python3.withPackages (ps: with ps; [ pygobject3 ]);
python3BuildEnv = python3.buildEnv.override {
# ImportError: No module named site
@@ -82,13 +51,13 @@ in
stdenv.mkDerivation rec {
pname = "ibus";
- version = "1.5.20";
+ version = "1.5.21";
src = fetchFromGitHub {
owner = "ibus";
repo = "ibus";
rev = version;
- sha256 = "1npavb896qrp6qbqayb0va4mpsi68wybcnlbjknzgssqyw2ylh9r";
+ sha256 = "0fjbqj7d2g5c8i1wdggzhz269xisxv4xb1pa9swalm5p2b2vrjlx";
};
patches = [
@@ -99,7 +68,7 @@ stdenv.mkDerivation rec {
})
];
- outputs = [ "out" "dev" ];
+ outputs = [ "out" "dev" "installedTests" ];
postPatch = ''
echo \#!${runtimeShell} > data/dconf/make-dconf-override-db.sh
@@ -116,9 +85,15 @@ stdenv.mkDerivation rec {
(enableFeature enablePython2Library "python-library")
(enableFeature enablePython2Library "python2") # XXX: python2 library does not work anyway
(enableFeature enableUI "ui")
- "--with-unicode-emoji-dir=${emojiData}"
- "--with-emoji-annotation-dir=${cldrEmojiAnnotation}/share/unicode/cldr/common/annotations"
- "--with-ucd-dir=${ucd}"
+ "--enable-install-tests"
+ "--with-unicode-emoji-dir=${unicode-emoji}/share/unicode/emoji"
+ "--with-emoji-annotation-dir=${cldr-emoji-annotation}/share/unicode/cldr/common/annotations"
+ "--with-ucd-dir=${unicode-character-database}/share/unicode"
+ ];
+
+ makeFlags = [
+ "test_execsdir=${placeholder ''installedTests''}/libexec/installed-tests/ibus"
+ "test_sourcesdir=${placeholder ''installedTests''}/share/installed-tests/ibus"
];
nativeBuildInputs = [
@@ -132,7 +107,9 @@ stdenv.mkDerivation rec {
wrapGAppsHook
];
- propagatedBuildInputs = [ glib ];
+ propagatedBuildInputs = [
+ glib
+ ];
buildInputs = [
dbus
@@ -154,10 +131,31 @@ stdenv.mkDerivation rec {
doCheck = false; # requires X11 daemon
doInstallCheck = true;
- installCheckPhase = "$out/bin/ibus version";
+ installCheckPhase = ''
+ $out/bin/ibus version
+ '';
+
+ postInstall = ''
+ # It has some hardcoded FHS paths and also we do not use it
+ # since we set up the environment in NixOS tests anyway.
+ moveToOutput "bin/ibus-desktop-testing-runner" "$installedTests"
+ '';
+
+ postFixup = ''
+ # set necessary environment also for tests
+ for f in $installedTests/libexec/installed-tests/ibus/*; do
+ wrapGApp $f
+ done
+ '';
+
+ passthru = {
+ tests = {
+ installed-tests = nixosTests.installed-tests.ibus;
+ };
+ };
meta = {
- homepage = https://github.com/ibus/ibus;
+ homepage = "https://github.com/ibus/ibus";
description = "Intelligent Input Bus, input method framework";
license = licenses.lgpl21Plus;
platforms = platforms.linux;
diff --git a/nixpkgs/pkgs/tools/inputmethods/ibus/fix-paths.patch b/nixpkgs/pkgs/tools/inputmethods/ibus/fix-paths.patch
index 192aa7d6395..60269c6c241 100644
--- a/nixpkgs/pkgs/tools/inputmethods/ibus/fix-paths.patch
+++ b/nixpkgs/pkgs/tools/inputmethods/ibus/fix-paths.patch
@@ -40,6 +40,6 @@
export IBUS_DATAROOTDIR=@datarootdir@
export IBUS_LOCALEDIR=@localedir@
export IBUS_LIBEXECDIR=${libexecdir}
--exec @PYTHON@ @prefix@/share/ibus/setup/main.py $@
+-exec ${PYTHON:-@PYTHON@} @prefix@/share/ibus/setup/main.py $@
+exec @pythonInterpreter@ @prefix@/share/ibus/setup/main.py $@
diff --git a/nixpkgs/pkgs/tools/inputmethods/touchegg/default.nix b/nixpkgs/pkgs/tools/inputmethods/touchegg/default.nix
index ff14a13da04..c915e812891 100644
--- a/nixpkgs/pkgs/tools/inputmethods/touchegg/default.nix
+++ b/nixpkgs/pkgs/tools/inputmethods/touchegg/default.nix
@@ -1,4 +1,4 @@
-{ stdenv, fetchurl, xorg, xorgserver, qt4, libGLU_combined, geis, qmake4Hook }:
+{ stdenv, fetchurl, xorg, xorgserver, qt4, libGLU, libGL, geis, qmake4Hook }:
stdenv.mkDerivation rec {
pname = "touchegg";
@@ -8,7 +8,7 @@ stdenv.mkDerivation rec {
sha256 = "95734815c7219d9a71282f3144b3526f2542b4fa270a8e69d644722d024b4038";
};
- buildInputs = [ xorgserver libGLU_combined xorg.libX11 xorg.libXtst xorg.libXext qt4 geis ];
+ buildInputs = [ xorgserver libGLU libGL xorg.libX11 xorg.libXtst xorg.libXext qt4 geis ];
nativeBuildInputs = [ qmake4Hook ];
diff --git a/nixpkgs/pkgs/tools/misc/3llo/default.nix b/nixpkgs/pkgs/tools/misc/3llo/default.nix
index 1f59d1f16a7..82a8d2aaad1 100644
--- a/nixpkgs/pkgs/tools/misc/3llo/default.nix
+++ b/nixpkgs/pkgs/tools/misc/3llo/default.nix
@@ -26,6 +26,6 @@ bundlerApp {
description = "Trello interactive CLI on terminal";
license = licenses.mit;
homepage = https://github.com/qcam/3llo;
- maintainers = with maintainers; [ ma27 ];
+ maintainers = with maintainers; [ ];
};
}
diff --git a/nixpkgs/pkgs/tools/misc/arp-scan/default.nix b/nixpkgs/pkgs/tools/misc/arp-scan/default.nix
index 4f50e0f556b..9a3164db5d7 100644
--- a/nixpkgs/pkgs/tools/misc/arp-scan/default.nix
+++ b/nixpkgs/pkgs/tools/misc/arp-scan/default.nix
@@ -2,13 +2,13 @@
stdenv.mkDerivation rec {
pname = "arp-scan";
- version = "1.9.5";
+ version = "1.9.7";
src = fetchFromGitHub {
owner = "royhills";
repo = "arp-scan";
- rev = "4de863c2627a05177eda7159692a588f9f520cd1";
- sha256 = "15zpfdybk2kh98shqs8qqd0f9nyi2ch2wcyv729rfj7yp0hif5mb";
+ rev = version;
+ sha256 = "1mf7a4f9vzvnkiavc87aqyciswggsb4fpy7j05jxnvjyyxv3l7gp";
};
perlModules = with perlPackages; [
@@ -19,11 +19,11 @@ stdenv.mkDerivation rec {
];
nativeBuildInputs = [ autoreconfHook ];
- buildInputs = [ libpcap makeWrapper ];
+ buildInputs = [ perlPackages.perl libpcap makeWrapper ];
postInstall = ''
for name in get-{oui,iab}; do
- wrapProgram "$out/bin/$name" --set PERL5LIB "${perlPackages.makePerlPath perlModules }"
+ wrapProgram "$out/bin/$name" --set PERL5LIB "${perlPackages.makeFullPerlPath perlModules}"
done;
'';
@@ -33,7 +33,7 @@ stdenv.mkDerivation rec {
Arp-scan is a command-line tool that uses the ARP protocol to discover
and fingerprint IP hosts on the local network.
'';
- homepage = http://www.nta-monitor.com/wiki/index.php/Arp-scan_Documentation;
+ homepage = "http://www.nta-monitor.com/wiki/index.php/Arp-scan_Documentation";
license = licenses.gpl3;
platforms = platforms.linux;
maintainers = with maintainers; [ bjornfor mikoim ];
diff --git a/nixpkgs/pkgs/tools/misc/automirror/default.nix b/nixpkgs/pkgs/tools/misc/automirror/default.nix
index 3bfb2d656d9..84778fb1c2d 100644
--- a/nixpkgs/pkgs/tools/misc/automirror/default.nix
+++ b/nixpkgs/pkgs/tools/misc/automirror/default.nix
@@ -15,7 +15,7 @@ stdenv.mkDerivation rec {
buildInputs = [ git ronn ];
- installFlags = "DESTDIR=$(out)";
+ installFlags = [ "DESTDIR=$(out)" ];
meta = with stdenv.lib; {
homepage = https://github.com/schlomo/automirror;
diff --git a/nixpkgs/pkgs/tools/misc/autorandr/default.nix b/nixpkgs/pkgs/tools/misc/autorandr/default.nix
index 25765589bee..adf73037af8 100644
--- a/nixpkgs/pkgs/tools/misc/autorandr/default.nix
+++ b/nixpkgs/pkgs/tools/misc/autorandr/default.nix
@@ -6,7 +6,7 @@
let
python = python3Packages.python;
- version = "1.8.1";
+ version = "1.9";
in
stdenv.mkDerivation {
pname = "autorandr";
@@ -49,7 +49,7 @@ in
owner = "phillipberndt";
repo = "autorandr";
rev = version;
- sha256 = "1bp1cqkrpg77rjyh4lq1agc719fmxn92jkiicf6nbhfl8kf3l3vy";
+ sha256 = "1bb0l7fcm5lcx9y02zdxv7pfdqf4v4gsc5br3v1x9gzjvqj64l7n";
};
meta = with stdenv.lib; {
diff --git a/nixpkgs/pkgs/tools/misc/bash_unit/default.nix b/nixpkgs/pkgs/tools/misc/bash_unit/default.nix
new file mode 100644
index 00000000000..f23ab45cfab
--- /dev/null
+++ b/nixpkgs/pkgs/tools/misc/bash_unit/default.nix
@@ -0,0 +1,27 @@
+{ fetchFromGitHub
+, stdenv
+}:
+
+stdenv.mkDerivation rec {
+ pname = "bash_unit";
+ version = "1.6.1";
+
+ src = fetchFromGitHub {
+ owner = "pgrange";
+ repo = pname;
+ rev = "v${version}";
+ sha256 = "0jcjpcyf569b12vm4jrd53iqrrsjvr8sp9y29w2ls38fm8a16vr6";
+ };
+
+ installPhase = ''
+ mkdir -p $out/bin
+ cp bash_unit $out/bin/
+ '';
+
+ meta = with stdenv.lib; {
+ description = "Bash unit testing enterprise edition framework for professionals";
+ maintainers = with maintainers; [ pamplemousse ];
+ platforms = platforms.linux;
+ license = licenses.gpl3Plus;
+ };
+}
diff --git a/nixpkgs/pkgs/tools/misc/bat/default.nix b/nixpkgs/pkgs/tools/misc/bat/default.nix
index 6b62ca247cb..6f5dc209b96 100644
--- a/nixpkgs/pkgs/tools/misc/bat/default.nix
+++ b/nixpkgs/pkgs/tools/misc/bat/default.nix
@@ -1,5 +1,5 @@
-{ stdenv, rustPlatform, fetchFromGitHub, llvmPackages, pkgconfig
-, Security, libiconv, installShellFiles
+{ stdenv, rustPlatform, fetchFromGitHub, llvmPackages, pkgconfig, less
+, Security, libiconv, installShellFiles, makeWrapper
}:
rustPlatform.buildRustPackage rec {
@@ -16,7 +16,7 @@ rustPlatform.buildRustPackage rec {
cargoSha256 = "0d7h0kn41w6wm4w63vjy2i7r19jkansfvfjn7vgh2gqh5m60kal2";
- nativeBuildInputs = [ pkgconfig llvmPackages.libclang installShellFiles ];
+ nativeBuildInputs = [ pkgconfig llvmPackages.libclang installShellFiles makeWrapper ];
buildInputs = stdenv.lib.optionals stdenv.isDarwin [ Security libiconv ];
@@ -27,6 +27,13 @@ rustPlatform.buildRustPackage rec {
installShellCompletion assets/completions/bat.fish
'';
+ # Insert Nix-built `less` into PATH because the system-provided one may be too old to behave as
+ # expected with certain flag combinations.
+ postFixup = ''
+ wrapProgram "$out/bin/bat" \
+ --prefix PATH : "${stdenv.lib.makeBinPath [ less ]}"
+ '';
+
meta = with stdenv.lib; {
description = "A cat(1) clone with syntax highlighting and Git integration";
homepage = https://github.com/sharkdp/bat;
diff --git a/nixpkgs/pkgs/tools/misc/bibtool/default.nix b/nixpkgs/pkgs/tools/misc/bibtool/default.nix
index 7664b96563b..df7564a4b84 100644
--- a/nixpkgs/pkgs/tools/misc/bibtool/default.nix
+++ b/nixpkgs/pkgs/tools/misc/bibtool/default.nix
@@ -12,7 +12,7 @@ stdenv.mkDerivation rec {
# Perl for running test suite.
buildInputs = [ perl ];
- installTargets = "install install.man";
+ installTargets = [ "install" "install.man" ];
doCheck = true;
diff --git a/nixpkgs/pkgs/tools/misc/birdfont/xmlbird.nix b/nixpkgs/pkgs/tools/misc/birdfont/xmlbird.nix
index a5581c84d50..3d51f282dae 100644
--- a/nixpkgs/pkgs/tools/misc/birdfont/xmlbird.nix
+++ b/nixpkgs/pkgs/tools/misc/birdfont/xmlbird.nix
@@ -2,11 +2,11 @@
stdenv.mkDerivation rec {
pname = "xmlbird";
- version = "1.2.10";
+ version = "1.2.11";
src = fetchurl {
url = "https://birdfont.org/${pname}-releases/lib${pname}-${version}.tar.xz";
- sha256 = "0qpqpqqd4wj711jzczfsr38fgcz1rzxchrqbssxnan659ycd9c78";
+ sha256 = "1ycbgjvywnlc0garw8qjqd18s0xnrwjvssdrb410yschv3wjq1i0";
};
nativeBuildInputs = [ python3 pkgconfig vala gobject-introspection ];
diff --git a/nixpkgs/pkgs/tools/misc/bonfire/default.nix b/nixpkgs/pkgs/tools/misc/bonfire/default.nix
index a5e4a42ef3c..12b0ad2abf1 100644
--- a/nixpkgs/pkgs/tools/misc/bonfire/default.nix
+++ b/nixpkgs/pkgs/tools/misc/bonfire/default.nix
@@ -3,9 +3,8 @@
with python3Packages;
buildPythonApplication rec {
- version = "2017-01-19";
pname = "bonfire";
- name = "${pname}-unstable-${version}";
+ version = "unstable-2017-01-19";
# use latest git version with --endpoint flag
# https://github.com/blue-yonder/bonfire/pull/18
@@ -25,7 +24,7 @@ buildPythonApplication rec {
# pip fails when encountering the git hash for the package version
substituteInPlace setup.py \
--replace "version=version," "version='${version}',"
- # remove extraneous files
+ # remove extraneous files
substituteInPlace setup.cfg \
--replace "data_files = *.rst, *.txt" ""
'';
@@ -45,6 +44,6 @@ buildPythonApplication rec {
license = licenses.bsd3;
maintainers = [ maintainers.womfoo ];
platforms = platforms.linux;
+ broken = true; # no longer compatible with new arrow package
};
-
}
diff --git a/nixpkgs/pkgs/tools/misc/byobu/default.nix b/nixpkgs/pkgs/tools/misc/byobu/default.nix
index 65196e2a3b6..94db365f6d6 100644
--- a/nixpkgs/pkgs/tools/misc/byobu/default.nix
+++ b/nixpkgs/pkgs/tools/misc/byobu/default.nix
@@ -1,12 +1,12 @@
{ stdenv, fetchurl, python3, perl, textual-window-manager }:
stdenv.mkDerivation rec {
- version = "5.129";
+ version = "5.130";
name = "byobu-" + version;
src = fetchurl {
url = "https://launchpad.net/byobu/trunk/${version}/+download/byobu_${version}.orig.tar.gz";
- sha256 = "1ff20xdi58pncw76hrkf7azqy0y654kwz1zff5irnd8cflh5y4z5";
+ sha256 = "0qblw5vz90fixvpwfvlc8bkljsviri5gj77cp63l44ns3lb19r27";
};
doCheck = true;
diff --git a/nixpkgs/pkgs/tools/misc/chezmoi/default.nix b/nixpkgs/pkgs/tools/misc/chezmoi/default.nix
index 587bc2b9278..637f7a17695 100644
--- a/nixpkgs/pkgs/tools/misc/chezmoi/default.nix
+++ b/nixpkgs/pkgs/tools/misc/chezmoi/default.nix
@@ -2,16 +2,16 @@
buildGoModule rec {
pname = "chezmoi";
- version = "1.7.2";
+ version = "1.7.10";
src = fetchFromGitHub {
owner = "twpayne";
repo = "chezmoi";
rev = "v${version}";
- sha256 = "06wgfnlzcs6yfrjpy6zhcg5y844zd22manbm2sfq5vyng02bg229";
+ sha256 = "1miki6p611s0m3s0q5qsc9cks0akm59ks3x1gzi9wvhzf6k9h0dn";
};
- modSha256 = "1y1q1lps3a8piikh8ds28yrw5r82af9pyl6vy87207z1y5v2hams";
+ modSha256 = "0rzwslpikadhqw8rcbg4hbasfcgjcc850ccfnprdxva4g1bb5rqc";
buildFlagsArray = [
"-ldflags=-s -w -X github.com/twpayne/chezmoi/cmd.VersionStr=${version}"
diff --git a/nixpkgs/pkgs/tools/misc/ckb-next/default.nix b/nixpkgs/pkgs/tools/misc/ckb-next/default.nix
index 575cb686f9d..738430f561b 100644
--- a/nixpkgs/pkgs/tools/misc/ckb-next/default.nix
+++ b/nixpkgs/pkgs/tools/misc/ckb-next/default.nix
@@ -2,14 +2,14 @@
, pkgconfig, qtbase, cmake, zlib, kmod }:
mkDerivation rec {
- version = "0.3.2";
+ version = "0.4.2";
pname = "ckb-next";
src = fetchFromGitHub {
owner = "ckb-next";
repo = "ckb-next";
rev = "v${version}";
- sha256 = "0ri5n7r1vhsgk6s64abvqcdrs5fmlwprw0rxiwfy0j8a9qcic1dr";
+ sha256 = "1mkx1psw5xnpscdfik1kpzsnfhhkn3571i7acr9gxyjr27sckplc";
};
buildInputs = [
@@ -25,11 +25,12 @@ mkDerivation rec {
cmakeFlags = [
"-DINSTALL_DIR_ANIMATIONS=libexec"
+ "-DUDEV_RULE_DIRECTORY=lib/udev/rules.d"
+ "-DFORCE_INIT_SYSTEM=systemd"
];
patches = [
./install-dirs.patch
- ./systemd-service.patch
(substituteAll {
name = "ckb-next-modprobe.patch";
src = ./modprobe.patch;
diff --git a/nixpkgs/pkgs/tools/misc/ckb-next/install-dirs.patch b/nixpkgs/pkgs/tools/misc/ckb-next/install-dirs.patch
index 5545292a65e..0f113d71aa3 100644
--- a/nixpkgs/pkgs/tools/misc/ckb-next/install-dirs.patch
+++ b/nixpkgs/pkgs/tools/misc/ckb-next/install-dirs.patch
@@ -1,32 +1,13 @@
diff --git a/src/daemon/CMakeLists.txt b/src/daemon/CMakeLists.txt
-index 09056a7..1bb4595 100644
+index 2fc10a8..22dbd14 100644
--- a/src/daemon/CMakeLists.txt
+++ b/src/daemon/CMakeLists.txt
-@@ -456,7 +456,7 @@ endif ()
- if (LINUX)
- install(
- FILES "${CMAKE_SOURCE_DIR}/linux/udev/99-ckb-daemon.rules"
-- DESTINATION "/etc/udev/rules.d"
-+ DESTINATION "${CMAKE_INSTALL_PREFIX}/lib/udev/rules.d"
- PERMISSIONS
- OWNER_READ OWNER_WRITE
- GROUP_READ
-diff --git a/src/libs/ckb-next/CMakeLists.txt b/src/libs/ckb-next/CMakeLists.txt
-index ecc591c..35de563 100644
---- a/src/libs/ckb-next/CMakeLists.txt
-+++ b/src/libs/ckb-next/CMakeLists.txt
-@@ -75,12 +75,12 @@ if(NOT MACOS)
- NAMESPACE
- ${CMAKE_PROJECT_NAME}::
- DESTINATION
-- "/usr/lib/cmake/${CMAKE_PROJECT_NAME}/${PROJECT_NAME}")
-+ "${CMAKE_INSTALL_PREFIX}/lib/cmake/${CMAKE_PROJECT_NAME}/${PROJECT_NAME}")
-
+@@ -421,7 +421,7 @@ if ("${CKB_NEXT_INIT_SYSTEM}" STREQUAL "launchd")
+ elseif ("${CKB_NEXT_INIT_SYSTEM}" STREQUAL "systemd")
install(
- FILES
- "cmake/${PROJECT_NAME}Config.cmake"
- "${CMAKE_CURRENT_BINARY_DIR}/${PROJECT_NAME}/${PROJECT_NAME}ConfigVersion.cmake"
- DESTINATION
-- "/usr/lib/cmake/${CMAKE_PROJECT_NAME}/${PROJECT_NAME}")
-+ "${CMAKE_INSTALL_PREFIX}/lib/cmake/${CMAKE_PROJECT_NAME}/${PROJECT_NAME}")
- endif()
+ FILES "${CMAKE_CURRENT_BINARY_DIR}/service/ckb-next-daemon.service"
+- DESTINATION "/usr/lib/systemd/system"
++ DESTINATION "${CMAKE_INSTALL_PREFIX}/lib/systemd/system"
+ PERMISSIONS
+ OWNER_READ OWNER_WRITE
+ GROUP_READ
diff --git a/nixpkgs/pkgs/tools/misc/ckb-next/modprobe.patch b/nixpkgs/pkgs/tools/misc/ckb-next/modprobe.patch
index f2156fc3b23..a2cbe262e89 100644
--- a/nixpkgs/pkgs/tools/misc/ckb-next/modprobe.patch
+++ b/nixpkgs/pkgs/tools/misc/ckb-next/modprobe.patch
@@ -1,26 +1,26 @@
diff --git a/src/daemon/input_linux.c b/src/daemon/input_linux.c
-index 1cedb07..8e0b24b 100644
+index 8489f5b..b851419 100644
--- a/src/daemon/input_linux.c
+++ b/src/daemon/input_linux.c
-@@ -58,7 +58,7 @@ int os_inputopen(usbdevice* kb){
- /// First check whether the uinput module is loaded by the kernel.
- ///
- // Load the uinput module (if it's not loaded already)
-- if(system("modprobe uinput") != 0) {
-+ if(system("@kmod@/bin/modprobe uinput") != 0) {
- ckb_fatal("Failed to load uinput module\n");
- return 1;
- }
+@@ -63,7 +63,7 @@ int os_inputopen(usbdevice* kb){
+
+ // If not available, load the module
+ if(fd < 0){
+- if(system("modprobe uinput") != 0) {
++ if(system("@kmod@/bin/modprobe uinput") != 0) {
+ ckb_fatal("Failed to load uinput module\n");
+ return 1;
+ }
diff --git a/src/gui/mainwindow.cpp b/src/gui/mainwindow.cpp
-index 3601146..3f2f78f 100644
+index 1eb95bd..f7d38ba 100644
--- a/src/gui/mainwindow.cpp
+++ b/src/gui/mainwindow.cpp
-@@ -251,7 +251,7 @@ void MainWindow::updateVersion(){
- daemonWarning.append(tr("<br /><b>Warning:</b> System Extension by \"Fumihiko Takayama\" is not allowed in Security & Privacy. Please allow it and then unplug and replug your devices."));
+@@ -284,7 +284,7 @@ void MainWindow::updateVersion(){
#elif defined(Q_OS_LINUX)
- QProcess modprobe;
-- modprobe.start("modprobe", QStringList("uinput"));
-+ modprobe.start("@kmod@/bin/modprobe", QStringList("uinput"));
+ if(!(QFileInfo("/dev/uinput").exists() || QFileInfo("/dev/input/uinput").exists())){
+ QProcess modprobe;
+- modprobe.start("modprobe", QStringList("uinput"));
++ modprobe.start("@kmod@/bin/modprobe", QStringList("uinput"));
- if(!modprobe.waitForFinished())
- qDebug() << "Modprobe error";
+ if(!modprobe.waitForFinished())
+ qDebug() << "Modprobe error";
diff --git a/nixpkgs/pkgs/tools/misc/ckb-next/systemd-service.patch b/nixpkgs/pkgs/tools/misc/ckb-next/systemd-service.patch
deleted file mode 100644
index 917bc09627f..00000000000
--- a/nixpkgs/pkgs/tools/misc/ckb-next/systemd-service.patch
+++ /dev/null
@@ -1,45 +0,0 @@
-diff --git a/src/daemon/CMakeLists.txt b/src/daemon/CMakeLists.txt
-index 09056a7..72a7249 100644
---- a/src/daemon/CMakeLists.txt
-+++ b/src/daemon/CMakeLists.txt
-@@ -249,12 +249,7 @@ elseif (LINUX)
- # but it is not enabled by default and systemd is used instead. (Ubuntu 15.04+)
-
- # A way to check for upstart
-- execute_process(
-- COMMAND initctl --version
-- OUTPUT_VARIABLE initctl_output
-- OUTPUT_STRIP_TRAILING_WHITESPACE)
--
-- if ("${initctl_output}" MATCHES "upstart")
-+ if (FALSE)
- message(STATUS "upstart detected")
- set(CKB_NEXT_INIT_SYSTEM "upstart" CACHE INTERNAL "")
- set(DISALLOW_SYSVINIT TRUE)
-@@ -292,7 +287,7 @@ elseif (LINUX)
- endif ()
-
- # A way to check for systemd
-- if (EXISTS "/run/systemd/system")
-+ if (TRUE)
- message(STATUS "systemd detected")
- set(CKB_NEXT_INIT_SYSTEM "systemd" CACHE INTERNAL "")
- set(DISALLOW_SYSVINIT TRUE)
-@@ -328,7 +323,7 @@ elseif (LINUX)
- endif ()
-
- # A way to check for OpenRC
-- if (EXISTS "/run/openrc/softlevel")
-+ if (FALSE)
- message(STATUS "OpenRC detected")
- set(CKB_NEXT_INIT_SYSTEM "OpenRC" CACHE INTERNAL "")
- set(DISALLOW_SYSVINIT TRUE)
-@@ -419,7 +414,7 @@ if ("${CKB_NEXT_INIT_SYSTEM}" STREQUAL "launchd")
- elseif ("${CKB_NEXT_INIT_SYSTEM}" STREQUAL "systemd")
- install(
- FILES "${CMAKE_CURRENT_BINARY_DIR}/service/ckb-next-daemon.service"
-- DESTINATION "/usr/lib/systemd/system"
-+ DESTINATION "${CMAKE_INSTALL_PREFIX}/lib/systemd/system"
- PERMISSIONS
- OWNER_READ OWNER_WRITE
- GROUP_READ
diff --git a/nixpkgs/pkgs/tools/misc/cloc/default.nix b/nixpkgs/pkgs/tools/misc/cloc/default.nix
index 39370e6754e..6d567f6119a 100644
--- a/nixpkgs/pkgs/tools/misc/cloc/default.nix
+++ b/nixpkgs/pkgs/tools/misc/cloc/default.nix
@@ -28,6 +28,6 @@ stdenv.mkDerivation rec {
homepage = https://github.com/AlDanial/cloc;
license = stdenv.lib.licenses.gpl2;
platforms = stdenv.lib.platforms.all;
- maintainers = with stdenv.lib.maintainers; [ fuuzetsu rycee ];
+ maintainers = with stdenv.lib.maintainers; [ rycee ];
};
}
diff --git a/nixpkgs/pkgs/tools/misc/cpulimit/default.nix b/nixpkgs/pkgs/tools/misc/cpulimit/default.nix
index 547e2a1f059..1978476a12d 100644
--- a/nixpkgs/pkgs/tools/misc/cpulimit/default.nix
+++ b/nixpkgs/pkgs/tools/misc/cpulimit/default.nix
@@ -9,12 +9,13 @@ stdenv.mkDerivation rec {
sha256 = "0xf0r6zxaqan1drz61nqf95p2pkiiihpvrjhrr9dx9j3vswyx31g";
};
- buildFlags = with stdenv;
+ buildFlags = with stdenv; [ (
if isDarwin then "osx"
else if isFreeBSD then "freebsd"
- else "cpulimit";
+ else "cpulimit"
+ ) ];
- installFlags = "PREFIX=$(out)";
+ installFlags = [ "PREFIX=$(out)" ];
meta = with stdenv.lib; {
homepage = http://limitcpu.sourceforge.net/;
diff --git a/nixpkgs/pkgs/tools/misc/ddcutil/default.nix b/nixpkgs/pkgs/tools/misc/ddcutil/default.nix
index a91fdad8d82..e3ba0abb8bc 100644
--- a/nixpkgs/pkgs/tools/misc/ddcutil/default.nix
+++ b/nixpkgs/pkgs/tools/misc/ddcutil/default.nix
@@ -3,13 +3,13 @@
stdenv.mkDerivation rec {
pname = "ddcutil";
- version = "0.9.7";
+ version = "0.9.8";
src = fetchFromGitHub {
owner = "rockowitz";
repo = "ddcutil";
rev = "v${version}";
- sha256 = "1p99kxgg2893ppp56q5igpva39lzj4wvx37c993r4p6i4gq6bi3v";
+ sha256 = "1r89cfw3ycqwvpfwwiqg8ykc1vyr1gf3ah30mvrmmalgmi6bnx5w";
};
nativeBuildInputs = [ autoreconfHook pkgconfig ];
diff --git a/nixpkgs/pkgs/tools/misc/debianutils/default.nix b/nixpkgs/pkgs/tools/misc/debianutils/default.nix
index b42c302a38f..74aec9bae6a 100644
--- a/nixpkgs/pkgs/tools/misc/debianutils/default.nix
+++ b/nixpkgs/pkgs/tools/misc/debianutils/default.nix
@@ -2,11 +2,11 @@
stdenv.mkDerivation rec {
pname = "debianutils";
- version = "4.8.6.3";
+ version = "4.9.1";
src = fetchurl {
url = "mirror://debian/pool/main/d/${pname}/${pname}_${version}.tar.xz";
- sha256 = "08g2gdm6n66w5m8qwm4f48wzgs3ymkpki6dg01nwzwbdzhxdxirc";
+ sha256 = "14a0fqdpwdw72790jjm01g5n7lwwaf9d6k78fflbysn5v62nd0mg";
};
meta = with stdenv.lib; {
@@ -20,5 +20,6 @@ stdenv.mkDerivation rec {
license = with licenses; [ gpl2Plus publicDomain smail ];
maintainers = [];
platforms = platforms.all;
+ broken = stdenv.isDarwin;
};
}
diff --git a/nixpkgs/pkgs/tools/misc/diffoscope/default.nix b/nixpkgs/pkgs/tools/misc/diffoscope/default.nix
index 29d3e40eee4..b64c527a6b9 100644
--- a/nixpkgs/pkgs/tools/misc/diffoscope/default.nix
+++ b/nixpkgs/pkgs/tools/misc/diffoscope/default.nix
@@ -9,11 +9,11 @@
# Note: when upgrading this package, please run the list-missing-tools.sh script as described below!
python3Packages.buildPythonApplication rec {
pname = "diffoscope";
- version = "131";
+ version = "133";
src = fetchurl {
url = "https://diffoscope.org/archive/diffoscope-${version}.tar.bz2";
- sha256 = "1lqzm523pzxqj6xfm00z61d263w714d90sn6rfyh2npb8q95gfdn";
+ sha256 = "15hi2fwcx3sf189rmxpyah0amq1a49wgp1ynhvwij5qj13wib2q8";
};
patches = [
diff --git a/nixpkgs/pkgs/tools/misc/dua/default.nix b/nixpkgs/pkgs/tools/misc/dua/default.nix
index a502735c773..5ac8a661c9a 100644
--- a/nixpkgs/pkgs/tools/misc/dua/default.nix
+++ b/nixpkgs/pkgs/tools/misc/dua/default.nix
@@ -11,7 +11,7 @@ rustPlatform.buildRustPackage rec {
sha256 = "08zgi2yiynb20l1f9rhly4a7zgqnr7lq3cr5vkmh1jnfs6z27dv6";
};
- cargoSha256 = "0ca9gaih0b9qg7bdgyhvb9gr1mq23r62pi0845vwc216jfaag079";
+ cargoSha256 = "0hd46h4wwh81hnida0in3142884y8n6ygk7qm09i5wj52g73bivv";
meta = with lib; {
description = "A tool to conveniently learn about the disk usage of directories, fast!";
diff --git a/nixpkgs/pkgs/tools/misc/dust/default.nix b/nixpkgs/pkgs/tools/misc/dust/default.nix
index 68f06f1ceb8..4239b54f18e 100644
--- a/nixpkgs/pkgs/tools/misc/dust/default.nix
+++ b/nixpkgs/pkgs/tools/misc/dust/default.nix
@@ -2,16 +2,16 @@
rustPlatform.buildRustPackage rec {
pname = "dust";
- version = "0.4.1.2";
+ version = "0.4.2";
src = fetchFromGitHub {
owner = "bootandy";
repo = "dust";
rev = "v${version}";
- sha256 = "0a2n96p6z4y09l5z617qbpm8lgxvfagd1l950d2gz9xw4xf1ik5w";
+ sha256 = "0z1vi5agaf1gcq1bdzgfc89v6vpk9kaxxy8f3rd2h6yzdrd2dhk7";
};
- cargoSha256 = "0cpgxkgz10na90r3fgz8hs20vihqdcc8983inn71fq90627bhdx7";
+ cargoSha256 = "08c428rrana0llzhkg8ngzqs6vc773jrf4wql2qxdvm4l0nsx596";
doCheck = false;
diff --git a/nixpkgs/pkgs/tools/misc/dylibbundler/default.nix b/nixpkgs/pkgs/tools/misc/dylibbundler/default.nix
index 6bb9924ddd0..c4209442de8 100644
--- a/nixpkgs/pkgs/tools/misc/dylibbundler/default.nix
+++ b/nixpkgs/pkgs/tools/misc/dylibbundler/default.nix
@@ -10,7 +10,7 @@ stdenv.mkDerivation {
sha256 = "1mpd43hvpfp7pskfrjnd6vcmfii9v3p97q0ws50krkdvshp0bv2h";
};
- makeFlags = "PREFIX=$(out)";
+ makeFlags = [ "PREFIX=$(out)" ];
meta = with stdenv.lib; {
description = "Small command-line program that aims to make bundling .dylibs as easy as possible";
diff --git a/nixpkgs/pkgs/tools/misc/ent/default.nix b/nixpkgs/pkgs/tools/misc/ent/default.nix
index 1c0401e2ead..7e8d04b4209 100644
--- a/nixpkgs/pkgs/tools/misc/ent/default.nix
+++ b/nixpkgs/pkgs/tools/misc/ent/default.nix
@@ -14,7 +14,7 @@ stdenv.mkDerivation {
buildInputs = [ unzip ];
- buildFlags = if stdenv.cc.isClang then [ "CC=clang" ] else null;
+ buildFlags = stdenv.lib.optional stdenv.cc.isClang "CC=clang";
installPhase = ''
mkdir -p $out/bin
diff --git a/nixpkgs/pkgs/tools/misc/entr/default.nix b/nixpkgs/pkgs/tools/misc/entr/default.nix
index 735580eee5d..247572a379f 100644
--- a/nixpkgs/pkgs/tools/misc/entr/default.nix
+++ b/nixpkgs/pkgs/tools/misc/entr/default.nix
@@ -2,11 +2,11 @@
stdenv.mkDerivation rec {
pname = "entr";
- version = "4.3";
+ version = "4.4";
src = fetchurl {
url = "http://entrproject.org/code/${pname}-${version}.tar.gz";
- sha256 = "0ni34sfrssa6njiqm22q2kxv437r6vbs0a6mys8kwwn7vbdw30dh";
+ sha256 = "1x2hyc8vc5dz6k7b3291vxz36wllhinvqrb0d8zx9bv0ydj6qmjl";
};
postPatch = ''
diff --git a/nixpkgs/pkgs/tools/misc/etcher/default.nix b/nixpkgs/pkgs/tools/misc/etcher/default.nix
new file mode 100644
index 00000000000..4944600108a
--- /dev/null
+++ b/nixpkgs/pkgs/tools/misc/etcher/default.nix
@@ -0,0 +1,94 @@
+{ lib
+, stdenv
+, fetchurl
+, gcc-unwrapped
+, dpkg
+, polkit
+, bash
+, nodePackages
+, electron_3
+, gtk3
+, wrapGAppsHook
+}:
+
+let
+ libPath = lib.makeLibraryPath [
+ # for libstdc++.so.6
+ gcc-unwrapped.lib
+ ];
+
+ sha256 = {
+ "x86_64-linux" = "0zb9j34dz7ybjix018bm8g0b6kilw9300q4ahcm22p0ggg528dh7";
+ "i686-linux" = "0wsv4mvwrvsaz1pwiqs94b3854h5l8ff2dbb1ybxmvwjbfrkdcqc";
+ }."${stdenv.system}";
+
+ arch = {
+ "x86_64-linux" = "amd64";
+ "i686-linux" = "i386";
+ }."${stdenv.system}";
+
+in stdenv.mkDerivation rec {
+ pname = "etcher";
+ version = "1.5.60";
+
+ src = fetchurl {
+ url = "https://github.com/balena-io/etcher/releases/download/v${version}/balena-etcher-electron_${version}_${arch}.deb";
+ inherit sha256;
+ };
+
+ buildInputs = [
+ gtk3
+ ];
+
+ nativeBuildInputs = [
+ wrapGAppsHook
+ ];
+
+ dontBuild = true;
+ dontConfigure = true;
+
+ unpackPhase = ''
+ ${dpkg}/bin/dpkg-deb -x $src .
+ '';
+
+ # sudo-prompt has hardcoded binary paths on Linux and we patch them here
+ # along with some other paths
+ patchPhase = ''
+ ${nodePackages.asar}/bin/asar extract opt/balenaEtcher/resources/app.asar tmp
+ # Use Nix(OS) paths
+ sed -i "s|/usr/bin/pkexec|/usr/bin/pkexec', '/run/wrappers/bin/pkexec|" tmp/node_modules/sudo-prompt/index.js
+ sed -i 's|/bin/bash|${bash}/bin/bash|' tmp/node_modules/sudo-prompt/index.js
+ sed -i "s|process.resourcesPath|'$out/opt/balenaEtcher/resources/'|" tmp/generated/gui.js
+ ${nodePackages.asar}/bin/asar pack tmp opt/balenaEtcher/resources/app.asar
+ rm -rf tmp
+ # Fix up .desktop file
+ substituteInPlace usr/share/applications/balena-etcher-electron.desktop \
+ --replace "/opt/balenaEtcher/balena-etcher-electron" "$out/bin/balena-etcher-electron"
+ '';
+
+ installPhase = ''
+ mkdir -p $out/bin
+ cp -r opt $out/
+ cp -r usr/share $out/
+
+ # We'll use our Nixpkgs electron_3 instead
+ rm $out/opt/balenaEtcher/balena-etcher-electron
+
+ ln -s ${electron_3}/bin/electron $out/bin/balena-etcher-electron
+ '';
+
+ preFixup = ''
+ gappsWrapperArgs+=(
+ --add-flags $out/opt/balenaEtcher/resources/app.asar
+ --prefix LD_LIBRARY_PATH : ${libPath}
+ )
+ '';
+
+ meta = with stdenv.lib; {
+ description = "Flash OS images to SD cards and USB drives, safely and easily";
+ homepage = "https://etcher.io/";
+ license = licenses.asl20;
+ maintainers = [ maintainers.shou ];
+ platforms = [ "i686-linux" "x86_64-linux" ];
+ };
+}
diff --git a/nixpkgs/pkgs/tools/misc/ethminer/default.nix b/nixpkgs/pkgs/tools/misc/ethminer/default.nix
index 8a270ed0fef..1ec99f12d82 100644
--- a/nixpkgs/pkgs/tools/misc/ethminer/default.nix
+++ b/nixpkgs/pkgs/tools/misc/ethminer/default.nix
@@ -1,16 +1,31 @@
-{ stdenv, fetchFromGitHub, opencl-headers, cmake, jsoncpp, boost, makeWrapper,
- cudatoolkit, mesa, ethash, opencl-info, ocl-icd, openssl, pkg-config, cli11 }:
+{
+ stdenv,
+ fetchFromGitHub,
+ opencl-headers,
+ cmake,
+ jsoncpp,
+ boost,
+ makeWrapper,
+ cudatoolkit,
+ mesa,
+ ethash,
+ opencl-info,
+ ocl-icd,
+ openssl,
+ pkg-config,
+ cli11
+}:
stdenv.mkDerivation rec {
pname = "ethminer";
- version = "0.18.0-rc.0";
+ version = "0.18.0";
src =
fetchFromGitHub {
owner = "ethereum-mining";
repo = "ethminer";
rev = "v${version}";
- sha256 = "0gwnwxahjfwr4d2aci7y3w206nc5ifssl28ildva98ys0d24wy7z";
+ sha256 = "10b6s35axmx8kyzn2vid6l5nnzcaf4nkk7f5f7lg3cizv6lsj707";
fetchSubmodules = true;
};
diff --git a/nixpkgs/pkgs/tools/misc/eva/Cargo.lock.patch b/nixpkgs/pkgs/tools/misc/eva/Cargo.lock.patch
index c9fea04c75d..67553f0d6d8 100644
--- a/nixpkgs/pkgs/tools/misc/eva/Cargo.lock.patch
+++ b/nixpkgs/pkgs/tools/misc/eva/Cargo.lock.patch
@@ -1,12 +1,20 @@
diff --git a/Cargo.lock b/Cargo.lock
new file mode 100644
-index 00000000000..630f81eae76
+index 0000000..ac198e7
--- /dev/null
-+++ b/pkgs/tools/misc/eva/Cargo.lock
-@@ -0,0 +1,448 @@
++++ b/Cargo.lock
+@@ -0,0 +1,583 @@
+# This file is automatically @generated by Cargo.
+# It is not intended for manual editing.
+[[package]]
++name = "aho-corasick"
++version = "0.7.6"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++dependencies = [
++ "memchr 2.2.1 (registry+https://github.com/rust-lang/crates.io-index)",
++]
++
++[[package]]
+name = "ansi_term"
+version = "0.11.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
@@ -21,29 +29,31 @@ index 00000000000..630f81eae76
+
+[[package]]
+name = "arrayvec"
-+version = "0.4.12"
++version = "0.5.1"
+source = "registry+https://github.com/rust-lang/crates.io-index"
-+dependencies = [
-+ "nodrop 0.1.14 (registry+https://github.com/rust-lang/crates.io-index)",
-+]
+
+[[package]]
+name = "atty"
+version = "0.2.13"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+dependencies = [
-+ "libc 0.2.65 (registry+https://github.com/rust-lang/crates.io-index)",
++ "libc 0.2.66 (registry+https://github.com/rust-lang/crates.io-index)",
+ "winapi 0.3.8 (registry+https://github.com/rust-lang/crates.io-index)",
+]
+
+[[package]]
++name = "autocfg"
++version = "0.1.7"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++
++[[package]]
+name = "backtrace"
+version = "0.3.40"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+dependencies = [
+ "backtrace-sys 0.1.32 (registry+https://github.com/rust-lang/crates.io-index)",
+ "cfg-if 0.1.10 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "libc 0.2.65 (registry+https://github.com/rust-lang/crates.io-index)",
++ "libc 0.2.66 (registry+https://github.com/rust-lang/crates.io-index)",
+ "rustc-demangle 0.1.16 (registry+https://github.com/rust-lang/crates.io-index)",
+]
+
@@ -52,8 +62,8 @@ index 00000000000..630f81eae76
+version = "0.1.32"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+dependencies = [
-+ "cc 1.0.46 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "libc 0.2.65 (registry+https://github.com/rust-lang/crates.io-index)",
++ "cc 1.0.48 (registry+https://github.com/rust-lang/crates.io-index)",
++ "libc 0.2.66 (registry+https://github.com/rust-lang/crates.io-index)",
+]
+
+[[package]]
@@ -71,11 +81,11 @@ index 00000000000..630f81eae76
+
+[[package]]
+name = "blake2b_simd"
-+version = "0.5.8"
++version = "0.5.9"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+dependencies = [
+ "arrayref 0.3.5 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "arrayvec 0.4.12 (registry+https://github.com/rust-lang/crates.io-index)",
++ "arrayvec 0.5.1 (registry+https://github.com/rust-lang/crates.io-index)",
+ "constant_time_eq 0.1.4 (registry+https://github.com/rust-lang/crates.io-index)",
+]
+
@@ -86,7 +96,7 @@ index 00000000000..630f81eae76
+
+[[package]]
+name = "cc"
-+version = "1.0.46"
++version = "1.0.48"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+
+[[package]]
@@ -131,22 +141,45 @@ index 00000000000..630f81eae76
+]
+
+[[package]]
++name = "directories"
++version = "2.0.2"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++dependencies = [
++ "cfg-if 0.1.10 (registry+https://github.com/rust-lang/crates.io-index)",
++ "dirs-sys 0.3.4 (registry+https://github.com/rust-lang/crates.io-index)",
++]
++
++[[package]]
+name = "dirs"
+version = "1.0.5"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+dependencies = [
-+ "libc 0.2.65 (registry+https://github.com/rust-lang/crates.io-index)",
++ "libc 0.2.66 (registry+https://github.com/rust-lang/crates.io-index)",
++ "redox_users 0.3.1 (registry+https://github.com/rust-lang/crates.io-index)",
++ "winapi 0.3.8 (registry+https://github.com/rust-lang/crates.io-index)",
++]
++
++[[package]]
++name = "dirs-sys"
++version = "0.3.4"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++dependencies = [
++ "cfg-if 0.1.10 (registry+https://github.com/rust-lang/crates.io-index)",
++ "libc 0.2.66 (registry+https://github.com/rust-lang/crates.io-index)",
+ "redox_users 0.3.1 (registry+https://github.com/rust-lang/crates.io-index)",
+ "winapi 0.3.8 (registry+https://github.com/rust-lang/crates.io-index)",
+]
+
+[[package]]
+name = "eva"
-+version = "0.2.4"
++version = "0.2.7"
+dependencies = [
+ "clap 2.33.0 (registry+https://github.com/rust-lang/crates.io-index)",
++ "directories 2.0.2 (registry+https://github.com/rust-lang/crates.io-index)",
+ "lazy_static 1.4.0 (registry+https://github.com/rust-lang/crates.io-index)",
++ "num 0.2.0 (registry+https://github.com/rust-lang/crates.io-index)",
+ "radix_fmt 1.0.0 (registry+https://github.com/rust-lang/crates.io-index)",
++ "regex 1.3.1 (registry+https://github.com/rust-lang/crates.io-index)",
+ "rustyline 4.1.0 (registry+https://github.com/rust-lang/crates.io-index)",
+]
+
@@ -166,8 +199,8 @@ index 00000000000..630f81eae76
+dependencies = [
+ "proc-macro2 1.0.6 (registry+https://github.com/rust-lang/crates.io-index)",
+ "quote 1.0.2 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "syn 1.0.5 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "synstructure 0.12.1 (registry+https://github.com/rust-lang/crates.io-index)",
++ "syn 1.0.11 (registry+https://github.com/rust-lang/crates.io-index)",
++ "synstructure 0.12.3 (registry+https://github.com/rust-lang/crates.io-index)",
+]
+
+[[package]]
@@ -182,7 +215,7 @@ index 00000000000..630f81eae76
+
+[[package]]
+name = "libc"
-+version = "0.2.65"
++version = "0.2.66"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+
+[[package]]
@@ -204,16 +237,81 @@ index 00000000000..630f81eae76
+source = "registry+https://github.com/rust-lang/crates.io-index"
+dependencies = [
+ "bitflags 1.2.1 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "cc 1.0.46 (registry+https://github.com/rust-lang/crates.io-index)",
++ "cc 1.0.48 (registry+https://github.com/rust-lang/crates.io-index)",
+ "cfg-if 0.1.10 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "libc 0.2.65 (registry+https://github.com/rust-lang/crates.io-index)",
++ "libc 0.2.66 (registry+https://github.com/rust-lang/crates.io-index)",
+ "void 1.0.2 (registry+https://github.com/rust-lang/crates.io-index)",
+]
+
+[[package]]
-+name = "nodrop"
-+version = "0.1.14"
++name = "num"
++version = "0.2.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++dependencies = [
++ "num-bigint 0.2.3 (registry+https://github.com/rust-lang/crates.io-index)",
++ "num-complex 0.2.3 (registry+https://github.com/rust-lang/crates.io-index)",
++ "num-integer 0.1.41 (registry+https://github.com/rust-lang/crates.io-index)",
++ "num-iter 0.1.39 (registry+https://github.com/rust-lang/crates.io-index)",
++ "num-rational 0.2.2 (registry+https://github.com/rust-lang/crates.io-index)",
++ "num-traits 0.2.10 (registry+https://github.com/rust-lang/crates.io-index)",
++]
++
++[[package]]
++name = "num-bigint"
++version = "0.2.3"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++dependencies = [
++ "autocfg 0.1.7 (registry+https://github.com/rust-lang/crates.io-index)",
++ "num-integer 0.1.41 (registry+https://github.com/rust-lang/crates.io-index)",
++ "num-traits 0.2.10 (registry+https://github.com/rust-lang/crates.io-index)",
++]
++
++[[package]]
++name = "num-complex"
++version = "0.2.3"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++dependencies = [
++ "autocfg 0.1.7 (registry+https://github.com/rust-lang/crates.io-index)",
++ "num-traits 0.2.10 (registry+https://github.com/rust-lang/crates.io-index)",
++]
++
++[[package]]
++name = "num-integer"
++version = "0.1.41"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++dependencies = [
++ "autocfg 0.1.7 (registry+https://github.com/rust-lang/crates.io-index)",
++ "num-traits 0.2.10 (registry+https://github.com/rust-lang/crates.io-index)",
++]
++
++[[package]]
++name = "num-iter"
++version = "0.1.39"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++dependencies = [
++ "autocfg 0.1.7 (registry+https://github.com/rust-lang/crates.io-index)",
++ "num-integer 0.1.41 (registry+https://github.com/rust-lang/crates.io-index)",
++ "num-traits 0.2.10 (registry+https://github.com/rust-lang/crates.io-index)",
++]
++
++[[package]]
++name = "num-rational"
++version = "0.2.2"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++dependencies = [
++ "autocfg 0.1.7 (registry+https://github.com/rust-lang/crates.io-index)",
++ "num-bigint 0.2.3 (registry+https://github.com/rust-lang/crates.io-index)",
++ "num-integer 0.1.41 (registry+https://github.com/rust-lang/crates.io-index)",
++ "num-traits 0.2.10 (registry+https://github.com/rust-lang/crates.io-index)",
++]
++
++[[package]]
++name = "num-traits"
++version = "0.2.10"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++dependencies = [
++ "autocfg 0.1.7 (registry+https://github.com/rust-lang/crates.io-index)",
++]
+
+[[package]]
+name = "proc-macro2"
@@ -256,7 +354,7 @@ index 00000000000..630f81eae76
+dependencies = [
+ "cloudabi 0.0.3 (registry+https://github.com/rust-lang/crates.io-index)",
+ "fuchsia-cprng 0.1.1 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "libc 0.2.65 (registry+https://github.com/rust-lang/crates.io-index)",
++ "libc 0.2.66 (registry+https://github.com/rust-lang/crates.io-index)",
+ "rand_core 0.4.2 (registry+https://github.com/rust-lang/crates.io-index)",
+ "rdrand 0.4.0 (registry+https://github.com/rust-lang/crates.io-index)",
+ "winapi 0.3.8 (registry+https://github.com/rust-lang/crates.io-index)",
@@ -287,12 +385,28 @@ index 00000000000..630f81eae76
+]
+
+[[package]]
++name = "regex"
++version = "1.3.1"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++dependencies = [
++ "aho-corasick 0.7.6 (registry+https://github.com/rust-lang/crates.io-index)",
++ "memchr 2.2.1 (registry+https://github.com/rust-lang/crates.io-index)",
++ "regex-syntax 0.6.12 (registry+https://github.com/rust-lang/crates.io-index)",
++ "thread_local 0.3.6 (registry+https://github.com/rust-lang/crates.io-index)",
++]
++
++[[package]]
++name = "regex-syntax"
++version = "0.6.12"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++
++[[package]]
+name = "rust-argon2"
+version = "0.5.1"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+dependencies = [
+ "base64 0.10.1 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "blake2b_simd 0.5.8 (registry+https://github.com/rust-lang/crates.io-index)",
++ "blake2b_simd 0.5.9 (registry+https://github.com/rust-lang/crates.io-index)",
+ "crossbeam-utils 0.6.6 (registry+https://github.com/rust-lang/crates.io-index)",
+]
+
@@ -307,11 +421,11 @@ index 00000000000..630f81eae76
+source = "registry+https://github.com/rust-lang/crates.io-index"
+dependencies = [
+ "dirs 1.0.5 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "libc 0.2.65 (registry+https://github.com/rust-lang/crates.io-index)",
++ "libc 0.2.66 (registry+https://github.com/rust-lang/crates.io-index)",
+ "log 0.4.8 (registry+https://github.com/rust-lang/crates.io-index)",
+ "memchr 2.2.1 (registry+https://github.com/rust-lang/crates.io-index)",
+ "nix 0.13.1 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "unicode-segmentation 1.3.0 (registry+https://github.com/rust-lang/crates.io-index)",
++ "unicode-segmentation 1.6.0 (registry+https://github.com/rust-lang/crates.io-index)",
+ "unicode-width 0.1.6 (registry+https://github.com/rust-lang/crates.io-index)",
+ "utf8parse 0.1.1 (registry+https://github.com/rust-lang/crates.io-index)",
+ "winapi 0.3.8 (registry+https://github.com/rust-lang/crates.io-index)",
@@ -324,7 +438,7 @@ index 00000000000..630f81eae76
+
+[[package]]
+name = "syn"
-+version = "1.0.5"
++version = "1.0.11"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+dependencies = [
+ "proc-macro2 1.0.6 (registry+https://github.com/rust-lang/crates.io-index)",
@@ -334,12 +448,12 @@ index 00000000000..630f81eae76
+
+[[package]]
+name = "synstructure"
-+version = "0.12.1"
++version = "0.12.3"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+dependencies = [
+ "proc-macro2 1.0.6 (registry+https://github.com/rust-lang/crates.io-index)",
+ "quote 1.0.2 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "syn 1.0.5 (registry+https://github.com/rust-lang/crates.io-index)",
++ "syn 1.0.11 (registry+https://github.com/rust-lang/crates.io-index)",
+ "unicode-xid 0.2.0 (registry+https://github.com/rust-lang/crates.io-index)",
+]
+
@@ -352,8 +466,16 @@ index 00000000000..630f81eae76
+]
+
+[[package]]
++name = "thread_local"
++version = "0.3.6"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++dependencies = [
++ "lazy_static 1.4.0 (registry+https://github.com/rust-lang/crates.io-index)",
++]
++
++[[package]]
+name = "unicode-segmentation"
-+version = "1.3.0"
++version = "1.6.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+
+[[package]]
@@ -401,32 +523,42 @@ index 00000000000..630f81eae76
+source = "registry+https://github.com/rust-lang/crates.io-index"
+
+[metadata]
++"checksum aho-corasick 0.7.6 (registry+https://github.com/rust-lang/crates.io-index)" = "58fb5e95d83b38284460a5fda7d6470aa0b8844d283a0b614b8535e880800d2d"
+"checksum ansi_term 0.11.0 (registry+https://github.com/rust-lang/crates.io-index)" = "ee49baf6cb617b853aa8d93bf420db2383fab46d314482ca2803b40d5fde979b"
+"checksum arrayref 0.3.5 (registry+https://github.com/rust-lang/crates.io-index)" = "0d382e583f07208808f6b1249e60848879ba3543f57c32277bf52d69c2f0f0ee"
-+"checksum arrayvec 0.4.12 (registry+https://github.com/rust-lang/crates.io-index)" = "cd9fd44efafa8690358b7408d253adf110036b88f55672a933f01d616ad9b1b9"
++"checksum arrayvec 0.5.1 (registry+https://github.com/rust-lang/crates.io-index)" = "cff77d8686867eceff3105329d4698d96c2391c176d5d03adc90c7389162b5b8"
+"checksum atty 0.2.13 (registry+https://github.com/rust-lang/crates.io-index)" = "1803c647a3ec87095e7ae7acfca019e98de5ec9a7d01343f611cf3152ed71a90"
++"checksum autocfg 0.1.7 (registry+https://github.com/rust-lang/crates.io-index)" = "1d49d90015b3c36167a20fe2810c5cd875ad504b39cff3d4eae7977e6b7c1cb2"
+"checksum backtrace 0.3.40 (registry+https://github.com/rust-lang/crates.io-index)" = "924c76597f0d9ca25d762c25a4d369d51267536465dc5064bdf0eb073ed477ea"
+"checksum backtrace-sys 0.1.32 (registry+https://github.com/rust-lang/crates.io-index)" = "5d6575f128516de27e3ce99689419835fce9643a9b215a14d2b5b685be018491"
+"checksum base64 0.10.1 (registry+https://github.com/rust-lang/crates.io-index)" = "0b25d992356d2eb0ed82172f5248873db5560c4721f564b13cb5193bda5e668e"
+"checksum bitflags 1.2.1 (registry+https://github.com/rust-lang/crates.io-index)" = "cf1de2fe8c75bc145a2f577add951f8134889b4795d47466a54a5c846d691693"
-+"checksum blake2b_simd 0.5.8 (registry+https://github.com/rust-lang/crates.io-index)" = "5850aeee1552f495dd0250014cf64b82b7c8879a89d83b33bbdace2cc4f63182"
++"checksum blake2b_simd 0.5.9 (registry+https://github.com/rust-lang/crates.io-index)" = "b83b7baab1e671718d78204225800d6b170e648188ac7dc992e9d6bddf87d0c0"
+"checksum byteorder 1.3.2 (registry+https://github.com/rust-lang/crates.io-index)" = "a7c3dd8985a7111efc5c80b44e23ecdd8c007de8ade3b96595387e812b957cf5"
-+"checksum cc 1.0.46 (registry+https://github.com/rust-lang/crates.io-index)" = "0213d356d3c4ea2c18c40b037c3be23cd639825c18f25ee670ac7813beeef99c"
++"checksum cc 1.0.48 (registry+https://github.com/rust-lang/crates.io-index)" = "f52a465a666ca3d838ebbf08b241383421412fe7ebb463527bba275526d89f76"
+"checksum cfg-if 0.1.10 (registry+https://github.com/rust-lang/crates.io-index)" = "4785bdd1c96b2a846b2bd7cc02e86b6b3dbf14e7e53446c4f54c92a361040822"
+"checksum clap 2.33.0 (registry+https://github.com/rust-lang/crates.io-index)" = "5067f5bb2d80ef5d68b4c87db81601f0b75bca627bc2ef76b141d7b846a3c6d9"
+"checksum cloudabi 0.0.3 (registry+https://github.com/rust-lang/crates.io-index)" = "ddfc5b9aa5d4507acaf872de71051dfd0e309860e88966e1051e462a077aac4f"
+"checksum constant_time_eq 0.1.4 (registry+https://github.com/rust-lang/crates.io-index)" = "995a44c877f9212528ccc74b21a232f66ad69001e40ede5bcee2ac9ef2657120"
+"checksum crossbeam-utils 0.6.6 (registry+https://github.com/rust-lang/crates.io-index)" = "04973fa96e96579258a5091af6003abde64af786b860f18622b82e026cca60e6"
++"checksum directories 2.0.2 (registry+https://github.com/rust-lang/crates.io-index)" = "551a778172a450d7fc12e629ca3b0428d00f6afa9a43da1b630d54604e97371c"
+"checksum dirs 1.0.5 (registry+https://github.com/rust-lang/crates.io-index)" = "3fd78930633bd1c6e35c4b42b1df7b0cbc6bc191146e512bb3bedf243fcc3901"
++"checksum dirs-sys 0.3.4 (registry+https://github.com/rust-lang/crates.io-index)" = "afa0b23de8fd801745c471deffa6e12d248f962c9fd4b4c33787b055599bde7b"
+"checksum failure 0.1.6 (registry+https://github.com/rust-lang/crates.io-index)" = "f8273f13c977665c5db7eb2b99ae520952fe5ac831ae4cd09d80c4c7042b5ed9"
+"checksum failure_derive 0.1.6 (registry+https://github.com/rust-lang/crates.io-index)" = "0bc225b78e0391e4b8683440bf2e63c2deeeb2ce5189eab46e2b68c6d3725d08"
+"checksum fuchsia-cprng 0.1.1 (registry+https://github.com/rust-lang/crates.io-index)" = "a06f77d526c1a601b7c4cdd98f54b5eaabffc14d5f2f0296febdc7f357c6d3ba"
+"checksum lazy_static 1.4.0 (registry+https://github.com/rust-lang/crates.io-index)" = "e2abad23fbc42b3700f2f279844dc832adb2b2eb069b2df918f455c4e18cc646"
-+"checksum libc 0.2.65 (registry+https://github.com/rust-lang/crates.io-index)" = "1a31a0627fdf1f6a39ec0dd577e101440b7db22672c0901fe00a9a6fbb5c24e8"
++"checksum libc 0.2.66 (registry+https://github.com/rust-lang/crates.io-index)" = "d515b1f41455adea1313a4a2ac8a8a477634fbae63cc6100e3aebb207ce61558"
+"checksum log 0.4.8 (registry+https://github.com/rust-lang/crates.io-index)" = "14b6052be84e6b71ab17edffc2eeabf5c2c3ae1fdb464aae35ac50c67a44e1f7"
+"checksum memchr 2.2.1 (registry+https://github.com/rust-lang/crates.io-index)" = "88579771288728879b57485cc7d6b07d648c9f0141eb955f8ab7f9d45394468e"
+"checksum nix 0.13.1 (registry+https://github.com/rust-lang/crates.io-index)" = "4dbdc256eaac2e3bd236d93ad999d3479ef775c863dbda3068c4006a92eec51b"
-+"checksum nodrop 0.1.14 (registry+https://github.com/rust-lang/crates.io-index)" = "72ef4a56884ca558e5ddb05a1d1e7e1bfd9a68d9ed024c21704cc98872dae1bb"
++"checksum num 0.2.0 (registry+https://github.com/rust-lang/crates.io-index)" = "cf4825417e1e1406b3782a8ce92f4d53f26ec055e3622e1881ca8e9f5f9e08db"
++"checksum num-bigint 0.2.3 (registry+https://github.com/rust-lang/crates.io-index)" = "f9c3f34cdd24f334cb265d9bf8bfa8a241920d026916785747a92f0e55541a1a"
++"checksum num-complex 0.2.3 (registry+https://github.com/rust-lang/crates.io-index)" = "fcb0cf31fb3ff77e6d2a6ebd6800df7fdcd106f2ad89113c9130bcd07f93dffc"
++"checksum num-integer 0.1.41 (registry+https://github.com/rust-lang/crates.io-index)" = "b85e541ef8255f6cf42bbfe4ef361305c6c135d10919ecc26126c4e5ae94bc09"
++"checksum num-iter 0.1.39 (registry+https://github.com/rust-lang/crates.io-index)" = "76bd5272412d173d6bf9afdf98db8612bbabc9a7a830b7bfc9c188911716132e"
++"checksum num-rational 0.2.2 (registry+https://github.com/rust-lang/crates.io-index)" = "f2885278d5fe2adc2f75ced642d52d879bffaceb5a2e0b1d4309ffdfb239b454"
++"checksum num-traits 0.2.10 (registry+https://github.com/rust-lang/crates.io-index)" = "d4c81ffc11c212fa327657cb19dd85eb7419e163b5b076bede2bdb5c974c07e4"
+"checksum proc-macro2 1.0.6 (registry+https://github.com/rust-lang/crates.io-index)" = "9c9e470a8dc4aeae2dee2f335e8f533e2d4b347e1434e5671afc49b054592f27"
+"checksum quote 1.0.2 (registry+https://github.com/rust-lang/crates.io-index)" = "053a8c8bcc71fcce321828dc897a98ab9760bef03a4fc36693c231e5b3216cfe"
+"checksum radix_fmt 1.0.0 (registry+https://github.com/rust-lang/crates.io-index)" = "ce082a9940a7ace2ad4a8b7d0b1eac6aa378895f18be598230c5f2284ac05426"
@@ -436,14 +568,17 @@ index 00000000000..630f81eae76
+"checksum rdrand 0.4.0 (registry+https://github.com/rust-lang/crates.io-index)" = "678054eb77286b51581ba43620cc911abf02758c91f93f479767aed0f90458b2"
+"checksum redox_syscall 0.1.56 (registry+https://github.com/rust-lang/crates.io-index)" = "2439c63f3f6139d1b57529d16bc3b8bb855230c8efcc5d3a896c8bea7c3b1e84"
+"checksum redox_users 0.3.1 (registry+https://github.com/rust-lang/crates.io-index)" = "4ecedbca3bf205f8d8f5c2b44d83cd0690e39ee84b951ed649e9f1841132b66d"
++"checksum regex 1.3.1 (registry+https://github.com/rust-lang/crates.io-index)" = "dc220bd33bdce8f093101afe22a037b8eb0e5af33592e6a9caafff0d4cb81cbd"
++"checksum regex-syntax 0.6.12 (registry+https://github.com/rust-lang/crates.io-index)" = "11a7e20d1cce64ef2fed88b66d347f88bd9babb82845b2b858f3edbf59a4f716"
+"checksum rust-argon2 0.5.1 (registry+https://github.com/rust-lang/crates.io-index)" = "4ca4eaef519b494d1f2848fc602d18816fed808a981aedf4f1f00ceb7c9d32cf"
+"checksum rustc-demangle 0.1.16 (registry+https://github.com/rust-lang/crates.io-index)" = "4c691c0e608126e00913e33f0ccf3727d5fc84573623b8d65b2df340b5201783"
+"checksum rustyline 4.1.0 (registry+https://github.com/rust-lang/crates.io-index)" = "0f47ea1ceb347d2deae482d655dc8eef4bd82363d3329baffa3818bd76fea48b"
+"checksum strsim 0.8.0 (registry+https://github.com/rust-lang/crates.io-index)" = "8ea5119cdb4c55b55d432abb513a0429384878c15dde60cc77b1c99de1a95a6a"
-+"checksum syn 1.0.5 (registry+https://github.com/rust-lang/crates.io-index)" = "66850e97125af79138385e9b88339cbcd037e3f28ceab8c5ad98e64f0f1f80bf"
-+"checksum synstructure 0.12.1 (registry+https://github.com/rust-lang/crates.io-index)" = "3f085a5855930c0441ca1288cf044ea4aecf4f43a91668abdb870b4ba546a203"
++"checksum syn 1.0.11 (registry+https://github.com/rust-lang/crates.io-index)" = "dff0acdb207ae2fe6d5976617f887eb1e35a2ba52c13c7234c790960cdad9238"
++"checksum synstructure 0.12.3 (registry+https://github.com/rust-lang/crates.io-index)" = "67656ea1dc1b41b1451851562ea232ec2e5a80242139f7e679ceccfb5d61f545"
+"checksum textwrap 0.11.0 (registry+https://github.com/rust-lang/crates.io-index)" = "d326610f408c7a4eb6f51c37c330e496b08506c9457c9d34287ecc38809fb060"
-+"checksum unicode-segmentation 1.3.0 (registry+https://github.com/rust-lang/crates.io-index)" = "1967f4cdfc355b37fd76d2a954fb2ed3871034eb4f26d60537d88795cfc332a9"
++"checksum thread_local 0.3.6 (registry+https://github.com/rust-lang/crates.io-index)" = "c6b53e329000edc2b34dbe8545fd20e55a333362d0a321909685a19bd28c3f1b"
++"checksum unicode-segmentation 1.6.0 (registry+https://github.com/rust-lang/crates.io-index)" = "e83e153d1053cbb5a118eeff7fd5be06ed99153f00dbcd8ae310c5fb2b22edc0"
+"checksum unicode-width 0.1.6 (registry+https://github.com/rust-lang/crates.io-index)" = "7007dbd421b92cc6e28410fe7362e2e0a2503394908f417b68ec8d1c364c4e20"
+"checksum unicode-xid 0.2.0 (registry+https://github.com/rust-lang/crates.io-index)" = "826e7639553986605ec5979c7dd957c7895e93eabed50ab2ffa7f6128a75097c"
+"checksum utf8parse 0.1.1 (registry+https://github.com/rust-lang/crates.io-index)" = "8772a4ccbb4e89959023bc5b7cb8623a795caa7092d99f3aa9501b9484d4557d"
diff --git a/nixpkgs/pkgs/tools/misc/eva/default.nix b/nixpkgs/pkgs/tools/misc/eva/default.nix
index 0efaf008d48..bf43d11e566 100644
--- a/nixpkgs/pkgs/tools/misc/eva/default.nix
+++ b/nixpkgs/pkgs/tools/misc/eva/default.nix
@@ -1,24 +1,32 @@
-{ stdenv, fetchFromGitHub, rustPlatform }:
+{ stdenv, fetchFromGitHub, rustPlatform, fetchpatch }:
rustPlatform.buildRustPackage rec {
pname = "eva";
- version = "0.2.5";
+ version = "0.2.7";
- cargoSha256 = "1zns4xspw9w1f84sf8cz30mp2fl1jyjc2ca09gkqhzhgaj055y7k";
+ cargoSha256 = "0n3xvlmp4l925nbz8lx6dr9yrrfh6z7b9z8wd6sli3a1dq26d6bg";
src = fetchFromGitHub {
owner = "NerdyPepper";
repo = "${pname}";
- rev = "v${version}";
- sha256 = "1vqr6z4vicqx1lm5ll09za4jh8rki2qbav1pawz15hqqzps3y8h1";
+ rev = "6ce0fc0212a34ffb647b24d9d903029ac4518165";
+ sha256 = "10242vnq2ph0g3p2hdacs4lmx3f474xm04nadplxbpv9xh4nbag3";
};
cargoPatches = [ ./Cargo.lock.patch ];
+ patches = [
+ # to fix the test suite (can be removed as soon as #33 is merged).
+ (fetchpatch {
+ url = https://github.com/NerdyPepper/eva/commit/cacf51dbb9748b1dbe97b35f3c593a0a272bd4db.patch;
+ sha256 = "11q7dkz2x1888f3awnlr1nbbxzzfjrr46kd0kk6sgjdkyfh50cvv";
+ })
+ ];
+
meta = with stdenv.lib; {
description = "A calculator REPL, similar to bc";
homepage = https://github.com/NerdyPepper/eva;
license = licenses.mit;
- maintainers = with maintainers; [ nrdxp ];
+ maintainers = with maintainers; [ nrdxp ma27 ];
};
}
diff --git a/nixpkgs/pkgs/tools/misc/exa/default.nix b/nixpkgs/pkgs/tools/misc/exa/default.nix
index e05963b6902..0edd8a1b318 100644
--- a/nixpkgs/pkgs/tools/misc/exa/default.nix
+++ b/nixpkgs/pkgs/tools/misc/exa/default.nix
@@ -1,4 +1,4 @@
-{ stdenv, fetchFromGitHub, rustPlatform, cmake, perl, pkgconfig, zlib
+{ stdenv, fetchFromGitHub, fetchpatch, rustPlatform, cmake, perl, pkgconfig, zlib
, darwin, libiconv, installShellFiles
}:
@@ -17,6 +17,15 @@ buildRustPackage rec {
sha256 = "14qlm9zb9v22hxbbi833xaq2b7qsxnmh15s317200vz5f1305hhw";
};
+ patches = [
+ (fetchpatch {
+ # https://github.com/ogham/exa/pull/584
+ name = "fix-panic-on-broken-symlink-in-git-repository.patch";
+ url = "https://github.com/ogham/exa/pull/584/commits/a7a8e99cf3a15992afb2383435da0231917ffb54.patch";
+ sha256 = "0n5q483sz300jkp0sbb350hdinmkw7s6bmigdyr6ypz3fvygd9hx";
+ })
+ ];
+
nativeBuildInputs = [ cmake pkgconfig perl installShellFiles ];
buildInputs = [ zlib ]
++ stdenv.lib.optionals stdenv.isDarwin [
diff --git a/nixpkgs/pkgs/tools/misc/fdupes/default.nix b/nixpkgs/pkgs/tools/misc/fdupes/default.nix
index 8c303dd1e0c..af9a7c9a133 100644
--- a/nixpkgs/pkgs/tools/misc/fdupes/default.nix
+++ b/nixpkgs/pkgs/tools/misc/fdupes/default.nix
@@ -11,7 +11,7 @@ stdenv.mkDerivation rec {
sha256 = "19b6vqblddaw8ccw4sn0qsqzbswlhrz8ia6n4m3hymvcxn8skpz9";
};
- makeFlags = "PREFIX=$(out)";
+ makeFlags = [ "PREFIX=$(out)" ];
meta = with stdenv.lib; {
description = "Identifies duplicate files residing within specified directories";
diff --git a/nixpkgs/pkgs/tools/misc/ffsend/default.nix b/nixpkgs/pkgs/tools/misc/ffsend/default.nix
index aa0af61c61c..bb10bfe2ec7 100644
--- a/nixpkgs/pkgs/tools/misc/ffsend/default.nix
+++ b/nixpkgs/pkgs/tools/misc/ffsend/default.nix
@@ -16,16 +16,16 @@ with rustPlatform;
buildRustPackage rec {
pname = "ffsend";
- version = "0.2.55";
+ version = "0.2.58";
src = fetchFromGitLab {
owner = "timvisee";
repo = "ffsend";
rev = "v${version}";
- sha256 = "0z0wa12vnzj07q54nr1zr81vjr1kac60nys26bbi8s6nh46n93wv";
+ sha256 = "0yqigqh5vldzmp7wc1mxi5a4bxzm81xycx5h0ghak74vbjibps49";
};
- cargoSha256 = "14brb11nb17dykh37y099bhmk85a7z8fld2pivmywfgvz1x3i141";
+ cargoSha256 = "1wwdnm6a5g4gpd1f89qii8v4f6mcfc1bif1v6mdlcbrpwax5skh4";
nativeBuildInputs = [ cmake pkgconfig installShellFiles ];
buildInputs = [ openssl ]
@@ -55,7 +55,7 @@ buildRustPackage rec {
'';
homepage = https://gitlab.com/timvisee/ffsend;
license = licenses.gpl3;
- maintainers = [ maintainers.lilyball ];
+ maintainers = with maintainers; [ lilyball equirosa ];
platforms = platforms.unix;
};
}
diff --git a/nixpkgs/pkgs/tools/misc/file/default.nix b/nixpkgs/pkgs/tools/misc/file/default.nix
index a06b38c0ec7..24a7143d8e1 100644
--- a/nixpkgs/pkgs/tools/misc/file/default.nix
+++ b/nixpkgs/pkgs/tools/misc/file/default.nix
@@ -1,33 +1,24 @@
-{ stdenv, fetchurl, fetchpatch, file, zlib, libgnurx }:
+{ stdenv, fetchurl, file, zlib, libgnurx }:
stdenv.mkDerivation rec {
pname = "file";
- version = "5.37";
+ version = "5.38";
src = fetchurl {
urls = [
"ftp://ftp.astron.com/pub/file/${pname}-${version}.tar.gz"
"https://distfiles.macports.org/file/${pname}-${version}.tar.gz"
];
- sha256 = "0zz0p9bqnswfx0c16j8k62ivjq1m16x10xqv4hy9lcyxyxkkkhg9";
+ sha256 = "0d7s376b4xqymnrsjxi3nsv3f5v89pzfspzml2pcajdk5by2yg2r";
};
- patches = [
- (fetchpatch {
- name = "CVE-2019-18218.patch";
- url = "https://sources.debian.org/data/main/f/file/1:5.37-6/debian/patches/cherry-pick.FILE5_37-67-g46a8443f.limit-the-number-of-elements-in-a-vector-found-by-oss-fuzz.patch";
- sha256 = "1i22y91yndc3n2p2ngczp1lwil8l05sp8ciicil74xrc5f91y6mj";
- })
- ];
-
nativeBuildInputs = stdenv.lib.optional (stdenv.hostPlatform != stdenv.buildPlatform) file;
buildInputs = [ zlib ]
++ stdenv.lib.optional stdenv.hostPlatform.isWindows libgnurx;
doCheck = true;
- makeFlags = if stdenv.hostPlatform.isWindows then "FILE_COMPILE=file"
- else null;
+ makeFlags = stdenv.lib.optional stdenv.hostPlatform.isWindows "FILE_COMPILE=file";
meta = with stdenv.lib; {
homepage = https://darwinsys.com/file;
diff --git a/nixpkgs/pkgs/tools/misc/fluent-bit/default.nix b/nixpkgs/pkgs/tools/misc/fluent-bit/default.nix
index fe68613b542..516badb7bc7 100644
--- a/nixpkgs/pkgs/tools/misc/fluent-bit/default.nix
+++ b/nixpkgs/pkgs/tools/misc/fluent-bit/default.nix
@@ -2,13 +2,13 @@
stdenv.mkDerivation rec {
pname = "fluent-bit";
- version = "1.3.2";
+ version = "1.3.5";
src = fetchFromGitHub {
owner = "fluent";
repo = "fluent-bit";
rev = "v${version}";
- sha256 = "155szha6mx7cvq0bzqb528zg4q1m9gip7f0m1zv9yrz1sr9p1nzv";
+ sha256 = "0xwh8fnvahcyygz0ydi4pdzgsyvjaphwl3f2ccdas52fbirwnicn";
};
nativeBuildInputs = [ cmake flex bison ];
diff --git a/nixpkgs/pkgs/tools/misc/fondu/default.nix b/nixpkgs/pkgs/tools/misc/fondu/default.nix
index 33efd2bd614..772ae236764 100644
--- a/nixpkgs/pkgs/tools/misc/fondu/default.nix
+++ b/nixpkgs/pkgs/tools/misc/fondu/default.nix
@@ -9,7 +9,7 @@ stdenv.mkDerivation rec {
sha256 = "152prqad9jszjmm4wwqrq83zk13ypsz09n02nrk1gg0fcxfm7fr2";
};
- makeFlags = "DESTDIR=$(out)";
+ makeFlags = [ "DESTDIR=$(out)" ];
hardeningDisable = [ "fortify" ];
diff --git a/nixpkgs/pkgs/tools/misc/fontforge/default.nix b/nixpkgs/pkgs/tools/misc/fontforge/default.nix
index e012d40271b..6239e839598 100644
--- a/nixpkgs/pkgs/tools/misc/fontforge/default.nix
+++ b/nixpkgs/pkgs/tools/misc/fontforge/default.nix
@@ -30,7 +30,7 @@ stdenv.mkDerivation rec {
'';
# do not use x87's 80-bit arithmetic, rouding errors result in very different font binaries
- NIX_CFLAGS_COMPILE = lib.optionals stdenv.isi686 [ "-msse2" "-mfpmath=sse" ];
+ NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isi686 "-msse2 -mfpmath=sse";
nativeBuildInputs = [ pkgconfig autoconf automake gnum4 libtool perl gettext ];
buildInputs = [
diff --git a/nixpkgs/pkgs/tools/misc/fselect/default.nix b/nixpkgs/pkgs/tools/misc/fselect/default.nix
index b86e5ad997a..0685ecf2440 100644
--- a/nixpkgs/pkgs/tools/misc/fselect/default.nix
+++ b/nixpkgs/pkgs/tools/misc/fselect/default.nix
@@ -2,22 +2,22 @@
rustPlatform.buildRustPackage rec {
pname = "fselect";
- version = "0.6.7";
+ version = "0.6.8";
src = fetchFromGitHub {
owner = "jhspetersson";
repo = "fselect";
rev = version;
- sha256 = "0pg3ahx8rmzr585qa4vphd1vxcm1r3sx5iyi8ghg5nn6sibqy0z4";
+ sha256 = "1zccl60l557lhaaqb33myys4vp3jsnjqh3dxb22i46bff28s1w6c";
};
- cargoSha256 = "0yf3xkxxlb9252r869wbiv3b3kpz4p5gp556sic63bp0acig6a76";
+ cargoSha256 = "1496zjrkwj5bv08k575m064x0hfk0gpci0dmxvvspj6jf8f8bfm6";
meta = with stdenv.lib; {
description = "Find files with SQL-like queries";
homepage = "https://github.com/jhspetersson/fselect";
license = with licenses; [ asl20 mit ];
- maintainers = [ maintainers.filalex77 ];
+ maintainers = with maintainers; [ filalex77 ];
platforms = platforms.all;
};
}
diff --git a/nixpkgs/pkgs/tools/misc/fwup/default.nix b/nixpkgs/pkgs/tools/misc/fwup/default.nix
index a189e8c1dba..99dcc194d01 100644
--- a/nixpkgs/pkgs/tools/misc/fwup/default.nix
+++ b/nixpkgs/pkgs/tools/misc/fwup/default.nix
@@ -4,13 +4,13 @@
stdenv.mkDerivation rec {
pname = "fwup";
- version = "1.3.1";
+ version = "1.5.1";
src = fetchFromGitHub {
owner = "fhunleth";
repo = "fwup";
rev = "v${version}";
- sha256 = "058llxr8hbdjl721g76icm0gr50bglcgazwrbp3dxyd9jaa0bzc7";
+ sha256 = "08gscwdq7fwfpk3mf7dfdf64n5ijm5kjb7f5wrzzvpnnqz24xnb0";
};
doCheck = true;
diff --git a/nixpkgs/pkgs/tools/misc/fzf/default.nix b/nixpkgs/pkgs/tools/misc/fzf/default.nix
index 66da4f53099..960373e7e5f 100644
--- a/nixpkgs/pkgs/tools/misc/fzf/default.nix
+++ b/nixpkgs/pkgs/tools/misc/fzf/default.nix
@@ -2,16 +2,16 @@
buildGoModule rec {
pname = "fzf";
- version = "0.18.0";
+ version = "0.20.0";
src = fetchFromGitHub {
owner = "junegunn";
repo = pname;
rev = version;
- sha256 = "0pwpr4fpw56yzzkcabzzgbgwraaxmp7xzzmap7w1xsrkbj7dl2xl";
+ sha256 = "02zy3c4k84rzqdkaf04idbj10v286hi0ix1xl2qsz1wrblh168w8";
};
- modSha256 = "0xc4166d74ix5nzjphrq4rgw7qpskz05ymzl77i2qh2nhbdb53p0";
+ modSha256 = "12lnv8b96adpcg9qfizcyd9nxz590nxd82xch6ij719zlqyps143";
outputs = [ "out" "man" ];
@@ -36,15 +36,13 @@ buildGoModule rec {
'';
postInstall = ''
- name="${pname}-${version}"
-
cp $src/bin/fzf-tmux $out/bin
mkdir -p $man/share/man
cp -r $src/man/man1 $man/share/man
- mkdir -p $out/share/vim-plugins/$name
- cp -r $src/plugin $out/share/vim-plugins/$name
+ mkdir -p $out/share/vim-plugins/${pname}
+ cp -r $src/plugin $out/share/vim-plugins/${pname}
cp -R $src/shell $out/share/fzf
cat <<SCRIPT > $out/bin/fzf-share
@@ -60,6 +58,7 @@ buildGoModule rec {
homepage = "https://github.com/junegunn/fzf";
description = "A command-line fuzzy finder written in Go";
license = licenses.mit;
+ maintainers = with maintainers; [ filalex77 ma27 ];
platforms = platforms.unix;
};
}
diff --git a/nixpkgs/pkgs/tools/misc/fzy/default.nix b/nixpkgs/pkgs/tools/misc/fzy/default.nix
index 5b05ce534d7..24daa7fc81f 100644
--- a/nixpkgs/pkgs/tools/misc/fzy/default.nix
+++ b/nixpkgs/pkgs/tools/misc/fzy/default.nix
@@ -11,7 +11,7 @@ stdenv.mkDerivation rec {
sha256 = "1gkzdvj73f71388jvym47075l9zw61v6l8wdv2lnc0mns6dxig0k";
};
- makeFlags = "PREFIX=$(out)";
+ makeFlags = [ "PREFIX=$(out)" ];
meta = with stdenv.lib; {
description = "A better fuzzy finder";
diff --git a/nixpkgs/pkgs/tools/misc/geekbench/default.nix b/nixpkgs/pkgs/tools/misc/geekbench/default.nix
index 32fe5cc5868..b18ac109382 100644
--- a/nixpkgs/pkgs/tools/misc/geekbench/default.nix
+++ b/nixpkgs/pkgs/tools/misc/geekbench/default.nix
@@ -2,11 +2,11 @@
stdenv.mkDerivation rec {
pname = "geekbench";
- version = "5.0.4";
+ version = "5.1.0";
src = fetchurl {
url = "https://cdn.geekbench.com/Geekbench-${version}-Linux.tar.gz";
- sha256 = "04d7ixfmzj22w9svjdj0kxsp7ycnzdzx9kd2z1vswnyybdkgyjy7";
+ sha256 = "1hqqwk5hbqgrxfqlcbgk6rv3a71k65psxcqa6hw41y9jymnm3dp3";
};
dontConfigure = true;
diff --git a/nixpkgs/pkgs/tools/misc/hashit/default.nix b/nixpkgs/pkgs/tools/misc/hashit/default.nix
index 0315750c250..9a3ffe93510 100644
--- a/nixpkgs/pkgs/tools/misc/hashit/default.nix
+++ b/nixpkgs/pkgs/tools/misc/hashit/default.nix
@@ -33,6 +33,12 @@ stdenv.mkDerivation rec {
patchShebangs meson/post_install.py
'';
+ passthru = {
+ updateScript = pantheon.updateScript {
+ attrPath = pname;
+ };
+ };
+
meta = with stdenv.lib; {
description = "A simple app for checking usual checksums - Designed for elementary OS";
homepage = https://github.com/artemanufrij/hashit;
diff --git a/nixpkgs/pkgs/tools/misc/heimdall/default.nix b/nixpkgs/pkgs/tools/misc/heimdall/default.nix
index a8100e455f0..26396fee507 100644
--- a/nixpkgs/pkgs/tools/misc/heimdall/default.nix
+++ b/nixpkgs/pkgs/tools/misc/heimdall/default.nix
@@ -21,11 +21,14 @@ mkDerivation {
cmakeFlags = [
"-DDISABLE_FRONTEND=${if enableGUI then "OFF" else "ON"}"
+ "-DLIBUSB_LIBRARY=${libusb1}"
];
preConfigure = ''
# Give ownership of the Galaxy S USB device to the logged in user.
substituteInPlace heimdall/60-heimdall.rules --replace 'MODE="0666"' 'TAG+="uaccess"'
+ '' + stdenv.lib.optionalString stdenv.isDarwin ''
+ substituteInPlace libpit/CMakeLists.txt --replace "-std=gnu++11" ""
'';
installPhase = ''
diff --git a/nixpkgs/pkgs/tools/misc/html-proofer/Gemfile.lock b/nixpkgs/pkgs/tools/misc/html-proofer/Gemfile.lock
index ac229cf4657..ec69f523f3b 100644
--- a/nixpkgs/pkgs/tools/misc/html-proofer/Gemfile.lock
+++ b/nixpkgs/pkgs/tools/misc/html-proofer/Gemfile.lock
@@ -5,20 +5,22 @@ GEM
public_suffix (>= 2.0.2, < 5.0)
ethon (0.12.0)
ffi (>= 1.3.0)
- ffi (1.11.2)
- html-proofer (3.14.1)
+ ffi (1.11.3)
+ html-proofer (3.15.0)
addressable (~> 2.3)
mercenary (~> 0.3)
- nokogiri (~> 1.10)
+ nokogumbo (~> 2.0)
parallel (~> 1.3)
rainbow (~> 3.0)
typhoeus (~> 1.3)
yell (~> 2.0)
mercenary (0.3.6)
mini_portile2 (2.4.0)
- nokogiri (1.10.5)
+ nokogiri (1.10.7)
mini_portile2 (~> 2.4.0)
- parallel (1.19.0)
+ nokogumbo (2.0.2)
+ nokogiri (~> 1.8, >= 1.8.4)
+ parallel (1.19.1)
public_suffix (4.0.1)
rainbow (3.0.0)
typhoeus (1.3.1)
diff --git a/nixpkgs/pkgs/tools/misc/html-proofer/gemset.nix b/nixpkgs/pkgs/tools/misc/html-proofer/gemset.nix
index 8cf066c6c68..1f561f52976 100644
--- a/nixpkgs/pkgs/tools/misc/html-proofer/gemset.nix
+++ b/nixpkgs/pkgs/tools/misc/html-proofer/gemset.nix
@@ -26,21 +26,21 @@
platforms = [];
source = {
remotes = ["https://rubygems.org"];
- sha256 = "0cbads5da12lb3j0mg2hjrd57s5qkkairxh2y6r9bqyblb5b8xbw";
+ sha256 = "10ay35dm0lkcqprsiya6q2kwvyid884102ryipr4vrk790yfp8kd";
type = "gem";
};
- version = "1.11.2";
+ version = "1.11.3";
};
html-proofer = {
- dependencies = ["addressable" "mercenary" "nokogiri" "parallel" "rainbow" "typhoeus" "yell"];
+ dependencies = ["addressable" "mercenary" "nokogumbo" "parallel" "rainbow" "typhoeus" "yell"];
groups = ["default"];
platforms = [];
source = {
remotes = ["https://rubygems.org"];
- sha256 = "16i803vhrygcbln077czhv9ngipljsawr338lbvd0zr2473r8qja";
+ sha256 = "0nmwxmn0dxgs53g1cqn251dzmjrklw14cpa6z6wz7cdwvjq47500";
type = "gem";
};
- version = "3.14.1";
+ version = "3.15.0";
};
mercenary = {
groups = ["default"];
@@ -68,20 +68,31 @@
platforms = [];
source = {
remotes = ["https://rubygems.org"];
- sha256 = "185g3dwba73jqxjr94bd2zk6fil6n9hmcfnfyzh3p1w47vm296r7";
+ sha256 = "0r0qpgf80h764k176yr63gqbs2z0xbsp8vlvs2a79d5r9vs83kln";
type = "gem";
};
- version = "1.10.5";
+ version = "1.10.7";
+ };
+ nokogumbo = {
+ dependencies = ["nokogiri"];
+ groups = ["default"];
+ platforms = [];
+ source = {
+ remotes = ["https://rubygems.org"];
+ sha256 = "0sxjnpjvrn10gdmfw2dimhch861lz00f28hvkkz0b1gc2rb65k9s";
+ type = "gem";
+ };
+ version = "2.0.2";
};
parallel = {
groups = ["default"];
platforms = [];
source = {
remotes = ["https://rubygems.org"];
- sha256 = "0bsg06zklvxv1qkpqhiric2m07108rqlmnl4axv5fzpxx9973pfz";
+ sha256 = "12jijkap4akzdv11lm08dglsc8jmc87xcgq6947i1s3qb69f4zn2";
type = "gem";
};
- version = "1.19.0";
+ version = "1.19.1";
};
public_suffix = {
groups = ["default"];
diff --git a/nixpkgs/pkgs/tools/misc/hyperfine/default.nix b/nixpkgs/pkgs/tools/misc/hyperfine/default.nix
index 8f3d245280c..9a27c4df772 100644
--- a/nixpkgs/pkgs/tools/misc/hyperfine/default.nix
+++ b/nixpkgs/pkgs/tools/misc/hyperfine/default.nix
@@ -4,22 +4,22 @@
rustPlatform.buildRustPackage rec {
pname = "hyperfine";
- version = "1.8.0";
+ version = "1.9.0";
src = fetchFromGitHub {
owner = "sharkdp";
repo = pname;
rev = "refs/tags/v${version}";
- sha256 = "12bj5xifnpj5yni563b6b33lzmkgm7j1wk0c9859zw59b33ifd1l";
+ sha256 = "0jx2lqhayp14c51dfvgmqrmmadyvxf0p4dsn770ndqpzv66rh6zb";
};
- cargoSha256 = "1ias944wg55njjnap7w02b87bvb502vzkpjvsb704q5i9sr8hjry";
+ cargoSha256 = "0sqmqfig40ragjx3jvwrng6hqz8l1zbmxzq470lk66x0gy4gziag";
buildInputs = stdenv.lib.optional stdenv.isDarwin Security;
meta = with stdenv.lib; {
description = "Command-line benchmarking tool";
- homepage = https://github.com/sharkdp/hyperfine;
+ homepage = "https://github.com/sharkdp/hyperfine";
license = with licenses; [ asl20 /* or */ mit ];
maintainers = [ maintainers.thoughtpolice ];
platforms = platforms.all;
diff --git a/nixpkgs/pkgs/tools/misc/kisslicer/default.nix b/nixpkgs/pkgs/tools/misc/kisslicer/default.nix
index 3667b483383..5e5a7174a14 100644
--- a/nixpkgs/pkgs/tools/misc/kisslicer/default.nix
+++ b/nixpkgs/pkgs/tools/misc/kisslicer/default.nix
@@ -1,6 +1,6 @@
{ fetchzip
, libX11
-, libGLU_combined
+, libGLU, libGL
, makeWrapper
, stdenv
}:
@@ -8,7 +8,7 @@
let
libPath = stdenv.lib.makeLibraryPath [
- libGLU_combined
+ libGLU libGL
stdenv.cc.cc
libX11
];
@@ -30,7 +30,7 @@ stdenv.mkDerivation {
buildInputs = [
makeWrapper
- libGLU_combined
+ libGLU libGL
libX11
];
diff --git a/nixpkgs/pkgs/tools/misc/lazydocker/default.nix b/nixpkgs/pkgs/tools/misc/lazydocker/default.nix
index 3d9111b6a61..96c13010fac 100644
--- a/nixpkgs/pkgs/tools/misc/lazydocker/default.nix
+++ b/nixpkgs/pkgs/tools/misc/lazydocker/default.nix
@@ -2,13 +2,13 @@
buildGoPackage rec {
pname = "lazydocker";
- version = "0.7.4";
+ version = "0.7.6";
src = fetchFromGitHub {
owner = "jesseduffield";
repo = "lazydocker";
rev = "v${version}";
- sha256 = "03l6gs4p9p8g0ai6wqg9024rp0pd13m0b9y3sy1ww5afwxb82br6";
+ sha256 = "1sp5f9lkysqkyhd6gvrlpszrih78bj67yidkkd6azv9ianrndx0b";
};
goPackagePath = "github.com/jesseduffield/lazydocker";
@@ -17,8 +17,8 @@ buildGoPackage rec {
meta = with stdenv.lib; {
description = "A simple terminal UI for both docker and docker-compose";
- homepage = https://github.com/jesseduffield/lazydocker;
+ homepage = "https://github.com/jesseduffield/lazydocker";
license = licenses.mit;
- maintainers = with maintainers; [ das-g ];
+ maintainers = with maintainers; [ das-g filalex77 ];
};
}
diff --git a/nixpkgs/pkgs/tools/misc/ldmtool/default.nix b/nixpkgs/pkgs/tools/misc/ldmtool/default.nix
index d1d3996bd62..2ec68348495 100644
--- a/nixpkgs/pkgs/tools/misc/ldmtool/default.nix
+++ b/nixpkgs/pkgs/tools/misc/ldmtool/default.nix
@@ -3,15 +3,15 @@
, fetchpatch }:
stdenv.mkDerivation rec {
- pname = "ldmtool";
- version = "0.2.4";
+ pname = "ldmtool";
+ version = "0.2.4";
- src = fetchFromGitHub {
- owner = "mdbooth";
- repo = "libldm";
- rev = "libldm-${version}";
- sha256 = "1fy5wbmk8kwl86lzswq0d1z2j5y023qzfm2ppm8knzv9c47kniqk";
- };
+ src = fetchFromGitHub {
+ owner = "mdbooth";
+ repo = "libldm";
+ rev = "libldm-${version}";
+ sha256 = "1fy5wbmk8kwl86lzswq0d1z2j5y023qzfm2ppm8knzv9c47kniqk";
+ };
patches = [
# Remove useage of deprecrated G_PARAM_PRIVATE
@@ -21,26 +21,26 @@ stdenv.mkDerivation rec {
})
];
- preConfigure = ''
- sed -i docs/reference/ldmtool/Makefile.am \
- -e 's|-nonet http://docbook.sourceforge.net/release/xsl/current/manpages/docbook.xsl|--nonet ${docbook_xsl}/xml/xsl/docbook/manpages/docbook.xsl|g'
- '';
+ preConfigure = ''
+ sed -i docs/reference/ldmtool/Makefile.am \
+ -e 's|-nonet http://docbook.sourceforge.net/release/xsl/current/manpages/docbook.xsl|--nonet ${docbook_xsl}/xml/xsl/docbook/manpages/docbook.xsl|g'
+ '';
- # glib-2.62 deprecations
- NIX_CFLAGS_COMPILE = [ "-DGLIB_DISABLE_DEPRECATION_WARNINGS" ];
+ # glib-2.62 deprecations
+ NIX_CFLAGS_COMPILE = "-DGLIB_DISABLE_DEPRECATION_WARNINGS";
- configureScript = "sh autogen.sh";
+ configureScript = "sh autogen.sh";
- nativeBuildInputs = [ pkgconfig ];
- buildInputs = [ autoconf automake gtk-doc lvm2 libxslt.bin
- libtool readline gobject-introspection json-glib libuuid
- ];
+ nativeBuildInputs = [ pkgconfig ];
+ buildInputs = [ autoconf automake gtk-doc lvm2 libxslt.bin
+ libtool readline gobject-introspection json-glib libuuid
+ ];
- meta = with stdenv.lib; {
- description = "Tool and library for managing Microsoft Windows Dynamic Disks";
- homepage = https://github.com/mdbooth/libldm;
- maintainers = with maintainers; [ jensbin ];
- license = licenses.gpl3;
- platforms = platforms.linux;
- };
+ meta = with stdenv.lib; {
+ description = "Tool and library for managing Microsoft Windows Dynamic Disks";
+ homepage = https://github.com/mdbooth/libldm;
+ maintainers = with maintainers; [ jensbin ];
+ license = licenses.gpl3;
+ platforms = platforms.linux;
+ };
}
diff --git a/nixpkgs/pkgs/tools/misc/lf/default.nix b/nixpkgs/pkgs/tools/misc/lf/default.nix
index 61e115e71eb..c2f281ecb17 100644
--- a/nixpkgs/pkgs/tools/misc/lf/default.nix
+++ b/nixpkgs/pkgs/tools/misc/lf/default.nix
@@ -15,8 +15,8 @@ buildGoModule rec {
# TODO: Setting buildFlags probably isn't working properly. I've tried a few
# variants, e.g.:
- # - buildFlags = "-ldflags \"-s -w -X 'main.gVersion=${version}'\"";
- # - buildFlags = "-ldflags \\\"-X ${goPackagePath}/main.gVersion=${version}\\\"";
+ # - buildFlags = [ "-ldflags" "\"-s" "-w"" ""-X 'main.gVersion=${version}'\"" ];
+ # - buildFlags = [ "-ldflags" "\\\"-X" "${goPackagePath}/main.gVersion=${version}\\\"" ];
# Override the build phase (to set buildFlags):
buildPhase = ''
runHook preBuild
diff --git a/nixpkgs/pkgs/tools/misc/licensor/default.nix b/nixpkgs/pkgs/tools/misc/licensor/default.nix
index 99d9fc72681..0913b9afbf5 100644
--- a/nixpkgs/pkgs/tools/misc/licensor/default.nix
+++ b/nixpkgs/pkgs/tools/misc/licensor/default.nix
@@ -2,16 +2,16 @@
rustPlatform.buildRustPackage rec {
pname = "licensor";
- version = "2.0.0";
+ version = "2.1.0";
src = fetchFromGitHub {
owner = "raftario";
repo = pname;
rev = "v${version}";
- sha256 = "0bb6q3jpzdygjcs3apl38zzmgkn22ya5wxlqgmlp0cybqbhpi20s";
+ sha256 = "0zr8hcq7crmhrdhwcclc0nap68wvg5kqn5l93ha0vn9xgjy8z11p";
};
- cargoSha256 = "1cvwyj2043vi5905n5126ikwbs3flfgzqkzjnzha0h8in8p3skv1";
+ cargoSha256 = "042dplm0cdxkv73m5qlkc61h0x9fpzxn2b0c8gjx2hwvigcia139";
meta = with lib; {
description = "Write licenses to stdout";
diff --git a/nixpkgs/pkgs/tools/misc/lnav/default.nix b/nixpkgs/pkgs/tools/misc/lnav/default.nix
index da7db422377..90560d32157 100644
--- a/nixpkgs/pkgs/tools/misc/lnav/default.nix
+++ b/nixpkgs/pkgs/tools/misc/lnav/default.nix
@@ -44,7 +44,7 @@ stdenv.mkDerivation rec {
downloadPage = "https://github.com/tstack/lnav/releases";
license = licenses.bsd2;
version = "0.8.5";
- maintainers = [ maintainers.dochang ];
+ maintainers = with maintainers; [ dochang ma27 ];
platforms = platforms.unix;
};
diff --git a/nixpkgs/pkgs/tools/misc/logstash/7.x.nix b/nixpkgs/pkgs/tools/misc/logstash/7.x.nix
index 9eff84e67dc..1bd30733765 100644
--- a/nixpkgs/pkgs/tools/misc/logstash/7.x.nix
+++ b/nixpkgs/pkgs/tools/misc/logstash/7.x.nix
@@ -16,8 +16,8 @@ stdenv.mkDerivation rec {
url = "https://artifacts.elastic.co/downloads/logstash/${name}.tar.gz";
sha256 =
if enableUnfree
- then "1mw053bx2zh5320p545ax8fnydzqj28r239l7a4m1d2shi89w6s8"
- else "0d57ahak4chxmd0pmgkbmig2wacprv120pwmjlx63sxf5vw72yap";
+ then "01l6alwgsq6yf0z9d08i0hi8g708nph1vm78nl4xbpg8h964bybj"
+ else "0nlwgaw6rmhp5b68zpp1pzsjs30b0bjzdg8f7xy6rarpk338s8yb";
};
dontBuild = true;
diff --git a/nixpkgs/pkgs/tools/misc/lorri/default.nix b/nixpkgs/pkgs/tools/misc/lorri/default.nix
index 914578c47ec..8be6cf5a8a3 100644
--- a/nixpkgs/pkgs/tools/misc/lorri/default.nix
+++ b/nixpkgs/pkgs/tools/misc/lorri/default.nix
@@ -10,7 +10,6 @@
# Apple dependencies
, CoreServices
, Security
-, cf-private
}:
rustPlatform.buildRustPackage rec {
@@ -40,7 +39,7 @@ rustPlatform.buildRustPackage rec {
nativeBuildInputs = with pkgs; [ nix direnv which ];
buildInputs =
- stdenv.lib.optionals stdenv.isDarwin [ CoreServices Security cf-private ];
+ stdenv.lib.optionals stdenv.isDarwin [ CoreServices Security ];
passthru = {
updater = with builtins; writeScript "copy-runtime-nix.sh" ''
diff --git a/nixpkgs/pkgs/tools/misc/man-db/default.nix b/nixpkgs/pkgs/tools/misc/man-db/default.nix
index 49e4ab44836..918e8372dcb 100644
--- a/nixpkgs/pkgs/tools/misc/man-db/default.nix
+++ b/nixpkgs/pkgs/tools/misc/man-db/default.nix
@@ -1,11 +1,11 @@
{ stdenv, fetchurl, pkgconfig, libpipeline, db, groff, libiconv, makeWrapper, buildPackages }:
stdenv.mkDerivation rec {
- name = "man-db-2.8.7";
+ name = "man-db-2.9.0";
src = fetchurl {
url = "mirror://savannah/man-db/${name}.tar.xz";
- sha256 = "09mkpvwirv9kh2pqhfq90zl7pjdl63f4w4g1x6zhhp9hjswmpkdr";
+ sha256 = "0qg2sdn8mayya0ril484iz1r7hi46l68d2d80cr6lvc7x3csqjjx";
};
outputs = [ "out" "doc" ];
diff --git a/nixpkgs/pkgs/tools/misc/memtest86+/default.nix b/nixpkgs/pkgs/tools/misc/memtest86+/default.nix
index 48f048b3abf..57cf5bb97e2 100644
--- a/nixpkgs/pkgs/tools/misc/memtest86+/default.nix
+++ b/nixpkgs/pkgs/tools/misc/memtest86+/default.nix
@@ -14,7 +14,7 @@ stdenv.mkDerivation {
hardeningDisable = [ "all" ];
- buildFlags = "memtest.bin";
+ buildFlags = [ "memtest.bin" ];
doCheck = false; # fails
diff --git a/nixpkgs/pkgs/tools/misc/miniserve/default.nix b/nixpkgs/pkgs/tools/misc/miniserve/default.nix
index 412726e276d..09640b30be9 100644
--- a/nixpkgs/pkgs/tools/misc/miniserve/default.nix
+++ b/nixpkgs/pkgs/tools/misc/miniserve/default.nix
@@ -1,19 +1,22 @@
-{ stdenv, rustPlatform, fetchFromGitHub, cmake, pkgconfig, zlib }:
+{ stdenv, rustPlatform, fetchFromGitHub, cmake, pkgconfig, zlib, openssl }:
rustPlatform.buildRustPackage rec {
pname = "miniserve";
- version = "0.2.1";
+ version = "0.5.0";
src = fetchFromGitHub {
owner = "svenstaro";
repo = "miniserve";
rev = "v${version}";
- sha256 = "1g8ggqs4fyscb1r98qj22f61jgkqnr4vdyps0drrvydl9lafdmpl";
+ sha256 = "06cxkkf3sf84prba65dymr1hg7mwizmsax0dlljh0lcmvlcpzi08";
};
- cargoSha256 = "055mbrzg7v8a65awn1051b4b9ngxq25wy31gjq8kc93qsb7k0f2k";
+ cargoSha256 = "046xxxqcf1sdsi9dlilsn0nk36gyca20ck1a70ihj1k9kl7yj8sn";
+
+ RUSTC_BOOTSTRAP = 1;
nativeBuildInputs = [ cmake pkgconfig zlib ];
+ buildInputs = [ openssl ];
meta = with stdenv.lib; {
description = "For when you really just want to serve some files over HTTP right now!";
diff --git a/nixpkgs/pkgs/tools/misc/mktorrent/default.nix b/nixpkgs/pkgs/tools/misc/mktorrent/default.nix
index b2f7fdf2a90..c88f12c74d1 100644
--- a/nixpkgs/pkgs/tools/misc/mktorrent/default.nix
+++ b/nixpkgs/pkgs/tools/misc/mktorrent/default.nix
@@ -11,13 +11,11 @@ stdenv.mkDerivation rec {
sha256 = "17pdc5mandl739f8q26n5is8ga56s83aqcrwhlnnplbxwx2inidr";
};
- makeFlags = "USE_PTHREADS=1 USE_OPENSSL=1 USE_LONG_OPTIONS=1"
- + stdenv.lib.optionalString stdenv.isi686 " USE_LARGE_FILES=1"
- + stdenv.lib.optionalString stdenv.isLinux "CFLAGS=-lgcc_s";
+ makeFlags = [ "USE_PTHREADS=1" "USE_OPENSSL=1" "USE_LONG_OPTIONS=1" ]
+ ++ stdenv.lib.optional stdenv.isi686 "USE_LARGE_FILES=1"
+ ++ stdenv.lib.optional stdenv.isLinux "CFLAGS=-lgcc_s";
- preInstall = ''
- installFlags=PREFIX=$out
- '';
+ installFlags = [ "PREFIX=${placeholder "out"}" ];
buildInputs = [ openssl ];
diff --git a/nixpkgs/pkgs/tools/misc/moreutils/default.nix b/nixpkgs/pkgs/tools/misc/moreutils/default.nix
index 336d673f7ec..44f791e5b8a 100644
--- a/nixpkgs/pkgs/tools/misc/moreutils/default.nix
+++ b/nixpkgs/pkgs/tools/misc/moreutils/default.nix
@@ -20,8 +20,8 @@ stdenv.mkDerivation rec {
propagatedBuildInputs = with perlPackages; [ perl IPCRun TimeDate TimeDuration ];
- buildFlags = "CC=cc";
- installFlags = "PREFIX=$(out)";
+ buildFlags = [ "CC=cc" ];
+ installFlags = [ "PREFIX=$(out)" ];
postInstall = ''
wrapProgram $out/bin/chronic --prefix PERL5LIB : $PERL5LIB
diff --git a/nixpkgs/pkgs/tools/misc/multitail/default.nix b/nixpkgs/pkgs/tools/misc/multitail/default.nix
index 3037b672498..6ca0c6e8e08 100644
--- a/nixpkgs/pkgs/tools/misc/multitail/default.nix
+++ b/nixpkgs/pkgs/tools/misc/multitail/default.nix
@@ -1,17 +1,17 @@
{ stdenv, fetchurl, ncurses }:
stdenv.mkDerivation rec {
- version = "6.4.2";
+ version = "6.5.0";
pname = "multitail";
src = fetchurl {
url = "https://www.vanheusden.com/multitail/${pname}-${version}.tgz";
- sha256 = "1zd1r89xkxngl1pdrvsc877838nwkfqkbcgfqm3vglwalxc587dg";
+ sha256 = "1vd9vdxyxsccl64ilx542ya5vlw2bpg6gnkq1x8cfqy6vxvmx7dj";
};
buildInputs = [ ncurses ];
- makeFlags = stdenv.lib.optionalString stdenv.isDarwin "-f makefile.macosx";
+ makeFlags = stdenv.lib.optionals stdenv.isDarwin [ "-f" "makefile.macosx" ];
installPhase = ''
mkdir -p $out/bin
diff --git a/nixpkgs/pkgs/tools/misc/multitime/default.nix b/nixpkgs/pkgs/tools/misc/multitime/default.nix
new file mode 100644
index 00000000000..a46ee2b7c9c
--- /dev/null
+++ b/nixpkgs/pkgs/tools/misc/multitime/default.nix
@@ -0,0 +1,39 @@
+{ stdenv, fetchFromGitHub, autoreconfHook }:
+
+stdenv.mkDerivation rec {
+ pname = "multitime";
+ version = "1.4";
+
+ src = fetchFromGitHub {
+ owner = "ltratt";
+ repo = pname;
+ rev = "${pname}-${version}";
+ sha256 = "1p6m4gyy6dw7nxnpsk32qiijagmiq9vwch0fbc25qvmybwqp8qc0";
+ };
+
+ nativeBuildInputs = [ autoreconfHook ];
+
+ meta = {
+ description = "Time command execution over multiple executions";
+
+ longDescription = ''
+ Unix's `time` utility is a simple and often effective way of measuring
+ how long a command takes to run. Unfortunately, running a command once
+ can give misleading timings: the process may create a cache on its first
+ execution, running faster subsequently; other processes may cause the
+ command to be starved of CPU or IO time; etc. It is common to see people
+ run `time` several times and take whichever values they feel most
+ comfortable with. Inevitably, this causes problems.
+
+ `multitime` is, in essence, a simple extension to time which runs a
+ command multiple times and prints the timing means (with confidence
+ intervals), standard deviations, minimums, medians, and maximums having
+ done so. This can give a much better understanding of the command's
+ performance.
+ '';
+
+ license = stdenv.lib.licenses.mit;
+ homepage = "https://tratt.net/laurie/src/multitime/";
+ platforms = stdenv.lib.platforms.unix;
+ };
+}
diff --git a/nixpkgs/pkgs/tools/misc/neo-cowsay/default.nix b/nixpkgs/pkgs/tools/misc/neo-cowsay/default.nix
new file mode 100644
index 00000000000..128d582e32e
--- /dev/null
+++ b/nixpkgs/pkgs/tools/misc/neo-cowsay/default.nix
@@ -0,0 +1,24 @@
+{ lib, buildGoModule, fetchFromGitHub }:
+
+buildGoModule rec {
+ pname = "neo-cowsay";
+ version = "1.0.0";
+
+ src = fetchFromGitHub {
+ owner = "Code-Hex";
+ repo = "Neo-cowsay";
+ rev = "v${version}";
+ sha256 = "1in6kadczv05v62qhskqbdx7wppch0gwl0bshr5ihmi39k8l7v3z";
+ };
+
+ modSha256 = "063ds35dzv8m4bjk7v1q3f6jwyp7j5jrkrhrl41z1c1mbzzkagkq";
+
+ subPackages = [ "cmd/cowsay" "cmd/cowthink" ];
+
+ meta = with lib; {
+ description = "Cowsay reborn, written in Go";
+ homepage = "https://github.com/Code-Hex/Neo-cowsay";
+ license = with licenses; [artistic1 /* or */ gpl3];
+ maintainers = with maintainers; [ filalex77 ];
+ };
+}
diff --git a/nixpkgs/pkgs/tools/misc/noti/default.nix b/nixpkgs/pkgs/tools/misc/noti/default.nix
index dcc946c854e..a6288b32295 100644
--- a/nixpkgs/pkgs/tools/misc/noti/default.nix
+++ b/nixpkgs/pkgs/tools/misc/noti/default.nix
@@ -3,13 +3,13 @@
buildGoPackage rec {
pname = "noti";
- version = "3.3.0";
+ version = "3.4.0";
src = fetchFromGitHub {
owner = "variadico";
repo = "noti";
rev = version;
- sha256 = "1644bivjcky07n3rrm83vsms7hw47p4hnp2536q0z3qca5jyri2f";
+ sha256 = "0bcwfyd93fx0rzjc9jgg4pvvqbpxwizr044yqqa5rx70gaasz7qa";
};
buildInputs = lib.optional stdenv.isDarwin Cocoa;
diff --git a/nixpkgs/pkgs/tools/misc/ocz-ssd-guru/default.nix b/nixpkgs/pkgs/tools/misc/ocz-ssd-guru/default.nix
index 4317c46190d..d54302b31d1 100644
--- a/nixpkgs/pkgs/tools/misc/ocz-ssd-guru/default.nix
+++ b/nixpkgs/pkgs/tools/misc/ocz-ssd-guru/default.nix
@@ -1,4 +1,4 @@
-{ fetchurl, stdenv, xorg, freetype, fontconfig, libGLU_combined, glibc, makeWrapper }:
+{ fetchurl, stdenv, xorg, freetype, fontconfig, libGLU, libGL, glibc, makeWrapper }:
let
system = if stdenv.hostPlatform.system == "x86_64-linux" then "linux64" else "linux32";
@@ -24,7 +24,7 @@ stdenv.mkDerivation rec {
xorg.libXrender
stdenv.cc.cc
glibc
- libGLU_combined
+ libGLU libGL
];
installPhase = ''
diff --git a/nixpkgs/pkgs/tools/misc/onefetch/default.nix b/nixpkgs/pkgs/tools/misc/onefetch/default.nix
index be8c4fb9c06..e51a00dc7bd 100644
--- a/nixpkgs/pkgs/tools/misc/onefetch/default.nix
+++ b/nixpkgs/pkgs/tools/misc/onefetch/default.nix
@@ -1,15 +1,15 @@
-{ fetchFromGitHub, rustPlatform, stdenv
+{ fetchFromGitHub, rustPlatform, stdenv, fetchpatch
, CoreFoundation, libiconv, libresolv, Security }:
rustPlatform.buildRustPackage rec {
pname = "onefetch";
- version = "2.1.0";
+ version = "2.2.0";
src = fetchFromGitHub {
owner = "o2sh";
repo = pname;
rev = "v${version}";
- sha256 = "02mdzpzfcxp9na86b4jcqqjd3id5jslgmnq1jc0vykg58xha51jg";
+ sha256 = "1sgpai3gx3w7w3ilmbnmzgdxdim6klkfiqaqxmffpyap6qgksfqs";
};
cargoSha256 = "1phv06zf47bv5cmhypivljfiynrblha0kj13c5al9l0hd1xx749h";
@@ -17,6 +17,14 @@ rustPlatform.buildRustPackage rec {
buildInputs = with stdenv;
lib.optionals isDarwin [ CoreFoundation libiconv libresolv Security ];
+ cargoPatches = [
+ # fix wrong version in Cargo.lock
+ (fetchpatch {
+ url = "https://github.com/o2sh/onefetch/commit/b69fe660d72b65d7efac99ac5db3b03a82d8667f.patch";
+ sha256 = "14przkdyd4yd11xpdgyscs70w9gpnh02j3xdzxf6h895w3mn84lx";
+ })
+ ];
+
meta = with stdenv.lib; {
description = "Git repository summary on your terminal";
homepage = "https://github.com/o2sh/onefetch";
diff --git a/nixpkgs/pkgs/tools/misc/osm2pgsql/default.nix b/nixpkgs/pkgs/tools/misc/osm2pgsql/default.nix
index 1a4e4d5b3a2..8905f9eb36a 100644
--- a/nixpkgs/pkgs/tools/misc/osm2pgsql/default.nix
+++ b/nixpkgs/pkgs/tools/misc/osm2pgsql/default.nix
@@ -2,20 +2,20 @@
stdenv.mkDerivation rec {
pname = "osm2pgsql";
- version = "1.0.0";
+ version = "1.2.1";
src = fetchFromGitHub {
owner = "openstreetmap";
repo = pname;
rev = version;
- sha256 = "1g9qc1z5gzdjd37n586vcmq1qli0lkhbnsrnky0mf22szzv8iwfx";
+ sha256 = "1ysan01lpqzjxlq3y2kdminfjs5d9zksicpf9vvzpdk3fzq51fc9";
};
nativeBuildInputs = [ cmake ];
buildInputs = [ expat proj bzip2 zlib boost postgresql lua ];
- NIX_CFLAGS_COMPILE = [ "-DACCEPT_USE_OF_DEPRECATED_PROJ_API_H" ];
+ NIX_CFLAGS_COMPILE = "-DACCEPT_USE_OF_DEPRECATED_PROJ_API_H";
meta = with stdenv.lib; {
description = "OpenStreetMap data to PostgreSQL converter";
diff --git a/nixpkgs/pkgs/tools/misc/pal/default.nix b/nixpkgs/pkgs/tools/misc/pal/default.nix
index be96dd9d3d3..85bad70edc9 100644
--- a/nixpkgs/pkgs/tools/misc/pal/default.nix
+++ b/nixpkgs/pkgs/tools/misc/pal/default.nix
@@ -12,7 +12,7 @@ stdenv.mkDerivation rec {
sed -i -e 's,/etc/pal\.conf,'$out/etc/pal.conf, src/input.c
'';
- makeFlags = "prefix=$(out)";
+ makeFlags = [ "prefix=$(out)" ];
nativeBuildInputs = [ pkgconfig ];
buildInputs = [ glib gettext readline ];
diff --git a/nixpkgs/pkgs/tools/misc/paps/default.nix b/nixpkgs/pkgs/tools/misc/paps/default.nix
index 521bebf47a3..8084f49f1b3 100644
--- a/nixpkgs/pkgs/tools/misc/paps/default.nix
+++ b/nixpkgs/pkgs/tools/misc/paps/default.nix
@@ -1,18 +1,18 @@
{ stdenv, fetchFromGitHub
-, autoconf, automake, pkgconfig, pango }:
+, autoconf, automake, pkgconfig, intltool, pango }:
stdenv.mkDerivation rec {
pname = "paps";
- version = "0.7.0";
+ version = "0.7.1";
src = fetchFromGitHub {
owner = "dov";
repo = pname;
- rev = version;
- sha256 = "1f0qcawak76zk2xypipb6sy4bd8mixlrjby851x216a7f6z8fd4y";
+ rev = "v${version}";
+ sha256 = "129wpm2ayxs6qfh2761d4x9c034ivb2bcmmcnl56qs4448qb9495";
};
- nativeBuildInputs = [ autoconf automake pkgconfig ];
+ nativeBuildInputs = [ autoconf automake pkgconfig intltool ];
buildInputs = [ pango ];
preConfigure = ''
@@ -21,7 +21,7 @@ stdenv.mkDerivation rec {
meta = with stdenv.lib; {
description = "Pango to PostScript converter";
- homepage = https://github.com/dov/paps;
+ homepage = "https://github.com/dov/paps";
license = licenses.lgpl2;
maintainers = with maintainers; [ etu ];
platforms = platforms.linux;
diff --git a/nixpkgs/pkgs/tools/misc/parallel/default.nix b/nixpkgs/pkgs/tools/misc/parallel/default.nix
index e606b38775e..d1a786b3b91 100644
--- a/nixpkgs/pkgs/tools/misc/parallel/default.nix
+++ b/nixpkgs/pkgs/tools/misc/parallel/default.nix
@@ -1,11 +1,11 @@
{ fetchurl, stdenv, perl, makeWrapper, procps }:
stdenv.mkDerivation rec {
- name = "parallel-20191122";
+ name = "parallel-20191222";
src = fetchurl {
url = "mirror://gnu/parallel/${name}.tar.bz2";
- sha256 = "01wmk3sf34d2lmhl37j4ga7aims2hcnzv1bydg1xs4pablar6ahq";
+ sha256 = "0xvw578440s9cc382n7z2l8npj30nwr6wwmkyxn2pj1pcszfjagy";
};
nativeBuildInputs = [ makeWrapper ];
diff --git a/nixpkgs/pkgs/tools/misc/parcellite/default.nix b/nixpkgs/pkgs/tools/misc/parcellite/default.nix
index 8dcaed706c1..46606e3b43b 100644
--- a/nixpkgs/pkgs/tools/misc/parcellite/default.nix
+++ b/nixpkgs/pkgs/tools/misc/parcellite/default.nix
@@ -15,7 +15,7 @@ stdenv.mkDerivation rec {
nativeBuildInputs = [ autoreconfHook intltool pkgconfig wrapGAppsHook ];
buildInputs = [ gtk2 hicolor-icon-theme ];
- NIX_LDFLAGS = [ "-lgio-2.0" ];
+ NIX_LDFLAGS = "-lgio-2.0";
preFixup = ''
# Need which and xdotool on path to fix auto-pasting.
diff --git a/nixpkgs/pkgs/tools/misc/parted/default.nix b/nixpkgs/pkgs/tools/misc/parted/default.nix
index 4934252bed9..0eed491e8a9 100644
--- a/nixpkgs/pkgs/tools/misc/parted/default.nix
+++ b/nixpkgs/pkgs/tools/misc/parted/default.nix
@@ -1,28 +1,29 @@
-{ stdenv, fetchurl, fetchpatch, lvm2, libuuid, gettext, readline, perl, python2
-, utillinux, check, enableStatic ? false }:
+{ stdenv
+, fetchurl
+, fetchpatch
+, lvm2
+, libuuid
+, gettext
+, readline
+, dosfstools
+, e2fsprogs
+, perl
+, python2
+, utillinux
+, check
+, enableStatic ? false
+}:
stdenv.mkDerivation rec {
- name = "parted-3.2";
+ name = "parted-3.3";
src = fetchurl {
url = "mirror://gnu/parted/${name}.tar.xz";
- sha256 = "1r3qpg3bhz37mgvp9chsaa3k0csby3vayfvz8ggsqz194af5i2w5";
+ sha256 = "0i1xp367wpqw75b20c3jnism3dg3yqj4a7a22p2jb1h1hyyv9qjp";
};
outputs = [ "out" "dev" "man" "info" ];
- patches = stdenv.lib.optional doCheck ./gpt-unicode-test-fix.patch
- ++ stdenv.lib.optional stdenv.hostPlatform.isMusl
- (fetchpatch {
- url = "https://git.alpinelinux.org/cgit/aports/plain/main/parted/fix-includes.patch?id=9c5cd3c329a40ba4559cc1d8c7d17a9bf95c237b";
- sha256 = "117ypyiwvzym6pi8xmy16wa5z3sbpx7gh6haabs6kfb1x2894z7q";
- })
- ++ stdenv.lib.optional (lvm2 == null)
- (fetchpatch {
- url = https://git.savannah.gnu.org/cgit/parted.git/patch/?id=7e87ca3c531228d35e13e802d2622006138b104c;
- sha256 = "0i29lfg8cwj342q5s7qwqhncz2bkifj5rjc7cx6jd4zqb6ykkndj";
- });
-
postPatch = ''
patchShebangs tests
'';
@@ -42,8 +43,7 @@ stdenv.mkDerivation rec {
# Tests were previously failing due to Hydra running builds as uid 0.
# That should hopefully be fixed now.
doCheck = !stdenv.hostPlatform.isMusl; /* translation test */
-
- checkInputs = [ check perl python2 utillinux ];
+ checkInputs = [ check dosfstools e2fsprogs perl python2 utillinux ];
meta = {
description = "Create, destroy, resize, check, and copy partitions";
diff --git a/nixpkgs/pkgs/tools/misc/parted/gpt-unicode-test-fix.patch b/nixpkgs/pkgs/tools/misc/parted/gpt-unicode-test-fix.patch
deleted file mode 100644
index 3070a2e4666..00000000000
--- a/nixpkgs/pkgs/tools/misc/parted/gpt-unicode-test-fix.patch
+++ /dev/null
@@ -1,34 +0,0 @@
-From Ludo's suggestion at:
-
- http://debbugs.gnu.org/cgi/bugreport.cgi?msg=8;bug=18258
-
-diff --git a/tests/t0251-gpt-unicode.sh b/tests/t0251-gpt-unicode.sh
-index c845950..fa63a72 100755
---- a/tests/t0251-gpt-unicode.sh
-+++ b/tests/t0251-gpt-unicode.sh
-@@ -22,7 +22,24 @@ dev=loop-file
- # create zeroed device
- truncate -s 10m $dev || fail=1
-
--export LC_ALL=C.UTF-8
-+found_locale=no
-+for locale in en_US de_DE fr_FR es_ES
-+do
-+ LC_ALL="$locale.UTF-8"
-+ export LC_ALL
-+
-+ # In a UTF-8 locale, the string below prints as 4 characters.
-+ if [ `printf 'foo\341\264\244' | wc -m` -eq 4 ]; then
-+ found_locale=yes
-+ break
-+ fi
-+done
-+
-+if [ "$found_locale" != "yes" ]; then
-+ echo "no valid UTF-8 locale found; skipping" >&2
-+ exit 77
-+fi
-+
- # create gpt label with named partition
- part_name=$(printf 'foo\341\264\244')
- parted -s $dev mklabel gpt mkpart primary ext2 1MiB 2MiB name 1 $part_name > empty 2>&1 || fail=1
diff --git a/nixpkgs/pkgs/tools/misc/partition-manager/default.nix b/nixpkgs/pkgs/tools/misc/partition-manager/default.nix
index 1c094c291d8..ab3c4b5a6c4 100644
--- a/nixpkgs/pkgs/tools/misc/partition-manager/default.nix
+++ b/nixpkgs/pkgs/tools/misc/partition-manager/default.nix
@@ -27,6 +27,6 @@ in mkDerivation rec {
description = "KDE Partition Manager";
license = licenses.gpl2;
homepage = https://www.kde.org/applications/system/kdepartitionmanager/;
- maintainers = with maintainers; [ peterhoeg ma27 ];
+ maintainers = with maintainers; [ peterhoeg ];
};
}
diff --git a/nixpkgs/pkgs/tools/misc/pfetch/default.nix b/nixpkgs/pkgs/tools/misc/pfetch/default.nix
new file mode 100644
index 00000000000..491844f26b7
--- /dev/null
+++ b/nixpkgs/pkgs/tools/misc/pfetch/default.nix
@@ -0,0 +1,28 @@
+{ stdenv, fetchFromGitHub }:
+
+stdenv.mkDerivation rec {
+ pname = "pfetch";
+ version = "0.4.0";
+
+ src = fetchFromGitHub {
+ owner = "dylanaraps";
+ repo = "pfetch";
+ rev = version;
+ sha256 = "180vvbmvak888vs4dgzlmqk0ss4qfsz09700n4p8s68j7krkxsfq";
+ };
+
+ dontbuild = true;
+
+ installPhase = ''
+ mkdir -p $out/bin
+ cp pfetch $out/bin
+ '';
+
+ meta = with stdenv.lib; {
+ description = "A pretty system information tool written in POSIX sh";
+ homepage = https://github.com/dylanaraps/pfetch;
+ license = licenses.mit;
+ platforms = platforms.all;
+ maintainers = with maintainers; [ equirosa ];
+ };
+}
diff --git a/nixpkgs/pkgs/tools/misc/phoronix-test-suite/default.nix b/nixpkgs/pkgs/tools/misc/phoronix-test-suite/default.nix
index 88f24676b79..bdb86cbb802 100644
--- a/nixpkgs/pkgs/tools/misc/phoronix-test-suite/default.nix
+++ b/nixpkgs/pkgs/tools/misc/phoronix-test-suite/default.nix
@@ -2,11 +2,11 @@
stdenv.mkDerivation rec {
pname = "phoronix-test-suite";
- version = "9.0.1";
+ version = "9.2.1";
src = fetchurl {
url = "https://phoronix-test-suite.com/releases/${pname}-${version}.tar.gz";
- sha256 = "056f2z1ssr2z7qnacq5aihpnawl05blbbw0bv64pkrkl0wss85x1";
+ sha256 = "00c5xgyn34psj538zrzql16z16532c9444vc5asg7qhrcylpqpk7";
};
buildInputs = [ php ];
diff --git a/nixpkgs/pkgs/tools/misc/pipelight/default.nix b/nixpkgs/pkgs/tools/misc/pipelight/default.nix
index 5bd1e347082..4c7e9d0892c 100644
--- a/nixpkgs/pkgs/tools/misc/pipelight/default.nix
+++ b/nixpkgs/pkgs/tools/misc/pipelight/default.nix
@@ -1,4 +1,4 @@
-{ stdenv, fetchurl, bash, cabextract, curl, gnupg, libX11, libGLU_combined, wine-staging }:
+{ stdenv, fetchurl, bash, cabextract, curl, gnupg, libX11, libGLU, libGL, wine-staging }:
let
wine_custom = wine-staging;
@@ -17,9 +17,9 @@ in stdenv.mkDerivation rec {
sha256 = "1kyy6knkr42k34rs661r0f5sf6l1s2jdbphdg89n73ynijqmzjhk";
};
- buildInputs = [ wine_custom libX11 libGLU_combined curl ];
+ buildInputs = [ wine_custom libX11 libGLU libGL curl ];
- propagatedbuildInputs = [ curl cabextract ];
+ NIX_CFLAGS_COMPILE = [ "-fpermissive" ];
patches = [ ./pipelight.patch ];
diff --git a/nixpkgs/pkgs/tools/misc/plantuml/default.nix b/nixpkgs/pkgs/tools/misc/plantuml/default.nix
index c4868dd6183..ec56bb2b668 100644
--- a/nixpkgs/pkgs/tools/misc/plantuml/default.nix
+++ b/nixpkgs/pkgs/tools/misc/plantuml/default.nix
@@ -1,12 +1,12 @@
{ stdenv, fetchurl, makeWrapper, jre, graphviz }:
stdenv.mkDerivation rec {
- version = "1.2019.12";
+ version = "1.2019.13";
pname = "plantuml";
src = fetchurl {
url = "mirror://sourceforge/project/plantuml/${version}/plantuml.${version}.jar";
- sha256 = "1682lcfk63grzhzzxv34jxw3jacznvz1pd5cb266p9akk560a3z0";
+ sha256 = "0r8ahcnim7is7np68ci6ppzr07iyx417wi81gkckfyy5p4pwk8kz";
};
nativeBuildInputs = [ makeWrapper ];
diff --git a/nixpkgs/pkgs/tools/misc/ponysay/default.nix b/nixpkgs/pkgs/tools/misc/ponysay/default.nix
index 1aa7dbedd93..3fc3efa0eda 100644
--- a/nixpkgs/pkgs/tools/misc/ponysay/default.nix
+++ b/nixpkgs/pkgs/tools/misc/ponysay/default.nix
@@ -26,7 +26,7 @@ stdenv.mkDerivation {
meta = {
description = "Cowsay reimplemention for ponies";
- homepage = http://erkin.co/ponysay/;
+ homepage = "https://github.com/erkin/ponysay";
license = stdenv.lib.licenses.gpl3;
maintainers = with stdenv.lib.maintainers; [ bodil ];
platforms = with stdenv.lib.platforms; unix;
diff --git a/nixpkgs/pkgs/tools/misc/powerline-go/default.nix b/nixpkgs/pkgs/tools/misc/powerline-go/default.nix
index 5c1b1be2db3..47336e54d67 100644
--- a/nixpkgs/pkgs/tools/misc/powerline-go/default.nix
+++ b/nixpkgs/pkgs/tools/misc/powerline-go/default.nix
@@ -2,16 +2,16 @@
buildGoModule rec {
pname = "powerline-go";
- version = "1.13.0";
+ version = "1.15.0";
src = fetchFromGitHub {
owner = "justjanne";
repo = pname;
rev = "v${version}";
- sha256 = "0hgc0ji9jcsq5qnvx54dvpq8qx80mgdbvkllzavnvqr7md638zk9";
+ sha256 = "06i07m68l24v29j01qp2y91rwsfqh4x1nc8sxkjzrc7q1c7fsc1r";
};
- modSha256 = "0800r08rawv4fz08d332z0fy6pd16l1dyflz3h91ba00g59wc2ah";
+ modSha256 = "0mz1qrwar9cgrhrgw4z3gwhjj62bnfnn59ji31zkyvwlc1mqh9an";
meta = with stdenv.lib; {
description = "A Powerline like prompt for Bash, ZSH and Fish";
diff --git a/nixpkgs/pkgs/tools/misc/pspg/default.nix b/nixpkgs/pkgs/tools/misc/pspg/default.nix
index ca769be02d8..c42ea76ca85 100644
--- a/nixpkgs/pkgs/tools/misc/pspg/default.nix
+++ b/nixpkgs/pkgs/tools/misc/pspg/default.nix
@@ -2,13 +2,13 @@
stdenv.mkDerivation rec {
pname = "pspg";
- version = "2.1.8";
+ version = "2.6.0";
src = fetchFromGitHub {
owner = "okbob";
repo = pname;
rev = version;
- sha256 = "0nfc1cv2l2v1rav5jj7jz5wyb2df5l3iwrvvpkvxxpv3qll8kcfv";
+ sha256 = "0cs0hsrrknl2cv39zzq4wydx5p7095hz18yly572fnniyi4ljbdg";
};
nativeBuildInputs = [ pkgconfig ];
diff --git a/nixpkgs/pkgs/tools/misc/pws/default.nix b/nixpkgs/pkgs/tools/misc/pws/default.nix
index d5f2fd4afd4..50952435dd7 100644
--- a/nixpkgs/pkgs/tools/misc/pws/default.nix
+++ b/nixpkgs/pkgs/tools/misc/pws/default.nix
@@ -3,19 +3,19 @@
stdenv.mkDerivation rec {
name = "pws-${(import ./gemset.nix).pws.version}";
- env = bundlerEnv {
- name = "${name}-gems";
-
- inherit ruby;
-
- gemdir = ./.;
- };
-
buildInputs = [ makeWrapper ];
phases = ["installPhase"];
- installPhase = ''
+ installPhase = let
+ env = bundlerEnv {
+ name = "${name}-gems";
+
+ inherit ruby;
+
+ gemdir = ./.;
+ };
+ in ''
mkdir -p $out/bin
makeWrapper ${env}/bin/pws $out/bin/pws \
--set PATH '"${xsel}/bin/:$PATH"'
diff --git a/nixpkgs/pkgs/tools/misc/qjoypad/default.nix b/nixpkgs/pkgs/tools/misc/qjoypad/default.nix
index 4428bf1e625..3e7e3870959 100644
--- a/nixpkgs/pkgs/tools/misc/qjoypad/default.nix
+++ b/nixpkgs/pkgs/tools/misc/qjoypad/default.nix
@@ -7,7 +7,7 @@ stdenv.mkDerivation rec {
};
nativeBuildInputs = [ pkgconfig ];
buildInputs = [ libX11 libXtst qt4 ];
- NIX_LDFLAGS = [ "-lX11" ];
+ NIX_LDFLAGS = "-lX11";
patchPhase = ''
cd src
substituteInPlace config --replace /bin/bash ${stdenv.shell}
diff --git a/nixpkgs/pkgs/tools/misc/rename/default.nix b/nixpkgs/pkgs/tools/misc/rename/default.nix
index 770b229a315..e32b016016b 100644
--- a/nixpkgs/pkgs/tools/misc/rename/default.nix
+++ b/nixpkgs/pkgs/tools/misc/rename/default.nix
@@ -12,6 +12,7 @@ perlPackages.buildPerlPackage {
};
meta = with stdenv.lib; {
description = "Rename files according to a Perl rewrite expression";
+ homepage = "https://github.com/pstray/rename";
maintainers = with maintainers; [ mkg ];
license = with licenses; [ gpl1Plus ];
};
diff --git a/nixpkgs/pkgs/tools/misc/reredirect/default.nix b/nixpkgs/pkgs/tools/misc/reredirect/default.nix
new file mode 100644
index 00000000000..15045d4bd8a
--- /dev/null
+++ b/nixpkgs/pkgs/tools/misc/reredirect/default.nix
@@ -0,0 +1,29 @@
+{ stdenv, fetchFromGitHub }:
+
+stdenv.mkDerivation rec {
+ pname = "reredirect";
+ version = "0.2";
+
+ src = fetchFromGitHub {
+ owner = "jerome-pouiller";
+ repo = "reredirect";
+ rev = "v${version}";
+ sha256 = "0aqzs940kwvw80lhkszx8spcdh9ilsx5ncl9vnp611hwlryfw7kk";
+ };
+
+ makeFlags = [ "PREFIX=${placeholder "out"}" ];
+
+ postFixup = ''
+ substituteInPlace ${placeholder "out"}/bin/relink \
+ --replace "reredirect" "${placeholder "out"}/bin/reredirect"
+ '';
+
+ meta = with stdenv.lib; {
+ description = "Tool to dynamicly redirect outputs of a running process";
+ homepage = "https://github.com/jerome-pouiller/reredirect";
+ license = licenses.mit;
+ maintainers = [ maintainers.tobim ];
+ platforms = [ "i686-linux" "x86_64-linux" ];
+ };
+}
+
diff --git a/nixpkgs/pkgs/tools/misc/rlwrap/default.nix b/nixpkgs/pkgs/tools/misc/rlwrap/default.nix
index af5bfedf203..96df0707153 100644
--- a/nixpkgs/pkgs/tools/misc/rlwrap/default.nix
+++ b/nixpkgs/pkgs/tools/misc/rlwrap/default.nix
@@ -21,6 +21,6 @@ stdenv.mkDerivation rec {
homepage = https://github.com/hanslub42/rlwrap;
license = stdenv.lib.licenses.gpl2Plus;
platforms = stdenv.lib.platforms.unix;
- maintainers = with stdenv.lib.maintainers; [ fuuzetsu ];
+ maintainers = with stdenv.lib.maintainers; [ ];
};
}
diff --git a/nixpkgs/pkgs/tools/misc/slop/default.nix b/nixpkgs/pkgs/tools/misc/slop/default.nix
index 65031c2a1fe..335a687dbc2 100644
--- a/nixpkgs/pkgs/tools/misc/slop/default.nix
+++ b/nixpkgs/pkgs/tools/misc/slop/default.nix
@@ -1,5 +1,5 @@
{ stdenv, fetchFromGitHub, cmake, pkgconfig
-, glew, glm, libGLU_combined, libX11, libXext, libXrender, icu
+, glew, glm, libGLU, libGL, libX11, libXext, libXrender, icu
, cppcheck
}:
@@ -15,7 +15,7 @@ stdenv.mkDerivation rec {
};
nativeBuildInputs = [ cmake pkgconfig ];
- buildInputs = [ glew glm libGLU_combined libX11 libXext libXrender icu ]
+ buildInputs = [ glew glm libGLU libGL libX11 libXext libXrender icu ]
++ stdenv.lib.optional doCheck cppcheck;
doCheck = false;
diff --git a/nixpkgs/pkgs/tools/misc/snapper/default.nix b/nixpkgs/pkgs/tools/misc/snapper/default.nix
index 26cdbfeab67..466a5f3faf1 100644
--- a/nixpkgs/pkgs/tools/misc/snapper/default.nix
+++ b/nixpkgs/pkgs/tools/misc/snapper/default.nix
@@ -1,17 +1,17 @@
{ stdenv, fetchFromGitHub
, autoreconfHook, pkgconfig, docbook_xsl, libxslt, docbook_xml_dtd_45
, acl, attr, boost, btrfs-progs, dbus, diffutils, e2fsprogs, libxml2
-, lvm2, pam, python, utillinux, fetchpatch }:
+, lvm2, pam, python, utillinux, fetchpatch, json_c }:
stdenv.mkDerivation rec {
pname = "snapper";
- version = "0.8.5";
+ version = "0.8.7";
src = fetchFromGitHub {
owner = "openSUSE";
repo = "snapper";
rev = "v${version}";
- sha256 = "1h8qpkfcp04xpnaki2hmc7h3536dnjli2cczhzma6q9m985y45kr";
+ sha256 = "0605j4f3plb6q8lwf82y2jhply6dwj49jgxk8j16wsbf5k7lqzfq";
};
nativeBuildInputs = [
@@ -20,7 +20,7 @@ stdenv.mkDerivation rec {
];
buildInputs = [
acl attr boost btrfs-progs dbus diffutils e2fsprogs libxml2
- lvm2 pam python utillinux
+ lvm2 pam python utillinux json_c
];
patches = [
@@ -33,7 +33,7 @@ stdenv.mkDerivation rec {
postPatch = ''
# Hard-coded root paths, hard-coded root paths everywhere...
- for file in {client,data,pam,scripts}/Makefile.am; do
+ for file in {client,data,pam,scripts,zypp-plugin}/Makefile.am; do
substituteInPlace $file \
--replace '$(DESTDIR)/usr' "$out" \
--replace "DESTDIR" "out" \
@@ -49,9 +49,7 @@ stdenv.mkDerivation rec {
enableParallelBuilding = true;
- NIX_CFLAGS_COMPILE = [
- "-I${libxml2.dev}/include/libxml2"
- ];
+ NIX_CFLAGS_COMPILE = "-I${libxml2.dev}/include/libxml2";
postInstall = ''
rm -r $out/etc/cron.*
diff --git a/nixpkgs/pkgs/tools/misc/starship/default.nix b/nixpkgs/pkgs/tools/misc/starship/default.nix
index 552327c3303..fa59935f561 100644
--- a/nixpkgs/pkgs/tools/misc/starship/default.nix
+++ b/nixpkgs/pkgs/tools/misc/starship/default.nix
@@ -1,26 +1,32 @@
-{ stdenv, fetchFromGitHub, rustPlatform, libiconv, darwin }:
+{ stdenv, fetchFromGitHub, rustPlatform
+, libiconv, Security }:
rustPlatform.buildRustPackage rec {
pname = "starship";
- version = "0.26.5";
+ version = "0.33.0";
src = fetchFromGitHub {
owner = "starship";
- repo = "starship";
+ repo = pname;
rev = "v${version}";
- sha256 = "0a2jx82cwnxr0751qz2zp3chl0ndxf4wmjnar1y7s63syy9i6s52";
+ sha256 = "1wqxcfd7ams3k0swps9037dzc1qzxhpbqaz4qjw9jabgcl6jkb6v";
};
- buildInputs = stdenv.lib.optionals stdenv.isDarwin [ libiconv darwin.apple_sdk.frameworks.Security ];
+ buildInputs = stdenv.lib.optionals stdenv.isDarwin [ libiconv Security ];
- cargoSha256 = "110ajwgdshakcqxfnqi30yy0miikp2qx86flwfkd78jawfll2krp";
+ postPatch = ''
+ substituteInPlace src/utils.rs \
+ --replace "/bin/echo" "echo"
+ '';
+
+ cargoSha256 = "0gcca3vlwrfhw9k4r9zc1raflr1m4xws9dpdxjh1kz34f9g88ijg";
checkPhase = "cargo test -- --skip directory::home_directory --skip directory::directory_in_root";
meta = with stdenv.lib; {
description = "A minimal, blazing fast, and extremely customizable prompt for any shell";
homepage = "https://starship.rs";
license = licenses.isc;
- maintainers = with maintainers; [ bbigras davidtwco ];
+ maintainers = with maintainers; [ bbigras davidtwco filalex77 ];
platforms = platforms.all;
};
}
diff --git a/nixpkgs/pkgs/tools/misc/svtplay-dl/default.nix b/nixpkgs/pkgs/tools/misc/svtplay-dl/default.nix
index b530193258c..66ed0a11fd9 100644
--- a/nixpkgs/pkgs/tools/misc/svtplay-dl/default.nix
+++ b/nixpkgs/pkgs/tools/misc/svtplay-dl/default.nix
@@ -26,7 +26,7 @@ in stdenv.mkDerivation rec {
--replace 'PYTHONPATH=lib' 'PYTHONPATH=lib:$PYTHONPATH'
'';
- makeFlags = "PREFIX=$(out) SYSCONFDIR=$(out)/etc PYTHON=${python.interpreter}";
+ makeFlags = [ "PREFIX=$(out)" "SYSCONFDIR=$(out)/etc" "PYTHON=${python.interpreter}" ];
postInstall = ''
wrapProgram "$out/bin/svtplay-dl" \
diff --git a/nixpkgs/pkgs/tools/misc/teleconsole/default.nix b/nixpkgs/pkgs/tools/misc/teleconsole/default.nix
index 4cac9befe16..b8e984e90c4 100644
--- a/nixpkgs/pkgs/tools/misc/teleconsole/default.nix
+++ b/nixpkgs/pkgs/tools/misc/teleconsole/default.nix
@@ -16,7 +16,7 @@ buildGoPackage rec {
goDeps = ./deps.nix;
CGO_ENABLED = 1;
- buildFlags = "-ldflags";
+ buildFlags = [ "-ldflags" ];
meta = with stdenv.lib; {
homepage = "https://www.teleconsole.com/";
diff --git a/nixpkgs/pkgs/tools/misc/termplay/default.nix b/nixpkgs/pkgs/tools/misc/termplay/default.nix
index f9ccec87adc..dd045f1cfac 100644
--- a/nixpkgs/pkgs/tools/misc/termplay/default.nix
+++ b/nixpkgs/pkgs/tools/misc/termplay/default.nix
@@ -1,18 +1,19 @@
{ rustPlatform, fetchFromGitHub, lib, makeWrapper, gst_all_1, libsixel }:
+
rustPlatform.buildRustPackage rec {
pname = "termplay";
- version = "2.0.4";
+ version = "2.0.6";
src = fetchFromGitHub {
owner = "jD91mZM2";
repo = "termplay";
- rev = version;
+ rev = "v${version}";
- sha256 = "0qgx9xmi8n3sq5n5m6gai777sllw9hyki2kwsj2k4h1ykibzq9r0";
+ sha256 = "1w7hdqgqr1jgxid3k7f2j52wz31gv8bzr9rsm6xzp7nnihp6i45p";
};
cargoBuildFlags = ["--features" "bin"];
- cargoSha256 = "06vf2lhdsp7vsln8007zd1xcswn5akk9gnhh7582x1siiijksmn7";
+ cargoSha256 = "15i7qid91awlk74n823im1n6isqanf4vlcal90n1w9izyddzs9j0";
nativeBuildInputs = [ makeWrapper ];
buildInputs = [
diff --git a/nixpkgs/pkgs/tools/misc/termtosvg/default.nix b/nixpkgs/pkgs/tools/misc/termtosvg/default.nix
index f3a482baa48..7dc2bc618ea 100644
--- a/nixpkgs/pkgs/tools/misc/termtosvg/default.nix
+++ b/nixpkgs/pkgs/tools/misc/termtosvg/default.nix
@@ -2,11 +2,11 @@
python3Packages.buildPythonApplication rec {
pname = "termtosvg";
- version = "0.9.0";
+ version = "1.0.0";
src = python3Packages.fetchPypi {
inherit pname version;
- sha256 = "1mf2vlq083mzhja449il78zpvjq6fv36pzakwrqmgxdjbsdyvxbd";
+ sha256 = "1d0lmvprraspdqpn0rsqzvkkmpj8zk0crid5l39kxpjpxrv2irfg";
};
propagatedBuildInputs = with python3Packages; [ lxml pyte wcwidth ];
diff --git a/nixpkgs/pkgs/tools/misc/timidity/default.nix b/nixpkgs/pkgs/tools/misc/timidity/default.nix
index 318ad6e3a9d..c307c96199f 100644
--- a/nixpkgs/pkgs/tools/misc/timidity/default.nix
+++ b/nixpkgs/pkgs/tools/misc/timidity/default.nix
@@ -13,7 +13,7 @@ stdenv.mkDerivation {
configureFlags = [ "--enable-audio=oss,alsa,jack" "--enable-alsaseq" "--with-default-output=alsa" "--enable-ncurses" ];
- NIX_LDFLAGS = ["-ljack -L${libjack2}/lib"];
+ NIX_LDFLAGS = "-ljack -L${libjack2}/lib";
instruments = fetchurl {
url = http://www.csee.umbc.edu/pub/midia/instruments.tar.gz;
diff --git a/nixpkgs/pkgs/tools/misc/tio/default.nix b/nixpkgs/pkgs/tools/misc/tio/default.nix
index 3a8388280d6..9ee9b977ab2 100644
--- a/nixpkgs/pkgs/tools/misc/tio/default.nix
+++ b/nixpkgs/pkgs/tools/misc/tio/default.nix
@@ -16,6 +16,6 @@ stdenv.mkDerivation rec {
homepage = https://tio.github.io/;
license = licenses.gpl2Plus;
maintainers = with maintainers; [ yegortimoshenko ];
- platforms = platforms.linux;
+ platforms = platforms.unix;
};
}
diff --git a/nixpkgs/pkgs/tools/misc/tmate/default.nix b/nixpkgs/pkgs/tools/misc/tmate/default.nix
index 9cc083e225f..86ab2492877 100644
--- a/nixpkgs/pkgs/tools/misc/tmate/default.nix
+++ b/nixpkgs/pkgs/tools/misc/tmate/default.nix
@@ -3,13 +3,13 @@
stdenv.mkDerivation rec {
pname = "tmate";
- version = "2.3.1";
+ version = "2.4.0";
src = fetchFromGitHub {
owner = "tmate-io";
repo = "tmate";
rev = version;
- sha256 = "183rvga8nvh9r7p8104vwcmzp3vrfdhnx73vh06m2fgdq9i5rz3l";
+ sha256 = "0x5c31yq7ansmiy20a0qf59wagba9v3pq97mlkxrqxn4n1gcc6vi";
};
dontUseCmakeConfigure = true;
diff --git a/nixpkgs/pkgs/tools/misc/tmpwatch/default.nix b/nixpkgs/pkgs/tools/misc/tmpwatch/default.nix
index 59aa3861510..006cef6f102 100644
--- a/nixpkgs/pkgs/tools/misc/tmpwatch/default.nix
+++ b/nixpkgs/pkgs/tools/misc/tmpwatch/default.nix
@@ -8,7 +8,7 @@ stdenv.mkDerivation {
sha256 = "1m5859ngwx61l1i4s6fja2avf1hyv6w170by273w8nsin89825lk";
};
- configureFlags="--with-fuser=${psmisc}/bin/fuser";
+ configureFlags = [ "--with-fuser=${psmisc}/bin/fuser" ];
meta = with stdenv.lib; {
homepage = https://fedorahosted.org/tmpwatch/;
diff --git a/nixpkgs/pkgs/tools/misc/tmux-xpanes/default.nix b/nixpkgs/pkgs/tools/misc/tmux-xpanes/default.nix
new file mode 100644
index 00000000000..3ea5f758050
--- /dev/null
+++ b/nixpkgs/pkgs/tools/misc/tmux-xpanes/default.nix
@@ -0,0 +1,33 @@
+{ stdenv, fetchFromGitHub, openssl, perl }:
+
+stdenv.mkDerivation rec {
+ pname = "tmux-xpanes";
+ version = "4.1.0";
+
+ src = fetchFromGitHub {
+ owner = "greymd";
+ repo = pname;
+ rev = "v${version}";
+ sha256 = "11yz6rh2ckd1z8q80n8giv2gcz2i22fgf3pnfxq96qrzflb0d96a";
+ };
+
+ buildInputs = [ openssl perl ];
+
+ installPhase = ''
+ # Create directories.
+ install -m 755 -d $out/bin/
+ install -m 755 -d $out/share/man/man1/
+
+ # Perform installation.
+ install -m 755 bin/* $out/bin/
+ install -m 644 man/*.1 $out/share/man/man1/
+ '';
+
+ meta = with stdenv.lib; {
+ description = "tmux-based terminal divider";
+ homepage = "https://github.com/greymd/tmux-xpanes";
+ license = licenses.mit;
+ platforms = platforms.unix;
+ maintainers = with maintainers; [ monsieurp ];
+ };
+}
diff --git a/nixpkgs/pkgs/tools/misc/tmux/default.nix b/nixpkgs/pkgs/tools/misc/tmux/default.nix
index 36127dd57e6..1aa221bd59e 100644
--- a/nixpkgs/pkgs/tools/misc/tmux/default.nix
+++ b/nixpkgs/pkgs/tools/misc/tmux/default.nix
@@ -1,4 +1,12 @@
-{ stdenv, fetchFromGitHub, autoreconfHook, ncurses, libevent, pkgconfig, makeWrapper }:
+{ stdenv
+, fetchFromGitHub
+, autoreconfHook
+, pkgconfig
+, makeWrapper
+, bison
+, ncurses
+, libevent
+}:
let
@@ -13,20 +21,28 @@ in
stdenv.mkDerivation rec {
pname = "tmux";
- version = "2.9a";
+ version = "3.0a";
outputs = [ "out" "man" ];
src = fetchFromGitHub {
- owner = pname;
- repo = pname;
+ owner = "tmux";
+ repo = "tmux";
rev = version;
- sha256 = "040plbgxlz14q5p0p3wapr576jbirwripmsjyq3g1nxh76jh1ipg";
+ sha256 = "0y9lv1yr0x50v3k70vzkc8hfr7yijlsi30p7dr7i8akp3lwmmc7h";
};
- nativeBuildInputs = [ pkgconfig autoreconfHook ];
+ nativeBuildInputs = [
+ pkgconfig
+ autoreconfHook
+ bison
+ ];
- buildInputs = [ ncurses libevent makeWrapper ];
+ buildInputs = [
+ ncurses
+ libevent
+ makeWrapper
+ ];
configureFlags = [
"--sysconfdir=/etc"
@@ -39,7 +55,7 @@ stdenv.mkDerivation rec {
'';
meta = {
- homepage = http://tmux.github.io/;
+ homepage = "http://tmux.github.io/";
description = "Terminal multiplexer";
longDescription =
diff --git a/nixpkgs/pkgs/tools/misc/tmuxp/default.nix b/nixpkgs/pkgs/tools/misc/tmuxp/default.nix
index b794e46b258..9ffa89f5919 100644
--- a/nixpkgs/pkgs/tools/misc/tmuxp/default.nix
+++ b/nixpkgs/pkgs/tools/misc/tmuxp/default.nix
@@ -4,11 +4,11 @@ with python.pkgs;
buildPythonApplication rec {
pname = "tmuxp";
- version = "1.5.3";
+ version = "1.5.4";
src = fetchPypi {
inherit pname version;
- sha256 = "0vxnq5r3h32dvznh4lal29q5ny70rd861r7435gn7sa6v5ajs2f1";
+ sha256 = "13qnacqlcih731wfrsalbff1g81inkh6sypvabg5gi7gd7mha49p";
};
postPatch = ''
diff --git a/nixpkgs/pkgs/tools/misc/topgrade/default.nix b/nixpkgs/pkgs/tools/misc/topgrade/default.nix
index 8514b4b9b59..060975f2002 100644
--- a/nixpkgs/pkgs/tools/misc/topgrade/default.nix
+++ b/nixpkgs/pkgs/tools/misc/topgrade/default.nix
@@ -2,16 +2,16 @@
rustPlatform.buildRustPackage rec {
pname = "topgrade";
- version = "3.4.0";
+ version = "3.7.1";
src = fetchFromGitHub {
owner = "r-darwish";
repo = pname;
rev = "v${version}";
- sha256 = "14p7lpdp85ay5p2r9npm2adp9njcssi47mb1fh2iyn8lp51d22bi";
+ sha256 = "0vs0gnfs9swlmzsj7m3b88xfzcfy7n68bgm4i94csc3qsbip6m0j";
};
- cargoSha256 = "07h8d8fm20dp9xcz9vic63xnx2rbvanf2ivks1jiv32iy0kgz74p";
+ cargoSha256 = "1y85hl7xl60vsj3ivm6pyd6bvk39wqg25bqxfx00r9myha94iqmd";
meta = with stdenv.lib; {
description = "Upgrade all the things";
diff --git a/nixpkgs/pkgs/tools/misc/toybox/default.nix b/nixpkgs/pkgs/tools/misc/toybox/default.nix
index ccf8113e1a5..b863786145c 100644
--- a/nixpkgs/pkgs/tools/misc/toybox/default.nix
+++ b/nixpkgs/pkgs/tools/misc/toybox/default.nix
@@ -44,7 +44,7 @@ stdenv.mkDerivation rec {
makeFlags = [ "PREFIX=$(out)/bin" ] ++ lib.optional enableStatic "LDFLAGS=--static";
- installTargets = "install_flat";
+ installTargets = [ "install_flat" ];
# tests currently (as of 0.8.0) get stuck in an infinite loop...
# ...this is fixed in latest git, so doCheck can likely be enabled for next release
diff --git a/nixpkgs/pkgs/tools/misc/trash-cli/default.nix b/nixpkgs/pkgs/tools/misc/trash-cli/default.nix
index fd818ca6f9b..ac8feaef275 100644
--- a/nixpkgs/pkgs/tools/misc/trash-cli/default.nix
+++ b/nixpkgs/pkgs/tools/misc/trash-cli/default.nix
@@ -26,6 +26,12 @@ python3Packages.buildPythonApplication rec {
url = "https://github.com/andreafrancia/trash-cli/commit/a21b80d1e69783bb09376c3f60dd2f2a10578805.patch";
sha256 = "0w49rjh433sjfc2cl5a9wlbr6kcn9f1qg905qsyv7ay3ar75wvyp";
})
+
+ # Fix listing trashed files over mount points, see https://github.com/andreafrancia/trash-cli/issues/95
+ (fetchpatch {
+ url = "https://github.com/andreafrancia/trash-cli/commit/436dfddb4c2932ba3ff696e4732750b7bdc58461.patch";
+ sha256 = "02pkcz7nj67jbnqpw1943nrv95m8xyjvab4j62fa64r73fagm8m4";
+ })
];
checkInputs = with python3Packages; [
diff --git a/nixpkgs/pkgs/tools/misc/ttfautohint/default.nix b/nixpkgs/pkgs/tools/misc/ttfautohint/default.nix
index bfb97c22b1d..f82917239e6 100644
--- a/nixpkgs/pkgs/tools/misc/ttfautohint/default.nix
+++ b/nixpkgs/pkgs/tools/misc/ttfautohint/default.nix
@@ -35,7 +35,7 @@ stdenv.mkDerivation rec {
'';
homepage = https://www.freetype.org/ttfautohint;
license = licenses.gpl2Plus; # or the FreeType License (BSD + advertising clause)
- maintainers = with maintainers; [ goibhniu ndowens ];
+ maintainers = with maintainers; [ goibhniu ];
platforms = platforms.unix;
};
diff --git a/nixpkgs/pkgs/tools/misc/tty-clock/default.nix b/nixpkgs/pkgs/tools/misc/tty-clock/default.nix
index edaa9b662e7..b261f0ef841 100644
--- a/nixpkgs/pkgs/tools/misc/tty-clock/default.nix
+++ b/nixpkgs/pkgs/tools/misc/tty-clock/default.nix
@@ -14,7 +14,7 @@ stdenv.mkDerivation rec {
nativeBuildInputs = [ pkgconfig ];
buildInputs = [ ncurses ];
- makeFlags = "PREFIX=$(out)";
+ makeFlags = [ "PREFIX=$(out)" ];
meta = with stdenv.lib; {
homepage = https://github.com/xorg62/tty-clock;
diff --git a/nixpkgs/pkgs/tools/misc/txr/default.nix b/nixpkgs/pkgs/tools/misc/txr/default.nix
index c47fe77fb76..0f68ca82ece 100644
--- a/nixpkgs/pkgs/tools/misc/txr/default.nix
+++ b/nixpkgs/pkgs/tools/misc/txr/default.nix
@@ -2,16 +2,21 @@
stdenv.mkDerivation rec {
pname = "txr";
- version = "225";
+ version = "230";
src = fetchurl {
url = "http://www.kylheku.com/cgit/txr/snapshot/${pname}-${version}.tar.bz2";
- sha256 = "07vh0rmvjr2sir15l3ppp2pnp2d849dg17rzykkzqyk3d5rwfxyj";
+ sha256 = "03ab9drdqvkfq240pkrx6197jjvvjizjwfx9psjmm6lixksw0kjx";
};
nativeBuildInputs = [ bison flex ];
buildInputs = [ libffi ];
+ # fix usage of off_t without include
+ postPatch = ''
+ sed -i '1i#include <sys/types.h>' sysif.h
+ '';
+
enableParallelBuilding = true;
doCheck = true;
diff --git a/nixpkgs/pkgs/tools/misc/uutils-coreutils/default.nix b/nixpkgs/pkgs/tools/misc/uutils-coreutils/default.nix
index a32ce090ecd..5aa9f8c34a4 100644
--- a/nixpkgs/pkgs/tools/misc/uutils-coreutils/default.nix
+++ b/nixpkgs/pkgs/tools/misc/uutils-coreutils/default.nix
@@ -1,4 +1,6 @@
-{ stdenv, fetchFromGitHub, rustPlatform, cargo, cmake, sphinx, lib, prefix ? "uutils-" }:
+{ stdenv, fetchFromGitHub, rustPlatform, cargo, cmake, sphinx, lib, prefix ? "uutils-"
+, Security
+}:
rustPlatform.buildRustPackage {
name = "uutils-coreutils-2019-05-03";
@@ -19,20 +21,20 @@ rustPlatform.buildRustPackage {
++ lib.optional (prefix != null) [ "PROG_PREFIX=${prefix}" ];
nativeBuildInputs = [ cmake ];
- buildInputs = [ cargo sphinx ];
+ buildInputs = [ cargo sphinx ] ++ lib.optional stdenv.isDarwin Security;
# empty {build,install}Phase to use defaults of `stdenv.mkDerivation` rather than rust defaults
buildPhase = "";
installPhase = "";
- meta = with stdenv.lib; {
+ meta = with lib; {
description = "Cross-platform Rust rewrite of the GNU coreutils";
longDescription = ''
uutils is an attempt at writing universal (as in cross-platform)
CLI utils in Rust. This repo is to aggregate the GNU coreutils rewrites.
'';
homepage = https://github.com/uutils/coreutils;
- maintainers = with maintainers; [ ma27 ];
+ maintainers = with maintainers; [ ];
license = licenses.mit;
platforms = platforms.unix;
};
diff --git a/nixpkgs/pkgs/tools/misc/vdirsyncer/default.nix b/nixpkgs/pkgs/tools/misc/vdirsyncer/default.nix
index 7ac9542c6b5..328c343ba70 100644
--- a/nixpkgs/pkgs/tools/misc/vdirsyncer/default.nix
+++ b/nixpkgs/pkgs/tools/misc/vdirsyncer/default.nix
@@ -1,4 +1,4 @@
-{ stdenv, python3Packages, fetchFromGitHub, fetchpatch, rustPlatform, pkgconfig, openssl, Security }:
+{ stdenv, python3Packages, fetchFromGitHub, fetchpatch, rustPlatform, pkgconfig, openssl, CoreServices, Security }:
# Packaging documentation at:
# https://github.com/untitaker/vdirsyncer/blob/master/docs/packaging.rst
@@ -20,7 +20,7 @@ python3Packages.buildPythonApplication rec {
inherit src;
sourceRoot = "source/rust";
cargoSha256 = "1n1dxq3klsry5mmbfff2jv7ih8mr5zvpncrdgba6qs93wi77qi0y";
- buildInputs = [ pkgconfig openssl ] ++ stdenv.lib.optional stdenv.isDarwin Security;
+ buildInputs = [ pkgconfig openssl ] ++ stdenv.lib.optionals stdenv.isDarwin [ CoreServices Security ];
};
propagatedBuildInputs = with python3Packages; [
@@ -37,6 +37,13 @@ python3Packages.buildPythonApplication rec {
checkInputs = with python3Packages; [ hypothesis pytest pytest-localserver pytest-subtesthack ];
+ patches = [
+ (fetchpatch {
+ url = "https://github.com/pimutils/vdirsyncer/commit/7b636e8e40d69c495901f965b9c0686513659e44.patch";
+ sha256 = "0vl942ii5iad47y63v0ngmhfp37n30nxyk4j7h64b95fk38vfwx9";
+ })
+ ];
+
postPatch = ''
# see https://github.com/pimutils/vdirsyncer/pull/805
substituteInPlace setup.cfg --replace --duration --durations
diff --git a/nixpkgs/pkgs/tools/misc/vector/default.nix b/nixpkgs/pkgs/tools/misc/vector/default.nix
index b5e34165030..18ae7b5e211 100644
--- a/nixpkgs/pkgs/tools/misc/vector/default.nix
+++ b/nixpkgs/pkgs/tools/misc/vector/default.nix
@@ -1,44 +1,32 @@
{ stdenv, lib, fetchFromGitHub, rustPlatform
, openssl, pkgconfig, protobuf
-, Security, libiconv
+, Security, libiconv, rdkafka
, features ?
(if stdenv.isAarch64
- then [ "jemallocator" ]
- else [ "leveldb" "jemallocator" ])
-
-# Unfortunately, buildRustPackage does not really support using overrideAttrs
-# on the underlying fields, because it doesn't pass them to stdenv.mkDerivation
-# as an attr. making it a parameter is the only way to do so. sigh
-
-, version ? "0.5.0"
-
-, srcRef ? {
- rev = "refs/tags/v${version}";
- sha256 = "0niyxlvphn3awrpfh1hbqy767cckgjzyjrkqjxj844czxhh1hhff";
- }
-
-, cargoSha256 ? "0bdgan891hrah54g6aaysqizkxrfsbidnxihai0i7h7knzq9gsk5"
-, patches ? []
+ then [ "shiplift/unix-socket" "jemallocator" "rdkafka" "rdkafka/dynamic_linking" ]
+ else [ "leveldb" "leveldb/leveldb-sys-2" "shiplift/unix-socket" "jemallocator" "rdkafka" "rdkafka/dynamic_linking" ])
}:
rustPlatform.buildRustPackage rec {
pname = "vector";
- inherit version cargoSha256 patches;
+ version = "0.6.0";
+
src = fetchFromGitHub {
- owner = "timberio";
- repo = pname;
- inherit (srcRef) rev sha256;
+ owner = "timberio";
+ repo = pname;
+ rev = "refs/tags/v${version}";
+ sha256 = "0bb4552nwkdpnxhaq2mn4iz5w92ggqxc1b78jq2vjbh1317sj9hw";
};
- buildInputs = [ openssl pkgconfig protobuf ]
+ cargoSha256 = "1akyzrscc6pv7ggb1kna05vvxhfzrf1b4kji4bah1ry3yyqxdjsj";
+ buildInputs = [ openssl pkgconfig protobuf rdkafka ]
++ stdenv.lib.optional stdenv.isDarwin [ Security libiconv ];
# needed for internal protobuf c wrapper library
PROTOC="${protobuf}/bin/protoc";
PROTOC_INCLUDE="${protobuf}/include";
- # rdkafka fails to build, for some reason...
cargoBuildFlags = [ "--no-default-features" "--features" "${lib.concatStringsSep "," features}" ];
checkPhase = ":"; # skip tests, too -- they don't respect the rdkafka flag...
diff --git a/nixpkgs/pkgs/tools/misc/vivid/default.nix b/nixpkgs/pkgs/tools/misc/vivid/default.nix
index 4ffa250bdf5..a3df78abd25 100644
--- a/nixpkgs/pkgs/tools/misc/vivid/default.nix
+++ b/nixpkgs/pkgs/tools/misc/vivid/default.nix
@@ -2,20 +2,20 @@
rustPlatform.buildRustPackage rec {
pname = "vivid";
- version = "0.4.0";
+ version = "0.5.0";
src = fetchFromGitHub {
owner = "sharkdp";
repo = pname;
rev = "v${version}";
- sha256 = "13x0295v5blvv8dxhimbdjh81l7xl0vm6zni3qjd85psfn61371q";
+ sha256 = "00xxk1ipr3hndd717q52j7s2wfxis1p4glaa9lvp72gwwzmv5k9w";
};
postPatch = ''
substituteInPlace src/main.rs --replace /usr/share $out/share
'';
- cargoSha256 = "125392a7x0h9jgcqc4wcaky0494xmr82iacxwl883kf0g227rv2y";
+ cargoSha256 = "04xx26ngz7hx7bv5g01q9h6dqa96xkx0xm3jb0qk6c3hp6500zpn";
postInstall = ''
mkdir -p $out/share/${pname}
diff --git a/nixpkgs/pkgs/tools/misc/vmtouch/default.nix b/nixpkgs/pkgs/tools/misc/vmtouch/default.nix
index e5bb23016ae..fda442a6729 100644
--- a/nixpkgs/pkgs/tools/misc/vmtouch/default.nix
+++ b/nixpkgs/pkgs/tools/misc/vmtouch/default.nix
@@ -14,7 +14,7 @@ stdenv.mkDerivation rec {
buildInputs = [perl];
- makeFlags = "PREFIX=$(out)";
+ makeFlags = [ "PREFIX=$(out)" ];
meta = {
description = "Portable file system cache diagnostics and control";
diff --git a/nixpkgs/pkgs/tools/misc/wakatime/default.nix b/nixpkgs/pkgs/tools/misc/wakatime/default.nix
index 9016dfdf712..a685dc7cbde 100644
--- a/nixpkgs/pkgs/tools/misc/wakatime/default.nix
+++ b/nixpkgs/pkgs/tools/misc/wakatime/default.nix
@@ -3,13 +3,13 @@
with python3Packages;
buildPythonApplication rec {
pname = "wakatime";
- version = "13.0.1";
+ version = "13.0.2";
src = fetchFromGitHub {
owner = "wakatime";
repo = "wakatime";
rev = version;
- sha256 = "1a188n763hg39s8wa20mb1bj6f3vs8h7knvm4ys7q8bhsib0pyrd";
+ sha256 = "0ng7hb83gj6vb569qh58vqp4ana162r20dif086kgc3sch2z63j9";
};
# needs more dependencies from https://github.com/wakatime/wakatime/blob/191b302bfb5f272ae928c6d3867d06f3dfcba4a8/dev-requirements.txt
diff --git a/nixpkgs/pkgs/tools/misc/websocat/default.nix b/nixpkgs/pkgs/tools/misc/websocat/default.nix
index b994aecfc0e..f682bb3d2eb 100644
--- a/nixpkgs/pkgs/tools/misc/websocat/default.nix
+++ b/nixpkgs/pkgs/tools/misc/websocat/default.nix
@@ -1,28 +1,27 @@
-{ stdenv, fetchFromGitHub, pkgconfig, openssl, rustPlatform, Security
-}:
+{ stdenv, fetchFromGitHub, pkgconfig, openssl, rustPlatform, Security }:
rustPlatform.buildRustPackage rec {
pname = "websocat";
- version = "1.3.0";
+ version = "1.5.0";
src = fetchFromGitHub {
- owner = "vi";
- repo = "websocat";
- rev = "v${version}";
- sha256 = "1gf2snr12vnx2mhsrwkb5274r1pvdrf8m3bybrqbh8s9wd83nrh6";
+ owner = "vi";
+ repo = "websocat";
+ rev = "v${version}";
+ sha256 = "1lmra91ahpk4gamhnbdr066hl4vzwfh5i09fbabzdnxcvylbx8zf";
};
cargoBuildFlags = [ "--features=ssl" ];
- cargoSha256 = "1zqfvbihf8xwgh092n9wzm3mdgbv0n99gjsfk9przqj2vh7wfvh2";
+ cargoSha256 = "163kwpahrbb9v88kjkrc0jx2np3c068pspr8rqrm9cb8jyl2njrr";
nativeBuildInputs = [ pkgconfig ];
buildInputs = [ openssl ] ++ stdenv.lib.optional stdenv.isDarwin Security;
meta = with stdenv.lib; {
description = "Command-line client for WebSockets (like netcat/socat)";
- homepage = https://github.com/vi/websocat;
- license = with licenses; [ mit ];
- maintainers = [ maintainers.thoughtpolice ];
- platforms = platforms.all;
+ homepage = "https://github.com/vi/websocat";
+ license = licenses.mit;
+ maintainers = with maintainers; [ thoughtpolice filalex77 ];
+ platforms = platforms.all;
};
}
diff --git a/nixpkgs/pkgs/tools/misc/wob/default.nix b/nixpkgs/pkgs/tools/misc/wob/default.nix
index 0c46d4d6d17..c3b3cd11239 100644
--- a/nixpkgs/pkgs/tools/misc/wob/default.nix
+++ b/nixpkgs/pkgs/tools/misc/wob/default.nix
@@ -1,21 +1,20 @@
{ stdenv, fetchFromGitHub
-, meson, ninja, pkg-config, wayland # wayland-scanner
+, meson, ninja, pkg-config, scdoc, wayland # wayland-scanner
, wayland-protocols
}:
stdenv.mkDerivation rec {
pname = "wob";
- version = "0.4";
+ version = "0.6";
src = fetchFromGitHub {
owner = "francma";
repo = pname;
rev = version;
- fetchSubmodules = true;
- sha256 = "1z0vwss3ix5mf7mqpm4dzlv1bblddfi47ykblj0nmscxn1sinr7j";
+ sha256 = "0cfglwh1inv6ng55vgznhll51m9g1lxfh37k4ridyxl64rc9jfq8";
};
- nativeBuildInputs = [ meson ninja pkg-config wayland ];
+ nativeBuildInputs = [ meson ninja pkg-config scdoc wayland ];
buildInputs = [ wayland-protocols ];
meta = with stdenv.lib; {
diff --git a/nixpkgs/pkgs/tools/misc/wyrd/default.nix b/nixpkgs/pkgs/tools/misc/wyrd/default.nix
index ec516555273..6a5ec867222 100644
--- a/nixpkgs/pkgs/tools/misc/wyrd/default.nix
+++ b/nixpkgs/pkgs/tools/misc/wyrd/default.nix
@@ -9,7 +9,7 @@ stdenv.mkDerivation rec {
sha256 = "0zlrg602q781q8dij62lwdprpfliyy9j1rqfqcz8p2wgndpivddj";
};
- NIX_CFLAGS_COMPILE = [ "-DNCURSES_INTERNALS=1" ];
+ NIX_CFLAGS_COMPILE = "-DNCURSES_INTERNALS=1";
preConfigure = ''
substituteInPlace curses/curses.ml --replace 'pp gcc' "pp $CC"
diff --git a/nixpkgs/pkgs/tools/misc/xdo/default.nix b/nixpkgs/pkgs/tools/misc/xdo/default.nix
index f042b9e209f..77a2ef763a9 100644
--- a/nixpkgs/pkgs/tools/misc/xdo/default.nix
+++ b/nixpkgs/pkgs/tools/misc/xdo/default.nix
@@ -11,7 +11,7 @@ stdenv.mkDerivation rec {
sha256 = "1h3jrygcjjbavdbkpx2hscsf0yf97gk487lzjdlvymd7dxdv9hy9";
};
- makeFlags = "PREFIX=$(out)";
+ makeFlags = [ "PREFIX=$(out)" ];
buildInputs = [ libxcb xcbutilwm xcbutil ];
diff --git a/nixpkgs/pkgs/tools/misc/xilinx-bootgen/default.nix b/nixpkgs/pkgs/tools/misc/xilinx-bootgen/default.nix
new file mode 100644
index 00000000000..e7aa30ac059
--- /dev/null
+++ b/nixpkgs/pkgs/tools/misc/xilinx-bootgen/default.nix
@@ -0,0 +1,37 @@
+{ stdenv, fetchFromGitHub, openssl }:
+
+stdenv.mkDerivation {
+ pname = "xilinx-bootgen";
+ version = "unstable-2019-10-23";
+
+ src = fetchFromGitHub {
+ owner = "xilinx";
+ repo = "bootgen";
+ rev = "f9f477adf243fa40bc8c7316a7aac37a0efd426d";
+ sha256 = "1qciz3jkzy0z0lcgqnhch9pqj0202mk5ghzp2m9as5pzk8n8hrbz";
+ };
+
+ buildInputs = [ openssl ];
+
+ enableParallelBuilding = true;
+
+ installPhase = ''
+ install -Dm755 bootgen $out/bin/bootgen
+ '';
+
+ meta = with stdenv.lib; {
+ description = "Generate Boot Images for Xilinx Zynq and ZU+ SoCs";
+ longDescription = ''
+ Bootgen for Xilinx Zynq and ZU+ SoCs, without code related to generating
+ obfuscated key and without code to support FPGA encryption and
+ authentication. These features are only available as part of Bootgen
+ shipped with Vivado tools.
+
+ For more details about Bootgen, please refer to Xilinx UG1283.
+ '';
+ homepage = "https://github.com/Xilinx/bootgen";
+ license = licenses.asl20;
+ platforms = platforms.linux;
+ maintainers = [ maintainers.flokli ];
+ };
+}
diff --git a/nixpkgs/pkgs/tools/misc/xsel/default.nix b/nixpkgs/pkgs/tools/misc/xsel/default.nix
index 3d2fb50371e..4c39babc317 100644
--- a/nixpkgs/pkgs/tools/misc/xsel/default.nix
+++ b/nixpkgs/pkgs/tools/misc/xsel/default.nix
@@ -3,13 +3,13 @@
stdenv.mkDerivation {
pname = "xsel-unstable";
- version = "2018-01-10";
+ version = "2019-08-21";
src = fetchFromGitHub {
owner = "kfish";
repo = "xsel";
- rev = "9bfc13d64b5acb92c6648c696a9d9260fcbecc65";
- sha256 = "05ms34by5hxznnpvmvhgp6llvlkz0zw4sq6c4bgwr82lj140lscm";
+ rev = "ef01f3c72a195dbce682184c842b81b17d7d7ad1";
+ sha256 = "191qa6022b7nww3bicfxpgp4d9x6c8s3sgixi780383ghkxds08c";
};
nativeBuildInputs = [ autoreconfHook ];
diff --git a/nixpkgs/pkgs/tools/misc/youtube-dl/default.nix b/nixpkgs/pkgs/tools/misc/youtube-dl/default.nix
index da54b885bfc..415ec83be2f 100644
--- a/nixpkgs/pkgs/tools/misc/youtube-dl/default.nix
+++ b/nixpkgs/pkgs/tools/misc/youtube-dl/default.nix
@@ -18,11 +18,11 @@ buildPythonPackage rec {
# The websites youtube-dl deals with are a very moving target. That means that
# downloads break constantly. Because of that, updates should always be backported
# to the latest stable release.
- version = "2019.11.22";
+ version = "2019.12.25";
src = fetchurl {
url = "https://yt-dl.org/downloads/${version}/${pname}-${version}.tar.gz";
- sha256 = "0avdlp0dc9p3lm68mfnic21x6blxmr0zvlxa4br5vj4y4sckq2m8";
+ sha256 = "13f7wv9v77zilhif0ndgjv4wn9glhmm14yh7axdcx5wglrgz38hf";
};
nativeBuildInputs = [ makeWrapper ];
@@ -65,6 +65,6 @@ buildPythonPackage rec {
'';
license = licenses.publicDomain;
platforms = with platforms; linux ++ darwin;
- maintainers = with maintainers; [ bluescreen303 phreedom AndersonTorres fuuzetsu fpletz enzime ];
+ maintainers = with maintainers; [ bluescreen303 phreedom AndersonTorres fpletz enzime ma27 ];
};
}
diff --git a/nixpkgs/pkgs/tools/networking/6tunnel/default.nix b/nixpkgs/pkgs/tools/networking/6tunnel/default.nix
new file mode 100644
index 00000000000..bf0e8ba3316
--- /dev/null
+++ b/nixpkgs/pkgs/tools/networking/6tunnel/default.nix
@@ -0,0 +1,23 @@
+{ stdenv, lib, fetchFromGitHub, autoreconfHook }:
+
+stdenv.mkDerivation rec {
+ pname = "6tunnel";
+ version = "0.13";
+
+ src = fetchFromGitHub {
+ owner = "wojtekka";
+ repo = pname;
+ rev = version;
+ sha256 = "0zsx9d6xz5w8zvrqsm8r625gpbqqhjzvjdzc3z8yix668yg8ff8h";
+ };
+
+ nativeBuildInputs = [ autoreconfHook ];
+
+ meta = with lib; {
+ description = "Tunnelling for application that don't speak IPv6";
+ homepage = "https://github.com/wojtekka/6tunnel";
+ license = licenses.gpl2;
+ maintainers = with maintainers; [ filalex77 ];
+ platforms = platforms.unix;
+ };
+}
diff --git a/nixpkgs/pkgs/tools/networking/acme-client/default.nix b/nixpkgs/pkgs/tools/networking/acme-client/default.nix
index bf1c96b66b2..06c2898248d 100644
--- a/nixpkgs/pkgs/tools/networking/acme-client/default.nix
+++ b/nixpkgs/pkgs/tools/networking/acme-client/default.nix
@@ -12,13 +12,13 @@ with stdenv.lib;
stdenv.mkDerivation rec {
pname = "acme-client";
- version = "0.2.4";
+ version = "0.2.5";
src = fetchFromGitHub {
owner = "graywolf";
repo = "acme-client-portable";
rev = "v${version}";
- sha256 = "1yq2lkrnjwjs0h9mijqysnjmr7kp4zcq1f4cxr9n1db7pw8446xb";
+ sha256 = "1d9yk87nj5gizkq26m4wqfh4xhlrn5xlfj7mfgvrpsdiwibqxrrw";
};
nativeBuildInputs = [ autoreconfHook bison pkgconfig ];
diff --git a/nixpkgs/pkgs/tools/networking/aircrack-ng/default.nix b/nixpkgs/pkgs/tools/networking/aircrack-ng/default.nix
index f367d2817cd..9d948eaf822 100644
--- a/nixpkgs/pkgs/tools/networking/aircrack-ng/default.nix
+++ b/nixpkgs/pkgs/tools/networking/aircrack-ng/default.nix
@@ -1,6 +1,6 @@
{ stdenv, fetchurl, libpcap, openssl, zlib, wirelesstools
, iw, ethtool, pciutils, libnl, pkgconfig, makeWrapper
-, autoreconfHook }:
+, autoreconfHook, usbutils }:
stdenv.mkDerivation rec {
name = "aircrack-ng-1.5.2";
@@ -19,7 +19,7 @@ stdenv.mkDerivation rec {
postFixup = ''
wrapProgram $out/bin/airmon-ng --prefix PATH : ${stdenv.lib.makeBinPath [
- ethtool iw pciutils
+ ethtool iw pciutils usbutils
]}
'';
diff --git a/nixpkgs/pkgs/tools/networking/airfield/default.nix b/nixpkgs/pkgs/tools/networking/airfield/default.nix
index c53cce49a38..a31bc57904d 100644
--- a/nixpkgs/pkgs/tools/networking/airfield/default.nix
+++ b/nixpkgs/pkgs/tools/networking/airfield/default.nix
@@ -64,7 +64,7 @@ in stdenv.mkDerivation {
description = "A web-interface for hipache-proxy";
license = licenses.mit;
homepage = https://github.com/emblica/airfield;
- maintainers = with maintainers; [ offline ma27 ];
+ maintainers = with maintainers; [ offline ];
platforms = platforms.linux;
};
}
diff --git a/nixpkgs/pkgs/tools/networking/altermime/default.nix b/nixpkgs/pkgs/tools/networking/altermime/default.nix
index e9091086ed9..b1481b2208c 100644
--- a/nixpkgs/pkgs/tools/networking/altermime/default.nix
+++ b/nixpkgs/pkgs/tools/networking/altermime/default.nix
@@ -10,7 +10,8 @@ stdenv.mkDerivation rec {
sha256 = "15zxg6spcmd35r6xbidq2fgcg2nzyv1sbbqds08lzll70mqx4pj7";
};
- NIX_CFLAGS_COMPILE = [ "-Wno-error=format"
+ NIX_CFLAGS_COMPILE = toString [
+ "-Wno-error=format"
"-Wno-error=format-truncation"
"-Wno-error=pointer-compare"
"-Wno-error=memset-elt-size"
diff --git a/nixpkgs/pkgs/tools/networking/argus/default.nix b/nixpkgs/pkgs/tools/networking/argus/default.nix
index 72c0a78a447..bb9abccc933 100644
--- a/nixpkgs/pkgs/tools/networking/argus/default.nix
+++ b/nixpkgs/pkgs/tools/networking/argus/default.nix
@@ -1,5 +1,5 @@
{ stdenv, fetchurl, libpcap, bison, flex, cyrus_sasl, tcp_wrappers,
- pkgconfig, procps, which, wget, lsof, net_snmp, perl }:
+ pkgconfig, procps, which, wget, lsof, net-snmp, perl }:
stdenv.mkDerivation rec {
pname = "argus";
@@ -10,9 +10,9 @@ stdenv.mkDerivation rec {
sha256 = "1zzf688dbbcb5z2r9v1p28rddns6znzx35nc05ygza6lp7aknkna";
};
- nativeBuildInputs = [ pkgconfig ];
- buildInputs = [ libpcap bison cyrus_sasl tcp_wrappers flex ];
- propagatedBuildInputs = [ procps which wget lsof net_snmp ];
+ nativeBuildInputs = [ pkgconfig bison flex ];
+ buildInputs = [ libpcap cyrus_sasl tcp_wrappers ];
+ propagatedBuildInputs = [ procps which wget lsof net-snmp ];
patchPhase = ''
substituteInPlace events/argus-extip.pl \
@@ -23,8 +23,8 @@ stdenv.mkDerivation rec {
substituteInPlace events/argus-vmstat.sh \
--replace vm_stat ${procps}/bin/vmstat
substituteInPlace events/argus-snmp.sh \
- --replace /usr/bin/snmpget ${net_snmp}/bin/snmpget \
- --replace /usr/bin/snmpwalk ${net_snmp}/bin/snmpwalk
+ --replace /usr/bin/snmpget ${stdenv.lib.getBin net-snmp}/bin/snmpget \
+ --replace /usr/bin/snmpwalk ${stdenv.lib.getBin net-snmp}/bin/snmpwalk
'';
meta = with stdenv.lib; {
diff --git a/nixpkgs/pkgs/tools/networking/atinout/default.nix b/nixpkgs/pkgs/tools/networking/atinout/default.nix
index 175ba3960ee..16b3ee668da 100644
--- a/nixpkgs/pkgs/tools/networking/atinout/default.nix
+++ b/nixpkgs/pkgs/tools/networking/atinout/default.nix
@@ -4,7 +4,7 @@ stdenv.mkDerivation rec {
name = "atinout-${version}";
version = "0.9.2-alpha";
- NIX_CFLAGS_COMPILE = [ "-Werror=implicit-fallthrough=0" ];
+ NIX_CFLAGS_COMPILE = "-Werror=implicit-fallthrough=0";
LANG = "C.UTF-8";
nativeBuildInputs = [ ronn mount ];
diff --git a/nixpkgs/pkgs/tools/networking/babeld/default.nix b/nixpkgs/pkgs/tools/networking/babeld/default.nix
index 2ff127f3e68..5fccd9c0ebc 100644
--- a/nixpkgs/pkgs/tools/networking/babeld/default.nix
+++ b/nixpkgs/pkgs/tools/networking/babeld/default.nix
@@ -19,7 +19,7 @@ stdenv.mkDerivation rec {
homepage = http://www.pps.univ-paris-diderot.fr/~jch/software/babel/;
description = "Loop-avoiding distance-vector routing protocol";
license = stdenv.lib.licenses.mit;
- maintainers = with stdenv.lib.maintainers; [ fuuzetsu fpletz ];
+ maintainers = with stdenv.lib.maintainers; [ fpletz ];
platforms = with stdenv.lib.platforms; linux;
};
}
diff --git a/nixpkgs/pkgs/tools/networking/bandwhich/default.nix b/nixpkgs/pkgs/tools/networking/bandwhich/default.nix
new file mode 100644
index 00000000000..cfccefab351
--- /dev/null
+++ b/nixpkgs/pkgs/tools/networking/bandwhich/default.nix
@@ -0,0 +1,32 @@
+{ stdenv, fetchFromGitHub, rustPlatform, Security }:
+
+rustPlatform.buildRustPackage rec {
+ pname = "bandwhich";
+ version = "0.8.0";
+
+ src = fetchFromGitHub {
+ owner = "imsnif";
+ repo = pname;
+ rev = version;
+ sha256 = "1pd0hy17knalq4m5517ymbg95fa141843ir9283djlh3iqfgkm37";
+ };
+
+ cargoSha256 = "14mb6rbjxv3r8awvy0rjc23lyhg92q1q1dik6q1za1aq9w8yipwf";
+
+ buildInputs = stdenv.lib.optional stdenv.isDarwin Security;
+
+ meta = with stdenv.lib; {
+ description = "A CLI utility for displaying current network utilization";
+ longDescription = ''
+ bandwhich sniffs a given network interface and records IP packet size, cross
+ referencing it with the /proc filesystem on linux or lsof on MacOS. It is
+ responsive to the terminal window size, displaying less info if there is
+ no room for it. It will also attempt to resolve ips to their host name in
+ the background using reverse DNS on a best effort basis.
+ '';
+ homepage = "https://github.com/imsnif/bandwhich";
+ license = licenses.mit;
+ maintainers = with maintainers; [ filalex77 ma27 ];
+ platforms = platforms.unix;
+ };
+}
diff --git a/nixpkgs/pkgs/tools/networking/bwm-ng/default.nix b/nixpkgs/pkgs/tools/networking/bwm-ng/default.nix
index 4637a39e6e9..8e766cdeeb5 100644
--- a/nixpkgs/pkgs/tools/networking/bwm-ng/default.nix
+++ b/nixpkgs/pkgs/tools/networking/bwm-ng/default.nix
@@ -25,7 +25,7 @@ stdenv.mkDerivation rec {
void sigint(int sig) FUNCATTR_NORETURN;
-inline void init(void);
+static inline void init(void);
-
+
/* clear stuff and exit */
--- a/src/options.c
+++ b/src/options.c
@@ -41,7 +41,7 @@ stdenv.mkDerivation rec {
# This code uses inline in the gnu89 sense: see http://clang.llvm.org/compatibility.html#inline
- NIX_CFLAGS_COMPILE = if stdenv.cc.isClang then "-std=gnu89" else null;
+ NIX_CFLAGS_COMPILE = stdenv.lib.optionalString stdenv.cc.isClang "-std=gnu89";
meta = with stdenv.lib; {
description = "A small and simple console-based live network and disk io bandwidth monitor";
diff --git a/nixpkgs/pkgs/tools/networking/chrony/allow-clock_adjtime.patch b/nixpkgs/pkgs/tools/networking/chrony/allow-clock_adjtime.patch
new file mode 100644
index 00000000000..2fa3baca722
--- /dev/null
+++ b/nixpkgs/pkgs/tools/networking/chrony/allow-clock_adjtime.patch
@@ -0,0 +1,26 @@
+From 0cf506c92967c84f9ed83ba9e1be946a7fda6425 Mon Sep 17 00:00:00 2001
+From: Miroslav Lichvar <mlichvar@redhat.com>
+Date: Mon, 2 Dec 2019 12:47:13 +0100
+Subject: sys_linux: allow clock_adjtime in seccomp filter
+
+The adjtimex() function in glibc was switched to the clock_adjtime
+system call.
+
+diff --git a/sys_linux.c b/sys_linux.c
+index 63eb8f1..fcf89c2 100644
+--- a/sys_linux.c
++++ b/sys_linux.c
+@@ -478,8 +478,8 @@ SYS_Linux_EnableSystemCallFilter(int level)
+ {
+ const int syscalls[] = {
+ /* Clock */
+- SCMP_SYS(adjtimex), SCMP_SYS(clock_gettime), SCMP_SYS(gettimeofday),
+- SCMP_SYS(settimeofday), SCMP_SYS(time),
++ SCMP_SYS(adjtimex), SCMP_SYS(clock_adjtime), SCMP_SYS(clock_gettime),
++ SCMP_SYS(gettimeofday), SCMP_SYS(settimeofday), SCMP_SYS(time),
+ /* Process */
+ SCMP_SYS(clone), SCMP_SYS(exit), SCMP_SYS(exit_group), SCMP_SYS(getpid),
+ SCMP_SYS(getrlimit), SCMP_SYS(rt_sigaction), SCMP_SYS(rt_sigreturn),
+--
+cgit v0.10.2
+
diff --git a/nixpkgs/pkgs/tools/networking/chrony/default.nix b/nixpkgs/pkgs/tools/networking/chrony/default.nix
index 69c4f897c93..2ec16aa430a 100644
--- a/nixpkgs/pkgs/tools/networking/chrony/default.nix
+++ b/nixpkgs/pkgs/tools/networking/chrony/default.nix
@@ -12,6 +12,11 @@ stdenv.mkDerivation rec {
sha256 = "1d9r2dhslll4kzdmxrj0qfgwq1b30d4l3s5cwr8yr93029dpj0jf";
};
+ patches = [
+ ./allow-clock_adjtime.patch
+ ./fix-seccomp-build.patch
+ ];
+
postPatch = ''
patchShebangs test
'';
@@ -23,7 +28,7 @@ stdenv.mkDerivation rec {
hardeningEnable = [ "pie" ];
configureFlags = [ "--chronyvardir=$(out)/var/lib/chrony" ]
- ++ stdenv.lib.optional stdenv.isLinux [ "--enable-scfilter" ];
+ ++ stdenv.lib.optional stdenv.isLinux "--enable-scfilter";
meta = with stdenv.lib; {
description = "Sets your computer's clock from time servers on the Net";
diff --git a/nixpkgs/pkgs/tools/networking/chrony/fix-seccomp-build.patch b/nixpkgs/pkgs/tools/networking/chrony/fix-seccomp-build.patch
new file mode 100644
index 00000000000..6888e7efeb7
--- /dev/null
+++ b/nixpkgs/pkgs/tools/networking/chrony/fix-seccomp-build.patch
@@ -0,0 +1,13 @@
+diff --git a/sys_linux.c b/sys_linux.c
+index 898dc7a7f75..fcd334ecf03 100644
+--- a/sys_linux.c
++++ b/sys_linux.c
+@@ -503,7 +503,7 @@ SYS_Linux_EnableSystemCallFilter(int level)
+ SCMP_SYS(socketcall),
+ /* General I/O */
+ SCMP_SYS(_newselect), SCMP_SYS(close), SCMP_SYS(open), SCMP_SYS(openat), SCMP_SYS(pipe),
+- SCMP_SYS(pipe2), SCMP_SYS(poll), SCMP_SYS(ppoll), SCMP_SYS(pselect6), SCMP_SYS(read),
++ SCMP_SYS(pipe2), SCMP_SYS(poll), SCMP_SYS(pselect6), SCMP_SYS(read),
+ SCMP_SYS(futex), SCMP_SYS(select), SCMP_SYS(set_robust_list), SCMP_SYS(write),
+ /* Miscellaneous */
+ SCMP_SYS(getrandom), SCMP_SYS(sysinfo), SCMP_SYS(uname),
diff --git a/nixpkgs/pkgs/tools/networking/cjdns/default.nix b/nixpkgs/pkgs/tools/networking/cjdns/default.nix
index f9dc3de7735..df94de882be 100644
--- a/nixpkgs/pkgs/tools/networking/cjdns/default.nix
+++ b/nixpkgs/pkgs/tools/networking/cjdns/default.nix
@@ -15,7 +15,7 @@ stdenv.mkDerivation {
# for flock
stdenv.lib.optional stdenv.isLinux utillinux;
- CFLAGS = "-O2";
+ CFLAGS = "-O2 -Wno-error=stringop-truncation";
buildPhase =
stdenv.lib.optionalString stdenv.isAarch32 "Seccomp_NO=1 "
+ "bash do";
diff --git a/nixpkgs/pkgs/tools/networking/clash/default.nix b/nixpkgs/pkgs/tools/networking/clash/default.nix
new file mode 100644
index 00000000000..f3d0a584593
--- /dev/null
+++ b/nixpkgs/pkgs/tools/networking/clash/default.nix
@@ -0,0 +1,29 @@
+{ stdenv, fetchFromGitHub, buildGoModule }:
+
+buildGoModule rec {
+ pname = "clash";
+ version = "0.17.1";
+
+ src = fetchFromGitHub {
+ owner = "Dreamacro";
+ repo = pname;
+ rev = "v${version}";
+ sha256 = "0zhbaw9jzl9wqc7yx8yxqlb6fwkss4pqkv26069qg6nsk584ndnf";
+ };
+
+ goPackagePath = "github.com/Dreamacro/clash";
+ modSha256 = "0vyd61bin7hmpdqrmrikc776mgif9v25627n8hzi65kiycv40kgx";
+
+ buildFlagsArray = [
+ "-ldflags="
+ "-X ${goPackagePath}/constant.Version=${version}"
+ ];
+
+ meta = with stdenv.lib; {
+ description = "A rule-based tunnel in Go";
+ homepage = "https://github.com/Dreamacro/clash";
+ license = licenses.gpl3;
+ maintainers = with maintainers; [ contrun filalex77 ];
+ platforms = platforms.all;
+ };
+}
diff --git a/nixpkgs/pkgs/tools/networking/connman/connman-notify/default.nix b/nixpkgs/pkgs/tools/networking/connman/connman-notify/default.nix
index 0cb32ca415f..d17729c691d 100644
--- a/nixpkgs/pkgs/tools/networking/connman/connman-notify/default.nix
+++ b/nixpkgs/pkgs/tools/networking/connman/connman-notify/default.nix
@@ -1,38 +1,34 @@
-{ stdenv, fetchFromGitHub, pythonPackages, makeWrapper }:
+{ stdenv, fetchFromGitLab, python3Packages, glib, gobject-introspection, wrapGAppsHook }:
-stdenv.mkDerivation {
+python3Packages.buildPythonApplication {
pname = "connman-notify";
- version = "2014-06-23";
+ version = "2019-10-05";
- src = fetchFromGitHub {
+ src = fetchFromGitLab {
owner = "wavexx";
repo = "connman-notify";
- rev = "0ed9b5e4a0e1f03c83c4589cabf410cac66cd11d";
- sha256 = "0lhk417fdg3qxs1marpqp277bdxhwnbyrld9xj224bfk5v7xi4bg";
+ rev = "24b10a51721b54d932f4cd61ef2756423768c015";
+ sha256 = "1k5b5y6114yna2cm0cq82xilicran63hrhlklgv7k3p89057xh8j";
};
- nativeBuildInputs = [ makeWrapper ];
+ format = "other";
- buildInputs = [
- pythonPackages.python
- pythonPackages.dbus-python
- pythonPackages.pygobject2
- pythonPackages.pygtk
- pythonPackages.notify
- ];
+ nativeBuildInputs = [ gobject-introspection wrapGAppsHook ];
+
+ buildInputs = [ glib ];
+
+ pythonPath = with python3Packages; [ dbus-python pygobject3 ];
+
+ strictDeps = false;
installPhase = ''
- mkdir -p $out/bin
- cp -vai connman-notify $out/bin/
+ install -D -t $out/bin connman-notify
+ install -D -t $out/share/doc README.rst
'';
- preFixup = ''
- wrapProgram $out/bin/connman-notify --prefix PYTHONPATH : "$PYTHONPATH"
- '';
-
meta = with stdenv.lib; {
description = "Desktop notification integration for connman";
- homepage = https://github.com/wavexx/connman-notify;
+ homepage = https://gitlab.com/wavexx/connman-notify;
license = licenses.gpl2;
platforms = platforms.linux;
maintainers = [ maintainers.romildo ];
diff --git a/nixpkgs/pkgs/tools/networking/corerad/default.nix b/nixpkgs/pkgs/tools/networking/corerad/default.nix
new file mode 100644
index 00000000000..6f9ea09eea1
--- /dev/null
+++ b/nixpkgs/pkgs/tools/networking/corerad/default.nix
@@ -0,0 +1,24 @@
+{ stdenv, buildGoModule, fetchFromGitHub }:
+
+buildGoModule rec {
+ pname = "corerad";
+ version = "0.1.4";
+
+ goPackagePath = "github.com/mdlayher/corerad";
+
+ src = fetchFromGitHub {
+ owner = "mdlayher";
+ repo = "corerad";
+ rev = "v${version}";
+ sha256 = "0qlmmgdz69gqqn6h5kb3gsjyj7lm6pcfcx9xlmrxhisj914ij76r";
+ };
+
+ modSha256 = "0vim91yvw0cf9bd10hfanz8azq7q19lp2x61rs44ycx9zm3qdhcw";
+
+ meta = with stdenv.lib; {
+ homepage = "https://github.com/mdlayher/corerad";
+ description = "CoreRAD extensible and observable IPv6 NDP RA daemon";
+ license = licenses.asl20;
+ maintainers = with maintainers; [ mdlayher ];
+ };
+}
diff --git a/nixpkgs/pkgs/tools/networking/croc/default.nix b/nixpkgs/pkgs/tools/networking/croc/default.nix
index de664fe0b7d..fee1e9ee3ac 100644
--- a/nixpkgs/pkgs/tools/networking/croc/default.nix
+++ b/nixpkgs/pkgs/tools/networking/croc/default.nix
@@ -2,7 +2,7 @@
buildGoModule rec {
pname = "croc";
- version = "6.4.1";
+ version = "6.4.8";
goPackagePath = "github.com/schollz/croc";
@@ -10,17 +10,17 @@ buildGoModule rec {
owner = "schollz";
repo = pname;
rev = "v${version}";
- sha256 = "0sil1gxml4p4yysm8x6bpv5m0hvw4ss27b4c9wdag06lav0g4am0";
+ sha256 = "03wm7agjwky9ma321x6as76rg053cagmni9ygwls82jjs2pvv0bv";
};
- modSha256 = "1w84xqnn9fnkakak6j069app4ybbxpwq79g8qypwvmqg5bhvzywg";
+ modSha256 = "011pcmfih8lg8l7hwdsq51p5brnhsddzv7mvsaw5sfv8nq9p8zc2";
subPackages = [ "." ];
meta = with stdenv.lib; {
description = "Easily and securely send things from one computer to another";
homepage = https://github.com/schollz/croc;
license = licenses.mit;
- maintainers = with maintainers; [ hugoreeves ];
+ maintainers = with maintainers; [ hugoreeves equirosa ];
longDescription = ''
Croc is a command line tool written in Go that allows any two computers to
diff --git a/nixpkgs/pkgs/tools/networking/curl/default.nix b/nixpkgs/pkgs/tools/networking/curl/default.nix
index 24c3145c7db..051271e9788 100644
--- a/nixpkgs/pkgs/tools/networking/curl/default.nix
+++ b/nixpkgs/pkgs/tools/networking/curl/default.nix
@@ -5,6 +5,7 @@
, zlibSupport ? true, zlib ? null
, sslSupport ? zlibSupport, openssl ? null
, gnutlsSupport ? false, gnutls ? null
+, wolfsslSupport ? false, wolfssl ? null
, scpSupport ? zlibSupport && !stdenv.isSunOS && !stdenv.isCygwin, libssh2 ? null
, gssSupport ? !stdenv.hostPlatform.isWindows, libkrb5 ? null
, c-aresSupport ? false, c-ares ? null
@@ -17,7 +18,10 @@ assert ldapSupport -> openldap != null;
assert zlibSupport -> zlib != null;
assert sslSupport -> openssl != null;
assert !(gnutlsSupport && sslSupport);
+assert !(gnutlsSupport && wolfsslSupport);
+assert !(sslSupport && wolfsslSupport);
assert gnutlsSupport -> gnutls != null;
+assert wolfsslSupport -> wolfssl != null;
assert scpSupport -> libssh2 != null;
assert c-aresSupport -> c-ares != null;
assert brotliSupport -> brotli != null;
@@ -53,6 +57,7 @@ stdenv.mkDerivation rec {
optional c-aresSupport c-ares ++
optional sslSupport openssl ++
optional gnutlsSupport gnutls ++
+ optional wolfsslSupport wolfssl ++
optional scpSupport libssh2 ++
optional brotliSupport brotli;
@@ -67,7 +72,8 @@ stdenv.mkDerivation rec {
# to nss-cacert from the default profile.
"--without-ca-bundle"
"--without-ca-path"
- "--with-ca-fallback"
+ # The build fails when using wolfssl with --with-ca-fallback
+ ( if wolfsslSupport then "--without-ca-fallback" else "--with-ca-fallback")
"--disable-manual"
( if sslSupport then "--with-ssl=${openssl.dev}" else "--without-ssl" )
( if gnutlsSupport then "--with-gnutls=${gnutls.dev}" else "--without-gnutls" )
@@ -77,6 +83,7 @@ stdenv.mkDerivation rec {
( if idnSupport then "--with-libidn=${libidn.dev}" else "--without-libidn" )
( if brotliSupport then "--with-brotli" else "--without-brotli" )
]
+ ++ stdenv.lib.optional wolfsslSupport "--with-wolfssl=${wolfssl.dev}"
++ stdenv.lib.optional c-aresSupport "--enable-ares=${c-ares}"
++ stdenv.lib.optional gssSupport "--with-gssapi=${libkrb5.dev}"
# For the 'urandom', maybe it should be a cross-system option
diff --git a/nixpkgs/pkgs/tools/networking/curlie/default.nix b/nixpkgs/pkgs/tools/networking/curlie/default.nix
index 2073c0b8497..fa1471aa620 100644
--- a/nixpkgs/pkgs/tools/networking/curlie/default.nix
+++ b/nixpkgs/pkgs/tools/networking/curlie/default.nix
@@ -2,13 +2,13 @@
buildGoModule rec {
pname = "curlie";
- version = "1.2.0";
+ version = "1.3.1";
src= fetchFromGitHub {
owner = "rs";
repo = pname;
rev = "v${version}";
- sha256 = "0jgwd1amwjpmfgg08j9m9i15rpxijhmld9najzqb2gf8c1n5d8cf";
+ sha256 = "09v8alrbw6qva3q3bcqxnyjm7svagfxqvhdff7cqf5pbmkxnhln9";
};
modSha256 = "18nwq99vv3nbdwfilfn8v64mn58jviwybi93li0lcg7779nxab3d";
diff --git a/nixpkgs/pkgs/tools/networking/dd-agent/datadog-agent.nix b/nixpkgs/pkgs/tools/networking/dd-agent/datadog-agent.nix
index a83274188c0..2253daa2d11 100644
--- a/nixpkgs/pkgs/tools/networking/dd-agent/datadog-agent.nix
+++ b/nixpkgs/pkgs/tools/networking/dd-agent/datadog-agent.nix
@@ -1,4 +1,4 @@
-{ lib, stdenv, fetchFromGitHub, buildGoPackage, makeWrapper, pythonPackages, pkgconfig, systemd, hostname }:
+{ lib, stdenv, fetchFromGitHub, buildGoPackage, makeWrapper, pythonPackages, pkgconfig, systemd, hostname, extraTags ? [] }:
let
# keep this in sync with github.com/DataDog/agent-payload dependency
@@ -42,7 +42,7 @@ in buildGoPackage rec {
"-r ${python}/lib"
];
in ''
- buildFlagsArray=( "-tags" "ec2 systemd cpython process log" "-ldflags" "${ldFlags}")
+ buildFlagsArray=( "-tags" "ec2 systemd cpython process log secrets ${lib.concatStringsSep " " extraTags}" "-ldflags" "${ldFlags}")
'';
# DataDog use paths relative to the agent binary, so fix these.
diff --git a/nixpkgs/pkgs/tools/networking/dhcp/default.nix b/nixpkgs/pkgs/tools/networking/dhcp/default.nix
index bcf0743b7b9..c5d650f52bb 100644
--- a/nixpkgs/pkgs/tools/networking/dhcp/default.nix
+++ b/nixpkgs/pkgs/tools/networking/dhcp/default.nix
@@ -36,12 +36,14 @@ stdenv.mkDerivation rec {
"--enable-early-chroot"
"--sysconfdir=/etc"
"--localstatedir=/var"
- (lib.optional stdenv.isLinux "--with-randomdev=/dev/random")
- ] ++ stdenv.lib.optionals (openldap != null) [ "--with-ldap" "--with-ldapcrypto" ];
+ ] ++ lib.optional stdenv.isLinux "--with-randomdev=/dev/random"
+ ++ stdenv.lib.optionals (openldap != null) [ "--with-ldap" "--with-ldapcrypto" ];
- NIX_CFLAGS_COMPILE = [
+ NIX_CFLAGS_COMPILE = builtins.toString [
"-Wno-error=pointer-compare"
"-Wno-error=format-truncation"
+ "-Wno-error=stringop-truncation"
+ "-Wno-error=format-overflow"
];
installFlags = [ "DESTDIR=\${out}" ];
diff --git a/nixpkgs/pkgs/tools/networking/dhcpcd/default.nix b/nixpkgs/pkgs/tools/networking/dhcpcd/default.nix
index d63c63ab1d2..c45d017e3f5 100644
--- a/nixpkgs/pkgs/tools/networking/dhcpcd/default.nix
+++ b/nixpkgs/pkgs/tools/networking/dhcpcd/default.nix
@@ -1,14 +1,15 @@
-{ stdenv, fetchurl, pkgconfig, udev, runtimeShellPackage, runtimeShell }:
+{ stdenv, fetchurl, fetchpatch, pkgconfig, udev, runtimeShellPackage,
+runtimeShell }:
stdenv.mkDerivation rec {
# when updating this to >=7, check, see previous reverts:
# nix-build -A nixos.tests.networking.scripted.macvlan.x86_64-linux nixos/release-combined.nix
pname = "dhcpcd";
- version = "8.1.2";
+ version = "8.1.4";
src = fetchurl {
url = "mirror://roy/${pname}/${pname}-${version}.tar.xz";
- sha256 = "1b9mihp1mf2vng92fgks764a6pwf2gx7ccw6knja79c42nmyglyb";
+ sha256 = "0gf1qif25wy5lffzw39pi4sshmpxz1f4a1m9sglj7am1gaix3817";
};
nativeBuildInputs = [ pkgconfig ];
@@ -21,6 +22,13 @@ stdenv.mkDerivation rec {
substituteInPlace hooks/dhcpcd-run-hooks.in --replace /bin/sh ${runtimeShell}
'';
+ patches = [
+ (fetchpatch {
+ url = "https://roy.marples.name/cgit/dhcpcd.git/patch/?id=114870290a8d3d696bc4049c32eef3eed03d6070";
+ sha256 = "0kzpwjh2gzvl5lvlnw6lis610p67nassk3apns68ga2pyxlky8qb";
+ })
+ ];
+
preConfigure = "patchShebangs ./configure";
configureFlags = [
diff --git a/nixpkgs/pkgs/tools/networking/eternal-terminal/default.nix b/nixpkgs/pkgs/tools/networking/eternal-terminal/default.nix
index 3382616bfb6..8dd18df28c7 100644
--- a/nixpkgs/pkgs/tools/networking/eternal-terminal/default.nix
+++ b/nixpkgs/pkgs/tools/networking/eternal-terminal/default.nix
@@ -8,13 +8,13 @@
stdenv.mkDerivation rec {
pname = "eternal-terminal";
- version = "6.0.4";
+ version = "6.0.5";
src = fetchFromGitHub {
owner = "MisterTea";
repo = "EternalTerminal";
rev = "et-v${version}";
- sha256 = "05hbcbbxpvwm17ascnrwrz413kp3i94kp4px3vqx0f635rm41dqc";
+ sha256 = "04jn0189vq5lc795izkxq1zdv9fnpxz2xchg2mm37armpz7n06id";
};
nativeBuildInputs = [ cmake ];
diff --git a/nixpkgs/pkgs/tools/networking/findomain/default.nix b/nixpkgs/pkgs/tools/networking/findomain/default.nix
new file mode 100644
index 00000000000..abc34abd77f
--- /dev/null
+++ b/nixpkgs/pkgs/tools/networking/findomain/default.nix
@@ -0,0 +1,37 @@
+{ stdenv
+, lib
+, fetchFromGitHub
+, rustPlatform
+, installShellFiles
+, perl
+, Security
+}:
+
+rustPlatform.buildRustPackage rec {
+ pname = "findomain";
+ version = "0.9.3";
+
+ src = fetchFromGitHub {
+ owner = "Edu4rdSHL";
+ repo = pname;
+ rev = version;
+ sha256 = "1p7bj8q3zwn92nn6d71bk7cczclcsjvan6m8znlzr4lrwircp1y1";
+ };
+
+ cargoSha256 = "1grb0frc1kp3z6vs2906h9v1yx9qxn6x0gf9jy1msqgnqjw0bgn9";
+
+ nativeBuildInputs = [ installShellFiles perl ];
+ buildInputs = lib.optional stdenv.isDarwin Security;
+
+ postInstall = ''
+ installManPage ${pname}.1
+ '';
+
+ meta = with lib; {
+ description = "The fastest and cross-platform subdomain enumerator";
+ homepage = "https://github.com/Edu4rdSHL/findomain";
+ license = licenses.gpl3;
+ maintainers = with maintainers; [ filalex77 ];
+ platforms = platforms.all;
+ };
+}
diff --git a/nixpkgs/pkgs/tools/networking/frp/default.nix b/nixpkgs/pkgs/tools/networking/frp/default.nix
new file mode 100644
index 00000000000..46ccfc0d24c
--- /dev/null
+++ b/nixpkgs/pkgs/tools/networking/frp/default.nix
@@ -0,0 +1,31 @@
+{ buildGoModule, lib, fetchFromGitHub }:
+
+buildGoModule rec {
+ pname = "frp";
+ version = "0.31.1";
+
+ src = fetchFromGitHub {
+ owner = "fatedier";
+ repo = pname;
+ rev = "v${version}";
+ sha256 = "1cf2f0nbcg76i4mv8l3d38c13lw0mma6d2xzwkb9iqn7jflj1j9y";
+ };
+
+ modSha256 = "1zbl0gfc99pbzdacxhfa1k3y6i7v13sb441wpbp9aygxhvwqrms9";
+
+ subPackages = [ "cmd/frpc" "cmd/frps" ];
+
+ meta = with lib; {
+ description = "Fast reverse proxy";
+ longDescription = ''
+ frp is a fast reverse proxy to help you expose a local server behind a
+ NAT or firewall to the Internet. As of now, it supports TCP and UDP, as
+ well as HTTP and HTTPS protocols, where requests can be forwarded to
+ internal services by domain name. frp also has a P2P connect mode.
+ '';
+ homepage = "https://github.com/fatedier/frp";
+ license = licenses.asl20;
+ maintainers = with maintainers; [ filalex77 ];
+ platforms = platforms.all;
+ };
+}
diff --git a/nixpkgs/pkgs/tools/networking/gnirehtet/default.nix b/nixpkgs/pkgs/tools/networking/gnirehtet/default.nix
index 37d2eea825f..06faa064025 100644
--- a/nixpkgs/pkgs/tools/networking/gnirehtet/default.nix
+++ b/nixpkgs/pkgs/tools/networking/gnirehtet/default.nix
@@ -1,12 +1,12 @@
{stdenv, rustPlatform, fetchFromGitHub, fetchzip, androidenv, substituteAll}:
let
-version = "2.3";
+version = "2.4";
apk = stdenv.mkDerivation {
pname = "gnirehtet.apk";
inherit version;
src = fetchzip {
url = "https://github.com/Genymobile/gnirehtet/releases/download/v${version}/gnirehtet-rust-linux64-v${version}.zip";
- sha256 = "08pgmpbz82cd8ndr2syiv25l5xk1gvh9gzji4pgva5gw269bjmpz";
+ sha256 = "13gsh5982v961j86j5y71pgas94g2d1v1fgnbslbqw4h69fbf48g";
};
installPhase = ''
mkdir $out
@@ -22,10 +22,10 @@ rustPlatform.buildRustPackage {
owner = "Genymobile";
repo = "gnirehtet";
rev = "v${version}";
- sha256 = "118ig42qzr2xyra7r8zfxq38xidaxfc98ja9836jwnn9fgbigczr";
+ sha256 = "1c99d6zpjxa8xlrg0n1825am20d2pjiicfcjwv8iay9ylfdnvygl";
};
sourceRoot = "source/relay-rust";
- cargoSha256 = "1500lfwbfnc0k2hn7r1n629fq11zfqm3fg13dddmhchq4i3sqkfb";
+ cargoSha256 = "1l1cirhmfkpa466vksynlhwggsfiahws7cpsxydrc414l415l283";
patchFlags = [ "-p2" ];
patches = [
diff --git a/nixpkgs/pkgs/tools/networking/haproxy/default.nix b/nixpkgs/pkgs/tools/networking/haproxy/default.nix
index 2b5f52b51aa..95457b01205 100644
--- a/nixpkgs/pkgs/tools/networking/haproxy/default.nix
+++ b/nixpkgs/pkgs/tools/networking/haproxy/default.nix
@@ -11,11 +11,11 @@ assert usePcre -> pcre != null;
stdenv.mkDerivation rec {
pname = "haproxy";
- version = "2.0.8";
+ version = "2.0.10";
src = fetchurl {
url = "https://www.haproxy.org/download/${stdenv.lib.versions.majorMinor version}/src/${pname}-${version}.tar.gz";
- sha256 = "02i87hr1dfhrk6nvvcig4m9bpww7hyl6qcxcl20rfvxd2n2iwzn3";
+ sha256 = "1sm42q9l159pdmjs5dg544z10dn6x073caljkqh0p4syshysnf0x";
};
buildInputs = [ openssl zlib ]
diff --git a/nixpkgs/pkgs/tools/networking/ifstat-legacy/default.nix b/nixpkgs/pkgs/tools/networking/ifstat-legacy/default.nix
index 756e77f1157..72aaaa1e170 100644
--- a/nixpkgs/pkgs/tools/networking/ifstat-legacy/default.nix
+++ b/nixpkgs/pkgs/tools/networking/ifstat-legacy/default.nix
@@ -1,4 +1,4 @@
-{ stdenv, fetchurl, autoreconfHook, net_snmp }:
+{ stdenv, fetchurl, autoreconfHook, net-snmp }:
stdenv.mkDerivation rec {
pname = "ifstat-legacy";
@@ -9,7 +9,7 @@ stdenv.mkDerivation rec {
sha256 = "01zmv6vk5kh5xmd563xws8a1qnxjb6b6kv59yzz9r3rrghxhd6c5";
};
- buildInputs = [ net_snmp ];
+ buildInputs = [ net-snmp ];
nativeBuildInputs = [ autoreconfHook ];
diff --git a/nixpkgs/pkgs/tools/networking/iodine/default.nix b/nixpkgs/pkgs/tools/networking/iodine/default.nix
index 5aa0c01e848..44bf52c9933 100644
--- a/nixpkgs/pkgs/tools/networking/iodine/default.nix
+++ b/nixpkgs/pkgs/tools/networking/iodine/default.nix
@@ -14,7 +14,7 @@ stdenv.mkDerivation rec {
NIX_CFLAGS_COMPILE = "-DIFCONFIGPATH=\"${nettools}/bin/\"";
- installFlags = "prefix=\${out}";
+ installFlags = [ "prefix=\${out}" ];
meta = {
homepage = http://code.kryo.se/iodine/;
diff --git a/nixpkgs/pkgs/tools/networking/ipv6calc/default.nix b/nixpkgs/pkgs/tools/networking/ipv6calc/default.nix
index 5de4b8cecb7..35aeb23a9a8 100644
--- a/nixpkgs/pkgs/tools/networking/ipv6calc/default.nix
+++ b/nixpkgs/pkgs/tools/networking/ipv6calc/default.nix
@@ -30,13 +30,9 @@ stdenv.mkDerivation rec {
"--disable-bundled-md5"
"--disable-dynamic-load"
"--enable-shared"
- ] ++ stdenv.lib.optional (libmaxminddb != null ) [
- "--enable-mmdb"
- ] ++ stdenv.lib.optional (geolite-legacy != null) [
- "--with-geoip-db=${geolite-legacy}/share/GeoIP"
- ] ++ stdenv.lib.optional (ip2location-c != null ) [
- "--enable-ip2location"
- ];
+ ] ++ stdenv.lib.optional (libmaxminddb != null) "--enable-mmdb"
+ ++ stdenv.lib.optional (geolite-legacy != null) "--with-geoip-db=${geolite-legacy}/share/GeoIP"
+ ++ stdenv.lib.optional (ip2location-c != null) "--enable-ip2location";
enableParallelBuilding = true;
diff --git a/nixpkgs/pkgs/tools/networking/keepalived/default.nix b/nixpkgs/pkgs/tools/networking/keepalived/default.nix
index 4e1894db98c..87748211425 100644
--- a/nixpkgs/pkgs/tools/networking/keepalived/default.nix
+++ b/nixpkgs/pkgs/tools/networking/keepalived/default.nix
@@ -1,32 +1,28 @@
-{ stdenv, fetchFromGitHub, fetchpatch, libnfnetlink, libnl, net_snmp, openssl, pkgconfig }:
+{ stdenv, fetchFromGitHub, nixosTests
+, libnfnetlink, libnl, net-snmp, openssl
+, pkgconfig, autoreconfHook }:
stdenv.mkDerivation rec {
pname = "keepalived";
- version = "1.4.5";
+ version = "2.0.19";
src = fetchFromGitHub {
owner = "acassen";
repo = "keepalived";
rev = "v${version}";
- sha256 = "12r80rcfxrys826flaqcdlfhcr7q4ccsd62ra1svy9545vf02qmx";
+ sha256 = "05jgr0f04z69x3zf3b9z04wczl15fnh69bs6j0yw55fij1k9nj4d";
};
- patches = [
- (fetchpatch {
- name = "CVE-2018-19115.patch";
- url = "https://github.com/acassen/keepalived/pull/961/commits/f28015671a4b04785859d1b4b1327b367b6a10e9.patch";
- sha256 = "1jnwk7x4qdgv7fb4jzw6sihv62n8wv04myhgwm2vxn8nfkcgd1mm";
- })
- ];
-
buildInputs = [
libnfnetlink
libnl
- net_snmp
+ net-snmp
openssl
];
- nativeBuildInputs = [ pkgconfig ];
+ passthru.tests.keepalived = nixosTests.keepalived;
+
+ nativeBuildInputs = [ pkgconfig autoreconfHook ];
configureFlags = [
"--enable-sha1"
diff --git a/nixpkgs/pkgs/tools/networking/lftp/default.nix b/nixpkgs/pkgs/tools/networking/lftp/default.nix
index 13bdbe17ff8..9a982e53825 100644
--- a/nixpkgs/pkgs/tools/networking/lftp/default.nix
+++ b/nixpkgs/pkgs/tools/networking/lftp/default.nix
@@ -2,7 +2,7 @@
stdenv.mkDerivation rec {
pname = "lftp";
- version = "4.8.4";
+ version = "4.9.0";
src = fetchurl {
urls = [
@@ -10,7 +10,7 @@ stdenv.mkDerivation rec {
"https://ftp.st.ryukoku.ac.jp/pub/network/ftp/lftp/${pname}-${version}.tar.xz"
"https://lftp.yar.ru/ftp/${pname}-${version}.tar.xz"
];
- sha256 = "0qks22357xv9y6ripmf5j2n5svh8j5z0yniphfk89sjwkqg2gg2f";
+ sha256 = "0km267h57mlrd7gnn9gf40znvb3irwfc0qaql8kii8v936g6afqb";
};
nativeBuildInputs = [ pkgconfig ];
diff --git a/nixpkgs/pkgs/tools/networking/libreswan/default.nix b/nixpkgs/pkgs/tools/networking/libreswan/default.nix
index 9a0b8c9ebf5..4c8b926b582 100644
--- a/nixpkgs/pkgs/tools/networking/libreswan/default.nix
+++ b/nixpkgs/pkgs/tools/networking/libreswan/default.nix
@@ -1,12 +1,12 @@
{ stdenv, fetchurl, makeWrapper,
pkgconfig, systemd, gmp, unbound, bison, flex, pam, libevent, libcap_ng, curl, nspr,
bash, iproute, iptables, procps, coreutils, gnused, gawk, nss, which, python,
- docs ? false, xmlto
+ docs ? false, xmlto, libselinux, ldns
}:
let
optional = stdenv.lib.optional;
- version = "3.18";
+ version = "3.29";
name = "libreswan-${version}";
binPath = stdenv.lib.makeBinPath [
bash iproute iptables procps coreutils gnused gawk nss.tools which python
@@ -14,6 +14,7 @@ let
in
assert docs -> xmlto != null;
+assert stdenv.isLinux -> libselinux != null;
stdenv.mkDerivation {
inherit name;
@@ -21,28 +22,35 @@ stdenv.mkDerivation {
src = fetchurl {
url = "https://download.libreswan.org/${name}.tar.gz";
- sha256 = "0zginnakxw7m79zrdvfdvliaiyg78zgqfqkks9z5d1rjj5w13xig";
+ sha256 = "0gmbb1m5in5dvnbk1n31r8myrdankzvi6yk9gcqbcwijyih423nn";
};
# These flags were added to compile v3.18. Try to lift them when updating.
- NIX_CFLAGS_COMPILE = [ "-Wno-error=redundant-decls" "-Wno-error=format-nonliteral"
+ NIX_CFLAGS_COMPILE = toString [ "-Wno-error=redundant-decls" "-Wno-error=format-nonliteral"
# these flags were added to build with gcc7
"-Wno-error=implicit-fallthrough"
"-Wno-error=format-truncation"
"-Wno-error=pointer-compare"
+ "-Wno-error=stringop-truncation"
];
nativeBuildInputs = [ makeWrapper pkgconfig ];
buildInputs = [ bash iproute iptables systemd coreutils gnused gawk gmp unbound bison flex pam libevent
- libcap_ng curl nspr nss python ]
- ++ optional docs xmlto;
+ libcap_ng curl nspr nss python ldns ]
+ ++ optional docs xmlto
+ ++ optional stdenv.isLinux libselinux;
prePatch = ''
# Correct bash path
sed -i -e 's|/bin/bash|/usr/bin/env bash|' mk/config.mk
- # Fix systemd unit directory, and prevent the makefile from trying to reload the systemd daemon
- sed -i -e 's|UNITDIR=.*$|UNITDIR=$\{out}/etc/systemd/system/|' -e 's|systemctl --system daemon-reload|true|' initsystems/systemd/Makefile
+ # Fix systemd unit directory, and prevent the makefile from trying to reload the
+ # systemd daemon or create tmpfiles
+ sed -i -e 's|UNITDIR=.*$|UNITDIR=$\{out}/etc/systemd/system/|g' \
+ -e 's|TMPFILESDIR=.*$|TMPFILESDIR=$\{out}/tmpfiles.d/|g' \
+ -e 's|systemctl|true|g' \
+ -e 's|systemd-tmpfiles|true|g' \
+ initsystems/systemd/Makefile
# Fix the ipsec program from crushing the PATH
sed -i -e 's|\(PATH=".*"\):.*$|\1:$PATH|' programs/ipsec/ipsec.in
@@ -51,8 +59,6 @@ stdenv.mkDerivation {
sed -i -e 's|#!/usr/bin/python|#!/usr/bin/env python|' -e 's/^\(\W*\)installstartcheck()/\1sscmd = "ss"\n\0/' programs/verify/verify.in
'';
- patches = [ ./libreswan-3.18-glibc-2.26.patch ];
-
# Set appropriate paths for build
preBuild = "export INC_USRLOCAL=\${out}";
diff --git a/nixpkgs/pkgs/tools/networking/libreswan/libreswan-3.18-glibc-2.26.patch b/nixpkgs/pkgs/tools/networking/libreswan/libreswan-3.18-glibc-2.26.patch
deleted file mode 100644
index 33c44f617a0..00000000000
--- a/nixpkgs/pkgs/tools/networking/libreswan/libreswan-3.18-glibc-2.26.patch
+++ /dev/null
@@ -1,36 +0,0 @@
-diff --git a/lib/libswan/id.c b/lib/libswan/id.c
-index 8f06275..efb0394 100644
---- a/lib/libswan/id.c
-+++ b/lib/libswan/id.c
-@@ -22,6 +22,7 @@
- #include <sys/socket.h>
- #include <netinet/in.h>
- #include <arpa/inet.h>
-+#include <limits.h>
- #include <unistd.h>
- #ifndef HOST_NAME_MAX /* POSIX 1003.1-2001 says <unistd.h> defines this */
- #define HOST_NAME_MAX 255 /* upper bound, according to SUSv2 */
-diff --git a/linux/include/libreswan.h b/linux/include/libreswan.h
-index c5efc6a..b0af4d7 100644
---- a/linux/include/libreswan.h
-+++ b/linux/include/libreswan.h
-@@ -211,6 +211,7 @@ static inline deltatime_t monotimediff(monotime_t a, monotime_t b) {
- #include <assert.h>
- #define user_assert(foo) assert(foo)
- #include <stdio.h>
-+#include <stdint.h>
-
- # define uint8_t u_int8_t
- # define uint16_t u_int16_t
-diff --git a/programs/pluto/rcv_whack.c b/programs/pluto/rcv_whack.c
-index 588c66c..4fc6289 100644
---- a/programs/pluto/rcv_whack.c
-+++ b/programs/pluto/rcv_whack.c
-@@ -24,6 +24,7 @@
- #include <stddef.h>
- #include <stdlib.h>
- #include <string.h>
-+#include <limits.h>
- #include <unistd.h>
- #ifndef HOST_NAME_MAX /* POSIX 1003.1-2001 says <unistd.h> defines this */
- # define HOST_NAME_MAX 255 /* upper bound, according to SUSv2 */
diff --git a/nixpkgs/pkgs/tools/networking/lldpd/default.nix b/nixpkgs/pkgs/tools/networking/lldpd/default.nix
index b8ba1357f5f..23dbb60767e 100644
--- a/nixpkgs/pkgs/tools/networking/lldpd/default.nix
+++ b/nixpkgs/pkgs/tools/networking/lldpd/default.nix
@@ -1,5 +1,5 @@
{ stdenv, lib, fetchurl, pkgconfig, removeReferencesTo
-, libevent, readline, net_snmp, openssl
+, libevent, readline, net-snmp, openssl
}:
stdenv.mkDerivation rec {
@@ -19,7 +19,7 @@ stdenv.mkDerivation rec {
];
nativeBuildInputs = [ pkgconfig removeReferencesTo ];
- buildInputs = [ libevent readline net_snmp openssl ];
+ buildInputs = [ libevent readline net-snmp openssl ];
enableParallelBuilding = true;
diff --git a/nixpkgs/pkgs/tools/networking/mailutils/default.nix b/nixpkgs/pkgs/tools/networking/mailutils/default.nix
index 40eeed7f050..dcf377ca0c0 100644
--- a/nixpkgs/pkgs/tools/networking/mailutils/default.nix
+++ b/nixpkgs/pkgs/tools/networking/mailutils/default.nix
@@ -1,15 +1,15 @@
{ stdenv, fetchurl, fetchpatch, autoreconfHook, dejagnu, gettext, pkgconfig
, gdbm, pam, readline, ncurses, gnutls, guile, texinfo, gnum4, sasl, fribidi, nettools
-, python, gss, libmysqlclient, system-sendmail }:
+, python3, gss, libmysqlclient, system-sendmail }:
stdenv.mkDerivation rec {
name = "${project}-${version}";
project = "mailutils";
- version = "3.2";
+ version = "3.8";
src = fetchurl {
url = "mirror://gnu/${project}/${name}.tar.xz";
- sha256 = "0zh7xn8yvnw9zkc7gi5290i34viwxp1rn0g1q9nyvmckkvk59lwn";
+ sha256 = "1wkn9ch664477r4d8jk9153w5msljsbj99907k7zgzpmywbs6ba7";
};
postPatch = ''
@@ -29,17 +29,11 @@ stdenv.mkDerivation rec {
buildInputs = [
gdbm pam readline ncurses gnutls guile texinfo gnum4 sasl fribidi nettools
- gss libmysqlclient python
+ gss libmysqlclient python3
];
patches = [
- (fetchpatch {
- url = "https://git.savannah.gnu.org/cgit/mailutils.git/patch/?id=afbb33cf9ff";
- excludes = [ "NEWS" ];
- sha256 = "0yzkfx3j1zkkb43fhchjqphw4xznbclj39bjzjggv32gppy6d1db";
- })
./fix-build-mb-len-max.patch
- ./fix-test-ali-awk.patch
./path-to-cat.patch
];
diff --git a/nixpkgs/pkgs/tools/networking/mailutils/fix-test-ali-awk.patch b/nixpkgs/pkgs/tools/networking/mailutils/fix-test-ali-awk.patch
deleted file mode 100644
index 3d301d530de..00000000000
--- a/nixpkgs/pkgs/tools/networking/mailutils/fix-test-ali-awk.patch
+++ /dev/null
@@ -1,16 +0,0 @@
-diff --git a/mh/tests/ali.at b/mh/tests/ali.at
-index 28c0e5451..c76cf9363 100644
---- a/mh/tests/ali.at
-+++ b/mh/tests/ali.at
-@@ -85,9 +85,9 @@ ali -a ./mh_aliases korzen | tr -d ' '
- [expout])
-
- MH_CHECK([ali: group id],[ali05 ali-group-id ali-gid],[
--cat /etc/passwd | awk -F : '/^#/ { next } $4==0 { print $1 }' > expout
-+cat /etc/passwd | awk -F : '/^#/ { next } $4==0 { print $1; exit }' > expout
- test -s expout || AT_SKIP_TEST
--name=`awk -F : '/^#/ { next } $3==0 { print $1 }' /etc/group < /dev/null`
-+name=`awk -F : '/^#/ { next } $3==0 { print $1; exit }' /etc/group < /dev/null`
- test -z "$name" && AT_SKIP_TEST
-
- echo "korzen: +$name" > mh_aliases
diff --git a/nixpkgs/pkgs/tools/networking/maphosts/default.nix b/nixpkgs/pkgs/tools/networking/maphosts/default.nix
index e54a2b21d9f..dd9886a65ee 100644
--- a/nixpkgs/pkgs/tools/networking/maphosts/default.nix
+++ b/nixpkgs/pkgs/tools/networking/maphosts/default.nix
@@ -1,13 +1,13 @@
{ stdenv, lib, bundlerEnv, ruby, bundlerUpdateScript }:
-stdenv.mkDerivation rec {
- name = "maphosts-${env.gems.maphosts.version}";
-
+let
env = bundlerEnv {
name = "maphosts-gems";
inherit ruby;
gemdir = ./.;
};
+in stdenv.mkDerivation {
+ name = "maphosts-${env.gems.maphosts.version}";
phases = ["installPhase"];
diff --git a/nixpkgs/pkgs/tools/networking/mcrcon/default.nix b/nixpkgs/pkgs/tools/networking/mcrcon/default.nix
index e902f24ca0e..469dd4cceb7 100644
--- a/nixpkgs/pkgs/tools/networking/mcrcon/default.nix
+++ b/nixpkgs/pkgs/tools/networking/mcrcon/default.nix
@@ -2,13 +2,13 @@
stdenv.mkDerivation rec {
pname = "mcrcon";
- version = "0.6.1";
+ version = "0.7.1";
src = fetchFromGitHub {
owner = "Tiiffi";
repo = "mcrcon";
rev = "v${version}";
- sha256 = "0as60cgl8sflykmwihc6axy1hzx6gjgjav6c7mvlbsc43dv8fs51";
+ sha256 = "004h1glagyw1mic1k461bky0w2fxdfhrhcqjzr9wp6gvyy9s8bix";
};
buildPhase = ''
diff --git a/nixpkgs/pkgs/tools/networking/miniupnpc/default.nix b/nixpkgs/pkgs/tools/networking/miniupnpc/default.nix
index dc0a4457dde..ebe6a60291a 100644
--- a/nixpkgs/pkgs/tools/networking/miniupnpc/default.nix
+++ b/nixpkgs/pkgs/tools/networking/miniupnpc/default.nix
@@ -11,14 +11,13 @@ let
inherit sha256;
};
- nativeBuildInputs = [] ++
- stdenv.lib.optionals stdenv.isDarwin [ which cctools ];
+ nativeBuildInputs = stdenv.lib.optionals stdenv.isDarwin [ which cctools ];
patches = stdenv.lib.optional stdenv.isFreeBSD ./freebsd.patch;
doCheck = !stdenv.isFreeBSD;
- makeFlags = "PREFIX=$(out) INSTALLPREFIX=$(out)";
+ makeFlags = [ "PREFIX=$(out)" "INSTALLPREFIX=$(out)" ];
meta = with stdenv.lib; {
homepage = http://miniupnp.free.fr/;
diff --git a/nixpkgs/pkgs/tools/networking/mu/default.nix b/nixpkgs/pkgs/tools/networking/mu/default.nix
index bd035e8f03c..6c2a42e3a24 100644
--- a/nixpkgs/pkgs/tools/networking/mu/default.nix
+++ b/nixpkgs/pkgs/tools/networking/mu/default.nix
@@ -1,6 +1,6 @@
{ stdenv, fetchFromGitHub, sqlite, pkgconfig, autoreconfHook, pmccabe
, xapian, glib, gmime3, texinfo , emacs, guile
-, gtk3, webkitgtk24x-gtk3, libsoup, icu
+, gtk3, webkitgtk, libsoup, icu
, withMug ? false }:
stdenv.mkDerivation rec {
@@ -21,7 +21,7 @@ stdenv.mkDerivation rec {
buildInputs = [
sqlite xapian glib gmime3 texinfo emacs guile libsoup icu
- ] ++ stdenv.lib.optionals withMug [ gtk3 webkitgtk24x-gtk3 ];
+ ] ++ stdenv.lib.optionals withMug [ gtk3 webkitgtk ];
nativeBuildInputs = [ pkgconfig autoreconfHook pmccabe ];
diff --git a/nixpkgs/pkgs/tools/networking/nebula/default.nix b/nixpkgs/pkgs/tools/networking/nebula/default.nix
new file mode 100644
index 00000000000..7f9d194e44a
--- /dev/null
+++ b/nixpkgs/pkgs/tools/networking/nebula/default.nix
@@ -0,0 +1,43 @@
+{ lib, buildGoModule, fetchFromGitHub }:
+
+buildGoModule rec {
+ pname = "nebula";
+ version = "1.0.0";
+
+ src = fetchFromGitHub {
+ owner = "slackhq";
+ repo = pname;
+ rev = "v${version}";
+ sha256 = "0j7fna352z8kzx6n0hck7rp122c0v44j9syz0v30vq47xq2pwj5c";
+ };
+
+ modSha256 = "130h0gc5z0w5inpc99y6mismwg3nyzk3bqdq5v9yclkxlhkbcp6d";
+
+ subPackages = [ "cmd/nebula" "cmd/nebula-cert" ];
+
+ buildFlagsArray = [ "-ldflags='-X main.Build=${version}'" ];
+
+ meta = with lib; {
+ description = "A scalable overlay networking tool with a focus on performance, simplicity and security";
+ longDescription = ''
+ Nebula is a scalable overlay networking tool with a focus on performance,
+ simplicity and security. It lets you seamlessly connect computers
+ anywhere in the world. Nebula is portable, and runs on Linux, OSX, and
+ Windows. (Also: keep this quiet, but we have an early prototype running
+ on iOS). It can be used to connect a small number of computers, but is
+ also able to connect tens of thousands of computers.
+
+ Nebula incorporates a number of existing concepts like encryption,
+ security groups, certificates, and tunneling, and each of those
+ individual pieces existed before Nebula in various forms. What makes
+ Nebula different to existing offerings is that it brings all of these
+ ideas together, resulting in a sum that is greater than its individual
+ parts.
+ '';
+ homepage = "https://github.com/slackhq/nebula";
+ license = licenses.mit;
+ maintainers = with maintainers; [ filalex77 ];
+ platforms = platforms.all;
+ };
+
+}
diff --git a/nixpkgs/pkgs/tools/networking/network-manager/applet.nix b/nixpkgs/pkgs/tools/networking/network-manager/applet.nix
index 947ede5372a..69b454ea72e 100644
--- a/nixpkgs/pkgs/tools/networking/network-manager/applet.nix
+++ b/nixpkgs/pkgs/tools/networking/network-manager/applet.nix
@@ -2,7 +2,7 @@
, libnotify, libsecret, polkit, isocodes, modemmanager, libxml2, docbook_xsl, docbook_xml_dtd_43
, mobile-broadband-provider-info, glib-networking, gsettings-desktop-schemas
, libgudev, jansson, wrapGAppsHook, gobject-introspection, python3, gtk3
-, libappindicator-gtk3, withGnome ? false, gcr, glib }:
+, libappindicator-gtk3, withGnome ? true, gcr, glib }:
let
pname = "network-manager-applet";
diff --git a/nixpkgs/pkgs/tools/networking/network-manager/default.nix b/nixpkgs/pkgs/tools/networking/network-manager/default.nix
index 4805d01dead..e762ac73844 100644
--- a/nixpkgs/pkgs/tools/networking/network-manager/default.nix
+++ b/nixpkgs/pkgs/tools/networking/network-manager/default.nix
@@ -10,11 +10,11 @@ let
pythonForDocs = python3.withPackages (pkgs: with pkgs; [ pygobject3 ]);
in stdenv.mkDerivation rec {
pname = "network-manager";
- version = "1.20.4";
+ version = "1.20.8";
src = fetchurl {
url = "mirror://gnome/sources/NetworkManager/${stdenv.lib.versions.majorMinor version}/NetworkManager-${version}.tar.xz";
- sha256 = "0k4i6m8acp48vl6l13267wv6kfkmzfjq2mraaa5m9n82wyvkimx3";
+ sha256 = "1ijpnx25wy5bcvp4mc49va942q56d0pncpj4jpknpdzwilmf455d";
};
outputs = [ "out" "dev" "devdoc" "man" "doc" ];
@@ -61,13 +61,6 @@ in stdenv.mkDerivation rec {
# Meson does not support using different directories during build and
# for installation like Autotools did with flags passed to make install.
./fix-install-paths.patch
-
- # Fixes https://github.com/NixOS/nixpkgs/issues/72330
- # Upstream MR: https://gitlab.freedesktop.org/NetworkManager/NetworkManager/merge_requests/323
- (fetchpatch {
- url = "https://gitlab.freedesktop.org/NetworkManager/NetworkManager/commit/4c11364201c094ad19ab9980ea6051a82bd2a550.patch";
- sha256 = "14dgb6ijxyzcglrk67is2fn49iwrhljf2sld8w557i6zkypilmsv";
- })
];
buildInputs = [
diff --git a/nixpkgs/pkgs/tools/networking/network-manager/fortisslvpn/default.nix b/nixpkgs/pkgs/tools/networking/network-manager/fortisslvpn/default.nix
index 53d6ab2fbcf..94a4c4b362a 100644
--- a/nixpkgs/pkgs/tools/networking/network-manager/fortisslvpn/default.nix
+++ b/nixpkgs/pkgs/tools/networking/network-manager/fortisslvpn/default.nix
@@ -1,5 +1,5 @@
{ stdenv, fetchurl, substituteAll, openfortivpn, intltool, pkgconfig, file, gtk3,
-networkmanager, ppp, libsecret, withGnome ? true, gnome3, fetchpatch }:
+networkmanager, ppp, libsecret, withGnome ? true, gnome3, fetchpatch, networkmanagerapplet }:
let
pname = "NetworkManager-fortisslvpn";
@@ -25,7 +25,7 @@ in stdenv.mkDerivation {
];
buildInputs = [ openfortivpn networkmanager ppp ]
- ++ stdenv.lib.optionals withGnome [ gtk3 libsecret gnome3.networkmanagerapplet ];
+ ++ stdenv.lib.optionals withGnome [ gtk3 libsecret networkmanagerapplet ];
nativeBuildInputs = [ intltool pkgconfig file ];
diff --git a/nixpkgs/pkgs/tools/networking/network-manager/iodine/default.nix b/nixpkgs/pkgs/tools/networking/network-manager/iodine/default.nix
index 966827a07da..29c0d550fe2 100644
--- a/nixpkgs/pkgs/tools/networking/network-manager/iodine/default.nix
+++ b/nixpkgs/pkgs/tools/networking/network-manager/iodine/default.nix
@@ -1,5 +1,5 @@
{ stdenv, fetchurl, substituteAll, iodine, intltool, pkgconfig, networkmanager, libsecret, gtk3
-, withGnome ? true, gnome3, fetchpatch }:
+, withGnome ? true, gnome3, fetchpatch, networkmanagerapplet }:
let
pname = "NetworkManager-iodine";
@@ -25,12 +25,12 @@ in stdenv.mkDerivation {
];
buildInputs = [ iodine networkmanager ]
- ++ stdenv.lib.optionals withGnome [ gtk3 libsecret gnome3.networkmanagerapplet ];
+ ++ stdenv.lib.optionals withGnome [ gtk3 libsecret networkmanagerapplet ];
nativeBuildInputs = [ intltool pkgconfig ];
# glib-2.62 deprecations
- NIX_CFLAGS_COMPILE = [ "-DGLIB_DISABLE_DEPRECATION_WARNINGS" ];
+ NIX_CFLAGS_COMPILE = "-DGLIB_DISABLE_DEPRECATION_WARNINGS";
configureFlags = [
"--without-libnm-glib"
diff --git a/nixpkgs/pkgs/tools/networking/network-manager/openvpn/default.nix b/nixpkgs/pkgs/tools/networking/network-manager/openvpn/default.nix
index bedc7875fb7..2762b12a364 100644
--- a/nixpkgs/pkgs/tools/networking/network-manager/openvpn/default.nix
+++ b/nixpkgs/pkgs/tools/networking/network-manager/openvpn/default.nix
@@ -1,5 +1,5 @@
{ stdenv, fetchurl, substituteAll, openvpn, intltool, libxml2, pkgconfig, file, networkmanager, libsecret
-, gtk3, withGnome ? true, gnome3, kmod, fetchpatch }:
+, gtk3, withGnome ? true, gnome3, kmod, fetchpatch, networkmanagerapplet }:
let
pname = "NetworkManager-openvpn";
@@ -25,7 +25,7 @@ in stdenv.mkDerivation {
];
buildInputs = [ openvpn networkmanager ]
- ++ stdenv.lib.optionals withGnome [ gtk3 libsecret gnome3.networkmanagerapplet ];
+ ++ stdenv.lib.optionals withGnome [ gtk3 libsecret networkmanagerapplet ];
nativeBuildInputs = [ intltool pkgconfig file libxml2 ];
diff --git a/nixpkgs/pkgs/tools/networking/network-manager/strongswan.nix b/nixpkgs/pkgs/tools/networking/network-manager/strongswan.nix
index 448fef4226a..843985bfa3e 100644
--- a/nixpkgs/pkgs/tools/networking/network-manager/strongswan.nix
+++ b/nixpkgs/pkgs/tools/networking/network-manager/strongswan.nix
@@ -1,5 +1,5 @@
{ stdenv, fetchurl, intltool, pkgconfig, networkmanager, strongswanNM
-, gtk3, gnome3, libsecret }:
+, gtk3, gnome3, libsecret, networkmanagerapplet }:
stdenv.mkDerivation rec {
pname = "NetworkManager-strongswan";
@@ -10,12 +10,12 @@ stdenv.mkDerivation rec {
sha256 = "015xcj42pd84apa0j0n9r3fhldp42mj72dqvl2xf4r9gwg5nhfrl";
};
- buildInputs = [ networkmanager strongswanNM libsecret gtk3 gnome3.networkmanagerapplet ];
+ buildInputs = [ networkmanager strongswanNM libsecret gtk3 networkmanagerapplet ];
nativeBuildInputs = [ intltool pkgconfig ];
# glib-2.62 deprecations
- NIX_CFLAGS_COMPILE = [ "-DGLIB_DISABLE_DEPRECATION_WARNINGS" ];
+ NIX_CFLAGS_COMPILE = "-DGLIB_DISABLE_DEPRECATION_WARNINGS";
configureFlags = [
"--without-libnm-glib"
diff --git a/nixpkgs/pkgs/tools/networking/network-manager/vpnc/default.nix b/nixpkgs/pkgs/tools/networking/network-manager/vpnc/default.nix
index af5b19eb5db..66392325574 100644
--- a/nixpkgs/pkgs/tools/networking/network-manager/vpnc/default.nix
+++ b/nixpkgs/pkgs/tools/networking/network-manager/vpnc/default.nix
@@ -1,5 +1,5 @@
{ stdenv, fetchurl, substituteAll, vpnc, intltool, pkgconfig, networkmanager, libsecret
-, gtk3, withGnome ? true, gnome3, kmod, file, fetchpatch }:
+, gtk3, withGnome ? true, gnome3, kmod, file, fetchpatch, networkmanagerapplet }:
let
pname = "NetworkManager-vpnc";
version = "1.2.6";
@@ -24,7 +24,7 @@ in stdenv.mkDerivation {
];
buildInputs = [ vpnc networkmanager ]
- ++ stdenv.lib.optionals withGnome [ gtk3 libsecret gnome3.networkmanagerapplet ];
+ ++ stdenv.lib.optionals withGnome [ gtk3 libsecret networkmanagerapplet ];
nativeBuildInputs = [ intltool pkgconfig file ];
diff --git a/nixpkgs/pkgs/tools/networking/nfstrace/default.nix b/nixpkgs/pkgs/tools/networking/nfstrace/default.nix
index 50654da54e4..88510b9b887 100644
--- a/nixpkgs/pkgs/tools/networking/nfstrace/default.nix
+++ b/nixpkgs/pkgs/tools/networking/nfstrace/default.nix
@@ -18,13 +18,18 @@ stdenv.mkDerivation rec {
})
];
+ postPatch = ''
+ substituteInPlace CMakeLists.txt \
+ --replace "-Wno-braced-scalar-init" ""
+ '';
+
buildInputs = [ json_c libpcap ncurses ];
nativeBuildInputs = [ cmake ];
# To build with GCC 8+ it needs:
- CXXFLAGS = [ "-Wno-class-memaccess" "-Wno-ignored-qualifiers" ];
+ CXXFLAGS = "-Wno-class-memaccess -Wno-ignored-qualifiers";
# CMake can't find json_c without:
- NIX_CFLAGS_COMPILE = [ "-I${json_c.dev}/include/json-c" ];
+ NIX_CFLAGS_COMPILE = [ "-I${json_c.dev}/include/json-c" "-Wno-error=address-of-packed-member" ];
doCheck = false; # requires network access
diff --git a/nixpkgs/pkgs/tools/networking/ngrok-2/default.nix b/nixpkgs/pkgs/tools/networking/ngrok-2/default.nix
index cc5620a1f4d..a0d6171efe2 100644
--- a/nixpkgs/pkgs/tools/networking/ngrok-2/default.nix
+++ b/nixpkgs/pkgs/tools/networking/ngrok-2/default.nix
@@ -5,8 +5,8 @@ with stdenv.lib;
let versions = builtins.fromJSON (builtins.readFile ./versions.json);
arch = if stdenv.isi686 then "386"
else if stdenv.isx86_64 then "amd64"
+ else if stdenv.isAarch32 then "arm"
else if stdenv.isAarch64 then "arm64"
- else if stdenv.isArm then "arm"
else throw "Unsupported architecture";
os = if stdenv.isLinux then "linux"
else if stdenv.isDarwin then "darwin"
diff --git a/nixpkgs/pkgs/tools/networking/ntopng/default.nix b/nixpkgs/pkgs/tools/networking/ntopng/default.nix
index 0c693ac6288..68f80106031 100644
--- a/nixpkgs/pkgs/tools/networking/ntopng/default.nix
+++ b/nixpkgs/pkgs/tools/networking/ntopng/default.nix
@@ -54,8 +54,8 @@ stdenv.mkDerivation rec {
sed 's|LIBS += -lstdc++.6||' -i Makefile
'';
- NIX_CFLAGS_COMPILE = [ "-fpermissive" ]
- ++ stdenv.lib.optional stdenv.cc.isClang "-Wno-error=reserved-user-defined-literal";
+ NIX_CFLAGS_COMPILE = "-fpermissive"
+ + stdenv.lib.optionalString stdenv.cc.isClang " -Wno-error=reserved-user-defined-literal";
meta = with stdenv.lib; {
description = "High-speed web-based traffic analysis and flow collection tool";
diff --git a/nixpkgs/pkgs/tools/networking/ocserv/default.nix b/nixpkgs/pkgs/tools/networking/ocserv/default.nix
index e695c460422..8d4b340ea2b 100644
--- a/nixpkgs/pkgs/tools/networking/ocserv/default.nix
+++ b/nixpkgs/pkgs/tools/networking/ocserv/default.nix
@@ -5,13 +5,13 @@
stdenv.mkDerivation rec {
pname = "ocserv";
- version = "0.12.4";
+ version = "0.12.6";
src = fetchFromGitLab {
owner = "openconnect";
repo = "ocserv";
rev = "ocserv_${stdenv.lib.replaceStrings [ "." ] [ "_" ] version}";
- sha256 = "0lybz93ah6n5b82ywshhmsmf65im8rk6gkxnzxfbxpqxra79j517";
+ sha256 = "0k7sx9sg8akxwfdl51cvdqkdrx9qganqddgri2yhcgznc3f3pz5b";
};
nativeBuildInputs = [ autoreconfHook pkgconfig ];
@@ -21,6 +21,6 @@ stdenv.mkDerivation rec {
homepage = https://gitlab.com/openconnect/ocserv;
license = licenses.gpl2;
description = "This program is openconnect VPN server (ocserv), a server for the openconnect VPN client.";
- maintainers = with maintainers; [ ma27 ];
+ maintainers = with maintainers; [ ];
};
}
diff --git a/nixpkgs/pkgs/tools/networking/offlineimap/default.nix b/nixpkgs/pkgs/tools/networking/offlineimap/default.nix
index a14f8187b7d..983ba018473 100644
--- a/nixpkgs/pkgs/tools/networking/offlineimap/default.nix
+++ b/nixpkgs/pkgs/tools/networking/offlineimap/default.nix
@@ -2,14 +2,14 @@
asciidoc, cacert, libxml2, libxslt, docbook_xsl }:
python2Packages.buildPythonApplication rec {
- version = "7.3.0";
+ version = "7.3.2";
pname = "offlineimap";
src = fetchFromGitHub {
owner = "OfflineIMAP";
repo = "offlineimap";
rev = "v${version}";
- sha256 = "0v32s09zgi3jg2grwh1xzzgzpw333b9qflai7zh2hv3fx9xnfbyj";
+ sha256 = "0rmj1ws6hljqnfap3p3js5s46kx85yc02hjkiki5zg44wn3hswjg";
};
postPatch = ''
@@ -23,7 +23,7 @@ python2Packages.buildPythonApplication rec {
doCheck = false;
nativeBuildInputs = [ asciidoc libxml2 libxslt docbook_xsl ];
- propagatedBuildInputs = with python2Packages; [ six kerberos rfc6555 ];
+ propagatedBuildInputs = with python2Packages; [ six kerberos rfc6555 pysocks ];
postInstall = ''
make -C docs man
@@ -35,6 +35,6 @@ python2Packages.buildPythonApplication rec {
description = "Synchronize emails between two repositories, so that you can read the same mailbox from multiple computers";
homepage = http://offlineimap.org;
license = stdenv.lib.licenses.gpl2Plus;
- maintainers = with stdenv.lib.maintainers; [ endocrimes ma27 ];
+ maintainers = with stdenv.lib.maintainers; [ endocrimes ];
};
}
diff --git a/nixpkgs/pkgs/tools/networking/openapi-generator-cli/default.nix b/nixpkgs/pkgs/tools/networking/openapi-generator-cli/default.nix
index d9cde0123aa..1cb8e02130f 100644
--- a/nixpkgs/pkgs/tools/networking/openapi-generator-cli/default.nix
+++ b/nixpkgs/pkgs/tools/networking/openapi-generator-cli/default.nix
@@ -1,7 +1,7 @@
{ stdenv, fetchurl, jre, makeWrapper }:
stdenv.mkDerivation rec {
- version = "4.2.0";
+ version = "4.2.2";
pname = "openapi-generator-cli";
jarfilename = "${pname}-${version}.jar";
@@ -12,7 +12,7 @@ stdenv.mkDerivation rec {
src = fetchurl {
url = "http://central.maven.org/maven2/org/openapitools/${pname}/${version}/${jarfilename}";
- sha256 = "00c5y06b8lm6lhnnvl42yndwdgn42bwwfc7p1q7zcsga275b6jpb";
+ sha256 = "1pafv432ll3pp52580pbnk0gnrm6byl5fkrf1rarhxfkpkr82yif";
};
phases = [ "installPhase" ];
diff --git a/nixpkgs/pkgs/tools/networking/openfortivpn/default.nix b/nixpkgs/pkgs/tools/networking/openfortivpn/default.nix
index 2672996a095..d1a73f1c148 100644
--- a/nixpkgs/pkgs/tools/networking/openfortivpn/default.nix
+++ b/nixpkgs/pkgs/tools/networking/openfortivpn/default.nix
@@ -3,7 +3,7 @@
with stdenv.lib;
let repo = "openfortivpn";
- version = "1.10.0";
+ version = "1.11.0";
in stdenv.mkDerivation {
name = "${repo}-${version}";
@@ -12,7 +12,7 @@ in stdenv.mkDerivation {
owner = "adrienverge";
inherit repo;
rev = "v${version}";
- sha256 = "1d9mp03dxz9j6pwd3d5z2pa7i1sqx5psshli1inqs0cq8zjmbzrw";
+ sha256 = "03ljyam0027w412vmi4gc0bp9c2xfmcspi676qck8cvvzg4gf736";
};
nativeBuildInputs = [ autoreconfHook pkgconfig ];
diff --git a/nixpkgs/pkgs/tools/networking/openresolv/default.nix b/nixpkgs/pkgs/tools/networking/openresolv/default.nix
index 190c903d9c1..423282aa8c1 100644
--- a/nixpkgs/pkgs/tools/networking/openresolv/default.nix
+++ b/nixpkgs/pkgs/tools/networking/openresolv/default.nix
@@ -24,7 +24,7 @@ stdenv.mkDerivation rec {
EOF
'';
- installFlags = "SYSCONFDIR=$(out)/etc";
+ installFlags = [ "SYSCONFDIR=$(out)/etc" ];
postInstall = ''
wrapProgram "$out/sbin/resolvconf" --set PATH "${coreutils}/bin"
diff --git a/nixpkgs/pkgs/tools/networking/openssh/default.nix b/nixpkgs/pkgs/tools/networking/openssh/default.nix
index 2a1122029c1..90ecba0891d 100644
--- a/nixpkgs/pkgs/tools/networking/openssh/default.nix
+++ b/nixpkgs/pkgs/tools/networking/openssh/default.nix
@@ -12,10 +12,8 @@ let
# **please** update this patch when you update to a new openssh release.
gssapiPatch = fetchpatch {
name = "openssh-gssapi.patch";
- url = "https://salsa.debian.org/ssh-team/openssh/raw/"
- + "e50a98bda787a3b9f53ed67bdccbbac0bde1f9ae"
- + "/debian/patches/gssapi.patch";
- sha256 = "14j9cabb3gkhkjc641zbiv29mbvsmgsvis3fbj8ywsd21zc7m2hv";
+ url = "https://salsa.debian.org/ssh-team/openssh/raw/debian/1%258.1p1-2/debian/patches/gssapi.patch";
+ sha256 = "0zfxx46a5lpjp317z354yyswa2wvmb1pp5p0nxsbhsrzw94jvxsj";
};
in
@@ -61,11 +59,9 @@ stdenv.mkDerivation rec {
substituteInPlace Makefile.in --replace '$(INSTALL) -m 4711' '$(INSTALL) -m 0711'
'';
- nativeBuildInputs = [ pkgconfig ];
+ nativeBuildInputs = [ pkgconfig ] ++ optional (hpnSupport || withGssapiPatches) autoreconfHook;
buildInputs = [ zlib openssl libedit pam ]
- ++ optional withKerberos kerberos
- ++ optional hpnSupport autoreconfHook
- ;
+ ++ optional withKerberos kerberos;
preConfigure = ''
# Setting LD causes `configure' and `make' to disagree about which linker
diff --git a/nixpkgs/pkgs/tools/networking/p2p/amule/default.nix b/nixpkgs/pkgs/tools/networking/p2p/amule/default.nix
index 2330a97d77d..264c6fd4e16 100644
--- a/nixpkgs/pkgs/tools/networking/p2p/amule/default.nix
+++ b/nixpkgs/pkgs/tools/networking/p2p/amule/default.nix
@@ -87,7 +87,7 @@ stdenv.mkDerivation rec {
applications.
'';
- homepage = "https://amule.org/";
+ homepage = "https://github.com/amule-project/amule";
license = licenses.gpl2Plus;
maintainers = with maintainers; [ phreedom ];
platforms = platforms.unix;
diff --git a/nixpkgs/pkgs/tools/networking/packetdrill/default.nix b/nixpkgs/pkgs/tools/networking/packetdrill/default.nix
index 2041d935c94..623645efc0c 100644
--- a/nixpkgs/pkgs/tools/networking/packetdrill/default.nix
+++ b/nixpkgs/pkgs/tools/networking/packetdrill/default.nix
@@ -11,7 +11,11 @@ stdenv.mkDerivation {
setSourceRoot = ''
export sourceRoot=$(realpath */gtests/net/packetdrill)
'';
- NIX_CFLAGS_COMPILE = "-Wno-error=unused-result";
+ NIX_CFLAGS_COMPILE = [
+ "-Wno-error=unused-result"
+ "-Wno-error=stringop-truncation"
+ "-Wno-error=address-of-packed-member"
+ ];
nativeBuildInputs = [ bison flex ];
patches = [ ./nix.patch ];
enableParallelBuilding = true;
diff --git a/nixpkgs/pkgs/tools/networking/pirate-get/default.nix b/nixpkgs/pkgs/tools/networking/pirate-get/default.nix
index 5d410685c0d..b92d255b719 100644
--- a/nixpkgs/pkgs/tools/networking/pirate-get/default.nix
+++ b/nixpkgs/pkgs/tools/networking/pirate-get/default.nix
@@ -4,13 +4,13 @@ with python3Packages;
buildPythonApplication rec {
pname = "pirate-get";
- version = "0.3.3";
+ version = "0.3.4";
doCheck = false;
src = fetchPypi {
inherit pname version;
- sha256 = "1zwfgfiszkca44wlx5p2243hmf8594n7bnfva5if1f69dic6w7mi";
+ sha256 = "0f82yf3bl9jaywagv4vvwypm57z1x8a8qqn0xhz9np3949df4ysm";
};
propagatedBuildInputs = [ colorama veryprettytable beautifulsoup4 pyperclip ];
diff --git a/nixpkgs/pkgs/tools/networking/pmacct/default.nix b/nixpkgs/pkgs/tools/networking/pmacct/default.nix
new file mode 100644
index 00000000000..5d0c5cccded
--- /dev/null
+++ b/nixpkgs/pkgs/tools/networking/pmacct/default.nix
@@ -0,0 +1,62 @@
+{ stdenv
+, fetchFromGitHub
+, pkgconfig
+, autoreconfHook
+, libtool
+, libpcap
+
+# Optional Dependencies
+, zlib ? null
+, withJansson ? true, jansson ? null
+, withNflog ? true, libnetfilter_log ? null
+, withSQLite ? true, sqlite ? null
+, withPgSQL ? true, postgresql ? null
+, withMysql ? true, libmysqlclient ? null }:
+
+assert withJansson -> jansson != null;
+assert withNflog -> libnetfilter_log != null;
+assert withSQLite -> sqlite != null;
+assert withPgSQL -> postgresql != null;
+assert withMysql -> libmysqlclient != null;
+
+let inherit (stdenv.lib) optional; in
+
+stdenv.mkDerivation rec {
+ version = "1.7.3";
+ pname = "pmacct";
+
+ src = fetchFromGitHub {
+ owner = "pmacct";
+ repo = pname;
+ rev = "v${version}";
+ sha256 = "0j5qmkya67q7jvaddcj00blmaac37bkir1zb3m1xmm95gm5lf2p5";
+ };
+
+ nativeBuildInputs = [ autoreconfHook pkgconfig libtool ];
+ buildInputs = [ libpcap ]
+ ++ optional withJansson jansson
+ ++ optional withNflog libnetfilter_log
+ ++ optional withSQLite sqlite
+ ++ optional withPgSQL postgresql
+ ++ optional withMysql [ libmysqlclient zlib ];
+
+ configureFlags = [
+ "--with-pcap-includes=${libpcap}/include"
+ ] ++ optional withJansson "--enable-jansson"
+ ++ optional withNflog "--enable-nflog"
+ ++ optional withSQLite "--enable-sqlite3"
+ ++ optional withPgSQL "--enable-pgsql"
+ ++ optional withMysql "--enable-mysql";
+
+ meta = with stdenv.lib; {
+ description = "pmacct is a small set of multi-purpose passive network monitoring tools";
+ longDescription = ''
+ pmacct is a small set of multi-purpose passive network monitoring tools
+ [NetFlow IPFIX sFlow libpcap BGP BMP RPKI IGP Streaming Telemetry]
+ '';
+ homepage = "http://www.pmacct.net/";
+ license = licenses.gpl2;
+ maintainers = with maintainers; [ "0x4A6F" ];
+ platforms = platforms.unix;
+ };
+}
diff --git a/nixpkgs/pkgs/tools/networking/ppp/default.nix b/nixpkgs/pkgs/tools/networking/ppp/default.nix
index 987960c9c50..0efef74f6c3 100644
--- a/nixpkgs/pkgs/tools/networking/ppp/default.nix
+++ b/nixpkgs/pkgs/tools/networking/ppp/default.nix
@@ -64,6 +64,6 @@ stdenv.mkDerivation rec {
description = "Point-to-point implementation for Linux and Solaris";
license = with licenses; [ bsdOriginal publicDomain gpl2 lgpl2 ];
platforms = platforms.linux;
- maintainers = [ maintainers.falsifian ];
+ maintainers = [ ];
};
}
diff --git a/nixpkgs/pkgs/tools/networking/ratools/default.nix b/nixpkgs/pkgs/tools/networking/ratools/default.nix
index cf8c370c522..f5353db6803 100644
--- a/nixpkgs/pkgs/tools/networking/ratools/default.nix
+++ b/nixpkgs/pkgs/tools/networking/ratools/default.nix
@@ -11,7 +11,7 @@ stdenv.mkDerivation rec {
sha256 = "07m45bn9lzgbfihmxic23wqp73nxg5ihrvkigr450jq6gzvgwawq";
};
- makeFlags = "-C src";
+ makeFlags = [ "-C" "src" ];
installPhase = ''
install -vD bin/* -t $out/bin
diff --git a/nixpkgs/pkgs/tools/networking/shadowfox/default.nix b/nixpkgs/pkgs/tools/networking/shadowfox/default.nix
index 8a2dee19b95..f2ae143e1b9 100644
--- a/nixpkgs/pkgs/tools/networking/shadowfox/default.nix
+++ b/nixpkgs/pkgs/tools/networking/shadowfox/default.nix
@@ -15,7 +15,7 @@ buildGoModule rec {
modSha256 = "0hcc87mzacqwbw10l49kx0sxl4mivdr88c40wh6hdfvrbam2w86r";
- buildFlags = "--tags release";
+ buildFlags = [ "--tags" "release" ];
meta = with stdenv.lib; {
description = ''
diff --git a/nixpkgs/pkgs/tools/networking/shadowsocks-libev/default.nix b/nixpkgs/pkgs/tools/networking/shadowsocks-libev/default.nix
index 254e5d3e5d3..b6051ef26b0 100644
--- a/nixpkgs/pkgs/tools/networking/shadowsocks-libev/default.nix
+++ b/nixpkgs/pkgs/tools/networking/shadowsocks-libev/default.nix
@@ -5,14 +5,14 @@
stdenv.mkDerivation rec {
pname = "shadowsocks-libev";
- version = "3.3.1";
+ version = "3.3.3";
# Git tag includes CMake build files which are much more convenient.
src = fetchFromGitHub {
owner = "shadowsocks";
repo = pname;
rev = "refs/tags/v${version}";
- sha256 = "0l15mbwlzx446rn5cix9f1726by62807bhnxkzknd41j7r937vyv";
+ sha256 = "1i2431imbn4bhwmwyz63g5mh1g5ikhsiwv6mzcdc2kx34zjpibrj";
fetchSubmodules = true;
};
diff --git a/nixpkgs/pkgs/tools/networking/shorewall/default.nix b/nixpkgs/pkgs/tools/networking/shorewall/default.nix
new file mode 100644
index 00000000000..8e62aa735a4
--- /dev/null
+++ b/nixpkgs/pkgs/tools/networking/shorewall/default.nix
@@ -0,0 +1,130 @@
+{ coreutils
+, ebtables
+, fetchurl
+, gnugrep
+, gnused
+, iproute
+, ipset
+, iptables
+, perl
+, perlPackages
+, stdenv
+, tree
+, utillinux
+}:
+let
+ PATH = stdenv.lib.concatStringsSep ":"
+ [ "${coreutils}/bin"
+ "${iproute}/bin"
+ "${iptables}/bin"
+ "${ipset}/bin"
+ "${ebtables}/bin"
+ "${utillinux}/bin"
+ "${gnugrep}/bin"
+ "${gnused}/bin"
+ ];
+in
+stdenv.mkDerivation rec {
+ pname = "shorewall";
+ version = "5.2.3.3";
+
+ srcs = [
+ (fetchurl {
+ url = "http://www.shorewall.net/pub/shorewall/5.2/shorewall-5.2.3/shorewall-core-${version}.tar.bz2";
+ sha256 = "1gg2yfxzm3y9qqjrrg5nq2ggi1c6yfxx0s7fvwjw70b185mwa5p5";
+ })
+ (fetchurl {
+ url = "http://www.shorewall.net/pub/shorewall/5.2/shorewall-5.2.3/shorewall-${version}.tar.bz2";
+ sha256 = "1ka70pa3s0cnvc83rlm57r05cdv9idnxnq0vmxi6nr7razak5f3b";
+ })
+ (fetchurl {
+ url = "http://www.shorewall.net/pub/shorewall/5.2/shorewall-5.2.3/shorewall6-${version}.tar.bz2";
+ sha256 = "0mhs4m6agwk082h1n69gnyfsjpycdd8215r4r9rzb3czs5xi087n";
+ })
+ ];
+ sourceRoot = ".";
+
+ buildInputs = [
+ coreutils
+ iproute
+ ipset
+ iptables
+ ebtables
+ utillinux
+ gnugrep
+ gnused
+ perl
+ ] ++ (with perlPackages; [
+ DigestSHA1
+ ]);
+ prePatch = ''
+ # Patch configure and install.sh files
+ patchShebangs .
+
+ # Remove hardcoded PATH
+ sed -i shorewall-core-${version}/lib.cli \
+ -e '/^ *PATH=.*/d'
+ '';
+ configurePhase = ''
+ shorewall-core-${version}/configure \
+ HOST=linux \
+ PREFIX=$out \
+ CONFDIR=\$PREFIX/etc-example \
+ SBINDIR=\$PREFIX/sbin \
+ SYSCONFDIR= \
+ SHAREDIR=\$PREFIX/share \
+ LIBEXECDIR=\$SHAREDIR \
+ PERLLIBDIR=\$SHAREDIR/shorewall \
+ MANDIR=$out/man \
+ VARLIB=/var/lib \
+ INITSOURCE= \
+ INITDIR= \
+ INITFILE= \
+ DEFAULT_PAGER=
+ '';
+ installPhase = ''
+ export DESTDIR=/
+ shorewall-core-${version}/install.sh
+
+ ln -s ../shorewall-core-${version}/shorewallrc shorewall-${version}/
+ shorewall-${version}/install.sh
+
+ ln -s ../shorewall-core-${version}/shorewallrc shorewall6-${version}/
+ shorewall6-${version}/install.sh
+
+ # Patch the example shorewall{,6}.conf in case it is included
+ # in services.shorewall{,6}.configs
+ sed -i $out/etc-example/shorewall/shorewall.conf \
+ $out/etc-example/shorewall6/shorewall6.conf \
+ -e 's|^LOGFILE=.*|LOGFILE=/var/log/shorewall.log|' \
+ -e 's|^PATH=.*|PATH=${PATH}|' \
+ -e 's|^PERL=.*|PERL=${perl}/bin/perl|' \
+ -e 's|^SHOREWALL_SHELL=.*|SHOREWALL_SHELL=${stdenv.shell}|'
+ sed -i $out/etc-example/shorewall6/shorewall6.conf \
+ -e 's|^CONFIG_PATH=.*|CONFIG_PATH=:''${CONFDIR}/shorewall6:''${SHAREDIR}/shorewall6:''${SHAREDIR}/shorewall|'
+ # FIXME: the default GEOIPDIR=/usr/share/xt_geoip/LE may require attention.
+
+ # Redirect CONFDIR to /etc where services.shorewall{,6}.configs
+ # will generate the config files.
+ sed -i $out/share/shorewall/shorewallrc \
+ -e 's~^CONFDIR=.*~CONFDIR=/etc~'
+ '';
+
+ meta = {
+ homepage = http://www.shorewall.net/;
+ description = "An IP gateway/firewall configuration tool for GNU/Linux";
+ longDescription = ''
+ Shorewall is a high-level tool for configuring Netfilter. You describe your
+ firewall/gateway requirements using entries in a set of configuration
+ files. Shorewall reads those configuration files and with the help of the
+ iptables, iptables-restore, ip and tc utilities, Shorewall configures
+ Netfilter and the Linux networking subsystem to match your requirements.
+ Shorewall can be used on a dedicated firewall system, a multi-function
+ gateway/router/server or on a standalone GNU/Linux system. Shorewall does
+ not use Netfilter's ipchains compatibility mode and can thus take
+ advantage of Netfilter's connection state tracking capabilities.
+ '';
+ license = stdenv.lib.licenses.gpl2Plus;
+ platforms = stdenv.lib.platforms.linux;
+ };
+}
diff --git a/nixpkgs/pkgs/tools/networking/slirp4netns/default.nix b/nixpkgs/pkgs/tools/networking/slirp4netns/default.nix
index 83f315706ef..f9add47dd3f 100644
--- a/nixpkgs/pkgs/tools/networking/slirp4netns/default.nix
+++ b/nixpkgs/pkgs/tools/networking/slirp4netns/default.nix
@@ -2,13 +2,13 @@
stdenv.mkDerivation rec {
pname = "slirp4netns";
- version = "0.4.2";
+ version = "0.4.3";
src = fetchFromGitHub {
owner = "rootless-containers";
repo = "slirp4netns";
rev = "v${version}";
- sha256 = "0i0rhb7n2i2nmbvdqdx83vi3kw4r17p7p099sr857cr3f3c221qx";
+ sha256 = "0g7apfw33wkxxj7qwvlnnhv7qy13s1gkbmvns8612c0yfv9jrsvq";
};
nativeBuildInputs = [ autoreconfHook pkgconfig ];
diff --git a/nixpkgs/pkgs/tools/networking/snabb/default.nix b/nixpkgs/pkgs/tools/networking/snabb/default.nix
index ba05ee8e8b5..9471efa92d7 100644
--- a/nixpkgs/pkgs/tools/networking/snabb/default.nix
+++ b/nixpkgs/pkgs/tools/networking/snabb/default.nix
@@ -17,6 +17,8 @@ stdenv.mkDerivation rec {
buildInputs = [ makeWrapper ];
+ NIX_CFLAGS_COMPILE = [ "-Wno-error=stringop-truncation" ];
+
patchPhase = ''
patchShebangs .
diff --git a/nixpkgs/pkgs/tools/networking/sslsplit/default.nix b/nixpkgs/pkgs/tools/networking/sslsplit/default.nix
new file mode 100644
index 00000000000..bf23d06551d
--- /dev/null
+++ b/nixpkgs/pkgs/tools/networking/sslsplit/default.nix
@@ -0,0 +1,31 @@
+{ stdenv, fetchFromGitHub, openssl, libevent, libpcap, libnet, zlib }:
+
+stdenv.mkDerivation rec {
+ pname = "sslsplit";
+ version = "0.5.5";
+
+ src = fetchFromGitHub {
+ owner = "droe";
+ repo = pname;
+ rev = version;
+ sha256 = "1p43z9ln5rbc76v0j1k3r4nhvfw71hq8jzsallb54z9hvwfvqp3l";
+ };
+
+ buildInputs = [ openssl libevent libpcap libnet zlib ];
+
+ makeFlags = [
+ "PREFIX=$(out)"
+ "OPENSSL_BASE=${openssl.dev}"
+ "LIBEVENT_BASE=${libevent.dev}"
+ "LIBPCAP_BASE=${libpcap}"
+ "LIBNET_BASE=${libnet}"
+ ];
+
+ meta = with stdenv.lib; {
+ description = "Transparent SSL/TLS interception";
+ homepage = "https://www.roe.ch/SSLsplit";
+ platforms = platforms.all;
+ maintainers = with maintainers; [ contrun ];
+ license = with licenses; [ bsd2 mit unlicense free ];
+ };
+}
diff --git a/nixpkgs/pkgs/tools/networking/ssmtp/default.nix b/nixpkgs/pkgs/tools/networking/ssmtp/default.nix
index ebe31dc8b5a..81da427a52c 100644
--- a/nixpkgs/pkgs/tools/networking/ssmtp/default.nix
+++ b/nixpkgs/pkgs/tools/networking/ssmtp/default.nix
@@ -30,13 +30,13 @@ stdenv.mkDerivation {
--replace '$(INSTALL) -s' '$(INSTALL) -s --strip-program $(STRIP)'
'';
- installFlags = "etcdir=$(out)/etc";
+ installFlags = [ "etcdir=$(out)/etc" ];
installTargets = [ "install" "install-sendmail" ];
buildInputs = stdenv.lib.optional tlsSupport openssl;
- NIX_LDFLAGS = stdenv.lib.optional tlsSupport [ "-lcrypto" ];
+ NIX_LDFLAGS = stdenv.lib.optionalString tlsSupport "-lcrypto";
meta = with stdenv.lib; {
platforms = platforms.linux;
diff --git a/nixpkgs/pkgs/tools/networking/stunnel/default.nix b/nixpkgs/pkgs/tools/networking/stunnel/default.nix
index 792e6f68294..b9278dd7c0d 100644
--- a/nixpkgs/pkgs/tools/networking/stunnel/default.nix
+++ b/nixpkgs/pkgs/tools/networking/stunnel/default.nix
@@ -2,11 +2,11 @@
stdenv.mkDerivation rec {
pname = "stunnel";
- version = "5.55";
+ version = "5.56";
src = fetchurl {
url = "https://www.stunnel.org/downloads/${pname}-${version}.tar.gz";
- sha256 = "0qjc0wkjf6bqz29fvwwsn9hnjhm6alsm10jcwx4jad2q3ks6kplh";
+ sha256 = "08kb4gi9fzqngrczykvba6xhaxhq9m4wmdbhxvgrva5rasrvz13k";
# please use the contents of "https://www.stunnel.org/downloads/${name}.tar.gz.sha256",
# not the output of `nix-prefetch-url`
};
diff --git a/nixpkgs/pkgs/tools/networking/subfinder/default.nix b/nixpkgs/pkgs/tools/networking/subfinder/default.nix
index 65b88a34fb0..cd5f2bf18cb 100644
--- a/nixpkgs/pkgs/tools/networking/subfinder/default.nix
+++ b/nixpkgs/pkgs/tools/networking/subfinder/default.nix
@@ -1,16 +1,16 @@
{ stdenv, buildGoPackage, fetchFromGitHub }:
-buildGoPackage {
- pname = "subfinder-git";
- version = "2018-07-15";
+buildGoPackage rec {
+ pname = "subfinder";
+ version = "2.2.4";
- goPackagePath = "github.com/subfinder/subfinder";
+ goPackagePath = "github.com/projectdiscovery/subfinder";
src = fetchFromGitHub {
- owner = "subfinder";
- repo = "subfinder";
- rev = "26596affed961c535676395f443acc5af95ac9e6";
- sha256 = "0m842jyrwlg4kaja1m3kca07jf20fxva0frg66b13zpsm8hdp10q";
+ owner = "projectdiscovery";
+ repo = pname;
+ rev = "v${version}";
+ sha256 = "00ni835zvgrj8gmmmpjdszrcijyd6apig8rpb4g2z3g016b6gwar";
};
goDeps = ./deps.nix;
@@ -22,8 +22,8 @@ buildGoPackage {
subdomains for websites. Designed as a passive framework to be
useful for bug bounties and safe for penetration testing.
'';
- homepage = https://github.com/subfinder/subfinder;
+ homepage = "https://github.com/projectdiscovery/subfinder";
license = licenses.mit;
- maintainers = with maintainers; [ fpletz ];
+ maintainers = with maintainers; [ fpletz filalex77 ];
};
}
diff --git a/nixpkgs/pkgs/tools/networking/subfinder/deps.nix b/nixpkgs/pkgs/tools/networking/subfinder/deps.nix
index 34095c81428..16427eddcf6 100644
--- a/nixpkgs/pkgs/tools/networking/subfinder/deps.nix
+++ b/nixpkgs/pkgs/tools/networking/subfinder/deps.nix
@@ -1,12 +1,48 @@
# file generated from Gopkg.lock using dep2nix (https://github.com/nixcloud/dep2nix)
[
{
- goPackagePath = "github.com/bogdanovich/dns_resolver";
+ goPackagePath = "github.com/davecgh/go-spew";
fetch = {
type = "git";
- url = "https://github.com/bogdanovich/dns_resolver";
- rev = "a8e42bc6a5b6c9a93be01ca204be7e17f7ba4cd2";
- sha256 = "0l1hgxxqafappw0y18sbkkk2vijclvf1b8x73b0nhi4r74wyib49";
+ url = "https://github.com/davecgh/go-spew";
+ rev = "8991bc29aa16c548c550c7ff78260e27b9ab7c73";
+ sha256 = "0hka6hmyvp701adzag2g26cxdj47g21x6jz4sc6jjz1mn59d474y";
+ };
+ }
+ {
+ goPackagePath = "github.com/json-iterator/go";
+ fetch = {
+ type = "git";
+ url = "https://github.com/json-iterator/go";
+ rev = "03217c3e97663914aec3faafde50d081f197a0a2";
+ sha256 = "1kbp9fj6fxfql0ir59zb6v68l4bpwlmk76xm8vaikw1hp6y9bcss";
+ };
+ }
+ {
+ goPackagePath = "github.com/konsorten/go-windows-terminal-sequences";
+ fetch = {
+ type = "git";
+ url = "https://github.com/konsorten/go-windows-terminal-sequences";
+ rev = "f55edac94c9bbba5d6182a4be46d86a2c9b5b50e";
+ sha256 = "09mn209ika7ciy87xf2x31dq5fnqw39jidgaljvmqxwk7ff1hnx7";
+ };
+ }
+ {
+ goPackagePath = "github.com/logrusorgru/aurora";
+ fetch = {
+ type = "git";
+ url = "https://github.com/logrusorgru/aurora";
+ rev = "21d75270181e0436fee7bd58b991c212cf309068";
+ sha256 = "0vc9qdl6jzq7vazfqgz628gcgsvir56bdi2bkhl54pi92cz9cw0p";
+ };
+ }
+ {
+ goPackagePath = "github.com/m-mizutani/urlscan-go";
+ fetch = {
+ type = "git";
+ url = "https://github.com/m-mizutani/urlscan-go";
+ rev = "21d37c8d3d34d514f2ef49db9b59cc94f335e9c3";
+ sha256 = "1hpymd4ncp78hgpksnw8k27rp0lh832x1pyk3bhj5dm6xmh79g4c";
};
}
{
@@ -14,17 +50,71 @@
fetch = {
type = "git";
url = "https://github.com/miekg/dns";
- rev = "3e6e47bc11bc7f93f9e2f1c7bd6481ba4802808b";
- sha256 = "1vmsnv6r799z5lz5g9l2dh065m9003yfjb18w8n6c053hp8jvrfm";
+ rev = "1e224ff5dead8366ed6fcdcb832794be42e73f0e";
+ sha256 = "1iv9jznakz8f5swiir0z4zilr9ypavnsc0g4zi1r0vad6npy7zfl";
+ };
+ }
+ {
+ goPackagePath = "github.com/modern-go/concurrent";
+ fetch = {
+ type = "git";
+ url = "https://github.com/modern-go/concurrent";
+ rev = "bacd9c7ef1dd9b15be4a9909b8ac7a4e313eec94";
+ sha256 = "0s0fxccsyb8icjmiym5k7prcqx36hvgdwl588y0491gi18k5i4zs";
};
}
{
- goPackagePath = "github.com/subfinder/urlx";
+ goPackagePath = "github.com/modern-go/reflect2";
fetch = {
type = "git";
- url = "https://github.com/subfinder/urlx";
- rev = "8e731c8be06edbae81cab15937cd3c291c2a7680";
- sha256 = "11vrx1c0mq1h6lwpsvibd3386wy4kirzmmm8ibrlx2gj0h6pkkcb";
+ url = "https://github.com/modern-go/reflect2";
+ rev = "4b7aa43c6742a2c18fdef89dd197aaae7dac7ccd";
+ sha256 = "1721y3yr3dpx5dx5ashf063qczk2awy5zjir1jvp1h5hn7qz4i49";
+ };
+ }
+ {
+ goPackagePath = "github.com/pkg/errors";
+ fetch = {
+ type = "git";
+ url = "https://github.com/pkg/errors";
+ rev = "ba968bfe8b2f7e042a574c888954fccecfa385b4";
+ sha256 = "0g5qcb4d4fd96midz0zdk8b9kz8xkzwfa8kr1cliqbg8sxsy5vd1";
+ };
+ }
+ {
+ goPackagePath = "github.com/pmezard/go-difflib";
+ fetch = {
+ type = "git";
+ url = "https://github.com/pmezard/go-difflib";
+ rev = "792786c7400a136282c1664665ae0a8db921c6c2";
+ sha256 = "0c1cn55m4rypmscgf0rrb88pn58j3ysvc2d0432dp3c6fqg6cnzw";
+ };
+ }
+ {
+ goPackagePath = "github.com/rs/xid";
+ fetch = {
+ type = "git";
+ url = "https://github.com/rs/xid";
+ rev = "15d26544def341f036c5f8dca987a4cbe575032c";
+ sha256 = "1vgw1dikqw273awcci6pzifs7shkl5ah4l88j1zjbnpgbiwzlx9j";
+ };
+ }
+ {
+ goPackagePath = "github.com/sirupsen/logrus";
+ fetch = {
+ type = "git";
+ url = "https://github.com/sirupsen/logrus";
+ rev = "839c75faf7f98a33d445d181f3018b5c3409a45e";
+ sha256 = "087k2lxrr9p9dh68yw71d05h5g9p5v26zbwd6j7lghinjfaw334x";
+ };
+ }
+ {
+ goPackagePath = "github.com/stretchr/testify";
+ fetch = {
+ type = "git";
+ url = "https://github.com/stretchr/testify";
+ rev = "221dbe5ed46703ee255b1da0dec05086f5035f62";
+ sha256 = "187i5g88sxfy4vxpm7dw1gwv29pa2qaq475lxrdh5livh69wqfjb";
};
}
{
@@ -32,8 +122,8 @@
fetch = {
type = "git";
url = "https://go.googlesource.com/crypto";
- rev = "a49355c7e3f8fe157a85be2f77e6e269a0f89602";
- sha256 = "020q1laxjx5kcmnqy4wmdb63zhb0lyq6wpy40axhswzg2nd21s44";
+ rev = "86a70503ff7e82ffc18c7b0de83db35da4791e6a";
+ sha256 = "0w7ih86lmll9gs2j0z3nmmy148i2yism9z53yp58zwa6d5pjahfn";
};
}
{
@@ -41,8 +131,35 @@
fetch = {
type = "git";
url = "https://go.googlesource.com/net";
- rev = "d0887baf81f4598189d4e12a37c6da86f0bba4d0";
- sha256 = "00dmz9a5d3myyb0256b33vf1bk8wv1khhh88kcvbmqsfd6x1n6p5";
+ rev = "5ee1b9f4859acd2e99987ef94ec7a58427c53bef";
+ sha256 = "0jvzqv6phv64rw4pj86x3j9kp5yx9p34fd38r46rb9464h69ba29";
+ };
+ }
+ {
+ goPackagePath = "golang.org/x/sys";
+ fetch = {
+ type = "git";
+ url = "https://go.googlesource.com/sys";
+ rev = "ce4227a45e2eb77e5c847278dcc6a626742e2945";
+ sha256 = "1s43wvqfml6ml5ks7iv2bis9d664g77mq86v7mfmjhn56x856g35";
+ };
+ }
+ {
+ goPackagePath = "gopkg.in/yaml.v2";
+ fetch = {
+ type = "git";
+ url = "https://github.com/go-yaml/yaml";
+ rev = "1f64d6156d11335c3f22d9330b0ad14fc1e789ce";
+ sha256 = "0k5xcwkd3wmcx54isk7ck9cwp8fapfhyqdz3f13kxp77cxqizazj";
+ };
+ }
+ {
+ goPackagePath = "gopkg.in/yaml.v3";
+ fetch = {
+ type = "git";
+ url = "https://github.com/go-yaml/yaml";
+ rev = "4206685974f28e3178b35fa198a59899aa4dee3a";
+ sha256 = "1ff5fd8x45cay9100ds63hxd32s7czsrric0ql6a1jrxczsgqk1g";
};
}
]
diff --git a/nixpkgs/pkgs/tools/networking/swaks/default.nix b/nixpkgs/pkgs/tools/networking/swaks/default.nix
index 8dee8989c06..81d0935f0b0 100644
--- a/nixpkgs/pkgs/tools/networking/swaks/default.nix
+++ b/nixpkgs/pkgs/tools/networking/swaks/default.nix
@@ -25,7 +25,7 @@ stdenv.mkDerivation rec {
homepage = "http://www.jetmore.org/john/code/swaks/";
description = "A featureful, flexible, scriptable, transaction-oriented SMTP test tool";
license = licenses.gpl2;
- maintainers = with maintainers; [ ndowens ];
+ maintainers = with maintainers; [];
platforms = platforms.all;
};
diff --git a/nixpkgs/pkgs/tools/networking/tracebox/default.nix b/nixpkgs/pkgs/tools/networking/tracebox/default.nix
index 4062fc0fd58..1d3c4190e38 100644
--- a/nixpkgs/pkgs/tools/networking/tracebox/default.nix
+++ b/nixpkgs/pkgs/tools/networking/tracebox/default.nix
@@ -14,7 +14,7 @@ stdenv.mkDerivation rec {
configureFlags = [ "--with-lua=yes" ];
- NIX_LDFLAGS = [ "${libpcap}/lib/libpcap.so" "${libcrafter}/lib/libcrafter.so" ];
+ NIX_LDFLAGS = "${libpcap}/lib/libpcap.so ${libcrafter}/lib/libcrafter.so";
preAutoreconf = ''
substituteInPlace Makefile.am --replace "noinst" ""
diff --git a/nixpkgs/pkgs/tools/networking/traceroute/default.nix b/nixpkgs/pkgs/tools/networking/traceroute/default.nix
index af8f5cafb89..8591db4e016 100644
--- a/nixpkgs/pkgs/tools/networking/traceroute/default.nix
+++ b/nixpkgs/pkgs/tools/networking/traceroute/default.nix
@@ -9,7 +9,7 @@ stdenv.mkDerivation rec {
sha256 = "3669d22a34d3f38ed50caba18cd525ba55c5c00d5465f2d20d7472e5d81603b6";
};
- makeFlags = "prefix=$(out) LDFLAGS=-lm";
+ makeFlags = [ "prefix=$(out)" "LDFLAGS=-lm" ];
preConfigure = ''
sed -i 's@LIBS := \(.*\) -lm \(.*\)@LIBS := \1 \2@' Make.rules
diff --git a/nixpkgs/pkgs/tools/networking/uget/default.nix b/nixpkgs/pkgs/tools/networking/uget/default.nix
index 78dcb00eb78..b2da1384557 100644
--- a/nixpkgs/pkgs/tools/networking/uget/default.nix
+++ b/nixpkgs/pkgs/tools/networking/uget/default.nix
@@ -1,5 +1,5 @@
{ stdenv, fetchurl, pkgconfig, intltool, openssl, curl, libnotify,
- libappindicator-gtk3, gst_all_1, gtk3, gnome3, wrapGAppsHook, aria2 ? null
+ libappindicator-gtk3, gst_all_1, gtk3, dconf, wrapGAppsHook, aria2 ? null
}:
stdenv.mkDerivation rec {
@@ -23,7 +23,7 @@ stdenv.mkDerivation rec {
libnotify
libappindicator-gtk3
gtk3
- (stdenv.lib.getLib gnome3.dconf)
+ (stdenv.lib.getLib dconf)
]
++ (with gst_all_1; [ gstreamer gst-plugins-base gst-plugins-good ])
++ (stdenv.lib.optional (aria2 != null) aria2);
diff --git a/nixpkgs/pkgs/tools/networking/unbound/default.nix b/nixpkgs/pkgs/tools/networking/unbound/default.nix
index e83e5268629..18d9defdd94 100644
--- a/nixpkgs/pkgs/tools/networking/unbound/default.nix
+++ b/nixpkgs/pkgs/tools/networking/unbound/default.nix
@@ -2,11 +2,11 @@
stdenv.mkDerivation rec {
pname = "unbound";
- version = "1.9.4";
+ version = "1.9.5";
src = fetchurl {
url = "https://unbound.net/downloads/${pname}-${version}.tar.gz";
- sha256 = "1c2bjm13x8bkw0ds1mhn9ivd2gzmfrb0x5y76bkz09a04bxjagix";
+ sha256 = "0myv8l886gmlh9nh4j3q5549idxnl51hf9cw20yxfqbwd47l13ca";
};
# https://github.com/NLnetLabs/unbound/pull/90
@@ -34,6 +34,10 @@ stdenv.mkDerivation rec {
installFlags = [ "configfile=\${out}/etc/unbound/unbound.conf" ];
+ postInstall = ''
+ make unbound-event-install
+ '';
+
preFixup = stdenv.lib.optionalString (stdenv.isLinux && !stdenv.hostPlatform.isMusl) # XXX: revisit
# Build libunbound again, but only against nettle instead of openssl.
# This avoids gnutls.out -> unbound.lib -> openssl.out.
diff --git a/nixpkgs/pkgs/tools/networking/uwimap/default.nix b/nixpkgs/pkgs/tools/networking/uwimap/default.nix
index bc500a01c11..b687f1db017 100644
--- a/nixpkgs/pkgs/tools/networking/uwimap/default.nix
+++ b/nixpkgs/pkgs/tools/networking/uwimap/default.nix
@@ -8,12 +8,12 @@ stdenv.mkDerivation ({
sha256 = "0a2a00hbakh0640r2wdpnwr8789z59wnk7rfsihh3j0vbhmmmqak";
};
- makeFlags = if stdenv.isDarwin
+ makeFlags = [ (if stdenv.isDarwin
then "osx"
- else "lnp" # Linux with PAM modules;
+ else "lnp") ] # Linux with PAM modules;
# -fPIC is required to compile php with imap on x86_64 systems
- + stdenv.lib.optionalString stdenv.isx86_64 " EXTRACFLAGS=-fPIC"
- + stdenv.lib.optionalString (stdenv.buildPlatform != stdenv.hostPlatform) " CC=${stdenv.hostPlatform.config}-gcc RANLIB=${stdenv.hostPlatform.config}-ranlib";
+ ++ stdenv.lib.optional stdenv.isx86_64 "EXTRACFLAGS=-fPIC"
+ ++ stdenv.lib.optionals (stdenv.buildPlatform != stdenv.hostPlatform) [ "CC=${stdenv.hostPlatform.config}-gcc" "RANLIB=${stdenv.hostPlatform.config}-ranlib" ];
hardeningDisable = [ "format" ];
diff --git a/nixpkgs/pkgs/tools/networking/v2ray/default.nix b/nixpkgs/pkgs/tools/networking/v2ray/default.nix
new file mode 100644
index 00000000000..ee3ca416aa4
--- /dev/null
+++ b/nixpkgs/pkgs/tools/networking/v2ray/default.nix
@@ -0,0 +1,36 @@
+{ callPackage, fetchFromGitHub, fetchurl
+, assetOverrides ? {}
+, ... } @ args:
+
+callPackage ./generic.nix (rec {
+ version = "4.22.0";
+
+ src = fetchFromGitHub {
+ owner = "v2ray";
+ repo = "v2ray-core";
+ rev = "v${version}";
+ sha256 = "1gr4s96ii4dx5bcwpb82rn250pcnncxwzx147p9dbwbyiy0i9nz7";
+ };
+
+ assets = {
+ # MIT licensed
+ "geoip.dat" = let
+ geoipRev = "202001010102";
+ geoipSha256 = "16i73c3852f7zmya0q3856cc4gvhqhpln9s98qvr2dr1mpp72c1w";
+ in fetchurl {
+ url = "https://github.com/v2ray/geoip/releases/download/${geoipRev}/geoip.dat";
+ sha256 = geoipSha256;
+ };
+
+ # MIT licensed
+ "geosite.dat" = let
+ geositeRev = "20191226.1";
+ geositeSha256 = "0b4ji5kj5jpkwri3libxm9yl49dcy91vkl7h1rkhrrhbl17s3qiy";
+ in fetchurl {
+ url = "https://github.com/v2ray/domain-list-community/releases/download/${geositeRev}/dlc.dat";
+ sha256 = geositeSha256;
+ };
+
+ } // assetOverrides;
+
+} // args)
diff --git a/nixpkgs/pkgs/tools/networking/v2ray/generic.nix b/nixpkgs/pkgs/tools/networking/v2ray/generic.nix
new file mode 100644
index 00000000000..bf6e6cd55ae
--- /dev/null
+++ b/nixpkgs/pkgs/tools/networking/v2ray/generic.nix
@@ -0,0 +1,50 @@
+{ lib, linkFarm, buildGoModule, runCommand, makeWrapper
+
+# Version specific args
+, version, src, assets
+, ... }:
+
+let
+ assetsDrv = linkFarm "v2ray-assets" (lib.mapAttrsToList (name: path: {
+ inherit name path;
+ }) assets);
+
+ core = buildGoModule rec {
+ pname = "v2ray-core";
+ inherit version src;
+
+ modSha256 = "11gsncy3449a7y6w6pr7acqabyj2q2a1q52f8fcl5cdz1vjbmmxi";
+
+ buildPhase = ''
+ runHook preBuild
+
+ go build -o v2ray v2ray.com/core/main
+ go build -o v2ctl v2ray.com/core/infra/control/main
+
+ runHook postBuild
+ '';
+
+ installPhase = ''
+ install -Dm755 v2ray v2ctl -t $out/bin
+ '';
+ };
+
+in runCommand "v2ray-${version}" {
+ inherit version;
+
+ buildInputs = [ assetsDrv core ];
+ nativeBuildInputs = [ makeWrapper ];
+
+ meta = {
+ homepage = "https://www.v2ray.com/en/index.html";
+ description = "A platform for building proxies to bypass network restrictions";
+ license = with lib.licenses; [ mit ];
+ maintainers = with lib.maintainers; [ servalcatty ];
+ };
+
+} ''
+ for file in ${core}/bin/*; do
+ makeWrapper "$file" "$out/bin/$(basename "$file")" \
+ --set-default V2RAY_LOCATION_ASSET ${assetsDrv}
+ done
+''
diff --git a/nixpkgs/pkgs/tools/networking/v2ray/update.sh b/nixpkgs/pkgs/tools/networking/v2ray/update.sh
new file mode 100755
index 00000000000..38ad77e98f8
--- /dev/null
+++ b/nixpkgs/pkgs/tools/networking/v2ray/update.sh
@@ -0,0 +1,53 @@
+#!/usr/bin/env nix-shell
+#!nix-shell -i bash -p curl jq
+set -eo pipefail
+
+version_nix=$(dirname "$0")/default.nix
+deps_nix=$(dirname "$0")/deps.nix
+
+old_core_rev="v$(sed -En 's/.*\bversion = "(.*?)".*/\1/p' "$version_nix")"
+old_geoip_rev=$(sed -En 's/.*\bgeoipRev = "(.*?)".*/\1/p' "$version_nix")
+old_geosite_rev=$(sed -En 's/.*\bgeositeRev = "(.*?)".*/\1/p' "$version_nix")
+echo "Current version:" >&2
+echo "core: $old_core_rev, geoip: $old_geoip_rev, geosite: $old_geosite_rev" >&2
+
+function fetch_latest_rev {
+ curl "https://api.github.com/repos/v2ray/$1/releases" |
+ jq '.[0].tag_name' --raw-output
+}
+
+core_rev=$(fetch_latest_rev 'v2ray-core')
+geoip_rev=$(fetch_latest_rev 'geoip')
+geosite_rev=$(fetch_latest_rev 'domain-list-community')
+echo "Latest version:" >&2
+echo "core: $core_rev, geoip: $geoip_rev, geosite: $geosite_rev" >&2
+
+if [[ $core_rev != $old_core_rev ]]; then
+ echo "Prefetching core..." >&2
+ { read hash; read store_path; } < <(
+ nix-prefetch-url --unpack --print-path "https://github.com/v2ray/v2ray-core/archive/$core_rev.zip"
+ )
+
+ sed --in-place \
+ -e "s/\bversion = \".*\"/version = \"$(echo "$core_rev" | tail -c+2)\"/" \
+ -e "s/\bsha256 = \".*\"/sha256 = \"$hash\"/" \
+ "$version_nix"
+fi
+
+if [[ $geoip_rev != $old_geoip_rev ]]; then
+ echo "Prefetching geoip..." >&2
+ hash=$(nix-prefetch-url "https://github.com/v2ray/geoip/releases/download/$geoip_rev/geoip.dat")
+ sed --in-place \
+ -e "s/\bgeoipRev = \".*\"/geoipRev = \"$geoip_rev\"/" \
+ -e "s/\bgeoipSha256 = \".*\"/geoipSha256 = \"$hash\"/" \
+ "$version_nix"
+fi
+
+if [[ $geosite_rev != $old_geosite_rev ]]; then
+ echo "Prefetching geosite..." >&2
+ hash=$(nix-prefetch-url "https://github.com/v2ray/domain-list-community/releases/download/$geosite_rev/dlc.dat")
+ sed --in-place \
+ -e "s/\bgeositeRev = \".*\"/geositeRev = \"$geosite_rev\"/" \
+ -e "s/\bgeositeSha256 = \".*\"/geositeSha256 = \"$hash\"/" \
+ "$version_nix"
+fi
diff --git a/nixpkgs/pkgs/tools/networking/vde2/default.nix b/nixpkgs/pkgs/tools/networking/vde2/default.nix
index 4ea09cd7f00..e43c174ab3f 100644
--- a/nixpkgs/pkgs/tools/networking/vde2/default.nix
+++ b/nixpkgs/pkgs/tools/networking/vde2/default.nix
@@ -15,7 +15,7 @@ stdenv.mkDerivation rec {
}
);
- configureFlags = stdenv.lib.optional (!withPython) [ "--disable-python" ];
+ configureFlags = stdenv.lib.optional (!withPython) "--disable-python";
buildInputs = [ openssl libpcap ]
++ stdenv.lib.optional withPython python2;
diff --git a/nixpkgs/pkgs/tools/networking/whois/default.nix b/nixpkgs/pkgs/tools/networking/whois/default.nix
index b0564ad7c74..e079f9a881e 100644
--- a/nixpkgs/pkgs/tools/networking/whois/default.nix
+++ b/nixpkgs/pkgs/tools/networking/whois/default.nix
@@ -1,14 +1,14 @@
{ stdenv, fetchFromGitHub, perl, gettext, pkgconfig, libidn2, libiconv }:
stdenv.mkDerivation rec {
- version = "5.5.2";
+ version = "5.5.3";
pname = "whois";
src = fetchFromGitHub {
owner = "rfc1036";
repo = "whois";
rev = "v${version}";
- sha256 = "0587xvw0ifjrwxgisw0nfx7qykmkly1knfdghrpph9vicpzwsidw";
+ sha256 = "099yvqng085f69k815961jnwk50nzmiknvhl1wwmji2hl36r160g";
};
nativeBuildInputs = [ perl gettext pkgconfig ];
diff --git a/nixpkgs/pkgs/tools/networking/wireguard-go/0001-Fix-darwin-build.patch b/nixpkgs/pkgs/tools/networking/wireguard-go/0001-Fix-darwin-build.patch
new file mode 100644
index 00000000000..d79d9e3531f
--- /dev/null
+++ b/nixpkgs/pkgs/tools/networking/wireguard-go/0001-Fix-darwin-build.patch
@@ -0,0 +1,26 @@
+From 63360467da4ae6d7fc8c0e05619bdf8813c7e417 Mon Sep 17 00:00:00 2001
+From: Maximilian Bosch <maximilian@mbosch.me>
+Date: Sun, 5 Jan 2020 15:35:15 +0100
+Subject: [PATCH] Fix darwin build
+
+---
+ rwcancel/select_default.go | 5 +++--
+ 1 file changed, 3 insertions(+), 2 deletions(-)
+
+diff --git a/rwcancel/select_default.go b/rwcancel/select_default.go
+index dd23cda..03f3452 100644
+--- a/rwcancel/select_default.go
++++ b/rwcancel/select_default.go
+@@ -9,6 +9,7 @@ package rwcancel
+
+ import "golang.org/x/sys/unix"
+
+-func unixSelect(nfd int, r *unix.FdSet, w *unix.FdSet, e *unix.FdSet, timeout *unix.Timeval) error {
+- return unix.Select(nfd, r, w, e, timeout)
++func unixSelect(nfd int, r *unix.FdSet, w *unix.FdSet, e *unix.FdSet, timeout *unix.Timeval) (err error) {
++ _, err = unix.Select(nfd, r, w, e, timeout)
++ return
+ }
+--
+2.23.1
+
diff --git a/nixpkgs/pkgs/tools/networking/wireguard-go/default.nix b/nixpkgs/pkgs/tools/networking/wireguard-go/default.nix
index 025573d7dd1..8832560b3b1 100644
--- a/nixpkgs/pkgs/tools/networking/wireguard-go/default.nix
+++ b/nixpkgs/pkgs/tools/networking/wireguard-go/default.nix
@@ -2,15 +2,17 @@
buildGoPackage rec {
pname = "wireguard-go";
- version = "0.0.20190908";
+ version = "0.0.20191012";
goPackagePath = "golang.zx2c4.com/wireguard";
src = fetchzip {
url = "https://git.zx2c4.com/wireguard-go/snapshot/wireguard-go-${version}.tar.xz";
- sha256 = "1jsch0157nk86krdknij7dsvg6i7ar0ydhy07r40drhxqyp3q0hx";
+ sha256 = "0s3hvqpz13n630yvi0476hfzrp3xcj8x61zc2hl5z70f8kvbay4i";
};
+ patches = [ ./0001-Fix-darwin-build.patch ];
+
goDeps = ./deps.nix;
passthru.updateScript = ./update.sh;
diff --git a/nixpkgs/pkgs/tools/networking/wireguard-go/deps.nix b/nixpkgs/pkgs/tools/networking/wireguard-go/deps.nix
index 5501ebdc6c2..b1a92582b7c 100644
--- a/nixpkgs/pkgs/tools/networking/wireguard-go/deps.nix
+++ b/nixpkgs/pkgs/tools/networking/wireguard-go/deps.nix
@@ -5,8 +5,8 @@
fetch = {
type = "git";
url = "https://go.googlesource.com/crypto";
- rev = "9756ffdc2472";
- sha256 = "0q7hxaaq6lp0v8qqzifvysl47z5rfdlrxkh3d29vsl3wyby3dxl8";
+ rev = "34f69633bfdc";
+ sha256 = "0169vcn9s4c851y9vm7xqnar3vdfjrp7qsvcxadpfhsmwlfhxzgg";
};
}
{
@@ -14,8 +14,8 @@
fetch = {
type = "git";
url = "https://go.googlesource.com/net";
- rev = "ba9fcec4b297";
- sha256 = "1hbqvy6r0s5h0dpdqw8fynl3cq0acin3iyqki9xvl5r8h33yb9bx";
+ rev = "d98b1b443823";
+ sha256 = "1vzwpy56g056dsq304xga3d55jg2cxx89bijpfwjlhwyqyskybsz";
};
}
{
@@ -23,8 +23,8 @@
fetch = {
type = "git";
url = "https://go.googlesource.com/sys";
- rev = "19e00faab6ad";
- sha256 = "0znjx9xbyjdvk8cafdc1jl22gg29asxl5yl7mi3yz6zx3h39rm8y";
+ rev = "c178f38b412c";
+ sha256 = "1r6v8xnvb4z5vdckbj6vd08kn6h4ivr9hvdpgq4drj6l1mp79rf7";
};
}
{
diff --git a/nixpkgs/pkgs/tools/networking/wireguard-tools/default.nix b/nixpkgs/pkgs/tools/networking/wireguard-tools/default.nix
index d5edb128cd5..a01b0ab2061 100644
--- a/nixpkgs/pkgs/tools/networking/wireguard-tools/default.nix
+++ b/nixpkgs/pkgs/tools/networking/wireguard-tools/default.nix
@@ -14,14 +14,14 @@ with stdenv.lib;
stdenv.mkDerivation rec {
pname = "wireguard-tools";
- version = "0.0.20191127";
+ version = "1.0.20200102";
src = fetchzip {
- url = "https://git.zx2c4.com/WireGuard/snapshot/WireGuard-${version}.tar.xz";
- sha256 = "1n1x5858c32p0a13rrhn9a491174k5z4wd0gsy8qn546k1a8qj99";
+ url = "https://git.zx2c4.com/wireguard-tools/snapshot/wireguard-tools-${version}.tar.xz";
+ sha256 = "0ry3vbckcbkx43bz0bqinrd1hkll67jbwb72ak0b41wkxjsc8fmv";
};
- sourceRoot = "source/src/tools";
+ sourceRoot = "source/src";
nativeBuildInputs = [ makeWrapper ];
buildInputs = optional stdenv.isLinux libmnl;
@@ -51,10 +51,10 @@ stdenv.mkDerivation rec {
meta = {
description = "Tools for the WireGuard secure network tunnel";
- downloadPage = "https://git.zx2c4.com/WireGuard/refs/";
+ downloadPage = "https://git.zx2c4.com/wireguard-tools/refs/";
homepage = "https://www.wireguard.com/";
license = licenses.gpl2;
- maintainers = with maintainers; [ elseym ericsagnes mic92 zx2c4 globin ma27 ];
+ maintainers = with maintainers; [ elseym ericsagnes mic92 zx2c4 globin ma27 xwvvvvwx ];
platforms = platforms.unix;
};
}
diff --git a/nixpkgs/pkgs/tools/networking/wrk/default.nix b/nixpkgs/pkgs/tools/networking/wrk/default.nix
index 9c8f46bef07..98705430c2f 100644
--- a/nixpkgs/pkgs/tools/networking/wrk/default.nix
+++ b/nixpkgs/pkgs/tools/networking/wrk/default.nix
@@ -22,13 +22,13 @@ stdenv.mkDerivation rec {
done
'';
- NIX_CFLAGS_COMPILE = [ "-DluaL_reg=luaL_Reg" ]; # needed since luajit-2.1.0-beta3
-
+ NIX_CFLAGS_COMPILE = "-DluaL_reg=luaL_Reg"; # needed since luajit-2.1.0-beta3
+
installPhase = ''
mkdir -p $out/bin
cp wrk $out/bin
'';
-
+
meta = with stdenv.lib; {
description = "HTTP benchmarking tool";
homepage = https://github.com/wg/wrk;
diff --git a/nixpkgs/pkgs/tools/networking/yggdrasil/default.nix b/nixpkgs/pkgs/tools/networking/yggdrasil/default.nix
index f6fff42efdf..ca10adae0e4 100644
--- a/nixpkgs/pkgs/tools/networking/yggdrasil/default.nix
+++ b/nixpkgs/pkgs/tools/networking/yggdrasil/default.nix
@@ -2,13 +2,13 @@
buildGoModule rec {
pname = "yggdrasil";
- version = "0.3.11";
+ version = "0.3.12";
src = fetchFromGitHub {
owner = "yggdrasil-network";
repo = "yggdrasil-go";
rev = "v${version}";
- sha256 = "0cz9axphqvpqwy591ws9by7khpdw96iwf9vmhif3i52ghp8hpfd1";
+ sha256 = "03ywxamjcnhcr20vm9pn3rq3hqq49i6rfdvx44czzr30h8xp8dhw";
};
modSha256 = "1vqk0jyqc1qcryi247r5pbvfjw3m48l028fb2mrq1xqqfkjqrr85";
diff --git a/nixpkgs/pkgs/tools/networking/zerotierone/default.nix b/nixpkgs/pkgs/tools/networking/zerotierone/default.nix
index 58f2e816008..da5b8837523 100644
--- a/nixpkgs/pkgs/tools/networking/zerotierone/default.nix
+++ b/nixpkgs/pkgs/tools/networking/zerotierone/default.nix
@@ -1,4 +1,4 @@
-{ stdenv, fetchFromGitHub, openssl, lzo, zlib, iproute, which, ronn }:
+{ stdenv, buildPackages, fetchFromGitHub, openssl, lzo, zlib, iproute, ronn }:
stdenv.mkDerivation rec {
pname = "zerotierone";
@@ -20,11 +20,14 @@ stdenv.mkDerivation rec {
patchShebangs ./doc/build.sh
substituteInPlace ./doc/build.sh \
- --replace '/usr/bin/ronn' '${ronn}/bin/ronn' \
- --replace 'ronn -r' '${ronn}/bin/ronn -r'
+ --replace '/usr/bin/ronn' '${buildPackages.ronn}/bin/ronn' \
'';
- buildInputs = [ openssl lzo zlib iproute which ronn ];
+
+ nativeBuildInputs = [ ronn ];
+ buildInputs = [ openssl lzo zlib iproute ];
+
+ enableParallelBuilding = true;
installPhase = ''
install -Dt "$out/bin/" zerotier-one
@@ -43,7 +46,7 @@ stdenv.mkDerivation rec {
description = "Create flat virtual Ethernet networks of almost unlimited size";
homepage = https://www.zerotier.com;
license = licenses.bsl11;
- maintainers = with maintainers; [ sjmackenzie zimbatm ehmry obadz ];
- platforms = platforms.x86_64 ++ platforms.aarch64;
+ maintainers = with maintainers; [ sjmackenzie zimbatm ehmry obadz danielfullmer ];
+ platforms = with platforms; x86_64 ++ aarch64 ++ arm;
};
}
diff --git a/nixpkgs/pkgs/tools/package-management/cargo-deb/default.nix b/nixpkgs/pkgs/tools/package-management/cargo-deb/default.nix
index 4630ed66bd2..d9e0630e6ff 100644
--- a/nixpkgs/pkgs/tools/package-management/cargo-deb/default.nix
+++ b/nixpkgs/pkgs/tools/package-management/cargo-deb/default.nix
@@ -2,18 +2,18 @@
rustPlatform.buildRustPackage rec {
pname = "cargo-deb";
- version = "1.21.1";
+ version = "1.23.0";
src = fetchFromGitHub {
owner = "mmstick";
repo = "cargo-deb";
rev = "v${version}";
- sha256 = "10b25a0cnrd2bhf38yqc32l06vp6sdlfcpa6n9718yipp7b60cq2";
+ sha256 = "0jjhbs48f0rprzxnfgav6mjbyvcqnr7xq1qgyjxwd61z8g3m8hx8";
};
buildInputs = with stdenv; lib.optionals isDarwin [ Security ];
- cargoSha256 = "182ayprs2awmz7lzqkhawrmpfjla3jcj58q8g8c908gchkh05kns";
+ cargoSha256 = "03z9hq873jfsbssnd3kr5vz9lx9mvhb1navb2glm6kkw1k2zm4d2";
meta = with stdenv.lib; {
description = "Generate Debian packages from information in Cargo.toml";
diff --git a/nixpkgs/pkgs/tools/package-management/cargo-edit/default.nix b/nixpkgs/pkgs/tools/package-management/cargo-edit/default.nix
index 8ddb8eb231b..0adc2add96d 100644
--- a/nixpkgs/pkgs/tools/package-management/cargo-edit/default.nix
+++ b/nixpkgs/pkgs/tools/package-management/cargo-edit/default.nix
@@ -1,29 +1,28 @@
{ stdenv, lib, darwin
, rustPlatform, fetchFromGitHub
-, openssl, pkgconfig }:
+, openssl, pkg-config, libiconv }:
rustPlatform.buildRustPackage rec {
pname = "cargo-edit";
- version = "0.3.3";
+ version = "0.4.2";
src = fetchFromGitHub {
owner = "killercup";
repo = pname;
rev = "v${version}";
- sha256 = "05b64bm9441crw74xlywjg2y3psljk2kf9xsrixaqwbnnahi0mm5";
+ sha256 = "0y0sq0kll6bg0qrfdyas8rcx5dj50j9f05qx244kv7vqxp2q25jq";
};
- cargoSha256 = "1hjjw3i35vqr6nxsv2m3izq4x8c2a6wvl5c2kjlpg6shy9j2mjaa";
+ cargoSha256 = "0prd53p20cha2y2qp8dmq0ywd32f6jm8mszdkbi4x606dj9bcgbl";
- nativeBuildInputs = lib.optional (!stdenv.isDarwin) pkgconfig;
- buildInputs = lib.optional (!stdenv.isDarwin) openssl;
- propagatedBuildInputs = lib.optional stdenv.isDarwin darwin.apple_sdk.frameworks.Security;
+ nativeBuildInputs = [ pkg-config ];
+ buildInputs = [ openssl ] ++ lib.optionals stdenv.isDarwin [ libiconv darwin.apple_sdk.frameworks.Security ];
meta = with lib; {
description = "A utility for managing cargo dependencies from the command line";
homepage = https://github.com/killercup/cargo-edit;
license = with licenses; [ mit ];
- maintainers = with maintainers; [ gerschtli jb55 ];
+ maintainers = with maintainers; [ gerschtli jb55 filalex77 ];
platforms = platforms.all;
};
}
diff --git a/nixpkgs/pkgs/tools/package-management/cargo-license/add-Cargo.lock.patch b/nixpkgs/pkgs/tools/package-management/cargo-license/add-Cargo.lock.patch
index 7137f8b7fb1..c6c4e3f62e1 100644
--- a/nixpkgs/pkgs/tools/package-management/cargo-license/add-Cargo.lock.patch
+++ b/nixpkgs/pkgs/tools/package-management/cargo-license/add-Cargo.lock.patch
@@ -1,15 +1,9 @@
-commit ed7cd525d00a0f8517894cfec6e3e277f630b15f
-Author: Bas van Dijk <v.dijk.bas@gmail.com>
-Date: Mon Jun 24 00:13:13 2019 +0200
-
- Add Cargo.lock
-
diff --git a/Cargo.lock b/Cargo.lock
new file mode 100644
-index 0000000..b552c16
+index 0000000..20311b5
--- /dev/null
+++ b/Cargo.lock
-@@ -0,0 +1,285 @@
+@@ -0,0 +1,429 @@
+# This file is automatically @generated by Cargo.
+# It is not intended for manual editing.
+[[package]]
@@ -18,122 +12,169 @@ index 0000000..b552c16
+source = "registry+https://github.com/rust-lang/crates.io-index"
+
+[[package]]
-+name = "autocfg"
-+version = "0.1.4"
++name = "ansi_term"
++version = "0.11.0"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++dependencies = [
++ "winapi 0.3.8 (registry+https://github.com/rust-lang/crates.io-index)",
++]
++
++[[package]]
++name = "atty"
++version = "0.2.13"
+source = "registry+https://github.com/rust-lang/crates.io-index"
++dependencies = [
++ "libc 0.2.66 (registry+https://github.com/rust-lang/crates.io-index)",
++ "winapi 0.3.8 (registry+https://github.com/rust-lang/crates.io-index)",
++]
+
+[[package]]
+name = "backtrace"
-+version = "0.3.31"
++version = "0.3.40"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+dependencies = [
-+ "autocfg 0.1.4 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "backtrace-sys 0.1.28 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "cfg-if 0.1.9 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "libc 0.2.58 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "rustc-demangle 0.1.15 (registry+https://github.com/rust-lang/crates.io-index)",
++ "backtrace-sys 0.1.32 (registry+https://github.com/rust-lang/crates.io-index)",
++ "cfg-if 0.1.10 (registry+https://github.com/rust-lang/crates.io-index)",
++ "libc 0.2.66 (registry+https://github.com/rust-lang/crates.io-index)",
++ "rustc-demangle 0.1.16 (registry+https://github.com/rust-lang/crates.io-index)",
+]
+
+[[package]]
+name = "backtrace-sys"
-+version = "0.1.28"
++version = "0.1.32"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++dependencies = [
++ "cc 1.0.48 (registry+https://github.com/rust-lang/crates.io-index)",
++ "libc 0.2.66 (registry+https://github.com/rust-lang/crates.io-index)",
++]
++
++[[package]]
++name = "bitflags"
++version = "1.2.1"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++
++[[package]]
++name = "bstr"
++version = "0.2.8"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+dependencies = [
-+ "cc 1.0.37 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "libc 0.2.58 (registry+https://github.com/rust-lang/crates.io-index)",
++ "lazy_static 1.4.0 (registry+https://github.com/rust-lang/crates.io-index)",
++ "memchr 2.2.1 (registry+https://github.com/rust-lang/crates.io-index)",
++ "regex-automata 0.1.8 (registry+https://github.com/rust-lang/crates.io-index)",
++ "serde 1.0.104 (registry+https://github.com/rust-lang/crates.io-index)",
+]
+
+[[package]]
++name = "byteorder"
++version = "1.3.2"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++
++[[package]]
+name = "cargo-license"
-+version = "0.2.0"
++version = "0.3.0"
+dependencies = [
+ "ansi_term 0.9.0 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "cargo_metadata 0.6.4 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "csv 1.0.7 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "failure 0.1.5 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "getopts 0.2.19 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "serde 1.0.93 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "serde_derive 1.0.93 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "serde_json 1.0.39 (registry+https://github.com/rust-lang/crates.io-index)",
++ "cargo_metadata 0.9.1 (registry+https://github.com/rust-lang/crates.io-index)",
++ "csv 1.1.1 (registry+https://github.com/rust-lang/crates.io-index)",
++ "failure 0.1.6 (registry+https://github.com/rust-lang/crates.io-index)",
++ "getopts 0.2.21 (registry+https://github.com/rust-lang/crates.io-index)",
++ "semver 0.9.0 (registry+https://github.com/rust-lang/crates.io-index)",
++ "serde 1.0.104 (registry+https://github.com/rust-lang/crates.io-index)",
++ "serde_derive 1.0.104 (registry+https://github.com/rust-lang/crates.io-index)",
++ "serde_json 1.0.44 (registry+https://github.com/rust-lang/crates.io-index)",
++ "structopt 0.3.5 (registry+https://github.com/rust-lang/crates.io-index)",
+ "toml 0.4.10 (registry+https://github.com/rust-lang/crates.io-index)",
+]
+
+[[package]]
+name = "cargo_metadata"
-+version = "0.6.4"
++version = "0.9.1"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+dependencies = [
-+ "error-chain 0.12.1 (registry+https://github.com/rust-lang/crates.io-index)",
+ "semver 0.9.0 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "serde 1.0.93 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "serde_derive 1.0.93 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "serde_json 1.0.39 (registry+https://github.com/rust-lang/crates.io-index)",
++ "serde 1.0.104 (registry+https://github.com/rust-lang/crates.io-index)",
++ "serde_derive 1.0.104 (registry+https://github.com/rust-lang/crates.io-index)",
++ "serde_json 1.0.44 (registry+https://github.com/rust-lang/crates.io-index)",
+]
+
+[[package]]
+name = "cc"
-+version = "1.0.37"
++version = "1.0.48"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+
+[[package]]
+name = "cfg-if"
-+version = "0.1.9"
++version = "0.1.10"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+
+[[package]]
-+name = "csv"
-+version = "1.0.7"
++name = "clap"
++version = "2.33.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+dependencies = [
-+ "csv-core 0.1.5 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "itoa 0.4.4 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "ryu 0.2.8 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "serde 1.0.93 (registry+https://github.com/rust-lang/crates.io-index)",
++ "ansi_term 0.11.0 (registry+https://github.com/rust-lang/crates.io-index)",
++ "atty 0.2.13 (registry+https://github.com/rust-lang/crates.io-index)",
++ "bitflags 1.2.1 (registry+https://github.com/rust-lang/crates.io-index)",
++ "strsim 0.8.0 (registry+https://github.com/rust-lang/crates.io-index)",
++ "textwrap 0.11.0 (registry+https://github.com/rust-lang/crates.io-index)",
++ "unicode-width 0.1.7 (registry+https://github.com/rust-lang/crates.io-index)",
++ "vec_map 0.8.1 (registry+https://github.com/rust-lang/crates.io-index)",
+]
+
+[[package]]
-+name = "csv-core"
-+version = "0.1.5"
++name = "csv"
++version = "1.1.1"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+dependencies = [
-+ "memchr 2.2.0 (registry+https://github.com/rust-lang/crates.io-index)",
++ "bstr 0.2.8 (registry+https://github.com/rust-lang/crates.io-index)",
++ "csv-core 0.1.6 (registry+https://github.com/rust-lang/crates.io-index)",
++ "itoa 0.4.4 (registry+https://github.com/rust-lang/crates.io-index)",
++ "ryu 1.0.2 (registry+https://github.com/rust-lang/crates.io-index)",
++ "serde 1.0.104 (registry+https://github.com/rust-lang/crates.io-index)",
+]
+
+[[package]]
-+name = "error-chain"
-+version = "0.12.1"
++name = "csv-core"
++version = "0.1.6"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+dependencies = [
-+ "backtrace 0.3.31 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "version_check 0.1.5 (registry+https://github.com/rust-lang/crates.io-index)",
++ "memchr 2.2.1 (registry+https://github.com/rust-lang/crates.io-index)",
+]
+
+[[package]]
+name = "failure"
-+version = "0.1.5"
++version = "0.1.6"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+dependencies = [
-+ "backtrace 0.3.31 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "failure_derive 0.1.5 (registry+https://github.com/rust-lang/crates.io-index)",
++ "backtrace 0.3.40 (registry+https://github.com/rust-lang/crates.io-index)",
++ "failure_derive 0.1.6 (registry+https://github.com/rust-lang/crates.io-index)",
+]
+
+[[package]]
+name = "failure_derive"
-+version = "0.1.5"
++version = "0.1.6"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+dependencies = [
-+ "proc-macro2 0.4.30 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "quote 0.6.12 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "syn 0.15.38 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "synstructure 0.10.2 (registry+https://github.com/rust-lang/crates.io-index)",
++ "proc-macro2 1.0.6 (registry+https://github.com/rust-lang/crates.io-index)",
++ "quote 1.0.2 (registry+https://github.com/rust-lang/crates.io-index)",
++ "syn 1.0.11 (registry+https://github.com/rust-lang/crates.io-index)",
++ "synstructure 0.12.3 (registry+https://github.com/rust-lang/crates.io-index)",
+]
+
+[[package]]
+name = "getopts"
-+version = "0.2.19"
++version = "0.2.21"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++dependencies = [
++ "unicode-width 0.1.7 (registry+https://github.com/rust-lang/crates.io-index)",
++]
++
++[[package]]
++name = "heck"
++version = "0.3.1"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+dependencies = [
-+ "unicode-width 0.1.5 (registry+https://github.com/rust-lang/crates.io-index)",
++ "unicode-segmentation 1.6.0 (registry+https://github.com/rust-lang/crates.io-index)",
+]
+
+[[package]]
@@ -142,42 +183,65 @@ index 0000000..b552c16
+source = "registry+https://github.com/rust-lang/crates.io-index"
+
+[[package]]
++name = "lazy_static"
++version = "1.4.0"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++
++[[package]]
+name = "libc"
-+version = "0.2.58"
++version = "0.2.66"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+
+[[package]]
+name = "memchr"
-+version = "2.2.0"
++version = "2.2.1"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++dependencies = [
++ "libc 0.2.66 (registry+https://github.com/rust-lang/crates.io-index)",
++]
++
++[[package]]
++name = "proc-macro-error"
++version = "0.2.6"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+dependencies = [
-+ "libc 0.2.58 (registry+https://github.com/rust-lang/crates.io-index)",
++ "proc-macro2 1.0.6 (registry+https://github.com/rust-lang/crates.io-index)",
++ "quote 1.0.2 (registry+https://github.com/rust-lang/crates.io-index)",
++ "syn 1.0.11 (registry+https://github.com/rust-lang/crates.io-index)",
+]
+
+[[package]]
+name = "proc-macro2"
-+version = "0.4.30"
++version = "1.0.6"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+dependencies = [
-+ "unicode-xid 0.1.0 (registry+https://github.com/rust-lang/crates.io-index)",
++ "unicode-xid 0.2.0 (registry+https://github.com/rust-lang/crates.io-index)",
+]
+
+[[package]]
+name = "quote"
-+version = "0.6.12"
++version = "1.0.2"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++dependencies = [
++ "proc-macro2 1.0.6 (registry+https://github.com/rust-lang/crates.io-index)",
++]
++
++[[package]]
++name = "regex-automata"
++version = "0.1.8"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+dependencies = [
-+ "proc-macro2 0.4.30 (registry+https://github.com/rust-lang/crates.io-index)",
++ "byteorder 1.3.2 (registry+https://github.com/rust-lang/crates.io-index)",
+]
+
+[[package]]
+name = "rustc-demangle"
-+version = "0.1.15"
++version = "0.1.16"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+
+[[package]]
+name = "ryu"
-+version = "0.2.8"
++version = "1.0.2"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+
+[[package]]
@@ -186,7 +250,7 @@ index 0000000..b552c16
+source = "registry+https://github.com/rust-lang/crates.io-index"
+dependencies = [
+ "semver-parser 0.7.0 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "serde 1.0.93 (registry+https://github.com/rust-lang/crates.io-index)",
++ "serde 1.0.104 (registry+https://github.com/rust-lang/crates.io-index)",
+]
+
+[[package]]
@@ -196,48 +260,82 @@ index 0000000..b552c16
+
+[[package]]
+name = "serde"
-+version = "1.0.93"
++version = "1.0.104"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+
+[[package]]
+name = "serde_derive"
-+version = "1.0.93"
++version = "1.0.104"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+dependencies = [
-+ "proc-macro2 0.4.30 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "quote 0.6.12 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "syn 0.15.38 (registry+https://github.com/rust-lang/crates.io-index)",
++ "proc-macro2 1.0.6 (registry+https://github.com/rust-lang/crates.io-index)",
++ "quote 1.0.2 (registry+https://github.com/rust-lang/crates.io-index)",
++ "syn 1.0.11 (registry+https://github.com/rust-lang/crates.io-index)",
+]
+
+[[package]]
+name = "serde_json"
-+version = "1.0.39"
++version = "1.0.44"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+dependencies = [
+ "itoa 0.4.4 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "ryu 0.2.8 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "serde 1.0.93 (registry+https://github.com/rust-lang/crates.io-index)",
++ "ryu 1.0.2 (registry+https://github.com/rust-lang/crates.io-index)",
++ "serde 1.0.104 (registry+https://github.com/rust-lang/crates.io-index)",
++]
++
++[[package]]
++name = "strsim"
++version = "0.8.0"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++
++[[package]]
++name = "structopt"
++version = "0.3.5"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++dependencies = [
++ "clap 2.33.0 (registry+https://github.com/rust-lang/crates.io-index)",
++ "structopt-derive 0.3.5 (registry+https://github.com/rust-lang/crates.io-index)",
++]
++
++[[package]]
++name = "structopt-derive"
++version = "0.3.5"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++dependencies = [
++ "heck 0.3.1 (registry+https://github.com/rust-lang/crates.io-index)",
++ "proc-macro-error 0.2.6 (registry+https://github.com/rust-lang/crates.io-index)",
++ "proc-macro2 1.0.6 (registry+https://github.com/rust-lang/crates.io-index)",
++ "quote 1.0.2 (registry+https://github.com/rust-lang/crates.io-index)",
++ "syn 1.0.11 (registry+https://github.com/rust-lang/crates.io-index)",
+]
+
+[[package]]
+name = "syn"
-+version = "0.15.38"
++version = "1.0.11"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+dependencies = [
-+ "proc-macro2 0.4.30 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "quote 0.6.12 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "unicode-xid 0.1.0 (registry+https://github.com/rust-lang/crates.io-index)",
++ "proc-macro2 1.0.6 (registry+https://github.com/rust-lang/crates.io-index)",
++ "quote 1.0.2 (registry+https://github.com/rust-lang/crates.io-index)",
++ "unicode-xid 0.2.0 (registry+https://github.com/rust-lang/crates.io-index)",
+]
+
+[[package]]
+name = "synstructure"
-+version = "0.10.2"
++version = "0.12.3"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+dependencies = [
-+ "proc-macro2 0.4.30 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "quote 0.6.12 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "syn 0.15.38 (registry+https://github.com/rust-lang/crates.io-index)",
-+ "unicode-xid 0.1.0 (registry+https://github.com/rust-lang/crates.io-index)",
++ "proc-macro2 1.0.6 (registry+https://github.com/rust-lang/crates.io-index)",
++ "quote 1.0.2 (registry+https://github.com/rust-lang/crates.io-index)",
++ "syn 1.0.11 (registry+https://github.com/rust-lang/crates.io-index)",
++ "unicode-xid 0.2.0 (registry+https://github.com/rust-lang/crates.io-index)",
++]
++
++[[package]]
++name = "textwrap"
++version = "0.11.0"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++dependencies = [
++ "unicode-width 0.1.7 (registry+https://github.com/rust-lang/crates.io-index)",
+]
+
+[[package]]
@@ -245,53 +343,93 @@ index 0000000..b552c16
+version = "0.4.10"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+dependencies = [
-+ "serde 1.0.93 (registry+https://github.com/rust-lang/crates.io-index)",
++ "serde 1.0.104 (registry+https://github.com/rust-lang/crates.io-index)",
+]
+
+[[package]]
++name = "unicode-segmentation"
++version = "1.6.0"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++
++[[package]]
+name = "unicode-width"
-+version = "0.1.5"
++version = "0.1.7"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+
+[[package]]
+name = "unicode-xid"
-+version = "0.1.0"
++version = "0.2.0"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++
++[[package]]
++name = "vec_map"
++version = "0.8.1"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++
++[[package]]
++name = "winapi"
++version = "0.3.8"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++dependencies = [
++ "winapi-i686-pc-windows-gnu 0.4.0 (registry+https://github.com/rust-lang/crates.io-index)",
++ "winapi-x86_64-pc-windows-gnu 0.4.0 (registry+https://github.com/rust-lang/crates.io-index)",
++]
++
++[[package]]
++name = "winapi-i686-pc-windows-gnu"
++version = "0.4.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+
+[[package]]
-+name = "version_check"
-+version = "0.1.5"
++name = "winapi-x86_64-pc-windows-gnu"
++version = "0.4.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+
+[metadata]
++"checksum ansi_term 0.11.0 (registry+https://github.com/rust-lang/crates.io-index)" = "ee49baf6cb617b853aa8d93bf420db2383fab46d314482ca2803b40d5fde979b"
+"checksum ansi_term 0.9.0 (registry+https://github.com/rust-lang/crates.io-index)" = "23ac7c30002a5accbf7e8987d0632fa6de155b7c3d39d0067317a391e00a2ef6"
-+"checksum autocfg 0.1.4 (registry+https://github.com/rust-lang/crates.io-index)" = "0e49efa51329a5fd37e7c79db4621af617cd4e3e5bc224939808d076077077bf"
-+"checksum backtrace 0.3.31 (registry+https://github.com/rust-lang/crates.io-index)" = "e0f77aa27f55a4beb477ff6bc4d9bf72f90eb422b19c1d8e5a644b8aeb674d66"
-+"checksum backtrace-sys 0.1.28 (registry+https://github.com/rust-lang/crates.io-index)" = "797c830ac25ccc92a7f8a7b9862bde440715531514594a6154e3d4a54dd769b6"
-+"checksum cargo_metadata 0.6.4 (registry+https://github.com/rust-lang/crates.io-index)" = "e5d1b4d380e1bab994591a24c2bdd1b054f64b60bef483a8c598c7c345bc3bbe"
-+"checksum cc 1.0.37 (registry+https://github.com/rust-lang/crates.io-index)" = "39f75544d7bbaf57560d2168f28fd649ff9c76153874db88bdbdfd839b1a7e7d"
-+"checksum cfg-if 0.1.9 (registry+https://github.com/rust-lang/crates.io-index)" = "b486ce3ccf7ffd79fdeb678eac06a9e6c09fc88d33836340becb8fffe87c5e33"
-+"checksum csv 1.0.7 (registry+https://github.com/rust-lang/crates.io-index)" = "9044e25afb0924b5a5fc5511689b0918629e85d68ea591e5e87fbf1e85ea1b3b"
-+"checksum csv-core 0.1.5 (registry+https://github.com/rust-lang/crates.io-index)" = "fa5cdef62f37e6ffe7d1f07a381bc0db32b7a3ff1cac0de56cb0d81e71f53d65"
-+"checksum error-chain 0.12.1 (registry+https://github.com/rust-lang/crates.io-index)" = "3ab49e9dcb602294bc42f9a7dfc9bc6e936fca4418ea300dbfb84fe16de0b7d9"
-+"checksum failure 0.1.5 (registry+https://github.com/rust-lang/crates.io-index)" = "795bd83d3abeb9220f257e597aa0080a508b27533824adf336529648f6abf7e2"
-+"checksum failure_derive 0.1.5 (registry+https://github.com/rust-lang/crates.io-index)" = "ea1063915fd7ef4309e222a5a07cf9c319fb9c7836b1f89b85458672dbb127e1"
-+"checksum getopts 0.2.19 (registry+https://github.com/rust-lang/crates.io-index)" = "72327b15c228bfe31f1390f93dd5e9279587f0463836393c9df719ce62a3e450"
++"checksum atty 0.2.13 (registry+https://github.com/rust-lang/crates.io-index)" = "1803c647a3ec87095e7ae7acfca019e98de5ec9a7d01343f611cf3152ed71a90"
++"checksum backtrace 0.3.40 (registry+https://github.com/rust-lang/crates.io-index)" = "924c76597f0d9ca25d762c25a4d369d51267536465dc5064bdf0eb073ed477ea"
++"checksum backtrace-sys 0.1.32 (registry+https://github.com/rust-lang/crates.io-index)" = "5d6575f128516de27e3ce99689419835fce9643a9b215a14d2b5b685be018491"
++"checksum bitflags 1.2.1 (registry+https://github.com/rust-lang/crates.io-index)" = "cf1de2fe8c75bc145a2f577add951f8134889b4795d47466a54a5c846d691693"
++"checksum bstr 0.2.8 (registry+https://github.com/rust-lang/crates.io-index)" = "8d6c2c5b58ab920a4f5aeaaca34b4488074e8cc7596af94e6f8c6ff247c60245"
++"checksum byteorder 1.3.2 (registry+https://github.com/rust-lang/crates.io-index)" = "a7c3dd8985a7111efc5c80b44e23ecdd8c007de8ade3b96595387e812b957cf5"
++"checksum cargo_metadata 0.9.1 (registry+https://github.com/rust-lang/crates.io-index)" = "46e3374c604fb39d1a2f35ed5e4a4e30e60d01fab49446e08f1b3e9a90aef202"
++"checksum cc 1.0.48 (registry+https://github.com/rust-lang/crates.io-index)" = "f52a465a666ca3d838ebbf08b241383421412fe7ebb463527bba275526d89f76"
++"checksum cfg-if 0.1.10 (registry+https://github.com/rust-lang/crates.io-index)" = "4785bdd1c96b2a846b2bd7cc02e86b6b3dbf14e7e53446c4f54c92a361040822"
++"checksum clap 2.33.0 (registry+https://github.com/rust-lang/crates.io-index)" = "5067f5bb2d80ef5d68b4c87db81601f0b75bca627bc2ef76b141d7b846a3c6d9"
++"checksum csv 1.1.1 (registry+https://github.com/rust-lang/crates.io-index)" = "37519ccdfd73a75821cac9319d4fce15a81b9fcf75f951df5b9988aa3a0af87d"
++"checksum csv-core 0.1.6 (registry+https://github.com/rust-lang/crates.io-index)" = "9b5cadb6b25c77aeff80ba701712494213f4a8418fcda2ee11b6560c3ad0bf4c"
++"checksum failure 0.1.6 (registry+https://github.com/rust-lang/crates.io-index)" = "f8273f13c977665c5db7eb2b99ae520952fe5ac831ae4cd09d80c4c7042b5ed9"
++"checksum failure_derive 0.1.6 (registry+https://github.com/rust-lang/crates.io-index)" = "0bc225b78e0391e4b8683440bf2e63c2deeeb2ce5189eab46e2b68c6d3725d08"
++"checksum getopts 0.2.21 (registry+https://github.com/rust-lang/crates.io-index)" = "14dbbfd5c71d70241ecf9e6f13737f7b5ce823821063188d7e46c41d371eebd5"
++"checksum heck 0.3.1 (registry+https://github.com/rust-lang/crates.io-index)" = "20564e78d53d2bb135c343b3f47714a56af2061f1c928fdb541dc7b9fdd94205"
+"checksum itoa 0.4.4 (registry+https://github.com/rust-lang/crates.io-index)" = "501266b7edd0174f8530248f87f99c88fbe60ca4ef3dd486835b8d8d53136f7f"
-+"checksum libc 0.2.58 (registry+https://github.com/rust-lang/crates.io-index)" = "6281b86796ba5e4366000be6e9e18bf35580adf9e63fbe2294aadb587613a319"
-+"checksum memchr 2.2.0 (registry+https://github.com/rust-lang/crates.io-index)" = "2efc7bc57c883d4a4d6e3246905283d8dae951bb3bd32f49d6ef297f546e1c39"
-+"checksum proc-macro2 0.4.30 (registry+https://github.com/rust-lang/crates.io-index)" = "cf3d2011ab5c909338f7887f4fc896d35932e29146c12c8d01da6b22a80ba759"
-+"checksum quote 0.6.12 (registry+https://github.com/rust-lang/crates.io-index)" = "faf4799c5d274f3868a4aae320a0a182cbd2baee377b378f080e16a23e9d80db"
-+"checksum rustc-demangle 0.1.15 (registry+https://github.com/rust-lang/crates.io-index)" = "a7f4dccf6f4891ebcc0c39f9b6eb1a83b9bf5d747cb439ec6fba4f3b977038af"
-+"checksum ryu 0.2.8 (registry+https://github.com/rust-lang/crates.io-index)" = "b96a9549dc8d48f2c283938303c4b5a77aa29bfbc5b54b084fb1630408899a8f"
++"checksum lazy_static 1.4.0 (registry+https://github.com/rust-lang/crates.io-index)" = "e2abad23fbc42b3700f2f279844dc832adb2b2eb069b2df918f455c4e18cc646"
++"checksum libc 0.2.66 (registry+https://github.com/rust-lang/crates.io-index)" = "d515b1f41455adea1313a4a2ac8a8a477634fbae63cc6100e3aebb207ce61558"
++"checksum memchr 2.2.1 (registry+https://github.com/rust-lang/crates.io-index)" = "88579771288728879b57485cc7d6b07d648c9f0141eb955f8ab7f9d45394468e"
++"checksum proc-macro-error 0.2.6 (registry+https://github.com/rust-lang/crates.io-index)" = "aeccfe4d5d8ea175d5f0e4a2ad0637e0f4121d63bd99d356fb1f39ab2e7c6097"
++"checksum proc-macro2 1.0.6 (registry+https://github.com/rust-lang/crates.io-index)" = "9c9e470a8dc4aeae2dee2f335e8f533e2d4b347e1434e5671afc49b054592f27"
++"checksum quote 1.0.2 (registry+https://github.com/rust-lang/crates.io-index)" = "053a8c8bcc71fcce321828dc897a98ab9760bef03a4fc36693c231e5b3216cfe"
++"checksum regex-automata 0.1.8 (registry+https://github.com/rust-lang/crates.io-index)" = "92b73c2a1770c255c240eaa4ee600df1704a38dc3feaa6e949e7fcd4f8dc09f9"
++"checksum rustc-demangle 0.1.16 (registry+https://github.com/rust-lang/crates.io-index)" = "4c691c0e608126e00913e33f0ccf3727d5fc84573623b8d65b2df340b5201783"
++"checksum ryu 1.0.2 (registry+https://github.com/rust-lang/crates.io-index)" = "bfa8506c1de11c9c4e4c38863ccbe02a305c8188e85a05a784c9e11e1c3910c8"
+"checksum semver 0.9.0 (registry+https://github.com/rust-lang/crates.io-index)" = "1d7eb9ef2c18661902cc47e535f9bc51b78acd254da71d375c2f6720d9a40403"
+"checksum semver-parser 0.7.0 (registry+https://github.com/rust-lang/crates.io-index)" = "388a1df253eca08550bef6c72392cfe7c30914bf41df5269b68cbd6ff8f570a3"
-+"checksum serde 1.0.93 (registry+https://github.com/rust-lang/crates.io-index)" = "960e29cf7004b3b6e65fc5002981400eb3ccc017a08a2406940823e58e7179a9"
-+"checksum serde_derive 1.0.93 (registry+https://github.com/rust-lang/crates.io-index)" = "c4cce6663696bd38272e90bf34a0267e1226156c33f52d3f3915a2dd5d802085"
-+"checksum serde_json 1.0.39 (registry+https://github.com/rust-lang/crates.io-index)" = "5a23aa71d4a4d43fdbfaac00eff68ba8a06a51759a89ac3304323e800c4dd40d"
-+"checksum syn 0.15.38 (registry+https://github.com/rust-lang/crates.io-index)" = "37ea458a750f59ab679b47fef9b6722c586c5742f4cfe18a120bbc807e5e01fd"
-+"checksum synstructure 0.10.2 (registry+https://github.com/rust-lang/crates.io-index)" = "02353edf96d6e4dc81aea2d8490a7e9db177bf8acb0e951c24940bf866cb313f"
++"checksum serde 1.0.104 (registry+https://github.com/rust-lang/crates.io-index)" = "414115f25f818d7dfccec8ee535d76949ae78584fc4f79a6f45a904bf8ab4449"
++"checksum serde_derive 1.0.104 (registry+https://github.com/rust-lang/crates.io-index)" = "128f9e303a5a29922045a830221b8f78ec74a5f544944f3d5984f8ec3895ef64"
++"checksum serde_json 1.0.44 (registry+https://github.com/rust-lang/crates.io-index)" = "48c575e0cc52bdd09b47f330f646cf59afc586e9c4e3ccd6fc1f625b8ea1dad7"
++"checksum strsim 0.8.0 (registry+https://github.com/rust-lang/crates.io-index)" = "8ea5119cdb4c55b55d432abb513a0429384878c15dde60cc77b1c99de1a95a6a"
++"checksum structopt 0.3.5 (registry+https://github.com/rust-lang/crates.io-index)" = "30b3a3e93f5ad553c38b3301c8a0a0cec829a36783f6a0c467fc4bf553a5f5bf"
++"checksum structopt-derive 0.3.5 (registry+https://github.com/rust-lang/crates.io-index)" = "ea692d40005b3ceba90a9fe7a78fa8d4b82b0ce627eebbffc329aab850f3410e"
++"checksum syn 1.0.11 (registry+https://github.com/rust-lang/crates.io-index)" = "dff0acdb207ae2fe6d5976617f887eb1e35a2ba52c13c7234c790960cdad9238"
++"checksum synstructure 0.12.3 (registry+https://github.com/rust-lang/crates.io-index)" = "67656ea1dc1b41b1451851562ea232ec2e5a80242139f7e679ceccfb5d61f545"
++"checksum textwrap 0.11.0 (registry+https://github.com/rust-lang/crates.io-index)" = "d326610f408c7a4eb6f51c37c330e496b08506c9457c9d34287ecc38809fb060"
+"checksum toml 0.4.10 (registry+https://github.com/rust-lang/crates.io-index)" = "758664fc71a3a69038656bee8b6be6477d2a6c315a6b81f7081f591bffa4111f"
-+"checksum unicode-width 0.1.5 (registry+https://github.com/rust-lang/crates.io-index)" = "882386231c45df4700b275c7ff55b6f3698780a650026380e72dabe76fa46526"
-+"checksum unicode-xid 0.1.0 (registry+https://github.com/rust-lang/crates.io-index)" = "fc72304796d0818e357ead4e000d19c9c174ab23dc11093ac919054d20a6a7fc"
-+"checksum version_check 0.1.5 (registry+https://github.com/rust-lang/crates.io-index)" = "914b1a6776c4c929a602fafd8bc742e06365d4bcbe48c30f9cca5824f70dc9dd"
++"checksum unicode-segmentation 1.6.0 (registry+https://github.com/rust-lang/crates.io-index)" = "e83e153d1053cbb5a118eeff7fd5be06ed99153f00dbcd8ae310c5fb2b22edc0"
++"checksum unicode-width 0.1.7 (registry+https://github.com/rust-lang/crates.io-index)" = "caaa9d531767d1ff2150b9332433f32a24622147e5ebb1f26409d5da67afd479"
++"checksum unicode-xid 0.2.0 (registry+https://github.com/rust-lang/crates.io-index)" = "826e7639553986605ec5979c7dd957c7895e93eabed50ab2ffa7f6128a75097c"
++"checksum vec_map 0.8.1 (registry+https://github.com/rust-lang/crates.io-index)" = "05c78687fb1a80548ae3250346c3db86a80a7cdd77bda190189f2d0a0987c81a"
++"checksum winapi 0.3.8 (registry+https://github.com/rust-lang/crates.io-index)" = "8093091eeb260906a183e6ae1abdba2ef5ef2257a21801128899c3fc699229c6"
++"checksum winapi-i686-pc-windows-gnu 0.4.0 (registry+https://github.com/rust-lang/crates.io-index)" = "ac3b87c63620426dd9b991e5ce0329eff545bccbbb34f3be09ff6fb6ab51b7b6"
++"checksum winapi-x86_64-pc-windows-gnu 0.4.0 (registry+https://github.com/rust-lang/crates.io-index)" = "712e227841d057c1ee1cd2fb22fa7e5a5461ae8e48fa2ca79ec42cfc1931183f"
diff --git a/nixpkgs/pkgs/tools/package-management/cargo-license/default.nix b/nixpkgs/pkgs/tools/package-management/cargo-license/default.nix
index c8a43bda64a..f697c57d3e8 100644
--- a/nixpkgs/pkgs/tools/package-management/cargo-license/default.nix
+++ b/nixpkgs/pkgs/tools/package-management/cargo-license/default.nix
@@ -1,18 +1,18 @@
{ lib, rustPlatform, fetchFromGitHub }:
rustPlatform.buildRustPackage rec {
pname = "cargo-license";
- version = "0.2.0";
+ version = "0.3.0";
src = fetchFromGitHub {
owner = "onur";
repo = "cargo-license";
rev = "v${version}";
- sha256 = "0xxgl9d695ncrxz29125wag285dwxpwc3fym0ixgj5fqbnkbx75g";
+ sha256 = "05a2af84gjyfzhsln0afg16h02pr56jng4xlsg21hicyi1kxjwlf";
};
cargoPatches = [ ./add-Cargo.lock.patch ];
- cargoSha256 = "0jc84v8fxzzyfkcnfr9vrdblw5vdk54nzpch5lcarzfsarncqxw7";
+ cargoSha256 = "0ksxvbrx8d8d09i167mdrhz5m46nbr6l0vyn7xpdanmha31xiaz9";
meta = with lib; {
description = "Cargo subcommand to see license of dependencies";
diff --git a/nixpkgs/pkgs/tools/package-management/cargo-outdated/cargo-lock.patch b/nixpkgs/pkgs/tools/package-management/cargo-outdated/cargo-lock.patch
new file mode 100644
index 00000000000..7e0528eda2a
--- /dev/null
+++ b/nixpkgs/pkgs/tools/package-management/cargo-outdated/cargo-lock.patch
@@ -0,0 +1,1283 @@
+diff --git a/Cargo.lock b/Cargo.lock
+new file mode 100644
+index 0000000..0f18cc6
+--- /dev/null
++++ b/Cargo.lock
+@@ -0,0 +1,1277 @@
++# This file is automatically @generated by Cargo.
++# It is not intended for manual editing.
++[[package]]
++name = "adler32"
++version = "1.0.4"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "5d2e7343e7fc9de883d1b0341e0b13970f764c14101234857d2ddafa1cb1cac2"
++
++[[package]]
++name = "aho-corasick"
++version = "0.7.6"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "58fb5e95d83b38284460a5fda7d6470aa0b8844d283a0b614b8535e880800d2d"
++dependencies = [
++ "memchr",
++]
++
++[[package]]
++name = "ansi_term"
++version = "0.11.0"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "ee49baf6cb617b853aa8d93bf420db2383fab46d314482ca2803b40d5fde979b"
++dependencies = [
++ "winapi",
++]
++
++[[package]]
++name = "atty"
++version = "0.2.13"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "1803c647a3ec87095e7ae7acfca019e98de5ec9a7d01343f611cf3152ed71a90"
++dependencies = [
++ "libc",
++ "winapi",
++]
++
++[[package]]
++name = "autocfg"
++version = "0.1.7"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "1d49d90015b3c36167a20fe2810c5cd875ad504b39cff3d4eae7977e6b7c1cb2"
++
++[[package]]
++name = "backtrace"
++version = "0.3.40"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "924c76597f0d9ca25d762c25a4d369d51267536465dc5064bdf0eb073ed477ea"
++dependencies = [
++ "backtrace-sys",
++ "cfg-if",
++ "libc",
++ "rustc-demangle",
++]
++
++[[package]]
++name = "backtrace-sys"
++version = "0.1.32"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "5d6575f128516de27e3ce99689419835fce9643a9b215a14d2b5b685be018491"
++dependencies = [
++ "cc",
++ "libc",
++]
++
++[[package]]
++name = "bitflags"
++version = "1.2.1"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "cf1de2fe8c75bc145a2f577add951f8134889b4795d47466a54a5c846d691693"
++
++[[package]]
++name = "bstr"
++version = "0.2.8"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "8d6c2c5b58ab920a4f5aeaaca34b4488074e8cc7596af94e6f8c6ff247c60245"
++dependencies = [
++ "memchr",
++]
++
++[[package]]
++name = "bytesize"
++version = "1.0.0"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "716960a18f978640f25101b5cbf1c6f6b0d3192fab36a2d98ca96f0ecbe41010"
++
++[[package]]
++name = "c2-chacha"
++version = "0.2.3"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "214238caa1bf3a496ec3392968969cab8549f96ff30652c9e56885329315f6bb"
++dependencies = [
++ "ppv-lite86",
++]
++
++[[package]]
++name = "cargo"
++version = "0.40.0"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "03504435a39de1303decb9c9a7416e875f16d4b94769d4d0dd5e1bfb21229640"
++dependencies = [
++ "atty",
++ "bytesize",
++ "clap",
++ "core-foundation",
++ "crates-io",
++ "crossbeam-utils",
++ "crypto-hash",
++ "curl",
++ "curl-sys",
++ "env_logger 0.6.2",
++ "failure",
++ "filetime",
++ "flate2",
++ "fs2",
++ "fwdansi",
++ "git2",
++ "git2-curl",
++ "glob",
++ "hex 0.4.0",
++ "home",
++ "humantime",
++ "ignore",
++ "im-rc",
++ "jobserver",
++ "lazy_static",
++ "lazycell",
++ "libc",
++ "libgit2-sys",
++ "log",
++ "memchr",
++ "miow",
++ "num_cpus",
++ "opener",
++ "percent-encoding",
++ "remove_dir_all",
++ "rustc-workspace-hack",
++ "rustfix",
++ "same-file",
++ "semver",
++ "serde",
++ "serde_ignored",
++ "serde_json",
++ "shell-escape",
++ "strip-ansi-escapes",
++ "tar",
++ "tempfile",
++ "termcolor",
++ "toml",
++ "unicode-width",
++ "url",
++ "walkdir",
++ "winapi",
++]
++
++[[package]]
++name = "cargo-outdated"
++version = "0.9.1"
++dependencies = [
++ "cargo",
++ "docopt",
++ "env_logger 0.7.1",
++ "failure",
++ "semver",
++ "serde",
++ "serde_derive",
++ "serde_json",
++ "tabwriter",
++ "tempfile",
++ "termcolor",
++ "toml",
++]
++
++[[package]]
++name = "cc"
++version = "1.0.48"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "f52a465a666ca3d838ebbf08b241383421412fe7ebb463527bba275526d89f76"
++dependencies = [
++ "jobserver",
++ "num_cpus",
++]
++
++[[package]]
++name = "cfg-if"
++version = "0.1.10"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "4785bdd1c96b2a846b2bd7cc02e86b6b3dbf14e7e53446c4f54c92a361040822"
++
++[[package]]
++name = "clap"
++version = "2.33.0"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "5067f5bb2d80ef5d68b4c87db81601f0b75bca627bc2ef76b141d7b846a3c6d9"
++dependencies = [
++ "ansi_term",
++ "atty",
++ "bitflags",
++ "strsim 0.8.0",
++ "textwrap",
++ "unicode-width",
++ "vec_map",
++]
++
++[[package]]
++name = "commoncrypto"
++version = "0.2.0"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "d056a8586ba25a1e4d61cb090900e495952c7886786fc55f909ab2f819b69007"
++dependencies = [
++ "commoncrypto-sys",
++]
++
++[[package]]
++name = "commoncrypto-sys"
++version = "0.2.0"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "1fed34f46747aa73dfaa578069fd8279d2818ade2b55f38f22a9401c7f4083e2"
++dependencies = [
++ "libc",
++]
++
++[[package]]
++name = "core-foundation"
++version = "0.6.4"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "25b9e03f145fd4f2bf705e07b900cd41fc636598fe5dc452fd0db1441c3f496d"
++dependencies = [
++ "core-foundation-sys",
++ "libc",
++]
++
++[[package]]
++name = "core-foundation-sys"
++version = "0.6.2"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "e7ca8a5221364ef15ce201e8ed2f609fc312682a8f4e0e3d4aa5879764e0fa3b"
++
++[[package]]
++name = "crates-io"
++version = "0.28.0"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "9dc57b7035c84bcaaa14d89221491b624a32977c230ce6bb77ae191e880c48e1"
++dependencies = [
++ "curl",
++ "failure",
++ "percent-encoding",
++ "serde",
++ "serde_derive",
++ "serde_json",
++ "url",
++]
++
++[[package]]
++name = "crc32fast"
++version = "1.2.0"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "ba125de2af0df55319f41944744ad91c71113bf74a4646efff39afe1f6842db1"
++dependencies = [
++ "cfg-if",
++]
++
++[[package]]
++name = "crossbeam-channel"
++version = "0.3.9"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "c8ec7fcd21571dc78f96cc96243cab8d8f035247c3efd16c687be154c3fa9efa"
++dependencies = [
++ "crossbeam-utils",
++]
++
++[[package]]
++name = "crossbeam-utils"
++version = "0.6.6"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "04973fa96e96579258a5091af6003abde64af786b860f18622b82e026cca60e6"
++dependencies = [
++ "cfg-if",
++ "lazy_static",
++]
++
++[[package]]
++name = "crypto-hash"
++version = "0.3.4"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "8a77162240fd97248d19a564a565eb563a3f592b386e4136fb300909e67dddca"
++dependencies = [
++ "commoncrypto",
++ "hex 0.3.2",
++ "openssl",
++ "winapi",
++]
++
++[[package]]
++name = "curl"
++version = "0.4.25"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "06aa71e9208a54def20792d877bc663d6aae0732b9852e612c4a933177c31283"
++dependencies = [
++ "curl-sys",
++ "libc",
++ "openssl-probe",
++ "openssl-sys",
++ "schannel",
++ "socket2",
++ "winapi",
++]
++
++[[package]]
++name = "curl-sys"
++version = "0.4.24"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "f659f3ffac9582d6177bb86d1d2aa649f4eb9d0d4de9d03ccc08b402832ea340"
++dependencies = [
++ "cc",
++ "libc",
++ "libnghttp2-sys",
++ "libz-sys",
++ "openssl-sys",
++ "pkg-config",
++ "vcpkg",
++ "winapi",
++]
++
++[[package]]
++name = "docopt"
++version = "1.1.0"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "7f525a586d310c87df72ebcd98009e57f1cc030c8c268305287a476beb653969"
++dependencies = [
++ "lazy_static",
++ "regex",
++ "serde",
++ "strsim 0.9.3",
++]
++
++[[package]]
++name = "env_logger"
++version = "0.6.2"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "aafcde04e90a5226a6443b7aabdb016ba2f8307c847d524724bd9b346dd1a2d3"
++dependencies = [
++ "atty",
++ "humantime",
++ "log",
++ "regex",
++ "termcolor",
++]
++
++[[package]]
++name = "env_logger"
++version = "0.7.1"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "44533bbbb3bb3c1fa17d9f2e4e38bbbaf8396ba82193c4cb1b6445d711445d36"
++dependencies = [
++ "atty",
++ "humantime",
++ "log",
++ "regex",
++ "termcolor",
++]
++
++[[package]]
++name = "failure"
++version = "0.1.6"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "f8273f13c977665c5db7eb2b99ae520952fe5ac831ae4cd09d80c4c7042b5ed9"
++dependencies = [
++ "backtrace",
++ "failure_derive",
++]
++
++[[package]]
++name = "failure_derive"
++version = "0.1.6"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "0bc225b78e0391e4b8683440bf2e63c2deeeb2ce5189eab46e2b68c6d3725d08"
++dependencies = [
++ "proc-macro2",
++ "quote",
++ "syn",
++ "synstructure",
++]
++
++[[package]]
++name = "filetime"
++version = "0.2.8"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "1ff6d4dab0aa0c8e6346d46052e93b13a16cf847b54ed357087c35011048cc7d"
++dependencies = [
++ "cfg-if",
++ "libc",
++ "redox_syscall",
++ "winapi",
++]
++
++[[package]]
++name = "flate2"
++version = "1.0.13"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "6bd6d6f4752952feb71363cffc9ebac9411b75b87c6ab6058c40c8900cf43c0f"
++dependencies = [
++ "cfg-if",
++ "crc32fast",
++ "libc",
++ "libz-sys",
++ "miniz_oxide",
++]
++
++[[package]]
++name = "fnv"
++version = "1.0.6"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "2fad85553e09a6f881f739c29f0b00b0f01357c743266d478b68951ce23285f3"
++
++[[package]]
++name = "foreign-types"
++version = "0.3.2"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "f6f339eb8adc052cd2ca78910fda869aefa38d22d5cb648e6485e4d3fc06f3b1"
++dependencies = [
++ "foreign-types-shared",
++]
++
++[[package]]
++name = "foreign-types-shared"
++version = "0.1.1"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "00b0228411908ca8685dba7fc2cdd70ec9990a6e753e89b6ac91a84c40fbaf4b"
++
++[[package]]
++name = "fs2"
++version = "0.4.3"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "9564fc758e15025b46aa6643b1b77d047d1a56a1aea6e01002ac0c7026876213"
++dependencies = [
++ "libc",
++ "winapi",
++]
++
++[[package]]
++name = "fwdansi"
++version = "1.1.0"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "08c1f5787fe85505d1f7777268db5103d80a7a374d2316a7ce262e57baf8f208"
++dependencies = [
++ "memchr",
++ "termcolor",
++]
++
++[[package]]
++name = "getrandom"
++version = "0.1.13"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "e7db7ca94ed4cd01190ceee0d8a8052f08a247aa1b469a7f68c6a3b71afcf407"
++dependencies = [
++ "cfg-if",
++ "libc",
++ "wasi",
++]
++
++[[package]]
++name = "git2"
++version = "0.10.2"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "7c1af51ea8a906616af45a4ce78eacf25860f7a13ae7bf8a814693f0f4037a26"
++dependencies = [
++ "bitflags",
++ "libc",
++ "libgit2-sys",
++ "log",
++ "openssl-probe",
++ "openssl-sys",
++ "url",
++]
++
++[[package]]
++name = "git2-curl"
++version = "0.11.0"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "cd6527e480187ce19aaf4fa6acfb7657b25628ce31cb8ffabdfca3bf731524c5"
++dependencies = [
++ "curl",
++ "git2",
++ "log",
++ "url",
++]
++
++[[package]]
++name = "glob"
++version = "0.3.0"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "9b919933a397b79c37e33b77bb2aa3dc8eb6e165ad809e58ff75bc7db2e34574"
++
++[[package]]
++name = "globset"
++version = "0.4.4"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "925aa2cac82d8834e2b2a4415b6f6879757fb5c0928fc445ae76461a12eed8f2"
++dependencies = [
++ "aho-corasick",
++ "bstr",
++ "fnv",
++ "log",
++ "regex",
++]
++
++[[package]]
++name = "hermit-abi"
++version = "0.1.3"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "307c3c9f937f38e3534b1d6447ecf090cafcc9744e4a6360e8b037b2cf5af120"
++dependencies = [
++ "libc",
++]
++
++[[package]]
++name = "hex"
++version = "0.3.2"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "805026a5d0141ffc30abb3be3173848ad46a1b1664fe632428479619a3644d77"
++
++[[package]]
++name = "hex"
++version = "0.4.0"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "023b39be39e3a2da62a94feb433e91e8bcd37676fbc8bea371daf52b7a769a3e"
++
++[[package]]
++name = "home"
++version = "0.5.1"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "a3753954f7bd71f0e671afb8b5a992d1724cf43b7f95a563cd4a0bde94659ca8"
++dependencies = [
++ "scopeguard",
++ "winapi",
++]
++
++[[package]]
++name = "humantime"
++version = "1.3.0"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "df004cfca50ef23c36850aaaa59ad52cc70d0e90243c3c7737a4dd32dc7a3c4f"
++dependencies = [
++ "quick-error",
++]
++
++[[package]]
++name = "idna"
++version = "0.2.0"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "02e2673c30ee86b5b96a9cb52ad15718aa1f966f5ab9ad54a8b95d5ca33120a9"
++dependencies = [
++ "matches",
++ "unicode-bidi",
++ "unicode-normalization",
++]
++
++[[package]]
++name = "ignore"
++version = "0.4.10"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "0ec16832258409d571aaef8273f3c3cc5b060d784e159d1a0f3b0017308f84a7"
++dependencies = [
++ "crossbeam-channel",
++ "globset",
++ "lazy_static",
++ "log",
++ "memchr",
++ "regex",
++ "same-file",
++ "thread_local",
++ "walkdir",
++ "winapi-util",
++]
++
++[[package]]
++name = "im-rc"
++version = "13.0.0"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "0a0197597d095c0d11107975d3175173f810ee572c2501ff4de64f4f3f119806"
++dependencies = [
++ "rustc_version",
++ "sized-chunks",
++ "typenum",
++]
++
++[[package]]
++name = "itoa"
++version = "0.4.4"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "501266b7edd0174f8530248f87f99c88fbe60ca4ef3dd486835b8d8d53136f7f"
++
++[[package]]
++name = "jobserver"
++version = "0.1.17"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "f2b1d42ef453b30b7387e113da1c83ab1605d90c5b4e0eb8e96d016ed3b8c160"
++dependencies = [
++ "getrandom",
++ "libc",
++ "log",
++]
++
++[[package]]
++name = "lazy_static"
++version = "1.4.0"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "e2abad23fbc42b3700f2f279844dc832adb2b2eb069b2df918f455c4e18cc646"
++
++[[package]]
++name = "lazycell"
++version = "1.2.1"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "b294d6fa9ee409a054354afc4352b0b9ef7ca222c69b8812cbea9e7d2bf3783f"
++
++[[package]]
++name = "libc"
++version = "0.2.66"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "d515b1f41455adea1313a4a2ac8a8a477634fbae63cc6100e3aebb207ce61558"
++
++[[package]]
++name = "libgit2-sys"
++version = "0.9.2"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "4870c781f6063efb83150cd22c1ddf6ecf58531419e7570cdcced46970f64a16"
++dependencies = [
++ "cc",
++ "libc",
++ "libssh2-sys",
++ "libz-sys",
++ "openssl-sys",
++ "pkg-config",
++]
++
++[[package]]
++name = "libnghttp2-sys"
++version = "0.1.2"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "02254d44f4435dd79e695f2c2b83cd06a47919adea30216ceaf0c57ca0a72463"
++dependencies = [
++ "cc",
++ "libc",
++]
++
++[[package]]
++name = "libssh2-sys"
++version = "0.2.13"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "5fcd5a428a31cbbfe059812d74f4b6cd3b9b7426c2bdaec56993c5365da1c328"
++dependencies = [
++ "cc",
++ "libc",
++ "libz-sys",
++ "openssl-sys",
++ "pkg-config",
++ "vcpkg",
++]
++
++[[package]]
++name = "libz-sys"
++version = "1.0.25"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "2eb5e43362e38e2bca2fd5f5134c4d4564a23a5c28e9b95411652021a8675ebe"
++dependencies = [
++ "cc",
++ "libc",
++ "pkg-config",
++ "vcpkg",
++]
++
++[[package]]
++name = "log"
++version = "0.4.8"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "14b6052be84e6b71ab17edffc2eeabf5c2c3ae1fdb464aae35ac50c67a44e1f7"
++dependencies = [
++ "cfg-if",
++]
++
++[[package]]
++name = "matches"
++version = "0.1.8"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "7ffc5c5338469d4d3ea17d269fa8ea3512ad247247c30bd2df69e68309ed0a08"
++
++[[package]]
++name = "memchr"
++version = "2.2.1"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "88579771288728879b57485cc7d6b07d648c9f0141eb955f8ab7f9d45394468e"
++
++[[package]]
++name = "miniz_oxide"
++version = "0.3.5"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "6f3f74f726ae935c3f514300cc6773a0c9492abc5e972d42ba0c0ebb88757625"
++dependencies = [
++ "adler32",
++]
++
++[[package]]
++name = "miow"
++version = "0.3.3"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "396aa0f2003d7df8395cb93e09871561ccc3e785f0acb369170e8cc74ddf9226"
++dependencies = [
++ "socket2",
++ "winapi",
++]
++
++[[package]]
++name = "num_cpus"
++version = "1.11.1"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "76dac5ed2a876980778b8b85f75a71b6cbf0db0b1232ee12f826bccb00d09d72"
++dependencies = [
++ "hermit-abi",
++ "libc",
++]
++
++[[package]]
++name = "opener"
++version = "0.4.1"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "13117407ca9d0caf3a0e74f97b490a7e64c0ae3aa90a8b7085544d0c37b6f3ae"
++dependencies = [
++ "winapi",
++]
++
++[[package]]
++name = "openssl"
++version = "0.10.26"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "3a3cc5799d98e1088141b8e01ff760112bbd9f19d850c124500566ca6901a585"
++dependencies = [
++ "bitflags",
++ "cfg-if",
++ "foreign-types",
++ "lazy_static",
++ "libc",
++ "openssl-sys",
++]
++
++[[package]]
++name = "openssl-probe"
++version = "0.1.2"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "77af24da69f9d9341038eba93a073b1fdaaa1b788221b00a69bce9e762cb32de"
++
++[[package]]
++name = "openssl-sys"
++version = "0.9.53"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "465d16ae7fc0e313318f7de5cecf57b2fbe7511fd213978b457e1c96ff46736f"
++dependencies = [
++ "autocfg",
++ "cc",
++ "libc",
++ "pkg-config",
++ "vcpkg",
++]
++
++[[package]]
++name = "percent-encoding"
++version = "2.1.0"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "d4fd5641d01c8f18a23da7b6fe29298ff4b55afcccdf78973b24cf3175fee32e"
++
++[[package]]
++name = "pkg-config"
++version = "0.3.17"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "05da548ad6865900e60eaba7f589cc0783590a92e940c26953ff81ddbab2d677"
++
++[[package]]
++name = "ppv-lite86"
++version = "0.2.6"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "74490b50b9fbe561ac330df47c08f3f33073d2d00c150f719147d7c54522fa1b"
++
++[[package]]
++name = "proc-macro2"
++version = "1.0.6"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "9c9e470a8dc4aeae2dee2f335e8f533e2d4b347e1434e5671afc49b054592f27"
++dependencies = [
++ "unicode-xid",
++]
++
++[[package]]
++name = "quick-error"
++version = "1.2.2"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "9274b940887ce9addde99c4eee6b5c44cc494b182b97e73dc8ffdcb3397fd3f0"
++
++[[package]]
++name = "quote"
++version = "1.0.2"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "053a8c8bcc71fcce321828dc897a98ab9760bef03a4fc36693c231e5b3216cfe"
++dependencies = [
++ "proc-macro2",
++]
++
++[[package]]
++name = "rand"
++version = "0.7.2"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "3ae1b169243eaf61759b8475a998f0a385e42042370f3a7dbaf35246eacc8412"
++dependencies = [
++ "getrandom",
++ "libc",
++ "rand_chacha",
++ "rand_core",
++ "rand_hc",
++]
++
++[[package]]
++name = "rand_chacha"
++version = "0.2.1"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "03a2a90da8c7523f554344f921aa97283eadf6ac484a6d2a7d0212fa7f8d6853"
++dependencies = [
++ "c2-chacha",
++ "rand_core",
++]
++
++[[package]]
++name = "rand_core"
++version = "0.5.1"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "90bde5296fc891b0cef12a6d03ddccc162ce7b2aff54160af9338f8d40df6d19"
++dependencies = [
++ "getrandom",
++]
++
++[[package]]
++name = "rand_hc"
++version = "0.2.0"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "ca3129af7b92a17112d59ad498c6f81eaf463253766b90396d39ea7a39d6613c"
++dependencies = [
++ "rand_core",
++]
++
++[[package]]
++name = "redox_syscall"
++version = "0.1.56"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "2439c63f3f6139d1b57529d16bc3b8bb855230c8efcc5d3a896c8bea7c3b1e84"
++
++[[package]]
++name = "regex"
++version = "1.3.1"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "dc220bd33bdce8f093101afe22a037b8eb0e5af33592e6a9caafff0d4cb81cbd"
++dependencies = [
++ "aho-corasick",
++ "memchr",
++ "regex-syntax",
++ "thread_local",
++]
++
++[[package]]
++name = "regex-syntax"
++version = "0.6.12"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "11a7e20d1cce64ef2fed88b66d347f88bd9babb82845b2b858f3edbf59a4f716"
++
++[[package]]
++name = "remove_dir_all"
++version = "0.5.2"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "4a83fa3702a688b9359eccba92d153ac33fd2e8462f9e0e3fdf155239ea7792e"
++dependencies = [
++ "winapi",
++]
++
++[[package]]
++name = "rustc-demangle"
++version = "0.1.16"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "4c691c0e608126e00913e33f0ccf3727d5fc84573623b8d65b2df340b5201783"
++
++[[package]]
++name = "rustc-workspace-hack"
++version = "1.0.0"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "fc71d2faa173b74b232dedc235e3ee1696581bb132fc116fa3626d6151a1a8fb"
++
++[[package]]
++name = "rustc_version"
++version = "0.2.3"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "138e3e0acb6c9fb258b19b67cb8abd63c00679d2851805ea151465464fe9030a"
++dependencies = [
++ "semver",
++]
++
++[[package]]
++name = "rustfix"
++version = "0.4.6"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "7150ac777a2931a53489f5a41eb0937b84e3092a20cd0e73ad436b65b507f607"
++dependencies = [
++ "failure",
++ "log",
++ "serde",
++ "serde_json",
++]
++
++[[package]]
++name = "ryu"
++version = "1.0.2"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "bfa8506c1de11c9c4e4c38863ccbe02a305c8188e85a05a784c9e11e1c3910c8"
++
++[[package]]
++name = "same-file"
++version = "1.0.5"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "585e8ddcedc187886a30fa705c47985c3fa88d06624095856b36ca0b82ff4421"
++dependencies = [
++ "winapi-util",
++]
++
++[[package]]
++name = "schannel"
++version = "0.1.16"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "87f550b06b6cba9c8b8be3ee73f391990116bf527450d2556e9b9ce263b9a021"
++dependencies = [
++ "lazy_static",
++ "winapi",
++]
++
++[[package]]
++name = "scopeguard"
++version = "1.0.0"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "b42e15e59b18a828bbf5c58ea01debb36b9b096346de35d941dcb89009f24a0d"
++
++[[package]]
++name = "semver"
++version = "0.9.0"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "1d7eb9ef2c18661902cc47e535f9bc51b78acd254da71d375c2f6720d9a40403"
++dependencies = [
++ "semver-parser",
++ "serde",
++]
++
++[[package]]
++name = "semver-parser"
++version = "0.7.0"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "388a1df253eca08550bef6c72392cfe7c30914bf41df5269b68cbd6ff8f570a3"
++
++[[package]]
++name = "serde"
++version = "1.0.103"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "1217f97ab8e8904b57dd22eb61cde455fa7446a9c1cf43966066da047c1f3702"
++dependencies = [
++ "serde_derive",
++]
++
++[[package]]
++name = "serde_derive"
++version = "1.0.103"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "a8c6faef9a2e64b0064f48570289b4bf8823b7581f1d6157c1b52152306651d0"
++dependencies = [
++ "proc-macro2",
++ "quote",
++ "syn",
++]
++
++[[package]]
++name = "serde_ignored"
++version = "0.1.1"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "7248fdcbd17d3f2604fc2a02d0ecc844d9a7bf52bf95fc196d9f0a38f6da6a0e"
++dependencies = [
++ "serde",
++]
++
++[[package]]
++name = "serde_json"
++version = "1.0.44"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "48c575e0cc52bdd09b47f330f646cf59afc586e9c4e3ccd6fc1f625b8ea1dad7"
++dependencies = [
++ "itoa",
++ "ryu",
++ "serde",
++]
++
++[[package]]
++name = "shell-escape"
++version = "0.1.4"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "170a13e64f2a51b77a45702ba77287f5c6829375b04a69cf2222acd17d0cfab9"
++
++[[package]]
++name = "sized-chunks"
++version = "0.3.1"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "f01db57d7ee89c8e053245deb77040a6cc8508311f381c88749c33d4b9b78785"
++dependencies = [
++ "typenum",
++]
++
++[[package]]
++name = "smallvec"
++version = "1.0.0"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "4ecf3b85f68e8abaa7555aa5abdb1153079387e60b718283d732f03897fcfc86"
++
++[[package]]
++name = "socket2"
++version = "0.3.11"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "e8b74de517221a2cb01a53349cf54182acdc31a074727d3079068448c0676d85"
++dependencies = [
++ "cfg-if",
++ "libc",
++ "redox_syscall",
++ "winapi",
++]
++
++[[package]]
++name = "strip-ansi-escapes"
++version = "0.1.0"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "9d63676e2abafa709460982ddc02a3bb586b6d15a49b75c212e06edd3933acee"
++dependencies = [
++ "vte",
++]
++
++[[package]]
++name = "strsim"
++version = "0.8.0"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "8ea5119cdb4c55b55d432abb513a0429384878c15dde60cc77b1c99de1a95a6a"
++
++[[package]]
++name = "strsim"
++version = "0.9.3"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "6446ced80d6c486436db5c078dde11a9f73d42b57fb273121e160b84f63d894c"
++
++[[package]]
++name = "syn"
++version = "1.0.11"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "dff0acdb207ae2fe6d5976617f887eb1e35a2ba52c13c7234c790960cdad9238"
++dependencies = [
++ "proc-macro2",
++ "quote",
++ "unicode-xid",
++]
++
++[[package]]
++name = "synstructure"
++version = "0.12.3"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "67656ea1dc1b41b1451851562ea232ec2e5a80242139f7e679ceccfb5d61f545"
++dependencies = [
++ "proc-macro2",
++ "quote",
++ "syn",
++ "unicode-xid",
++]
++
++[[package]]
++name = "tabwriter"
++version = "1.1.0"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "9128e3a9149e51494cad59712a286e149fcb74e443d2298d69bd6eaa42cc4ebb"
++dependencies = [
++ "unicode-width",
++]
++
++[[package]]
++name = "tar"
++version = "0.4.26"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "b3196bfbffbba3e57481b6ea32249fbaf590396a52505a2615adbb79d9d826d3"
++dependencies = [
++ "filetime",
++ "libc",
++ "redox_syscall",
++]
++
++[[package]]
++name = "tempfile"
++version = "3.1.0"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "7a6e24d9338a0a5be79593e2fa15a648add6138caa803e2d5bc782c371732ca9"
++dependencies = [
++ "cfg-if",
++ "libc",
++ "rand",
++ "redox_syscall",
++ "remove_dir_all",
++ "winapi",
++]
++
++[[package]]
++name = "termcolor"
++version = "1.0.5"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "96d6098003bde162e4277c70665bd87c326f5a0c3f3fbfb285787fa482d54e6e"
++dependencies = [
++ "wincolor",
++]
++
++[[package]]
++name = "textwrap"
++version = "0.11.0"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "d326610f408c7a4eb6f51c37c330e496b08506c9457c9d34287ecc38809fb060"
++dependencies = [
++ "unicode-width",
++]
++
++[[package]]
++name = "thread_local"
++version = "0.3.6"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "c6b53e329000edc2b34dbe8545fd20e55a333362d0a321909685a19bd28c3f1b"
++dependencies = [
++ "lazy_static",
++]
++
++[[package]]
++name = "toml"
++version = "0.5.5"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "01d1404644c8b12b16bfcffa4322403a91a451584daaaa7c28d3152e6cbc98cf"
++dependencies = [
++ "serde",
++]
++
++[[package]]
++name = "typenum"
++version = "1.11.2"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "6d2783fe2d6b8c1101136184eb41be8b1ad379e4657050b8aaff0c79ee7575f9"
++
++[[package]]
++name = "unicode-bidi"
++version = "0.3.4"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "49f2bd0c6468a8230e1db229cff8029217cf623c767ea5d60bfbd42729ea54d5"
++dependencies = [
++ "matches",
++]
++
++[[package]]
++name = "unicode-normalization"
++version = "0.1.11"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "b561e267b2326bb4cebfc0ef9e68355c7abe6c6f522aeac2f5bf95d56c59bdcf"
++dependencies = [
++ "smallvec",
++]
++
++[[package]]
++name = "unicode-width"
++version = "0.1.7"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "caaa9d531767d1ff2150b9332433f32a24622147e5ebb1f26409d5da67afd479"
++
++[[package]]
++name = "unicode-xid"
++version = "0.2.0"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "826e7639553986605ec5979c7dd957c7895e93eabed50ab2ffa7f6128a75097c"
++
++[[package]]
++name = "url"
++version = "2.1.0"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "75b414f6c464c879d7f9babf951f23bc3743fb7313c081b2e6ca719067ea9d61"
++dependencies = [
++ "idna",
++ "matches",
++ "percent-encoding",
++]
++
++[[package]]
++name = "utf8parse"
++version = "0.1.1"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "8772a4ccbb4e89959023bc5b7cb8623a795caa7092d99f3aa9501b9484d4557d"
++
++[[package]]
++name = "vcpkg"
++version = "0.2.8"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "3fc439f2794e98976c88a2a2dafce96b930fe8010b0a256b3c2199a773933168"
++
++[[package]]
++name = "vec_map"
++version = "0.8.1"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "05c78687fb1a80548ae3250346c3db86a80a7cdd77bda190189f2d0a0987c81a"
++
++[[package]]
++name = "vte"
++version = "0.3.3"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "4f42f536e22f7fcbb407639765c8fd78707a33109301f834a594758bedd6e8cf"
++dependencies = [
++ "utf8parse",
++]
++
++[[package]]
++name = "walkdir"
++version = "2.2.9"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "9658c94fa8b940eab2250bd5a457f9c48b748420d71293b165c8cdbe2f55f71e"
++dependencies = [
++ "same-file",
++ "winapi",
++ "winapi-util",
++]
++
++[[package]]
++name = "wasi"
++version = "0.7.0"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "b89c3ce4ce14bdc6fb6beaf9ec7928ca331de5df7e5ea278375642a2f478570d"
++
++[[package]]
++name = "winapi"
++version = "0.3.8"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "8093091eeb260906a183e6ae1abdba2ef5ef2257a21801128899c3fc699229c6"
++dependencies = [
++ "winapi-i686-pc-windows-gnu",
++ "winapi-x86_64-pc-windows-gnu",
++]
++
++[[package]]
++name = "winapi-i686-pc-windows-gnu"
++version = "0.4.0"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "ac3b87c63620426dd9b991e5ce0329eff545bccbbb34f3be09ff6fb6ab51b7b6"
++
++[[package]]
++name = "winapi-util"
++version = "0.1.2"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "7168bab6e1daee33b4557efd0e95d5ca70a03706d39fa5f3fe7a236f584b03c9"
++dependencies = [
++ "winapi",
++]
++
++[[package]]
++name = "winapi-x86_64-pc-windows-gnu"
++version = "0.4.0"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "712e227841d057c1ee1cd2fb22fa7e5a5461ae8e48fa2ca79ec42cfc1931183f"
++
++[[package]]
++name = "wincolor"
++version = "1.0.2"
++source = "registry+https://github.com/rust-lang/crates.io-index"
++checksum = "96f5016b18804d24db43cebf3c77269e7569b8954a8464501c216cc5e070eaa9"
++dependencies = [
++ "winapi",
++ "winapi-util",
++]
diff --git a/nixpkgs/pkgs/tools/package-management/cargo-outdated/default.nix b/nixpkgs/pkgs/tools/package-management/cargo-outdated/default.nix
index 71567df9403..7d684d943b9 100644
--- a/nixpkgs/pkgs/tools/package-management/cargo-outdated/default.nix
+++ b/nixpkgs/pkgs/tools/package-management/cargo-outdated/default.nix
@@ -2,16 +2,17 @@
rustPlatform.buildRustPackage rec {
pname = "cargo-outdated";
- version = "unstable-2019-04-13";
+ version = "0.9.1";
src = fetchFromGitHub {
owner = "kbknapp";
repo = pname;
- rev = "ce4b6baddc94b77a155abbb5a4fa4d3b31a45598";
- sha256 = "0x00vn0ldnm2hvndfmq4g4q5w6axyg9vsri3i5zxhmir7423xabp";
+ rev = "v${version}";
+ sha256 = "02gsarwm4gjkr9m4sfbjwp37xmqhch8qpyy027bxqkg8iyipxm69";
};
- cargoSha256 = "1xqii2z0asgkwn1ny9n19w7d4sjz12a6i55x2pf4cfrciapdpvdl";
+ cargoPatches = [ ./cargo-lock.patch ];
+ cargoSha256 = "1ywmrvkwwwwh99l4j8vc4cyk8qjd0jx8hn68yr2h31ya1bzcqbd1";
nativeBuildInputs = [ pkgconfig ];
buildInputs = [ openssl ]
@@ -26,6 +27,6 @@ rustPlatform.buildRustPackage rec {
homepage = https://github.com/kbknapp/cargo-outdated;
license = with licenses; [ asl20 /* or */ mit ];
platforms = platforms.all;
- maintainers = [ maintainers.sondr3 ];
+ maintainers = with maintainers; [ sondr3 ivan ];
};
}
diff --git a/nixpkgs/pkgs/tools/package-management/cargo-outdated/update-cargo-lock.sh b/nixpkgs/pkgs/tools/package-management/cargo-outdated/update-cargo-lock.sh
new file mode 100755
index 00000000000..21ee27c59b7
--- /dev/null
+++ b/nixpkgs/pkgs/tools/package-management/cargo-outdated/update-cargo-lock.sh
@@ -0,0 +1,18 @@
+#!/bin/sh
+
+# This updates cargo-lock.patch for the cargo-outdated version listed in default.nix.
+
+set -eu -o verbose
+
+here=$PWD
+version=$(cat default.nix | grep '^ version = "' | cut -d '"' -f 2)
+checkout=$(mktemp -d)
+git clone -b "v$version" --depth=1 https://github.com/kbknapp/cargo-outdated "$checkout"
+cd "$checkout"
+
+cargo generate-lockfile
+git add -f Cargo.lock
+git diff HEAD -- Cargo.lock > "$here"/cargo-lock.patch
+
+cd "$here"
+rm -rf "$checkout"
diff --git a/nixpkgs/pkgs/tools/package-management/cargo-release/default.nix b/nixpkgs/pkgs/tools/package-management/cargo-release/default.nix
index eb3977e84e6..3e3ba47be05 100644
--- a/nixpkgs/pkgs/tools/package-management/cargo-release/default.nix
+++ b/nixpkgs/pkgs/tools/package-management/cargo-release/default.nix
@@ -1,19 +1,20 @@
-{ stdenv, rustPlatform, fetchFromGitHub, Security }:
+{ stdenv, rustPlatform, fetchFromGitHub, Security, openssl, pkg-config }:
rustPlatform.buildRustPackage rec {
pname = "cargo-release";
- version = "0.12.4";
+ version = "0.13.0";
src = fetchFromGitHub {
owner = "sunng87";
repo = "cargo-release";
rev = "v${version}";
- sha256 = "02rx25dd3klprwr1qmn5vn4vz4244amk2ky4nqfmi4vq3ygrhd1c";
+ sha256 = "1w9w43i5br94vg5m4idabh67p4ffsx2lmc2g0ak2k961vl46wr0q";
};
- cargoSha256 = "18nbmq8j58jlka1lsrx2y0bhb9l5f3wyvcr1zmmda3hvc3vm7kla";
+ cargoSha256 = "075fvvd4c8f3kz6i6ny835h6jpa3c1v3miwfwwrdyy49a85lzjyj";
- buildInputs = stdenv.lib.optional stdenv.isDarwin Security;
+ nativeBuildInputs = [ pkg-config ];
+ buildInputs = [ openssl ] ++ stdenv.lib.optional stdenv.isDarwin Security;
meta = with stdenv.lib; {
description = ''Cargo subcommand "release": everything about releasing a rust crate'';
diff --git a/nixpkgs/pkgs/tools/package-management/cargo-tree/default.nix b/nixpkgs/pkgs/tools/package-management/cargo-tree/default.nix
index 8c3035ae79a..add08c50fcc 100644
--- a/nixpkgs/pkgs/tools/package-management/cargo-tree/default.nix
+++ b/nixpkgs/pkgs/tools/package-management/cargo-tree/default.nix
@@ -1,17 +1,16 @@
{ stdenv, lib, rustPlatform, fetchFromGitHub, pkgconfig, cmake, curl, libiconv, darwin }:
rustPlatform.buildRustPackage rec {
pname = "cargo-tree";
- version = "0.26.0";
+ version = "0.27.0";
src = fetchFromGitHub {
owner = "sfackler";
repo = "cargo-tree";
- rev = "v${version}";
-
- sha256 = "12z0sa7g79x46q2ybpy6i9rf1x4cnwajw8dsjzra2qhssyp8rp9c";
+ rev = "37030742fbf83106707525913ab6c4c3c701cd0e";
+ sha256 = "1mi52n02j9dmi19af6js0vmmqnl8rf4zxind3cxh401530cd8ml4";
};
- cargoSha256 = "0ibmgyiqa53m9xfvl726w1sq37lbdp7vzyc76gwcp1zvzkcv2860";
+ cargoSha256 = "12p9dqlxa1b1sx8572w7hj0rlkkpv3k440pffdyjgyx4s1r9m0s0";
nativeBuildInputs = [ pkgconfig cmake ];
buildInputs = [ curl ] ++ lib.optionals stdenv.isDarwin [ libiconv darwin.apple_sdk.frameworks.Security ];
@@ -20,5 +19,6 @@ rustPlatform.buildRustPackage rec {
description = "A cargo subcommand that visualizes a crate's dependency graph in a tree-like format";
license = with licenses; [ asl20 mit ];
maintainers = with maintainers; [ jD91mZM2 ];
+ homepage = "https://crates.io/crates/cargo-tree";
};
}
diff --git a/nixpkgs/pkgs/tools/package-management/clib/default.nix b/nixpkgs/pkgs/tools/package-management/clib/default.nix
index eb8f5ef186f..75c47dda0c4 100644
--- a/nixpkgs/pkgs/tools/package-management/clib/default.nix
+++ b/nixpkgs/pkgs/tools/package-management/clib/default.nix
@@ -13,7 +13,7 @@ stdenv.mkDerivation rec {
hardeningDisable = [ "fortify" ];
- makeFlags = "PREFIX=$(out)";
+ makeFlags = [ "PREFIX=$(out)" ];
buildInputs = [ curl ];
diff --git a/nixpkgs/pkgs/tools/package-management/disnix/default.nix b/nixpkgs/pkgs/tools/package-management/disnix/default.nix
index c9223c9af15..2c5bc41e18d 100644
--- a/nixpkgs/pkgs/tools/package-management/disnix/default.nix
+++ b/nixpkgs/pkgs/tools/package-management/disnix/default.nix
@@ -1,11 +1,11 @@
{ stdenv, fetchurl, pkgconfig, glib, libxml2, libxslt, getopt, nixUnstable, dysnomia, libintl, libiconv }:
stdenv.mkDerivation {
- name = "disnix-0.9";
+ name = "disnix-0.9.1";
src = fetchurl {
- url = https://github.com/svanderburg/disnix/releases/download/disnix-0.9/disnix-0.9.tar.gz;
- sha256 = "1kc4520zjc1z72mknylfvrsyda9rbmm5c9mw8w13zhdwg3zbna06";
+ url = https://github.com/svanderburg/disnix/releases/download/disnix-0.9.1/disnix-0.9.1.tar.gz;
+ sha256 = "0bidln5xw3raqkvdks9aipis8aaza8asgyapmilnxkkrxgmw7rdf";
};
configureFlags = [
diff --git a/nixpkgs/pkgs/tools/package-management/emplace/default.nix b/nixpkgs/pkgs/tools/package-management/emplace/default.nix
new file mode 100644
index 00000000000..bb361fd97c3
--- /dev/null
+++ b/nixpkgs/pkgs/tools/package-management/emplace/default.nix
@@ -0,0 +1,23 @@
+{ lib, rustPlatform, fetchFromGitHub }:
+
+rustPlatform.buildRustPackage rec {
+ pname = "emplace";
+ version = "0.2.10";
+
+ src = fetchFromGitHub {
+ owner = "tversteeg";
+ repo = pname;
+ rev = "v${version}";
+ sha256 = "1y77cla6bgy8pjb21cawx7cb69hhri4r7gyjkhnjyiixkh945mwj";
+ };
+
+ cargoSha256 = "119llsc8m7qda2cjnd45ndml148z8074f76xygkz6fp3m1c2z3pw";
+
+ meta = with lib; {
+ description = "Mirror installed software on multiple machines";
+ homepage = "https://github.com/tversteeg/emplace";
+ license = licenses.agpl3;
+ maintainers = with maintainers; [ filalex77 ];
+ platforms = platforms.all;
+ };
+}
diff --git a/nixpkgs/pkgs/tools/package-management/home-manager/default.nix b/nixpkgs/pkgs/tools/package-management/home-manager/default.nix
index f093f442e52..21b2fad1caa 100644
--- a/nixpkgs/pkgs/tools/package-management/home-manager/default.nix
+++ b/nixpkgs/pkgs/tools/package-management/home-manager/default.nix
@@ -6,13 +6,13 @@
stdenv.mkDerivation rec {
pname = "home-manager";
- version = "2019-11-17";
+ version = "2020-01-04";
src = fetchFromGitHub {
owner = "rycee";
repo = "home-manager";
- rev = "286dd9b3088298e5a4625b517f8e72b1c62e4f74";
- sha256 = "0p3ba287h9a7mpj8chdgvz5qryc15qxdis3fdmv9jvl0hwsr738d";
+ rev = "1b7b1bc294e99ab1795fe7dad183c1d2ae58a099";
+ sha256 = "02kwym8n41d5ba9lccnl5q3y10sw35p1da5b66mxldfr6d930pbj";
};
nativeBuildInputs = [ makeWrapper ];
diff --git a/nixpkgs/pkgs/tools/package-management/librepo/default.nix b/nixpkgs/pkgs/tools/package-management/librepo/default.nix
index 0c53c1bbbc9..61435cee284 100644
--- a/nixpkgs/pkgs/tools/package-management/librepo/default.nix
+++ b/nixpkgs/pkgs/tools/package-management/librepo/default.nix
@@ -13,7 +13,7 @@ stdenv.mkDerivation rec {
nativeBuildInputs = [ cmake pkgconfig ];
- cmakeFlags="-DPYTHON_DESIRED=${stdenv.lib.substring 0 1 python.pythonVersion}";
+ cmakeFlags = ["-DPYTHON_DESIRED=${stdenv.lib.substring 0 1 python.pythonVersion}" ];
buildInputs = [ python libxml2 glib openssl curl check gpgme ];
diff --git a/nixpkgs/pkgs/tools/package-management/nfpm/default.nix b/nixpkgs/pkgs/tools/package-management/nfpm/default.nix
index 0dc707ccf86..a4acdf0a341 100644
--- a/nixpkgs/pkgs/tools/package-management/nfpm/default.nix
+++ b/nixpkgs/pkgs/tools/package-management/nfpm/default.nix
@@ -2,16 +2,16 @@
buildGoModule rec {
pname = "nfpm";
- version = "1.1.5";
+ version = "1.1.8";
src = fetchFromGitHub {
owner = "goreleaser";
repo = pname;
rev = "v${version}";
- sha256 = "0wgp4bana38r385qgcm83fhqd053y5i9swh5cmnmbqjibx85g5r2";
+ sha256 = "0yy75iagyrr96y7497hbbizrm59c757mshwicl1b7ni2sn3p63fh";
};
- modSha256 = "1d532nv76gzckq2a0nyr9xixbm3rr8d8vlzgdz6i61xsjakfm6ap";
+ modSha256 = "05hcn0k1zb4k4p3aaas7b276jw607cv290np9vmyqxb3khzv4vjg";
buildFlagsArray = [ "-ldflags=-s -w -X main.version=${version}" ];
diff --git a/nixpkgs/pkgs/tools/package-management/nix-index/default.nix b/nixpkgs/pkgs/tools/package-management/nix-index/default.nix
index 1d025581b61..b3a16633c1d 100644
--- a/nixpkgs/pkgs/tools/package-management/nix-index/default.nix
+++ b/nixpkgs/pkgs/tools/package-management/nix-index/default.nix
@@ -12,7 +12,7 @@ rustPlatform.buildRustPackage rec {
rev = "v${version}";
sha256 = "05fqfwz34n4ijw7ydw2n6bh4bv64rhks85cn720sy5r7bmhfmfa8";
};
- cargoSha256 = "0h8a5bnv32rkvywn8xdbny38m24bi6p9scwljgdk8k067pn3qk34";
+ cargoSha256 = "06idjb5h5fahqklyxnss2zffrvvfbcw0hjh1mcrf1872s4x78ags";
nativeBuildInputs = [ pkgconfig makeWrapper ];
buildInputs = [ openssl curl ]
++ stdenv.lib.optional stdenv.isDarwin Security;
diff --git a/nixpkgs/pkgs/tools/package-management/nix/default.nix b/nixpkgs/pkgs/tools/package-management/nix/default.nix
index 5c55ac31588..28413971c00 100644
--- a/nixpkgs/pkgs/tools/package-management/nix/default.nix
+++ b/nixpkgs/pkgs/tools/package-management/nix/default.nix
@@ -57,7 +57,7 @@ common =
propagatedBuildInputs = [ boehmgc ];
# Seems to be required when using std::atomic with 64-bit types
- NIX_LDFLAGS = lib.optionalString (stdenv.hostPlatform.system == "armv6l-linux") "-latomic";
+ NIX_LDFLAGS = lib.optionalString (stdenv.hostPlatform.system == "armv5tel-linux" || stdenv.hostPlatform.system == "armv6l-linux") "-latomic";
preConfigure =
# Copy libboost_context so we don't get all of Boost in our closure.
@@ -94,9 +94,9 @@ common =
# RISC-V support in progress https://github.com/seccomp/libseccomp/pull/50
++ lib.optional (!withLibseccomp) "--disable-seccomp-sandboxing";
- makeFlags = "profiledir=$(out)/etc/profile.d";
+ makeFlags = [ "profiledir=$(out)/etc/profile.d" ];
- installFlags = "sysconfdir=$(out)/etc";
+ installFlags = [ "sysconfdir=$(out)/etc" ];
doInstallCheck = true; # not cross
@@ -174,10 +174,10 @@ in rec {
};
nixStable = callPackage common (rec {
- name = "nix-2.3.1";
+ name = "nix-2.3.2";
src = fetchurl {
url = "http://nixos.org/releases/nix/${name}/${name}.tar.xz";
- sha256 = "bb6578e9f20eebab6d78469ecc59c450ac54f276e5a86a882015d98fecb1bc7b";
+ sha256 = "9fea4b52db0b296dcf05d36f7ecad9f48396af3a682bb21e31f8d04c469beef8";
};
inherit storeDir stateDir confDir boehmgc;
diff --git a/nixpkgs/pkgs/tools/package-management/nix-review/default.nix b/nixpkgs/pkgs/tools/package-management/nixpkgs-review/default.nix
index 44a7eaff2bf..928c946de2b 100644
--- a/nixpkgs/pkgs/tools/package-management/nix-review/default.nix
+++ b/nixpkgs/pkgs/tools/package-management/nixpkgs-review/default.nix
@@ -7,14 +7,14 @@
}:
python3.pkgs.buildPythonApplication rec {
- pname = "nix-review";
- version = "2.1.0";
+ pname = "nixpkgs-review";
+ version = "2.1.1";
src = fetchFromGitHub {
owner = "Mic92";
- repo = "nix-review";
+ repo = "nixpkgs-review";
rev = version;
- sha256 = "0bdar2d88qjkf76hi3ar1lyfxnbwzhx1fi8fv65bw95m2sp1p0b5";
+ sha256 = "0rx0ld2ihsvlr1yiap5cq7h227jr79zf3xhkninh2m00x384s6bd";
};
makeWrapperArgs = [
@@ -23,7 +23,7 @@ python3.pkgs.buildPythonApplication rec {
meta = with stdenv.lib; {
description = "Review pull-requests on https://github.com/NixOS/nixpkgs";
- homepage = https://github.com/Mic92/nix-review;
+ homepage = https://github.com/Mic92/nixpkgs-review;
license = licenses.mit;
maintainers = [ maintainers.mic92 ];
};
diff --git a/nixpkgs/pkgs/tools/package-management/opkg/default.nix b/nixpkgs/pkgs/tools/package-management/opkg/default.nix
index 05f43cf29b1..1aae0290d5a 100644
--- a/nixpkgs/pkgs/tools/package-management/opkg/default.nix
+++ b/nixpkgs/pkgs/tools/package-management/opkg/default.nix
@@ -2,11 +2,11 @@
, autoreconfHook }:
stdenv.mkDerivation rec {
- version = "0.4.1";
+ version = "0.4.2";
pname = "opkg";
src = fetchurl {
url = "https://downloads.yoctoproject.org/releases/opkg/opkg-${version}.tar.gz";
- sha256 = "0hqa4lqxs3w9fmn9idzfscjkm23jw5asby43v0szcxrqgl1ixb25";
+ sha256 = "01p1a7hw9q9ixfk01djyy9axs71z1x9dkdnqz7zysmrlqi97i246";
};
nativeBuildInputs = [ pkgconfig autoreconfHook ];
diff --git a/nixpkgs/pkgs/tools/package-management/pacman/default.nix b/nixpkgs/pkgs/tools/package-management/pacman/default.nix
index 9fd0ea05510..cdd0c83574a 100644
--- a/nixpkgs/pkgs/tools/package-management/pacman/default.nix
+++ b/nixpkgs/pkgs/tools/package-management/pacman/default.nix
@@ -1,13 +1,13 @@
-{ stdenv, lib, fetchurl, autoreconfHook, pkgconfig, perl, libarchive, openssl,
-zlib, bzip2, lzma, curl, runtimeShell }:
+{ stdenv, lib, fetchurl, pkgconfig, m4, perl, libarchive, openssl, zlib, bzip2,
+lzma, curl, runtimeShell }:
stdenv.mkDerivation rec {
pname = "pacman";
- version = "5.1.3";
+ version = "5.2.1";
src = fetchurl {
- url = "https://git.archlinux.org/pacman.git/snapshot/pacman-${version}.tar.gz";
- sha256 = "108xp6dhvp02jnzskhgzjmp9jvrxhhkffvmpvs3rrif7vj47xd76";
+ url = "https://sources.archlinux.org/other/${pname}/${pname}-${version}.tar.gz";
+ sha256 = "04pkb8qvkldrayfns8cx4fljl4lyys1dqvlf7b5kkl2z4q3w8c0r";
};
enableParallelBuilding = true;
@@ -23,7 +23,7 @@ stdenv.mkDerivation rec {
installFlags = [ "sysconfdir=${placeholder "out"}/etc" ];
- nativeBuildInputs = [ autoreconfHook pkgconfig ];
+ nativeBuildInputs = [ pkgconfig m4 ];
buildInputs = [ curl perl libarchive openssl zlib bzip2 lzma ];
postFixup = ''
diff --git a/nixpkgs/pkgs/tools/package-management/protontricks/default.nix b/nixpkgs/pkgs/tools/package-management/protontricks/default.nix
index f5cecaa8e04..c8413c56854 100644
--- a/nixpkgs/pkgs/tools/package-management/protontricks/default.nix
+++ b/nixpkgs/pkgs/tools/package-management/protontricks/default.nix
@@ -4,13 +4,13 @@
buildPythonApplication rec {
pname = "protontricks";
- version = "1.3";
+ version = "1.3.1";
src = fetchFromGitHub {
owner = "Matoking";
repo = pname;
rev = version;
- sha256 = "1x3ln9sxczkh9rpznw8q5jqfk17kzsjiz125xd15rqj5zqkrwkkd";
+ sha256 = "0snhm9r5igik030iqxm3zd9zvhlnsxi20zac71bbc29qflsi2dhk";
};
propagatedBuildInputs = [ vdf ];
diff --git a/nixpkgs/pkgs/tools/package-management/reuse/default.nix b/nixpkgs/pkgs/tools/package-management/reuse/default.nix
index 4aadc4b7af0..13a3a85f082 100644
--- a/nixpkgs/pkgs/tools/package-management/reuse/default.nix
+++ b/nixpkgs/pkgs/tools/package-management/reuse/default.nix
@@ -4,13 +4,13 @@ with python3Packages;
buildPythonApplication rec {
pname = "reuse";
- version = "0.6.0";
+ version = "0.7.0";
src = fetchFromGitHub {
owner = "fsfe";
repo = "reuse-tool";
rev = "v${version}";
- sha256 = "17bslyvjndhqryrisba9y7y0ijyzi3gmyl9rddkcvdqi3lg9668y";
+ sha256 = "04i8zd66cs152h28k9085nqg937wp31pz2yqywaldx1gywijyd8h";
};
propagatedBuildInputs = [
diff --git a/nixpkgs/pkgs/tools/package-management/xbps/default.nix b/nixpkgs/pkgs/tools/package-management/xbps/default.nix
index 2be1db764e1..7ff079c0116 100644
--- a/nixpkgs/pkgs/tools/package-management/xbps/default.nix
+++ b/nixpkgs/pkgs/tools/package-management/xbps/default.nix
@@ -17,7 +17,7 @@ stdenv.mkDerivation rec {
patches = [ ./cert-paths.patch ];
- NIX_CFLAGS_COMPILE = [ "-Wno-error=unused-result" ];
+ NIX_CFLAGS_COMPILE = "-Wno-error=unused-result";
postPatch = ''
# fix unprefixed ranlib (needed on cross)
diff --git a/nixpkgs/pkgs/tools/security/afl/README.md b/nixpkgs/pkgs/tools/security/afl/README.md
index 0b0d4e80fbc..180cad6bc4c 100644
--- a/nixpkgs/pkgs/tools/security/afl/README.md
+++ b/nixpkgs/pkgs/tools/security/afl/README.md
@@ -4,12 +4,12 @@ Updating the QEMU patches
When updating to the latest American Fuzzy Lop, make sure to check for
any new patches to qemu for binary fuzzing support:
-https://github.com/mirrorer/afl/tree/master/qemu_mode
+https://github.com/google/AFL/tree/master/qemu_mode
Be sure to check the build script and make sure it's also using the
right QEMU version and options in `qemu.nix`:
-https://github.com/mirrorer/afl/blob/master/qemu_mode/build_qemu_support.sh
+https://github.com/google/AFL/blob/master/qemu_mode/build_qemu_support.sh
`afl-config.h`, `afl-types.h`, and `afl-qemu-cpu-inl.h` are part of
the afl source code, and copied from `config.h`, `types.h` and
diff --git a/nixpkgs/pkgs/tools/security/afl/default.nix b/nixpkgs/pkgs/tools/security/afl/default.nix
index 05866792af6..df5e3728943 100644
--- a/nixpkgs/pkgs/tools/security/afl/default.nix
+++ b/nixpkgs/pkgs/tools/security/afl/default.nix
@@ -1,4 +1,4 @@
-{ stdenv, fetchurl, callPackage, makeWrapper
+{ stdenv, fetchFromGitHub, callPackage, makeWrapper
, clang, llvm, which, libcgroup
}:
@@ -9,11 +9,13 @@ let
else throw "afl: no support for ${stdenv.hostPlatform.system}!";
afl = stdenv.mkDerivation rec {
pname = "afl";
- version = "2.52b";
+ version = "2.56b";
- src = fetchurl {
- url = "http://lcamtuf.coredump.cx/afl/releases/${pname}-${version}.tgz";
- sha256 = "0ig0ij4n1pwry5dw1hk4q88801jzzy2cric6y2gd6560j55lnqa3";
+ src = fetchFromGitHub {
+ owner = "google";
+ repo = pname;
+ rev = "v${version}";
+ sha256 = "1q1g59gkm48aa4cg9h70jx4i2gapmypgp5rzs156b2avd95vwkn1";
};
enableParallelBuilding = true;
diff --git a/nixpkgs/pkgs/tools/security/afl/libdislocator.nix b/nixpkgs/pkgs/tools/security/afl/libdislocator.nix
index 415fa82f2ec..953c59e435c 100644
--- a/nixpkgs/pkgs/tools/security/afl/libdislocator.nix
+++ b/nixpkgs/pkgs/tools/security/afl/libdislocator.nix
@@ -5,7 +5,7 @@ stdenv.mkDerivation {
pname = "libdislocator";
src = afl.src;
- sourceRoot = "${afl.name}/libdislocator";
+ sourceRoot = "${afl.src.name}/libdislocator";
makeFlags = [ "PREFIX=$(out)" ];
diff --git a/nixpkgs/pkgs/tools/security/afl/qemu-patches/qemu-2.10.0-glibc-2.27.patch b/nixpkgs/pkgs/tools/security/afl/qemu-patches/qemu-2.10.0-glibc-2.27.patch
deleted file mode 100644
index 6cc663dc1fb..00000000000
--- a/nixpkgs/pkgs/tools/security/afl/qemu-patches/qemu-2.10.0-glibc-2.27.patch
+++ /dev/null
@@ -1,28 +0,0 @@
-A modified version of qemu commit 75e5b70e6b5dcc4f2219992d7cffa462aa406af0
-diff --git a/configure b/configure
-index 9c8aa5a..99ccc17 100755
---- a/configure
-+++ b/configure
-@@ -3855,7 +3855,7 @@ fi
- # check if memfd is supported
- memfd=no
- cat > $TMPC << EOF
--#include <sys/memfd.h>
-+#include <sys/mman.h>
-
- int main(void)
- {
-diff --git a/util/memfd.c b/util/memfd.c
-index 4571d1a..412e94a 100644
---- a/util/memfd.c
-+++ b/util/memfd.c
-@@ -31,9 +31,7 @@
-
- #include "qemu/memfd.h"
-
--#ifdef CONFIG_MEMFD
--#include <sys/memfd.h>
--#elif defined CONFIG_LINUX
-+#if defined CONFIG_LINUX && !defined CONFIG_MEMFD
- #include <sys/syscall.h>
- #include <asm/unistd.h>
diff --git a/nixpkgs/pkgs/tools/security/afl/qemu.nix b/nixpkgs/pkgs/tools/security/afl/qemu.nix
index d80d301351f..479de4b4185 100644
--- a/nixpkgs/pkgs/tools/security/afl/qemu.nix
+++ b/nixpkgs/pkgs/tools/security/afl/qemu.nix
@@ -6,7 +6,6 @@ with stdenv.lib;
let
qemuName = "qemu-2.10.0";
- aflName = afl.name;
cpuTarget = if stdenv.hostPlatform.system == "x86_64-linux" then "x86_64-linux-user"
else if stdenv.hostPlatform.system == "i686-linux" then "i386-linux-user"
else throw "afl: no support for ${stdenv.hostPlatform.system}!";
@@ -25,12 +24,12 @@ stdenv.mkDerivation {
sourceRoot = qemuName;
postUnpack = ''
- cp ${aflName}/types.h $sourceRoot/afl-types.h
- substitute ${aflName}/config.h $sourceRoot/afl-config.h \
+ cp ${afl.src.name}/types.h $sourceRoot/afl-types.h
+ substitute ${afl.src.name}/config.h $sourceRoot/afl-config.h \
--replace "types.h" "afl-types.h"
- substitute ${aflName}/qemu_mode/patches/afl-qemu-cpu-inl.h $sourceRoot/afl-qemu-cpu-inl.h \
+ substitute ${afl.src.name}/qemu_mode/patches/afl-qemu-cpu-inl.h $sourceRoot/afl-qemu-cpu-inl.h \
--replace "../../config.h" "afl-config.h"
- substituteInPlace ${aflName}/qemu_mode/patches/cpu-exec.diff \
+ substituteInPlace ${afl.src.name}/qemu_mode/patches/cpu-exec.diff \
--replace "../patches/afl-qemu-cpu-inl.h" "afl-qemu-cpu-inl.h"
'';
@@ -46,12 +45,13 @@ stdenv.mkDerivation {
patches = [
# patches extracted from afl source
- "../${aflName}/qemu_mode/patches/cpu-exec.diff"
- "../${aflName}/qemu_mode/patches/elfload.diff"
- "../${aflName}/qemu_mode/patches/syscall.diff"
+ "../${afl.src.name}/qemu_mode/patches/cpu-exec.diff"
+ "../${afl.src.name}/qemu_mode/patches/elfload.diff"
+ "../${afl.src.name}/qemu_mode/patches/syscall.diff"
+ "../${afl.src.name}/qemu_mode/patches/configure.diff"
+ "../${afl.src.name}/qemu_mode/patches/memfd.diff"
# nix-specific patches to make installation more well-behaved
./qemu-patches/no-etc-install.patch
- ./qemu-patches/qemu-2.10.0-glibc-2.27.patch
];
configureFlags =
diff --git a/nixpkgs/pkgs/tools/security/age/default.nix b/nixpkgs/pkgs/tools/security/age/default.nix
new file mode 100644
index 00000000000..bde597ba9f3
--- /dev/null
+++ b/nixpkgs/pkgs/tools/security/age/default.nix
@@ -0,0 +1,27 @@
+{ lib, buildGoModule, fetchFromGitHub }:
+
+buildGoModule rec {
+ pname = "age";
+ version = "1.0.0-beta2";
+ goPackagePath = "github.com/FiloSottile/age";
+ modSha256 = "0kwdwhkxgqjd8h1p7pm4h4xidp2vk840h1j4qya4qz8bjf9vskl9";
+
+ subPackages = [
+ "cmd/age"
+ "cmd/age-keygen"
+ ];
+
+ src = fetchFromGitHub {
+ owner = "FiloSottile";
+ repo = "age";
+ rev = "v${version}";
+ sha256 = "1n1ww8yjw0mg00dvnfmggww9kwp1hls0a85iv6vx9k89mzv8mdrq";
+ };
+
+ meta = with lib; {
+ homepage = "https://age-encryption.org/";
+ description = "Modern encryption tool with small explicit keys";
+ license = licenses.bsd3;
+ maintainers = with maintainers; [ tazjin ];
+ };
+}
diff --git a/nixpkgs/pkgs/tools/security/aws-okta/default.nix b/nixpkgs/pkgs/tools/security/aws-okta/default.nix
index 9067e6a4dbf..71732f26934 100644
--- a/nixpkgs/pkgs/tools/security/aws-okta/default.nix
+++ b/nixpkgs/pkgs/tools/security/aws-okta/default.nix
@@ -1,8 +1,8 @@
-{ buildGoPackage, fetchFromGitHub, libusb1, pkgconfig, stdenv }:
+{ buildGoPackage, fetchFromGitHub, libusb1, pkgconfig, stdenv, libiconv }:
buildGoPackage rec {
pname = "aws-okta";
- version = "0.20.1";
+ version = "0.26.3";
goPackagePath = "github.com/segmentio/aws-okta";
@@ -10,22 +10,21 @@ buildGoPackage rec {
owner = "segmentio";
repo = "aws-okta";
rev = "v${version}";
- sha256 = "084lb9rp04vbpzmvsb2l92a4gp7c8g28x4xsagzwkqqpwi3fd15d";
+ sha256 = "0n6xm3yv0lxfapchzfrqi05hk918n4lh1hcp7gq7hybam93rld96";
};
goDeps = ./deps.nix;
- buildFlags = "--tags release";
+ buildFlags = [ "--tags" "release" ];
nativeBuildInputs = [ pkgconfig ];
- buildInputs = [ libusb1 ];
+ buildInputs = [ libusb1 libiconv ];
meta = with stdenv.lib; {
inherit version;
description = "aws-vault like tool for Okta authentication";
license = licenses.mit;
maintainers = [maintainers.imalsogreg];
- broken = stdenv.isDarwin; # test with CoreFoundation 10.11
platforms = platforms.all;
homepage = https://github.com/segmentio/aws-okta;
downloadPage = "https://github.com/segmentio/aws-okta";
diff --git a/nixpkgs/pkgs/tools/security/bitwarden-cli/default.nix b/nixpkgs/pkgs/tools/security/bitwarden-cli/default.nix
deleted file mode 100644
index 5c60eb9f4e2..00000000000
--- a/nixpkgs/pkgs/tools/security/bitwarden-cli/default.nix
+++ /dev/null
@@ -1,18 +0,0 @@
-{ stdenv, pkgs }:
-
-let
- # node-packages*.nix generated via:
- #
- # % node2nix --input node-packages.json \
- # --output node-packages-generated.nix \
- # --composition node-packages.nix \
- # --node-env ./../../../development/node-packages/node-env.nix
- #
- nodePackages = import ./node-packages.nix {
- inherit pkgs;
- inherit (stdenv.hostPlatform) system;
- };
-in pkgs.lib.overrideDerivation nodePackages."@bitwarden/cli" (drv: {
- # This defaults to "node-_at_bitwarden_slash_cli-1.7.0"
- name = "bitwarden-cli-${drv.version}";
-})
diff --git a/nixpkgs/pkgs/tools/security/bitwarden-cli/generate.sh b/nixpkgs/pkgs/tools/security/bitwarden-cli/generate.sh
deleted file mode 100755
index 5bcee4c0513..00000000000
--- a/nixpkgs/pkgs/tools/security/bitwarden-cli/generate.sh
+++ /dev/null
@@ -1,8 +0,0 @@
-#!/usr/bin/env nix-shell
-#! nix-shell -i bash -p nodePackages.node2nix
-
-exec node2nix -8 \
- --input node-packages.json \
- --output node-packages-generated.nix \
- --composition node-packages.nix \
- --node-env ./../../../development/node-packages/node-env.nix
diff --git a/nixpkgs/pkgs/tools/security/bitwarden-cli/node-packages-generated.nix b/nixpkgs/pkgs/tools/security/bitwarden-cli/node-packages-generated.nix
deleted file mode 100644
index 2afff040354..00000000000
--- a/nixpkgs/pkgs/tools/security/bitwarden-cli/node-packages-generated.nix
+++ /dev/null
@@ -1,1407 +0,0 @@
-# This file has been generated by node2nix 1.7.0. Do not edit!
-
-{nodeEnv, fetchurl, fetchgit, globalBuildInputs ? []}:
-
-let
- sources = {
- "abab-2.0.0" = {
- name = "abab";
- packageName = "abab";
- version = "2.0.0";
- src = fetchurl {
- url = "https://registry.npmjs.org/abab/-/abab-2.0.0.tgz";
- sha512 = "sY5AXXVZv4Y1VACTtR11UJCPHHudgY5i26Qj5TypE6DKlIApbwb5uqhXcJ5UUGbvZNRh7EeIoW+LrJumBsKp7w==";
- };
- };
- "acorn-6.2.1" = {
- name = "acorn";
- packageName = "acorn";
- version = "6.2.1";
- src = fetchurl {
- url = "https://registry.npmjs.org/acorn/-/acorn-6.2.1.tgz";
- sha512 = "JD0xT5FCRDNyjDda3Lrg/IxFscp9q4tiYtxE1/nOzlKCk7hIRuYjhq1kCNkbPjMRMZuFq20HNQn1I9k8Oj0E+Q==";
- };
- };
- "acorn-globals-4.3.2" = {
- name = "acorn-globals";
- packageName = "acorn-globals";
- version = "4.3.2";
- src = fetchurl {
- url = "https://registry.npmjs.org/acorn-globals/-/acorn-globals-4.3.2.tgz";
- sha512 = "BbzvZhVtZP+Bs1J1HcwrQe8ycfO0wStkSGxuul3He3GkHOIZ6eTqOkPuw9IP1X3+IkOo4wiJmwkobzXYz4wewQ==";
- };
- };
- "acorn-walk-6.2.0" = {
- name = "acorn-walk";
- packageName = "acorn-walk";
- version = "6.2.0";
- src = fetchurl {
- url = "https://registry.npmjs.org/acorn-walk/-/acorn-walk-6.2.0.tgz";
- sha512 = "7evsyfH1cLOCdAzZAd43Cic04yKydNx0cF+7tiA19p1XnLLPU4dpCQOqpjqwokFe//vS0QqfqqjCS2JkiIs0cA==";
- };
- };
- "ajv-6.10.2" = {
- name = "ajv";
- packageName = "ajv";
- version = "6.10.2";
- src = fetchurl {
- url = "https://registry.npmjs.org/ajv/-/ajv-6.10.2.tgz";
- sha512 = "TXtUUEYHuaTEbLZWIKUr5pmBuhDLy+8KYtPYdcV8qC+pOZL+NKqYwvWSRrVXHn+ZmRRAu8vJTAznH7Oag6RVRw==";
- };
- };
- "ansi-escapes-3.2.0" = {
- name = "ansi-escapes";
- packageName = "ansi-escapes";
- version = "3.2.0";
- src = fetchurl {
- url = "https://registry.npmjs.org/ansi-escapes/-/ansi-escapes-3.2.0.tgz";
- sha512 = "cBhpre4ma+U0T1oM5fXg7Dy1Jw7zzwv7lt/GoCpr+hDQJoYnKVPLL4dCvSEFMmQurOQvSrwT7SL/DAlhBI97RQ==";
- };
- };
- "ansi-regex-3.0.0" = {
- name = "ansi-regex";
- packageName = "ansi-regex";
- version = "3.0.0";
- src = fetchurl {
- url = "https://registry.npmjs.org/ansi-regex/-/ansi-regex-3.0.0.tgz";
- sha1 = "ed0317c322064f79466c02966bddb605ab37d998";
- };
- };
- "ansi-styles-3.2.1" = {
- name = "ansi-styles";
- packageName = "ansi-styles";
- version = "3.2.1";
- src = fetchurl {
- url = "https://registry.npmjs.org/ansi-styles/-/ansi-styles-3.2.1.tgz";
- sha512 = "VT0ZI6kZRdTh8YyJw3SMbYm/u+NqfsAxEpWO0Pf9sq8/e94WxxOpPKx9FR1FlyCtOVDNOQ+8ntlqFxiRc+r5qA==";
- };
- };
- "array-equal-1.0.0" = {
- name = "array-equal";
- packageName = "array-equal";
- version = "1.0.0";
- src = fetchurl {
- url = "https://registry.npmjs.org/array-equal/-/array-equal-1.0.0.tgz";
- sha1 = "8c2a5ef2472fd9ea742b04c77a75093ba2757c93";
- };
- };
- "asn1-0.2.4" = {
- name = "asn1";
- packageName = "asn1";
- version = "0.2.4";
- src = fetchurl {
- url = "https://registry.npmjs.org/asn1/-/asn1-0.2.4.tgz";
- sha512 = "jxwzQpLQjSmWXgwaCZE9Nz+glAG01yF1QnWgbhGwHI5A6FRIEY6IVqtHhIepHqI7/kyEyQEagBC5mBEFlIYvdg==";
- };
- };
- "assert-plus-1.0.0" = {
- name = "assert-plus";
- packageName = "assert-plus";
- version = "1.0.0";
- src = fetchurl {
- url = "https://registry.npmjs.org/assert-plus/-/assert-plus-1.0.0.tgz";
- sha1 = "f12e0f3c5d77b0b1cdd9146942e4e96c1e4dd525";
- };
- };
- "async-limiter-1.0.0" = {
- name = "async-limiter";
- packageName = "async-limiter";
- version = "1.0.0";
- src = fetchurl {
- url = "https://registry.npmjs.org/async-limiter/-/async-limiter-1.0.0.tgz";
- sha512 = "jp/uFnooOiO+L211eZOoSyzpOITMXx1rBITauYykG3BRYPu8h0UcxsPNB04RR5vo4Tyz3+ay17tR6JVf9qzYWg==";
- };
- };
- "asynckit-0.4.0" = {
- name = "asynckit";
- packageName = "asynckit";
- version = "0.4.0";
- src = fetchurl {
- url = "https://registry.npmjs.org/asynckit/-/asynckit-0.4.0.tgz";
- sha1 = "c79ed97f7f34cb8f2ba1bc9790bcc366474b4b79";
- };
- };
- "aws-sign2-0.7.0" = {
- name = "aws-sign2";
- packageName = "aws-sign2";
- version = "0.7.0";
- src = fetchurl {
- url = "https://registry.npmjs.org/aws-sign2/-/aws-sign2-0.7.0.tgz";
- sha1 = "b46e890934a9591f2d2f6f86d7e6a9f1b3fe76a8";
- };
- };
- "aws4-1.8.0" = {
- name = "aws4";
- packageName = "aws4";
- version = "1.8.0";
- src = fetchurl {
- url = "https://registry.npmjs.org/aws4/-/aws4-1.8.0.tgz";
- sha512 = "ReZxvNHIOv88FlT7rxcXIIC0fPt4KZqZbOlivyWtXLt8ESx84zd3kMC6iK5jVeS2qt+g7ftS7ye4fi06X5rtRQ==";
- };
- };
- "bcrypt-pbkdf-1.0.2" = {
- name = "bcrypt-pbkdf";
- packageName = "bcrypt-pbkdf";
- version = "1.0.2";
- src = fetchurl {
- url = "https://registry.npmjs.org/bcrypt-pbkdf/-/bcrypt-pbkdf-1.0.2.tgz";
- sha1 = "a4301d389b6a43f9b67ff3ca11a3f6637e360e9e";
- };
- };
- "big-integer-1.6.36" = {
- name = "big-integer";
- packageName = "big-integer";
- version = "1.6.36";
- src = fetchurl {
- url = "https://registry.npmjs.org/big-integer/-/big-integer-1.6.36.tgz";
- sha512 = "t70bfa7HYEA1D9idDbmuv7YbsbVkQ+Hp+8KFSul4aE5e/i1bjCNIRYJZlA8Q8p0r9T8cF/RVvwUgRA//FydEyg==";
- };
- };
- "browser-process-hrtime-0.1.3" = {
- name = "browser-process-hrtime";
- packageName = "browser-process-hrtime";
- version = "0.1.3";
- src = fetchurl {
- url = "https://registry.npmjs.org/browser-process-hrtime/-/browser-process-hrtime-0.1.3.tgz";
- sha512 = "bRFnI4NnjO6cnyLmOV/7PVoDEMJChlcfN0z4s1YMBY989/SvlfMI1lgCnkFUs53e9gQF+w7qu7XdllSTiSl8Aw==";
- };
- };
- "caseless-0.12.0" = {
- name = "caseless";
- packageName = "caseless";
- version = "0.12.0";
- src = fetchurl {
- url = "https://registry.npmjs.org/caseless/-/caseless-0.12.0.tgz";
- sha1 = "1b681c21ff84033c826543090689420d187151dc";
- };
- };
- "chalk-2.4.1" = {
- name = "chalk";
- packageName = "chalk";
- version = "2.4.1";
- src = fetchurl {
- url = "https://registry.npmjs.org/chalk/-/chalk-2.4.1.tgz";
- sha512 = "ObN6h1v2fTJSmUXoS3nMQ92LbDK9be4TV+6G+omQlGJFdcUX5heKi1LZ1YnRMIgwTLEj3E24bT6tYni50rlCfQ==";
- };
- };
- "chardet-0.7.0" = {
- name = "chardet";
- packageName = "chardet";
- version = "0.7.0";
- src = fetchurl {
- url = "https://registry.npmjs.org/chardet/-/chardet-0.7.0.tgz";
- sha512 = "mT8iDcrh03qDGRRmoA2hmBJnxpllMR+0/0qlzjqZES6NdiWDcZkCNAk4rPFZ9Q85r27unkiNNg8ZOiwZXBHwcA==";
- };
- };
- "cli-cursor-2.1.0" = {
- name = "cli-cursor";
- packageName = "cli-cursor";
- version = "2.1.0";
- src = fetchurl {
- url = "https://registry.npmjs.org/cli-cursor/-/cli-cursor-2.1.0.tgz";
- sha1 = "b35dac376479facc3e94747d41d0d0f5238ffcb5";
- };
- };
- "cli-width-2.2.0" = {
- name = "cli-width";
- packageName = "cli-width";
- version = "2.2.0";
- src = fetchurl {
- url = "https://registry.npmjs.org/cli-width/-/cli-width-2.2.0.tgz";
- sha1 = "ff19ede8a9a5e579324147b0c11f0fbcbabed639";
- };
- };
- "color-convert-1.9.3" = {
- name = "color-convert";
- packageName = "color-convert";
- version = "1.9.3";
- src = fetchurl {
- url = "https://registry.npmjs.org/color-convert/-/color-convert-1.9.3.tgz";
- sha512 = "QfAUtd+vFdAtFQcC8CCyYt1fYWxSqAiK2cSD6zDB8N3cpsEBAvRxp9zOGg6G/SHHJYAT88/az/IuDGALsNVbGg==";
- };
- };
- "color-name-1.1.3" = {
- name = "color-name";
- packageName = "color-name";
- version = "1.1.3";
- src = fetchurl {
- url = "https://registry.npmjs.org/color-name/-/color-name-1.1.3.tgz";
- sha1 = "a7d0558bd89c42f795dd42328f740831ca53bc25";
- };
- };
- "combined-stream-1.0.6" = {
- name = "combined-stream";
- packageName = "combined-stream";
- version = "1.0.6";
- src = fetchurl {
- url = "https://registry.npmjs.org/combined-stream/-/combined-stream-1.0.6.tgz";
- sha1 = "723e7df6e801ac5613113a7e445a9b69cb632818";
- };
- };
- "commander-2.18.0" = {
- name = "commander";
- packageName = "commander";
- version = "2.18.0";
- src = fetchurl {
- url = "https://registry.npmjs.org/commander/-/commander-2.18.0.tgz";
- sha512 = "6CYPa+JP2ftfRU2qkDK+UTVeQYosOg/2GbcjIcKPHfinyOLPVGXu/ovN86RP49Re5ndJK1N0kuiidFFuepc4ZQ==";
- };
- };
- "core-util-is-1.0.2" = {
- name = "core-util-is";
- packageName = "core-util-is";
- version = "1.0.2";
- src = fetchurl {
- url = "https://registry.npmjs.org/core-util-is/-/core-util-is-1.0.2.tgz";
- sha1 = "b5fd54220aa2bc5ab57aab7140c940754503c1a7";
- };
- };
- "cssom-0.3.8" = {
- name = "cssom";
- packageName = "cssom";
- version = "0.3.8";
- src = fetchurl {
- url = "https://registry.npmjs.org/cssom/-/cssom-0.3.8.tgz";
- sha512 = "b0tGHbfegbhPJpxpiBPU2sCkigAqtM9O121le6bbOlgyV+NyGyCmVfJ6QW9eRjz8CpNfWEOYBIMIGRYkLwsIYg==";
- };
- };
- "cssstyle-1.4.0" = {
- name = "cssstyle";
- packageName = "cssstyle";
- version = "1.4.0";
- src = fetchurl {
- url = "https://registry.npmjs.org/cssstyle/-/cssstyle-1.4.0.tgz";
- sha512 = "GBrLZYZ4X4x6/QEoBnIrqb8B/f5l4+8me2dkom/j1Gtbxy0kBv6OGzKuAsGM75bkGwGAFkt56Iwg28S3XTZgSA==";
- };
- };
- "dashdash-1.14.1" = {
- name = "dashdash";
- packageName = "dashdash";
- version = "1.14.1";
- src = fetchurl {
- url = "https://registry.npmjs.org/dashdash/-/dashdash-1.14.1.tgz";
- sha1 = "853cfa0f7cbe2fed5de20326b8dd581035f6e2f0";
- };
- };
- "data-urls-1.1.0" = {
- name = "data-urls";
- packageName = "data-urls";
- version = "1.1.0";
- src = fetchurl {
- url = "https://registry.npmjs.org/data-urls/-/data-urls-1.1.0.tgz";
- sha512 = "YTWYI9se1P55u58gL5GkQHW4P6VJBJ5iBT+B5a7i2Tjadhv52paJG0qHX4A0OR6/t52odI64KP2YvFpkDOi3eQ==";
- };
- };
- "deep-is-0.1.3" = {
- name = "deep-is";
- packageName = "deep-is";
- version = "0.1.3";
- src = fetchurl {
- url = "https://registry.npmjs.org/deep-is/-/deep-is-0.1.3.tgz";
- sha1 = "b369d6fb5dbc13eecf524f91b070feedc357cf34";
- };
- };
- "delayed-stream-1.0.0" = {
- name = "delayed-stream";
- packageName = "delayed-stream";
- version = "1.0.0";
- src = fetchurl {
- url = "https://registry.npmjs.org/delayed-stream/-/delayed-stream-1.0.0.tgz";
- sha1 = "df3ae199acadfb7d440aaae0b29e2272b24ec619";
- };
- };
- "domexception-1.0.1" = {
- name = "domexception";
- packageName = "domexception";
- version = "1.0.1";
- src = fetchurl {
- url = "https://registry.npmjs.org/domexception/-/domexception-1.0.1.tgz";
- sha512 = "raigMkn7CJNNo6Ihro1fzG7wr3fHuYVytzquZKX5n0yizGsTcYgzdIUwj1X9pK0VvjeihV+XiclP+DjwbsSKug==";
- };
- };
- "ecc-jsbn-0.1.2" = {
- name = "ecc-jsbn";
- packageName = "ecc-jsbn";
- version = "0.1.2";
- src = fetchurl {
- url = "https://registry.npmjs.org/ecc-jsbn/-/ecc-jsbn-0.1.2.tgz";
- sha1 = "3a83a904e54353287874c564b7549386849a98c9";
- };
- };
- "escape-string-regexp-1.0.5" = {
- name = "escape-string-regexp";
- packageName = "escape-string-regexp";
- version = "1.0.5";
- src = fetchurl {
- url = "https://registry.npmjs.org/escape-string-regexp/-/escape-string-regexp-1.0.5.tgz";
- sha1 = "1b61c0562190a8dff6ae3bb2cf0200ca130b86d4";
- };
- };
- "escodegen-1.11.1" = {
- name = "escodegen";
- packageName = "escodegen";
- version = "1.11.1";
- src = fetchurl {
- url = "https://registry.npmjs.org/escodegen/-/escodegen-1.11.1.tgz";
- sha512 = "JwiqFD9KdGVVpeuRa68yU3zZnBEOcPs0nKW7wZzXky8Z7tffdYUHbe11bPCV5jYlK6DVdKLWLm0f5I/QlL0Kmw==";
- };
- };
- "esprima-3.1.3" = {
- name = "esprima";
- packageName = "esprima";
- version = "3.1.3";
- src = fetchurl {
- url = "https://registry.npmjs.org/esprima/-/esprima-3.1.3.tgz";
- sha1 = "fdca51cee6133895e3c88d535ce49dbff62a4633";
- };
- };
- "estraverse-4.2.0" = {
- name = "estraverse";
- packageName = "estraverse";
- version = "4.2.0";
- src = fetchurl {
- url = "https://registry.npmjs.org/estraverse/-/estraverse-4.2.0.tgz";
- sha1 = "0dee3fed31fcd469618ce7342099fc1afa0bdb13";
- };
- };
- "esutils-2.0.3" = {
- name = "esutils";
- packageName = "esutils";
- version = "2.0.3";
- src = fetchurl {
- url = "https://registry.npmjs.org/esutils/-/esutils-2.0.3.tgz";
- sha512 = "kVscqXk4OCp68SZ0dkgEKVi6/8ij300KBWTJq32P/dYeWTSwK41WyTxalN1eRmA5Z9UU/LX9D7FWSmV9SAYx6g==";
- };
- };
- "extend-3.0.2" = {
- name = "extend";
- packageName = "extend";
- version = "3.0.2";
- src = fetchurl {
- url = "https://registry.npmjs.org/extend/-/extend-3.0.2.tgz";
- sha512 = "fjquC59cD7CyW6urNXK0FBufkZcoiGG80wTuPujX590cB5Ttln20E2UB4S/WARVqhXffZl2LNgS+gQdPIIim/g==";
- };
- };
- "external-editor-3.1.0" = {
- name = "external-editor";
- packageName = "external-editor";
- version = "3.1.0";
- src = fetchurl {
- url = "https://registry.npmjs.org/external-editor/-/external-editor-3.1.0.tgz";
- sha512 = "hMQ4CX1p1izmuLYyZqLMO/qGNw10wSv9QDCPfzXfyFrOaCSSoRfqE1Kf1s5an66J5JZC62NewG+mK49jOCtQew==";
- };
- };
- "extsprintf-1.3.0" = {
- name = "extsprintf";
- packageName = "extsprintf";
- version = "1.3.0";
- src = fetchurl {
- url = "https://registry.npmjs.org/extsprintf/-/extsprintf-1.3.0.tgz";
- sha1 = "96918440e3041a7a414f8c52e3c574eb3c3e1e05";
- };
- };
- "fast-deep-equal-2.0.1" = {
- name = "fast-deep-equal";
- packageName = "fast-deep-equal";
- version = "2.0.1";
- src = fetchurl {
- url = "https://registry.npmjs.org/fast-deep-equal/-/fast-deep-equal-2.0.1.tgz";
- sha1 = "7b05218ddf9667bf7f370bf7fdb2cb15fdd0aa49";
- };
- };
- "fast-json-stable-stringify-2.0.0" = {
- name = "fast-json-stable-stringify";
- packageName = "fast-json-stable-stringify";
- version = "2.0.0";
- src = fetchurl {
- url = "https://registry.npmjs.org/fast-json-stable-stringify/-/fast-json-stable-stringify-2.0.0.tgz";
- sha1 = "d5142c0caee6b1189f87d3a76111064f86c8bbf2";
- };
- };
- "fast-levenshtein-2.0.6" = {
- name = "fast-levenshtein";
- packageName = "fast-levenshtein";
- version = "2.0.6";
- src = fetchurl {
- url = "https://registry.npmjs.org/fast-levenshtein/-/fast-levenshtein-2.0.6.tgz";
- sha1 = "3d8a5c66883a16a30ca8643e851f19baa7797917";
- };
- };
- "figures-2.0.0" = {
- name = "figures";
- packageName = "figures";
- version = "2.0.0";
- src = fetchurl {
- url = "https://registry.npmjs.org/figures/-/figures-2.0.0.tgz";
- sha1 = "3ab1a2d2a62c8bfb431a0c94cb797a2fce27c962";
- };
- };
- "forever-agent-0.6.1" = {
- name = "forever-agent";
- packageName = "forever-agent";
- version = "0.6.1";
- src = fetchurl {
- url = "https://registry.npmjs.org/forever-agent/-/forever-agent-0.6.1.tgz";
- sha1 = "fbc71f0c41adeb37f96c577ad1ed42d8fdacca91";
- };
- };
- "form-data-2.3.2" = {
- name = "form-data";
- packageName = "form-data";
- version = "2.3.2";
- src = fetchurl {
- url = "https://registry.npmjs.org/form-data/-/form-data-2.3.2.tgz";
- sha1 = "4970498be604c20c005d4f5c23aecd21d6b49099";
- };
- };
- "getpass-0.1.7" = {
- name = "getpass";
- packageName = "getpass";
- version = "0.1.7";
- src = fetchurl {
- url = "https://registry.npmjs.org/getpass/-/getpass-0.1.7.tgz";
- sha1 = "5eff8e3e684d569ae4cb2b1282604e8ba62149fa";
- };
- };
- "graceful-fs-4.2.0" = {
- name = "graceful-fs";
- packageName = "graceful-fs";
- version = "4.2.0";
- src = fetchurl {
- url = "https://registry.npmjs.org/graceful-fs/-/graceful-fs-4.2.0.tgz";
- sha512 = "jpSvDPV4Cq/bgtpndIWbI5hmYxhQGHPC4d4cqBPb4DLniCfhJokdXhwhaDuLBGLQdvvRum/UiX6ECVIPvDXqdg==";
- };
- };
- "har-schema-2.0.0" = {
- name = "har-schema";
- packageName = "har-schema";
- version = "2.0.0";
- src = fetchurl {
- url = "https://registry.npmjs.org/har-schema/-/har-schema-2.0.0.tgz";
- sha1 = "a94c2224ebcac04782a0d9035521f24735b7ec92";
- };
- };
- "har-validator-5.1.3" = {
- name = "har-validator";
- packageName = "har-validator";
- version = "5.1.3";
- src = fetchurl {
- url = "https://registry.npmjs.org/har-validator/-/har-validator-5.1.3.tgz";
- sha512 = "sNvOCzEQNr/qrvJgc3UG/kD4QtlHycrzwS+6mfTrrSq97BvaYcPZZI1ZSqGSPR73Cxn4LKTD4PttRwfU7jWq5g==";
- };
- };
- "has-flag-3.0.0" = {
- name = "has-flag";
- packageName = "has-flag";
- version = "3.0.0";
- src = fetchurl {
- url = "https://registry.npmjs.org/has-flag/-/has-flag-3.0.0.tgz";
- sha1 = "b5d454dc2199ae225699f3467e5a07f3b955bafd";
- };
- };
- "html-encoding-sniffer-1.0.2" = {
- name = "html-encoding-sniffer";
- packageName = "html-encoding-sniffer";
- version = "1.0.2";
- src = fetchurl {
- url = "https://registry.npmjs.org/html-encoding-sniffer/-/html-encoding-sniffer-1.0.2.tgz";
- sha512 = "71lZziiDnsuabfdYiUeWdCVyKuqwWi23L8YeIgV9jSSZHCtb6wB1BKWooH7L3tn4/FuZJMVWyNaIDr4RGmaSYw==";
- };
- };
- "http-signature-1.2.0" = {
- name = "http-signature";
- packageName = "http-signature";
- version = "1.2.0";
- src = fetchurl {
- url = "https://registry.npmjs.org/http-signature/-/http-signature-1.2.0.tgz";
- sha1 = "9aecd925114772f3d95b65a60abb8f7c18fbace1";
- };
- };
- "iconv-lite-0.4.24" = {
- name = "iconv-lite";
- packageName = "iconv-lite";
- version = "0.4.24";
- src = fetchurl {
- url = "https://registry.npmjs.org/iconv-lite/-/iconv-lite-0.4.24.tgz";
- sha512 = "v3MXnZAcvnywkTUEZomIActle7RXXeedOR31wwl7VlyoXO4Qi9arvSenNQWne1TcRwhCL1HwLI21bEqdpj8/rA==";
- };
- };
- "inquirer-6.2.0" = {
- name = "inquirer";
- packageName = "inquirer";
- version = "6.2.0";
- src = fetchurl {
- url = "https://registry.npmjs.org/inquirer/-/inquirer-6.2.0.tgz";
- sha512 = "QIEQG4YyQ2UYZGDC4srMZ7BjHOmNk1lR2JQj5UknBapklm6WHA+VVH7N+sUdX3A7NeCfGF8o4X1S3Ao7nAcIeg==";
- };
- };
- "is-fullwidth-code-point-2.0.0" = {
- name = "is-fullwidth-code-point";
- packageName = "is-fullwidth-code-point";
- version = "2.0.0";
- src = fetchurl {
- url = "https://registry.npmjs.org/is-fullwidth-code-point/-/is-fullwidth-code-point-2.0.0.tgz";
- sha1 = "a3b30a5c4f199183167aaab93beefae3ddfb654f";
- };
- };
- "is-promise-2.1.0" = {
- name = "is-promise";
- packageName = "is-promise";
- version = "2.1.0";
- src = fetchurl {
- url = "https://registry.npmjs.org/is-promise/-/is-promise-2.1.0.tgz";
- sha1 = "79a2a9ece7f096e80f36d2b2f3bc16c1ff4bf3fa";
- };
- };
- "is-typedarray-1.0.0" = {
- name = "is-typedarray";
- packageName = "is-typedarray";
- version = "1.0.0";
- src = fetchurl {
- url = "https://registry.npmjs.org/is-typedarray/-/is-typedarray-1.0.0.tgz";
- sha1 = "e479c80858df0c1b11ddda6940f96011fcda4a9a";
- };
- };
- "isstream-0.1.2" = {
- name = "isstream";
- packageName = "isstream";
- version = "0.1.2";
- src = fetchurl {
- url = "https://registry.npmjs.org/isstream/-/isstream-0.1.2.tgz";
- sha1 = "47e63f7af55afa6f92e1500e690eb8b8529c099a";
- };
- };
- "jsbn-0.1.1" = {
- name = "jsbn";
- packageName = "jsbn";
- version = "0.1.1";
- src = fetchurl {
- url = "https://registry.npmjs.org/jsbn/-/jsbn-0.1.1.tgz";
- sha1 = "a5e654c2e5a2deb5f201d96cefbca80c0ef2f513";
- };
- };
- "jsdom-13.2.0" = {
- name = "jsdom";
- packageName = "jsdom";
- version = "13.2.0";
- src = fetchurl {
- url = "https://registry.npmjs.org/jsdom/-/jsdom-13.2.0.tgz";
- sha512 = "cG1NtMWO9hWpqRNRR3dSvEQa8bFI6iLlqU2x4kwX51FQjp0qus8T9aBaAO6iGp3DeBrhdwuKxckknohkmfvsFw==";
- };
- };
- "json-schema-0.2.3" = {
- name = "json-schema";
- packageName = "json-schema";
- version = "0.2.3";
- src = fetchurl {
- url = "https://registry.npmjs.org/json-schema/-/json-schema-0.2.3.tgz";
- sha1 = "b480c892e59a2f05954ce727bd3f2a4e882f9e13";
- };
- };
- "json-schema-traverse-0.4.1" = {
- name = "json-schema-traverse";
- packageName = "json-schema-traverse";
- version = "0.4.1";
- src = fetchurl {
- url = "https://registry.npmjs.org/json-schema-traverse/-/json-schema-traverse-0.4.1.tgz";
- sha512 = "xbbCH5dCYU5T8LcEhhuh7HJ88HXuW3qsI3Y0zOZFKfZEHcpWiHU/Jxzk629Brsab/mMiHQti9wMP+845RPe3Vg==";
- };
- };
- "json-stringify-safe-5.0.1" = {
- name = "json-stringify-safe";
- packageName = "json-stringify-safe";
- version = "5.0.1";
- src = fetchurl {
- url = "https://registry.npmjs.org/json-stringify-safe/-/json-stringify-safe-5.0.1.tgz";
- sha1 = "1296a2d58fd45f19a0f6ce01d65701e2c735b6eb";
- };
- };
- "jsprim-1.4.1" = {
- name = "jsprim";
- packageName = "jsprim";
- version = "1.4.1";
- src = fetchurl {
- url = "https://registry.npmjs.org/jsprim/-/jsprim-1.4.1.tgz";
- sha1 = "313e66bc1e5cc06e438bc1b7499c2e5c56acb6a2";
- };
- };
- "levn-0.3.0" = {
- name = "levn";
- packageName = "levn";
- version = "0.3.0";
- src = fetchurl {
- url = "https://registry.npmjs.org/levn/-/levn-0.3.0.tgz";
- sha1 = "3b09924edf9f083c0490fdd4c0bc4421e04764ee";
- };
- };
- "lodash-4.17.15" = {
- name = "lodash";
- packageName = "lodash";
- version = "4.17.15";
- src = fetchurl {
- url = "https://registry.npmjs.org/lodash/-/lodash-4.17.15.tgz";
- sha512 = "8xOcRHvCjnocdS5cpwXQXVzmmh5e5+saE2QGoeQmbKmRS6J3VQppPOIt0MnmE+4xlZoumy0GPG0D0MVIQbNA1A==";
- };
- };
- "lodash.sortby-4.7.0" = {
- name = "lodash.sortby";
- packageName = "lodash.sortby";
- version = "4.7.0";
- src = fetchurl {
- url = "https://registry.npmjs.org/lodash.sortby/-/lodash.sortby-4.7.0.tgz";
- sha1 = "edd14c824e2cc9c1e0b0a1b42bb5210516a42438";
- };
- };
- "lowdb-1.0.0" = {
- name = "lowdb";
- packageName = "lowdb";
- version = "1.0.0";
- src = fetchurl {
- url = "https://registry.npmjs.org/lowdb/-/lowdb-1.0.0.tgz";
- sha512 = "2+x8esE/Wb9SQ1F9IHaYWfsC9FIecLOPrK4g17FGEayjUWH172H6nwicRovGvSE2CPZouc2MCIqCI7h9d+GftQ==";
- };
- };
- "lunr-2.3.3" = {
- name = "lunr";
- packageName = "lunr";
- version = "2.3.3";
- src = fetchurl {
- url = "https://registry.npmjs.org/lunr/-/lunr-2.3.3.tgz";
- sha512 = "rlAEsgU9Bnavca2w1WJ6+6cdeHMXNyadcersyk3ZpuhgWb5HBNj8l4WwJz9PjksAhYDlpQffCVXPctOn+wCIVA==";
- };
- };
- "mime-db-1.40.0" = {
- name = "mime-db";
- packageName = "mime-db";
- version = "1.40.0";
- src = fetchurl {
- url = "https://registry.npmjs.org/mime-db/-/mime-db-1.40.0.tgz";
- sha512 = "jYdeOMPy9vnxEqFRRo6ZvTZ8d9oPb+k18PKoYNYUe2stVEBPPwsln/qWzdbmaIvnhZ9v2P+CuecK+fpUfsV2mA==";
- };
- };
- "mime-types-2.1.24" = {
- name = "mime-types";
- packageName = "mime-types";
- version = "2.1.24";
- src = fetchurl {
- url = "https://registry.npmjs.org/mime-types/-/mime-types-2.1.24.tgz";
- sha512 = "WaFHS3MCl5fapm3oLxU4eYDw77IQM2ACcxQ9RIxfaC3ooc6PFuBMGZZsYpvoXS5D5QTWPieo1jjLdAm3TBP3cQ==";
- };
- };
- "mimic-fn-1.2.0" = {
- name = "mimic-fn";
- packageName = "mimic-fn";
- version = "1.2.0";
- src = fetchurl {
- url = "https://registry.npmjs.org/mimic-fn/-/mimic-fn-1.2.0.tgz";
- sha512 = "jf84uxzwiuiIVKiOLpfYk7N46TSy8ubTonmneY9vrpHNAnp0QBt2BxWV9dO3/j+BoVAb+a5G6YDPW3M5HOdMWQ==";
- };
- };
- "mute-stream-0.0.7" = {
- name = "mute-stream";
- packageName = "mute-stream";
- version = "0.0.7";
- src = fetchurl {
- url = "https://registry.npmjs.org/mute-stream/-/mute-stream-0.0.7.tgz";
- sha1 = "3075ce93bc21b8fab43e1bc4da7e8115ed1e7bab";
- };
- };
- "node-fetch-2.2.0" = {
- name = "node-fetch";
- packageName = "node-fetch";
- version = "2.2.0";
- src = fetchurl {
- url = "https://registry.npmjs.org/node-fetch/-/node-fetch-2.2.0.tgz";
- sha512 = "OayFWziIxiHY8bCUyLX6sTpDH8Jsbp4FfYd1j1f7vZyfgkcOnAyM4oQR16f8a0s7Gl/viMGRey8eScYk4V4EZA==";
- };
- };
- "node-forge-0.7.6" = {
- name = "node-forge";
- packageName = "node-forge";
- version = "0.7.6";
- src = fetchurl {
- url = "https://registry.npmjs.org/node-forge/-/node-forge-0.7.6.tgz";
- sha512 = "sol30LUpz1jQFBjOKwbjxijiE3b6pjd74YwfD0fJOKPjF+fONKb2Yg8rYgS6+bK6VDl+/wfr4IYpC7jDzLUIfw==";
- };
- };
- "nwsapi-2.1.4" = {
- name = "nwsapi";
- packageName = "nwsapi";
- version = "2.1.4";
- src = fetchurl {
- url = "https://registry.npmjs.org/nwsapi/-/nwsapi-2.1.4.tgz";
- sha512 = "iGfd9Y6SFdTNldEy2L0GUhcarIutFmk+MPWIn9dmj8NMIup03G08uUF2KGbbmv/Ux4RT0VZJoP/sVbWA6d/VIw==";
- };
- };
- "oauth-sign-0.9.0" = {
- name = "oauth-sign";
- packageName = "oauth-sign";
- version = "0.9.0";
- src = fetchurl {
- url = "https://registry.npmjs.org/oauth-sign/-/oauth-sign-0.9.0.tgz";
- sha512 = "fexhUFFPTGV8ybAtSIGbV6gOkSv8UtRbDBnAyLQw4QPKkgNlsH2ByPGtMUqdWkos6YCRmAqViwgZrJc/mRDzZQ==";
- };
- };
- "onetime-2.0.1" = {
- name = "onetime";
- packageName = "onetime";
- version = "2.0.1";
- src = fetchurl {
- url = "https://registry.npmjs.org/onetime/-/onetime-2.0.1.tgz";
- sha1 = "067428230fd67443b2794b22bba528b6867962d4";
- };
- };
- "optionator-0.8.2" = {
- name = "optionator";
- packageName = "optionator";
- version = "0.8.2";
- src = fetchurl {
- url = "https://registry.npmjs.org/optionator/-/optionator-0.8.2.tgz";
- sha1 = "364c5e409d3f4d6301d6c0b4c05bba50180aeb64";
- };
- };
- "os-tmpdir-1.0.2" = {
- name = "os-tmpdir";
- packageName = "os-tmpdir";
- version = "1.0.2";
- src = fetchurl {
- url = "https://registry.npmjs.org/os-tmpdir/-/os-tmpdir-1.0.2.tgz";
- sha1 = "bbe67406c79aa85c5cfec766fe5734555dfa1274";
- };
- };
- "papaparse-4.6.0" = {
- name = "papaparse";
- packageName = "papaparse";
- version = "4.6.0";
- src = fetchurl {
- url = "https://registry.npmjs.org/papaparse/-/papaparse-4.6.0.tgz";
- sha512 = "ylm8pmgyz9rkS3Ng/ru5tHUF3JxWwKYP0aZZWZ8eCGdSxoqgYiDUXLNQei73mUJOjHw8QNu5ZNCsLoDpkMA6sg==";
- };
- };
- "parse5-5.1.0" = {
- name = "parse5";
- packageName = "parse5";
- version = "5.1.0";
- src = fetchurl {
- url = "https://registry.npmjs.org/parse5/-/parse5-5.1.0.tgz";
- sha512 = "fxNG2sQjHvlVAYmzBZS9YlDp6PTSSDwa98vkD4QgVDDCAo84z5X1t5XyJQ62ImdLXx5NdIIfihey6xpum9/gRQ==";
- };
- };
- "performance-now-2.1.0" = {
- name = "performance-now";
- packageName = "performance-now";
- version = "2.1.0";
- src = fetchurl {
- url = "https://registry.npmjs.org/performance-now/-/performance-now-2.1.0.tgz";
- sha1 = "6309f4e0e5fa913ec1c69307ae364b4b377c9e7b";
- };
- };
- "pify-3.0.0" = {
- name = "pify";
- packageName = "pify";
- version = "3.0.0";
- src = fetchurl {
- url = "https://registry.npmjs.org/pify/-/pify-3.0.0.tgz";
- sha1 = "e5a4acd2c101fdf3d9a4d07f0dbc4db49dd28176";
- };
- };
- "pn-1.1.0" = {
- name = "pn";
- packageName = "pn";
- version = "1.1.0";
- src = fetchurl {
- url = "https://registry.npmjs.org/pn/-/pn-1.1.0.tgz";
- sha512 = "2qHaIQr2VLRFoxe2nASzsV6ef4yOOH+Fi9FBOVH6cqeSgUnoyySPZkxzLuzd+RYOQTRpROA0ztTMqxROKSb/nA==";
- };
- };
- "prelude-ls-1.1.2" = {
- name = "prelude-ls";
- packageName = "prelude-ls";
- version = "1.1.2";
- src = fetchurl {
- url = "https://registry.npmjs.org/prelude-ls/-/prelude-ls-1.1.2.tgz";
- sha1 = "21932a549f5e52ffd9a827f570e04be62a97da54";
- };
- };
- "psl-1.3.0" = {
- name = "psl";
- packageName = "psl";
- version = "1.3.0";
- src = fetchurl {
- url = "https://registry.npmjs.org/psl/-/psl-1.3.0.tgz";
- sha512 = "avHdspHO+9rQTLbv1RO+MPYeP/SzsCoxofjVnHanETfQhTJrmB0HlDoW+EiN/R+C0BZ+gERab9NY0lPN2TxNag==";
- };
- };
- "punycode-1.4.1" = {
- name = "punycode";
- packageName = "punycode";
- version = "1.4.1";
- src = fetchurl {
- url = "https://registry.npmjs.org/punycode/-/punycode-1.4.1.tgz";
- sha1 = "c0d5a63b2718800ad8e1eb0fa5269c84dd41845e";
- };
- };
- "punycode-2.1.1" = {
- name = "punycode";
- packageName = "punycode";
- version = "2.1.1";
- src = fetchurl {
- url = "https://registry.npmjs.org/punycode/-/punycode-2.1.1.tgz";
- sha512 = "XRsRjdf+j5ml+y/6GKHPZbrF/8p2Yga0JPtdqTIY2Xe5ohJPD9saDJJLPvp9+NSBprVvevdXZybnj2cv8OEd0A==";
- };
- };
- "qs-6.5.2" = {
- name = "qs";
- packageName = "qs";
- version = "6.5.2";
- src = fetchurl {
- url = "https://registry.npmjs.org/qs/-/qs-6.5.2.tgz";
- sha512 = "N5ZAX4/LxJmF+7wN74pUD6qAh9/wnvdQcjq9TZjevvXzSUo7bfmw91saqMjzGS2xq91/odN2dW/WOl7qQHNDGA==";
- };
- };
- "request-2.88.0" = {
- name = "request";
- packageName = "request";
- version = "2.88.0";
- src = fetchurl {
- url = "https://registry.npmjs.org/request/-/request-2.88.0.tgz";
- sha512 = "NAqBSrijGLZdM0WZNsInLJpkJokL72XYjUpnB0iwsRgxh7dB6COrHnTBNwN0E+lHDAJzu7kLAkDeY08z2/A0hg==";
- };
- };
- "request-promise-core-1.1.2" = {
- name = "request-promise-core";
- packageName = "request-promise-core";
- version = "1.1.2";
- src = fetchurl {
- url = "https://registry.npmjs.org/request-promise-core/-/request-promise-core-1.1.2.tgz";
- sha512 = "UHYyq1MO8GsefGEt7EprS8UrXsm1TxEvFUX1IMTuSLU2Rh7fTIdFtl8xD7JiEYiWU2dl+NYAjCTksTehQUxPag==";
- };
- };
- "request-promise-native-1.0.7" = {
- name = "request-promise-native";
- packageName = "request-promise-native";
- version = "1.0.7";
- src = fetchurl {
- url = "https://registry.npmjs.org/request-promise-native/-/request-promise-native-1.0.7.tgz";
- sha512 = "rIMnbBdgNViL37nZ1b3L/VfPOpSi0TqVDQPAvO6U14lMzOLrt5nilxCQqtDKhZeDiW0/hkCXGoQjhgJd/tCh6w==";
- };
- };
- "restore-cursor-2.0.0" = {
- name = "restore-cursor";
- packageName = "restore-cursor";
- version = "2.0.0";
- src = fetchurl {
- url = "https://registry.npmjs.org/restore-cursor/-/restore-cursor-2.0.0.tgz";
- sha1 = "9f7ee287f82fd326d4fd162923d62129eee0dfaf";
- };
- };
- "run-async-2.3.0" = {
- name = "run-async";
- packageName = "run-async";
- version = "2.3.0";
- src = fetchurl {
- url = "https://registry.npmjs.org/run-async/-/run-async-2.3.0.tgz";
- sha1 = "0371ab4ae0bdd720d4166d7dfda64ff7a445a6c0";
- };
- };
- "rxjs-6.5.2" = {
- name = "rxjs";
- packageName = "rxjs";
- version = "6.5.2";
- src = fetchurl {
- url = "https://registry.npmjs.org/rxjs/-/rxjs-6.5.2.tgz";
- sha512 = "HUb7j3kvb7p7eCUHE3FqjoDsC1xfZQ4AHFWfTKSpZ+sAhhz5X1WX0ZuUqWbzB2QhSLp3DoLUG+hMdEDKqWo2Zg==";
- };
- };
- "safe-buffer-5.2.0" = {
- name = "safe-buffer";
- packageName = "safe-buffer";
- version = "5.2.0";
- src = fetchurl {
- url = "https://registry.npmjs.org/safe-buffer/-/safe-buffer-5.2.0.tgz";
- sha512 = "fZEwUGbVl7kouZs1jCdMLdt95hdIv0ZeHg6L7qPeciMZhZ+/gdesW4wgTARkrFWEpspjEATAzUGPG8N2jJiwbg==";
- };
- };
- "safer-buffer-2.1.2" = {
- name = "safer-buffer";
- packageName = "safer-buffer";
- version = "2.1.2";
- src = fetchurl {
- url = "https://registry.npmjs.org/safer-buffer/-/safer-buffer-2.1.2.tgz";
- sha512 = "YZo3K82SD7Riyi0E1EQPojLz7kpepnSQI9IyPbHHg1XXXevb5dJI7tpyN2ADxGcQbHG7vcyRHk0cbwqcQriUtg==";
- };
- };
- "saxes-3.1.11" = {
- name = "saxes";
- packageName = "saxes";
- version = "3.1.11";
- src = fetchurl {
- url = "https://registry.npmjs.org/saxes/-/saxes-3.1.11.tgz";
- sha512 = "Ydydq3zC+WYDJK1+gRxRapLIED9PWeSuuS41wqyoRmzvhhh9nc+QQrVMKJYzJFULazeGhzSV0QleN2wD3boh2g==";
- };
- };
- "signal-exit-3.0.2" = {
- name = "signal-exit";
- packageName = "signal-exit";
- version = "3.0.2";
- src = fetchurl {
- url = "https://registry.npmjs.org/signal-exit/-/signal-exit-3.0.2.tgz";
- sha1 = "b5fdc08f1287ea1178628e415e25132b73646c6d";
- };
- };
- "source-map-0.6.1" = {
- name = "source-map";
- packageName = "source-map";
- version = "0.6.1";
- src = fetchurl {
- url = "https://registry.npmjs.org/source-map/-/source-map-0.6.1.tgz";
- sha512 = "UjgapumWlbMhkBgzT7Ykc5YXUT46F0iKu8SGXq0bcwP5dz/h0Plj6enJqjz1Zbq2l5WaqYnrVbwWOWMyF3F47g==";
- };
- };
- "sshpk-1.16.1" = {
- name = "sshpk";
- packageName = "sshpk";
- version = "1.16.1";
- src = fetchurl {
- url = "https://registry.npmjs.org/sshpk/-/sshpk-1.16.1.tgz";
- sha512 = "HXXqVUq7+pcKeLqqZj6mHFUMvXtOJt1uoUx09pFW6011inTMxqI8BA8PM95myrIyyKwdnzjdFjLiE6KBPVtJIg==";
- };
- };
- "stealthy-require-1.1.1" = {
- name = "stealthy-require";
- packageName = "stealthy-require";
- version = "1.1.1";
- src = fetchurl {
- url = "https://registry.npmjs.org/stealthy-require/-/stealthy-require-1.1.1.tgz";
- sha1 = "35b09875b4ff49f26a777e509b3090a3226bf24b";
- };
- };
- "steno-0.4.4" = {
- name = "steno";
- packageName = "steno";
- version = "0.4.4";
- src = fetchurl {
- url = "https://registry.npmjs.org/steno/-/steno-0.4.4.tgz";
- sha1 = "071105bdfc286e6615c0403c27e9d7b5dcb855cb";
- };
- };
- "string-width-2.1.1" = {
- name = "string-width";
- packageName = "string-width";
- version = "2.1.1";
- src = fetchurl {
- url = "https://registry.npmjs.org/string-width/-/string-width-2.1.1.tgz";
- sha512 = "nOqH59deCq9SRHlxq1Aw85Jnt4w6KvLKqWVik6oA9ZklXLNIOlqg4F2yrT1MVaTjAqvVwdfeZ7w7aCvJD7ugkw==";
- };
- };
- "strip-ansi-4.0.0" = {
- name = "strip-ansi";
- packageName = "strip-ansi";
- version = "4.0.0";
- src = fetchurl {
- url = "https://registry.npmjs.org/strip-ansi/-/strip-ansi-4.0.0.tgz";
- sha1 = "a8479022eb1ac368a871389b635262c505ee368f";
- };
- };
- "supports-color-5.5.0" = {
- name = "supports-color";
- packageName = "supports-color";
- version = "5.5.0";
- src = fetchurl {
- url = "https://registry.npmjs.org/supports-color/-/supports-color-5.5.0.tgz";
- sha512 = "QjVjwdXIt408MIiAqCX4oUKsgU2EqAGzs2Ppkm4aQYbjm+ZEWEcW4SfFNTr4uMNZma0ey4f5lgLrkB0aX0QMow==";
- };
- };
- "symbol-tree-3.2.4" = {
- name = "symbol-tree";
- packageName = "symbol-tree";
- version = "3.2.4";
- src = fetchurl {
- url = "https://registry.npmjs.org/symbol-tree/-/symbol-tree-3.2.4.tgz";
- sha512 = "9QNk5KwDF+Bvz+PyObkmSYjI5ksVUYtjW7AU22r2NKcfLJcXp96hkDWU3+XndOsUb+AQ9QhfzfCT2O+CNWT5Tw==";
- };
- };
- "through-2.3.8" = {
- name = "through";
- packageName = "through";
- version = "2.3.8";
- src = fetchurl {
- url = "https://registry.npmjs.org/through/-/through-2.3.8.tgz";
- sha1 = "0dd4c9ffaabc357960b1b724115d7e0e86a2e1f5";
- };
- };
- "tldjs-2.3.1" = {
- name = "tldjs";
- packageName = "tldjs";
- version = "2.3.1";
- src = fetchurl {
- url = "https://registry.npmjs.org/tldjs/-/tldjs-2.3.1.tgz";
- sha512 = "W/YVH/QczLUxVjnQhFC61Iq232NWu3TqDdO0S/MtXVz4xybejBov4ud+CIwN9aYqjOecEqIy0PscGkwpG9ZyTw==";
- };
- };
- "tmp-0.0.33" = {
- name = "tmp";
- packageName = "tmp";
- version = "0.0.33";
- src = fetchurl {
- url = "https://registry.npmjs.org/tmp/-/tmp-0.0.33.tgz";
- sha512 = "jRCJlojKnZ3addtTOjdIqoRuPEKBvNXcGYqzO6zWZX8KfKEpnGY5jfggJQ3EjKuu8D4bJRr0y+cYJFmYbImXGw==";
- };
- };
- "tough-cookie-2.4.3" = {
- name = "tough-cookie";
- packageName = "tough-cookie";
- version = "2.4.3";
- src = fetchurl {
- url = "https://registry.npmjs.org/tough-cookie/-/tough-cookie-2.4.3.tgz";
- sha512 = "Q5srk/4vDM54WJsJio3XNn6K2sCG+CQ8G5Wz6bZhRZoAe/+TxjWB/GlFAnYEbkYVlON9FMk/fE3h2RLpPXo4lQ==";
- };
- };
- "tough-cookie-2.5.0" = {
- name = "tough-cookie";
- packageName = "tough-cookie";
- version = "2.5.0";
- src = fetchurl {
- url = "https://registry.npmjs.org/tough-cookie/-/tough-cookie-2.5.0.tgz";
- sha512 = "nlLsUzgm1kfLXSXfRZMc1KLAugd4hqJHDTvc2hDIwS3mZAfMEuMbc03SujMF+GEcpaX/qboeycw6iO8JwVv2+g==";
- };
- };
- "tr46-1.0.1" = {
- name = "tr46";
- packageName = "tr46";
- version = "1.0.1";
- src = fetchurl {
- url = "https://registry.npmjs.org/tr46/-/tr46-1.0.1.tgz";
- sha1 = "a8b13fd6bfd2489519674ccde55ba3693b706d09";
- };
- };
- "tslib-1.10.0" = {
- name = "tslib";
- packageName = "tslib";
- version = "1.10.0";
- src = fetchurl {
- url = "https://registry.npmjs.org/tslib/-/tslib-1.10.0.tgz";
- sha512 = "qOebF53frne81cf0S9B41ByenJ3/IuH8yJKngAX35CmiZySA0khhkovshKK+jGCaMnVomla7gVlIcc3EvKPbTQ==";
- };
- };
- "tunnel-agent-0.6.0" = {
- name = "tunnel-agent";
- packageName = "tunnel-agent";
- version = "0.6.0";
- src = fetchurl {
- url = "https://registry.npmjs.org/tunnel-agent/-/tunnel-agent-0.6.0.tgz";
- sha1 = "27a5dea06b36b04a0a9966774b290868f0fc40fd";
- };
- };
- "tweetnacl-0.14.5" = {
- name = "tweetnacl";
- packageName = "tweetnacl";
- version = "0.14.5";
- src = fetchurl {
- url = "https://registry.npmjs.org/tweetnacl/-/tweetnacl-0.14.5.tgz";
- sha1 = "5ae68177f192d4456269d108afa93ff8743f4f64";
- };
- };
- "type-check-0.3.2" = {
- name = "type-check";
- packageName = "type-check";
- version = "0.3.2";
- src = fetchurl {
- url = "https://registry.npmjs.org/type-check/-/type-check-0.3.2.tgz";
- sha1 = "5884cab512cf1d355e3fb784f30804b2b520db72";
- };
- };
- "uri-js-4.2.2" = {
- name = "uri-js";
- packageName = "uri-js";
- version = "4.2.2";
- src = fetchurl {
- url = "https://registry.npmjs.org/uri-js/-/uri-js-4.2.2.tgz";
- sha512 = "KY9Frmirql91X2Qgjry0Wd4Y+YTdrdZheS8TFwvkbLWf/G5KNJDCh6pKL5OZctEW4+0Baa5idK2ZQuELRwPznQ==";
- };
- };
- "uuid-3.3.2" = {
- name = "uuid";
- packageName = "uuid";
- version = "3.3.2";
- src = fetchurl {
- url = "https://registry.npmjs.org/uuid/-/uuid-3.3.2.tgz";
- sha512 = "yXJmeNaw3DnnKAOKJE51sL/ZaYfWJRl1pK9dr19YFCu0ObS231AB1/LbqTKRAQ5kw8A90rA6fr4riOUpTZvQZA==";
- };
- };
- "verror-1.10.0" = {
- name = "verror";
- packageName = "verror";
- version = "1.10.0";
- src = fetchurl {
- url = "https://registry.npmjs.org/verror/-/verror-1.10.0.tgz";
- sha1 = "3a105ca17053af55d6e270c1f8288682e18da400";
- };
- };
- "w3c-hr-time-1.0.1" = {
- name = "w3c-hr-time";
- packageName = "w3c-hr-time";
- version = "1.0.1";
- src = fetchurl {
- url = "https://registry.npmjs.org/w3c-hr-time/-/w3c-hr-time-1.0.1.tgz";
- sha1 = "82ac2bff63d950ea9e3189a58a65625fedf19045";
- };
- };
- "w3c-xmlserializer-1.1.2" = {
- name = "w3c-xmlserializer";
- packageName = "w3c-xmlserializer";
- version = "1.1.2";
- src = fetchurl {
- url = "https://registry.npmjs.org/w3c-xmlserializer/-/w3c-xmlserializer-1.1.2.tgz";
- sha512 = "p10l/ayESzrBMYWRID6xbuCKh2Fp77+sA0doRuGn4tTIMrrZVeqfpKjXHY+oDh3K4nLdPgNwMTVP6Vp4pvqbNg==";
- };
- };
- "webidl-conversions-4.0.2" = {
- name = "webidl-conversions";
- packageName = "webidl-conversions";
- version = "4.0.2";
- src = fetchurl {
- url = "https://registry.npmjs.org/webidl-conversions/-/webidl-conversions-4.0.2.tgz";
- sha512 = "YQ+BmxuTgd6UXZW3+ICGfyqRyHXVlD5GtQr5+qjiNW7bF0cqrzX500HVXPBOvgXb5YnzDd+h0zqyv61KUD7+Sg==";
- };
- };
- "whatwg-encoding-1.0.5" = {
- name = "whatwg-encoding";
- packageName = "whatwg-encoding";
- version = "1.0.5";
- src = fetchurl {
- url = "https://registry.npmjs.org/whatwg-encoding/-/whatwg-encoding-1.0.5.tgz";
- sha512 = "b5lim54JOPN9HtzvK9HFXvBma/rnfFeqsic0hSpjtDbVxR3dJKLc+KB4V6GgiGOvl7CY/KNh8rxSo9DKQrnUEw==";
- };
- };
- "whatwg-mimetype-2.3.0" = {
- name = "whatwg-mimetype";
- packageName = "whatwg-mimetype";
- version = "2.3.0";
- src = fetchurl {
- url = "https://registry.npmjs.org/whatwg-mimetype/-/whatwg-mimetype-2.3.0.tgz";
- sha512 = "M4yMwr6mAnQz76TbJm914+gPpB/nCwvZbJU28cUD6dR004SAxDLOOSUaB1JDRqLtaOV/vi0IC5lEAGFgrjGv/g==";
- };
- };
- "whatwg-url-7.0.0" = {
- name = "whatwg-url";
- packageName = "whatwg-url";
- version = "7.0.0";
- src = fetchurl {
- url = "https://registry.npmjs.org/whatwg-url/-/whatwg-url-7.0.0.tgz";
- sha512 = "37GeVSIJ3kn1JgKyjiYNmSLP1yzbpb29jdmwBSgkD9h40/hyrR/OifpVUndji3tmwGgD8qpw7iQu3RSbCrBpsQ==";
- };
- };
- "wordwrap-1.0.0" = {
- name = "wordwrap";
- packageName = "wordwrap";
- version = "1.0.0";
- src = fetchurl {
- url = "https://registry.npmjs.org/wordwrap/-/wordwrap-1.0.0.tgz";
- sha1 = "27584810891456a4171c8d0226441ade90cbcaeb";
- };
- };
- "ws-6.2.1" = {
- name = "ws";
- packageName = "ws";
- version = "6.2.1";
- src = fetchurl {
- url = "https://registry.npmjs.org/ws/-/ws-6.2.1.tgz";
- sha512 = "GIyAXC2cB7LjvpgMt9EKS2ldqr0MTrORaleiOno6TweZ6r3TKtoFQWay/2PceJ3RuBasOHzXNn5Lrw1X0bEjqA==";
- };
- };
- "xml-name-validator-3.0.0" = {
- name = "xml-name-validator";
- packageName = "xml-name-validator";
- version = "3.0.0";
- src = fetchurl {
- url = "https://registry.npmjs.org/xml-name-validator/-/xml-name-validator-3.0.0.tgz";
- sha512 = "A5CUptxDsvxKJEU3yO6DuWBSJz/qizqzJKOMIfUJHETbBw/sFaDxgd6fxm1ewUaM0jZ444Fc5vC5ROYurg/4Pw==";
- };
- };
- "xmlchars-2.1.1" = {
- name = "xmlchars";
- packageName = "xmlchars";
- version = "2.1.1";
- src = fetchurl {
- url = "https://registry.npmjs.org/xmlchars/-/xmlchars-2.1.1.tgz";
- sha512 = "7hew1RPJ1iIuje/Y01bGD/mXokXxegAgVS+e+E0wSi2ILHQkYAH1+JXARwTjZSM4Z4Z+c73aKspEcqj+zPPL/w==";
- };
- };
- "zxcvbn-4.4.2" = {
- name = "zxcvbn";
- packageName = "zxcvbn";
- version = "4.4.2";
- src = fetchurl {
- url = "https://registry.npmjs.org/zxcvbn/-/zxcvbn-4.4.2.tgz";
- sha1 = "28ec17cf09743edcab056ddd8b1b06262cc73c30";
- };
- };
- };
-in
-{
- "@bitwarden/cli" = nodeEnv.buildNodePackage {
- name = "_at_bitwarden_slash_cli";
- packageName = "@bitwarden/cli";
- version = "1.7.4";
- src = fetchurl {
- url = "https://registry.npmjs.org/@bitwarden/cli/-/cli-1.7.4.tgz";
- sha512 = "WCYARJaSpcItFvxPFdRXTO9s26HbYFazL3wSlZ7HuL4tiML/7AfPD4wO3J7fgBn1ghU5NGJ7YZIL+oPmiuw6+Q==";
- };
- dependencies = [
- sources."abab-2.0.0"
- sources."acorn-6.2.1"
- sources."acorn-globals-4.3.2"
- sources."acorn-walk-6.2.0"
- sources."ajv-6.10.2"
- sources."ansi-escapes-3.2.0"
- sources."ansi-regex-3.0.0"
- sources."ansi-styles-3.2.1"
- sources."array-equal-1.0.0"
- sources."asn1-0.2.4"
- sources."assert-plus-1.0.0"
- sources."async-limiter-1.0.0"
- sources."asynckit-0.4.0"
- sources."aws-sign2-0.7.0"
- sources."aws4-1.8.0"
- sources."bcrypt-pbkdf-1.0.2"
- sources."big-integer-1.6.36"
- sources."browser-process-hrtime-0.1.3"
- sources."caseless-0.12.0"
- sources."chalk-2.4.1"
- sources."chardet-0.7.0"
- sources."cli-cursor-2.1.0"
- sources."cli-width-2.2.0"
- sources."color-convert-1.9.3"
- sources."color-name-1.1.3"
- sources."combined-stream-1.0.6"
- sources."commander-2.18.0"
- sources."core-util-is-1.0.2"
- sources."cssom-0.3.8"
- sources."cssstyle-1.4.0"
- sources."dashdash-1.14.1"
- sources."data-urls-1.1.0"
- sources."deep-is-0.1.3"
- sources."delayed-stream-1.0.0"
- sources."domexception-1.0.1"
- sources."ecc-jsbn-0.1.2"
- sources."escape-string-regexp-1.0.5"
- sources."escodegen-1.11.1"
- sources."esprima-3.1.3"
- sources."estraverse-4.2.0"
- sources."esutils-2.0.3"
- sources."extend-3.0.2"
- sources."external-editor-3.1.0"
- sources."extsprintf-1.3.0"
- sources."fast-deep-equal-2.0.1"
- sources."fast-json-stable-stringify-2.0.0"
- sources."fast-levenshtein-2.0.6"
- sources."figures-2.0.0"
- sources."forever-agent-0.6.1"
- sources."form-data-2.3.2"
- sources."getpass-0.1.7"
- sources."graceful-fs-4.2.0"
- sources."har-schema-2.0.0"
- sources."har-validator-5.1.3"
- sources."has-flag-3.0.0"
- sources."html-encoding-sniffer-1.0.2"
- sources."http-signature-1.2.0"
- sources."iconv-lite-0.4.24"
- sources."inquirer-6.2.0"
- sources."is-fullwidth-code-point-2.0.0"
- sources."is-promise-2.1.0"
- sources."is-typedarray-1.0.0"
- sources."isstream-0.1.2"
- sources."jsbn-0.1.1"
- sources."jsdom-13.2.0"
- sources."json-schema-0.2.3"
- sources."json-schema-traverse-0.4.1"
- sources."json-stringify-safe-5.0.1"
- sources."jsprim-1.4.1"
- sources."levn-0.3.0"
- sources."lodash-4.17.15"
- sources."lodash.sortby-4.7.0"
- sources."lowdb-1.0.0"
- sources."lunr-2.3.3"
- sources."mime-db-1.40.0"
- sources."mime-types-2.1.24"
- sources."mimic-fn-1.2.0"
- sources."mute-stream-0.0.7"
- sources."node-fetch-2.2.0"
- sources."node-forge-0.7.6"
- sources."nwsapi-2.1.4"
- sources."oauth-sign-0.9.0"
- sources."onetime-2.0.1"
- sources."optionator-0.8.2"
- sources."os-tmpdir-1.0.2"
- sources."papaparse-4.6.0"
- sources."parse5-5.1.0"
- sources."performance-now-2.1.0"
- sources."pify-3.0.0"
- sources."pn-1.1.0"
- sources."prelude-ls-1.1.2"
- sources."psl-1.3.0"
- sources."punycode-2.1.1"
- sources."qs-6.5.2"
- (sources."request-2.88.0" // {
- dependencies = [
- sources."punycode-1.4.1"
- sources."tough-cookie-2.4.3"
- ];
- })
- sources."request-promise-core-1.1.2"
- sources."request-promise-native-1.0.7"
- sources."restore-cursor-2.0.0"
- sources."run-async-2.3.0"
- sources."rxjs-6.5.2"
- sources."safe-buffer-5.2.0"
- sources."safer-buffer-2.1.2"
- sources."saxes-3.1.11"
- sources."signal-exit-3.0.2"
- sources."source-map-0.6.1"
- sources."sshpk-1.16.1"
- sources."stealthy-require-1.1.1"
- sources."steno-0.4.4"
- sources."string-width-2.1.1"
- sources."strip-ansi-4.0.0"
- sources."supports-color-5.5.0"
- sources."symbol-tree-3.2.4"
- sources."through-2.3.8"
- (sources."tldjs-2.3.1" // {
- dependencies = [
- sources."punycode-1.4.1"
- ];
- })
- sources."tmp-0.0.33"
- sources."tough-cookie-2.5.0"
- sources."tr46-1.0.1"
- sources."tslib-1.10.0"
- sources."tunnel-agent-0.6.0"
- sources."tweetnacl-0.14.5"
- sources."type-check-0.3.2"
- sources."uri-js-4.2.2"
- sources."uuid-3.3.2"
- sources."verror-1.10.0"
- sources."w3c-hr-time-1.0.1"
- sources."w3c-xmlserializer-1.1.2"
- sources."webidl-conversions-4.0.2"
- sources."whatwg-encoding-1.0.5"
- sources."whatwg-mimetype-2.3.0"
- sources."whatwg-url-7.0.0"
- sources."wordwrap-1.0.0"
- sources."ws-6.2.1"
- sources."xml-name-validator-3.0.0"
- sources."xmlchars-2.1.1"
- sources."zxcvbn-4.4.2"
- ];
- buildInputs = globalBuildInputs;
- meta = {
- description = "A secure and free password manager for all of your devices.";
- homepage = https://bitwarden.com/;
- license = "GPL-3.0";
- };
- production = true;
- bypassCache = true;
- reconstructLock = true;
- };
-} \ No newline at end of file
diff --git a/nixpkgs/pkgs/tools/security/bitwarden-cli/node-packages.json b/nixpkgs/pkgs/tools/security/bitwarden-cli/node-packages.json
deleted file mode 100644
index 624aa87bcbe..00000000000
--- a/nixpkgs/pkgs/tools/security/bitwarden-cli/node-packages.json
+++ /dev/null
@@ -1,3 +0,0 @@
-[
- "@bitwarden/cli"
-]
diff --git a/nixpkgs/pkgs/tools/security/bitwarden-cli/node-packages.nix b/nixpkgs/pkgs/tools/security/bitwarden-cli/node-packages.nix
deleted file mode 100644
index 66560873b4c..00000000000
--- a/nixpkgs/pkgs/tools/security/bitwarden-cli/node-packages.nix
+++ /dev/null
@@ -1,17 +0,0 @@
-# This file has been generated by node2nix 1.7.0. Do not edit!
-
-{pkgs ? import <nixpkgs> {
- inherit system;
- }, system ? builtins.currentSystem, nodejs ? pkgs.nodejs-10_x}:
-
-let
- nodeEnv = import ../../../development/node-packages/node-env.nix {
- inherit (pkgs) stdenv python2 utillinux runCommand writeTextFile;
- inherit nodejs;
- libtool = if pkgs.stdenv.isDarwin then pkgs.darwin.cctools else null;
- };
-in
-import ./node-packages-generated.nix {
- inherit (pkgs) fetchurl fetchgit;
- inherit nodeEnv;
-} \ No newline at end of file
diff --git a/nixpkgs/pkgs/tools/security/bruteforce-luks/default.nix b/nixpkgs/pkgs/tools/security/bruteforce-luks/default.nix
index 0c650781bda..cfa27a5c686 100644
--- a/nixpkgs/pkgs/tools/security/bruteforce-luks/default.nix
+++ b/nixpkgs/pkgs/tools/security/bruteforce-luks/default.nix
@@ -2,10 +2,10 @@
stdenv.mkDerivation rec {
pname = "bruteforce-luks";
- version = "1.3.2";
+ version = "1.4.0";
src = fetchFromGitHub {
- sha256 = "0ws5bm5pczhvqrlhl60h8a9rdwk6xlh9wr5ndnkyxvv7m90qpy9b";
+ sha256 = "0yyrda077avdapq1mvavgv5mvj2r94d6p01q56bbnaq4a3h5kfd6";
rev = version;
repo = "bruteforce-luks";
owner = "glv2";
diff --git a/nixpkgs/pkgs/tools/security/chaps/default.nix b/nixpkgs/pkgs/tools/security/chaps/default.nix
index e81567c3ed8..c8ee9506968 100644
--- a/nixpkgs/pkgs/tools/security/chaps/default.nix
+++ b/nixpkgs/pkgs/tools/security/chaps/default.nix
@@ -1,9 +1,10 @@
-{ stdenv, fetchgit, fetchurl, trousers, leveldb, unzip, scons, pkgconfig
-, glib, dbus_cplusplus, dbus, protobuf, openssl, snappy, pam }:
+{ stdenv, fetchFromGitiles, fetchFromGitHub, fetchurl, trousers, leveldb, unzip
+, scons, pkgconfig, glib, dbus_cplusplus, dbus, protobuf, openssl, snappy, pam
+}:
let
- src_chromebase = fetchgit {
- url = "https://chromium.googlesource.com/chromium/src/base.git";
+ src_chromebase = fetchFromGitiles {
+ url = "https://chromium.googlesource.com/chromium/src/base";
rev = "2dfe404711e15e24e79799516400c61b2719d7af";
sha256 = "2bd93a3ace4b6767db2c1bd1e16f426c97b8d2133a9cb15f8372b2516cfa65c5";
};
@@ -13,7 +14,7 @@ let
sha256 = "0nq98cpnv2jsx2byp4ilam6kydcnziflkc16ikydajmp4mcvpz16";
};
- src_platform2 = fetchgit {
+ src_platform2 = fetchFromGitiles {
url = "https://chromium.googlesource.com/chromiumos/platform2";
rev = "e999e989eaa71c3db7314fc7b4e20829b2b5473b";
sha256 = "15n1bsv6r7cny7arx0hdb223xzzbk7vkxg2r7xajhl4nsj39adjh";
@@ -25,8 +26,9 @@ stdenv.mkDerivation rec {
name = "chaps-0.42-6812";
version = "0.42-6812";
- src = fetchgit {
- url = "https://github.com/google/chaps-linux";
+ src = fetchFromGitHub {
+ owner = "google";
+ repo = "chaps-linux";
rev = "989aadc45cdb216ca35b0c97d13fc691576fa1d7";
sha256 = "0chk6pnn365d5kcz6vfqx1d0383ksk97icc0lzg0vvb0kvyj0ff1";
};
diff --git a/nixpkgs/pkgs/tools/security/crunch/default.nix b/nixpkgs/pkgs/tools/security/crunch/default.nix
index 57943a31406..259ee38c68f 100644
--- a/nixpkgs/pkgs/tools/security/crunch/default.nix
+++ b/nixpkgs/pkgs/tools/security/crunch/default.nix
@@ -18,7 +18,7 @@ stdenv.mkDerivation rec {
--replace 'sudo ' ""
'';
- makeFlags = "PREFIX=$(out)";
+ makeFlags = [ "PREFIX=$(out)" ];
meta = with stdenv.lib; {
description = "Wordlist generator";
diff --git a/nixpkgs/pkgs/tools/security/enchive/default.nix b/nixpkgs/pkgs/tools/security/enchive/default.nix
index baada40a6cb..7e45ab76ed0 100644
--- a/nixpkgs/pkgs/tools/security/enchive/default.nix
+++ b/nixpkgs/pkgs/tools/security/enchive/default.nix
@@ -2,12 +2,12 @@
stdenv.mkDerivation rec {
pname = "enchive";
- version = "3.4";
+ version = "3.5";
src = fetchFromGitHub {
owner = "skeeto";
repo = "enchive";
rev = version;
- sha256 = "0ssxbnsjx4mvaqimp5nzfixpxinhmi12z8lxdd8cj2361wbb54yk";
+ sha256 = "0fdrfc5l42lj2bvmv9dmkmhmm7qiszwk7cmdvnqad3fs7652g0qa";
};
makeFlags = ["PREFIX=$(out)"];
diff --git a/nixpkgs/pkgs/tools/security/enpass/default.nix b/nixpkgs/pkgs/tools/security/enpass/default.nix
index 3cb5c1163e5..6e61f054122 100644
--- a/nixpkgs/pkgs/tools/security/enpass/default.nix
+++ b/nixpkgs/pkgs/tools/security/enpass/default.nix
@@ -1,5 +1,5 @@
{ stdenv, fetchurl, dpkg, xorg
-, glib, libGLU_combined, libpulseaudio, zlib, dbus, fontconfig, freetype
+, glib, libGLU, libGL, libpulseaudio, zlib, dbus, fontconfig, freetype
, gtk3, pango
, makeWrapper , python2Packages, lib
, lsof, curl, libuuid, cups, mesa
@@ -19,7 +19,7 @@ let
# used of both wrappers and libpath
libPath = lib.makeLibraryPath (with xorg; [
mesa.drivers
- libGLU_combined
+ libGLU libGL
fontconfig
freetype
libpulseaudio
diff --git a/nixpkgs/pkgs/tools/security/fail2ban/default.nix b/nixpkgs/pkgs/tools/security/fail2ban/default.nix
index 324ac46b084..5ea91854282 100644
--- a/nixpkgs/pkgs/tools/security/fail2ban/default.nix
+++ b/nixpkgs/pkgs/tools/security/fail2ban/default.nix
@@ -1,8 +1,8 @@
-{ stdenv, fetchFromGitHub, python, pythonPackages, gamin }:
+{ stdenv, fetchFromGitHub, fetchpatch, python3, gamin }:
let version = "0.10.4"; in
-pythonPackages.buildPythonApplication {
+python3.pkgs.buildPythonApplication {
pname = "fail2ban";
inherit version;
@@ -13,8 +13,19 @@ pythonPackages.buildPythonApplication {
sha256 = "07ik6rm856q0ic2r7vbg6j3hsdcdgkv44hh5ck0c2y21fqwrck3l";
};
- propagatedBuildInputs = [ gamin ]
- ++ (stdenv.lib.optional stdenv.isLinux pythonPackages.systemd);
+ patches = [
+ # 0.10.3 supports Python 3 but somehow this got into the way
+ # https://github.com/fail2ban/fail2ban/issues/2255
+ (fetchpatch {
+ url = "https://github.com/fail2ban/fail2ban/commit/657b147c0d7830f3600f3dc7feaa4815a7e19fde.patch";
+ sha256 = "1hrk2x7ssrfhab1wrjk5xw1sxhiv2735glfcp6qcj8x4dss3q7f7";
+ })
+ ];
+
+ pythonPath = with python3.pkgs;
+ stdenv.lib.optionals stdenv.isLinux [
+ systemd
+ ];
preConfigure = ''
for i in config/action.d/sendmail*.conf; do
@@ -33,11 +44,15 @@ pythonPackages.buildPythonApplication {
substituteInPlace setup.py --replace /usr/share/doc/ share/doc/
# see https://github.com/NixOS/nixpkgs/issues/4968
- ${python}/bin/${python.executable} setup.py install_data --install-dir=$out --root=$out
+ ${python3.interpreter} setup.py install_data --install-dir=$out --root=$out
+ '';
+
+ postPatch = ''
+ ${stdenv.shell} ./fail2ban-2to3
'';
postInstall = let
- sitePackages = "$out/lib/${python.libPrefix}/site-packages";
+ sitePackages = "$out/${python3.sitePackages}";
in ''
# see https://github.com/NixOS/nixpkgs/issues/4968
rm -rf ${sitePackages}/etc ${sitePackages}/usr ${sitePackages}/var;
diff --git a/nixpkgs/pkgs/tools/security/fprintd/default.nix b/nixpkgs/pkgs/tools/security/fprintd/default.nix
index 41a00306f69..13e6c0be391 100644
--- a/nixpkgs/pkgs/tools/security/fprintd/default.nix
+++ b/nixpkgs/pkgs/tools/security/fprintd/default.nix
@@ -1,11 +1,9 @@
-{ thinkpad ? false
-, stdenv
+{ stdenv
, fetchurl
, fetchpatch
, pkgconfig
, intltool
-, libfprint-thinkpad ? null
-, libfprint ? null
+, libfprint
, glib
, dbus-glib
, polkit
@@ -17,7 +15,7 @@
}:
stdenv.mkDerivation rec {
- pname = "fprintd" + stdenv.lib.optionalString thinkpad "-thinkpad";
+ pname = "fprintd";
version = "0.9.0";
src = fetchurl {
@@ -46,10 +44,8 @@ stdenv.mkDerivation rec {
nss
pam
systemd
- ]
- ++ stdenv.lib.optional thinkpad libfprint-thinkpad
- ++ stdenv.lib.optional (!thinkpad) libfprint
- ;
+ libfprint
+ ];
configureFlags = [
# is hardcoded to /var/lib/fprint, this is for the StateDirectory install target
diff --git a/nixpkgs/pkgs/tools/security/fwknop/default.nix b/nixpkgs/pkgs/tools/security/fwknop/default.nix
index 4579136add2..a9f69c8b96e 100644
--- a/nixpkgs/pkgs/tools/security/fwknop/default.nix
+++ b/nixpkgs/pkgs/tools/security/fwknop/default.nix
@@ -19,8 +19,8 @@ stdenv.mkDerivation rec {
nativeBuildInputs = [ autoreconfHook ];
buildInputs = [ libpcap texinfo ]
- ++ stdenv.lib.optional gnupgSupport [ gnupg gpgme.dev ]
- ++ stdenv.lib.optional wgetSupport [ wget ];
+ ++ stdenv.lib.optionals gnupgSupport [ gnupg gpgme.dev ]
+ ++ stdenv.lib.optionals wgetSupport [ wget ];
configureFlags = [
"--sysconfdir=/etc"
diff --git a/nixpkgs/pkgs/tools/security/ghidra/default.nix b/nixpkgs/pkgs/tools/security/ghidra/default.nix
index d68fd5e7e92..b3773725e6e 100644
--- a/nixpkgs/pkgs/tools/security/ghidra/default.nix
+++ b/nixpkgs/pkgs/tools/security/ghidra/default.nix
@@ -1,16 +1,26 @@
{ stdenv, fetchurl, unzip, lib, makeWrapper, autoPatchelfHook
-, openjdk11, pam
+, openjdk11, pam, makeDesktopItem, icoutils
}: let
pkg_path = "$out/lib/ghidra";
+ desktopItem = makeDesktopItem {
+ name = "ghidra";
+ exec = "ghidra";
+ icon = "ghidra";
+ desktopName = "Ghidra";
+ genericName = "Ghidra Software Reverse Engineering Suite";
+ categories = "Development;";
+ };
+
+
in stdenv.mkDerivation {
- name = "ghidra-9.0.4";
+ name = "ghidra-9.1";
src = fetchurl {
- url = https://ghidra-sre.org/ghidra_9.0.4_PUBLIC_20190516.zip;
- sha256 = "1gqqxk57hswwgr97qisqivcfgjdxjipfdshyh4r76dyrfpa0q3d5";
+ url = https://ghidra-sre.org/ghidra_9.1_PUBLIC_20191023.zip;
+ sha256 = "0pl7s59008gvgwz4mxp7rz3xr3vaa12a6s5zvx2yr9jxx3gk1l99";
};
nativeBuildInputs = [
@@ -22,13 +32,24 @@ in stdenv.mkDerivation {
buildInputs = [
stdenv.cc.cc.lib
pam
+ icoutils
];
dontStrip = true;
installPhase = ''
mkdir -p "${pkg_path}"
+ mkdir -p "${pkg_path}" "$out/share/applications"
cp -a * "${pkg_path}"
+ ln -s ${desktopItem}/share/applications/* $out/share/applications
+
+ icotool -x "${pkg_path}/support/ghidra.ico"
+ rm ghidra_4_40x40x32.png
+ for f in ghidra_*.png; do
+ res=$(basename "$f" ".png" | cut -d"_" -f3 | cut -d"x" -f1-2)
+ mkdir -pv "$out/share/icons/hicolor/$res/apps"
+ mv "$f" "$out/share/icons/hicolor/$res/apps/ghidra.png"
+ done;
'';
postFixup = ''
diff --git a/nixpkgs/pkgs/tools/security/gnupg/22.nix b/nixpkgs/pkgs/tools/security/gnupg/22.nix
index e54a1e1c5db..9aa92fd6829 100644
--- a/nixpkgs/pkgs/tools/security/gnupg/22.nix
+++ b/nixpkgs/pkgs/tools/security/gnupg/22.nix
@@ -16,11 +16,11 @@ assert guiSupport -> pinentry != null && enableMinimal == false;
stdenv.mkDerivation rec {
pname = "gnupg";
- version = "2.2.17";
+ version = "2.2.19";
src = fetchurl {
url = "mirror://gnupg/gnupg/${pname}-${version}.tar.bz2";
- sha256 = "056mgy09lvsi03531a437qj58la1j2x1y1scvfi53diris3658mg";
+ sha256 = "1h6yx6sdpz3lf9gdppgxqcf73baynr8gflmh43286fkgw3058994";
};
depsBuildBuild = [ buildPackages.stdenv.cc ];
diff --git a/nixpkgs/pkgs/tools/security/gobuster/default.nix b/nixpkgs/pkgs/tools/security/gobuster/default.nix
new file mode 100644
index 00000000000..c3426bee965
--- /dev/null
+++ b/nixpkgs/pkgs/tools/security/gobuster/default.nix
@@ -0,0 +1,25 @@
+{ buildGoModule
+, fetchFromGitHub
+, lib
+}:
+
+buildGoModule rec {
+ pname = "gobuster";
+ version = "3.0.1";
+
+ src = fetchFromGitHub {
+ owner = "OJ";
+ repo = "gobuster";
+ rev = "v${version}";
+ sha256 = "0q8ighqykh8qyvidnm6az6dc9mp32bbmhkmkqzl1ybbw6paa8pym";
+ };
+
+ modSha256 = "0jq0z5s05vqdvq7v1gdjwlqqwbl1j2rv9f16k52idl50vdiqviql";
+
+ meta = with lib; {
+ description = "Tool used to brute-force URIs, DNS subdomains, Virtual Host names on target web servers";
+ homepage = "https://github.com/OJ/gobuster";
+ license = licenses.asl20;
+ maintainers = with maintainers; [ pamplemousse ];
+ };
+}
diff --git a/nixpkgs/pkgs/tools/security/gpgstats/default.nix b/nixpkgs/pkgs/tools/security/gpgstats/default.nix
index 34e8c7bd679..c3a14f62c76 100644
--- a/nixpkgs/pkgs/tools/security/gpgstats/default.nix
+++ b/nixpkgs/pkgs/tools/security/gpgstats/default.nix
@@ -16,8 +16,8 @@ stdenv.mkDerivation rec {
cp gpgstats $out/bin
'';
- NIX_CFLAGS_COMPILE = stdenv.lib.optionals (!stdenv.is64bit)
- [ "-D_FILE_OFFSET_BITS=64" "-DLARGEFILE_SOURCE=1" ];
+ NIX_CFLAGS_COMPILE = stdenv.lib.optionalString (!stdenv.is64bit)
+ "-D_FILE_OFFSET_BITS=64 -DLARGEFILE_SOURCE=1";
meta = with stdenv.lib; {
description = "Calculates statistics on the keys in your gpg key-ring";
diff --git a/nixpkgs/pkgs/tools/security/hcxtools/default.nix b/nixpkgs/pkgs/tools/security/hcxtools/default.nix
index 40e9ee03952..8e70e0def41 100644
--- a/nixpkgs/pkgs/tools/security/hcxtools/default.nix
+++ b/nixpkgs/pkgs/tools/security/hcxtools/default.nix
@@ -2,13 +2,13 @@
stdenv.mkDerivation rec {
pname = "hcxtools";
- version = "5.2.2";
+ version = "5.3.0";
src = fetchFromGitHub {
owner = "ZerBea";
repo = pname;
rev = version;
- sha256 = "0jschcjk9z9s3q2f7qcb4nmjmyipar3f0yqbrgmbg3jpgamahykn";
+ sha256 = "1pqvxncpcnwxs89imma01ry30bz7cjifm8wz1s80yclkxxf80php";
};
buildInputs = [ curl openssl zlib ];
diff --git a/nixpkgs/pkgs/tools/security/ibm-sw-tpm2/default.nix b/nixpkgs/pkgs/tools/security/ibm-sw-tpm2/default.nix
index cec31cec377..e2e01fbb921 100644
--- a/nixpkgs/pkgs/tools/security/ibm-sw-tpm2/default.nix
+++ b/nixpkgs/pkgs/tools/security/ibm-sw-tpm2/default.nix
@@ -2,11 +2,11 @@
stdenv.mkDerivation rec {
pname = "ibm-sw-tpm2";
- version = "1332";
+ version = "1563";
src = fetchurl {
url = "mirror://sourceforge/ibmswtpm2/ibmtpm${version}.tar.gz";
- sha256 = "1zdhi8acd4jfp1v7ibd86hcv0g39yk8qrnhxjmmgzn8i7npr70cf";
+ sha256 = "1sfi7drmbm08rgd2414s3sxd7h5g8d4kiwk40xklf7sw67w1ffpw";
};
buildInputs = [ openssl ];
diff --git a/nixpkgs/pkgs/tools/security/jd-gui/default.nix b/nixpkgs/pkgs/tools/security/jd-gui/default.nix
index 213f7c30051..86b88638bd7 100644
--- a/nixpkgs/pkgs/tools/security/jd-gui/default.nix
+++ b/nixpkgs/pkgs/tools/security/jd-gui/default.nix
@@ -1,22 +1,27 @@
-{ stdenv, fetchurl, gradle_2_5, perl, makeWrapper, jre, makeDesktopItem, writeText, runtimeShell }:
+{ stdenv, fetchFromGitHub, jre, jdk, makeDesktopItem, perl, writeText, runtimeShell }:
let
- version = "1.4.0";
- name = "jd-gui-${version}";
-
- src = fetchurl {
- url = "https://github.com/java-decompiler/jd-gui/archive/v${version}.tar.gz";
- sha256 = "0anz7szlr5kgmsmkyv34jdynsnk8v6kvibcyz98jsd96fh725lax";
+ pname = "jd-gui";
+ version = "1.6.5";
+
+ src = fetchFromGitHub {
+ owner = "java-decompiler";
+ repo = pname;
+ rev = "v${version}";
+ sha256 = "0yn2xcwznig941pw2f3wi8ixz1wprxcn9wl0g2ggdzx51rfwgzzi";
};
deps = stdenv.mkDerivation {
- name = "${name}-deps";
+ name = "${pname}-deps";
inherit src;
- nativeBuildInputs = [ gradle_2_5 perl ];
+
+ nativeBuildInputs = [ jdk perl ];
+
+ patchPhase = "patchShebangs gradlew";
buildPhase = ''
export GRADLE_USER_HOME=$(mktemp -d);
- gradle --no-daemon build
+ ./gradlew --no-daemon jar
'';
# Mavenize dependency paths
@@ -25,11 +30,12 @@ let
find $GRADLE_USER_HOME/caches/modules-2 -type f -regex '.*\.\(jar\|pom\)' \
| perl -pe 's#(.*/([^/]+)/([^/]+)/([^/]+)/[0-9a-f]{30,40}/([^/\s]+))$# ($x = $2) =~ tr|\.|/|; "install -Dm444 $1 \$out/$x/$3/$4/$5" #e' \
| sh
+ cp -r $GRADLE_USER_HOME/wrapper $out
'';
outputHashAlgo = "sha256";
outputHashMode = "recursive";
- outputHash = "1apmqiphnav79m4rdii58h7f4qslpfig4qybyyl2fr7zk92gv3l9";
+ outputHash = "1s4p91iiyikrsgvpzkhw3jm5lsm0jpzp7iw7afdhhl9jm18igs70";
};
# Point to our local deps repo
@@ -59,18 +65,24 @@ let
comment = "Java Decompiler JD-GUI";
desktopName = "JD-GUI";
genericName = "Java Decompiler";
- mimeType = "application/x-java-archive;application/x-java";
+ mimeType = "application/java;application/java-vm;application/java-archive";
categories = "Development;Debugger;";
+ extraEntries="StartupWMClass=org-jd-gui-App";
};
-in stdenv.mkDerivation {
- inherit name version src;
+in stdenv.mkDerivation rec {
+ inherit pname version src;
+ name = "${pname}-${version}";
- nativeBuildInputs = [ gradle_2_5 perl makeWrapper ];
+ nativeBuildInputs = [ jdk ];
+
+ patchPhase = "patchShebangs gradlew";
buildPhase = ''
export GRADLE_USER_HOME=$(mktemp -d)
- gradle --offline --no-daemon --info --init-script ${gradleInit} jar
+ cp -r ${deps}/wrapper $GRADLE_USER_HOME
+ chmod u+w $GRADLE_USER_HOME/wrapper/dists/gradle*/*/*.lck
+ ./gradlew --offline --no-daemon --info --init-script ${gradleInit} jar
'';
installPhase = let
@@ -83,18 +95,16 @@ in stdenv.mkDerivation {
cat > $out/bin/jd-gui <<EOF
#!${runtimeShell}
export JAVA_HOME=${jre}
- ${jre}/bin/java -jar ${jar} $@
+ exec ${jre}/bin/java -jar ${jar} "\$@"
EOF
chmod +x $out/bin/jd-gui
${(desktopItem "$out/bin/jd-gui").buildCommand}
'';
- dontStrip = true;
-
meta = with stdenv.lib; {
description = "Fast Java Decompiler with powerful GUI";
- homepage = "http://jd.benow.ca/";
+ homepage = "https://java-decompiler.github.io/";
license = licenses.gpl3;
platforms = platforms.unix;
maintainers = [ maintainers.thoughtpolice ];
diff --git a/nixpkgs/pkgs/tools/security/john/default.nix b/nixpkgs/pkgs/tools/security/john/default.nix
index fd5659e7f9d..17e02e736dc 100644
--- a/nixpkgs/pkgs/tools/security/john/default.nix
+++ b/nixpkgs/pkgs/tools/security/john/default.nix
@@ -31,7 +31,10 @@ stdenv.mkDerivation rec {
export AS=$CC
export LD=$CC
'';
- configureFlags = [ "--disable-native-macro" ];
+ configureFlags = [
+ "--disable-native-tests"
+ "--with-systemwide"
+ ];
buildInputs = [ openssl nss nspr kerberos gmp zlib libpcap re2 ];
nativeBuildInputs = [ gcc python3Packages.wrapPython perl makeWrapper ];
@@ -44,8 +47,6 @@ stdenv.mkDerivation rec {
# gcc: error: memdbg.o: No such file or directory
enableParallelBuilding = false;
- NIX_CFLAGS_COMPILE = [ "-DJOHN_SYSTEMWIDE=1" ];
-
postInstall = ''
mkdir -p "$out/bin" "$out/etc/john" "$out/share/john" "$out/share/doc/john" "$out/share/john/rules"
find -L ../run -mindepth 1 -maxdepth 1 -type f -executable \
@@ -68,7 +69,7 @@ stdenv.mkDerivation rec {
description = "John the Ripper password cracker";
license = licenses.gpl2;
homepage = https://github.com/magnumripper/JohnTheRipper/;
- maintainers = with maintainers; [ offline ];
- platforms = [ "x86_64-linux" "x86_64-darwin"];
+ maintainers = with maintainers; [ offline matthewbauer ];
+ platforms = platforms.unix;
};
}
diff --git a/nixpkgs/pkgs/tools/security/keybase/fix-paths-kbfs.patch b/nixpkgs/pkgs/tools/security/keybase/fix-paths-kbfs.patch
deleted file mode 100644
index 1180f38b865..00000000000
--- a/nixpkgs/pkgs/tools/security/keybase/fix-paths-kbfs.patch
+++ /dev/null
@@ -1,48 +0,0 @@
-diff --git a/go/kbfs/libfuse/mounter.go b/go/kbfs/libfuse/mounter.go
-index d791ffc2..b116ad5d 100644
---- a/go/kbfs/libfuse/mounter.go
-+++ b/go/kbfs/libfuse/mounter.go
-@@ -108,7 +108,7 @@ func (m *mounter) Unmount() (err error) {
- case "darwin":
- _, err = exec.Command("/sbin/umount", dir).Output()
- case "linux":
-- fusermountOutput, fusermountErr := exec.Command("fusermount", "-u", dir).CombinedOutput()
-+ fusermountOutput, fusermountErr := exec.Command("@fusermount@", "-u", dir).CombinedOutput()
- // Only clean up mountdir on a clean unmount.
- if fusermountErr == nil {
- m.log.Info("Successfully unmounted")
-@@ -135,7 +135,7 @@ func (m *mounter) Unmount() (err error) {
- "/usr/sbin/diskutil", "unmountDisk", "force", dir).Output()
- case "linux":
- // Lazy unmount; will unmount when KBFS is no longer in use.
-- _, err = exec.Command("fusermount", "-u", "-z", dir).Output()
-+ _, err = exec.Command("@fusermount@", "-u", "-z", dir).Output()
- default:
- err = errors.New("Forced unmount is not supported on this platform yet")
- }
-diff --git a/go/vendor/bazil.org/fuse/mount_linux.go b/go/vendor/bazil.org/fuse/mount_linux.go
-index ec7fd89c..4d0a9e30 100644
---- a/go/vendor/bazil.org/fuse/mount_linux.go
-+++ b/go/vendor/bazil.org/fuse/mount_linux.go
-@@ -196,7 +196,7 @@ func mount(dir string, conf *mountConfig, ready chan<- struct{}, _ *error) (fuse
- defer readFile.Close()
-
- cmd := exec.Command(
-- "fusermount",
-+ "@fusermount@",
- "-o", conf.getOptions(),
- "--",
- dir,
-diff --git a/go/vendor/bazil.org/fuse/unmount_linux.go b/go/vendor/bazil.org/fuse/unmount_linux.go
-index f02448af..6e4c6c23 100644
---- a/go/vendor/bazil.org/fuse/unmount_linux.go
-+++ b/go/vendor/bazil.org/fuse/unmount_linux.go
-@@ -21,7 +21,7 @@ func unmount(dir string) error {
- return sysunix.Unmount(dir, sysunix.MNT_DETACH)
- }
-
-- cmd := exec.Command("fusermount", "-u", dir)
-+ cmd := exec.Command("@fusermount@", "-u", dir)
- output, err := cmd.CombinedOutput()
- if err != nil {
- if len(output) > 0 {
diff --git a/nixpkgs/pkgs/tools/security/keybase/kbfs.nix b/nixpkgs/pkgs/tools/security/keybase/kbfs.nix
index 93c7bd540d8..9448182a65a 100644
--- a/nixpkgs/pkgs/tools/security/keybase/kbfs.nix
+++ b/nixpkgs/pkgs/tools/security/keybase/kbfs.nix
@@ -1,4 +1,4 @@
-{ stdenv, substituteAll, buildGoPackage, fetchFromGitHub, fuse, osxfuse, keybase }:
+{ stdenv, buildGoPackage, fetchFromGitHub, keybase }:
buildGoPackage {
pname = "kbfs";
@@ -10,13 +10,6 @@ buildGoPackage {
dontRenameImports = true;
- patches = [
- (substituteAll {
- src = ./fix-paths-kbfs.patch;
- fusermount = "${fuse}/bin/fusermount";
- })
- ];
-
buildFlags = [ "-tags production" ];
meta = with stdenv.lib; {
diff --git a/nixpkgs/pkgs/tools/security/meo/default.nix b/nixpkgs/pkgs/tools/security/meo/default.nix
index 19f51775ff2..d10c1659964 100644
--- a/nixpkgs/pkgs/tools/security/meo/default.nix
+++ b/nixpkgs/pkgs/tools/security/meo/default.nix
@@ -9,7 +9,7 @@ stdenv.mkDerivation {
sha256 = "0ifg7y28s89i9gwda6fyj1jbrykbcvq8bf1m6rxmdcv5afi3arbq";
};
- buildFlags = "QMAKE=qmake";
+ buildFlags = [ "QMAKE=qmake" ];
buildInputs = [ openssl pcre-cpp qt4 boost pkcs11helper ];
diff --git a/nixpkgs/pkgs/tools/security/monkeysphere/default.nix b/nixpkgs/pkgs/tools/security/monkeysphere/default.nix
index 97d032045b3..1e585136d88 100644
--- a/nixpkgs/pkgs/tools/security/monkeysphere/default.nix
+++ b/nixpkgs/pkgs/tools/security/monkeysphere/default.nix
@@ -36,10 +36,10 @@ in stdenv.mkDerivation rec {
([ gnupg opensshUnsafe which socat cpio hexdump procps lockfileProgs ] ++
(with perlPackages; [ CryptOpenSSLRSA CryptOpenSSLBignum ]));
- makeFlags = ''
- PREFIX=/
- DESTDIR=$(out)
- '';
+ makeFlags = [
+ "PREFIX=/"
+ "DESTDIR=$(out)"
+ ];
# The tests should be run (and succeed) when making changes to this package
# but they aren't enabled by default because they "drain" entropy (GnuPG
diff --git a/nixpkgs/pkgs/tools/security/nitrokey-app/default.nix b/nixpkgs/pkgs/tools/security/nitrokey-app/default.nix
index 33a873f73da..48df486ef0a 100644
--- a/nixpkgs/pkgs/tools/security/nitrokey-app/default.nix
+++ b/nixpkgs/pkgs/tools/security/nitrokey-app/default.nix
@@ -31,7 +31,7 @@ stdenv.mkDerivation rec {
pkgconfig
wrapQtAppsHook
];
- cmakeFlags = "-DCMAKE_BUILD_TYPE=Release";
+ cmakeFlags = [ "-DCMAKE_BUILD_TYPE=Release" ];
meta = with stdenv.lib; {
description = "Provides extra functionality for the Nitrokey Pro and Storage";
diff --git a/nixpkgs/pkgs/tools/security/notary/default.nix b/nixpkgs/pkgs/tools/security/notary/default.nix
index f1a61adabbb..d1e2ee58e48 100644
--- a/nixpkgs/pkgs/tools/security/notary/default.nix
+++ b/nixpkgs/pkgs/tools/security/notary/default.nix
@@ -59,7 +59,7 @@ buildGoPackage rec {
'';
license = licenses.asl20;
homepage = https://github.com/theupdateframework/notary;
- maintainers = with maintainers; [ vdemeester ma27 ];
+ maintainers = with maintainers; [ vdemeester ];
platforms = platforms.unix;
};
}
diff --git a/nixpkgs/pkgs/tools/security/opensc/default.nix b/nixpkgs/pkgs/tools/security/opensc/default.nix
index 4f220ee7717..315cd1c8c28 100644
--- a/nixpkgs/pkgs/tools/security/opensc/default.nix
+++ b/nixpkgs/pkgs/tools/security/opensc/default.nix
@@ -7,33 +7,15 @@
stdenv.mkDerivation rec {
pname = "opensc";
- version = "0.19.0";
+ version = "0.20.0";
src = fetchFromGitHub {
owner = "OpenSC";
repo = "OpenSC";
rev = version;
- sha256 = "10575gb9l38cskq7swyjp0907wlziyxg4ppq33ndz319dsx69d87";
+ sha256 = "0mg8qmhww3li1isfgvn5hang1hq58zra057ilvgci88csfziv5lv";
};
- patches = [
- (fetchpatch {
- name = "CVE-2019-6502.patch";
- url = "https://github.com/OpenSC/OpenSC/commit/0d7967549751b7032f22b437106b41444aff0ba9.patch";
- sha256 = "1y42lmz8i9w99hgpakdncnv8f94cqjfabz0v4xg6wfz9akl3ff7d";
- })
- (fetchpatch {
- name = "CVE-2019-15945.patch";
- url = "https://github.com/OpenSC/OpenSC/commit/412a6142c27a5973c61ba540e33cdc22d5608e68.patch";
- sha256 = "088i2i1fkvdxnywmb54bn4283vhbxx6i2632b34ss5dh7k080hp7";
- })
- (fetchpatch {
- name = "CVE-2019-15946.patch";
- url = "https://github.com/OpenSC/OpenSC/commit/a3fc7693f3a035a8a7921cffb98432944bb42740.patch";
- sha256 = "1qr9n8cbarrdn4kr5z0ys7flq50hfmcbm8584mhw7r39p08qwmvq";
- })
- ];
-
nativeBuildInputs = [ pkgconfig autoreconfHook ];
buildInputs = [
zlib readline openssl libassuan
diff --git a/nixpkgs/pkgs/tools/security/pass/extensions/genphrase.nix b/nixpkgs/pkgs/tools/security/pass/extensions/genphrase.nix
index 187852e8b55..208012e2f88 100644
--- a/nixpkgs/pkgs/tools/security/pass/extensions/genphrase.nix
+++ b/nixpkgs/pkgs/tools/security/pass/extensions/genphrase.nix
@@ -13,7 +13,7 @@ stdenv.mkDerivation rec {
dontBuild = true;
- installTargets = "globalinstall";
+ installTargets = [ "globalinstall" ];
installFlags = [ "PREFIX=$(out)" ];
diff --git a/nixpkgs/pkgs/tools/security/pbis/default.nix b/nixpkgs/pkgs/tools/security/pbis/default.nix
index ee1282e9a13..176ef7f7616 100644
--- a/nixpkgs/pkgs/tools/security/pbis/default.nix
+++ b/nixpkgs/pkgs/tools/security/pbis/default.nix
@@ -31,7 +31,7 @@ stdenv.mkDerivation rec {
mkdir release
cd release
if [ $CC = gcc ]; then
- NIX_CFLAGS_COMPILE="$NIX_CFLAGS_COMPILE -Wno-error=format-overflow"
+ NIX_CFLAGS_COMPILE="$NIX_CFLAGS_COMPILE -Wno-error=format-overflow -Wno-error=address-of-packed-member"
fi
NIX_CFLAGS_COMPILE="$NIX_CFLAGS_COMPILE -isystem ${stdenv.lib.getDev libxml2}/include/libxml2 -Wno-error=array-bounds -Wno-error=pointer-sign -Wno-error=deprecated-declarations -Wno-error=unused-variable"
'';
diff --git a/nixpkgs/pkgs/tools/security/pcsclite/default.nix b/nixpkgs/pkgs/tools/security/pcsclite/default.nix
index eed462ef0d0..263c308fc3d 100644
--- a/nixpkgs/pkgs/tools/security/pcsclite/default.nix
+++ b/nixpkgs/pkgs/tools/security/pcsclite/default.nix
@@ -1,4 +1,4 @@
-{ stdenv, fetchurl, pkgconfig, udev, dbus, perl, python2
+{ stdenv, fetchurl, pkgconfig, udev, dbus, perl, python3
, IOKit ? null }:
stdenv.mkDerivation rec {
@@ -35,8 +35,8 @@ stdenv.mkDerivation rec {
moveToOutput bin/pcsc-spy "$dev"
'';
- nativeBuildInputs = [ pkgconfig perl python2 ];
- buildInputs = stdenv.lib.optionals stdenv.isLinux [ udev dbus ]
+ nativeBuildInputs = [ pkgconfig perl ];
+ buildInputs = [ python3 ] ++ stdenv.lib.optionals stdenv.isLinux [ udev dbus ]
++ stdenv.lib.optionals stdenv.isDarwin [ IOKit ];
meta = with stdenv.lib; {
diff --git a/nixpkgs/pkgs/tools/security/pcsctools/default.nix b/nixpkgs/pkgs/tools/security/pcsctools/default.nix
index 24519654e9a..fa53b91a02f 100644
--- a/nixpkgs/pkgs/tools/security/pcsctools/default.nix
+++ b/nixpkgs/pkgs/tools/security/pcsctools/default.nix
@@ -5,11 +5,11 @@
let deps = lib.makeBinPath [ wget coreutils ];
in stdenv.mkDerivation rec {
- name = "pcsc-tools-1.5.4";
+ name = "pcsc-tools-1.5.5";
src = fetchurl {
url = "http://ludovic.rousseau.free.fr/softwares/pcsc-tools/${name}.tar.bz2";
- sha256 = "14vw6ya8gzyw3lzyrsvfcxx7qm7ry39fbxcdqqh552c1lyxnm7n3";
+ sha256 = "01251m8hf7by8rw8fayhjxmcqvi6dp150680fpf89bqycha2vgqv";
};
buildInputs = [ udev dbus perlPackages.perl pcsclite ];
diff --git a/nixpkgs/pkgs/tools/security/phrasendrescher/default.nix b/nixpkgs/pkgs/tools/security/phrasendrescher/default.nix
index 93dc75c1f32..71a9824bb62 100644
--- a/nixpkgs/pkgs/tools/security/phrasendrescher/default.nix
+++ b/nixpkgs/pkgs/tools/security/phrasendrescher/default.nix
@@ -16,7 +16,7 @@ stdenv.mkDerivation rec {
buildInputs = [ openssl libssh2 gpgme ];
- configureFlags = "--with-plugins";
+ configureFlags = [ "--with-plugins" ];
meta = with stdenv.lib; {
description = "A modular and multi processing pass phrase cracking tool";
diff --git a/nixpkgs/pkgs/tools/security/pius/default.nix b/nixpkgs/pkgs/tools/security/pius/default.nix
index 5aa4ad47d42..6d2b5569a0d 100644
--- a/nixpkgs/pkgs/tools/security/pius/default.nix
+++ b/nixpkgs/pkgs/tools/security/pius/default.nix
@@ -36,6 +36,6 @@ python3Packages.buildPythonApplication {
license = stdenv.lib.licenses.gpl2;
platforms = stdenv.lib.platforms.gnu ++ stdenv.lib.platforms.linux;
- maintainers = with stdenv.lib.maintainers; [ fuuzetsu kierdavis ];
+ maintainers = with stdenv.lib.maintainers; [ kierdavis ];
};
}
diff --git a/nixpkgs/pkgs/tools/security/proxmark3/default.nix b/nixpkgs/pkgs/tools/security/proxmark3/default.nix
index afaed796057..e717558a24d 100644
--- a/nixpkgs/pkgs/tools/security/proxmark3/default.nix
+++ b/nixpkgs/pkgs/tools/security/proxmark3/default.nix
@@ -1,37 +1,59 @@
-{ stdenv, fetchFromGitHub, pkgconfig, ncurses, readline }:
+{ stdenv, fetchFromGitHub, pkgconfig, ncurses, readline, pcsclite, qt5
+, gcc-arm-embedded }:
-stdenv.mkDerivation rec {
- pname = "proxmark3";
- version = "3.1.0";
+let
+ generic = { pname, version, rev, sha256 }:
+ stdenv.mkDerivation rec {
+ inherit pname version;
- src = fetchFromGitHub {
- owner = "Proxmark";
- repo = pname;
- rev = "v${version}";
- sha256 = "1qw28n1bhhl91ix77lv50qcr919fq3hjc8zhhqphwxal2svgx2jf";
- };
+ src = fetchFromGitHub {
+ owner = "Proxmark";
+ repo = "proxmark3";
+ inherit rev sha256;
+ };
+
+ nativeBuildInputs = [ pkgconfig gcc-arm-embedded ];
+ buildInputs = [ ncurses readline pcsclite qt5.qtbase ];
- nativeBuildInputs = [ pkgconfig ];
- buildInputs = [ ncurses readline ];
+ postPatch = ''
+ substituteInPlace client/Makefile --replace '-ltermcap' ' '
+ substituteInPlace liblua/Makefile --replace '-ltermcap' ' '
+ substituteInPlace client/flasher.c \
+ --replace 'armsrc/obj/fullimage.elf' \
+ '${placeholder "out"}/firmware/fullimage.elf'
+ '';
- postPatch = ''
- substituteInPlace client/Makefile --replace '-ltermcap' ' '
- substituteInPlace liblua/Makefile --replace '-ltermcap' ' '
- '';
+ buildPhase = ''
+ make bootrom/obj/bootrom.elf armsrc/obj/fullimage.elf client
+ '';
- preBuild = ''
- cd client
- '';
+ installPhase = ''
+ install -Dt $out/bin client/proxmark3
+ install -T client/flasher $out/bin/proxmark3-flasher
+ install -Dt $out/firmware bootrom/obj/bootrom.elf armsrc/obj/fullimage.elf
+ '';
- installPhase = ''
- mkdir -p $out/bin
- cp proxmark3 $out/bin
- '';
+ meta = with stdenv.lib; {
+ description = "Client for proxmark3, powerful general purpose RFID tool";
+ homepage = http://www.proxmark.org;
+ license = licenses.gpl2Plus;
+ maintainers = with maintainers; [ fpletz ];
+ };
+ };
+in
+
+{
+ proxmark3 = generic rec {
+ pname = "proxmark3";
+ version = "3.1.0";
+ rev = "v${version}";
+ sha256 = "1qw28n1bhhl91ix77lv50qcr919fq3hjc8zhhqphwxal2svgx2jf";
+ };
- meta = with stdenv.lib; {
- description = "Client for proxmark3, powerful general purpose RFID tool";
- homepage = http://www.proxmark.org;
- license = licenses.gpl2Plus;
- maintainers = with maintainers; [ fpletz ];
+ proxmark3-unstable = generic {
+ pname = "proxmark3-unstable";
+ version = "2019-12-28";
+ rev = "a4ff62be63ca2a81071e9aa2b882bd3ff57f13ad";
+ sha256 = "067lp28xqx61n3i2a2fy489r5frwxqrcfj8cpv3xdzi3gb3vk5c3";
};
}
diff --git a/nixpkgs/pkgs/tools/security/rarcrack/default.nix b/nixpkgs/pkgs/tools/security/rarcrack/default.nix
index 65158b3c5fe..68e5df80937 100644
--- a/nixpkgs/pkgs/tools/security/rarcrack/default.nix
+++ b/nixpkgs/pkgs/tools/security/rarcrack/default.nix
@@ -12,8 +12,8 @@ stdenv.mkDerivation {
};
buildInputs = [ libxml2 file p7zip unrar unzip ];
- buildFlags = if stdenv.cc.isClang then [ "CC=clang" ] else null;
- installFlags = "PREFIX=\${out}";
+ buildFlags = stdenv.lib.optional stdenv.cc.isClang "CC=clang";
+ installFlags = [ "PREFIX=\${out}" ];
patchPhase = ''
substituteInPlace rarcrack.c --replace "file -i" "${file}/bin/file -i"
diff --git a/nixpkgs/pkgs/tools/security/rhash/default.nix b/nixpkgs/pkgs/tools/security/rhash/default.nix
index ad606af9562..863b03a117c 100644
--- a/nixpkgs/pkgs/tools/security/rhash/default.nix
+++ b/nixpkgs/pkgs/tools/security/rhash/default.nix
@@ -1,14 +1,14 @@
{ stdenv, fetchFromGitHub, which }:
stdenv.mkDerivation rec {
- version = "1.3.8";
+ version = "1.3.9";
pname = "rhash";
src = fetchFromGitHub {
owner = "rhash";
repo = "RHash";
rev = "v${version}";
- sha256 = "0i00wl63hn80g0s9gdi772gchbghwgkvn4nbb5227y2wwy30yyi2";
+ sha256 = "06i49x1l21h2q7pfnf4crbmjyg8b9ad0qs10ywyyn5sjpi0c21wq";
};
nativeBuildInputs = [ which ];
@@ -23,8 +23,9 @@ stdenv.mkDerivation rec {
installTargets = [ "install" "install-lib-shared" "install-lib-so-link" "install-lib-headers" ];
meta = with stdenv.lib; {
- homepage = http://rhash.anz.ru;
+ homepage = "http://rhash.sourceforge.net/";
description = "Console utility and library for computing and verifying hash sums of files";
+ license = licenses.bsd0;
platforms = platforms.all;
maintainers = [ maintainers.andrewrk ];
};
diff --git a/nixpkgs/pkgs/tools/security/ripasso/cursive.nix b/nixpkgs/pkgs/tools/security/ripasso/cursive.nix
index 9eac6b6e5ca..b273b882daf 100644
--- a/nixpkgs/pkgs/tools/security/ripasso/cursive.nix
+++ b/nixpkgs/pkgs/tools/security/ripasso/cursive.nix
@@ -1,30 +1,37 @@
-{ stdenv, lib, rustPlatform, fetchFromGitHub, pkgconfig, ncurses, python3, openssl, libgpgerror, gpgme, xorg }:
+{ stdenv, lib, rustPlatform, fetchFromGitHub, pkgconfig, ncurses, python3, openssl, libgpgerror, gpgme, xorg, AppKit, Security }:
with rustPlatform;
buildRustPackage rec {
- version = "unstable-2019-08-27";
+ version = "0.3.0";
pname = "ripasso-cursive";
src = fetchFromGitHub {
owner = "cortex";
repo = "ripasso";
- rev = "1b5ef4ae19f95f1422ba5cb09e9e689880599c40";
- sha256 = "1lh1in8knpqz4vbsmdyd4hh8y4bfhxjciysfbq3qzdpdpihgj0nn";
+ rev = "release-${version}";
+ sha256 = "1rkb23i9gcfmifcl31s8w86k7aza6nxrh3w33fvhv1ins1gxxk7w";
};
- cargoSha256 = "0dwaa106vj7jbgshhqpjabsr0zmkg1a5syzky7jcaasvc7r7njwl";
- cargoBuildFlags = [ "-p ripasso-cursive" ];
+ cargoSha256 = "1p0bsl4h2w257vfjbpqiga693gaslfq34g30dghpqb5n4kl416zp";
+
+ cargoBuildFlags = [ "-p ripasso-cursive -p ripasso-man" ];
nativeBuildInputs = [ pkgconfig ];
buildInputs = [
ncurses python3 openssl libgpgerror gpgme xorg.libxcb
- ];
+ ] ++ stdenv.lib.optionals stdenv.isDarwin [ AppKit Security ];
+
+ preFixup = ''
+ mkdir -p "$out/man/man1"
+ $out/bin/ripasso-man > $out/man/man1/ripasso-cursive.1
+ rm $out/bin/ripasso-man
+ '';
meta = with stdenv.lib; {
description = "A simple password manager written in Rust";
homepage = "https://github.com/cortex/ripasso";
license = licenses.gpl3;
maintainers = with maintainers; [ sgo ];
- platforms = platforms.linux;
+ platforms = platforms.unix;
};
}
diff --git a/nixpkgs/pkgs/tools/security/rng-tools/default.nix b/nixpkgs/pkgs/tools/security/rng-tools/default.nix
index 4238fc5be33..bd289200fe8 100644
--- a/nixpkgs/pkgs/tools/security/rng-tools/default.nix
+++ b/nixpkgs/pkgs/tools/security/rng-tools/default.nix
@@ -14,13 +14,13 @@ with stdenv.lib;
stdenv.mkDerivation rec {
pname = "rng-tools";
- version = "6.8";
+ version = "6.9";
src = fetchFromGitHub {
owner = "nhorman";
repo = "rng-tools";
rev = "v${version}";
- sha256 = "1clm9i9xg3j79q0d6vinn6dx0nwh1fvzcmkqpcbay7mwsgkknvw2";
+ sha256 = "065jf26s8zkicb95zc9ilksjdq9gqrh5vcx3mhi6mypbnamn6w98";
};
postPatch = ''
diff --git a/nixpkgs/pkgs/tools/security/spectre-meltdown-checker/default.nix b/nixpkgs/pkgs/tools/security/spectre-meltdown-checker/default.nix
index 3ece05926cc..656efbf390c 100644
--- a/nixpkgs/pkgs/tools/security/spectre-meltdown-checker/default.nix
+++ b/nixpkgs/pkgs/tools/security/spectre-meltdown-checker/default.nix
@@ -2,13 +2,13 @@
stdenv.mkDerivation rec {
pname = "spectre-meltdown-checker";
- version = "0.42";
+ version = "0.43";
src = fetchFromGitHub {
owner = "speed47";
repo = "spectre-meltdown-checker";
rev = "v${version}";
- sha256 = "0pppf844i7b72hqnmfvq72w5y7b6dxd16y29l6j84maf22zxbjni";
+ sha256 = "1ys5m1yvm26qjlsjpqqd33lwpb880p0ay289hmifxjjawkqddjgg";
};
prePatch = ''
diff --git a/nixpkgs/pkgs/tools/security/step-ca/default.nix b/nixpkgs/pkgs/tools/security/step-ca/default.nix
new file mode 100644
index 00000000000..e5574be8ab9
--- /dev/null
+++ b/nixpkgs/pkgs/tools/security/step-ca/default.nix
@@ -0,0 +1,25 @@
+{ lib, buildGoPackage, fetchFromGitHub }:
+
+buildGoPackage rec {
+ pname = "step-ca";
+ version = "0.13.3";
+
+ goPackagePath = "github.com/smallstep/certificates";
+
+ src = fetchFromGitHub {
+ owner = "smallstep";
+ repo = "certificates";
+ rev = "v${version}";
+ sha256 = "1i42j7v5a5qqqb9ng8irblfyzykhyws0394q3zac290ymjijxbnq";
+ };
+
+ goDeps = ./deps.nix;
+
+ meta = with lib; {
+ description = "A private certificate authority (X.509 & SSH) & ACME server for secure automated certificate management, so you can use TLS everywhere & SSO for SSH";
+ homepage = "https://smallstep.com/certificates/";
+ license = licenses.asl20;
+ maintainers = with maintainers; [ cmcdragonkai ];
+ platforms = platforms.linux ++ platforms.darwin;
+ };
+}
diff --git a/nixpkgs/pkgs/tools/security/step-ca/deps.nix b/nixpkgs/pkgs/tools/security/step-ca/deps.nix
new file mode 100644
index 00000000000..07607b6f65d
--- /dev/null
+++ b/nixpkgs/pkgs/tools/security/step-ca/deps.nix
@@ -0,0 +1,291 @@
+# file generated from Gopkg.lock using dep2nix (https://github.com/nixcloud/dep2nix)
+[
+ {
+ goPackagePath = "github.com/AndreasBriese/bbloom";
+ fetch = {
+ type = "git";
+ url = "https://github.com/AndreasBriese/bbloom";
+ rev = "e2d15f34fcf99d5dbb871c820ec73f710fca9815";
+ sha256 = "05kkrsmpragy69bj6s80pxlm3pbwxrkkx7wgk0xigs6y2n6ylpds";
+ };
+ }
+ {
+ goPackagePath = "github.com/chzyer/readline";
+ fetch = {
+ type = "git";
+ url = "https://github.com/chzyer/readline";
+ rev = "2972be24d48e78746da79ba8e24e8b488c9880de";
+ sha256 = "104q8dazj8yf6b089jjr82fy9h1g80zyyzvp3g8b44a7d8ngjj6r";
+ };
+ }
+ {
+ goPackagePath = "github.com/dgraph-io/badger";
+ fetch = {
+ type = "git";
+ url = "https://github.com/dgraph-io/badger";
+ rev = "391b6d3b93e6014fe8c2971fcc0c1266e47dbbd9";
+ sha256 = "13zyd6irxagwfv4azgmpk2qg8f80plhxrcjl8x89jzsjkl0a0pkx";
+ };
+ }
+ {
+ goPackagePath = "github.com/dgryski/go-farm";
+ fetch = {
+ type = "git";
+ url = "https://github.com/dgryski/go-farm";
+ rev = "6a90982ecee230ff6cba02d5bd386acc030be9d3";
+ sha256 = "1x3l4jgps0v1bjvd446kj4dp0ckswjckxgrng9afm275ixnf83ix";
+ };
+ }
+ {
+ goPackagePath = "github.com/go-chi/chi";
+ fetch = {
+ type = "git";
+ url = "https://github.com/go-chi/chi";
+ rev = "0ebf7795c516423a110473652e9ba3a59a504863";
+ sha256 = "18hwj6vni19ykp3bsmg9ggnl6y2hawym0vbsigdgx8craqbp7jb1";
+ };
+ }
+ {
+ goPackagePath = "github.com/go-sql-driver/mysql";
+ fetch = {
+ type = "git";
+ url = "https://github.com/go-sql-driver/mysql";
+ rev = "72cd26f257d44c1114970e19afddcd812016007e";
+ sha256 = "1fvsvwc1v2i0gqn01mynvi1shp5xm0xaym6xng09fcbqb56lbjx1";
+ };
+ }
+ {
+ goPackagePath = "github.com/golang/protobuf";
+ fetch = {
+ type = "git";
+ url = "https://github.com/golang/protobuf";
+ rev = "aa810b61a9c79d51363740d207bb46cf8e620ed5";
+ sha256 = "0kf4b59rcbb1cchfny2dm9jyznp8ri2hsb14n8iak1q8986xa0ab";
+ };
+ }
+ {
+ goPackagePath = "github.com/juju/ansiterm";
+ fetch = {
+ type = "git";
+ url = "https://github.com/juju/ansiterm";
+ rev = "720a0952cc2ac777afc295d9861263e2a4cf96a1";
+ sha256 = "0n6j0y7xhashp8gdkdl0r7vlbkdrkymrzxn9hxrx522k2isggs7h";
+ };
+ }
+ {
+ goPackagePath = "github.com/konsorten/go-windows-terminal-sequences";
+ fetch = {
+ type = "git";
+ url = "https://github.com/konsorten/go-windows-terminal-sequences";
+ rev = "5c8c8bd35d3832f5d134ae1e1e375b69a4d25242";
+ sha256 = "1lchgf27n276vma6iyxa0v1xds68n2g8lih5lavqnx5x6q5pw2ip";
+ };
+ }
+ {
+ goPackagePath = "github.com/lunixbochs/vtclean";
+ fetch = {
+ type = "git";
+ url = "https://github.com/lunixbochs/vtclean";
+ rev = "2d01aacdc34a083dca635ba869909f5fc0cd4f41";
+ sha256 = "1ss88dyx5hr4imvpg5lixvp0cf7c2qm4x9m8mdgshjpm92g5rqmf";
+ };
+ }
+ {
+ goPackagePath = "github.com/manifoldco/promptui";
+ fetch = {
+ type = "git";
+ url = "https://github.com/manifoldco/promptui";
+ rev = "157c96fb638a14d268b305cf2012582431fcc410";
+ sha256 = "0zha48i5f529q4j1qycybdzza4l9706hijiqws36ikd5jzg8i7wz";
+ };
+ }
+ {
+ goPackagePath = "github.com/mattn/go-colorable";
+ fetch = {
+ type = "git";
+ url = "https://github.com/mattn/go-colorable";
+ rev = "167de6bfdfba052fa6b2d3664c8f5272e23c9072";
+ sha256 = "1nwjmsppsjicr7anq8na6md7b1z84l9ppnlr045hhxjvbkqwalvx";
+ };
+ }
+ {
+ goPackagePath = "github.com/mattn/go-isatty";
+ fetch = {
+ type = "git";
+ url = "https://github.com/mattn/go-isatty";
+ rev = "6ca4dbf54d38eea1a992b3c722a76a5d1c4cb25c";
+ sha256 = "0zs92j2cqaw9j8qx1sdxpv3ap0rgbs0vrvi72m40mg8aa36gd39w";
+ };
+ }
+ {
+ goPackagePath = "github.com/mmcloughlin/avo";
+ fetch = {
+ type = "git";
+ url = "https://github.com/mmcloughlin/avo";
+ rev = "2e7d06bc7ada2979f17ccf8ebf486dba23b84fc7";
+ sha256 = "0fna1hhg193zy428lkj24a8853g3qviqs2c9xi96mji6ldprna5d";
+ };
+ }
+ {
+ goPackagePath = "github.com/newrelic/go-agent";
+ fetch = {
+ type = "git";
+ url = "https://github.com/newrelic/go-agent";
+ rev = "f5bce3387232559bcbe6a5f8227c4bf508dac1ba";
+ sha256 = "1zbp1cqhxp0sz3faymam6h1f91r1gl8dnnjx7qg8r06bd5fbzllb";
+ };
+ }
+ {
+ goPackagePath = "github.com/pkg/errors";
+ fetch = {
+ type = "git";
+ url = "https://github.com/pkg/errors";
+ rev = "ba968bfe8b2f7e042a574c888954fccecfa385b4";
+ sha256 = "0g5qcb4d4fd96midz0zdk8b9kz8xkzwfa8kr1cliqbg8sxsy5vd1";
+ };
+ }
+ {
+ goPackagePath = "github.com/rs/xid";
+ fetch = {
+ type = "git";
+ url = "https://github.com/rs/xid";
+ rev = "15d26544def341f036c5f8dca987a4cbe575032c";
+ sha256 = "1vgw1dikqw273awcci6pzifs7shkl5ah4l88j1zjbnpgbiwzlx9j";
+ };
+ }
+ {
+ goPackagePath = "github.com/samfoo/ansi";
+ fetch = {
+ type = "git";
+ url = "https://github.com/samfoo/ansi";
+ rev = "b6bd2ded7189ce35bc02233b554eb56a5146af73";
+ sha256 = "0sw2d7c6l2ry34x0n4j37ydr8s7hxnax76yh6n35gb2g6f1h46sz";
+ };
+ }
+ {
+ goPackagePath = "github.com/shurcooL/sanitized_anchor_name";
+ fetch = {
+ type = "git";
+ url = "https://github.com/shurcooL/sanitized_anchor_name";
+ rev = "86672fcb3f950f35f2e675df2240550f2a50762f";
+ sha256 = "142m507s9971cl8qdmbcw7sqxnkgi3xqd8wzvfq15p0w7w8i4a3h";
+ };
+ }
+ {
+ goPackagePath = "github.com/sirupsen/logrus";
+ fetch = {
+ type = "git";
+ url = "https://github.com/sirupsen/logrus";
+ rev = "ad15b42461921f1fb3529b058c6786c6a45d5162";
+ sha256 = "02xdfcp4f6dqvpavwf1vvr794qgz2fx8929paam7wnvcxy7ib606";
+ };
+ }
+ {
+ goPackagePath = "github.com/smallstep/assert";
+ fetch = {
+ type = "git";
+ url = "https://github.com/smallstep/assert";
+ rev = "de77670473b5492f5d0bce155b5c01534c2d13f7";
+ sha256 = "15z2b4qyylnwgq2pzlaxsdabqxh8dbna4ddprk9rzmsvnfkpds16";
+ };
+ }
+ {
+ goPackagePath = "github.com/smallstep/cli";
+ fetch = {
+ type = "git";
+ url = "https://github.com/smallstep/cli";
+ rev = "eeecaac062cb548ee2ab7c7563bc3c2f2160f019";
+ sha256 = "1khhd1vgwqb08vki1nh0k4i2yk6jjdqmnq4f8anqn125zsj7hvdk";
+ };
+ }
+ {
+ goPackagePath = "github.com/smallstep/nosql";
+ fetch = {
+ type = "git";
+ url = "https://github.com/smallstep/nosql";
+ rev = "f80b3f432de0662f07ebd58fe52b0a119fe5dcd9";
+ sha256 = "155blxdgaprl1py5g8p52gipp0ckz3k6v41hgsp83nay01yynafb";
+ };
+ }
+ {
+ goPackagePath = "github.com/urfave/cli";
+ fetch = {
+ type = "git";
+ url = "https://github.com/urfave/cli";
+ rev = "b67dcf995b6a7b7f14fad5fcb7cc5441b05e814b";
+ sha256 = "0n5vq4nydlhb7w12jiwphvxqdy4jwpxc3zwlxyhf05lq1nxfb56h";
+ };
+ }
+ {
+ goPackagePath = "go.etcd.io/bbolt";
+ fetch = {
+ type = "git";
+ url = "https://github.com/etcd-io/bbolt";
+ rev = "63597a96ec0ad9e6d43c3fc81e809909e0237461";
+ sha256 = "13d5l6p6c5wvkr6vn9hkhz9c593qifn7fgx0hg4d6jcvg1y0bnm2";
+ };
+ }
+ {
+ goPackagePath = "golang.org/x/crypto";
+ fetch = {
+ type = "git";
+ url = "https://go.googlesource.com/crypto";
+ rev = "4d3f4d9ffa16a13f451c3b2999e9c49e9750bf06";
+ sha256 = "0sbsgjm6wqa162ssrf1gnpv62ak5wjn1bn8v7sxwwfg8a93z1028";
+ };
+ }
+ {
+ goPackagePath = "golang.org/x/net";
+ fetch = {
+ type = "git";
+ url = "https://go.googlesource.com/net";
+ rev = "c44066c5c816ec500d459a2a324a753f78531ae0";
+ sha256 = "0mgww74bl15d0jvsh4f3qr1ckjzb8icb8hn0mgs5ppa0b2fgpc4f";
+ };
+ }
+ {
+ goPackagePath = "golang.org/x/sys";
+ fetch = {
+ type = "git";
+ url = "https://go.googlesource.com/sys";
+ rev = "9b800f95dbbc54abff0acf7ee32d88ba4e328c89";
+ sha256 = "07v3l7q7y59cwvw0mc85i39v7qjcc1jh4svwi789rmrqqm5nq7q6";
+ };
+ }
+ {
+ goPackagePath = "golang.org/x/text";
+ fetch = {
+ type = "git";
+ url = "https://go.googlesource.com/text";
+ rev = "f21a4dfb5e38f5895301dc265a8def02365cc3d0";
+ sha256 = "0r6x6zjzhr8ksqlpiwm5gdd7s209kwk5p4lw54xjvz10cs3qlq19";
+ };
+ }
+ {
+ goPackagePath = "golang.org/x/tools";
+ fetch = {
+ type = "git";
+ url = "https://go.googlesource.com/tools";
+ rev = "3a10b9bf0a52df7e992a8c3eb712a86d3c896c75";
+ sha256 = "19f3dijcc54jnd7458jab2dgpd0gzccmv2qympd9wi8cc8jpnhws";
+ };
+ }
+ {
+ goPackagePath = "google.golang.org/appengine";
+ fetch = {
+ type = "git";
+ url = "https://github.com/golang/appengine";
+ rev = "54a98f90d1c46b7731eb8fb305d2a321c30ef610";
+ sha256 = "0l7mkdnwhidv8m686x432vmx8z5nqcrr9f46ddgvrxbh4wvyfcll";
+ };
+ }
+ {
+ goPackagePath = "gopkg.in/square/go-jose.v2";
+ fetch = {
+ type = "git";
+ url = "https://github.com/square/go-jose";
+ rev = "730df5f748271903322feb182be83b43ebbbe27d";
+ sha256 = "11r93g9xrcjqj7qvq8sbd5hy5rnbpmim0vdsp6rbav8gl7wimaa3";
+ };
+ }
+] \ No newline at end of file
diff --git a/nixpkgs/pkgs/tools/security/stoken/default.nix b/nixpkgs/pkgs/tools/security/stoken/default.nix
index 38fc884de48..d6375bee649 100644
--- a/nixpkgs/pkgs/tools/security/stoken/default.nix
+++ b/nixpkgs/pkgs/tools/security/stoken/default.nix
@@ -30,7 +30,7 @@ stdenv.mkDerivation rec {
description = "Software Token for Linux/UNIX";
homepage = https://github.com/cernekee/stoken;
license = licenses.lgpl21Plus;
- maintainers = [ maintainers.fuuzetsu ];
+ maintainers = [ ];
platforms = platforms.all;
};
}
diff --git a/nixpkgs/pkgs/tools/security/sudo/default.nix b/nixpkgs/pkgs/tools/security/sudo/default.nix
index a0922f4df73..71a71be9147 100644
--- a/nixpkgs/pkgs/tools/security/sudo/default.nix
+++ b/nixpkgs/pkgs/tools/security/sudo/default.nix
@@ -5,14 +5,12 @@
}:
stdenv.mkDerivation rec {
- name = "sudo-1.8.29";
+ pname = "sudo";
+ version = "1.8.30";
src = fetchurl {
- urls =
- [ "ftp://ftp.sudo.ws/pub/sudo/${name}.tar.gz"
- "ftp://ftp.sudo.ws/pub/sudo/OLD/${name}.tar.gz"
- ];
- sha256 = "0z4wyadh9cks17gdpfgx4kvbrlnyb6nai2sd6chk7qh4jsngylyf";
+ url = "ftp://ftp.sudo.ws/pub/sudo/${pname}-${version}.tar.gz";
+ sha256 = "1rvrqlqrrjsd06dczgj9cwjdkpkqil5zzlwh87h06ms6qzfx6nm3";
};
prePatch = ''
diff --git a/nixpkgs/pkgs/tools/security/super/default.nix b/nixpkgs/pkgs/tools/security/super/default.nix
index 1f00d42f277..716973a3e2e 100644
--- a/nixpkgs/pkgs/tools/security/super/default.nix
+++ b/nixpkgs/pkgs/tools/security/super/default.nix
@@ -29,7 +29,7 @@ stdenv.mkDerivation rec {
"--localstatedir=/var"
];
- installFlags = "sysconfdir=$(out)/etc localstatedir=$(TMPDIR)";
+ installFlags = [ "sysconfdir=$(out)/etc" "localstatedir=$(TMPDIR)" ];
meta = {
homepage = "https://www.ucolick.org/~will/#super";
diff --git a/nixpkgs/pkgs/tools/security/tboot/default.nix b/nixpkgs/pkgs/tools/security/tboot/default.nix
index f5184b98562..062bf40b7d6 100644
--- a/nixpkgs/pkgs/tools/security/tboot/default.nix
+++ b/nixpkgs/pkgs/tools/security/tboot/default.nix
@@ -17,6 +17,8 @@ stdenv.mkDerivation rec {
hardeningDisable = [ "pic" "stackprotector" ];
+ NIX_CFLAGS_COMPILE = [ "-Wno-error=address-of-packed-member" ];
+
configurePhase = ''
for a in lcptools utils tb_polgen; do
substituteInPlace $a/Makefile --replace /usr/sbin /sbin
@@ -24,7 +26,7 @@ stdenv.mkDerivation rec {
substituteInPlace docs/Makefile --replace /usr/share /share
'';
- installFlags = "DESTDIR=$(out)";
+ installFlags = [ "DESTDIR=$(out)" ];
meta = with stdenv.lib; {
description = "A pre-kernel/VMM module that uses Intel(R) TXT to perform a measured and verified launch of an OS kernel/VMM";
diff --git a/nixpkgs/pkgs/tools/security/tor/default.nix b/nixpkgs/pkgs/tools/security/tor/default.nix
index 527c8064bac..819b9688924 100644
--- a/nixpkgs/pkgs/tools/security/tor/default.nix
+++ b/nixpkgs/pkgs/tools/security/tor/default.nix
@@ -15,11 +15,11 @@
stdenv.mkDerivation rec {
pname = "tor";
- version = "0.4.1.6";
+ version = "0.4.2.5";
src = fetchurl {
url = "https://dist.torproject.org/${pname}-${version}.tar.gz";
- sha256 = "0wgdid8w7srd218hh4rwslzdx2ickxw1pg18p2wry1r6wi65521a";
+ sha256 = "1hnqg6psf7shcmlvfk44mkpaz7v66mify3cnx7mzl23q5s37anad";
};
outputs = [ "out" "geoip" ];
@@ -34,6 +34,8 @@ stdenv.mkDerivation rec {
substituteInPlace contrib/client-tools/torify \
--replace 'pathfind torsocks' true \
--replace 'exec torsocks' 'exec ${torsocks}/bin/torsocks'
+
+ patchShebangs ./scripts/maint/checkShellScripts.sh
'';
enableParallelBuilding = true;
diff --git a/nixpkgs/pkgs/tools/security/tpm-quote-tools/default.nix b/nixpkgs/pkgs/tools/security/tpm-quote-tools/default.nix
index 5d54758cc7c..f7526ac7225 100644
--- a/nixpkgs/pkgs/tools/security/tpm-quote-tools/default.nix
+++ b/nixpkgs/pkgs/tools/security/tpm-quote-tools/default.nix
@@ -26,7 +26,7 @@ stdenv.mkDerivation rec {
'';
homepage = http://tpmquotetools.sourceforge.net/;
license = licenses.bsd3;
- maintainers = with maintainers; [ ak ndowens ];
+ maintainers = with maintainers; [ ak ];
platforms = platforms.linux;
};
}
diff --git a/nixpkgs/pkgs/tools/security/tpm2-tools/default.nix b/nixpkgs/pkgs/tools/security/tpm2-tools/default.nix
index 03347f5f787..b7c2141b0f7 100644
--- a/nixpkgs/pkgs/tools/security/tpm2-tools/default.nix
+++ b/nixpkgs/pkgs/tools/security/tpm2-tools/default.nix
@@ -4,11 +4,11 @@
stdenv.mkDerivation rec {
pname = "tpm2-tools";
- version = "4.0.1";
+ version = "4.1";
src = fetchurl {
url = "https://github.com/tpm2-software/${pname}/releases/download/${version}/${pname}-${version}.tar.gz";
- sha256 = "zOw/ymNwNBoQLFwu8d205c0kK/G7xsUdlp93/HjKZ9E=";
+ sha256 = "1wnw4i2m6dkafqjjma8mxw9419py2v1knhn3zf1gaizdabskgkh7";
};
nativeBuildInputs = [ pandoc pkgconfig makeWrapper ];
diff --git a/nixpkgs/pkgs/tools/security/vault/default.nix b/nixpkgs/pkgs/tools/security/vault/default.nix
index 1e5a16e1958..11b0b067ccb 100644
--- a/nixpkgs/pkgs/tools/security/vault/default.nix
+++ b/nixpkgs/pkgs/tools/security/vault/default.nix
@@ -2,13 +2,13 @@
buildGoPackage rec {
pname = "vault";
- version = "1.3.0";
+ version = "1.3.1";
src = fetchFromGitHub {
owner = "hashicorp";
repo = "vault";
rev = "v${version}";
- sha256 = "0ayvmqg4fj9cliwbl4pb12mailq7062j3f9v8arpv6x5r4hydlpy";
+ sha256 = "052aj79gwmydc7ph1g567cbssqf8dsmqxad47k5hc5sc58bx7c93";
};
goPackagePath = "github.com/hashicorp/vault";
diff --git a/nixpkgs/pkgs/tools/security/vulnix/default.nix b/nixpkgs/pkgs/tools/security/vulnix/default.nix
index 809787508f6..59d8b8c0875 100644
--- a/nixpkgs/pkgs/tools/security/vulnix/default.nix
+++ b/nixpkgs/pkgs/tools/security/vulnix/default.nix
@@ -2,11 +2,11 @@
python3Packages.buildPythonApplication rec {
pname = "vulnix";
- version = "1.9.2";
+ version = "1.9.4";
src = python3Packages.fetchPypi {
inherit pname version;
- sha256 = "06mi4a80g6nzvqxj51c7lc0q0dpdr603ly2r77ksf5m3k4glb6dm";
+ sha256 = "06dpdsnz1ih0syas3x25s557qpw0f4kmypvxwaffm734djg8klmi";
};
outputs = [ "out" "doc" "man" ];
diff --git a/nixpkgs/pkgs/tools/security/wpscan/Gemfile.lock b/nixpkgs/pkgs/tools/security/wpscan/Gemfile.lock
index bf03aba1418..7a29a18b7c3 100644
--- a/nixpkgs/pkgs/tools/security/wpscan/Gemfile.lock
+++ b/nixpkgs/pkgs/tools/security/wpscan/Gemfile.lock
@@ -1,45 +1,53 @@
GEM
remote: https://rubygems.org/
specs:
- activesupport (5.2.3)
+ activesupport (6.0.1)
concurrent-ruby (~> 1.0, >= 1.0.2)
i18n (>= 0.7, < 2)
minitest (~> 5.1)
tzinfo (~> 1.1)
- addressable (2.6.0)
- public_suffix (>= 2.0.2, < 4.0)
- cms_scanner (0.5.1)
- nokogiri (~> 1.10.0)
- opt_parse_validator (~> 1.7.2)
- public_suffix (~> 3.0.0)
+ zeitwerk (~> 2.2)
+ addressable (2.7.0)
+ public_suffix (>= 2.0.2, < 5.0)
+ cms_scanner (0.7.1)
+ get_process_mem (~> 0.2.5)
+ nokogiri (~> 1.10.4)
+ opt_parse_validator (~> 1.8.1)
+ public_suffix (>= 3.0, < 4.1)
ruby-progressbar (~> 1.10.0)
+ sys-proctable (~> 1.2.2)
typhoeus (~> 1.3.0)
xmlrpc (~> 0.3)
yajl-ruby (~> 1.4.1)
concurrent-ruby (1.1.5)
ethon (0.12.0)
ffi (>= 1.3.0)
- ffi (1.10.0)
- i18n (1.6.0)
+ ffi (1.11.3)
+ get_process_mem (0.2.5)
+ ffi (~> 1.0)
+ i18n (1.7.0)
concurrent-ruby (~> 1.0)
mini_portile2 (2.4.0)
- minitest (5.11.3)
- nokogiri (1.10.3)
+ minitest (5.13.0)
+ nokogiri (1.10.7)
mini_portile2 (~> 2.4.0)
- opt_parse_validator (1.7.2)
- activesupport (>= 4.2, < 5.3.0)
- addressable (>= 2.5, < 2.7)
- public_suffix (3.0.3)
- ruby-progressbar (1.10.0)
+ opt_parse_validator (1.8.1)
+ activesupport (> 4.2, < 6.1.0)
+ addressable (>= 2.5, < 2.8)
+ public_suffix (4.0.1)
+ ruby-progressbar (1.10.1)
+ sys-proctable (1.2.2)
+ ffi
thread_safe (0.3.6)
typhoeus (1.3.1)
ethon (>= 0.9.0)
tzinfo (1.2.5)
thread_safe (~> 0.1)
- wpscan (3.5.3)
- cms_scanner (~> 0.5.0)
+ wpscan (3.7.5)
+ cms_scanner (~> 0.7.1)
xmlrpc (0.3.0)
yajl-ruby (1.4.1)
+ zeitwerk (2.2.2)
PLATFORMS
ruby
@@ -48,4 +56,4 @@ DEPENDENCIES
wpscan
BUNDLED WITH
- 1.17.2
+ 1.17.3
diff --git a/nixpkgs/pkgs/tools/security/wpscan/default.nix b/nixpkgs/pkgs/tools/security/wpscan/default.nix
index 85455325f69..e7a784c1a77 100644
--- a/nixpkgs/pkgs/tools/security/wpscan/default.nix
+++ b/nixpkgs/pkgs/tools/security/wpscan/default.nix
@@ -13,7 +13,7 @@ bundlerApp {
meta = with lib; {
description = "Black box WordPress vulnerability scanner";
- homepage = https://wpscan.org/;
+ homepage = "https://wpscan.org/";
license = licenses.unfreeRedistributable;
maintainers = with maintainers; [ nyanloutre manveru ];
platforms = platforms.unix;
diff --git a/nixpkgs/pkgs/tools/security/wpscan/gemset.nix b/nixpkgs/pkgs/tools/security/wpscan/gemset.nix
index c0ad80bd99b..5c0691fda1b 100644
--- a/nixpkgs/pkgs/tools/security/wpscan/gemset.nix
+++ b/nixpkgs/pkgs/tools/security/wpscan/gemset.nix
@@ -1,14 +1,14 @@
{
activesupport = {
- dependencies = ["concurrent-ruby" "i18n" "minitest" "tzinfo"];
+ dependencies = ["concurrent-ruby" "i18n" "minitest" "tzinfo" "zeitwerk"];
groups = ["default"];
platforms = [];
source = {
remotes = ["https://rubygems.org"];
- sha256 = "110vp4frgkw3mpzlmshg2f2ig09cknls2w68ym1r1s39d01v0mi8";
+ sha256 = "190xv21yz03zz8nlfly557ir859jr5zkwi89naziy65hskdnkw1s";
type = "gem";
};
- version = "5.2.3";
+ version = "6.0.1";
};
addressable = {
dependencies = ["public_suffix"];
@@ -16,21 +16,21 @@
platforms = [];
source = {
remotes = ["https://rubygems.org"];
- sha256 = "0bcm2hchn897xjhqj9zzsxf3n9xhddymj4lsclz508f4vw3av46l";
+ sha256 = "1fvchp2rhp2rmigx7qglf69xvjqvzq7x0g49naliw29r2bz656sy";
type = "gem";
};
- version = "2.6.0";
+ version = "2.7.0";
};
cms_scanner = {
- dependencies = ["nokogiri" "opt_parse_validator" "public_suffix" "ruby-progressbar" "typhoeus" "xmlrpc" "yajl-ruby"];
+ dependencies = ["get_process_mem" "nokogiri" "opt_parse_validator" "public_suffix" "ruby-progressbar" "sys-proctable" "typhoeus" "xmlrpc" "yajl-ruby"];
groups = ["default"];
platforms = [];
source = {
remotes = ["https://rubygems.org"];
- sha256 = "03hvvqq0s35a6l7lx9zpagv0gcdzhw7jvhzssiaiy6y81cx4z9pn";
+ sha256 = "14xmsigczibihlziisdgabsaz9lm2v31snlkc8kmza73pv8a61r4";
type = "gem";
};
- version = "0.5.1";
+ version = "0.7.1";
};
concurrent-ruby = {
groups = ["default"];
@@ -58,10 +58,21 @@
platforms = [];
source = {
remotes = ["https://rubygems.org"];
- sha256 = "0j8pzj8raxbir5w5k6s7a042sb5k02pg0f8s4na1r5lan901j00p";
+ sha256 = "10ay35dm0lkcqprsiya6q2kwvyid884102ryipr4vrk790yfp8kd";
type = "gem";
};
- version = "1.10.0";
+ version = "1.11.3";
+ };
+ get_process_mem = {
+ dependencies = ["ffi"];
+ groups = ["default"];
+ platforms = [];
+ source = {
+ remotes = ["https://rubygems.org"];
+ sha256 = "1q7pivp9z9pdxc2ha32q7x9zgqy8m9jf87g6n5mvi5l6knxya8sh";
+ type = "gem";
+ };
+ version = "0.2.5";
};
i18n = {
dependencies = ["concurrent-ruby"];
@@ -69,10 +80,10 @@
platforms = [];
source = {
remotes = ["https://rubygems.org"];
- sha256 = "1hfxnlyr618s25xpafw9mypa82qppjccbh292c4l3bj36az7f6wl";
+ sha256 = "0hmypvx9iyc0b4hski7aic2xzm09cg1c7q1qlpnk3k8s5acxzyhl";
type = "gem";
};
- version = "1.6.0";
+ version = "1.7.0";
};
mini_portile2 = {
groups = ["default"];
@@ -89,10 +100,10 @@
platforms = [];
source = {
remotes = ["https://rubygems.org"];
- sha256 = "0icglrhghgwdlnzzp4jf76b0mbc71s80njn5afyfjn4wqji8mqbq";
+ sha256 = "0w16p7cvslh3hxd3cia8jg4pd85z7rz7xqb16vh42gj4rijn8rmi";
type = "gem";
};
- version = "5.11.3";
+ version = "5.13.0";
};
nokogiri = {
dependencies = ["mini_portile2"];
@@ -100,10 +111,10 @@
platforms = [];
source = {
remotes = ["https://rubygems.org"];
- sha256 = "02bjydih0j515szfv9mls195cvpyidh6ixm7dwbl3s2sbaxxk5s4";
+ sha256 = "0r0qpgf80h764k176yr63gqbs2z0xbsp8vlvs2a79d5r9vs83kln";
type = "gem";
};
- version = "1.10.3";
+ version = "1.10.7";
};
opt_parse_validator = {
dependencies = ["activesupport" "addressable"];
@@ -111,30 +122,41 @@
platforms = [];
source = {
remotes = ["https://rubygems.org"];
- sha256 = "14zp0260x652pf75maq9ydvqsqgv8ji9w85gjk8f0vwjykf1151n";
+ sha256 = "19rm44ww3zfb440kqpdprwb7y2d0gcm4znhv4kfs8dkhz8k1k5vy";
type = "gem";
};
- version = "1.7.2";
+ version = "1.8.1";
};
public_suffix = {
groups = ["default"];
platforms = [];
source = {
remotes = ["https://rubygems.org"];
- sha256 = "08q64b5br692dd3v0a9wq9q5dvycc6kmiqmjbdxkxbfizggsvx6l";
+ sha256 = "0xnfv2j2bqgdpg2yq9i2rxby0w2sc9h5iyjkpaas2xknwrgmhdb0";
type = "gem";
};
- version = "3.0.3";
+ version = "4.0.1";
};
ruby-progressbar = {
groups = ["default"];
platforms = [];
source = {
remotes = ["https://rubygems.org"];
- sha256 = "1cv2ym3rl09svw8940ny67bav7b2db4ms39i4raaqzkf59jmhglk";
+ sha256 = "1k77i0d4wsn23ggdd2msrcwfy0i376cglfqypkk2q77r2l3408zf";
type = "gem";
};
- version = "1.10.0";
+ version = "1.10.1";
+ };
+ sys-proctable = {
+ dependencies = ["ffi"];
+ groups = ["default"];
+ platforms = [];
+ source = {
+ remotes = ["https://rubygems.org"];
+ sha256 = "0ndk34ipd4v96v5cbvj0kbkhnssi4nqrzd7sifyg3bavi1jrw3w8";
+ type = "gem";
+ };
+ version = "1.2.2";
};
thread_safe = {
groups = ["default"];
@@ -174,10 +196,10 @@
platforms = [];
source = {
remotes = ["https://rubygems.org"];
- sha256 = "0j4v24iwy35q7qy3l8zr5r8mjn7nc7ahdiq13dpgjwrprvrw1jk2";
+ sha256 = "0vn6i48msxhj8g769vn2s3siv98cnqchblw69ldk1mr85lw4jci6";
type = "gem";
};
- version = "3.5.3";
+ version = "3.7.5";
};
xmlrpc = {
groups = ["default"];
@@ -199,4 +221,14 @@
};
version = "1.4.1";
};
-} \ No newline at end of file
+ zeitwerk = {
+ groups = ["default"];
+ platforms = [];
+ source = {
+ remotes = ["https://rubygems.org"];
+ sha256 = "0jywi63w1m2b2w9fj9rjb9n3imf6p5bfijfmml1xzdnsrdrjz0x1";
+ type = "gem";
+ };
+ version = "2.2.2";
+ };
+}
diff --git a/nixpkgs/pkgs/tools/system/augeas/default.nix b/nixpkgs/pkgs/tools/system/augeas/default.nix
index a99df36beb6..08731cd6db2 100644
--- a/nixpkgs/pkgs/tools/system/augeas/default.nix
+++ b/nixpkgs/pkgs/tools/system/augeas/default.nix
@@ -15,7 +15,7 @@ stdenv.mkDerivation rec {
description = "Configuration editing tool";
license = licenses.lgpl2;
homepage = http://augeas.net/;
- maintainers = with maintainers; [ offline ndowens ];
+ maintainers = with maintainers; [ offline ];
platforms = platforms.unix;
};
}
diff --git a/nixpkgs/pkgs/tools/system/bootchart/default.nix b/nixpkgs/pkgs/tools/system/bootchart/default.nix
deleted file mode 100644
index d3f692b70e7..00000000000
--- a/nixpkgs/pkgs/tools/system/bootchart/default.nix
+++ /dev/null
@@ -1,31 +0,0 @@
-{stdenv, fetchFromGitHub, pkgconfig, glib, gtk2, python2Packages }:
-
-stdenv.mkDerivation rec {
- version = "0.14.8";
- pname = "bootchart";
-
- src = fetchFromGitHub {
- owner = "mmeeks";
- repo = "bootchart";
- rev = version;
- sha256 = "12ja2hp6f49416zfjdx0kjfmlkh9wl9b7wz7gk372kps4gjnypqx";
- };
-
- nativeBuildInputs = [ pkgconfig ];
- buildInputs = [ glib gtk2 python2Packages.python python2Packages.wrapPython python2Packages.pygtk ];
- pythonPath = with python2Packages; [ pygtk pycairo ];
-
- installPhase = ''
- make install DESTDIR=$out BINDIR=/bin PY_LIBDIR=/lib/${python2Packages.python.libPrefix}
- wrapProgram $out/bin/pybootchartgui \
- --prefix PYTHONPATH : "$PYTHONPATH:$(toPythonPath $out)"
- '';
-
- meta = with stdenv.lib; {
- homepage = http://www.bootchart.org/;
- description = "Performance analysis and visualization of the GNU/Linux boot process";
- license = licenses.gpl2Plus;
- platforms = platforms.linux;
- };
-
-}
diff --git a/nixpkgs/pkgs/tools/system/clinfo/default.nix b/nixpkgs/pkgs/tools/system/clinfo/default.nix
index 5653c70d431..dd6e3d4a84b 100644
--- a/nixpkgs/pkgs/tools/system/clinfo/default.nix
+++ b/nixpkgs/pkgs/tools/system/clinfo/default.nix
@@ -13,6 +13,8 @@ stdenv.mkDerivation rec {
buildInputs = [ ocl-icd opencl-headers ];
+ NIX_CFLAGS_COMPILE = [ "-Wno-error=stringop-truncation" ];
+
makeFlags = [ "PREFIX=${placeholder "out"}" ];
meta = with stdenv.lib; {
diff --git a/nixpkgs/pkgs/tools/system/collectd/plugins.nix b/nixpkgs/pkgs/tools/system/collectd/plugins.nix
index c29ebc925bc..f1a87847a5c 100644
--- a/nixpkgs/pkgs/tools/system/collectd/plugins.nix
+++ b/nixpkgs/pkgs/tools/system/collectd/plugins.nix
@@ -24,7 +24,7 @@
, lm_sensors
, mongoc
, mosquitto
-, net_snmp
+, net-snmp
, postgresql
, protobufc
, python
@@ -243,10 +243,10 @@ let
buildInputs = stdenv.lib.optionals stdenv.isLinux [ libatasmart udev ];
};
snmp = {
- buildInputs = stdenv.lib.optionals stdenv.isLinux [ net_snmp ];
+ buildInputs = stdenv.lib.optionals stdenv.isLinux [ net-snmp ];
};
snmp_agent = {
- buildInputs = stdenv.lib.optionals stdenv.isLinux [ net_snmp ];
+ buildInputs = stdenv.lib.optionals stdenv.isLinux [ net-snmp ];
};
statsd = {};
swap = {};
diff --git a/nixpkgs/pkgs/tools/system/ctop/default.nix b/nixpkgs/pkgs/tools/system/ctop/default.nix
index 8d8b710750c..4f492def162 100644
--- a/nixpkgs/pkgs/tools/system/ctop/default.nix
+++ b/nixpkgs/pkgs/tools/system/ctop/default.nix
@@ -2,22 +2,18 @@
buildGoModule rec {
pname = "ctop";
- version = "0.7.2";
+ version = "0.7.3";
src = fetchFromGitHub {
owner = "bcicen";
repo = pname;
rev = "v${version}";
- sha256 = "0mm6hl5qklfv0yffj6cgypsgcrk4fq6p60djycfgj20yhz9cmf9x";
+ sha256 = "0y72l65xgfqrgghzbm1zcy776l5m31z0gn6vfr689zyi3k3f4kh8";
};
- patches = [
- # Version 0.7.2 does not build with go 1.13.
- # TODO: Remove once(and if) https://github.com/bcicen/ctop/pull/178 is merged and lands in a release.
- ./go-1.13-deps.patch
- ];
+ modSha256 = "0wxv6yzlgki7047qszx9p9xpph95bg097jkgaa0b3wbpx8vg7qml";
- modSha256 = "0ad1gvamckg94r7f68cnjdbq9nyz6c3hh339hy4hghxd3rd1qskn";
+ buildFlagsArray = [ "-ldflags=-s -w -X main.version=${version} -X main.build=v${version}" ];
meta = with lib; {
description = "Top-like interface for container metrics";
diff --git a/nixpkgs/pkgs/tools/system/ctop/go-1.13-deps.patch b/nixpkgs/pkgs/tools/system/ctop/go-1.13-deps.patch
deleted file mode 100644
index 153c0f36f81..00000000000
--- a/nixpkgs/pkgs/tools/system/ctop/go-1.13-deps.patch
+++ /dev/null
@@ -1,90 +0,0 @@
-diff --git a/go.mod b/go.mod
-index 4921cba..cbb4028 100644
---- a/go.mod
-+++ b/go.mod
-@@ -18,9 +18,6 @@ require (
- github.com/golang/protobuf v0.0.0-20170712042213-0a4f71a498b7 // indirect
- github.com/hashicorp/go-cleanhttp v0.0.0-20170211013415-3573b8b52aa7 // indirect
- github.com/jgautheron/codename-generator v0.0.0-20150829203204-16d037c7cc3c
-- github.com/kr/pretty v0.1.0 // indirect
-- github.com/maruel/panicparse v0.0.0-20170227222818-25bcac0d793c // indirect
-- github.com/maruel/ut v1.0.0 // indirect
- github.com/mattn/go-runewidth v0.0.0-20170201023540-14207d285c6c // indirect
- github.com/mitchellh/go-wordwrap v0.0.0-20150314170334-ad45545899c7 // indirect
- github.com/nsf/termbox-go v0.0.0-20180303152453-e2050e41c884
-@@ -39,3 +36,5 @@ require (
- )
-
- replace github.com/gizak/termui => github.com/bcicen/termui v0.0.0-20180326052246-4eb80249d3f5
-+
-+go 1.13
-diff --git a/go.sum b/go.sum
-new file mode 100644
-index 0000000..5ca7d55
---- /dev/null
-+++ b/go.sum
-@@ -0,0 +1,64 @@
-+github.com/Azure/go-ansiterm v0.0.0-20160622173216-fa152c58bc15 h1:VtP6TygBMvrR+SMMPHj3z3jvnj4vcafMRLIw4at7xww=
-+github.com/Azure/go-ansiterm v0.0.0-20160622173216-fa152c58bc15/go.mod h1:LmzpDX56iTiv29bbRTIsUNlaFfuhWRQBWjQdVyAevI8=
-+github.com/BurntSushi/toml v0.3.0 h1:e1/Ivsx3Z0FVTV0NSOv/aVgbUWyQuzj7DDnFblkRvsY=
-+github.com/BurntSushi/toml v0.3.0/go.mod h1:xHWCNGjB5oqiDr8zfno3MHue2Ht5sIBksp03qcyfWMU=
-+github.com/Microsoft/go-winio v0.3.8 h1:dvxbxtpTIjdAbx2OtL26p4eq0iEvys/U5yrsTJb3NZI=
-+github.com/Microsoft/go-winio v0.3.8/go.mod h1:VhR8bwka0BXejwEJY73c50VrPtXAaKcyvVC4A4RozmA=
-+github.com/Nvveen/Gotty v0.0.0-20120604004816-cd527374f1e5 h1:TngWCqHvy9oXAN6lEVMRuU21PR1EtLVZJmdB18Gu3Rw=
-+github.com/Nvveen/Gotty v0.0.0-20120604004816-cd527374f1e5/go.mod h1:lmUJ/7eu/Q8D7ML55dXQrVaamCz2vxCfdQBasLZfHKk=
-+github.com/Sirupsen/logrus v0.0.0-20150423025312-26709e271410 h1:RxP6uUzJlS1Qa3+HYls3u+nQMKlnqC3RhL7wWC4Y4+E=
-+github.com/Sirupsen/logrus v0.0.0-20150423025312-26709e271410/go.mod h1:rmk17hk6i8ZSAJkSDa7nOxamrG+SP4P0mm+DAvExv4U=
-+github.com/bcicen/termui v0.0.0-20180326052246-4eb80249d3f5 h1:2pI3ZsoefWIi++8EqmANoC7Px/v2lRwnleVUcCuFgLg=
-+github.com/bcicen/termui v0.0.0-20180326052246-4eb80249d3f5/go.mod h1:yIA9ITWZD1p4/DvCQ44xvhyVb9XEUlVnY1rzGSHwbiM=
-+github.com/c9s/goprocinfo v0.0.0-20170609001544-b34328d6e0cd h1:xqaBnULC8wEnQpRDXAsDgXkU/STqoluz1REOoegSfNU=
-+github.com/c9s/goprocinfo v0.0.0-20170609001544-b34328d6e0cd/go.mod h1:uEyr4WpAH4hio6LFriaPkL938XnrvLpNPmQHBdrmbIE=
-+github.com/coreos/go-systemd v0.0.0-20151104194251-b4a58d95188d h1:MJ4ge3i0lehw+gE3JcGUUp8TmWjsLAlQlhmdASs/9wk=
-+github.com/coreos/go-systemd v0.0.0-20151104194251-b4a58d95188d/go.mod h1:F5haX7vjVVG0kc13fIWeqUViNPyEJxv/OmvnBo0Yme4=
-+github.com/davecgh/go-spew v1.1.1 h1:vj9j/u1bqnvCEfJOwUhtlOARqs3+rkHYY13jYWTU97c=
-+github.com/davecgh/go-spew v1.1.1/go.mod h1:J7Y8YcW2NihsgmVo/mv3lAwl/skON4iLHjSsI+c5H38=
-+github.com/docker/docker v0.0.0-20170502054910-90d35abf7b35 h1:ly3dRUfvdP5i/t9iqVHd2VQQIDtO3tpfFWPah7g4CFw=
-+github.com/docker/docker v0.0.0-20170502054910-90d35abf7b35/go.mod h1:eEKB0N0r5NX/I1kEveEz05bcu8tLC/8azJZsviup8Sk=
-+github.com/docker/go-connections v0.0.0-20170301234100-a2afab980204 h1:JYhQLEn7v7EtrpA9ByRz51gwlk8qt12EGP9XlbX/qw4=
-+github.com/docker/go-connections v0.0.0-20170301234100-a2afab980204/go.mod h1:Gbd7IOopHjR8Iph03tsViu4nIes5XhDvyHbTtUxmeec=
-+github.com/docker/go-units v0.3.2 h1:Kjm80apys7gTtfVmCvVY8gwu10uofaFSrmAKOVrtueE=
-+github.com/docker/go-units v0.3.2/go.mod h1:fgPhTUdO+D/Jk86RDLlptpiXQzgHJF7gydDDbaIK4Dk=
-+github.com/fsouza/go-dockerclient v0.0.0-20170307141636-318513eb1ab2 h1:JuVaWSoRMBrstn2l8cxKXjK8l/qurk5qyJ9dq7EIQmU=
-+github.com/fsouza/go-dockerclient v0.0.0-20170307141636-318513eb1ab2/go.mod h1:KpcjM623fQYE9MZiTGzKhjfxXAV9wbyX2C1cyRHfhl0=
-+github.com/godbus/dbus v0.0.0-20151105175453-c7fdd8b5cd55 h1:oIgNYSrSUbNH5DJh6DMhU1PiOKOYIHNxrV3djLsLpEI=
-+github.com/godbus/dbus v0.0.0-20151105175453-c7fdd8b5cd55/go.mod h1:/YcGZj5zSblfDWMMoOzV4fas9FZnQYTkDnsGvmh2Grw=
-+github.com/golang/protobuf v0.0.0-20170712042213-0a4f71a498b7 h1:ulJ2cj/xlDlrwLCvWH4UeV9vJ/jXP6wEGgTSF7EOnmQ=
-+github.com/golang/protobuf v0.0.0-20170712042213-0a4f71a498b7/go.mod h1:6lQm79b+lXiMfvg/cZm0SGofjICqVBUtrP5yJMmIC1U=
-+github.com/hashicorp/go-cleanhttp v0.0.0-20170211013415-3573b8b52aa7 h1:67fHcS+inUoiIqWCKIqeDuq2AlPHNHPiTqp97LdQ+bc=
-+github.com/hashicorp/go-cleanhttp v0.0.0-20170211013415-3573b8b52aa7/go.mod h1:JpRdi6/HCYpAwUzNwuwqhbovhLtngrth3wmdIIUrZ80=
-+github.com/jgautheron/codename-generator v0.0.0-20150829203204-16d037c7cc3c h1:/hc+TxW4Q1v6aqNPHE5jiaNF2xEK0CzWTgo25RQhQ+U=
-+github.com/jgautheron/codename-generator v0.0.0-20150829203204-16d037c7cc3c/go.mod h1:FJRkXmPrkHw0WDjB/LXMUhjWJ112Y6JUYnIVBOy8oH8=
-+github.com/mattn/go-runewidth v0.0.0-20170201023540-14207d285c6c h1:eFzthqtg3W6Pihj3DMTXLAF4f+ge5r5Ie5g6HLIZAF0=
-+github.com/mattn/go-runewidth v0.0.0-20170201023540-14207d285c6c/go.mod h1:LwmH8dsx7+W8Uxz3IHJYH5QSwggIsqBzpuz5H//U1FU=
-+github.com/mitchellh/go-wordwrap v0.0.0-20150314170334-ad45545899c7 h1:DpOJ2HYzCv8LZP15IdmG+YdwD2luVPHITV96TkirNBM=
-+github.com/mitchellh/go-wordwrap v0.0.0-20150314170334-ad45545899c7/go.mod h1:ZXFpozHsX6DPmq2I0TCekCxypsnAUbP2oI0UX1GXzOo=
-+github.com/nsf/termbox-go v0.0.0-20180303152453-e2050e41c884 h1:fcs71SMqqDhUD+PbpIv9xf3EH9F9s6HfiLwr6jKm1VA=
-+github.com/nsf/termbox-go v0.0.0-20180303152453-e2050e41c884/go.mod h1:IuKpRQcYE1Tfu+oAQqaLisqDeXgjyyltCfsaoYN18NQ=
-+github.com/nu7hatch/gouuid v0.0.0-20131221200532-179d4d0c4d8d h1:VhgPp6v9qf9Agr/56bj7Y/xa04UccTW04VP0Qed4vnQ=
-+github.com/nu7hatch/gouuid v0.0.0-20131221200532-179d4d0c4d8d/go.mod h1:YUTz3bUH2ZwIWBy3CJBeOBEugqcmXREj14T+iG/4k4U=
-+github.com/op/go-logging v0.0.0-20160211212156-b2cb9fa56473 h1:J1QZwDXgZ4dJD2s19iqR9+U00OWM2kDzbf1O/fmvCWg=
-+github.com/op/go-logging v0.0.0-20160211212156-b2cb9fa56473/go.mod h1:HzydrMdWErDVzsI23lYNej1Htcns9BCg93Dk0bBINWk=
-+github.com/opencontainers/runc v0.1.1 h1:GlxAyO6x8rfZYN9Tt0Kti5a/cP41iuiO2yYT0IJGY8Y=
-+github.com/opencontainers/runc v0.1.1/go.mod h1:qT5XzbpPznkRYVz/mWwUaVBUv2rmF59PVA73FjuZG0U=
-+github.com/pmezard/go-difflib v1.0.0 h1:4DBwDE0NGyQoBHbLQYPwSUPoCMWR5BEzIk/f1lZbAQM=
-+github.com/pmezard/go-difflib v1.0.0/go.mod h1:iKH77koFhYxTK1pcRnkKkqfTogsbg7gZNVY4sRDYZ/4=
-+github.com/seccomp/libseccomp-golang v0.0.0-20150813023252-1b506fc7c24e h1:HJbgNpzYMeTLPpkMwbPNTPlhNd9r4xQtqcZG6qoIGgs=
-+github.com/seccomp/libseccomp-golang v0.0.0-20150813023252-1b506fc7c24e/go.mod h1:GbW5+tmTXfcxTToHLXlScSlAvWlF4P2Ca7zGrPiEpWo=
-+github.com/stretchr/testify v1.2.2 h1:bSDNvY7ZPG5RlJ8otE/7V6gMiyenm9RtJ7IUVIAoJ1w=
-+github.com/stretchr/testify v1.2.2/go.mod h1:a8OnRcib4nhh0OaRAV+Yts87kKdq0PP7pXfy6kDkUVs=
-+github.com/syndtr/gocapability v0.0.0-20150716010906-2c00daeb6c3b h1:UzwAjzrPQVJoxLfb26YI2WRrhD3g09ZHt9vAQckWiPY=
-+github.com/syndtr/gocapability v0.0.0-20150716010906-2c00daeb6c3b/go.mod h1:hkRG7XYTFWNJGYcbNJQlaLq0fg1yr4J4t/NcTQtrfww=
-+github.com/vishvananda/netlink v0.0.0-20150820014904-1e2e08e8a2dc h1:0HAHLwEY4k1VqaO1SzBi4XxT0KA06Cv+QW2LXknBk9g=
-+github.com/vishvananda/netlink v0.0.0-20150820014904-1e2e08e8a2dc/go.mod h1:+SR5DhBJrl6ZM7CoCKvpw5BKroDKQ+PJqOg65H/2ktk=
-+github.com/vishvananda/netns v0.0.0-20180720170159-13995c7128cc h1:R83G5ikgLMxrBvLh22JhdfI8K6YXEPHx5P03Uu3DRs4=
-+github.com/vishvananda/netns v0.0.0-20180720170159-13995c7128cc/go.mod h1:ZjcWmFBXmLKZu9Nxj3WKYEafiSqer2rnvPr0en9UNpI=
-+golang.org/x/net v0.0.0-20170308210134-a6577fac2d73 h1:5kGFsglTK4KqaHYb/WCmYmj+Gm1+dzbilbtzruHj6dw=
-+golang.org/x/net v0.0.0-20170308210134-a6577fac2d73/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4=
-+golang.org/x/sync v0.0.0-20181108010431-42b317875d0f h1:Bl/8QSvNqXvPGPGXa2z5xUTmV7VDcZyvRZ+QQXkXTZQ=
-+golang.org/x/sync v0.0.0-20181108010431-42b317875d0f/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
-+golang.org/x/sys v0.0.0-20170308153327-99f16d856c98 h1:U3NsAsR1IG0Aet3Z+IToBDWbPoJ7hjwgDpqqch4APkU=
-+golang.org/x/sys v0.0.0-20170308153327-99f16d856c98/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY=
diff --git a/nixpkgs/pkgs/tools/system/daemon/default.nix b/nixpkgs/pkgs/tools/system/daemon/default.nix
index 9bc6ecc6ddf..76f53b55f3d 100644
--- a/nixpkgs/pkgs/tools/system/daemon/default.nix
+++ b/nixpkgs/pkgs/tools/system/daemon/default.nix
@@ -6,7 +6,7 @@ stdenv.mkDerivation {
url = http://libslack.org/daemon/download/daemon-0.6.4.tar.gz;
sha256 = "18aw0f8k3j30xqwv4z03962kdpqd10nf1w9liihylmadlx5fmff4";
};
- makeFlags = "PREFIX=$(out)";
+ makeFlags = [ "PREFIX=$(out)" ];
buildInputs = [ perl ];
meta = {
diff --git a/nixpkgs/pkgs/tools/system/di/default.nix b/nixpkgs/pkgs/tools/system/di/default.nix
index b69d440499f..3aef366ea06 100644
--- a/nixpkgs/pkgs/tools/system/di/default.nix
+++ b/nixpkgs/pkgs/tools/system/di/default.nix
@@ -2,11 +2,11 @@
stdenv.mkDerivation rec {
pname = "di";
- version = "4.47.2";
+ version = "4.47.3";
src = fetchurl {
url = "https://gentoo.com/${pname}/${pname}-${version}.tar.gz";
- sha256 = "1g97pp2hznskqlkhl6ppyzgdmv878bcqiwh633kdnm70d1pvh192";
+ sha256 = "0m4npba50sf5s61g5z3xd2r7937zwja941f2h3f081xi24c2hfck";
};
makeFlags = [ "INSTALL_DIR=$(out)" ];
@@ -16,7 +16,7 @@ stdenv.mkDerivation rec {
homepage = https://gentoo.com/di/;
license = licenses.zlib;
updateWalker = true;
- maintainers = with maintainers; [ manveru ndowens ];
+ maintainers = with maintainers; [ manveru ];
platforms = platforms.all;
};
}
diff --git a/nixpkgs/pkgs/tools/system/efivar/default.nix b/nixpkgs/pkgs/tools/system/efivar/default.nix
index 365cfeab058..f02923de349 100644
--- a/nixpkgs/pkgs/tools/system/efivar/default.nix
+++ b/nixpkgs/pkgs/tools/system/efivar/default.nix
@@ -18,6 +18,16 @@ stdenv.mkDerivation rec {
url = "https://patch-diff.githubusercontent.com/raw/rhboot/efivar/pull/133.patch";
sha256 = "038cwldb8sqnal5l6mhys92cqv8x7j8rgsl8i4fiv9ih9znw26i6";
})
+ (fetchurl {
+ name = "fix-misaligned-pointer.patch";
+ url = "https://github.com/rhboot/efivar/commit/b98ba8921010d03f46704a476c69861515deb1ca.patch";
+ sha256 = "0ni9mz7y40a2wf1d1q5n9y5dhcbydxvfdhqic7zsmgnaxs3a0p27";
+ })
+ (fetchurl {
+ name = "fix-gcc9-error.patch";
+ url = "https://github.com/rhboot/efivar/commit/c3c553db85ff10890209d0fe48fb4856ad68e4e0.patch";
+ sha256 = "0lc38npydp069nlcga25wzzm204ww9l6mpjfn6wmhdfhn0pgjwky";
+ })
];
nativeBuildInputs = [ pkgconfig ];
diff --git a/nixpkgs/pkgs/tools/system/facter/default.nix b/nixpkgs/pkgs/tools/system/facter/default.nix
index cc9b95d06c6..86aa5adb6f8 100644
--- a/nixpkgs/pkgs/tools/system/facter/default.nix
+++ b/nixpkgs/pkgs/tools/system/facter/default.nix
@@ -14,11 +14,13 @@ stdenv.mkDerivation rec {
CXXFLAGS = "-fpermissive -Wno-error=catch-value";
NIX_LDFLAGS = "-lblkid";
- cmakeFlags = [
+ cmakeFlags = [
"-DFACTER_RUBY=${ruby}/lib/libruby.so"
"-DRUBY_LIB_INSTALL=${placeholder "out"}/lib/ruby"
];
+ NIX_CFLAGS_COMPILE = "-Wno-error=deprecated-copy";
+
nativeBuildInputs = [ cmake ];
buildInputs = [ boost cpp-hocon curl leatherman libwhereami libyamlcpp openssl ruby utillinux ];
diff --git a/nixpkgs/pkgs/tools/system/fcron/default.nix b/nixpkgs/pkgs/tools/system/fcron/default.nix
index 6ef39a647f7..3dd84aa8a9c 100644
--- a/nixpkgs/pkgs/tools/system/fcron/default.nix
+++ b/nixpkgs/pkgs/tools/system/fcron/default.nix
@@ -27,7 +27,7 @@ stdenv.mkDerivation rec {
"--disable-checks"
];
- installTargets = "install-staged"; # install does also try to change permissions of /etc/* files
+ installTargets = [ "install-staged" ]; # install does also try to change permissions of /etc/* files
# fcron tries to install pid into system directory on install
installFlags = [
diff --git a/nixpkgs/pkgs/tools/system/fio/default.nix b/nixpkgs/pkgs/tools/system/fio/default.nix
index 79b2769ab0d..3718f69370e 100644
--- a/nixpkgs/pkgs/tools/system/fio/default.nix
+++ b/nixpkgs/pkgs/tools/system/fio/default.nix
@@ -4,13 +4,13 @@
stdenv.mkDerivation rec {
pname = "fio";
- version = "3.16";
+ version = "3.17";
src = fetchFromGitHub {
owner = "axboe";
repo = "fio";
rev = "fio-${version}";
- sha256 = "10ygvmzsrqh2bs8v0a304gkl8h50437xfaz1ck7j2ymckipnbha0";
+ sha256 = "1s37w8bhg23ml1f89x0bkaifywlkgh31305vmip4xfvh3j3vjbym";
};
buildInputs = [ python zlib ]
diff --git a/nixpkgs/pkgs/tools/system/gdmap/default.nix b/nixpkgs/pkgs/tools/system/gdmap/default.nix
index 0c254bb2854..4adc8160829 100644
--- a/nixpkgs/pkgs/tools/system/gdmap/default.nix
+++ b/nixpkgs/pkgs/tools/system/gdmap/default.nix
@@ -15,9 +15,7 @@ stdenv.mkDerivation rec {
hardeningDisable = [ "format" ];
- NIX_LDFLAGS = [
- "-lm"
- ];
+ NIX_LDFLAGS = "-lm";
meta = with stdenv.lib; {
homepage = http://gdmap.sourceforge.net;
diff --git a/nixpkgs/pkgs/tools/system/hwinfo/default.nix b/nixpkgs/pkgs/tools/system/hwinfo/default.nix
index 18b452b3ca7..d323f048ba0 100644
--- a/nixpkgs/pkgs/tools/system/hwinfo/default.nix
+++ b/nixpkgs/pkgs/tools/system/hwinfo/default.nix
@@ -34,7 +34,7 @@ stdenv.mkDerivation rec {
description = "Hardware detection tool from openSUSE";
license = licenses.gpl2;
homepage = https://github.com/openSUSE/hwinfo;
- maintainers = with maintainers; [ bobvanderlinden ndowens ];
+ maintainers = with maintainers; [ bobvanderlinden ];
platforms = platforms.linux;
};
}
diff --git a/nixpkgs/pkgs/tools/system/ioping/default.nix b/nixpkgs/pkgs/tools/system/ioping/default.nix
index 274e65bb41d..5cd3a707dde 100644
--- a/nixpkgs/pkgs/tools/system/ioping/default.nix
+++ b/nixpkgs/pkgs/tools/system/ioping/default.nix
@@ -11,11 +11,11 @@ stdenv.mkDerivation rec {
sha256 = "0cv2496jplka55yqdcf3ln78r8yggy4lgmgf06l6fbljjrdx7pgq";
};
- makeFlags = "PREFIX=$(out)";
+ makeFlags = [ "PREFIX=$(out)" ];
meta = with stdenv.lib; {
description = "Disk I/O latency measuring tool";
- maintainers = with maintainers; [ raskin ndowens ];
+ maintainers = with maintainers; [ raskin ];
platforms = platforms.unix;
license = licenses.gpl3Plus;
homepage = https://github.com/koct9i/ioping;
diff --git a/nixpkgs/pkgs/tools/system/ipmitool/default.nix b/nixpkgs/pkgs/tools/system/ipmitool/default.nix
index c906ad3c8cf..3105cba5a34 100644
--- a/nixpkgs/pkgs/tools/system/ipmitool/default.nix
+++ b/nixpkgs/pkgs/tools/system/ipmitool/default.nix
@@ -25,7 +25,7 @@ stdenv.mkDerivation {
${if static then "LDFLAGS=-static --enable-static --disable-shared" else "--enable-shared"}
)
'';
- makeFlags = if static then "AM_LDFLAGS=-all-static" else "";
+ makeFlags = stdenv.lib.optional static "AM_LDFLAGS=-all-static";
dontDisableStatic = static;
meta = with lib; {
diff --git a/nixpkgs/pkgs/tools/system/ipmiutil/default.nix b/nixpkgs/pkgs/tools/system/ipmiutil/default.nix
index 7966deeccc2..0d2a78efba1 100644
--- a/nixpkgs/pkgs/tools/system/ipmiutil/default.nix
+++ b/nixpkgs/pkgs/tools/system/ipmiutil/default.nix
@@ -2,12 +2,12 @@
stdenv.mkDerivation rec {
baseName = "ipmiutil";
- version = "3.1.4";
+ version = "3.1.5";
name = "${baseName}-${version}";
src = fetchurl {
url = "mirror://sourceforge/project/${baseName}/${name}.tar.gz";
- sha256 = "0rca9bjn46i3xzah53l1r5bv1493773chj8x11by2asxyl9wlf4r";
+ sha256 = "18q1nc2caaixy3dr2axdvwq37iz916piarvmg0jdfzaxfpaxpk2q";
};
buildInputs = [ openssl ];
diff --git a/nixpkgs/pkgs/tools/system/java-service-wrapper/default.nix b/nixpkgs/pkgs/tools/system/java-service-wrapper/default.nix
new file mode 100644
index 00000000000..19502e5a352
--- /dev/null
+++ b/nixpkgs/pkgs/tools/system/java-service-wrapper/default.nix
@@ -0,0 +1,41 @@
+{ stdenv, fetchurl
+, jdk
+, ant, cunit, ncurses
+}:
+
+stdenv.mkDerivation rec {
+ pname = "java-service-wrapper";
+ version = "3.5.41";
+
+ src = fetchurl {
+ url = "https://wrapper.tanukisoftware.com/download/${version}/wrapper_${version}_src.tar.gz";
+ sha256 = "0wvazc4y134brn99aa4rc9jdh1h2q3l7qhhvbcs6lhf4ym47sskm";
+ };
+
+ buildInputs = [ jdk ];
+ nativeBuildInputs = [ ant cunit ncurses ];
+
+ buildPhase = ''
+ export ANT_HOME=${ant}
+ export JAVA_HOME=${jdk}/lib/openjdk/jre/
+ export JAVA_TOOL_OPTIONS=-Djava.home=$JAVA_HOME
+ export CLASSPATH=${jdk}/lib/openjdk/lib/tools.jar
+
+ ${if stdenv.isi686 then "./build32.sh" else "./build64.sh"}
+ '';
+
+ installPhase = ''
+ mkdir -p $out/{bin,lib}
+ cp bin/wrapper $out/bin/wrapper
+ cp lib/wrapper.jar $out/lib/wrapper.jar
+ cp lib/libwrapper.so $out/lib/libwrapper.so
+ '';
+
+ meta = with stdenv.lib; {
+ description = "Enables a Java Application to be run as a Windows Service or Unix Daemon";
+ homepage = "https://wrapper.tanukisoftware.com/";
+ license = licenses.gpl2;
+ platforms = [ "x86_64-linux" "i686-linux" ];
+ maintainers = [ maintainers.suhr ];
+ };
+}
diff --git a/nixpkgs/pkgs/tools/system/lr/default.nix b/nixpkgs/pkgs/tools/system/lr/default.nix
index 74bc177023f..788319c0c04 100644
--- a/nixpkgs/pkgs/tools/system/lr/default.nix
+++ b/nixpkgs/pkgs/tools/system/lr/default.nix
@@ -2,16 +2,16 @@
stdenv.mkDerivation rec {
pname = "lr";
- version = "1.4.1";
+ version = "1.5";
src = fetchFromGitHub {
owner = "chneukirchen";
repo = "lr";
rev = "v${version}";
- sha256 = "0mpaqn0zfhxdf9wzs1wgdd29bjcyl3rgfdlqbwhiwcy2h3vy2h8s";
+ sha256 = "1dxla14ldyym01lhmacfwps1vim0fk67c2ik2w08gg534siyj770";
};
- makeFlags = "PREFIX=$(out)";
+ makeFlags = [ "PREFIX=$(out)" ];
meta = with stdenv.lib; {
homepage = https://github.com/chneukirchen/lr;
diff --git a/nixpkgs/pkgs/tools/system/minijail/default.nix b/nixpkgs/pkgs/tools/system/minijail/default.nix
index 74f0a84716a..2b4d1deb9f9 100644
--- a/nixpkgs/pkgs/tools/system/minijail/default.nix
+++ b/nixpkgs/pkgs/tools/system/minijail/default.nix
@@ -1,14 +1,13 @@
-{ stdenv, fetchgit, libcap }:
+{ stdenv, fetchFromGitiles, libcap }:
stdenv.mkDerivation rec {
- shortname = "minijail";
- name = "${shortname}-${version}";
- version = "android-9.0.0_r3";
+ pname = "minijail";
+ version = "android-10.0.0_r9";
- src = fetchgit {
+ src = fetchFromGitiles {
url = "https://android.googlesource.com/platform/external/minijail";
rev = version;
- sha256 = "1g1g52s3q61amcnx8cv1332sbixpck1bmjzgsrjiw5ix7chrzkp2";
+ sha256 = "0gcfsyim1krrddcklydqfxl8mamaxgail2xl5qp9yclq60km8f22";
};
buildInputs = [ libcap ];
@@ -20,13 +19,20 @@ stdenv.mkDerivation rec {
sed -i '/#include <asm\/siginfo.h>/ d' signal_handler.c
'';
+ postPatch = ''
+ patchShebangs platform2_preinstall.sh
+ '';
+
+ postBuild = ''
+ ./platform2_preinstall.sh ${version} $out/include/chromeos
+ '';
+
installPhase = ''
- mkdir -p $out/lib
+ mkdir -p $out/lib/pkgconfig $out/include/chromeos $out/bin
cp -v *.so $out/lib
- mkdir -p $out/include
- cp -v libminijail.h $out/include
- mkdir -p $out/bin
- cp minijail0 $out/bin
+ cp -v *.pc $out/lib/pkgconfig
+ cp -v libminijail.h scoped_minijail.h $out/include/chromeos
+ cp -v minijail0 $out/bin
'';
meta = {
diff --git a/nixpkgs/pkgs/tools/system/netdata/default.nix b/nixpkgs/pkgs/tools/system/netdata/default.nix
index ff6a6e03cc8..4f8cfb966e8 100644
--- a/nixpkgs/pkgs/tools/system/netdata/default.nix
+++ b/nixpkgs/pkgs/tools/system/netdata/default.nix
@@ -1,4 +1,4 @@
-{ stdenv, fetchurl, autoreconfHook, pkgconfig
+{ stdenv, fetchFromGitHub, autoreconfHook, pkgconfig
, CoreFoundation, IOKit, libossp_uuid
, curl, libcap, libuuid, lm_sensors, zlib
, withCups ? false, cups
@@ -12,12 +12,14 @@
with stdenv.lib;
stdenv.mkDerivation rec {
- version = "1.18.1";
+ version = "1.19.0";
pname = "netdata";
- src = fetchurl {
- url = "https://github.com/netdata/netdata/releases/download/v${version}/netdata-v${version}.tar.gz";
- sha256 = "08g5jp63k8y5gbg8v9hxj75q0533c6cyzpjml9z1g5h2h4zaik1r";
+ src = fetchFromGitHub {
+ owner = "netdata";
+ repo = "netdata";
+ rev = "v${version}";
+ sha256 = "1s6kzx4xh8b6v7ki8h2mfzprj5rxvlgx2md20cr8c0v81qpz3q3q";
};
nativeBuildInputs = [ autoreconfHook pkgconfig ];
@@ -34,7 +36,7 @@ stdenv.mkDerivation rec {
./no-files-in-etc-and-var.patch
];
- NIX_CFLAGS_COMPILE = optional withDebug "-O1 -ggdb -DNETDATA_INTERNAL_CHECKS=1";
+ NIX_CFLAGS_COMPILE = optionalString withDebug "-O1 -ggdb -DNETDATA_INTERNAL_CHECKS=1";
postInstall = optionalString (!stdenv.isDarwin) ''
# rename this plugin so netdata will look for setuid wrapper
diff --git a/nixpkgs/pkgs/tools/system/netdata/no-files-in-etc-and-var.patch b/nixpkgs/pkgs/tools/system/netdata/no-files-in-etc-and-var.patch
index c3927c29dd2..138787b98f1 100644
--- a/nixpkgs/pkgs/tools/system/netdata/no-files-in-etc-and-var.patch
+++ b/nixpkgs/pkgs/tools/system/netdata/no-files-in-etc-and-var.patch
@@ -1,9 +1,9 @@
diff --git a/Makefile.am b/Makefile.am
-index f2087bb..7a70cfb 100644
+index 2625dcc..1fdd645 100644
--- a/Makefile.am
+++ b/Makefile.am
-@@ -116,10 +116,10 @@ AM_CFLAGS = \
- $(NULL)
+@@ -113,10 +113,10 @@ AM_CFLAGS = \
+ $(NULL)
sbin_PROGRAMS =
-dist_cache_DATA = packaging/installer/.keep
@@ -17,70 +17,113 @@ index f2087bb..7a70cfb 100644
plugins_PROGRAMS =
LIBNETDATA_FILES = \
+diff --git a/collectors/Makefile.am b/collectors/Makefile.am
+index 7431025..f62f8ac 100644
+--- a/collectors/Makefile.am
++++ b/collectors/Makefile.am
+@@ -30,11 +30,6 @@ SUBDIRS = \
+ usercustompluginsconfigdir=$(configdir)/custom-plugins.d
+ usergoconfigdir=$(configdir)/go.d
+
+-# Explicitly install directories to avoid permission issues due to umask
+-install-exec-local:
+- $(INSTALL) -d $(DESTDIR)$(usercustompluginsconfigdir)
+- $(INSTALL) -d $(DESTDIR)$(usergoconfigdir)
+-
+ dist_noinst_DATA = \
+ README.md \
+ $(NULL)
diff --git a/collectors/charts.d.plugin/Makefile.am b/collectors/charts.d.plugin/Makefile.am
-index 2989b4b..64de7d6 100644
+index b3b2fb9..68b768e 100644
--- a/collectors/charts.d.plugin/Makefile.am
+++ b/collectors/charts.d.plugin/Makefile.am
-@@ -32,7 +32,6 @@ dist_charts_DATA = \
+@@ -31,13 +31,8 @@ dist_charts_DATA = \
userchartsconfigdir=$(configdir)/charts.d
dist_userchartsconfig_DATA = \
- .keep \
$(NULL)
+-# Explicitly install directories to avoid permission issues due to umask
+-install-exec-local:
+- $(INSTALL) -d $(DESTDIR)$(userchartsconfigdir)
+-
chartsconfigdir=$(libconfigdir)/charts.d
+ dist_chartsconfig_DATA = \
+ $(NULL)
diff --git a/collectors/node.d.plugin/Makefile.am b/collectors/node.d.plugin/Makefile.am
-index 3b5a0a5..b7abe01 100644
+index 411bce9..ba60276 100644
--- a/collectors/node.d.plugin/Makefile.am
+++ b/collectors/node.d.plugin/Makefile.am
-@@ -23,7 +23,6 @@ dist_noinst_DATA = \
+@@ -23,13 +23,8 @@ dist_noinst_DATA = \
usernodeconfigdir=$(configdir)/node.d
dist_usernodeconfig_DATA = \
- .keep \
$(NULL)
+-# Explicitly install directories to avoid permission issues due to umask
+-install-exec-local:
+- $(INSTALL) -d $(DESTDIR)$(usernodeconfigdir)
+-
nodeconfigdir=$(libconfigdir)/node.d
+ dist_nodeconfig_DATA = \
+ $(NULL)
diff --git a/collectors/python.d.plugin/Makefile.am b/collectors/python.d.plugin/Makefile.am
-index 652a35d..cf4b2cc 100644
+index cb14e35..8a6c5a7 100644
--- a/collectors/python.d.plugin/Makefile.am
+++ b/collectors/python.d.plugin/Makefile.am
-@@ -29,7 +29,6 @@ dist_python_DATA = \
+@@ -29,13 +29,8 @@ dist_python_DATA = \
userpythonconfigdir=$(configdir)/python.d
dist_userpythonconfig_DATA = \
- .keep \
$(NULL)
+-# Explicitly install directories to avoid permission issues due to umask
+-install-exec-local:
+- $(INSTALL) -d $(DESTDIR)$(userpythonconfigdir)
+-
pythonconfigdir=$(libconfigdir)/python.d
+ dist_pythonconfig_DATA = \
+ $(NULL)
diff --git a/collectors/statsd.plugin/Makefile.am b/collectors/statsd.plugin/Makefile.am
-index e63bf98..0f59782 100644
+index 87b6ca7..9d010c7 100644
--- a/collectors/statsd.plugin/Makefile.am
+++ b/collectors/statsd.plugin/Makefile.am
-@@ -14,6 +14,5 @@ dist_statsdconfig_DATA = \
+@@ -14,9 +14,4 @@ dist_statsdconfig_DATA = \
userstatsdconfigdir=$(configdir)/statsd.d
dist_userstatsdconfig_DATA = \
- .keep \
$(NULL)
-
+-
+-# Explicitly install directories to avoid permission issues due to umask
+-install-exec-local:
+- $(INSTALL) -d $(DESTDIR)$(userstatsdconfigdir)
diff --git a/health/Makefile.am b/health/Makefile.am
-index 62a4c6d..4d651df 100644
+index f63faa8..8912ef2 100644
--- a/health/Makefile.am
+++ b/health/Makefile.am
-@@ -16,7 +16,6 @@ dist_noinst_DATA = \
+@@ -16,13 +16,8 @@ dist_noinst_DATA = \
userhealthconfigdir=$(configdir)/health.d
dist_userhealthconfig_DATA = \
- .keep \
$(NULL)
+-# Explicitly install directories to avoid permission issues due to umask
+-install-exec-local:
+- $(INSTALL) -d $(DESTDIR)$(userhealthconfigdir)
+-
healthconfigdir=$(libconfigdir)/health.d
+ dist_healthconfig_DATA = \
+ health.d/adaptec_raid.conf \
diff --git a/system/Makefile.am b/system/Makefile.am
-index b085dca..ccfa588 100644
+index ad68c65..bf6a840 100644
--- a/system/Makefile.am
+++ b/system/Makefile.am
-@@ -17,10 +17,6 @@ CLEANFILES = \
+@@ -16,14 +16,6 @@ CLEANFILES = \
include $(top_srcdir)/build/subst.inc
SUFFIXES = .in
@@ -88,6 +131,25 @@ index b085dca..ccfa588 100644
- edit-config \
- $(NULL)
-
+-# Explicitly install directories to avoid permission issues due to umask
+-install-exec-local:
+- $(INSTALL) -d $(DESTDIR)$(configdir)
+-
nodist_noinst_DATA = \
- netdata-openrc \
- netdata.logrotate \
+ netdata-openrc \
+ netdata.logrotate \
+diff --git a/web/Makefile.am b/web/Makefile.am
+index ccaccd7..f2fed50 100644
+--- a/web/Makefile.am
++++ b/web/Makefile.am
+@@ -11,10 +11,6 @@ SUBDIRS = \
+
+ usersslconfigdir=$(configdir)/ssl
+
+-# Explicitly install directories to avoid permission issues due to umask
+-install-exec-local:
+- $(INSTALL) -d $(DESTDIR)$(usersslconfigdir)
+-
+ dist_noinst_DATA = \
+ README.md \
+ gui/confluence/README.md \
diff --git a/nixpkgs/pkgs/tools/system/nq/default.nix b/nixpkgs/pkgs/tools/system/nq/default.nix
index 1d8eeff209e..89c84c8c9ca 100644
--- a/nixpkgs/pkgs/tools/system/nq/default.nix
+++ b/nixpkgs/pkgs/tools/system/nq/default.nix
@@ -9,7 +9,7 @@ stdenv.mkDerivation rec {
rev = "v${version}";
sha256 = "1db96ykz35r273jyhf7cdknqk4p2jj9l8gbz7pjy1hq4pb6ffk99";
};
- makeFlags = "PREFIX=$(out)";
+ makeFlags = [ "PREFIX=$(out)" ];
postPatch = ''
sed -i tq \
-e 's|\bfq\b|'$out'/bin/fq|g' \
diff --git a/nixpkgs/pkgs/tools/system/opencl-info/default.nix b/nixpkgs/pkgs/tools/system/opencl-info/default.nix
index 60175d27f15..d1c3d0ec6c0 100644
--- a/nixpkgs/pkgs/tools/system/opencl-info/default.nix
+++ b/nixpkgs/pkgs/tools/system/opencl-info/default.nix
@@ -12,7 +12,7 @@ stdenv.mkDerivation {
buildInputs = [ opencl-clhpp ocl-icd ];
- NIX_LDFLAGS = [ "-lOpenCL" ];
+ NIX_LDFLAGS = "-lOpenCL";
installPhase = ''
install -Dm755 opencl-info $out/bin/opencl-info
diff --git a/nixpkgs/pkgs/tools/system/osquery/0001-Fix-CMake-configuration-for-Nix.patch b/nixpkgs/pkgs/tools/system/osquery/0001-Fix-CMake-configuration-for-Nix.patch
deleted file mode 100644
index b90752f8dc5..00000000000
--- a/nixpkgs/pkgs/tools/system/osquery/0001-Fix-CMake-configuration-for-Nix.patch
+++ /dev/null
@@ -1,41 +0,0 @@
-From 511400b8ec0794588df88e2bb1c45cc6a4a51b1e Mon Sep 17 00:00:00 2001
-From: Maximilian Bosch <maximilian@mbosch.me>
-Date: Sun, 26 May 2019 23:10:02 +0200
-Subject: [PATCH] Fix CMake configuration for Nix
-
-* -fno-limit-debug-info: CLang specific, patch away to support both
- CLang and GCC.
-* Dropped unnecessary `lvm-internal` and `daemonclient` references.
----
- CMakeLists.txt | 1 -
- osquery/tables/CMakeLists.txt | 2 +-
- 2 files changed, 1 insertion(+), 2 deletions(-)
-
-diff --git a/CMakeLists.txt b/CMakeLists.txt
-index f545d6c9..cfe68ddb 100644
---- a/CMakeLists.txt
-+++ b/CMakeLists.txt
-@@ -328,7 +328,6 @@ if (POSIX)
- # To be safe, only include them when building 'release' outputs.
- add_compile_options(
- "$<$<CONFIG:RELEASE>:-g>"
-- "$<$<CONFIG:RELEASE>:-fno-limit-debug-info>"
- "$<$<CONFIG:RELEASE>:-fPIE>"
- "$<$<CONFIG:RELEASE>:-fpie>"
- "$<$<CONFIG:RELEASE>:-fPIC>"
-diff --git a/osquery/tables/CMakeLists.txt b/osquery/tables/CMakeLists.txt
-index 470bdf1d..caa6ab6f 100644
---- a/osquery/tables/CMakeLists.txt
-+++ b/osquery/tables/CMakeLists.txt
-@@ -68,7 +68,7 @@ if(LINUX)
- set(TABLE_PLATFORM "linux")
-
- ADD_OSQUERY_LINK_ADDITIONAL("libresolv.so")
-- ADD_OSQUERY_LINK_ADDITIONAL("cryptsetup devmapper lvm2app lvm-internal daemonclient")
-+ ADD_OSQUERY_LINK_ADDITIONAL("cryptsetup devmapper lvm2app")
- ADD_OSQUERY_LINK_ADDITIONAL("gcrypt gpg-error")
- ADD_OSQUERY_LINK_ADDITIONAL("blkid")
- ADD_OSQUERY_LINK_ADDITIONAL("ip4tc")
---
-2.19.2
-
diff --git a/nixpkgs/pkgs/tools/system/pciutils/default.nix b/nixpkgs/pkgs/tools/system/pciutils/default.nix
index 22154796b31..b773529a0d7 100644
--- a/nixpkgs/pkgs/tools/system/pciutils/default.nix
+++ b/nixpkgs/pkgs/tools/system/pciutils/default.nix
@@ -20,7 +20,7 @@ stdenv.mkDerivation rec {
"DNS=yes"
];
- installTargets = "install install-lib";
+ installTargets = [ "install" "install-lib" ];
# Get rid of update-pciids as it won't work.
postInstall = "rm $out/sbin/update-pciids $out/man/man8/update-pciids.8";
diff --git a/nixpkgs/pkgs/tools/system/plan9port/default.nix b/nixpkgs/pkgs/tools/system/plan9port/default.nix
index 9776960327e..9a4a2238558 100644
--- a/nixpkgs/pkgs/tools/system/plan9port/default.nix
+++ b/nixpkgs/pkgs/tools/system/plan9port/default.nix
@@ -53,7 +53,7 @@ stdenv.mkDerivation {
xorgproto libX11 libXext libXt fontconfig
freetype # fontsrv wants ft2build.h provides system fonts for acme and sam.
] ++ stdenv.lib.optionals stdenv.isDarwin (with darwin.apple_sdk.frameworks; [
- darwin.cf-private Carbon Cocoa IOKit Metal QuartzCore
+ Carbon Cocoa IOKit Metal QuartzCore
]);
builder = ./builder.sh;
diff --git a/nixpkgs/pkgs/tools/system/rowhammer-test/default.nix b/nixpkgs/pkgs/tools/system/rowhammer-test/default.nix
index 5a3ba8b6619..64c184a6122 100644
--- a/nixpkgs/pkgs/tools/system/rowhammer-test/default.nix
+++ b/nixpkgs/pkgs/tools/system/rowhammer-test/default.nix
@@ -10,7 +10,7 @@ stdenv.mkDerivation {
sha256 = "1fbfcnm5gjish47wdvikcsgzlb5vnlfqlzzm6mwiw2j5qkq0914i";
};
- NIX_CFLAGS_COMPILE = stdenv.lib.optional stdenv.isi686 "-Wno-error=format";
+ NIX_CFLAGS_COMPILE = stdenv.lib.optionalString stdenv.isi686 "-Wno-error=format";
buildPhase = "sh -e make.sh";
diff --git a/nixpkgs/pkgs/tools/system/rsyslog/default.nix b/nixpkgs/pkgs/tools/system/rsyslog/default.nix
index 5617ed9dc93..7c5b9a18966 100644
--- a/nixpkgs/pkgs/tools/system/rsyslog/default.nix
+++ b/nixpkgs/pkgs/tools/system/rsyslog/default.nix
@@ -1,6 +1,6 @@
{ stdenv, fetchurl, pkgconfig, autoreconfHook, libestr, json_c, zlib, pythonPackages, fastJson
, libkrb5 ? null, systemd ? null, jemalloc ? null, libmysqlclient ? null, postgresql ? null
-, libdbi ? null, net_snmp ? null, libuuid ? null, curl ? null, gnutls ? null
+, libdbi ? null, net-snmp ? null, libuuid ? null, curl ? null, gnutls ? null
, libgcrypt ? null, liblognorm ? null, openssl ? null, librelp ? null, libksi ? null
, liblogging ? null, libnet ? null, hadoop ? null, rdkafka ? null
, libmongo-client ? null, czmq ? null, rabbitmq-c ? null, hiredis ? null, mongoc ? null
@@ -12,11 +12,11 @@ let
in
stdenv.mkDerivation rec {
pname = "rsyslog";
- version = "8.1910.0";
+ version = "8.1911.0";
src = fetchurl {
url = "https://www.rsyslog.com/files/download/rsyslog/${pname}-${version}.tar.gz";
- sha256 = "14qczsj12spx0m3dz1pkxnacwi5njr0syamnmi1rg8ri5xlyw682";
+ sha256 = "01713vwz3w5fx9b97286h1rx9hxhjsdah96nyhh75bb23impgx71";
};
#patches = [ ./fix-gnutls-detection.patch ];
@@ -24,14 +24,12 @@ stdenv.mkDerivation rec {
nativeBuildInputs = [ pkgconfig autoreconfHook ];
buildInputs = [
fastJson libestr json_c zlib pythonPackages.docutils libkrb5 jemalloc
- postgresql libdbi net_snmp libuuid curl gnutls libgcrypt liblognorm openssl
+ postgresql libdbi net-snmp libuuid curl gnutls libgcrypt liblognorm openssl
librelp libksi liblogging libnet hadoop rdkafka libmongo-client czmq
rabbitmq-c hiredis mongoc
] ++ stdenv.lib.optional (libmysqlclient != null) libmysqlclient
++ stdenv.lib.optional stdenv.isLinux systemd;
- hardeningDisable = [ "format" ];
-
configureFlags = [
"--sysconfdir=/etc"
"--localstatedir=/var"
@@ -54,7 +52,7 @@ stdenv.mkDerivation rec {
(mkFlag (libmysqlclient != null) "mysql")
(mkFlag (postgresql != null) "pgsql")
(mkFlag (libdbi != null) "libdbi")
- (mkFlag (net_snmp != null) "snmp")
+ (mkFlag (net-snmp != null) "snmp")
(mkFlag (libuuid != null) "uuid")
(mkFlag (curl != null) "elasticsearch")
(mkFlag (gnutls != null) "gnutls")
@@ -95,9 +93,7 @@ stdenv.mkDerivation rec {
(mkFlag (hadoop != null) "omhdfs")
(mkFlag (rdkafka != null) "omkafka")
(mkFlag (libmongo-client != null) "ommongodb")
- (mkFlag (czmq != null) "imzmq3")
(mkFlag (czmq != null) "imczmq")
- (mkFlag (czmq != null) "omzmq3")
(mkFlag (czmq != null) "omczmq")
(mkFlag (rabbitmq-c != null) "omrabbitmq")
(mkFlag (hiredis != null) "omhiredis")
diff --git a/nixpkgs/pkgs/tools/system/setserial/default.nix b/nixpkgs/pkgs/tools/system/setserial/default.nix
index 036e3a83cf2..68ea32e1e8a 100644
--- a/nixpkgs/pkgs/tools/system/setserial/default.nix
+++ b/nixpkgs/pkgs/tools/system/setserial/default.nix
@@ -11,7 +11,7 @@ stdenv.mkDerivation rec {
buildInputs = [ groff ];
- installFlags = ''DESTDIR=$(out)'';
+ installFlags = [ "DESTDIR=$(out)" ];
postConfigure = ''
sed -e s@/usr/man/@/share/man/@ -i Makefile
diff --git a/nixpkgs/pkgs/tools/system/stress-ng/default.nix b/nixpkgs/pkgs/tools/system/stress-ng/default.nix
index c98634e1199..7d3e62d7beb 100644
--- a/nixpkgs/pkgs/tools/system/stress-ng/default.nix
+++ b/nixpkgs/pkgs/tools/system/stress-ng/default.nix
@@ -4,11 +4,11 @@
stdenv.mkDerivation rec {
pname = "stress-ng";
- version = "0.10.11";
+ version = "0.10.14";
src = fetchurl {
url = "https://kernel.ubuntu.com/~cking/tarballs/${pname}/${pname}-${version}.tar.xz";
- sha256 = "16z45fmvncpa0bv91dpwarqfm9p7aiqkmlcpmv2y23rh6sikhkdq";
+ sha256 = "0lazjxrlqzhxd6fg3y1vh38h66v8swkd9q2say4m6sglzkfqdfnq";
};
postPatch = ''
@@ -28,7 +28,7 @@ stdenv.mkDerivation rec {
"BASHDIR=${placeholder "out"}/share/bash-completion/completions"
];
- NIX_CFLAGS_COMPILE = stdenv.lib.optional stdenv.hostPlatform.isMusl "-D_LINUX_SYSINFO_H=1";
+ NIX_CFLAGS_COMPILE = stdenv.lib.optionalString stdenv.hostPlatform.isMusl "-D_LINUX_SYSINFO_H=1";
# Won't build on i686 because the binary will be linked again in the
# install phase without checking the dependencies. This will prevent
diff --git a/nixpkgs/pkgs/tools/system/testdisk/default.nix b/nixpkgs/pkgs/tools/system/testdisk/default.nix
index 9cec99145b9..ad11cd2e3b6 100644
--- a/nixpkgs/pkgs/tools/system/testdisk/default.nix
+++ b/nixpkgs/pkgs/tools/system/testdisk/default.nix
@@ -37,7 +37,7 @@ assert enableQt -> qwt != null;
]
++ stdenv.lib.optional enableNtfs ntfs3g
++ stdenv.lib.optional enableExtFs e2fsprogs
- ++ stdenv.lib.optional enableQt [ qtbase qttools qwt ];
+ ++ stdenv.lib.optionals enableQt [ qtbase qttools qwt ];
nativeBuildInputs = [ pkgconfig ];
diff --git a/nixpkgs/pkgs/tools/system/thermald/default.nix b/nixpkgs/pkgs/tools/system/thermald/default.nix
index 8caff1170bc..7afa91abf13 100644
--- a/nixpkgs/pkgs/tools/system/thermald/default.nix
+++ b/nixpkgs/pkgs/tools/system/thermald/default.nix
@@ -3,13 +3,13 @@
stdenv.mkDerivation rec {
pname = "thermald";
- version = "1.9";
+ version = "1.9.1";
src = fetchFromGitHub {
owner = "01org";
repo = "thermal_daemon";
rev = "v${version}";
- sha256 = "1ajhivl9jifcf12nbk281yayk7666v65m249aclyli0bz1kh8cfs";
+ sha256 = "0iagc3jqpnh6q2fa1gx4wx6r8qg0556j60xr159zqg95djr4dv99";
};
nativeBuildInputs = [ pkgconfig ];
diff --git a/nixpkgs/pkgs/tools/system/uefitool/common.nix b/nixpkgs/pkgs/tools/system/uefitool/common.nix
new file mode 100644
index 00000000000..7d5ee82dcf9
--- /dev/null
+++ b/nixpkgs/pkgs/tools/system/uefitool/common.nix
@@ -0,0 +1,39 @@
+{ version, sha256, installFiles }:
+{ lib, mkDerivation, fetchFromGitHub, qtbase, qmake, cmake, zip }:
+
+mkDerivation rec {
+ passthru = {
+ inherit version;
+ inherit sha256;
+ inherit installFiles;
+ };
+ pname = "uefitool";
+ inherit version;
+
+ src = fetchFromGitHub {
+ inherit sha256;
+ owner = "LongSoft";
+ repo = pname;
+ rev = version;
+ };
+
+ buildInputs = [ qtbase ];
+ nativeBuildInputs = [ qmake cmake zip ];
+
+ configurePhase = ":";
+ buildPhase = "bash unixbuild.sh";
+
+ installPhase = ''
+ mkdir -p "$out"/bin
+ cp ${lib.concatStringsSep " " installFiles} "$out"/bin
+ '';
+
+ meta = with lib; {
+ description = "UEFI firmware image viewer and editor";
+ homepage = "https://github.com/LongSoft/uefitool";
+ license = licenses.bsd2;
+ maintainers = with maintainers; [ ajs124 ];
+ # uefitool supposedly works on other platforms, but their build script only works on linux in nixpkgs
+ platforms = platforms.linux;
+ };
+}
diff --git a/nixpkgs/pkgs/tools/system/uefitool/variants.nix b/nixpkgs/pkgs/tools/system/uefitool/variants.nix
new file mode 100644
index 00000000000..cced17e6ddd
--- /dev/null
+++ b/nixpkgs/pkgs/tools/system/uefitool/variants.nix
@@ -0,0 +1,15 @@
+{ libsForQt5 }:
+let
+ common = opts: libsForQt5.callPackage (import ./common.nix opts) {};
+in rec {
+ new-engine = common rec {
+ version = "A56";
+ sha256 = "0sxmjkrwcchxg2qmcjsw2vr42s7cdcg2fxkwb8axq2r2z23465gp";
+ installFiles = [ "UEFITool/UEFITool" "UEFIFind/UEFIFind" "UEFIExtract/UEFIExtract" ];
+ };
+ old-engine = common rec {
+ version = "0.27.0";
+ sha256 = "1i1p823qld927p4f1wcphqcnivb9mq7fi5xmzibxc3g9zzgnyc2h";
+ installFiles = [ "UEFITool" "UEFIReplace/UEFIReplace" "UEFIPatch/UEFIPatch" ];
+ };
+}
diff --git a/nixpkgs/pkgs/tools/system/vboot_reference/default.nix b/nixpkgs/pkgs/tools/system/vboot_reference/default.nix
index 0bf8a7e85dc..1391a2a5ed2 100644
--- a/nixpkgs/pkgs/tools/system/vboot_reference/default.nix
+++ b/nixpkgs/pkgs/tools/system/vboot_reference/default.nix
@@ -1,4 +1,4 @@
-{ stdenv, fetchgit, pkgconfig, libuuid, openssl, libyaml, lzma }:
+{ stdenv, fetchFromGitiles, pkgconfig, libuuid, openssl, libyaml, lzma }:
stdenv.mkDerivation rec {
version = "20180311";
@@ -6,8 +6,8 @@ stdenv.mkDerivation rec {
pname = "vboot_reference";
- src = fetchgit {
- url = https://chromium.googlesource.com/chromiumos/platform/vboot_reference;
+ src = fetchFromGitiles {
+ url = "https://chromium.googlesource.com/chromiumos/platform/vboot_reference";
rev = checkout;
sha256 = "1zja4ma6flch08h5j2l1hqnxmw2xwylidnddxxd5y2x05dai9ddj";
};
@@ -19,6 +19,9 @@ stdenv.mkDerivation rec {
patches = [ ./dont_static_link.patch ];
+ # fix build with gcc9
+ NIX_CFLAGS_COMPILE = [ "-Wno-error" ];
+
postPatch = ''
substituteInPlace Makefile \
--replace "ar qc" '${stdenv.cc.bintools.targetPrefix}ar qc'
diff --git a/nixpkgs/pkgs/tools/system/xe/default.nix b/nixpkgs/pkgs/tools/system/xe/default.nix
index 02d90472440..62423ff594f 100644
--- a/nixpkgs/pkgs/tools/system/xe/default.nix
+++ b/nixpkgs/pkgs/tools/system/xe/default.nix
@@ -11,13 +11,13 @@ stdenv.mkDerivation rec {
sha256 = "04jr8f6jcijr0bsmn8ajm0aj35qh9my3xjsaq64h8lwg5bpyn29x";
};
- makeFlags = "PREFIX=$(out)";
+ makeFlags = [ "PREFIX=$(out)" ];
meta = with lib; {
description = "Simple xargs and apply replacement";
homepage = https://github.com/chneukirchen/xe;
license = licenses.publicDomain;
platforms = platforms.all;
- maintainers = with maintainers; [ cstrahan ndowens ];
+ maintainers = with maintainers; [ cstrahan ];
};
}
diff --git a/nixpkgs/pkgs/tools/text/amber/default.nix b/nixpkgs/pkgs/tools/text/amber/default.nix
index c8f380739a6..935b6a60729 100644
--- a/nixpkgs/pkgs/tools/text/amber/default.nix
+++ b/nixpkgs/pkgs/tools/text/amber/default.nix
@@ -4,16 +4,16 @@
rustPlatform.buildRustPackage rec {
pname = "amber";
- version = "0.5.2";
+ version = "0.5.3";
src = fetchFromGitHub {
owner = "dalance";
repo = pname;
rev = "v${version}";
- sha256 = "0jwrkd6qhxj2mqsfmhk687k15f7gf36gjyxnynj0yh8db2db6mjc";
+ sha256 = "0k70rk19hwdlhhqm91x12xcb8r09kzpijs0xwhplrwdh86qfxymx";
};
- cargoSha256 = "0iv8zvglwaihcc89dk9kkhchbj1g3v8wq8jcbrgcbclcsyymmplc";
+ cargoSha256 = "0hh3sgcdcp0llgf3i3dysrr3vry3fv3fzzf44ad1953d5mnyhvap";
buildInputs = stdenv.lib.optional stdenv.isDarwin Security;
diff --git a/nixpkgs/pkgs/tools/text/ansifilter/default.nix b/nixpkgs/pkgs/tools/text/ansifilter/default.nix
index 7437d2765a9..bc265c5a5ae 100644
--- a/nixpkgs/pkgs/tools/text/ansifilter/default.nix
+++ b/nixpkgs/pkgs/tools/text/ansifilter/default.nix
@@ -20,7 +20,7 @@ stdenv.mkDerivation rec {
meta = with stdenv.lib; {
description = "Tool to convert ANSI to other formats";
longDescription = ''
- Tool to remove ANSI or convert them to another format
+ Tool to remove ANSI or convert them to another format
(HTML, TeX, LaTeX, RTF, Pango or BBCode)
'';
homepage = "http://www.andre-simon.de/doku/ansifilter/en/ansifilter.php";
diff --git a/nixpkgs/pkgs/tools/text/boxes/default.nix b/nixpkgs/pkgs/tools/text/boxes/default.nix
new file mode 100644
index 00000000000..8325c6c08f3
--- /dev/null
+++ b/nixpkgs/pkgs/tools/text/boxes/default.nix
@@ -0,0 +1,47 @@
+{ stdenv, fetchFromGitHub, bison, flex }:
+
+stdenv.mkDerivation rec {
+ pname = "boxes";
+ version = "1.3";
+
+ src = fetchFromGitHub {
+ owner = "ascii-boxes";
+ repo = "boxes";
+ rev = "v${version}";
+ sha256 = "0b12rsynrmkldlwcb62drk33kk0aqwbj10mq5y5x3hjf626gjwsi";
+ };
+
+ # Building instructions:
+ # https://boxes.thomasjensen.com/build.html#building-on-linux--unix
+ nativeBuildInputs = [ bison flex ];
+
+ dontConfigure = true;
+
+ # Makefile references a system wide config file in '/usr/share'. Instead, we
+ # move it within the store by default.
+ preBuild = ''
+ substituteInPlace Makefile \
+ --replace "GLOBALCONF = /usr/share/boxes" \
+ "GLOBALCONF=${placeholder "out"}/share/boxes/boxes-config"
+ '';
+
+ makeFlags = stdenv.lib.optionals stdenv.isDarwin [ "CC=cc" ];
+
+ installPhase = ''
+ install -Dm755 -t $out/bin src/boxes
+ install -Dm644 -t $out/share/boxes boxes-config
+ install -Dm644 -t $out/share/man/man1 doc/boxes.1
+ '';
+
+ meta = with stdenv.lib; {
+ description = "Command line ASCII boxes unlimited!";
+ longDescription = ''
+ Boxes is a command line filter program that draws ASCII art boxes around
+ your input text.
+ '';
+ homepage = https://boxes.thomasjensen.com;
+ license = licenses.gpl2;
+ maintainers = with maintainers; [ waiting-for-dev ];
+ platforms = platforms.unix;
+ };
+}
diff --git a/nixpkgs/pkgs/tools/text/catdoc/default.nix b/nixpkgs/pkgs/tools/text/catdoc/default.nix
index d4f40270915..64ef092f36b 100644
--- a/nixpkgs/pkgs/tools/text/catdoc/default.nix
+++ b/nixpkgs/pkgs/tools/text/catdoc/default.nix
@@ -22,6 +22,6 @@ stdenv.mkDerivation rec {
description = "MS-Word/Excel/PowerPoint to text converter";
platforms = platforms.all;
license = licenses.gpl2;
- maintainers = with maintainers; [ ndowens ];
+ maintainers = with maintainers; [];
};
}
diff --git a/nixpkgs/pkgs/tools/text/diffstat/default.nix b/nixpkgs/pkgs/tools/text/diffstat/default.nix
index fa5718ce4d3..bf4ff279f8f 100644
--- a/nixpkgs/pkgs/tools/text/diffstat/default.nix
+++ b/nixpkgs/pkgs/tools/text/diffstat/default.nix
@@ -1,14 +1,14 @@
{ fetchurl, stdenv }:
stdenv.mkDerivation rec {
- name = "diffstat-1.62";
+ name = "diffstat-1.63";
src = fetchurl {
urls = [
"ftp://ftp.invisible-island.net/diffstat/${name}.tgz"
"https://invisible-mirror.net/archives/diffstat/${name}.tgz"
];
- sha256 = "07sr482y6iw7n7ddkba0w51kbjc99snvnijkn5ba2xzd8hv1h2bz";
+ sha256 = "0vyw200s5dv1257pmrh6c6fdkmw3slyz5szpqfx916xr04sdbpby";
};
meta = with stdenv.lib; {
diff --git a/nixpkgs/pkgs/tools/text/discount/default.nix b/nixpkgs/pkgs/tools/text/discount/default.nix
index 561ee06136d..c1183d4c5a0 100644
--- a/nixpkgs/pkgs/tools/text/discount/default.nix
+++ b/nixpkgs/pkgs/tools/text/discount/default.nix
@@ -27,7 +27,7 @@ stdenv.mkDerivation rec {
description = "Implementation of Markdown markup language in C";
homepage = http://www.pell.portland.or.us/~orc/Code/discount/;
license = licenses.bsd3;
- maintainers = with maintainers; [ shell ndowens ];
+ maintainers = with maintainers; [ shell ];
platforms = platforms.unix;
};
}
diff --git a/nixpkgs/pkgs/tools/text/dos2unix/default.nix b/nixpkgs/pkgs/tools/text/dos2unix/default.nix
index 146338df916..b7efe02f4cd 100644
--- a/nixpkgs/pkgs/tools/text/dos2unix/default.nix
+++ b/nixpkgs/pkgs/tools/text/dos2unix/default.nix
@@ -17,6 +17,6 @@ stdenv.mkDerivation rec {
homepage = "https://waterlan.home.xs4all.nl/dos2unix.html";
changelog = "https://sourceforge.net/p/dos2unix/dos2unix/ci/dos2unix-${version}/tree/dos2unix/NEWS.txt?format=raw";
license = licenses.bsd2;
- maintainers = with maintainers; [ c0bw3b ndowens ];
+ maintainers = with maintainers; [ c0bw3b ];
};
}
diff --git a/nixpkgs/pkgs/tools/text/gawk/default.nix b/nixpkgs/pkgs/tools/text/gawk/default.nix
index 7a5f6c8dd81..0d5a50570f5 100644
--- a/nixpkgs/pkgs/tools/text/gawk/default.nix
+++ b/nixpkgs/pkgs/tools/text/gawk/default.nix
@@ -41,7 +41,9 @@ stdenv.mkDerivation rec {
(if interactive then "--with-readline=${readline.dev}" else "--without-readline")
];
- makeFlags = "AR=${stdenv.cc.targetPrefix}ar";
+ makeFlags = [
+ "AR=${stdenv.cc.targetPrefix}ar"
+ ];
inherit doCheck;
diff --git a/nixpkgs/pkgs/tools/text/gawk/gawk-with-extensions.nix b/nixpkgs/pkgs/tools/text/gawk/gawk-with-extensions.nix
new file mode 100644
index 00000000000..751e5181bb5
--- /dev/null
+++ b/nixpkgs/pkgs/tools/text/gawk/gawk-with-extensions.nix
@@ -0,0 +1,12 @@
+{ runCommand, gawk, extensions, makeWrapper }:
+
+runCommand "gawk-with-extensions" {
+ buildInputs = [ makeWrapper gawk ] ++ extensions;
+} ''
+ mkdir -p $out/bin
+ for i in ${gawk}/bin/*; do
+ name="$(basename "$i")"
+ makeWrapper $i $out/bin/$name \
+ --prefix AWKLIBPATH : "${gawk}/lib/gawk:''${AWKLIBPATH:-}"
+ done
+''
diff --git a/nixpkgs/pkgs/tools/text/gawk/gawkextlib.nix b/nixpkgs/pkgs/tools/text/gawk/gawkextlib.nix
new file mode 100644
index 00000000000..e15b2d4e257
--- /dev/null
+++ b/nixpkgs/pkgs/tools/text/gawk/gawkextlib.nix
@@ -0,0 +1,149 @@
+{ stdenv, recurseIntoAttrs, fetchgit, writeText, pkgconfig, autoreconfHook
+, autoconf, automake, libiconv, libtool, texinfo, gettext, gawk, rapidjson, gd
+, shapelib, libharu, lmdb, gmp, glibcLocales, mpfr, more, postgresql, hiredis
+, expat, tre, makeWrapper }:
+
+let
+ buildExtension = stdenv.lib.makeOverridable
+ ({ name, gawkextlib, extraBuildInputs ? [ ], doCheck ? true }:
+ let is_extension = !isNull gawkextlib;
+ in stdenv.mkDerivation rec {
+ pname = "gawkextlib-${name}";
+ version = "unstable-2019-11-21";
+
+ src = fetchgit {
+ url = "git://git.code.sf.net/p/gawkextlib/code";
+ rev = "f70f10da2804e4fd0a0bac57736e9c1cf21e345d";
+ sha256 = "0r8fz89n3l4dfszs1980yqj0ah95430lj0y1lb7blfkwxa6c2xik";
+ };
+
+ postPatch = ''
+ cd ${name}
+ '';
+
+ nativeBuildInputs = [
+ autoconf
+ automake
+ libtool
+ autoreconfHook
+ pkgconfig
+ texinfo
+ gettext
+ ];
+
+ buildInputs = [ gawk ] ++ extraBuildInputs;
+ propagatedBuildInputs = stdenv.lib.optional is_extension gawkextlib;
+
+ setupHook = if is_extension then ./setup-hook.sh else null;
+ inherit gawk;
+
+ inherit doCheck;
+ checkInputs = [ more ];
+
+ meta = with stdenv.lib; {
+ homepage = "https://sourceforge.net/projects/gawkextlib/";
+ description = "Dynamically loaded extension libraries for GNU AWK";
+ longDescription = ''
+ The gawkextlib project provides several extension libraries for
+ gawk (GNU AWK), as well as libgawkextlib containing some APIs that
+ are useful for building gawk extension libraries. These libraries
+ enable gawk to process XML data, interact with a PostgreSQL
+ database, use the GD graphics library, and perform unlimited
+ precision MPFR calculations.
+ '';
+ license = licenses.gpl3Plus;
+ platforms = platforms.unix;
+ maintainers = with maintainers; [ tomberek ];
+ };
+ });
+ gawkextlib = buildExtension {
+ gawkextlib = null;
+ name = "lib";
+ };
+ libs = {
+ abort = buildExtension {
+ inherit gawkextlib;
+ name = "abort";
+ };
+ aregex = buildExtension {
+ inherit gawkextlib;
+ name = "aregex";
+ extraBuildInputs = [ tre ];
+ };
+ csv = buildExtension {
+ inherit gawkextlib;
+ name = "csv";
+ };
+ errno = buildExtension {
+ inherit gawkextlib;
+ name = "errno";
+ };
+ gd = buildExtension {
+ inherit gawkextlib;
+ name = "gd";
+ extraBuildInputs = [ gd ];
+ };
+ haru = buildExtension {
+ inherit gawkextlib;
+ name = "haru";
+ extraBuildInputs = [ libharu ];
+ };
+ json = buildExtension {
+ inherit gawkextlib;
+ name = "json";
+ extraBuildInputs = [ rapidjson ];
+ };
+ lmdb = buildExtension {
+ inherit gawkextlib;
+ name = "lmdb";
+ extraBuildInputs = [ lmdb ];
+ # mdb_env_open(env, /dev/null)
+ #! No such device
+ # mdb_env_open(env, /dev/null)
+ #! Operation not supported by device
+ doCheck = !stdenv.isDarwin;
+ };
+ mbs = buildExtension {
+ inherit gawkextlib;
+ name = "mbs";
+ extraBuildInputs = [ glibcLocales ];
+ #! "spät": length: 5, mbs_length: 6, wcswidth: 4
+ doCheck = !stdenv.isDarwin;
+ };
+ mpfr = buildExtension {
+ inherit gawkextlib;
+ name = "mpfr";
+ extraBuildInputs = [ gmp mpfr ];
+ };
+ nl_langinfo = buildExtension {
+ inherit gawkextlib;
+ name = "nl_langinfo";
+ };
+ pgsql = buildExtension {
+ inherit gawkextlib;
+ name = "pgsql";
+ extraBuildInputs = [ postgresql ];
+ };
+ redis = buildExtension {
+ inherit gawkextlib;
+ name = "redis";
+ extraBuildInputs = [ hiredis ];
+ };
+ select = buildExtension {
+ inherit gawkextlib;
+ name = "select";
+ };
+ timex = buildExtension {
+ inherit gawkextlib;
+ name = "timex";
+ };
+ xml = buildExtension {
+ inherit gawkextlib;
+ name = "xml";
+ extraBuildInputs = [ expat libiconv ];
+ };
+ };
+in recurseIntoAttrs (libs // {
+ inherit gawkextlib buildExtension;
+ full = builtins.attrValues libs;
+})
diff --git a/nixpkgs/pkgs/tools/text/gawk/setup-hook.sh b/nixpkgs/pkgs/tools/text/gawk/setup-hook.sh
new file mode 100644
index 00000000000..d568cb8c7dd
--- /dev/null
+++ b/nixpkgs/pkgs/tools/text/gawk/setup-hook.sh
@@ -0,0 +1,6 @@
+local oldOpts="-u"
+shopt -qo nounset || oldOpts="+u"
+set +u
+. @gawk@/etc/profile.d/gawk.sh
+gawklibpath_append @out@/lib/gawk
+set "$oldOpts"
diff --git a/nixpkgs/pkgs/tools/text/groff/0001-Fix-cross-compilation-by-looking-for-ar.patch b/nixpkgs/pkgs/tools/text/groff/0001-Fix-cross-compilation-by-looking-for-ar.patch
new file mode 100644
index 00000000000..671293cda5b
--- /dev/null
+++ b/nixpkgs/pkgs/tools/text/groff/0001-Fix-cross-compilation-by-looking-for-ar.patch
@@ -0,0 +1,46 @@
+From 1454525f70b43a6957b7c9e1870e997368787da3 Mon Sep 17 00:00:00 2001
+From: Samuel Dionne-Riel <samuel@dionne-riel.com>
+Date: Fri, 8 Nov 2019 21:59:21 -0500
+Subject: [PATCH] Fix cross-compilation by looking for `ar`.
+
+---
+ Makefile.am | 2 +-
+ configure.ac | 2 ++
+ 2 files changed, 3 insertions(+), 1 deletion(-)
+
+diff --git a/Makefile.am b/Makefile.am
+index d18c49b8..b1b53338 100644
+--- a/Makefile.am
++++ b/Makefile.am
+@@ -494,7 +494,7 @@ CCC=@CXX@
+ # INSTALL_INFO
+ # LN_S
+
+-AR=ar
++AR=@AR@
+ ETAGS=etags
+ ETAGSFLAGS=
+ # Flag that tells etags to assume C++.
+diff --git a/configure.ac b/configure.ac
+index 28e75f17..2449b9f5 100644
+--- a/configure.ac
++++ b/configure.ac
+@@ -37,6 +37,7 @@ AC_CONFIG_AUX_DIR([build-aux])
+
+ AC_CONFIG_HEADERS([src/include/config.h:src/include/config.hin])
+ AC_CONFIG_SRCDIR([src/roff/groff/groff.cpp])
++AC_CONFIG_MACRO_DIR([m4])
+
+ AC_USE_SYSTEM_EXTENSIONS
+
+@@ -72,6 +73,7 @@ GROFF_DOC_CHECK
+ GROFF_MAKEINFO
+ GROFF_TEXI2DVI
+ AC_PROG_RANLIB
++AC_CHECK_TOOL([AR], [ar], [ar])
+ GROFF_INSTALL_SH
+ GROFF_INSTALL_INFO
+ AC_PROG_INSTALL
+--
+2.23.0
+
diff --git a/nixpkgs/pkgs/tools/text/groff/default.nix b/nixpkgs/pkgs/tools/text/groff/default.nix
index 4055c5c083d..ec7e724d1fc 100644
--- a/nixpkgs/pkgs/tools/text/groff/default.nix
+++ b/nixpkgs/pkgs/tools/text/groff/default.nix
@@ -20,6 +20,10 @@ stdenv.mkDerivation rec {
enableParallelBuilding = false;
+ patches = [
+ ./0001-Fix-cross-compilation-by-looking-for-ar.patch
+ ];
+
postPatch = stdenv.lib.optionalString (psutils != null) ''
substituteInPlace src/preproc/html/pre-html.cpp \
--replace "psselect" "${psutils}/bin/psselect"
diff --git a/nixpkgs/pkgs/tools/text/highlight/default.nix b/nixpkgs/pkgs/tools/text/highlight/default.nix
index 13e8e48a921..51cafeb8c4a 100644
--- a/nixpkgs/pkgs/tools/text/highlight/default.nix
+++ b/nixpkgs/pkgs/tools/text/highlight/default.nix
@@ -1,37 +1,58 @@
-{ stdenv, fetchFromGitLab, getopt, lua, boost, pkgconfig, gcc }:
+{ stdenv, fetchFromGitLab, getopt, lua, boost, pkgconfig, swig, perl, gcc }:
with stdenv.lib;
-stdenv.mkDerivation rec {
- pname = "highlight";
- version = "3.54";
-
- src = fetchFromGitLab {
- owner = "saalen";
- repo = "highlight";
- rev = "v${version}";
- sha256 = "1144qv3c02hd3qrnms9cxfprdmkvz06vy4zjq500wg4iz7r8654m";
+let
+ self = stdenv.mkDerivation rec {
+ pname = "highlight";
+ version = "3.54";
+
+ src = fetchFromGitLab {
+ owner = "saalen";
+ repo = "highlight";
+ rev = "v${version}";
+ sha256 = "1144qv3c02hd3qrnms9cxfprdmkvz06vy4zjq500wg4iz7r8654m";
+ };
+
+ enableParallelBuilding = true;
+
+ nativeBuildInputs = [ pkgconfig swig perl ] ++ optional stdenv.isDarwin gcc;
+
+ buildInputs = [ getopt lua boost ];
+
+ prePatch = stdenv.lib.optionalString stdenv.cc.isClang ''
+ substituteInPlace src/makefile \
+ --replace 'CXX=g++' 'CXX=clang++'
+ '';
+
+ preConfigure = ''
+ makeFlags="PREFIX=$out conf_dir=$out/etc/highlight/ CXX=$CXX AR=$AR"
+ '';
+
+ # This has to happen _before_ the main build because it does a
+ # `make clean' for some reason.
+ preBuild = optionalString (!stdenv.isDarwin) ''
+ make -C extras/swig $makeFlags perl
+ '';
+
+ postCheck = optionalString (!stdenv.isDarwin) ''
+ perl -Iextras/swig extras/swig/testmod.pl
+ '';
+
+ preInstall = optionalString (!stdenv.isDarwin) ''
+ mkdir -p $out/${perl.libPrefix}
+ install -m644 extras/swig/highlight.{so,pm} $out/${perl.libPrefix}
+ make -C extras/swig clean # Clean up intermediate files.
+ '';
+
+ meta = with stdenv.lib; {
+ description = "Source code highlighting tool";
+ homepage = "http://www.andre-simon.de/doku/highlight/en/highlight.php";
+ platforms = platforms.unix;
+ maintainers = with maintainers; [ willibutz ];
+ };
};
- enableParallelBuilding = true;
-
- nativeBuildInputs = [ pkgconfig ] ++ optional stdenv.isDarwin gcc ;
-
- buildInputs = [ getopt lua boost ];
-
- prePatch = stdenv.lib.optionalString stdenv.cc.isClang ''
- substituteInPlace src/makefile \
- --replace 'CXX=g++' 'CXX=clang++'
- '';
-
- preConfigure = ''
- makeFlags="PREFIX=$out conf_dir=$out/etc/highlight/ CXX=$CXX AR=$AR"
- '';
-
- meta = with stdenv.lib; {
- description = "Source code highlighting tool";
- homepage = "http://www.andre-simon.de/doku/highlight/en/highlight.php";
- platforms = platforms.unix;
- maintainers = with maintainers; [ ndowens willibutz ];
- };
-}
+in
+ if stdenv.isDarwin then self
+ else perl.pkgs.toPerlModule self
diff --git a/nixpkgs/pkgs/tools/text/kytea/default.nix b/nixpkgs/pkgs/tools/text/kytea/default.nix
index 600907311ef..621408866e8 100644
--- a/nixpkgs/pkgs/tools/text/kytea/default.nix
+++ b/nixpkgs/pkgs/tools/text/kytea/default.nix
@@ -25,7 +25,7 @@ stdenv.mkDerivation rec {
license = licenses.asl20;
- maintainers = with maintainers; [ ericsagnes ndowens ];
+ maintainers = with maintainers; [ ericsagnes ];
platforms = platforms.unix;
};
diff --git a/nixpkgs/pkgs/tools/text/mdcat/default.nix b/nixpkgs/pkgs/tools/text/mdcat/default.nix
index 9ebc9840b07..626963bc601 100644
--- a/nixpkgs/pkgs/tools/text/mdcat/default.nix
+++ b/nixpkgs/pkgs/tools/text/mdcat/default.nix
@@ -2,24 +2,26 @@
rustPlatform.buildRustPackage rec {
pname = "mdcat";
- version = "0.13.0";
+ version = "0.14.0";
src = fetchFromGitHub {
owner = "lunaryorn";
repo = pname;
rev = "mdcat-${version}";
- sha256 = "0xlcpyfmil7sszv4008v4ipqswz49as4nzac0kzmzsb86np191q0";
+ sha256 = "1q8h6pc1i89j1zl4s234inl9v95vsdrry1fzlis89sl2mnbv8ywy";
};
nativeBuildInputs = [ pkgconfig ];
- buildInputs = [ (stdenv.lib.optional stdenv.isDarwin Security) openssl ];
+ buildInputs = [ openssl ] ++ stdenv.lib.optional stdenv.isDarwin Security;
- cargoSha256 = "16q17gm59lpjqa18q289cjmjlf2jicag12jz529x5kh11x6bjl8v";
+ cargoSha256 = "1hxsfls6fpllc9yg5ib3qz6pa62j1y1va8a6356j6812csk4ifnn";
checkInputs = [ ansi2html ];
checkPhase = ''
- # Skip tests that use the network.
- cargo test -- --skip terminal::iterm2
+ # Skip tests that use the network and that include files.
+ cargo test -- --skip terminal::iterm2 --skip terminal::resources::tests::remote \
+ --skip magic::tests::detect_mimetype_of_svg_image \
+ --skip magic::tests::detect_mimetype_of_png_image
'';
meta = with stdenv.lib; {
diff --git a/nixpkgs/pkgs/tools/text/multitran/libmtquery/default.nix b/nixpkgs/pkgs/tools/text/multitran/libmtquery/default.nix
index 8b2032dcaba..baccdfdedba 100644
--- a/nixpkgs/pkgs/tools/text/multitran/libmtquery/default.nix
+++ b/nixpkgs/pkgs/tools/text/multitran/libmtquery/default.nix
@@ -9,9 +9,7 @@ stdenv.mkDerivation {
buildInputs = [ libmtsupport libfacet libbtree multitrandata ];
- NIX_LDFLAGS = [
- "-lbtree"
- ];
+ NIX_LDFLAGS = "-lbtree";
patchPhase = ''
sed -i -e 's@\$(DESTDIR)/usr@'$out'@' \
diff --git a/nixpkgs/pkgs/tools/text/numdiff/default.nix b/nixpkgs/pkgs/tools/text/numdiff/default.nix
index 415ff0b31b7..f7543dc0f70 100644
--- a/nixpkgs/pkgs/tools/text/numdiff/default.nix
+++ b/nixpkgs/pkgs/tools/text/numdiff/default.nix
@@ -17,7 +17,7 @@ stdenv.mkDerivation rec {
'';
homepage = https://www.nongnu.org/numdiff/;
license = licenses.gpl3Plus;
- maintainers = with maintainers; [ ndowens ];
+ maintainers = with maintainers; [];
platforms = platforms.gnu ++ platforms.linux;
};
}
diff --git a/nixpkgs/pkgs/tools/text/ocrmypdf/default.nix b/nixpkgs/pkgs/tools/text/ocrmypdf/default.nix
index 820d98408fb..13353daa171 100644
--- a/nixpkgs/pkgs/tools/text/ocrmypdf/default.nix
+++ b/nixpkgs/pkgs/tools/text/ocrmypdf/default.nix
@@ -28,14 +28,14 @@ let
in buildPythonApplication rec {
pname = "ocrmypdf";
- version = "9.0.3";
+ version = "9.2.0";
disabled = ! python3Packages.isPy3k;
src = fetchFromGitHub {
owner = "jbarlow83";
repo = "OCRmyPDF";
rev = "v${version}";
- sha256 = "1qnjdcbwkxxqfahylzl0wj1gk51yi9m8akd4d1rrq37vg2vwdkjy";
+ sha256 = "1mvc6x5nn242z65pxv39ch71vaikgi89bb0sjbfy2jbw91vk41xa";
};
nativeBuildInputs = with python3Packages; [
@@ -53,7 +53,6 @@ in buildPythonApplication rec {
pikepdf
pillow
reportlab
- ruffus
setuptools
tqdm
];
@@ -71,8 +70,8 @@ in buildPythonApplication rec {
postPatch = ''
substituteInPlace src/ocrmypdf/leptonica.py \
- --replace "ffi.dlopen(find_library('lept'))" \
- 'ffi.dlopen("${stdenv.lib.makeLibraryPath [leptonica]}/liblept${stdenv.hostPlatform.extensions.sharedLibrary}")'
+ --replace "lept = ffi.dlopen(_libpath)" \
+ 'lept = ffi.dlopen("${stdenv.lib.makeLibraryPath [leptonica]}/liblept${stdenv.hostPlatform.extensions.sharedLibrary}")'
'';
# The tests take potentially 20+ minutes, depending on machine
diff --git a/nixpkgs/pkgs/tools/text/qgrep/default.nix b/nixpkgs/pkgs/tools/text/qgrep/default.nix
index 5f0e7461361..c45398e31a1 100644
--- a/nixpkgs/pkgs/tools/text/qgrep/default.nix
+++ b/nixpkgs/pkgs/tools/text/qgrep/default.nix
@@ -1,4 +1,4 @@
-{ stdenv, fetchFromGitHub }:
+{ stdenv, fetchFromGitHub, CoreServices, CoreFoundation, fetchpatch }:
stdenv.mkDerivation rec {
version = "1.1";
@@ -12,6 +12,20 @@ stdenv.mkDerivation rec {
fetchSubmodules = true;
};
+ patches = stdenv.lib.optionals stdenv.isDarwin [
+ (fetchpatch {
+ url = "https://github.com/zeux/qgrep/commit/21c4d1a5ab0f0bdaa0b5ca993c1315c041418cc6.patch";
+ sha256 = "0wpxzrd9pmhgbgby17vb8279xwvkxfdd99gvv7r74indgdxqg7v8";
+ })
+ ];
+
+ buildInputs = stdenv.lib.optionals stdenv.isDarwin [ CoreServices CoreFoundation ];
+
+ postPatch = stdenv.lib.optionalString stdenv.isAarch64 ''
+ substituteInPlace Makefile \
+ --replace "-msse2" "" --replace "-DUSE_SSE2" ""
+ '';
+
installPhase = ''
install -Dm755 qgrep $out/bin/qgrep
'';
@@ -23,5 +37,4 @@ stdenv.mkDerivation rec {
maintainers = [ maintainers.yrashk ];
platforms = platforms.all;
};
-
}
diff --git a/nixpkgs/pkgs/tools/text/reckon/default.nix b/nixpkgs/pkgs/tools/text/reckon/default.nix
index 25e9c07f351..261149229b6 100644
--- a/nixpkgs/pkgs/tools/text/reckon/default.nix
+++ b/nixpkgs/pkgs/tools/text/reckon/default.nix
@@ -4,17 +4,17 @@ stdenv.mkDerivation rec {
pname = "reckon";
version = (import ./gemset.nix).reckon.version;
- env = bundlerEnv {
- name = "${pname}-${version}-gems";
-
- gemdir = ./.;
- };
-
phases = [ "installPhase" ];
buildInputs = [ makeWrapper ];
- installPhase = ''
+ installPhase = let
+ env = bundlerEnv {
+ name = "${pname}-${version}-gems";
+
+ gemdir = ./.;
+ };
+ in ''
mkdir -p $out/bin
makeWrapper ${env}/bin/reckon $out/bin/reckon
'';
diff --git a/nixpkgs/pkgs/tools/text/replace/default.nix b/nixpkgs/pkgs/tools/text/replace/default.nix
index 9242014cdca..3549e7c1c94 100644
--- a/nixpkgs/pkgs/tools/text/replace/default.nix
+++ b/nixpkgs/pkgs/tools/text/replace/default.nix
@@ -10,7 +10,7 @@ stdenv.mkDerivation {
outputs = [ "out" "man" ];
- makeFlags = "TREE=\$(out) MANTREE=\$(TREE)/share/man";
+ makeFlags = [ "TREE=\$(out)" "MANTREE=\$(TREE)/share/man" ];
preBuild = ''
sed -e "s@/bin/mv@$(type -P mv)@" -i replace.h
diff --git a/nixpkgs/pkgs/tools/text/ripgrep-all/default.nix b/nixpkgs/pkgs/tools/text/ripgrep-all/default.nix
index 521b123d878..df54724d384 100644
--- a/nixpkgs/pkgs/tools/text/ripgrep-all/default.nix
+++ b/nixpkgs/pkgs/tools/text/ripgrep-all/default.nix
@@ -1,5 +1,5 @@
{ stdenv, lib, fetchFromGitHub, rustPlatform, makeWrapper, ffmpeg
-, pandoc, poppler_utils, ripgrep, Security
+, pandoc, poppler_utils, ripgrep, Security, imagemagick, tesseract
}:
rustPlatform.buildRustPackage rec {
@@ -19,9 +19,33 @@ rustPlatform.buildRustPackage rec {
postInstall = ''
wrapProgram $out/bin/rga \
- --prefix PATH ":" "${lib.makeBinPath [ ffmpeg pandoc poppler_utils ripgrep ]}"
+ --prefix PATH ":" "${lib.makeBinPath [ ffmpeg pandoc poppler_utils ripgrep imagemagick tesseract ]}"
'';
+ # Use upstream's example data to run a couple of queries to ensure the dependencies
+ # for all of the adapters are available.
+ installCheckPhase = ''
+ set -e
+ export PATH="$PATH:$out/bin"
+
+ test1=$(rga --rga-no-cache "hello" exampledir/ | wc -l)
+ test2=$(rga --rga-no-cache --rga-adapters=tesseract "crate" exampledir/screenshot.png | wc -l)
+
+ if [ $test1 != 26 ]
+ then
+ echo "ERROR: test1 failed! Could not find the word 'hello' 26 times in the sample data."
+ exit 1
+ fi
+
+ if [ $test2 != 1 ]
+ then
+ echo "ERROR: test2 failed! Could not find the word 'crate' in the screenshot."
+ exit 1
+ fi
+ '';
+
+ doInstallCheck = true;
+
meta = with stdenv.lib; {
description = "Ripgrep, but also search in PDFs, E-Books, Office documents, zip, tar.gz, and more";
longDescription = ''
@@ -33,7 +57,7 @@ rustPlatform.buildRustPackage rec {
'';
homepage = https://github.com/phiresky/ripgrep-all;
license = with licenses; [ agpl3Plus ];
- maintainers = with maintainers; [ zaninime ];
+ maintainers = with maintainers; [ zaninime ma27 ];
platforms = platforms.all;
};
}
diff --git a/nixpkgs/pkgs/tools/text/ripgrep/default.nix b/nixpkgs/pkgs/tools/text/ripgrep/default.nix
index 4b1275d041f..963ef99c68a 100644
--- a/nixpkgs/pkgs/tools/text/ripgrep/default.nix
+++ b/nixpkgs/pkgs/tools/text/ripgrep/default.nix
@@ -14,7 +14,7 @@ rustPlatform.buildRustPackage rec {
sha256 = "1iga3320mgi7m853la55xip514a3chqsdi1a1rwv25lr9b1p7vd3";
};
- cargoSha256 = "11477l4l1y55klw5dp2kbsnv989vdz1547ml346hcfbkzv7m450v";
+ cargoSha256 = "17ldqr3asrdcsh4l29m3b5r37r5d0b3npq1lrgjmxb6vlx6a36qh";
cargoBuildFlags = stdenv.lib.optional withPCRE2 "--features pcre2";
@@ -36,7 +36,7 @@ rustPlatform.buildRustPackage rec {
description = "A utility that combines the usability of The Silver Searcher with the raw speed of grep";
homepage = https://github.com/BurntSushi/ripgrep;
license = with licenses; [ unlicense /* or */ mit ];
- maintainers = with maintainers; [ tailhook globin ];
+ maintainers = with maintainers; [ tailhook globin ma27 ];
platforms = platforms.all;
};
}
diff --git a/nixpkgs/pkgs/tools/text/sgml/jade/default.nix b/nixpkgs/pkgs/tools/text/sgml/jade/default.nix
index b7f8bd6df38..2cc40510121 100644
--- a/nixpkgs/pkgs/tools/text/sgml/jade/default.nix
+++ b/nixpkgs/pkgs/tools/text/sgml/jade/default.nix
@@ -19,7 +19,7 @@ stdenv.mkDerivation rec {
buildInputs = [ gnum4 ];
- NIX_CFLAGS_COMPILE = [ "-Wno-deprecated" ];
+ NIX_CFLAGS_COMPILE = "-Wno-deprecated";
preInstall = ''
install -d -m755 "$out"/lib
diff --git a/nixpkgs/pkgs/tools/text/smu/default.nix b/nixpkgs/pkgs/tools/text/smu/default.nix
index a80a6d3d799..50bceb4fcb3 100644
--- a/nixpkgs/pkgs/tools/text/smu/default.nix
+++ b/nixpkgs/pkgs/tools/text/smu/default.nix
@@ -14,7 +14,9 @@ stdenv.mkDerivation rec {
# _FORTIFY_SOURCE requires compiling with optimization (-O)
NIX_CFLAGS_COMPILE = "-O";
- makeFlags = [ "DESTDIR=$(out)" "PREFIX=" ];
+ makeFlags = [
+ "PREFIX=${placeholder "out"}"
+ ];
meta = with lib; {
description = "simple markup - markdown like syntax";
diff --git a/nixpkgs/pkgs/tools/text/snippetpixie/default.nix b/nixpkgs/pkgs/tools/text/snippetpixie/default.nix
new file mode 100644
index 00000000000..585c183a81c
--- /dev/null
+++ b/nixpkgs/pkgs/tools/text/snippetpixie/default.nix
@@ -0,0 +1,89 @@
+{ stdenv
+, fetchFromGitHub
+, meson
+, ninja
+, vala
+, pkgconfig
+, wrapGAppsHook
+, appstream
+, desktop-file-utils
+, python3
+, libgee
+, glib
+, gtk3
+, sqlite
+, at-spi2-atk
+, at-spi2-core
+, dbus
+, ibus
+, json-glib
+, pantheon
+}:
+
+stdenv.mkDerivation rec {
+ pname = "snippetpixie";
+ version = "1.2.2";
+
+ src = fetchFromGitHub {
+ owner = "bytepixie";
+ repo = pname;
+ rev = version;
+ sha256 = "096xj7n1ypr8ss8mbwd1hyypvmzw5lc0hjlj2d1x8hbjljldfd13";
+ };
+
+ nativeBuildInputs = [
+ meson
+ ninja
+ vala
+ pkgconfig
+ wrapGAppsHook
+ appstream
+ desktop-file-utils
+ python3
+ ];
+
+ buildInputs = [
+ libgee
+ glib
+ gtk3
+ sqlite
+ at-spi2-atk
+ at-spi2-core
+ dbus
+ ibus
+ json-glib
+ pantheon.granite
+ pantheon.elementary-gtk-theme
+ pantheon.elementary-icon-theme
+ ];
+
+ doCheck = true;
+
+ postPatch = ''
+ chmod +x meson/post_install.py
+ patchShebangs meson/post_install.py
+ '';
+
+ passthru = {
+ updateScript = pantheon.updateScript {
+ attrPath = pname;
+ };
+ };
+
+ meta = with stdenv.lib; {
+ description = "Your little expandable text snippet helper";
+ longDescription = ''
+ Your little expandable text snippet helper.
+
+ Save your often used text snippets and then expand them whenever you type their abbreviation.
+
+ For example:- "spr`" expands to "Snippet Pixie rules!"
+ '';
+ homepage = https://www.snippetpixie.com;
+ license = licenses.gpl2Plus;
+ maintainers = with maintainers; [
+ ianmjones
+ ] ++ pantheon.maintainers;
+ platforms = platforms.linux;
+ };
+}
diff --git a/nixpkgs/pkgs/tools/text/untex/default.nix b/nixpkgs/pkgs/tools/text/untex/default.nix
index 923adf8571d..f9c7e3cdfc6 100644
--- a/nixpkgs/pkgs/tools/text/untex/default.nix
+++ b/nixpkgs/pkgs/tools/text/untex/default.nix
@@ -12,8 +12,8 @@ stdenv.mkDerivation rec {
hardeningDisable = [ "format" ];
unpackPhase = "tar xf $src";
- installTargets = "install install.man";
- installFlags = "BINDIR=$(out)/bin MANDIR=$(out)/share/man/man1";
+ installTargets = [ "install" "install.man" ];
+ installFlags = [ "BINDIR=$(out)/bin" "MANDIR=$(out)/share/man/man1" ];
preBuild = ''
sed -i '1i#include <stdlib.h>\n#include <string.h>' untex.c
mkdir -p $out/bin $out/share/man/man1
diff --git a/nixpkgs/pkgs/tools/text/wgetpaste/default.nix b/nixpkgs/pkgs/tools/text/wgetpaste/default.nix
index 7b08cffe42d..3360fd4cbe0 100644
--- a/nixpkgs/pkgs/tools/text/wgetpaste/default.nix
+++ b/nixpkgs/pkgs/tools/text/wgetpaste/default.nix
@@ -24,7 +24,7 @@ stdenv.mkDerivation rec {
description = "Command-line interface to various pastebins";
homepage = http://wgetpaste.zlin.dk/;
license = stdenv.lib.licenses.publicDomain;
- maintainers = with stdenv.lib.maintainers; [ qknight domenkozar ndowens ];
+ maintainers = with stdenv.lib.maintainers; [ qknight domenkozar ];
platforms = stdenv.lib.platforms.all;
};
}
diff --git a/nixpkgs/pkgs/tools/text/xurls/default.nix b/nixpkgs/pkgs/tools/text/xurls/default.nix
index 6e66090d88f..c8d10a6e269 100644
--- a/nixpkgs/pkgs/tools/text/xurls/default.nix
+++ b/nixpkgs/pkgs/tools/text/xurls/default.nix
@@ -17,7 +17,7 @@ buildGoPackage rec {
meta = with stdenv.lib; {
description = "Extract urls from text";
homepage = https://github.com/mvdan/xurls;
- maintainers = with maintainers; [ koral ndowens ];
+ maintainers = with maintainers; [ koral ];
platforms = platforms.unix;
license = licenses.bsd3;
};
diff --git a/nixpkgs/pkgs/tools/text/zimreader/default.nix b/nixpkgs/pkgs/tools/text/zimreader/default.nix
index 15e5ddf2f19..177f9326dd2 100644
--- a/nixpkgs/pkgs/tools/text/zimreader/default.nix
+++ b/nixpkgs/pkgs/tools/text/zimreader/default.nix
@@ -12,7 +12,7 @@ stdenv.mkDerivation {
sha256 = "0x529137rxy6ld64xqa6xmn93121ripxvkf3sc7hv3wg6km182sw";
};
- patchFlags = "-p2";
+ patchFlags = [ "-p2" ];
patches = [
(fetchpatch {
name = "zimreader_tntnet221.patch";
diff --git a/nixpkgs/pkgs/tools/typesetting/asciidoc/default.nix b/nixpkgs/pkgs/tools/typesetting/asciidoc/default.nix
index 83aa667f58f..44c5f6d1f24 100644
--- a/nixpkgs/pkgs/tools/typesetting/asciidoc/default.nix
+++ b/nixpkgs/pkgs/tools/typesetting/asciidoc/default.nix
@@ -259,7 +259,7 @@ stdenv.mkDerivation rec {
'';
preInstall = "mkdir -p $out/etc/vim";
- makeFlags = if stdenv.isCygwin then "DESTDIR=/." else null;
+ makeFlags = stdenv.lib.optional stdenv.isCygwin "DESTDIR=/.";
meta = with stdenv.lib; {
description = "Text-based document generation system";
diff --git a/nixpkgs/pkgs/tools/typesetting/fop/default.nix b/nixpkgs/pkgs/tools/typesetting/fop/default.nix
index c681eaa6ddc..0b5c79756bd 100644
--- a/nixpkgs/pkgs/tools/typesetting/fop/default.nix
+++ b/nixpkgs/pkgs/tools/typesetting/fop/default.nix
@@ -46,6 +46,6 @@ stdenv.mkDerivation rec {
homepage = https://xmlgraphics.apache.org/fop/;
license = licenses.asl20;
platforms = platforms.all;
- maintainers = with maintainers; [ bjornfor ndowens ];
+ maintainers = with maintainers; [ bjornfor ];
};
}
diff --git a/nixpkgs/pkgs/tools/typesetting/hevea/default.nix b/nixpkgs/pkgs/tools/typesetting/hevea/default.nix
index aa32d52dfc6..2a126ac5c83 100644
--- a/nixpkgs/pkgs/tools/typesetting/hevea/default.nix
+++ b/nixpkgs/pkgs/tools/typesetting/hevea/default.nix
@@ -10,7 +10,7 @@ stdenv.mkDerivation rec {
buildInputs = with ocamlPackages; [ ocaml ocamlbuild ];
- makeFlags = "PREFIX=$(out)";
+ makeFlags = [ "PREFIX=$(out)" ];
meta = with stdenv.lib; {
description = "A quite complete and fast LATEX to HTML translator";
diff --git a/nixpkgs/pkgs/tools/typesetting/pdf2djvu/default.nix b/nixpkgs/pkgs/tools/typesetting/pdf2djvu/default.nix
index 5b1412f3792..1090ad300f7 100644
--- a/nixpkgs/pkgs/tools/typesetting/pdf2djvu/default.nix
+++ b/nixpkgs/pkgs/tools/typesetting/pdf2djvu/default.nix
@@ -1,4 +1,4 @@
-{ stdenv, fetchurl, pkgconfig, djvulibre, poppler, fontconfig, libjpeg }:
+{ stdenv, fetchurl, fetchpatch, pkgconfig, djvulibre, poppler, fontconfig, libjpeg }:
stdenv.mkDerivation rec {
version = "0.9.14";
@@ -9,6 +9,18 @@ stdenv.mkDerivation rec {
sha256 = "05z2bbg54pfsi668fwcjrcr5iz9llf9gprzdsrn6fw5wjv4876zi";
};
+ patches = [
+ # fix build with Poppler 0.83
+ (fetchpatch {
+ url = "https://github.com/jwilk/pdf2djvu/commit/0aa17bb79dbcdfc249e4841f5b5398e27cfdfd41.patch";
+ sha256 = "0mr14nz5w7z4ri2556bxkf3cnn2f7dhwsld7csrh6z5qqb7d5805";
+ })
+ (fetchpatch {
+ url = "https://github.com/jwilk/pdf2djvu/commit/27b9e028091a2f370367e9eaf37b4bb1cde87b62.patch";
+ sha256 = "03apsg1487jl800q8j70hicvg6xsndd593bg7babm4vgivkxb0da";
+ })
+ ];
+
nativeBuildInputs = [ pkgconfig ];
buildInputs = [ djvulibre poppler fontconfig libjpeg ];
diff --git a/nixpkgs/pkgs/tools/typesetting/pygmentex/default.nix b/nixpkgs/pkgs/tools/typesetting/pygmentex/default.nix
deleted file mode 100644
index 662f7717b33..00000000000
--- a/nixpkgs/pkgs/tools/typesetting/pygmentex/default.nix
+++ /dev/null
@@ -1,56 +0,0 @@
-{ stdenv, fetchFromBitbucket, python2Packages }:
-
-python2Packages.buildPythonApplication rec {
- pname = "pygmentex";
- version = "0.8";
- tlType = "run";
-
- src = fetchFromBitbucket {
- owner = "romildo";
- repo = pname;
- rev = version;
- sha256 = "07dnv7hgppy15bda2kcbrlvfqzl6lhza80klc7133dwg8q92hm6m";
- };
-
- pythonPath = with python2Packages; [ pygments chardet ];
-
- dontBuild = true;
-
- doCheck = false;
-
- installPhase = ''
- mkdir -p $out/bin
- cp -a pygmentex.py $out/bin
-
- mkdir -p $out/scripts/pygmentex
- ln -s $out/bin/pygmentex.py $out/scripts/pygmentex
-
- mkdir -p $out/tex/latex/pygmentex
- cp -a pygmentex.sty $out/tex/latex/pygmentex
-
- mkdir -p $out/doc/latex/pygmentex
- cp -a README demo.* blueshade.png Factorial.java $out/doc/latex/pygmentex
- '';
-
- meta = with stdenv.lib; {
- homepage = https://www.ctan.org/pkg/pygmentex;
- description = "Auxiliary tool for typesetting code listings in LaTeX documents using Pygments";
- longDescription = ''
- PygmenTeX is a Python-based LaTeX package that can be used for
- typesetting code listings in a LaTeX document using Pygments.
-
- Pygments is a generic syntax highlighter for general use in all kinds of
- software such as forum systems, wikis or other applications that need to
- prettify source code.
-
- This package installs just the script needed to process code listings
- snippets extracted from the a LaTeX document by the pygmentex LaTeX
- package. In order to use it effectivelly the texlive package pygmentex
- also has to be installed. This can be done by adding pygmentex to
- texlive.combine.
- '';
- license = licenses.lppl13c;
- platforms = platforms.unix;
- maintainers = with maintainers; [ romildo ];
- };
-}
diff --git a/nixpkgs/pkgs/tools/typesetting/tectonic/default.nix b/nixpkgs/pkgs/tools/typesetting/tectonic/default.nix
index 98c80da5b2c..c78e60996bb 100644
--- a/nixpkgs/pkgs/tools/typesetting/tectonic/default.nix
+++ b/nixpkgs/pkgs/tools/typesetting/tectonic/default.nix
@@ -3,16 +3,16 @@
rustPlatform.buildRustPackage rec {
pname = "tectonic";
- version = "0.1.11";
+ version = "0.1.12";
src = fetchFromGitHub {
owner = "tectonic-typesetting";
repo = "tectonic";
rev = "v${version}";
- sha256 = "1j98qxlq74vs8nf2jsn2xw9iyrf8kih4v0hrvznkhcab6bpibp2x";
+ sha256 = "0dycv135bkpf71iwlwh8rwwvn287d605nl7v8mjxlrsayiivdmn9";
};
- cargoSha256 = "0hsm5a40lc3gy1zrfrchp7zby17xjv5a4llqr4xmka07y7sk08fn";
+ cargoSha256 = "0bkgh73kqcdv3j9hr3m13wrdhls3zrk7aii9shzbzl6rnp2ry1az";
nativeBuildInputs = [ pkgconfig ];
diff --git a/nixpkgs/pkgs/tools/typesetting/tex/texlive/bin.nix b/nixpkgs/pkgs/tools/typesetting/tex/texlive/bin.nix
index 5bb02f06f23..9eaa81e144b 100644
--- a/nixpkgs/pkgs/tools/typesetting/tex/texlive/bin.nix
+++ b/nixpkgs/pkgs/tools/typesetting/tex/texlive/bin.nix
@@ -1,8 +1,8 @@
-{ stdenv, fetchurl, fetchpatch
+{ stdenv, fetchurl, fetchpatch, patchutils
, texlive
, zlib, libiconv, libpng, libX11
, freetype, gd, libXaw, icu, ghostscript, libXpm, libXmu, libXext
-, perl, perlPackages, pkgconfig, autoreconfHook
+, perl, perlPackages, python2Packages, pkgconfig, autoreconfHook
, poppler, libpaper, graphite2, zziplib, harfbuzz, potrace, gmp, mpfr
, cairo, pixman, xorg, clisp, biber, xxHash
, makeWrapper, shortenPerlShebang
@@ -27,27 +27,47 @@ let
};
patches = [
- ] ++ stdenv.lib.optionals (stdenv.lib.versionAtLeast (stdenv.lib.getVersion poppler) "0.76") [
- (fetchpatch {
- name = "pdftex-poppler0.76.patch";
- url = "https://git.archlinux.org/svntogit/packages.git/plain/texlive-bin/trunk/pdftex-poppler0.76.patch?id=8cb784073cfd2299a6c301ce7bb0d89126a47f4e";
- sha256 = "04x7myzysranddzjifxhahl7gjy407zkiyzfs5l9cbwzp6pqh7gh";
-
- includes = [
- "texk/web2c/pdftexdir/pdftoepdf-poppler0.76.0.cc"
- "texk/web2c/pdftexdir/pdftosrc-poppler0.76.0.cc"
- ];
- })
];
postPatch = let
- popplerSuffix = if (stdenv.lib.versionAtLeast (stdenv.lib.getVersion poppler) "0.76") then "-poppler0.76.0" else "-poppler0.72.0";
+ # The source compatible with Poppler ${popplerVersion} not yet available in TeXLive ${year}
+ # so we need to use files introduced in https://www.tug.org/svn/texlive?view=revision&revision=52959
+ popplerVersion = "0.83.0";
+ pdftoepdf = let
+ revert-pdfmajorversion = fetchpatch {
+ name = "pdftoepdf-revert-pdfmajorversion.patch";
+ url = "https://www.tug.org/svn/texlive/trunk/Build/source/texk/web2c/pdftexdir/pdftoepdf.cc?view=patch&r1=52953&r2=52952&pathrev=52953";
+ sha256 = "19jiv5xbvnfdk8lj6yd6mdxgs8f313a4dwg8svjj90dd35kjcfh8";
+ revert = true;
+ postFetch = ''
+ # The default file, changed by this patch, contains a branch for vendored Poppler
+ # The version-specific file replaces the section with an error, so we need to drop that part from the patch.
+ # Fortunately, there is not anything else in the patch after #else.
+ sed '/ #else/q' $out > "$tmpfile"
+ ${patchutils}/bin/recountdiff "$tmpfile" > "$out"
+ '';
+ };
+ in fetchurl {
+ name = "pdftoepdf-poppler${popplerVersion}.cc";
+ url = "https://www.tug.org/svn/texlive/trunk/Build/source/texk/web2c/pdftexdir/pdftoepdf-poppler${popplerVersion}.cc?revision=52959&view=co";
+ sha256 = "0pngvw1jgnm4cqskrzf5a3z8rj4ssl10007n3wbblj50hvvzjph3";
+ postFetch = ''
+ # The trunk added some extra arguments to certain functions so we need to revert that
+ # https://www.tug.org/svn/texlive?view=revision&revision=52953
+ patch $out < ${revert-pdfmajorversion}
+ '';
+ };
+ pdftosrc = fetchurl {
+ name = "pdftosrc-poppler${popplerVersion}.cc";
+ url = "https://www.tug.org/svn/texlive/trunk/Build/source/texk/web2c/pdftexdir/pdftosrc-poppler${popplerVersion}.cc?revision=52959&view=co";
+ sha256 = "0iq2cmwvf2lxy32sygrafwqgcwvvbdnvxm5l3mrg9cb2a1g06380";
+ };
in ''
for i in texk/kpathsea/mktex*; do
sed -i '/^mydir=/d' "$i"
done
- cp -pv texk/web2c/pdftexdir/pdftoepdf{${popplerSuffix},}.cc
- cp -pv texk/web2c/pdftexdir/pdftosrc{${popplerSuffix},}.cc
+ cp -pv ${pdftoepdf} texk/web2c/pdftexdir/pdftoepdf.cc
+ cp -pv ${pdftosrc} texk/web2c/pdftexdir/pdftosrc.cc
'';
# remove when removing synctex-missing-header.patch
@@ -158,7 +178,7 @@ core = stdenv.mkDerivation rec {
'' + cleanBrokenLinks;
# needed for poppler and xpdf
- CXXFLAGS = stdenv.lib.optionalString stdenv.cc.isClang "-std=c++11";
+ CXXFLAGS = stdenv.lib.optionalString stdenv.cc.isClang "-std=c++14";
setupHook = ./setup-hook.sh; # TODO: maybe texmf-nix -> texmf (and all references)
passthru = { inherit version buildInputs; };
@@ -241,9 +261,24 @@ dvisvgm = stdenv.mkDerivation {
inherit (common) src;
+ patches = [
+ # Fix for ghostscript>=9.27
+ # Backport of
+ # https://github.com/mgieseki/dvisvgm/commit/bc51951bc90b700c28ea018993bdb058e5271e9b
+ ./dvisvgm-fix.patch
+
+ # Needed for ghostscript>=9.50
+ (fetchpatch {
+ url = "https://github.com/mgieseki/dvisvgm/commit/7b93a9197b69305429183affd24fa40ee04a663a.patch";
+ sha256 = "1gmj76ja9xng39wxckhs9q140abixgb8rkrcfv2cdgq786wm3vag";
+ stripLen = 1;
+ extraPrefix = "texk/dvisvgm/dvisvgm-src/";
+ })
+ ];
+
nativeBuildInputs = [ pkgconfig ];
# TODO: dvisvgm still uses vendored dependencies
- buildInputs = [ core/*kpathsea*/ ghostscript zlib freetype potrace xxHash ];
+ buildInputs = [ core/*kpathsea*/ ghostscript zlib freetype /*potrace xxHash*/ ];
preConfigure = "cd texk/dvisvgm";
@@ -267,6 +302,15 @@ dvipng = stdenv.mkDerivation {
nativeBuildInputs = [ perl pkgconfig ];
buildInputs = [ core/*kpathsea*/ zlib libpng freetype gd ghostscript makeWrapper ];
+ patches = [
+ (fetchpatch {
+ url = "http://git.savannah.nongnu.org/cgit/dvipng.git/patch/?id=f3ff241827a587e3d39eda477041fd3280f5b245";
+ sha256 = "1a0ixl9mga24p6xk8dy3v60yifvbzd27vs0hv8996rfkp8jqa7is";
+ stripLen = 1;
+ extraPrefix = "texk/dvipng/dvipng-src/";
+ })
+ ];
+
preConfigure = ''
cd texk/dvipng
patchShebangs doc/texi2pod.pl
@@ -315,6 +359,43 @@ latexindent = perlPackages.buildPerlPackage rec {
};
+pygmentex = python2Packages.buildPythonApplication rec {
+ pname = "pygmentex";
+ inherit (src) version;
+
+ src = stdenv.lib.head (builtins.filter (p: p.tlType == "run") texlive.pygmentex.pkgs);
+
+ propagatedBuildInputs = with python2Packages; [ pygments chardet ];
+
+ dontBuild = true;
+
+ doCheck = false;
+
+ installPhase = ''
+ runHook preInstall
+
+ install -D ./scripts/pygmentex/pygmentex.py "$out"/bin/pygmentex
+
+ runHook postInstall
+ '';
+
+ meta = with stdenv.lib; {
+ homepage = https://www.ctan.org/pkg/pygmentex;
+ description = "Auxiliary tool for typesetting code listings in LaTeX documents using Pygments";
+ longDescription = ''
+ PygmenTeX is a Python-based LaTeX package that can be used for
+ typesetting code listings in a LaTeX document using Pygments.
+
+ Pygments is a generic syntax highlighter for general use in all kinds of
+ software such as forum systems, wikis or other applications that need to
+ prettify source code.
+ '';
+ license = licenses.lppl13c;
+ maintainers = with maintainers; [ romildo ];
+ };
+};
+
+
inherit biber;
bibtexu = bibtex8;
bibtex8 = stdenv.mkDerivation {
diff --git a/nixpkgs/pkgs/tools/typesetting/tex/texlive/combine.nix b/nixpkgs/pkgs/tools/typesetting/tex/texlive/combine.nix
index 6622a03decc..a4b0fb99f3e 100644
--- a/nixpkgs/pkgs/tools/typesetting/tex/texlive/combine.nix
+++ b/nixpkgs/pkgs/tools/typesetting/tex/texlive/combine.nix
@@ -128,8 +128,6 @@ in buildEnv {
mkdir $out/share/texmf-local
)
'' +
- # updmap.cfg seems like not needing changes
-
# now filter hyphenation patterns, in a hacky way ATM
(let
pnames = uniqueStrings (map (p: p.pname) pkgList.splitBin.wrong);
@@ -214,7 +212,12 @@ in buildEnv {
texlinks.sh "$out/bin" && wrapBin
(perl `type -P fmtutil.pl` --sys --all || true) | grep '^fmtutil' # too verbose
#texlinks.sh "$out/bin" && wrapBin # do we need to regenerate format links?
+
+ # Disable unavailable map files
echo y | perl `type -P updmap.pl` --sys --syncwithtrees --force
+ # Regenerate the map files (this is optional)
+ perl `type -P updmap.pl` --sys --force
+
perl `type -P mktexlsr.pl` ./share/texmf-* # to make sure
'' +
# install (wrappers for) scripts, based on a list from upstream texlive
diff --git a/nixpkgs/pkgs/tools/typesetting/tex/texlive/default.nix b/nixpkgs/pkgs/tools/typesetting/tex/texlive/default.nix
index 0c05b3be18d..44dc45fdfb2 100644
--- a/nixpkgs/pkgs/tools/typesetting/tex/texlive/default.nix
+++ b/nixpkgs/pkgs/tools/typesetting/tex/texlive/default.nix
@@ -100,11 +100,15 @@ let
map (up: "${up}/${urlName}.tar.xz") urlPrefixes
);
- # Upstream refuses to distribute stable tarballs,
- # so we host snapshots on IPFS or on our own servers.
- # Common packages should get served from the binary cache anyway.
- # See discussions, e.g. https://github.com/NixOS/nixpkgs/issues/24683
+ # The tarballs on CTAN mirrors for the current release are constantly
+ # receiving updates, so we can't use those directly. Stable snapshots
+ # need to be used instead. Ideally, for the release branches of NixOS we
+ # should be switching to the tlnet-final versions
+ # (https://tug.org/historic/).
urlPrefixes = args.urlPrefixes or [
+ # Snapshots hosted by one of the texlive release managers
+ https://texlive.info/tlnet-archive/2019/10/19/tlnet/archive
+
# Mirror hosted by @veprbl
http://146.185.144.154/texlive-2019
diff --git a/nixpkgs/pkgs/tools/typesetting/tex/texlive/dvisvgm-fix.patch b/nixpkgs/pkgs/tools/typesetting/tex/texlive/dvisvgm-fix.patch
new file mode 100644
index 00000000000..0e927e24fd0
--- /dev/null
+++ b/nixpkgs/pkgs/tools/typesetting/tex/texlive/dvisvgm-fix.patch
@@ -0,0 +1,16 @@
+diff a/texk/dvisvgm/dvisvgm-src/src/psdefs.cpp b/texk/dvisvgm/dvisvgm-src/src/psdefs.cpp
+--- a/texk/dvisvgm/dvisvgm-src/src/psdefs.cpp
++++ b/texk/dvisvgm/dvisvgm-src/src/psdefs.cpp
+@@ -107,8 +107,7 @@ const char *PSInterpreter::PSDEFS =
+ "dmode sysexec<</Normal 0/Compatible 0/Multiply 1/Screen 2/Overlay 3/SoftLight "
+ "4/HardLight 5/ColorDodge 6/ColorBurn 7/Darken 8/Lighten 9/Difference 10/Exclus"
+ "ion 11/Hue 12/Saturation 13/Color 14/Luminosity 15/CompatibleOverprint 16>>exc"
+-"h get 1(setblendmode)prcmd}def/@pdfpagecount{GS_PDF_ProcSet begin pdfdict begi"
+-"n(r)file pdfopen begin pdfpagecount currentdict pdfclose end end end}def/@pdfp"
+-"agebox{GS_PDF_ProcSet begin pdfdict begin(r)file pdfopen begin dup dup 1 lt ex"
+-"ch pdfpagecount gt or{pop}{pdfgetpage/MediaBox pget pop aload pop}ifelse curre"
+-"ntdict pdfclose end end end}def DELAYBIND{.bindnow}if ";
++"h get 1(setblendmode)prcmd}def/@pdfpagecount{(r)file runpdfbegin pdfpagecount "
++"runpdfend}def/@pdfpagebox{(r)file runpdfbegin dup dup 1 lt exch pdfpagecount g"
++"t or{pop}{pdfgetpage/MediaBox pget pop aload pop}ifelse runpdfend}def DELAYBIN"
++"D{.bindnow}if ";
diff --git a/nixpkgs/pkgs/tools/video/bento4/default.nix b/nixpkgs/pkgs/tools/video/bento4/default.nix
index 5594143bfbc..4dea8dba6ed 100644
--- a/nixpkgs/pkgs/tools/video/bento4/default.nix
+++ b/nixpkgs/pkgs/tools/video/bento4/default.nix
@@ -3,13 +3,13 @@
}:
stdenv.mkDerivation rec {
pname = "bento4";
- version = "1.5.1-628";
+ version = "1.5.1-629";
src = fetchFromGitHub {
owner = "axiomatic-systems";
repo = "Bento4";
rev = "v${version}";
- sha256 = "1fv0k7f3ifwa0c0x22wblm6i8x9zbc13pg047a9i74n456p0mzp3";
+ sha256 = "1614idy0r7qrkiaq4kz3gh1b1bpx592aqvi574kxnjrxc34kpmb3";
};
patches = [ ./libap4.patch ];
diff --git a/nixpkgs/pkgs/tools/video/mjpegtools/default.nix b/nixpkgs/pkgs/tools/video/mjpegtools/default.nix
index 31d26a6c72a..3e72d8b8af5 100644
--- a/nixpkgs/pkgs/tools/video/mjpegtools/default.nix
+++ b/nixpkgs/pkgs/tools/video/mjpegtools/default.nix
@@ -21,7 +21,7 @@ stdenv.mkDerivation rec {
buildInputs = [ libdv libjpeg libpng ]
++ lib.optionals (!withMinimal) [ gtk2 libX11 SDL SDL_gfx ];
- NIX_CFLAGS_COMPILE = lib.optional (!withMinimal) "-I${SDL.dev}/include/SDL";
+ NIX_CFLAGS_COMPILE = lib.optionalString (!withMinimal) "-I${SDL.dev}/include/SDL";
postPatch = ''
sed -i -e '/ARCHFLAGS=/s:=.*:=:' configure
diff --git a/nixpkgs/pkgs/tools/video/rav1e/default.nix b/nixpkgs/pkgs/tools/video/rav1e/default.nix
new file mode 100644
index 00000000000..b57fa540837
--- /dev/null
+++ b/nixpkgs/pkgs/tools/video/rav1e/default.nix
@@ -0,0 +1,45 @@
+{ rustPlatform, fetchFromGitHub, fetchurl, stdenv, lib, nasm }:
+
+rustPlatform.buildRustPackage rec {
+ pname = "rav1e";
+ version = "0.2.1";
+
+ src = stdenv.mkDerivation rec {
+ name = "${pname}-${version}-source";
+
+ src = fetchFromGitHub {
+ owner = "xiph";
+ repo = "rav1e";
+ rev = "v${version}";
+ sha256 = "1lv8g1vw11lanyx6lqr34hb6m4x1fvwb60kgg5nk8s8hgdr18i0y";
+ };
+ cargoLock = fetchurl {
+ url = "https://github.com/xiph/rav1e/releases/download/v${version}/Cargo.lock";
+ sha256 = "1d51wcm537pzfmq48vsv87dwf035yl03qkfc0372gchpv079561w";
+ };
+
+ installPhase = ''
+ mkdir -p $out
+ cp -R ./* $out/
+ cp ${cargoLock} $out/Cargo.lock
+ '';
+ };
+
+ cargoSha256 = "0frr4sx05pwvj9gmlvmis6lrnbwk3x579fv3kw38374jy33nrr6z";
+
+ nativeBuildInputs = [ nasm ];
+
+ meta = with lib; {
+ description = "The fastest and safest AV1 encoder";
+ longDescription = ''
+ rav1e is an AV1 video encoder. It is designed to eventually cover all use
+ cases, though in its current form it is most suitable for cases where
+ libaom (the reference encoder) is too slow.
+ Features: https://github.com/xiph/rav1e#features
+ '';
+ inherit (src.src.meta) homepage;
+ license = licenses.bsd2;
+ maintainers = [ maintainers.primeos ];
+ platforms = platforms.all;
+ };
+}
diff --git a/nixpkgs/pkgs/tools/video/vncrec/default.nix b/nixpkgs/pkgs/tools/video/vncrec/default.nix
index c09da3dd231..857524661bf 100644
--- a/nixpkgs/pkgs/tools/video/vncrec/default.nix
+++ b/nixpkgs/pkgs/tools/video/vncrec/default.nix
@@ -22,7 +22,7 @@ stdenv.mkDerivation {
"BINDIR=${placeholder "out"}/bin"
"MANDIR=${placeholder "out"}/share/man"
];
- installTargets = "install install.man";
+ installTargets = [ "install" "install.man" ];
meta = {
description = "VNC recorder";
diff --git a/nixpkgs/pkgs/tools/video/yamdi/default.nix b/nixpkgs/pkgs/tools/video/yamdi/default.nix
index 8fca318529f..b9b16e4d8ec 100644
--- a/nixpkgs/pkgs/tools/video/yamdi/default.nix
+++ b/nixpkgs/pkgs/tools/video/yamdi/default.nix
@@ -14,7 +14,7 @@ stdenv.mkDerivation rec {
sha256 = "4a6630f27f6c22bcd95982bf3357747d19f40bd98297a569e9c77468b756f715";
};
- buildFlags = "CC=cc";
+ buildFlags = [ "CC=cc" ];
installPhase = ''
install -D {,$out/bin/}yamdi
diff --git a/nixpkgs/pkgs/tools/virtualization/amazon-ecs-cli/default.nix b/nixpkgs/pkgs/tools/virtualization/amazon-ecs-cli/default.nix
index 7745a3e7cb5..a27e006053f 100644
--- a/nixpkgs/pkgs/tools/virtualization/amazon-ecs-cli/default.nix
+++ b/nixpkgs/pkgs/tools/virtualization/amazon-ecs-cli/default.nix
@@ -4,10 +4,18 @@ stdenv.mkDerivation rec {
pname = "amazon-ecs-cli";
version = "1.18.0";
- src = fetchurl {
- url = "https://s3.amazonaws.com/amazon-ecs-cli/ecs-cli-linux-amd64-v${version}";
- sha256 = "1w4n7rkcxpdzg7450s22a80a27g845n61k2bdfhq4c1md7604nyz";
- };
+ src =
+ if stdenv.hostPlatform.system == "x86_64-linux" then
+ fetchurl {
+ url = "https://s3.amazonaws.com/amazon-ecs-cli/ecs-cli-linux-amd64-v${version}";
+ sha256 = "1w4n7rkcxpdzg7450s22a80a27g845n61k2bdfhq4c1md7604nyz";
+ }
+ else if stdenv.hostPlatform.system == "x86_64-darwin" then
+ fetchurl {
+ url = "https://s3.amazonaws.com/amazon-ecs-cli/ecs-cli-darwin-amd64-v${version}";
+ sha256 = "011rw4rv2vz6xa4vqfjsf9j6m3rffclv9xh0dgf5ckd07m3fd3sm";
+ }
+ else throw "Architecture not supported";
dontUnpack = true;
@@ -24,7 +32,6 @@ stdenv.mkDerivation rec {
longDescription = "The Amazon Elastic Container Service (Amazon ECS) command line interface (CLI) provides high-level commands to simplify creating, updating, and monitoring clusters and tasks from a local development environment.";
license = licenses.asl20;
maintainers = with maintainers; [ Scriptkiddi ];
- platforms = [ "x86_64-linux" ];
+ platforms = [ "x86_64-linux" "x86_64-darwin" ];
};
}
-
diff --git a/nixpkgs/pkgs/tools/virtualization/cri-tools/default.nix b/nixpkgs/pkgs/tools/virtualization/cri-tools/default.nix
index f8df49240a5..910f2822c6f 100644
--- a/nixpkgs/pkgs/tools/virtualization/cri-tools/default.nix
+++ b/nixpkgs/pkgs/tools/virtualization/cri-tools/default.nix
@@ -2,12 +2,12 @@
buildGoPackage rec {
pname = "cri-tools";
- version = "1.16.1";
+ version = "1.17.0";
src = fetchFromGitHub {
owner = "kubernetes-sigs";
repo = pname;
rev = "v${version}";
- sha256 = "1kpbs9dxwhlmqdqrmsqhp03qs4s7dl8b86lkmg066sicdaw433fn";
+ sha256 = "0h9gry56graif761lmcy91q9fzwvmwb15wcx8245927yfg5j0zgh";
};
goPackagePath = "github.com/kubernetes-sigs/cri-tools";