diff options
author | Daiderd Jordan <daiderd@gmail.com> | 2017-01-04 01:42:10 +0100 |
---|---|---|
committer | Daiderd Jordan <daiderd@gmail.com> | 2017-01-04 01:42:26 +0100 |
commit | 27660cfdc01c9a7481b4646285ab155cca784c38 (patch) | |
tree | 3bfb5e18da3df6f88fd42ea7ad6e950aed68ac42 /pkgs/os-specific | |
parent | 293551a16286f2e1134707babdb013a29bf778ce (diff) | |
parent | 61d125b8425da501f07765197186ed7351a55f48 (diff) | |
download | nixlib-27660cfdc01c9a7481b4646285ab155cca784c38.tar nixlib-27660cfdc01c9a7481b4646285ab155cca784c38.tar.gz nixlib-27660cfdc01c9a7481b4646285ab155cca784c38.tar.bz2 nixlib-27660cfdc01c9a7481b4646285ab155cca784c38.tar.lz nixlib-27660cfdc01c9a7481b4646285ab155cca784c38.tar.xz nixlib-27660cfdc01c9a7481b4646285ab155cca784c38.tar.zst nixlib-27660cfdc01c9a7481b4646285ab155cca784c38.zip |
Merge branch 'master' into staging
Diffstat (limited to 'pkgs/os-specific')
-rw-r--r-- | pkgs/os-specific/darwin/cctools/port.nix | 4 | ||||
-rw-r--r-- | pkgs/os-specific/linux/autofs/default.nix | 9 | ||||
-rw-r--r-- | pkgs/os-specific/linux/busybox/busybox-in-store.patch | 16 | ||||
-rw-r--r-- | pkgs/os-specific/linux/busybox/default.nix | 4 | ||||
-rw-r--r-- | pkgs/os-specific/linux/eudev/default.nix | 4 | ||||
-rw-r--r-- | pkgs/os-specific/linux/firejail/default.nix | 10 | ||||
-rw-r--r-- | pkgs/os-specific/linux/kernel/linux-testing.nix | 6 | ||||
-rw-r--r-- | pkgs/os-specific/linux/ofp/default.nix | 40 | ||||
-rw-r--r-- | pkgs/os-specific/linux/pktgen/default.nix | 5 | ||||
-rw-r--r-- | pkgs/os-specific/linux/pommed-light/default.nix | 65 | ||||
-rw-r--r-- | pkgs/os-specific/linux/sssd/default.nix | 87 | ||||
-rw-r--r-- | pkgs/os-specific/linux/sysdig/default.nix | 4 |
12 files changed, 226 insertions, 28 deletions
diff --git a/pkgs/os-specific/darwin/cctools/port.nix b/pkgs/os-specific/darwin/cctools/port.nix index 41fb090710cb..202426e78726 100644 --- a/pkgs/os-specific/darwin/cctools/port.nix +++ b/pkgs/os-specific/darwin/cctools/port.nix @@ -1,5 +1,5 @@ { stdenv, fetchFromGitHub, autoconf, automake, libtool_2 -, llvm, libcxx, libcxxabi, clang, openssl, libuuid +, llvm, libcxx, libcxxabi, clang, libuuid , libobjc ? null }: @@ -15,7 +15,7 @@ let sha256 = "0bzyabzr5dvbxglr74d0kbrk2ij5x7s5qcamqi1v546q1had1wz1"; }; - buildInputs = [ autoconf automake libtool_2 openssl libuuid ] ++ + buildInputs = [ autoconf automake libtool_2 libuuid ] ++ # Only need llvm and clang if the stdenv isn't already clang-based (TODO: just make a stdenv.cc.isClang) stdenv.lib.optionals (!stdenv.isDarwin) [ llvm clang ] ++ stdenv.lib.optionals stdenv.isDarwin [ libcxxabi libobjc ]; diff --git a/pkgs/os-specific/linux/autofs/default.nix b/pkgs/os-specific/linux/autofs/default.nix index 4401eb24cb48..d2d2c4a3988a 100644 --- a/pkgs/os-specific/linux/autofs/default.nix +++ b/pkgs/os-specific/linux/autofs/default.nix @@ -1,5 +1,5 @@ { stdenv, lib, fetchurl, flex, bison, linuxHeaders, libtirpc, utillinux, nfs-utils, e2fsprogs -, libxml2 }: +, libxml2, kerberos, kmod, openldap, sssd, cyrus_sasl, openssl }: let version = "5.1.2"; @@ -13,7 +13,9 @@ in stdenv.mkDerivation { }; preConfigure = '' - configureFlags="--enable-force-shutdown --enable-ignore-busy --with-path=$PATH" + configureFlags="--enable-force-shutdown --enable-ignore-busy --with-path=$PATH --with-openldap=${openldap} --with-sasl=${cyrus_sasl}" + export sssldir="${sssd}/lib/sssd/modules" + export HAVE_SSS_AUTOFS=1 export MOUNT=${lib.getBin utillinux}/bin/mount export MOUNT_NFS=${lib.getBin nfs-utils}/bin/mount.nfs @@ -29,7 +31,8 @@ in stdenv.mkDerivation { #make install SUBDIRS="samples" # impure! ''; - buildInputs = [ linuxHeaders libtirpc libxml2 ]; + buildInputs = [ linuxHeaders libtirpc libxml2 kerberos kmod openldap sssd + openssl cyrus_sasl ]; nativeBuildInputs = [ flex bison ]; diff --git a/pkgs/os-specific/linux/busybox/busybox-in-store.patch b/pkgs/os-specific/linux/busybox/busybox-in-store.patch index 3500f167a14a..d3111efbdc48 100644 --- a/pkgs/os-specific/linux/busybox/busybox-in-store.patch +++ b/pkgs/os-specific/linux/busybox/busybox-in-store.patch @@ -1,14 +1,14 @@ Allow BusyBox to be invoked as "<something>-busybox". This is necessary when it's run from the Nix store as <hash>-busybox during stdenv bootstrap. ---- busybox-1.25.1-orig/libbb/appletlib.orig 2016-10-26 19:54:20.510957575 -0400 -+++ busybox-1.25.1/libbb/appletlib.c 2016-10-26 19:48:31.590862853 -0400 -@@ -884,7 +884,7 @@ - int applet; - - # if ENABLE_BUSYBOX +--- busybox-1.26.1-orig/libbb/appletlib.orig 2016-10-26 19:54:20.510957575 -0400 ++++ busybox-1.26.1/libbb/appletlib.c 2016-10-26 19:48:31.590862853 -0400 +@@ -887,7 +887,7 @@ + static NORETURN void run_applet_and_exit(const char *name, char **argv) + { + # if ENABLE_BUSYBOX - if (is_prefixed_with(name, "busybox")) + if (strstr(name, "busybox") != 0) exit(busybox_main(argv)); - # endif - /* find_applet_by_name() search is more expensive, so goes second */ + # endif + # if NUM_APPLETS > 0 diff --git a/pkgs/os-specific/linux/busybox/default.nix b/pkgs/os-specific/linux/busybox/default.nix index 6f86529a265e..b3502d269b09 100644 --- a/pkgs/os-specific/linux/busybox/default.nix +++ b/pkgs/os-specific/linux/busybox/default.nix @@ -26,11 +26,11 @@ let in stdenv.mkDerivation rec { - name = "busybox-1.25.1"; + name = "busybox-1.26.1"; src = fetchurl { url = "http://busybox.net/downloads/${name}.tar.bz2"; - sha256 = "0bm0l8xdjdz3kdyajp8wg27yamsw7r2y88nnrxwvvz984c7pwri7"; + sha256 = "1wl1yy82am53srhgpi1w04hs5hbqjljrrxwwfic35k1mza3y9fqg"; }; hardeningDisable = [ "format" ] ++ lib.optional enableStatic [ "fortify" ]; diff --git a/pkgs/os-specific/linux/eudev/default.nix b/pkgs/os-specific/linux/eudev/default.nix index 8ab4da2da8cf..772e69ac390e 100644 --- a/pkgs/os-specific/linux/eudev/default.nix +++ b/pkgs/os-specific/linux/eudev/default.nix @@ -3,10 +3,10 @@ let s = # Generated upstream information rec { baseName="eudev"; - version = "3.2"; + version = "3.2.1"; name="${baseName}-${version}"; url="http://dev.gentoo.org/~blueness/eudev/eudev-${version}.tar.gz"; - sha256 = "099w62ncq78nxpxizf910mx18hc8x4qvzw3azjd00fir89wmyjnq"; + sha256 = "06gyyl90n85x8i7lfhns514y1kg1ians13l467admyzy3kjxkqsp"; }; buildInputs = [ glib pkgconfig gperf utillinux diff --git a/pkgs/os-specific/linux/firejail/default.nix b/pkgs/os-specific/linux/firejail/default.nix index 30fdbadd87b1..6b3afc1d63cc 100644 --- a/pkgs/os-specific/linux/firejail/default.nix +++ b/pkgs/os-specific/linux/firejail/default.nix @@ -3,11 +3,11 @@ let s = # Generated upstream information rec { baseName="firejail"; - version="0.9.42"; + version="0.9.44.2"; name="${baseName}-${version}"; - hash="0iwv97c0ygxrgxg997618a7cq3hl1l3b0njx7bqzv11vjzpcwfsg"; - url="mirror://sourceforge/project/firejail/firejail/firejail-0.9.42.tar.xz"; - sha256="0iwv97c0ygxrgxg997618a7cq3hl1l3b0njx7bqzv11vjzpcwfsg"; + hash="0lc8vq6lj0669q4vx08m3dzqjayhl0cmm7n3qi4k18ys8ccyzbf5"; + url="https://kent.dl.sourceforge.net/project/firejail/firejail/firejail-0.9.44.2.tar.xz"; + sha256="0lc8vq6lj0669q4vx08m3dzqjayhl0cmm7n3qi4k18ys8ccyzbf5"; }; buildInputs = [ which @@ -24,8 +24,6 @@ stdenv.mkDerivation { preConfigure = '' sed -e 's@/bin/bash@${stdenv.shell}@g' -i $( grep -lr /bin/bash .) sed -e "s@/bin/cp@$(which cp)@g" -i $( grep -lr /bin/cp .) - sed -e '/void fs_var_run(/achar *vrcs = get_link("/var/run/current-system")\;' -i ./src/firejail/fs_var.c - sed -e '/ \/run/iif(vrcs!=NULL){symlink(vrcs, "/var/run/current-system")\;free(vrcs)\;}' -i ./src/firejail/fs_var.c ''; preBuild = '' diff --git a/pkgs/os-specific/linux/kernel/linux-testing.nix b/pkgs/os-specific/linux/kernel/linux-testing.nix index 10bea69a3c48..b547240eaf2a 100644 --- a/pkgs/os-specific/linux/kernel/linux-testing.nix +++ b/pkgs/os-specific/linux/kernel/linux-testing.nix @@ -1,13 +1,13 @@ { stdenv, fetchurl, perl, buildLinux, ... } @ args: import ./generic.nix (args // rec { - version = "4.10-rc1"; - modDirVersion = "4.10.0-rc1"; + version = "4.10-rc2"; + modDirVersion = "4.10.0-rc2"; extraMeta.branch = "4.10"; src = fetchurl { url = "mirror://kernel/linux/kernel/v4.x/testing/linux-${version}.tar.xz"; - sha256 = "1s7axcii6jzm77ivmy26llf4z6dprfp3sb1v35fchl9bkzaivaly"; + sha256 = "1r3w6mqvmjnsmqrk73xsrqybdvs1czjw5xl1x2wsi2w9nifb47zq"; }; features.iwlwifi = true; diff --git a/pkgs/os-specific/linux/ofp/default.nix b/pkgs/os-specific/linux/ofp/default.nix new file mode 100644 index 000000000000..e083c0f04570 --- /dev/null +++ b/pkgs/os-specific/linux/ofp/default.nix @@ -0,0 +1,40 @@ +{ stdenv, fetchFromGitHub, pkgconfig, autoreconfHook +, openssl, libpcap, odp-dpdk, dpdk +}: + +stdenv.mkDerivation rec { + name = "ofp-${version}"; + version = "2.0.0"; + + src = fetchFromGitHub { + owner = "OpenFastPath"; + repo = "ofp"; + rev = "${version}"; + sha256 = "05902593fycgkwzk5g7wzgk0k40nrrgybplkdka3rqnlj6aydhqf"; + }; + + nativeBuildInputs = [ pkgconfig autoreconfHook ]; + buildInputs = [ openssl libpcap odp-dpdk dpdk ]; + + dontDisableStatic = true; + + postPatch = '' + substituteInPlace configure.ac --replace m4_esyscmd m4_esyscmd_s + substituteInPlace scripts/git_hash.sh --replace /bin/bash /bin/sh + echo ${version} > .scmversion + ''; + + configureFlags = [ + "--with-odp=${odp-dpdk}" + "--with-odp-lib=odp-dpdk" + "--disable-shared" + ]; + + meta = with stdenv.lib; { + description = "High performance TCP/IP stack"; + homepage = http://www.openfastpath.org; + license = licenses.bsd3; + platforms = [ "x86_64-linux" ]; + maintainers = [ maintainers.abuibrahim ]; + }; +} diff --git a/pkgs/os-specific/linux/pktgen/default.nix b/pkgs/os-specific/linux/pktgen/default.nix index 2aa4d26f913e..68237d70f519 100644 --- a/pkgs/os-specific/linux/pktgen/default.nix +++ b/pkgs/os-specific/linux/pktgen/default.nix @@ -24,6 +24,11 @@ stdenv.mkDerivation rec { NIX_CFLAGS_COMPILE = [ "-march=core2" ]; + postPatch = '' + substituteInPlace lib/lua/src/luaconf.h --replace /usr/local $out + substituteInPlace lib/common/lscpu.h --replace /usr/bin/lscpu ${utillinux}/bin/lscpu + ''; + installPhase = '' install -d $out/bin install -m 0755 app/app/${RTE_TARGET}/app/pktgen $out/bin diff --git a/pkgs/os-specific/linux/pommed-light/default.nix b/pkgs/os-specific/linux/pommed-light/default.nix new file mode 100644 index 000000000000..a039984ff338 --- /dev/null +++ b/pkgs/os-specific/linux/pommed-light/default.nix @@ -0,0 +1,65 @@ +{ + stdenv +, fetchurl +, pciutils +, confuse +, alsaLib +, audiofile +, pkgconfig +, zlib +, eject +}: + +stdenv.mkDerivation rec { + pkgname = "pommed-light"; + version = "1.50lw"; + name = "${pkgname}-${version}"; + + src = fetchurl { + url = "https://github.com/bytbox/${pkgname}/archive/v${version}.tar.gz"; + + sha256 = "1r2f28zqmyvzgymd0ng53hscbrq8vcqhxdnkq5dppjf9yrzn018b"; + }; + + postPatch = '' + substituteInPlace pommed.conf.mactel --replace /usr $out + substituteInPlace pommed.conf.pmac --replace /usr $out + substituteInPlace pommed/beep.h --replace /usr $out + substituteInPlace pommed/cd_eject.c --replace /usr/bin/eject ${eject}/bin/eject + ''; + + buildInputs = [ + pciutils + confuse + alsaLib + audiofile + pkgconfig + zlib + eject + ]; + + installPhase = '' + install -Dm755 pommed/pommed $out/bin/pommed + install -Dm644 pommed.conf.mactel $out/etc/pommed.conf.mactel + install -Dm644 pommed.conf.pmac $out/etc/pommed.conf.pmac + + # Man page + install -Dm644 pommed.1 $out/share/man/man1/pommed.1 + + # Sounds + install -Dm644 pommed/data/goutte.wav $out/share/pommed/goutte.wav + install -Dm644 pommed/data/click.wav $out/share/pommed/click.wav + ''; + + meta = { + description = "A trimmed version of the pommed hotkey handler for MacBooks"; + longDescription = '' + This is a stripped-down version of pommed with client, dbus, and + ambient light sensor support removed, optimized for use with dwm + and the like. + ''; + homepage = https://github.com/bytbox/pommed-light; + platforms = stdenv.lib.platforms.linux; + license = stdenv.lib.licenses.gpl2; + }; +} diff --git a/pkgs/os-specific/linux/sssd/default.nix b/pkgs/os-specific/linux/sssd/default.nix new file mode 100644 index 000000000000..d50848af3dc3 --- /dev/null +++ b/pkgs/os-specific/linux/sssd/default.nix @@ -0,0 +1,87 @@ +{ stdenv, fetchurl, pkgs, lib, glibc, augeas, bind, c-ares, + cyrus_sasl, ding-libs, libnl, libunistring, nss, samba, libnfsidmap, doxygen, + python, python3, pam, popt, talloc, tdb, tevent, pkgconfig, ldb, openldap, + pcre, kerberos, cifs_utils, glib, keyutils, dbus, fakeroot, libxslt, libxml2, + docbook_xml_xslt, ldap, systemd, nspr, check, cmocka, uid_wrapper, + nss_wrapper, docbook_xml_dtd_44, ncurses, Po4a, http-parser, jansson }: + +let + name = "sssd-${version}"; + version = "1.14.2"; + + docbookFiles = "${pkgs.docbook_xml_xslt}/share/xml/docbook-xsl/catalog.xml:${pkgs.docbook_xml_dtd_44}/xml/dtd/docbook/catalog.xml"; +in +stdenv.mkDerivation { + inherit name; + inherit version; + + src = fetchurl { + url = "https://fedorahosted.org/released/sssd/${name}.tar.gz"; + sha1 = "167b2216c536035175ff041d0449e0a874c68601"; + }; + + preConfigure = '' + export SGML_CATALOG_FILES="${docbookFiles}" + export PYTHONPATH=${ldap}/lib/python2.7/site-packages + export PATH=$PATH:${pkgs.openldap}/libexec + export CPATH=${pkgs.libxml2.dev}/include/libxml2 + + configureFlagsArray=( + --prefix=$out + --sysconfdir=/etc + --localstatedir=/var + --enable-pammoddir=$out/lib/security + --with-os=fedora + --with-pid-path=/run + --with-python2-bindings + --with-python3-bindings + --with-syslog=journald + --without-selinux + --without-semanage + --with-xml-catalog-path=''${SGML_CATALOG_FILES%%:*} + --with-ldb-lib-dir=$out/modules/ldb + --with-nscd=${glibc.bin}/sbin/nscd + ) + ''; + + enableParallelBuilding = true; + buildInputs = [ augeas bind c-ares cyrus_sasl ding-libs libnl libunistring nss + samba libnfsidmap doxygen python python3 popt + talloc tdb tevent pkgconfig ldb pam openldap pcre kerberos + cifs_utils glib keyutils dbus fakeroot libxslt libxml2 + ldap systemd nspr check cmocka uid_wrapper + nss_wrapper ncurses Po4a http-parser jansson ]; + + makeFlags = [ + "SGML_CATALOG_FILES=${docbookFiles}" + ]; + + installFlags = [ + "sysconfdir=$(out)/etc" + "localstatedir=$(out)/var" + "pidpath=$(out)/run" + "sss_statedir=$(out)/var/lib/sss" + "logpath=$(out)/var/log/sssd" + "pubconfpath=$(out)/var/lib/sss/pubconf" + "dbpath=$(out)/var/lib/sss/db" + "mcpath=$(out)/var/lib/sss/mc" + "pipepath=$(out)/var/lib/sss/pipes" + "gpocachepath=$(out)/var/lib/sss/gpo_cache" + "secdbpath=$(out)/var/lib/sss/secrets" + "initdir=$(out)/rc.d/init" + ]; + + postInstall = '' + rm -rf "$out"/run + rm -rf "$out"/rc.d + rm -f "$out"/modules/ldb/memberof.la + find "$out" -depth -type d -exec rmdir --ignore-fail-on-non-empty {} \; + ''; + + meta = with stdenv.lib; { + description = "System Security Services Daemon"; + homepage = https://fedorahosted.org/sssd/; + license = licenses.gpl3; + maintainers = [ maintainers.e-user ]; + }; +} diff --git a/pkgs/os-specific/linux/sysdig/default.nix b/pkgs/os-specific/linux/sysdig/default.nix index 1088e0befdfc..281ee101eac3 100644 --- a/pkgs/os-specific/linux/sysdig/default.nix +++ b/pkgs/os-specific/linux/sysdig/default.nix @@ -2,14 +2,14 @@ let inherit (stdenv.lib) optional optionalString; baseName = "sysdig"; - version = "0.12.0"; + version = "0.13.0"; in stdenv.mkDerivation { name = "${baseName}-${version}"; src = fetchurl { url = "https://github.com/draios/sysdig/archive/${version}.tar.gz"; - sha256 = "17nf2h5ajy333rwh91hzaw8zq2mnkb3lxy8fmbbs8qazgsvwz6c3"; + sha256 = "0ghxj473v471nnry8h9accxpwwjp8nbzkgw8dniqld0ixx678pia"; }; buildInputs = [ |