diff options
author | Alyssa Ross <hi@alyssa.is> | 2024-05-03 15:14:25 +0200 |
---|---|---|
committer | Alyssa Ross <hi@alyssa.is> | 2024-05-07 11:19:19 +0200 |
commit | d92b2b6a1bbd322dd65a8b6f51019610d350046e (patch) | |
tree | 7f7c21927b9cc05676501f297c51eb76b49e326c /nixpkgs/pkgs/by-name/va | |
parent | 93c9e56b40530cc627d921cfc255c05b495d4017 (diff) | |
parent | 49050352f602fe87d16ff7b2b6a05b79eb20dc6f (diff) | |
download | nixlib-d92b2b6a1bbd322dd65a8b6f51019610d350046e.tar nixlib-d92b2b6a1bbd322dd65a8b6f51019610d350046e.tar.gz nixlib-d92b2b6a1bbd322dd65a8b6f51019610d350046e.tar.bz2 nixlib-d92b2b6a1bbd322dd65a8b6f51019610d350046e.tar.lz nixlib-d92b2b6a1bbd322dd65a8b6f51019610d350046e.tar.xz nixlib-d92b2b6a1bbd322dd65a8b6f51019610d350046e.tar.zst nixlib-d92b2b6a1bbd322dd65a8b6f51019610d350046e.zip |
Merge remote-tracking branch 'nixpkgs/nixos-unstable-small'
Conflicts: nixpkgs/nixos/modules/services/mail/mailman.nix nixpkgs/nixos/modules/services/mail/public-inbox.nix nixpkgs/pkgs/build-support/go/module.nix
Diffstat (limited to 'nixpkgs/pkgs/by-name/va')
-rw-r--r-- | nixpkgs/pkgs/by-name/va/vale-ls/package.nix | 61 | ||||
-rw-r--r-- | nixpkgs/pkgs/by-name/va/valkey/package.nix | 85 | ||||
-rw-r--r-- | nixpkgs/pkgs/by-name/va/valkey/use_system_jemalloc.patch | 15 | ||||
-rw-r--r-- | nixpkgs/pkgs/by-name/va/vaults/package.nix | 85 |
4 files changed, 246 insertions, 0 deletions
diff --git a/nixpkgs/pkgs/by-name/va/vale-ls/package.nix b/nixpkgs/pkgs/by-name/va/vale-ls/package.nix new file mode 100644 index 000000000000..b79f94c7627c --- /dev/null +++ b/nixpkgs/pkgs/by-name/va/vale-ls/package.nix @@ -0,0 +1,61 @@ +{ lib +, stdenv +, fetchFromGitHub +, makeWrapper +, rustPlatform +, pkg-config +, openssl +, darwin +, vale +}: + +rustPlatform.buildRustPackage { + pname = "vale-ls"; + version = "0.3.7-unstable-2024-03-13"; + + src = fetchFromGitHub { + owner = "errata-ai"; + repo = "vale-ls"; + rev = "473e16bc88ec48b35e2bd208adc174878c4d5396"; + hash = "sha256-ywJsnWMc9NSjYjsK6SXdMAQl+hcP+KQ7Xp1A99aeqAg="; + }; + + nativeBuildInputs = [ + rustPlatform.bindgenHook + pkg-config + makeWrapper + ]; + + buildInputs = [ + openssl + ] ++ lib.optionals stdenv.isDarwin (with darwin.apple_sdk.frameworks; [ + SystemConfiguration + ]); + + checkFlags = [ + # The following tests are reaching to the network. + "--skip=vale::tests" + ] ++ lib.optionals (stdenv.isLinux && stdenv.isAarch64) [ + # This test does not account for the existence of aarch64-linux machines, + # despite upstream shipping artifacts for that architecture + "--skip=utils::tests::arch" + ]; + + env.OPENSSL_NO_VENDOR = true; + + cargoHash = "sha256-ifKdSTmVWfDZF5Kn9b5JpzDxa160oRTfzjvxeL9POBg="; + + postInstall = '' + wrapProgram $out/bin/vale-ls \ + --prefix PATH : ${lib.makeBinPath [ vale ]} + ''; + + meta = with lib; { + description = "LSP implementation for the Vale command-line tool"; + homepage = "https://github.com/errata-ai/vale-ls"; + license = licenses.mit; + mainProgram = "vale-ls"; + maintainers = with maintainers; [ foo-dogsquared jansol ]; + }; +} + diff --git a/nixpkgs/pkgs/by-name/va/valkey/package.nix b/nixpkgs/pkgs/by-name/va/valkey/package.nix new file mode 100644 index 000000000000..60c866992659 --- /dev/null +++ b/nixpkgs/pkgs/by-name/va/valkey/package.nix @@ -0,0 +1,85 @@ +{ lib, stdenv, fetchFromGitHub, lua, jemalloc, pkg-config +, tcl, which, ps, getconf +, withSystemd ? lib.meta.availableOn stdenv.hostPlatform systemd, systemd +# dependency ordering is broken at the moment when building with openssl +, tlsSupport ? !stdenv.hostPlatform.isStatic, openssl + +# Using system jemalloc fixes cross-compilation and various setups. +# However the experimental 'active defragmentation' feature of valkey requires +# their custom patched version of jemalloc. +, useSystemJemalloc ? true +}: + +stdenv.mkDerivation (finalAttrs: { + pname = "valkey"; + version = "7.2.5"; + + src = fetchFromGitHub { + owner = "valkey-io"; + repo = "valkey"; + rev = finalAttrs.version; + hash = "sha256-nDAQbxlSBXKSJqZgvElsrZeDnHw4A4eA8f9ecXdx0/U="; + }; + + patches = lib.optional useSystemJemalloc ./use_system_jemalloc.patch; + + nativeBuildInputs = [ pkg-config ]; + + buildInputs = [ lua ] + ++ lib.optional useSystemJemalloc jemalloc + ++ lib.optional withSystemd systemd + ++ lib.optional tlsSupport openssl; + + preBuild = lib.optionalString stdenv.isDarwin '' + substituteInPlace src/Makefile --replace-fail "-flto" "" + ''; + + # More cross-compiling fixes. + makeFlags = [ "PREFIX=${placeholder "out"}" ] + ++ lib.optionals (stdenv.buildPlatform != stdenv.hostPlatform) [ "AR=${stdenv.cc.targetPrefix}ar" "RANLIB=${stdenv.cc.targetPrefix}ranlib" ] + ++ lib.optionals withSystemd [ "USE_SYSTEMD=yes" ] + ++ lib.optionals tlsSupport [ "BUILD_TLS=yes" ]; + + enableParallelBuilding = true; + + hardeningEnable = lib.optionals (!stdenv.isDarwin) [ "pie" ]; + + env.NIX_CFLAGS_COMPILE = toString (lib.optionals stdenv.cc.isClang [ "-std=c11" ]); + + # darwin currently lacks a pure `pgrep` which is extensively used here + doCheck = !stdenv.isDarwin; + nativeCheckInputs = [ which tcl ps ] ++ lib.optionals stdenv.hostPlatform.isStatic [ getconf ]; + checkPhase = '' + runHook preCheck + + # disable test "Connect multiple replicas at the same time": even + # upstream find this test too timing-sensitive + substituteInPlace tests/integration/replication.tcl \ + --replace-fail 'foreach mdl {no yes}' 'foreach mdl {}' + + substituteInPlace tests/support/server.tcl \ + --replace-fail 'exec /usr/bin/env' 'exec env' + + sed -i '/^proc wait_load_handlers_disconnected/{n ; s/wait_for_condition 50 100/wait_for_condition 50 500/; }' \ + tests/support/util.tcl + + ./runtest \ + --no-latency \ + --timeout 2000 \ + --clients $NIX_BUILD_CORES \ + --tags -leaks \ + --skipunit integration/failover # flaky and slow + + runHook postCheck + ''; + + meta = with lib; { + homepage = "https://valkey.io/"; + description = "A high-performance data structure server that primarily serves key/value workloads"; + license = licenses.bsd3; + platforms = platforms.all; + maintainers = with maintainers; [ rucadi ]; + changelog = "https://github.com/valkey-io/valkey/releases/tag/${finalAttrs.version}"; + mainProgram = "valkey-cli"; + }; +}) diff --git a/nixpkgs/pkgs/by-name/va/valkey/use_system_jemalloc.patch b/nixpkgs/pkgs/by-name/va/valkey/use_system_jemalloc.patch new file mode 100644 index 000000000000..41451e393612 --- /dev/null +++ b/nixpkgs/pkgs/by-name/va/valkey/use_system_jemalloc.patch @@ -0,0 +1,15 @@ +diff --git a/src/Makefile b/src/Makefile +index 3bc9f11c0..a4b23d986 100644 +--- a/src/Makefile ++++ b/src/Makefile +@@ -229,8 +229,8 @@ endif + + ifeq ($(MALLOC),jemalloc) + DEPENDENCY_TARGETS+= jemalloc +- FINAL_CFLAGS+= -DUSE_JEMALLOC -I../deps/jemalloc/include +- FINAL_LIBS := ../deps/jemalloc/lib/libjemalloc.a $(FINAL_LIBS) ++ FINAL_CFLAGS+= -DUSE_JEMALLOC -DJEMALLOC_NO_DEMANGLE -I/usr/include/jemalloc ++ FINAL_LIBS := -ljemalloc $(FINAL_LIBS) + endif + + ifeq ($(BUILD_TLS),yes) \ No newline at end of file diff --git a/nixpkgs/pkgs/by-name/va/vaults/package.nix b/nixpkgs/pkgs/by-name/va/vaults/package.nix new file mode 100644 index 000000000000..e44c3b73efec --- /dev/null +++ b/nixpkgs/pkgs/by-name/va/vaults/package.nix @@ -0,0 +1,85 @@ +{ fetchFromGitHub +, lib +, stdenv +, appstream-glib +, desktop-file-utils +, meson +, ninja +, pkg-config +, python3 +, rustPlatform +, rustc +, cargo +, wrapGAppsHook +, glib +, gtk4 +, libadwaita +, wayland +, gocryptfs +, cryfs +, cmake +}: + +stdenv.mkDerivation rec { + pname = "vaults"; + version = "0.7.1"; + + src = fetchFromGitHub { + owner = "mpobaschnig"; + repo = "Vaults"; + rev = version; + hash = "sha256-jA7OeyRqc5DxkS4sMx9cIbVlZwd++aCQi09uBQik1oA="; + }; + + cargoDeps = rustPlatform.fetchCargoTarball { + inherit src; + name = "${pname}-${version}"; + hash = "sha256-l9Zer6d6kgjIUNiQ1VdQQ57caVNWfzCkdsMf79X8Ar4="; + }; + + postPatch = '' + patchShebangs build-aux + ''; + + makeFlags = [ + "PREFIX=${placeholder "out"}" + ]; + + preFixup = '' + gappsWrapperArgs+=( + --prefix PATH : "${lib.makeBinPath [ gocryptfs cryfs ]}" + ) + ''; + + nativeBuildInputs = [ + desktop-file-utils + meson + ninja + pkg-config + wrapGAppsHook + cargo + rustc + rustPlatform.cargoSetupHook + ]; + + buildInputs = [ + appstream-glib + gtk4 + python3 + glib + libadwaita + wayland + gocryptfs + cryfs + ]; + + meta = { + description = "GTK frontend for encrypted vaults supporting gocryptfs and CryFS for encryption"; + homepage = "https://mpobaschnig.github.io/vaults/"; + changelog = "https://github.com/mpobaschnig/vaults/releases/tag/${version}"; + license = lib.licenses.gpl3Plus; + maintainers = with lib.maintainers; [ benneti ]; + mainProgram = "vaults"; + platforms = lib.platforms.linux; + }; +} |