diff options
author | Frederik Rietdijk <fridh@fridh.nl> | 2019-06-12 09:22:07 +0200 |
---|---|---|
committer | Frederik Rietdijk <fridh@fridh.nl> | 2019-06-12 09:22:07 +0200 |
commit | 7184efb40af0e740000e678a727922a7f58ac597 (patch) | |
tree | 2dcb3900446f284697be5c2c5a2d4696d2d87bcb /pkgs/servers | |
parent | 3df5b67ae4348b22318f92bdb7d00cb5655495d8 (diff) | |
parent | 9edf8f73f76b21f7443123cc1a6fca76c5eed3b1 (diff) | |
download | nixlib-7184efb40af0e740000e678a727922a7f58ac597.tar nixlib-7184efb40af0e740000e678a727922a7f58ac597.tar.gz nixlib-7184efb40af0e740000e678a727922a7f58ac597.tar.bz2 nixlib-7184efb40af0e740000e678a727922a7f58ac597.tar.lz nixlib-7184efb40af0e740000e678a727922a7f58ac597.tar.xz nixlib-7184efb40af0e740000e678a727922a7f58ac597.tar.zst nixlib-7184efb40af0e740000e678a727922a7f58ac597.zip |
Merge master into staging-next
Diffstat (limited to 'pkgs/servers')
-rw-r--r-- | pkgs/servers/home-assistant/component-packages.nix | 2 | ||||
-rw-r--r-- | pkgs/servers/jellyfin/default.nix | 4 | ||||
-rw-r--r-- | pkgs/servers/matrix-synapse/default.nix | 8 | ||||
-rw-r--r-- | pkgs/servers/miniflux/default.nix | 6 | ||||
-rw-r--r-- | pkgs/servers/plex/raw.nix | 4 | ||||
-rw-r--r-- | pkgs/servers/samba/4.x.nix | 10 | ||||
-rw-r--r-- | pkgs/servers/sql/mysql/5.5.x.nix | 26 | ||||
-rw-r--r-- | pkgs/servers/sql/postgresql/ext/pg_safeupdate.nix | 27 | ||||
-rw-r--r-- | pkgs/servers/sql/postgresql/ext/temporal_tables.nix | 31 | ||||
-rw-r--r-- | pkgs/servers/sql/postgresql/ext/timescaledb.nix | 4 | ||||
-rw-r--r-- | pkgs/servers/sql/postgresql/packages.nix | 4 |
11 files changed, 102 insertions, 24 deletions
diff --git a/pkgs/servers/home-assistant/component-packages.nix b/pkgs/servers/home-assistant/component-packages.nix index 223e2ff8f5ec..09c1ec3592d0 100644 --- a/pkgs/servers/home-assistant/component-packages.nix +++ b/pkgs/servers/home-assistant/component-packages.nix @@ -302,7 +302,7 @@ "hook" = ps: with ps; [ ]; "horizon" = ps: with ps; [ ]; "hp_ilo" = ps: with ps; [ ]; - "html5" = ps: with ps; [ aiohttp-cors ]; + "html5" = ps: with ps; [ aiohttp-cors pywebpush ]; "http" = ps: with ps; [ aiohttp-cors ]; "htu21d" = ps: with ps; [ ]; "huawei_lte" = ps: with ps; [ ]; diff --git a/pkgs/servers/jellyfin/default.nix b/pkgs/servers/jellyfin/default.nix index e481c7aaa037..45f58cc7ab92 100644 --- a/pkgs/servers/jellyfin/default.nix +++ b/pkgs/servers/jellyfin/default.nix @@ -18,12 +18,12 @@ let in stdenv.mkDerivation rec { pname = "jellyfin"; - version = "10.3.4"; + version = "10.3.5"; # Impossible to build anything offline with dotnet src = fetchurl { url = "https://github.com/jellyfin/jellyfin/releases/download/v${version}/jellyfin_${version}_portable.tar.gz"; - sha256 = "0wc69dnc3bvzn26nw9ql814y2v7rypjlrw9iqkdganba9pkxa74j"; + sha256 = "12asyrj2ax699gaf8402xfx049n6x0v8j5sba229vw1s66c2m8j2"; }; buildInputs = [ diff --git a/pkgs/servers/matrix-synapse/default.nix b/pkgs/servers/matrix-synapse/default.nix index acc3061e3f09..0efbefd6cd24 100644 --- a/pkgs/servers/matrix-synapse/default.nix +++ b/pkgs/servers/matrix-synapse/default.nix @@ -1,4 +1,4 @@ -{ lib, stdenv, python3 +{ lib, stdenv, python3, openssl , enableSystemd ? stdenv.isLinux }: @@ -23,11 +23,11 @@ let in buildPythonApplication rec { pname = "matrix-synapse"; - version = "0.99.5.2"; + version = "1.0.0"; src = fetchPypi { inherit pname version; - sha256 = "0c1kf9zq7cg9scwnvph4vwk449gypbprmdjzrzrg0wp1rcc8h3gn"; + sha256 = "1n8hv0zd818z4fx39yz6svb07zsbrh8fd6wfmgvhdxhp6p1vl0wq"; }; patches = [ @@ -72,7 +72,7 @@ in buildPythonApplication rec { unpaddedbase64 ] ++ lib.optional enableSystemd systemd; - checkInputs = [ mock parameterized ]; + checkInputs = [ mock parameterized openssl ]; checkPhase = '' PYTHONPATH=".:$PYTHONPATH" ${python3.interpreter} -m twisted.trial tests diff --git a/pkgs/servers/miniflux/default.nix b/pkgs/servers/miniflux/default.nix index b7770019f859..1ebd852380c4 100644 --- a/pkgs/servers/miniflux/default.nix +++ b/pkgs/servers/miniflux/default.nix @@ -2,16 +2,16 @@ buildGoModule rec { pname = "miniflux"; - version = "2.0.15"; + version = "2.0.16"; src = fetchFromGitHub { owner = pname; repo = pname; rev = version; - sha256 = "1k53dkmd41x5h81arb2fs5s9yb6sy6113nbbzls6dc179slfg9zj"; + sha256 = "09fwhbcpp84l5lw4zizm46ssri6irzvjx2w7507a1xhp6iq73p2d"; }; - modSha256 = "0n5j4rns2w1klgrf5jz0bng9cih9aifjx55hhkf4dfj1x4wsxjdj"; + modSha256 = "0060px0av7l9x4xgmkci9d8yl4lgxzqrikqagnz0f17a944p9xdr"; doCheck = true; diff --git a/pkgs/servers/plex/raw.nix b/pkgs/servers/plex/raw.nix index 082506cddfd7..eda4b1238585 100644 --- a/pkgs/servers/plex/raw.nix +++ b/pkgs/servers/plex/raw.nix @@ -8,14 +8,14 @@ # server, and the FHS userenv and corresponding NixOS module should # automatically pick up the changes. stdenv.mkDerivation rec { - version = "1.15.6.1079-78232c603"; + version = "1.15.8.1198-eadbcbb45"; pname = "plexmediaserver"; name = "${pname}-${version}"; # Fetch the source src = fetchurl { url = "https://downloads.plex.tv/plex-media-server-new/${version}/redhat/plexmediaserver-${version}.x86_64.rpm"; - sha256 = "1fvj58b91227wig51hi98rg9r48rdnd8s32xdajjgspxy923mp5a"; + sha256 = "1za33fcga5ysxcj8szlqzriihzcvlx9jxlnsbygh819arbbbpli3"; }; outputs = [ "out" "basedb" ]; diff --git a/pkgs/servers/samba/4.x.nix b/pkgs/servers/samba/4.x.nix index 0b8a63e63f6a..7dcc6cbe686d 100644 --- a/pkgs/servers/samba/4.x.nix +++ b/pkgs/servers/samba/4.x.nix @@ -1,5 +1,5 @@ -{ lib, stdenv, fetchurl, python, pkgconfig, perl, libxslt, docbook_xsl -, fetchpatch +{ lib, stdenv, fetchurl, python, pkgconfig, perl, libxslt, docbook_xsl, rpcgen +, fetchpatch, fixDarwinDylibNames , docbook_xml_dtd_42, readline , popt, iniparser, libbsd, libarchive, libiconv, gettext , krb5Full, zlib, openldap, cups, pam, avahi, acl, libaio, fam, libceph, glusterfs @@ -36,6 +36,8 @@ stdenv.mkDerivation rec { ./4.x-fix-makeflags-parsing.patch ]; + nativeBuildInputs = optionals stdenv.isDarwin [ rpcgen fixDarwinDylibNames ]; + buildInputs = [ python pkgconfig perl libxslt docbook_xsl docbook_xml_dtd_42 /* docbook_xml_dtd_45 */ readline popt iniparser jansson @@ -60,6 +62,9 @@ stdenv.mkDerivation rec { sed -i "s,\(XML_CATALOG_FILES=\"\),\1$XML_CATALOG_FILES ,g" buildtools/wafsamba/wafsamba.py patchShebangs ./buildtools/bin + '' + optionalString stdenv.isDarwin '' + substituteInPlace libcli/dns/wscript_build \ + --replace "bld.SAMBA_BINARY('resolvconftest'" "True or bld.SAMBA_BINARY('resolvconftest'" ''; configureFlags = @@ -70,6 +75,7 @@ stdenv.mkDerivation rec { "--enable-fhs" "--sysconfdir=/etc" "--localstatedir=/var" + "--disable-rpath" ] ++ [(if enableDomainController then "--with-experimental-mit-ad-dc" diff --git a/pkgs/servers/sql/mysql/5.5.x.nix b/pkgs/servers/sql/mysql/5.5.x.nix index d5fbe0bf2494..e089640a5b6f 100644 --- a/pkgs/servers/sql/mysql/5.5.x.nix +++ b/pkgs/servers/sql/mysql/5.5.x.nix @@ -1,5 +1,5 @@ -{ stdenv, fetchurl, cmake, bison, ncurses, openssl, readline, zlib, perl -, cctools, CoreServices }: +{ stdenv, fetchpatch, fetchurl, cmake, bison, ncurses, openssl +, readline, zlib, perl, cctools, CoreServices }: # Note: zlib is not required; MySQL can use an internal zlib. @@ -13,10 +13,17 @@ self = stdenv.mkDerivation rec { sha256 = "1mwrzwk9ap09s430fpdkyhvx5j2syd3xj2hyfzvanjphq4xqbrxi"; }; - patches = if stdenv.isCygwin then [ - ./5.5.17-cygwin.patch - ./5.5.17-export-symbols.patch - ] else null; + patches = + # Minor type error that is a build failure as of clang 6. + stdenv.lib.optional stdenv.cc.isClang (fetchpatch { + url = "https://svn.freebsd.org/ports/head/databases/mysql55-server/files/patch-sql_sql_partition.cc?rev=469888"; + extraPrefix = ""; + sha256 = "09sya27z3ir3xy5mrv3x68hm274594y381n0i6r5s627x71jyszf"; + }) ++ + stdenv.lib.optionals stdenv.isCygwin [ + ./5.5.17-cygwin.patch + ./5.5.17-export-symbols.patch + ]; preConfigure = stdenv.lib.optional stdenv.isDarwin '' ln -s /bin/ps $TMPDIR/ps @@ -51,7 +58,10 @@ self = stdenv.mkDerivation rec { "-DINSTALL_SQLBENCHDIR=" ]; - NIX_CFLAGS_COMPILE = [ "-fpermissive" ]; # since gcc-7 + NIX_CFLAGS_COMPILE = + stdenv.lib.optionals stdenv.cc.isGNU [ "-fpermissive" ] # since gcc-7 + ++ stdenv.lib.optionals stdenv.cc.isClang [ "-Wno-c++11-narrowing" ]; # since clang 6 + NIX_LDFLAGS = stdenv.lib.optionalString stdenv.isLinux "-lgcc_s"; prePatch = '' @@ -78,6 +88,6 @@ self = stdenv.mkDerivation rec { artistic1 bsd0 bsd2 bsd3 bsdOriginal gpl2 lgpl2 lgpl21 mit publicDomain licenses.zlib ]; - broken = stdenv.isAarch64 && stdenv.isDarwin; + broken = stdenv.isAarch64; }; }; in self diff --git a/pkgs/servers/sql/postgresql/ext/pg_safeupdate.nix b/pkgs/servers/sql/postgresql/ext/pg_safeupdate.nix new file mode 100644 index 000000000000..b835141e2ca7 --- /dev/null +++ b/pkgs/servers/sql/postgresql/ext/pg_safeupdate.nix @@ -0,0 +1,27 @@ +{ stdenv, fetchFromGitHub, postgresql }: + +stdenv.mkDerivation rec { + pname = "pg-safeupdate"; + version = "1.2"; + + buildInputs = [ postgresql ]; + + src = fetchFromGitHub { + owner = "eradman"; + repo = pname; + rev = version; + sha256 = "010m57jcv5v8pyfm1cqs3a306y750lvnvla9m5d98v5vdx3349jg"; + }; + + installPhase = '' + mkdir -p $out/bin # for buildEnv, see https://github.com/NixOS/nixpkgs/issues/22653 + install -D safeupdate.so -t $out/lib + ''; + + meta = with stdenv.lib; { + description = "A simple extension to PostgreSQL that requires criteria for UPDATE and DELETE"; + homepage = "https://github.com/eradman/pg-safeupdate"; + platforms = postgresql.meta.platforms; + license = licenses.postgresql; + }; +} diff --git a/pkgs/servers/sql/postgresql/ext/temporal_tables.nix b/pkgs/servers/sql/postgresql/ext/temporal_tables.nix new file mode 100644 index 000000000000..b4f85c4c53f7 --- /dev/null +++ b/pkgs/servers/sql/postgresql/ext/temporal_tables.nix @@ -0,0 +1,31 @@ +{ stdenv, fetchFromGitHub, postgresql }: + +stdenv.mkDerivation rec { + pname = "temporal_tables"; + version = "1.2.0"; + + buildInputs = [ postgresql ]; + + src = fetchFromGitHub { + owner = "mlt"; + repo = pname; + rev = "6cc86eb03d618d6b9fc09ae523f1a1e5228d22b5"; + sha256 = "0ykv37rm511n5955mbh9dcp7pgg88z1nwgszav7z6pziaj3nba8x"; + }; + + installPhase = '' + mkdir -p $out/{bin,lib,share/extension} + + cp *.so $out/lib + cp *.sql $out/share/extension + cp *.control $out/share/extension + ''; + + meta = with stdenv.lib; { + description = "Temporal Tables PostgreSQL Extension "; + homepage = https://github.com/mlt/temporal_tables; + maintainers = with maintainers; [ ggpeti ]; + platforms = postgresql.meta.platforms; + license = licenses.bsd2; + }; +} diff --git a/pkgs/servers/sql/postgresql/ext/timescaledb.nix b/pkgs/servers/sql/postgresql/ext/timescaledb.nix index 055195c1b045..17270e34f759 100644 --- a/pkgs/servers/sql/postgresql/ext/timescaledb.nix +++ b/pkgs/servers/sql/postgresql/ext/timescaledb.nix @@ -8,7 +8,7 @@ stdenv.mkDerivation rec { name = "timescaledb-${version}"; - version = "1.3.0"; + version = "1.3.1"; nativeBuildInputs = [ cmake ]; buildInputs = [ postgresql openssl ]; @@ -17,7 +17,7 @@ stdenv.mkDerivation rec { owner = "timescale"; repo = "timescaledb"; rev = "refs/tags/${version}"; - sha256 = "1wg95ryr5z55aghlqaz0jhz6rliinvfin2i4xpqwg7ir6nz773qm"; + sha256 = "1q3c4qsy4vb00a4p15km4w5d5xcppigf7rp4mqr3wln7i4d4lvnx"; }; # Fix the install phase which tries to install into the pgsql extension dir, diff --git a/pkgs/servers/sql/postgresql/packages.nix b/pkgs/servers/sql/postgresql/packages.nix index f3d2ac68884d..d54b05f8744f 100644 --- a/pkgs/servers/sql/postgresql/packages.nix +++ b/pkgs/servers/sql/postgresql/packages.nix @@ -35,6 +35,8 @@ self: super: { pipelinedb = super.callPackage ./ext/pipelinedb.nix { }; + temporal_tables = super.callPackage ./ext/temporal_tables.nix { }; + timescaledb = super.callPackage ./ext/timescaledb.nix { }; tsearch_extras = super.callPackage ./ext/tsearch_extras.nix { }; @@ -44,4 +46,6 @@ self: super: { pgrouting = super.callPackage ./ext/pgrouting.nix { }; pg_partman = super.callPackage ./ext/pg_partman.nix { }; + + pg_safeupdate = super.callPackage ./ext/pg_safeupdate.nix { }; } |