diff options
author | Matthew Bauer <mjbauer95@gmail.com> | 2018-07-05 20:13:47 -0400 |
---|---|---|
committer | GitHub <noreply@github.com> | 2018-07-05 20:13:47 -0400 |
commit | 9cd122a2c4c0780dafc254b20f172151005f319d (patch) | |
tree | 21bc97de1f7045afdb6fd176eda140cc5a36a9ee /pkgs/development | |
parent | f513d580b06c37ef516a9af18f68b7567e6a05fe (diff) | |
parent | 2f523dd9a48112d878b65877c8ea923c63321fb4 (diff) | |
download | nixlib-9cd122a2c4c0780dafc254b20f172151005f319d.tar nixlib-9cd122a2c4c0780dafc254b20f172151005f319d.tar.gz nixlib-9cd122a2c4c0780dafc254b20f172151005f319d.tar.bz2 nixlib-9cd122a2c4c0780dafc254b20f172151005f319d.tar.lz nixlib-9cd122a2c4c0780dafc254b20f172151005f319d.tar.xz nixlib-9cd122a2c4c0780dafc254b20f172151005f319d.tar.zst nixlib-9cd122a2c4c0780dafc254b20f172151005f319d.zip |
Merge pull request #43088 from matthewbauer/misc
Get rid of 2 unneeded packages
Diffstat (limited to 'pkgs/development')
17 files changed, 274 insertions, 63 deletions
diff --git a/pkgs/development/compilers/kotlin/default.nix b/pkgs/development/compilers/kotlin/default.nix index 342051230030..89c6151a186b 100644 --- a/pkgs/development/compilers/kotlin/default.nix +++ b/pkgs/development/compilers/kotlin/default.nix @@ -1,14 +1,14 @@ { stdenv, fetchurl, makeWrapper, jre, unzip }: let - version = "1.2.50"; + version = "1.2.51"; in stdenv.mkDerivation rec { inherit version; name = "kotlin-${version}"; src = fetchurl { url = "https://github.com/JetBrains/kotlin/releases/download/v${version}/kotlin-compiler-${version}.zip"; - sha256 = "1abis73ij334vfwn9k4s9rsa1va7h31a9g97g84i2rrp7cq2q1mw"; + sha256 = "0b7rlv4w3bqfxwp0sici8lraskavmx08qgf1jddjcgaxh0f72x4a"; }; propagatedBuildInputs = [ jre ] ; diff --git a/pkgs/development/compilers/lessc/default.nix b/pkgs/development/compilers/lessc/default.nix deleted file mode 100644 index 5caef5b3b66f..000000000000 --- a/pkgs/development/compilers/lessc/default.nix +++ /dev/null @@ -1,29 +0,0 @@ -{ stdenv, fetchgit, nodejs }: - -stdenv.mkDerivation rec { - name = "lessc-${version}"; - version = "1.7.5"; # Upgrade to > 2.x breaks twitter-bootstrap - - src = fetchgit { - url = https://github.com/less/less.js.git; - rev = "refs/tags/v${version}"; - sha256 = "1af1xbh1pjpfsx0jp69syji6w9750nigk652yk46jrja3z1scb4s"; - }; - - phases = [ "installPhase" ]; - - installPhase = '' - mkdir -p $out/bin $out/lib - cp -r $src/bin/* $out/bin/ - cp -r $src/lib/* $out/lib/ - substituteInPlace $out/bin/lessc --replace "/usr/bin/env node" ${nodejs}/bin/node - ''; - - meta = with stdenv.lib; { - description = "LESS to CSS compiler"; - homepage = http://lesscss.org/; - license = licenses.asl20; - platforms = platforms.linux ++ platforms.darwin; - maintainers = with maintainers; [ pSub ]; - }; -} diff --git a/pkgs/development/libraries/SDL2/default.nix b/pkgs/development/libraries/SDL2/default.nix index 5e01a83b7c0c..7d8f5b2caee6 100644 --- a/pkgs/development/libraries/SDL2/default.nix +++ b/pkgs/development/libraries/SDL2/default.nix @@ -1,14 +1,14 @@ -{ stdenv, lib, fetchurl, pkgconfig, audiofile +{ stdenv, lib, fetchurl, pkgconfig, pruneLibtoolFiles , openglSupport ? false, libGL , alsaSupport ? true, alsaLib -, x11Support ? true, libICE, libXi, libXScrnSaver, libXcursor, libXinerama, libXext, libXxf86vm, libXrandr +, x11Support ? true, libX11, xproto, libICE, libXi, libXScrnSaver, libXcursor, libXinerama, libXext, libXxf86vm, libXrandr , waylandSupport ? true, wayland, wayland-protocols, libxkbcommon , dbusSupport ? false, dbus , udevSupport ? false, udev , ibusSupport ? false, ibus , pulseaudioSupport ? true, libpulseaudio , AudioUnit, Cocoa, CoreAudio, CoreServices, ForceFeedback, OpenGL -, libiconv +, audiofile, libiconv }: # NOTE: When editing this expression see if the same change applies to @@ -33,18 +33,26 @@ stdenv.mkDerivation rec { patches = [ ./find-headers.patch ]; - nativeBuildInputs = [ pkgconfig ]; + nativeBuildInputs = [ pkgconfig pruneLibtoolFiles ]; - propagatedBuildInputs = [ libiconv ] + propagatedBuildInputs = dlopenPropagatedBuildInputs; + + dlopenPropagatedBuildInputs = [ ] + # Propagated for #include <GLES/gl.h> in SDL_opengles.h. + ++ optional openglSupport libGL + # Propagated for #include <X11/Xlib.h> and <X11/Xatom.h> in SDL_syswm.h. + ++ optionals x11Support [ libX11 xproto ]; + + dlopenBuildInputs = [ ] + ++ optional alsaSupport alsaLib ++ optional dbusSupport dbus + ++ optional pulseaudioSupport libpulseaudio ++ optional udevSupport udev - ++ optionals x11Support [ libICE libXi libXScrnSaver libXcursor libXinerama libXext libXrandr libXxf86vm ] ++ optionals waylandSupport [ wayland wayland-protocols libxkbcommon ] - ++ optional alsaSupport alsaLib - ++ optional pulseaudioSupport libpulseaudio; + ++ optionals x11Support [ libICE libXi libXScrnSaver libXcursor libXinerama libXext libXrandr libXxf86vm ]; - buildInputs = [ audiofile ] - ++ optional openglSupport libGL + buildInputs = [ audiofile libiconv ] + ++ dlopenBuildInputs ++ optional ibusSupport ibus ++ optionals stdenv.isDarwin [ AudioUnit Cocoa CoreAudio CoreServices ForceFeedback OpenGL ]; @@ -76,12 +84,13 @@ stdenv.mkDerivation rec { # SDL API that requires said libraries will fail to start. # # You can grep SDL sources with `grep -rE 'SDL_(NAME|.*_SYM)'` to - # confirm that they actually use most of the `propagatedBuildInputs` - # from above in this way. This is pretty weird. - postFixup = '' + # list the symbols used in this way. + postFixup = let + rpath = makeLibraryPath (dlopenPropagatedBuildInputs ++ dlopenBuildInputs); + in optionalString (stdenv.hostPlatform.extensions.sharedLibrary == ".so") '' for lib in $out/lib/*.so* ; do - if [[ -L "$lib" ]]; then - patchelf --set-rpath "$(patchelf --print-rpath $lib):${lib.makeLibraryPath propagatedBuildInputs}" "$lib" + if ! [[ -L "$lib" ]]; then + patchelf --set-rpath "$(patchelf --print-rpath $lib):${rpath}" "$lib" fi done ''; diff --git a/pkgs/development/libraries/libde265/default.nix b/pkgs/development/libraries/libde265/default.nix new file mode 100644 index 000000000000..07823072bad4 --- /dev/null +++ b/pkgs/development/libraries/libde265/default.nix @@ -0,0 +1,24 @@ +{ stdenv, fetchFromGitHub, autoreconfHook, pkgconfig }: + +stdenv.mkDerivation rec { + version = "1.0.3"; + name = "libde265-${version}"; + + src = fetchFromGitHub { + owner = "strukturag"; + repo = "libde265"; + rev = "v${version}"; + sha256 = "049g77f6c5sbk1h534zi9akj3y5h8zwnca5c9kqqjkn7f17irk10"; + }; + + nativeBuildInputs = [ autoreconfHook pkgconfig ]; + + meta = { + homepage = "https://github.com/strukturag/libde265"; + description = "Open h.265 video codec implementation"; + license = stdenv.lib.licenses.lgpl3; + platforms = stdenv.lib.platforms.unix; + maintainers = with stdenv.lib.maintainers; [ gebner ]; + }; + +} diff --git a/pkgs/development/libraries/libheif/default.nix b/pkgs/development/libraries/libheif/default.nix new file mode 100644 index 000000000000..cdc03c01a022 --- /dev/null +++ b/pkgs/development/libraries/libheif/default.nix @@ -0,0 +1,27 @@ +{ stdenv, fetchFromGitHub, autoreconfHook, pkgconfig, pruneLibtoolFiles, libde265, x265, libpng, libjpeg }: + +stdenv.mkDerivation rec { + version = "1.3.2"; + name = "libheif-${version}"; + + src = fetchFromGitHub { + owner = "strukturag"; + repo = "libheif"; + rev = "v${version}"; + sha256 = "0hk8mzig2kp5f94j4jwqxzjrm7ffk16ffvxl92rf0afsh6vgnz7w"; + }; + + nativeBuildInputs = [ autoreconfHook pkgconfig pruneLibtoolFiles ]; + buildInputs = [ libde265 x265 libpng libjpeg ]; + + enableParallelBuilding = true; + + meta = { + homepage = "http://www.libheif.org/"; + description = "ISO/IEC 23008-12:2017 HEIF image file format decoder and encoder"; + license = stdenv.lib.licenses.lgpl3; + platforms = stdenv.lib.platforms.unix; + maintainers = with stdenv.lib.maintainers; [ gebner ]; + }; + +} diff --git a/pkgs/development/libraries/vapoursynth/default.nix b/pkgs/development/libraries/vapoursynth/default.nix index e45337c8cf5d..7344f3a7e2bb 100644 --- a/pkgs/development/libraries/vapoursynth/default.nix +++ b/pkgs/development/libraries/vapoursynth/default.nix @@ -35,6 +35,8 @@ stdenv.mkDerivation rec { (optionalString (!imwriSupport) "--disable-imwri") ]; + enableParallelBuilding = true; + meta = with stdenv.lib; { description = "A video processing framework with the future in mind"; homepage = http://www.vapoursynth.com/; diff --git a/pkgs/development/python-modules/asyncssh/default.nix b/pkgs/development/python-modules/asyncssh/default.nix index ef21cb001b49..76b863e24fb3 100644 --- a/pkgs/development/python-modules/asyncssh/default.nix +++ b/pkgs/development/python-modules/asyncssh/default.nix @@ -12,6 +12,9 @@ buildPythonPackage rec { sha256 = "a44736830741e2bb9c4e3992819288b77ac4af217a46d12f415bb57c18ed9c22"; }; + # See https://github.com/ronf/asyncssh/commit/6a92930e00f3bbc67d9cdf66816917e64f2450e9#r29559647 + patches = ./mock_getnameinfo.patch; + propagatedBuildInputs = [ bcrypt cryptography diff --git a/pkgs/development/python-modules/asyncssh/mock_getnameinfo.patch b/pkgs/development/python-modules/asyncssh/mock_getnameinfo.patch new file mode 100644 index 000000000000..5e8f475445e7 --- /dev/null +++ b/pkgs/development/python-modules/asyncssh/mock_getnameinfo.patch @@ -0,0 +1,159 @@ +diff --git a/tests/server.py b/tests/server.py +index fbd7e37..e7542dc 100644 +--- a/tests/server.py ++++ b/tests/server.py +@@ -208,12 +208,10 @@ class ServerTestCase(AsyncTestCase): + cls._server = yield from cls.start_server() + + sock = cls._server.sockets[0] +- cls._client_host, _ = yield from cls.loop.getnameinfo(('127.0.0.1', 0)) + cls._server_addr = '127.0.0.1' + cls._server_port = sock.getsockname()[1] + +- host = '[%s]:%d,%s ' % (cls._server_addr, cls._server_port, +- cls._client_host) ++ host = '[%s]:%d,localhost ' % (cls._server_addr, cls._server_port) + + with open('known_hosts', 'w') as known_hosts: + known_hosts.write(host) +diff --git a/tests/test_auth_keys.py b/tests/test_auth_keys.py +index 1d625ef..72a49f7 100644 +--- a/tests/test_auth_keys.py ++++ b/tests/test_auth_keys.py +@@ -13,13 +13,13 @@ + """Unit tests for matching against authorized_keys file""" + + import unittest +-from unittest.mock import patch + + import asyncssh + +-from .util import TempDirTestCase, x509_available ++from .util import TempDirTestCase, patch_getnameinfo, x509_available + + ++@patch_getnameinfo + class _TestAuthorizedKeys(TempDirTestCase): + """Unit tests for auth_keys module""" + +@@ -69,36 +69,22 @@ class _TestAuthorizedKeys(TempDirTestCase): + def match_keys(self, tests, x509=False): + """Match against authorized keys""" + +- def getnameinfo(sockaddr, flags): +- """Mock reverse DNS lookup of client address""" +- +- # pylint: disable=unused-argument +- +- host, port = sockaddr +- +- if host == '127.0.0.1': +- return ('localhost', port) +- else: +- return sockaddr +- +- with patch('socket.getnameinfo', getnameinfo): +- for keys, matches in tests: +- auth_keys = self.build_keys(keys, x509) +- for (msg, keynum, client_addr, +- cert_principals, match) in matches: +- with self.subTest(msg, x509=x509): +- if x509: +- result, trusted_cert = auth_keys.validate_x509( +- self.imported_certlist[keynum], client_addr) +- if (trusted_cert and trusted_cert.subject != +- self.imported_certlist[keynum].subject): +- result = None +- else: +- result = auth_keys.validate( +- self.imported_keylist[keynum], client_addr, +- cert_principals, keynum == 1) +- +- self.assertEqual(result is not None, match) ++ for keys, matches in tests: ++ auth_keys = self.build_keys(keys, x509) ++ for (msg, keynum, client_addr, cert_principals, match) in matches: ++ with self.subTest(msg, x509=x509): ++ if x509: ++ result, trusted_cert = auth_keys.validate_x509( ++ self.imported_certlist[keynum], client_addr) ++ if (trusted_cert and trusted_cert.subject != ++ self.imported_certlist[keynum].subject): ++ result = None ++ else: ++ result = auth_keys.validate( ++ self.imported_keylist[keynum], client_addr, ++ cert_principals, keynum == 1) ++ ++ self.assertEqual(result is not None, match) + + def test_matches(self): + """Test authorized keys matching""" +diff --git a/tests/test_connection_auth.py b/tests/test_connection_auth.py +index 3da8a5b..ff3e3cc 100644 +--- a/tests/test_connection_auth.py ++++ b/tests/test_connection_auth.py +@@ -23,8 +23,8 @@ from asyncssh.packet import String + from asyncssh.public_key import CERT_TYPE_USER, CERT_TYPE_HOST + + from .server import Server, ServerTestCase +-from .util import asynctest, gss_available, patch_gss, make_certificate +-from .util import x509_available ++from .util import asynctest, gss_available, patch_getnameinfo, patch_gss ++from .util import make_certificate, x509_available + + + class _FailValidateHostSSHServerConnection(asyncssh.SSHServerConnection): +@@ -455,6 +455,7 @@ class _TestGSSFQDN(ServerTestCase): + yield from conn.wait_closed() + + ++@patch_getnameinfo + class _TestHostBasedAuth(ServerTestCase): + """Unit tests for host-based authentication""" + +@@ -579,7 +580,7 @@ class _TestHostBasedAuth(ServerTestCase): + """Test stripping of trailing dot from client host""" + + with (yield from self.connect(username='user', client_host_keys='skey', +- client_host=self._client_host + '.', ++ client_host='localhost.', + client_username='user')) as conn: + pass + +@@ -667,6 +668,7 @@ class _TestHostBasedAsyncServerAuth(_TestHostBasedAuth): + client_username='user') + + ++@patch_getnameinfo + class _TestLimitedHostBasedSignatureAlgs(ServerTestCase): + """Unit tests for limited host key signature algorithms""" + +diff --git a/tests/util.py b/tests/util.py +index 42bb596..4d92ec3 100644 +--- a/tests/util.py ++++ b/tests/util.py +@@ -84,6 +84,24 @@ def asynctest35(func): + return async_wrapper + + ++def patch_getnameinfo(cls): ++ """Decorator for patching socket.getnameinfo""" ++ ++ def getnameinfo(sockaddr, flags): ++ """Mock reverse DNS lookup of client address""" ++ ++ # pylint: disable=unused-argument ++ ++ host, port = sockaddr ++ ++ if host == '127.0.0.1': ++ return ('localhost', port) ++ else: ++ return sockaddr ++ ++ return patch('socket.getnameinfo', getnameinfo)(cls) ++ ++ + def patch_gss(cls): + """Decorator for patching GSSAPI classes""" diff --git a/pkgs/development/python-modules/boto3/default.nix b/pkgs/development/python-modules/boto3/default.nix index 042ad9cf7932..b3a15ba08682 100644 --- a/pkgs/development/python-modules/boto3/default.nix +++ b/pkgs/development/python-modules/boto3/default.nix @@ -13,13 +13,13 @@ buildPythonPackage rec { pname = "boto3"; - version = "1.7.9"; + version = "1.7.48"; src = fetchFromGitHub { owner = "boto"; repo = "boto3"; rev = version; - sha256 = "0yqym19nlayjm1qlh6vvinmk5xw0zskil971n2v9s65ray7sn5lv"; + sha256 = "0pag37yy6693k8xvlyx4f06asab52i89xljy2ip121i60ih3jfw4"; }; propagatedBuildInputs = [ botocore jmespath s3transfer ] ++ lib.optionals (!isPy3k) [ futures ]; diff --git a/pkgs/development/python-modules/botocore/default.nix b/pkgs/development/python-modules/botocore/default.nix index 68b5abd906d9..fada751968b3 100644 --- a/pkgs/development/python-modules/botocore/default.nix +++ b/pkgs/development/python-modules/botocore/default.nix @@ -11,11 +11,11 @@ buildPythonPackage rec { pname = "botocore"; - version = "1.10.9"; + version = "1.10.48"; src = fetchPypi { inherit pname version; - sha256 = "19vlf2w05h9818hrhx8al4r9ngfhvhf2pxcwka9s7bc51qnhx4xh"; + sha256 = "1432drc7482nwrppwkk1i6ars3wz9w2g9rsxkz5nlxmyf9qm260j"; }; propagatedBuildInputs = [ diff --git a/pkgs/development/r-modules/default.nix b/pkgs/development/r-modules/default.nix index 996e3932d2a2..dc8b4d1fb156 100644 --- a/pkgs/development/r-modules/default.nix +++ b/pkgs/development/r-modules/default.nix @@ -749,6 +749,10 @@ let patches = [ ./patches/BayesXsrc.patch ]; }); + rhdf5 = old.rhdf5.overrideDerivation (attrs: { + patches = [ ./patches/rhdf5.patch ]; + }); + rJava = old.rJava.overrideDerivation (attrs: { preConfigure = '' export JAVA_CPPFLAGS=-I${pkgs.jdk}/include/ diff --git a/pkgs/development/r-modules/patches/rhdf5.patch b/pkgs/development/r-modules/patches/rhdf5.patch new file mode 100644 index 000000000000..86ada84c722f --- /dev/null +++ b/pkgs/development/r-modules/patches/rhdf5.patch @@ -0,0 +1,12 @@ +diff --git a/configure b/configure +index e3e21e8..3d947b6 100755 +--- a/configure ++++ b/configure +@@ -2859,6 +2859,7 @@ fi; + + echo "building the bundled hdf5 library..."; + cd ${BASEPBNAME}; ++sed -i 's#/bin/mv#mv#' configure + ./configure --with-pic --enable-shared=no CXX="${CXX}" CXXFLAGS="${CXXFLAGS}" CC="${CC}" CFLAGS="${CFLAGS}" F77="${F77}" + $MAKE lib + cd ../../ diff --git a/pkgs/development/tools/build-managers/buildbot/default.nix b/pkgs/development/tools/build-managers/buildbot/default.nix index ed73d26768a4..3729abfe247d 100644 --- a/pkgs/development/tools/build-managers/buildbot/default.nix +++ b/pkgs/development/tools/build-managers/buildbot/default.nix @@ -14,11 +14,11 @@ let package = pythonPackages.buildPythonApplication rec { name = "${pname}-${version}"; pname = "buildbot"; - version = "1.1.1"; + version = "1.2.0"; src = pythonPackages.fetchPypi { inherit pname version; - sha256 = "1vcmanx3ma3cfyiddjcmsnx6qmxd3m5blqax04rcsiq2zq4dmzir"; + sha256 = "02gwmls8kgm6scy36hdy0bg645zs1pxlrgwkcn79wrl7cfmabcbv"; }; buildInputs = with pythonPackages; [ diff --git a/pkgs/development/tools/build-managers/buildbot/plugins.nix b/pkgs/development/tools/build-managers/buildbot/plugins.nix index c8a12c192647..430cdee3ca8c 100644 --- a/pkgs/development/tools/build-managers/buildbot/plugins.nix +++ b/pkgs/development/tools/build-managers/buildbot/plugins.nix @@ -11,7 +11,7 @@ src = pythonPackages.fetchPypi { inherit pname version format; - sha256 = "01v9w8iy9q6fwrmz6db7fanjixax7whn74k67bj0czrbjjkpfzvb"; + sha256 = "001kxjcyn5sxiq7m1izy4djj7alw6qpgaid4f518s9xgm4a8hwcb"; }; meta = with stdenv.lib; { @@ -29,7 +29,7 @@ src = pythonPackages.fetchPypi { inherit pname version; - sha256 = "1cwxkzpgwzk9b361rj980bbnmhzzsr46pgf94zqpg3na8xm6hpwj"; + sha256 = "11p9l9r9rh8cq0ihzjcdxfbi55n7inbsz45zqq67rkvqn5nhj5b6"; }; propagatedBuildInputs = with pythonPackages; [ buildbot-pkg ]; @@ -49,7 +49,7 @@ src = pythonPackages.fetchPypi { inherit pname version; - sha256 = "0ival58f50128315d0nck63pzya2zm7q6hvgmxfbjl0my8il9p2l"; + sha256 = "1yx63frfpbvwy4hfib1psyq5ad0wysyzfrla8d7lgbdaip021wzw"; }; propagatedBuildInputs = with pythonPackages; [ buildbot-pkg ]; @@ -69,7 +69,7 @@ src = pythonPackages.fetchPypi { inherit pname version; - sha256 = "0jiwfb699nqbmpcm88y187ig4ha6p7d4v98mjwa9blhm54dk8kh1"; + sha256 = "06my75hli3w1skdkx1qz6zqw2wckanhrcvlqm4inylj9v9pcrgv6"; }; propagatedBuildInputs = with pythonPackages; [ buildbot-pkg ]; @@ -89,7 +89,7 @@ src = pythonPackages.fetchPypi { inherit pname version; - sha256 = "00mfn24gbwr2p3n7nsijzv949l7hiksiafhma18nnh40r8f4l5f2"; + sha256 = "073gz44fa5k1p8k46k0ld9gg16j8zdj6sc297qfyqpiw28ybhc5s"; }; propagatedBuildInputs = with pythonPackages; [ buildbot-pkg ]; diff --git a/pkgs/development/tools/build-managers/buildbot/worker.nix b/pkgs/development/tools/build-managers/buildbot/worker.nix index b1cfb6aeaf2f..968411ca9cc5 100644 --- a/pkgs/development/tools/build-managers/buildbot/worker.nix +++ b/pkgs/development/tools/build-managers/buildbot/worker.nix @@ -3,11 +3,11 @@ pythonPackages.buildPythonApplication (rec { name = "${pname}-${version}"; pname = "buildbot-worker"; - version = "1.1.1"; + version = "1.2.0"; src = pythonPackages.fetchPypi { inherit pname version; - sha256 = "02xfzlcy3cnvc3cmpl9gs6209a3qm71yz5pahbws9jcyhv6fbrrm"; + sha256 = "0lcaga16zf75aa6ckl9ahjbrs3n3bw7nj6m8g03n77873cgh94x4"; }; buildInputs = with pythonPackages; [ setuptoolsTrial mock ]; diff --git a/pkgs/development/tools/build-managers/gradle/default.nix b/pkgs/development/tools/build-managers/gradle/default.nix index 7570c3be0679..f810f97ef497 100644 --- a/pkgs/development/tools/build-managers/gradle/default.nix +++ b/pkgs/development/tools/build-managers/gradle/default.nix @@ -52,12 +52,12 @@ rec { }; gradle_latest = gradleGen rec { - name = "gradle-4.8"; + name = "gradle-4.8.1"; nativeVersion = "0.14"; src = fetchurl { url = "http://services.gradle.org/distributions/${name}-bin.zip"; - sha256 = "1fpihf35nd2wqh3ghkk9x0x2nr1s4vx3dgrfn2q4xagsm299dqpk"; + sha256 = "0wgdf1iv0izi957hay1xfsk5xnl6s2vx5dammcwy8say9fclscxg"; }; }; diff --git a/pkgs/development/tools/build-managers/redo/default.nix b/pkgs/development/tools/build-managers/redo/default.nix index 8063b6747666..bd0562463fd7 100644 --- a/pkgs/development/tools/build-managers/redo/default.nix +++ b/pkgs/development/tools/build-managers/redo/default.nix @@ -1,10 +1,10 @@ {stdenv, fetchurl, perl }: stdenv.mkDerivation rec { - name = "redo-1.2"; + name = "redo-1.3"; src = fetchurl { url = "https://jdebp.eu./Repository/freebsd/${name}.tar.gz"; - sha256 = "0qr8plllxfn32r4rgnalzlhcs3b4l8a4ga8ig9v8i5iy1qnfhqnf"; + sha256 = "1yx7nd59s01j096hr1zbnbx6mvd6ljzd4vgawh7p2l644jgwj70r"; }; nativeBuildInputs = [ perl /* for pod2man */ ]; |