diff options
author | Frederik Rietdijk <fridh@fridh.nl> | 2018-11-18 10:32:12 +0100 |
---|---|---|
committer | Frederik Rietdijk <fridh@fridh.nl> | 2018-11-18 10:32:12 +0100 |
commit | 63c6875f26635923050ccac4fff8318ff5ac75da (patch) | |
tree | 32af0d0da4ce49cc9ae52efdb14a23904561f1e2 /pkgs/tools | |
parent | 327ecf882af448b45473c34bc24465415a6c67fc (diff) | |
parent | d208fa53ebb3bc04afaf1feb48abfcbb3cff5492 (diff) | |
download | nixlib-63c6875f26635923050ccac4fff8318ff5ac75da.tar nixlib-63c6875f26635923050ccac4fff8318ff5ac75da.tar.gz nixlib-63c6875f26635923050ccac4fff8318ff5ac75da.tar.bz2 nixlib-63c6875f26635923050ccac4fff8318ff5ac75da.tar.lz nixlib-63c6875f26635923050ccac4fff8318ff5ac75da.tar.xz nixlib-63c6875f26635923050ccac4fff8318ff5ac75da.tar.zst nixlib-63c6875f26635923050ccac4fff8318ff5ac75da.zip |
Merge master into staging-next
Diffstat (limited to 'pkgs/tools')
45 files changed, 485 insertions, 154 deletions
diff --git a/pkgs/tools/X11/xpra/default.nix b/pkgs/tools/X11/xpra/default.nix index 7f1552f91979..5f9c4accc72b 100644 --- a/pkgs/tools/X11/xpra/default.nix +++ b/pkgs/tools/X11/xpra/default.nix @@ -86,6 +86,8 @@ in buildPythonApplication rec { description = "Persistent remote applications for X"; platforms = platforms.linux; license = licenses.gpl2; + # https://github.com/NixOS/nixpkgs/pull/48872#issuecomment-433559636 + broken = true; maintainers = with maintainers; [ tstrobel offline numinit ]; }; } diff --git a/pkgs/tools/audio/abcm2ps/default.nix b/pkgs/tools/audio/abcm2ps/default.nix index 5d3050108b8a..eefb8160cbba 100644 --- a/pkgs/tools/audio/abcm2ps/default.nix +++ b/pkgs/tools/audio/abcm2ps/default.nix @@ -2,13 +2,13 @@ stdenv.mkDerivation rec { name = "abcm2ps-${version}"; - version = "8.14.0"; + version = "8.14.1"; src = fetchFromGitHub { owner = "leesavide"; repo = "abcm2ps"; rev = "v${version}"; - sha256 = "1nlvq2cfdy5pghll3aprws7yx5p14gcrhz10q9fa6myrd8ad4if1"; + sha256 = "1i39wfrnjflhfbqhcphr9dw08q4si5i724wv423996whk5xni61l"; }; prePatch = '' diff --git a/pkgs/tools/audio/liquidsoap/full.nix b/pkgs/tools/audio/liquidsoap/full.nix index 7ef0793a4831..f69e60117ce3 100644 --- a/pkgs/tools/audio/liquidsoap/full.nix +++ b/pkgs/tools/audio/liquidsoap/full.nix @@ -1,4 +1,4 @@ -{ stdenv, fetchurl, which, pkgconfig +{ stdenv, makeWrapper, fetchurl, which, pkgconfig , ocamlPackages , libao, portaudio, alsaLib, libpulseaudio, libjack2 , libsamplerate, libmad, taglib, lame, libogg @@ -31,10 +31,15 @@ stdenv.mkDerivation { sed ${toString packageFilters} PACKAGES.default > PACKAGES ''; + postFixup = '' + wrapProgram $out/bin/liquidsoap --set LIQ_LADSPA_PATH /run/current-system/sw/lib/ladspa + ''; + configureFlags = [ "--localstatedir=/var" ]; + nativeBuildInputs = [ makeWrapper pkgconfig ]; buildInputs = - [ which ocamlPackages.ocaml ocamlPackages.findlib pkgconfig + [ which ocamlPackages.ocaml ocamlPackages.findlib libao portaudio alsaLib libpulseaudio libjack2 libsamplerate libmad taglib lame libogg libvorbis speex libtheora libopus fdk_aac @@ -47,7 +52,7 @@ stdenv.mkDerivation { meta = with stdenv.lib; { description = "Swiss-army knife for multimedia streaming"; - homepage = http://liquidsoap.fm/; + homepage = https://www.liquidsoap.info/; maintainers = with maintainers; [ ehmry ]; license = licenses.gpl2; platforms = ocamlPackages.ocaml.meta.platforms or []; diff --git a/pkgs/tools/bluetooth/obex-data-server/default.nix b/pkgs/tools/bluetooth/obex-data-server/default.nix index 5c272e3dbafc..5c8f65ae5141 100644 --- a/pkgs/tools/bluetooth/obex-data-server/default.nix +++ b/pkgs/tools/bluetooth/obex-data-server/default.nix @@ -18,8 +18,9 @@ stdenv.mkDerivation rec { export PKG_CONFIG_PATH="${dbus.dev}/lib/pkgconfig:$PKG_CONFIG_PATH" ''; - meta = { + meta = with stdenv.lib; { homepage = http://wiki.muiline.com/obex-data-server; - platforms = stdenv.lib.platforms.linux; + platforms = platforms.linux; + license = licenses.gpl2; }; } diff --git a/pkgs/tools/bluetooth/obexd/default.nix b/pkgs/tools/bluetooth/obexd/default.nix index 4d872c3d9ac7..0771505b7269 100644 --- a/pkgs/tools/bluetooth/obexd/default.nix +++ b/pkgs/tools/bluetooth/obexd/default.nix @@ -1,8 +1,8 @@ { stdenv, fetchurl, pkgconfig, glib, dbus, openobex, bluez, libical }: - + stdenv.mkDerivation rec { name = "obexd-0.48"; - + src = fetchurl { url = "mirror://kernel/linux/bluetooth/${name}.tar.bz2"; sha256 = "1i20dnibvnq9lnkkhajr5xx3kxlwf9q5c4jm19kyb0q1klzgzlb8"; @@ -12,8 +12,9 @@ stdenv.mkDerivation rec { nativeBuildInputs = [ pkgconfig ]; - meta = { + meta = with stdenv.lib; { homepage = http://www.bluez.org/; - platforms = stdenv.lib.platforms.linux; + platforms = platforms.linux; + license = licenses.gpl3; }; } diff --git a/pkgs/tools/bootloaders/refind/default.nix b/pkgs/tools/bootloaders/refind/default.nix index 5f4d77e34b6a..bc84edeb21b7 100644 --- a/pkgs/tools/bootloaders/refind/default.nix +++ b/pkgs/tools/bootloaders/refind/default.nix @@ -13,12 +13,12 @@ in stdenv.mkDerivation rec { name = "refind-${version}"; - version = "0.11.3"; + version = "0.11.4"; srcName = "refind-src-${version}"; src = fetchurl { url = "mirror://sourceforge/project/refind/${version}/${srcName}.tar.gz"; - sha256 = "13q1yap9r4lzm5xjx1zi434gckd3gk5p8n4vh6jav0h3r3ayp633"; + sha256 = "1bjd0dl77bc5k6g3kc7s8m57vpbg2zscph9qh84xll9rc10g3fir"; }; buildInputs = [ gnu-efi ]; diff --git a/pkgs/tools/filesystems/squashfs/default.nix b/pkgs/tools/filesystems/squashfs/default.nix index d5bcd912c957..389a614f54b0 100644 --- a/pkgs/tools/filesystems/squashfs/default.nix +++ b/pkgs/tools/filesystems/squashfs/default.nix @@ -15,13 +15,17 @@ stdenv.mkDerivation rec { rev = "9c1db6d13a51a2e009f0027ef336ce03624eac0d"; }; - # These patches ensures that mksquashfs output is reproducible. - # See also https://reproducible-builds.org/docs/system-images/ - # and https://github.com/NixOS/nixpkgs/issues/40144. patches = [ + # These patches ensures that mksquashfs output is reproducible. + # See also https://reproducible-builds.org/docs/system-images/ + # and https://github.com/NixOS/nixpkgs/issues/40144. ./0001-If-SOURCE_DATE_EPOCH-is-set-override-timestamps-with.patch ./0002-If-SOURCE_DATE_EPOCH-is-set-also-clamp-content-times.patch ./0003-remove-frag-deflator-thread.patch + + # This patch adds an option to pad filesystems (increasing size) in + # exchange for better chunking / binary diff calculation. + ./squashfs-tools-4.3-4k-align.patch ] ++ stdenv.lib.optional stdenv.isDarwin ./darwin.patch; buildInputs = [ zlib xz ] diff --git a/pkgs/tools/filesystems/squashfs/squashfs-tools-4.3-4k-align.patch b/pkgs/tools/filesystems/squashfs/squashfs-tools-4.3-4k-align.patch new file mode 100644 index 000000000000..b7c949182e0b --- /dev/null +++ b/pkgs/tools/filesystems/squashfs/squashfs-tools-4.3-4k-align.patch @@ -0,0 +1,92 @@ +From 7bda7c75748f36b0a50f93e46144d5a4de4974ad Mon Sep 17 00:00:00 2001 +From: Amin Hassani <ahassani@google.com> +Date: Thu, 15 Dec 2016 10:43:15 -0800 +Subject: [PATCH] mksquashfs 4K aligns the files inside the squashfs image + +Files inside a squashfs image are not necessarily 4k (4096) +aligned. This patch starts each file in a 4k aligned address and pads +zero to the end of the file until it reaches the next 4k aligned +address. This will not change the size of the compressed +blocks (especially the last one) and hence it will not change how the +files are being loaded in kernel or unsquashfs. However on average this +increases the size of the squashfs image which can be calculated by the +following formula: + +increased_size = (number_of_unfragmented_files_in_image + number of fragments) * 2048 + +The 4k alignment can be enabled by flag '-4k-align' +--- + squashfs-tools/mksquashfs.c | 16 ++++++++++++++++ + 1 file changed, 16 insertions(+) + +diff --git a/squashfs-tools/mksquashfs.c b/squashfs-tools/mksquashfs.c +index 8b1376f..683973d 100644 +--- a/squashfs-tools/mksquashfs.c ++++ b/squashfs-tools/mksquashfs.c +@@ -99,6 +99,8 @@ int old_exclude = TRUE; + int use_regex = FALSE; + int nopad = FALSE; + int exit_on_error = FALSE; ++int do_4k_align = FALSE; ++#define ALIGN_UP(bytes, size) (bytes = (bytes + size - 1) & ~(size - 1)) + + long long global_uid = -1, global_gid = -1; + +@@ -1513,6 +1515,9 @@ void unlock_fragments() + * queue at this time. + */ + while(!queue_empty(locked_fragment)) { ++ // 4k align the start of remaining queued fragments. ++ if(do_4k_align) ++ ALIGN_UP(bytes, 4096); + write_buffer = queue_get(locked_fragment); + frg = write_buffer->block; + size = SQUASHFS_COMPRESSED_SIZE_BLOCK(fragment_table[frg].size); +@@ -2420,6 +2420,9 @@ + compressed_size = SQUASHFS_COMPRESSED_SIZE_BLOCK(c_byte); + write_buffer->size = compressed_size; + if(fragments_locked == FALSE) { ++ // 4k align the start of each fragment. ++ if(do_4k_align) ++ ALIGN_UP(bytes, 4096); + fragment_table[file_buffer->block].size = c_byte; + fragment_table[file_buffer->block].start_block = bytes; + write_buffer->block = bytes; +@@ -2761,6 +2769,10 @@ int write_file_blocks(squashfs_inode *inode, struct dir_ent *dir_ent, + long long sparse = 0; + struct file_buffer *fragment_buffer = NULL; + ++ // 4k align the start of each file. ++ if(do_4k_align) ++ ALIGN_UP(bytes, 4096); ++ + if(pre_duplicate(read_size)) + return write_file_blocks_dup(inode, dir_ent, read_buffer, dup); + +@@ -4692,6 +4704,7 @@ void write_filesystem_tables(struct squashfs_super_block *sBlk, int nopad) + "compressed", no_fragments ? "no" : noF ? "uncompressed" : + "compressed", no_xattrs ? "no" : noX ? "uncompressed" : + "compressed"); ++ printf("\t4k %saligned\n", do_4k_align ? "" : "un"); + printf("\tduplicates are %sremoved\n", duplicate_checking ? "" : + "not "); + printf("Filesystem size %.2f Kbytes (%.2f Mbytes)\n", bytes / 1024.0, +@@ -5346,6 +5359,8 @@ print_compressor_options: + root_name = argv[i]; + } else if(strcmp(argv[i], "-version") == 0) { + VERSION(); ++ } else if(strcmp(argv[i], "-4k-align") == 0) { ++ do_4k_align = TRUE; + } else { + ERROR("%s: invalid option\n\n", argv[0]); + printOptions: +@@ -5387,6 +5402,7 @@ printOptions: + ERROR("\t\t\tdirectory containing that directory, " + "rather than the\n"); + ERROR("\t\t\tcontents of the directory\n"); ++ ERROR("-4k-align\t\tenables 4k alignment of all files\n"); + ERROR("\nFilesystem filter options:\n"); + ERROR("-p <pseudo-definition>\tAdd pseudo file " + "definition\n"); +-- +2.14.1.480.gb18f417b89-goog (previously; hand-patched by charles-dyfis-net) diff --git a/pkgs/tools/inputmethods/ibus-engines/ibus-m17n/default.nix b/pkgs/tools/inputmethods/ibus-engines/ibus-m17n/default.nix index c53f766cb7d3..a0d50cf94790 100644 --- a/pkgs/tools/inputmethods/ibus-engines/ibus-m17n/default.nix +++ b/pkgs/tools/inputmethods/ibus-engines/ibus-m17n/default.nix @@ -5,13 +5,13 @@ stdenv.mkDerivation rec { name = "ibus-m17n-${version}"; - version = "1.3.4"; + version = "1.4.1"; src = fetchFromGitHub { owner = "ibus"; repo = "ibus-m17n"; rev = version; - sha256 = "1n0bvgc4jyksgvzrw5zs2pxcpxcn3gcc0j2kasbznm34fpv3frsr"; + sha256 = "1xl7swqn46nhi43rka0zx666mpk667ykag3sz07x0zqrwi41frps"; }; buildInputs = [ diff --git a/pkgs/tools/misc/bat/default.nix b/pkgs/tools/misc/bat/default.nix index d449b3b82f92..b4913970715a 100644 --- a/pkgs/tools/misc/bat/default.nix +++ b/pkgs/tools/misc/bat/default.nix @@ -4,25 +4,22 @@ rustPlatform.buildRustPackage rec { name = "bat-${version}"; - version = "0.8.0"; + version = "0.9.0"; src = fetchFromGitHub { owner = "sharkdp"; repo = "bat"; rev = "v${version}"; - sha256 = "1xvjw61q0qbnzj95g7g8xckcqha9jrf2172b5l7faj7i0jhmz2kx"; + sha256 = "13c88h1m9flmx3x2h7xrnb1wy4vgdxsqahw8cqa0x61ay0019a7s"; fetchSubmodules = true; }; - cargoSha256 = "0xv769f2iqrgnbmb7ma9p3gbb2xpx2lhqc0kq5nizf8w8xdc5m11"; + cargoSha256 = "1clng4rl7mq50z8d5ipmr9fapjj4qmpf4gmdnfl6vs35pq3wp9j4"; nativeBuildInputs = [ cmake pkgconfig zlib ]; buildInputs = stdenv.lib.optionals stdenv.isDarwin [ Security libiconv ]; - # https://github.com/NixOS/nixpkgs/issues/49642 - doCheck = !stdenv.isDarwin; - postInstall = '' install -m 444 -Dt $out/share/man/man1 doc/bat.1 diff --git a/pkgs/tools/misc/desktop-file-utils/default.nix b/pkgs/tools/misc/desktop-file-utils/default.nix index 70bc34954b2c..8dc590c5d6fc 100644 --- a/pkgs/tools/misc/desktop-file-utils/default.nix +++ b/pkgs/tools/misc/desktop-file-utils/default.nix @@ -1,4 +1,4 @@ -{ stdenv, fetchurl, pkgconfig, glib, libintl }: +{ stdenv, fetchurl, fetchpatch, pkgconfig, glib, libintl }: with stdenv.lib; @@ -10,6 +10,14 @@ stdenv.mkDerivation rec { sha256 = "119kj2w0rrxkhg4f9cf5waa55jz1hj8933vh47vcjipcplql02bc"; }; + patches = [ + # Makes font a recognized media type. Committed upstream, but no release has been made. + (fetchpatch { + url = "https://gitlab.freedesktop.org/xdg/desktop-file-utils/commit/92af4108750ceaf4191fd54e255885c7d8a78b70.patch"; + sha256 = "14sqy10p5skp6hv4hgiwnj9hpr460250x42k5z0390l6nr6gahsq"; + }) + ]; + nativeBuildInputs = [ pkgconfig ]; buildInputs = [ glib libintl ]; diff --git a/pkgs/tools/misc/i3minator/default.nix b/pkgs/tools/misc/i3minator/default.nix index 7ffab069779c..898ecd9df4a8 100644 --- a/pkgs/tools/misc/i3minator/default.nix +++ b/pkgs/tools/misc/i3minator/default.nix @@ -1,12 +1,14 @@ -{ stdenv, fetchurl, pythonPackages, glibcLocales }: +{ stdenv, fetchFromGitHub, pythonPackages, glibcLocales }: pythonPackages.buildPythonApplication rec { name = "i3minator-${version}"; version = "0.0.4"; - src = fetchurl { - url = "https://github.com/carlesso/i3minator/archive/${version}.tar.gz"; - sha256 = "11dn062788kwfs8k2ry4v8zr2gn40r6lsw770s9g2gvhl5n469dw"; + src = fetchFromGitHub { + owner = "carlesso"; + repo = "i3minator"; + rev = version; + sha256 = "07dic5d2m0zw0psginpl43xn0mpxw7wilj49d02knz69f7c416lm"; }; LC_ALL = "en_US.UTF-8"; diff --git a/pkgs/tools/misc/ostree/default.nix b/pkgs/tools/misc/ostree/default.nix index 3cbdd498aa73..25cba56449cd 100644 --- a/pkgs/tools/misc/ostree/default.nix +++ b/pkgs/tools/misc/ostree/default.nix @@ -4,7 +4,7 @@ }: let - version = "2018.8"; + version = "2018.9"; libglnx-src = fetchFromGitHub { owner = "GNOME"; @@ -28,7 +28,7 @@ in stdenv.mkDerivation { rev = "v${version}"; owner = "ostreedev"; repo = "ostree"; - sha256 = "0i7b7hvlv8m44k39fr5389wskf810vda8s7ivy2whj1nan5951yx"; + sha256 = "0a8gr4qqxcvz3fqv9w4dxy6iq0rq4kdzf08rzv8xg4gic3ldgyvj"; }; patches = [ diff --git a/pkgs/tools/misc/sutils/default.nix b/pkgs/tools/misc/sutils/default.nix index 8d4f00ee8478..c96ac41fb268 100644 --- a/pkgs/tools/misc/sutils/default.nix +++ b/pkgs/tools/misc/sutils/default.nix @@ -1,15 +1,20 @@ -{ stdenv, fetchurl }: +{ stdenv, fetchFromGitHub, alsaLib }: stdenv.mkDerivation rec { - name = "sutils-0.1"; + version = "0.2"; + name = "sutils-${version}"; - src = fetchurl { - url = "https://github.com/baskerville/sutils/archive/0.1.tar.gz"; - sha256 = "0xqk42vl82chy458d64fj68a4md4bxaip8n3xw9skxz0a1sgvks8"; + src = fetchFromGitHub { + owner = "baskerville"; + repo = "sutils"; + rev = version; + sha256 = "0i2g6a6xdaq3w613dhq7mnsz4ymwqn6kvkyan5kgy49mzq97va6j"; }; hardeningDisable = [ "format" ]; + buildInputs = [ alsaLib ]; + prePatch = ''sed -i "s@/usr/local@$out@" Makefile''; meta = { diff --git a/pkgs/tools/misc/umlet/default.nix b/pkgs/tools/misc/umlet/default.nix index b7f08f908361..c04c16ae1cc7 100644 --- a/pkgs/tools/misc/umlet/default.nix +++ b/pkgs/tools/misc/umlet/default.nix @@ -2,13 +2,13 @@ stdenv.mkDerivation rec { major = "14"; - minor = "2"; - version = "${major}.${minor}"; + minor = "3"; + version = "${major}.${minor}.0"; name = "umlet-${version}"; src = fetchurl { url = "http://www.umlet.com/umlet_${major}_${minor}/umlet-standalone-${version}.zip"; - sha256 = "1fcc7ms92vcc4b8jh56bd3zrqdb0bwhbbzdxycc952fb0j6m62fw"; + sha256 = "0jfyxjxsjx29xhs3fl0f574nyncmk9j5jp8zlgd401mcaznn9c7l"; }; buildInputs = [ unzip ]; @@ -45,7 +45,7 @@ stdenv.mkDerivation rec { ''; homepage = http://www.umlet.com; license = licenses.gpl3; - maintainers = [ ]; + maintainers = with maintainers; [ geistesk ]; platforms = platforms.all; }; } diff --git a/pkgs/tools/misc/unicode/default.nix b/pkgs/tools/misc/unicode/default.nix index 58f5e54fc3a0..9ace1f137b82 100644 --- a/pkgs/tools/misc/unicode/default.nix +++ b/pkgs/tools/misc/unicode/default.nix @@ -2,18 +2,18 @@ python3Packages.buildPythonApplication rec { name = "unicode-${version}"; - version = "2.5"; + version = "2.6"; src = fetchFromGitHub { owner = "garabik"; repo = "unicode"; rev = "v${version}"; - sha256 = "0vg1zshlzgdva8gzw6fya28fc4jhypjkj743x3q0yabx6934k0g2"; + sha256 = "17hh4nwl5njsh7lnff583j2axn6rfvfbiqwp72n7vcsgkiszw4kg"; }; ucdtxt = fetchurl { - url = http://www.unicode.org/Public/10.0.0/ucd/UnicodeData.txt; - sha256 = "1cfak1j753zcrbgixwgppyxhm4w8vda8vxhqymi7n5ljfi6kwhjj"; + url = http://www.unicode.org/Public/11.0.0/ucd/UnicodeData.txt; + sha256 = "16b0jzvvzarnlxdvs2izd5ia0ipbd87md143dc6lv6xpdqcs75s9"; }; postFixup = '' diff --git a/pkgs/tools/misc/wl-clipboard/default.nix b/pkgs/tools/misc/wl-clipboard/default.nix new file mode 100644 index 000000000000..55a58185d562 --- /dev/null +++ b/pkgs/tools/misc/wl-clipboard/default.nix @@ -0,0 +1,26 @@ +{ stdenv, fetchFromGitHub, meson, ninja, pkgconfig +, wayland, wayland-protocols }: + +stdenv.mkDerivation rec { + name = "wl-clipboard-${version}"; + version = "1.0.0"; + + src = fetchFromGitHub { + owner = "bugaevc"; + repo = "wl-clipboard"; + rev = "v${version}"; + sha256 = "03h6ajcc30w6928bkd4h6xfj4iy2359ww6hdlybq8mr1zwmb2h0q"; + }; + + nativeBuildInputs = [ meson ninja pkgconfig wayland-protocols ]; + buildInputs = [ wayland ]; + mesonFlags = [ "-Dauto_features=enabled" ]; + + meta = with stdenv.lib; { + description = "Command-line copy/paste utilities for Wayland"; + homepage = https://github.com/bugaevc/wl-clipboard; + license = licenses.gpl3; + maintainers = with maintainers; [ dywedir ]; + platforms = platforms.linux; + }; +} diff --git a/pkgs/tools/networking/netselect/default.nix b/pkgs/tools/networking/netselect/default.nix index ef00d8602feb..702fee86922e 100644 --- a/pkgs/tools/networking/netselect/default.nix +++ b/pkgs/tools/networking/netselect/default.nix @@ -1,19 +1,28 @@ -{stdenv, fetchurl}: +{ stdenv, fetchFromGitHub }: -stdenv.mkDerivation { - name = "netselect-0.3"; +stdenv.mkDerivation rec { + name = "netselect-${version}"; + version = "0.4"; - src = fetchurl { - url = http://alumnit.ca/~apenwarr/netselect/netselect-0.3.tar.gz; - sha256 = "0y69z59vylj9x9nk5jqn6ihx7dkzg09gpv2w1q1rs8fmi4jr90gy"; + src = fetchFromGitHub { + owner = "apenwarr"; + repo = "netselect"; + rev = name; + sha256 = "1zncyvjzllrjbdvz7c50d1xjyhs9mwqfy92ndpfc5b3mxqslw4kx"; }; - preBuild = '' - makeFlagsArray=(PREFIX=$out) - substituteInPlace Makefile \ - --replace "-o root" "" \ - --replace "-g root" "" \ - --replace "4755" "0755" + postPatch = '' + substituteInPlace netselect-apt \ + --replace "/usr/bin/" "" + ''; + + makeFlags = [ "PREFIX=$(out)" ]; + + installPhase = '' + runHook preInstall + install -Dm555 -t $out/bin netselect netselect-apt + install -Dm444 -t $out/share/man/man1 *.1 + runHook postInstall ''; meta = with stdenv.lib; { diff --git a/pkgs/tools/networking/ngrep/default.nix b/pkgs/tools/networking/ngrep/default.nix index ca5e0b7c4f5d..9cddc5bbd877 100644 --- a/pkgs/tools/networking/ngrep/default.nix +++ b/pkgs/tools/networking/ngrep/default.nix @@ -1,4 +1,4 @@ -{ lib, stdenv, fetchFromGitHub, fetchpatch, autoreconfHook, libpcap, gnumake3, pcre }: +{ lib, stdenv, fetchFromGitHub, fetchpatch, autoreconfHook, libpcap, pcre }: stdenv.mkDerivation rec { name = "ngrep-${version}"; @@ -18,7 +18,7 @@ stdenv.mkDerivation rec { }) ]; - nativeBuildInputs = [ autoreconfHook gnumake3 ]; + nativeBuildInputs = [ autoreconfHook ]; buildInputs = [ libpcap pcre ]; configureFlags = [ diff --git a/pkgs/tools/networking/openconnect_pa/default.nix b/pkgs/tools/networking/openconnect_pa/default.nix new file mode 100644 index 000000000000..d261e5717052 --- /dev/null +++ b/pkgs/tools/networking/openconnect_pa/default.nix @@ -0,0 +1,40 @@ +{ stdenv, fetchFromGitHub, pkgconfig, vpnc, openssl ? null, gnutls ? null, gmp, libxml2, stoken, zlib, autoreconfHook } : + +assert (openssl != null) == (gnutls == null); + +stdenv.mkDerivation rec { + version = "unstable-2018-10-08"; + name = "openconnect_pa-${version}"; + + outputs = [ "out" "dev" ]; + + src = fetchFromGitHub { + owner = "dlenski"; + repo = "openconnect"; + rev = "e5fe063a087385c5b157ad7a9a3fa874181f6e3b"; + sha256 = "0ywacqs3nncr2gpjjcz2yc9c6v4ifjssh0vb07h0qff06whqhdax"; + }; + + preConfigure = '' + export PKG_CONFIG=${pkgconfig}/bin/pkg-config + export LIBXML2_CFLAGS="-I ${libxml2.dev}/include/libxml2" + export LIBXML2_LIBS="-L${libxml2.out}/lib -lxml2" + ''; + + configureFlags = [ + "--with-vpnc-script=${vpnc}/etc/vpnc/vpnc-script" + "--disable-nls" + "--without-openssl-version-check" + ]; + + nativeBuildInputs = [ pkgconfig autoreconfHook ]; + propagatedBuildInputs = [ vpnc openssl gnutls gmp libxml2 stoken zlib ]; + + meta = with stdenv.lib; { + description = "OpenConnect client extended to support Palo Alto Networks' GlobalProtect VPN"; + homepage = https://github.com/dlenski/openconnect/; + license = licenses.lgpl21; + maintainers = with maintainers; [ chessai ]; + platforms = platforms.linux; + }; +} diff --git a/pkgs/tools/networking/pingtcp/default.nix b/pkgs/tools/networking/pingtcp/default.nix index 8fb9b066bf1c..2d13515d83d7 100644 --- a/pkgs/tools/networking/pingtcp/default.nix +++ b/pkgs/tools/networking/pingtcp/default.nix @@ -1,14 +1,15 @@ -{ stdenv, fetchgit, cmake }: +{ stdenv, fetchFromGitHub, cmake }: stdenv.mkDerivation rec { name = "pingtcp-${version}"; version = "0.0.3"; - # This project uses git submodules, which fetchFromGitHub doesn't support: - src = fetchgit { + src = fetchFromGitHub { + owner = "LanetNetwork"; + repo = "pingtcp"; sha256 = "1cv84n30y03s1b83apxxyn2jv5ss1pywsahrfrpkb6zcgzzrcqn8"; rev = "refs/tags/v${version}"; - url = "https://github.com/LanetNetwork/pingtcp.git"; + fetchSubmodules = true; }; nativeBuildInputs = [ cmake ]; diff --git a/pkgs/tools/networking/shadowsocks-libev/default.nix b/pkgs/tools/networking/shadowsocks-libev/default.nix index 27c4590f88b8..ca744d7b0d0a 100644 --- a/pkgs/tools/networking/shadowsocks-libev/default.nix +++ b/pkgs/tools/networking/shadowsocks-libev/default.nix @@ -1,4 +1,4 @@ -{ stdenv, fetchgit, cmake +{ stdenv, fetchFromGitHub, cmake , libsodium, mbedtls, libev, c-ares, pcre , asciidoc, xmlto, docbook_xml_dtd_45, docbook_xsl, libxslt }: @@ -8,11 +8,12 @@ stdenv.mkDerivation rec { version = "3.2.0"; # Git tag includes CMake build files which are much more convenient. - # fetchgit because submodules. - src = fetchgit { - url = "https://github.com/shadowsocks/shadowsocks-libev"; + src = fetchFromGitHub { + owner = "shadowsocks"; + repo = "shadowsocks-libev"; rev = "refs/tags/v${version}"; sha256 = "0i9vz5b2c2bkdl2k9kqzvqyrlpdl94lf7k7rzxds8hn2kk0jizhb"; + fetchSubmodules = true; }; buildInputs = [ libsodium mbedtls libev c-ares pcre ]; diff --git a/pkgs/tools/package-management/cargo-tree/default.nix b/pkgs/tools/package-management/cargo-tree/default.nix index dd7d88ff848c..e509ab2f59bb 100644 --- a/pkgs/tools/package-management/cargo-tree/default.nix +++ b/pkgs/tools/package-management/cargo-tree/default.nix @@ -1,17 +1,17 @@ { stdenv, lib, rustPlatform, fetchFromGitHub, pkgconfig, cmake, curl, libiconv, darwin }: rustPlatform.buildRustPackage rec { name = "cargo-tree-${version}"; - version = "0.21.0"; + version = "0.22.0"; src = fetchFromGitHub { owner = "sfackler"; repo = "cargo-tree"; rev = "v${version}"; - sha256 = "0vr1mv8ns67kslxgwkvic8w86fvmqasxs6yd4yn21j49zg23866k"; + sha256 = "1knxykw1pbqxs4inijd3y797kf1zp4ansmnbwfqxyjlkgss0spdq"; }; - cargoSha256 = "0924bpcwz15zlp4vjaqap05s4nynw9mqz0np1kph3vx7aj9rsaw6"; + cargoSha256 = "0w1psr7j5r8ng3njkjiva738czlhnf9drprisbc8szkfhzc3rgaw"; nativeBuildInputs = [ pkgconfig cmake ]; buildInputs = [ curl ] ++ lib.optionals stdenv.isDarwin [ libiconv darwin.apple_sdk.frameworks.Security ]; diff --git a/pkgs/tools/package-management/createrepo_c/default.nix b/pkgs/tools/package-management/createrepo_c/default.nix index f6314b655294..0a0cae32dcf5 100644 --- a/pkgs/tools/package-management/createrepo_c/default.nix +++ b/pkgs/tools/package-management/createrepo_c/default.nix @@ -1,14 +1,14 @@ -{ stdenv, fetchFromGitHub, cmake, pkgconfig, bzip2, expat, glib, curl, libxml2, python2, rpm, openssl, sqlite, file, xz, pcre, bash-completion }: +{ stdenv, fetchFromGitHub, cmake, pkgconfig, bzip2, expat, glib, curl, libxml2, python3, rpm, openssl, sqlite, file, xz, pcre, bash-completion }: stdenv.mkDerivation rec { - rev = "0.11.0"; - name = "createrepo_c-${rev}"; + name = "createrepo_c-${version}"; + version = "0.11.1"; src = fetchFromGitHub { - inherit rev; owner = "rpm-software-management"; repo = "createrepo_c"; - sha256 = "1w9yynj8mxhw714gvgr0fibfks584b4y0n4vjckcf7y97cpdhjkn"; + rev = version; + sha256 = "0cmysc7gdd2czagl4drfh9gin6aa2847vgi30a3p0cfqvczf9cm6"; }; patches = [ @@ -20,12 +20,12 @@ stdenv.mkDerivation rec { substituteInPlace CMakeLists.txt \ --replace '@BASHCOMP_DIR@' "$out/share/bash-completion/completions" substituteInPlace src/python/CMakeLists.txt \ - --replace "@PYTHON_INSTALL_PATH@" "$out/${python2.sitePackages}" + --replace "@PYTHON_INSTALL_DIR@" "$out/${python3.sitePackages}" ''; nativeBuildInputs = [ cmake pkgconfig ]; - buildInputs = [ bzip2 expat glib curl libxml2 python2 rpm openssl sqlite file xz pcre bash-completion ]; + buildInputs = [ bzip2 expat glib curl libxml2 python3 rpm openssl sqlite file xz pcre bash-completion ]; meta = with stdenv.lib; { description = "C implementation of createrepo"; diff --git a/pkgs/tools/package-management/home-manager/default.nix b/pkgs/tools/package-management/home-manager/default.nix index 44b67ae4dccd..2b50e81dfc4f 100644 --- a/pkgs/tools/package-management/home-manager/default.nix +++ b/pkgs/tools/package-management/home-manager/default.nix @@ -6,13 +6,13 @@ stdenv.mkDerivation rec { name = "home-manager-${version}"; - version = "2018-06-14"; + version = "2018-11-04"; - src = fetchFromGitHub{ + src = fetchFromGitHub { owner = "rycee"; repo = "home-manager"; - rev = "5641ee3f942e700de35b28fc879b0d8a10a7a1fe"; - sha256 = "0bqzwczbr5c2y3ms7m7ly0as9zsnqwljq61ci2y2gbqzw3md1x2j"; + rev = "05c93ff3ae13f1a2d90a279a890534cda7dc8ad6"; + sha256 = "0ymfvjnnz98ynws3v6dcil1cmp7x2cmm6zy8yqgkn8z7wyrrqq0v"; }; nativeBuildInputs = [ makeWrapper ]; diff --git a/pkgs/tools/package-management/librepo/default.nix b/pkgs/tools/package-management/librepo/default.nix index b08d65e123da..c35550597a34 100644 --- a/pkgs/tools/package-management/librepo/default.nix +++ b/pkgs/tools/package-management/librepo/default.nix @@ -1,24 +1,24 @@ -{ stdenv, fetchFromGitHub, cmake, python, pkgconfig, expat, glib, pcre, openssl, curl, check, attr, gpgme }: +{ stdenv, fetchFromGitHub, cmake, python, pkgconfig, libxml2, glib, openssl, curl, check, gpgme }: stdenv.mkDerivation rec { - version = "1.8.1"; + version = "1.9.2"; name = "librepo-${version}"; src = fetchFromGitHub { owner = "rpm-software-management"; repo = "librepo"; rev = version; - sha256 = "11rypnxjgsc2klyg294ndxy1cyp0nyk00zpjhcvqkhp58vvkkv12"; + sha256 = "0xa9ng9mhpianhjy2a0jnj8ha1zckk2sz91y910daggm1qcv5asx"; }; nativeBuildInputs = [ cmake pkgconfig ]; cmakeFlags="-DPYTHON_DESIRED=${stdenv.lib.substring 0 1 python.pythonVersion}"; - buildInputs = [ python expat glib pcre openssl curl check attr gpgme ]; + buildInputs = [ python libxml2 glib openssl curl check gpgme ]; # librepo/fastestmirror.h includes curl/curl.h, and pkg-config specfile refers to others in here - propagatedBuildInputs = [ curl gpgme expat ]; + propagatedBuildInputs = [ curl gpgme libxml2 ]; meta = with stdenv.lib; { description = "Library providing C and Python (libcURL like) API for downloading linux repository metadata and packages"; diff --git a/pkgs/tools/package-management/nix-review/default.nix b/pkgs/tools/package-management/nix-review/default.nix index f761c69e0264..2000bcb92d05 100644 --- a/pkgs/tools/package-management/nix-review/default.nix +++ b/pkgs/tools/package-management/nix-review/default.nix @@ -8,13 +8,13 @@ python3.pkgs.buildPythonApplication rec { pname = "nix-review"; - version = "0.6.0"; + version = "0.6.1"; src = fetchFromGitHub { owner = "Mic92"; repo = "nix-review"; rev = version; - sha256 = "1391fs33jlg1pnfxpfhvry4sb4p4hy8gjpipnnxm8483f12b49km"; + sha256 = "0ggw90zp40mms4hpphcn1vy1764rbvl2ix45h26v0wkn32cbqn49"; }; makeWrapperArgs = [ diff --git a/pkgs/tools/package-management/nixops/generic.nix b/pkgs/tools/package-management/nixops/generic.nix index 31adac4436c8..bc55f99aa81a 100644 --- a/pkgs/tools/package-management/nixops/generic.nix +++ b/pkgs/tools/package-management/nixops/generic.nix @@ -26,6 +26,7 @@ python2Packages.buildPythonApplication { datadog digital-ocean libvirt + typing ]; doCheck = false; diff --git a/pkgs/tools/package-management/nixops/unstable.nix b/pkgs/tools/package-management/nixops/unstable.nix index 88493d33dd1d..b5487f5b11d2 100644 --- a/pkgs/tools/package-management/nixops/unstable.nix +++ b/pkgs/tools/package-management/nixops/unstable.nix @@ -5,9 +5,9 @@ # Then copy the URL to the tarball. callPackage ./generic.nix (rec { - version = "1.6.1pre2622_f10999a"; + version = "1.6.1pre2706_d5ad09c"; src = fetchurl { - url = "https://hydra.nixos.org/build/73716350/download/2/nixops-${version}.tar.bz2"; - sha256 = "08886b6vxhjc3cp0ikxp920zap7wp6r92763fp785rvxrmb00rbd"; + url = "https://hydra.nixos.org/build/84098258/download/2/nixops-${version}.tar.bz2"; + sha256 = "0lr963a0bjrblv0d1nfl4d0p76jkq6l9xj3vxgzg38q0ld5qw345"; }; }) diff --git a/pkgs/tools/security/fprintd/default.nix b/pkgs/tools/security/fprintd/default.nix index 287fc3e899c0..d0cf2f8091e6 100644 --- a/pkgs/tools/security/fprintd/default.nix +++ b/pkgs/tools/security/fprintd/default.nix @@ -13,7 +13,7 @@ stdenv.mkDerivation rec { buildInputs = [ libfprint glib dbus-glib polkit nss pam systemd ]; nativeBuildInputs = [ pkgconfig intltool ]; - configureFlags = [ "--with-systemdsystemunitdir=$(out)/lib/systemd/system" ]; + configureFlags = [ "--with-systemdsystemunitdir=$(out)/lib/systemd/system" "--localstatedir=/var" ]; meta = with stdenv.lib; { homepage = http://www.freedesktop.org/wiki/Software/fprint/fprintd/; diff --git a/pkgs/tools/security/neopg/default.nix b/pkgs/tools/security/neopg/default.nix index 84c4a68aba0a..7cb442bdf627 100644 --- a/pkgs/tools/security/neopg/default.nix +++ b/pkgs/tools/security/neopg/default.nix @@ -1,5 +1,5 @@ { stdenv -, fetchgit +, fetchFromGitHub , cmake , sqlite , botan2 @@ -12,13 +12,14 @@ stdenv.mkDerivation rec { name = "neopg-${version}"; - version = "0.0.4"; + version = "0.0.5"; - # no fetchFromGitHub, as repo contains submodules - src = fetchgit { - url = "https://github.com/das-labor/neopg.git"; + src = fetchFromGitHub { + owner = "das-labor"; + repo = "neopg"; rev = "v${version}"; - sha256 = "0hhkl326ff6f76k8pwggpzmivbm13fz497nlyy6ybn5bmi9xfblm"; + sha256 = "1ky3pwg6w8kyaa9iksfx6rryva87mbj1h3yi2mrzp2h7jhrfffpp"; + fetchSubmodules = true; }; nativeBuildInputs = [ pkgconfig ]; diff --git a/pkgs/tools/security/nitrokey-app/default.nix b/pkgs/tools/security/nitrokey-app/default.nix index 67e388d5728b..e7f7547e4ad9 100644 --- a/pkgs/tools/security/nitrokey-app/default.nix +++ b/pkgs/tools/security/nitrokey-app/default.nix @@ -1,15 +1,16 @@ -{ stdenv, makeWrapper, bash-completion, cmake, fetchgit, hidapi, libusb1, pkgconfig +{ stdenv, makeWrapper, bash-completion, cmake, fetchFromGitHub, hidapi, libusb1, pkgconfig , qtbase, qttranslations, qtsvg }: stdenv.mkDerivation rec { name = "nitrokey-app-${version}"; - version = "1.3.1"; + version = "1.3.2"; - # We use fetchgit instead of fetchFromGitHub because of necessary git submodules - src = fetchgit { - url = "https://github.com/Nitrokey/nitrokey-app.git"; + src = fetchFromGitHub { + owner = "Nitrokey"; + repo = "nitrokey-app"; rev = "v${version}"; - sha256 = "0zf2f7g5scqd5xfzvmmpvfc7d1w66rf22av0qv6s37875c61j9r9"; + sha256 = "193kzlz3qn9il56h78faiqkgv749hdils1nn1iw6g3wphgx5fjs2"; + fetchSubmodules = true; }; postPatch = '' diff --git a/pkgs/tools/security/sops/default.nix b/pkgs/tools/security/sops/default.nix index a0c183b3a2ee..2db2fddd9a20 100644 --- a/pkgs/tools/security/sops/default.nix +++ b/pkgs/tools/security/sops/default.nix @@ -2,7 +2,7 @@ buildGoPackage rec { name = "sops-${version}"; - version = "3.1.0"; + version = "3.2.0"; goPackagePath = "go.mozilla.org/sops"; @@ -10,7 +10,7 @@ buildGoPackage rec { rev = version; owner = "mozilla"; repo = "sops"; - sha256 = "02s85affgs2991p4akff68myx4h7m3jcly6xihv9g2knml7ixrkj"; + sha256 = "0lzwql3f4n70gmw1d0vnsg7hd0ma6ys0a4x54g3jk10nrn2f7wxl"; }; meta = with stdenv.lib; { diff --git a/pkgs/tools/system/at/default.nix b/pkgs/tools/system/at/default.nix index 1e3bf0c0050c..142d33d359dc 100644 --- a/pkgs/tools/system/at/default.nix +++ b/pkgs/tools/system/at/default.nix @@ -1,4 +1,4 @@ -{ stdenv, fetchurl, fetchpatch, bison, flex, pam +{ stdenv, fetchurl, fetchpatch, bison, flex, pam, perl , sendmailPath ? "/run/wrappers/bin/sendmail" , atWrapperPath ? "/run/wrappers/bin/at" }: @@ -21,7 +21,7 @@ stdenv.mkDerivation rec { }) ]; - nativeBuildInputs = [ bison flex ]; + nativeBuildInputs = [ bison flex perl /* for `prove` (tests) */ ]; buildInputs = [ pam ]; @@ -41,7 +41,7 @@ stdenv.mkDerivation rec { "--with-daemon_groupname=atd" ]; - doCheck = false; # need "prove" tool + doCheck = true; # Ensure that "batch" can invoke the setuid "at" wrapper, if it exists, or # else we get permission errors (on NixOS). "batch" is a shell script, so diff --git a/pkgs/tools/system/bootchart/default.nix b/pkgs/tools/system/bootchart/default.nix index 9cba7df21b7d..9842bd85783a 100644 --- a/pkgs/tools/system/bootchart/default.nix +++ b/pkgs/tools/system/bootchart/default.nix @@ -1,12 +1,14 @@ -{stdenv, fetchurl, pkgconfig, glib, gtk2, python2Packages }: +{stdenv, fetchFromGitHub, pkgconfig, glib, gtk2, python2Packages }: stdenv.mkDerivation rec { - version = "0.14.7"; + version = "0.14.8"; name = "bootchart-${version}"; - src = fetchurl { - url = "https://github.com/mmeeks/bootchart/archive/${version}.tar.gz"; - sha256 = "1abn4amsyys6vwn7csxsxny94n24ycca3xhqxqcmdc4j0dzn3kmb"; + src = fetchFromGitHub { + owner = "mmeeks"; + repo = "bootchart"; + rev = version; + sha256 = "12ja2hp6f49416zfjdx0kjfmlkh9wl9b7wz7gk372kps4gjnypqx"; }; nativeBuildInputs = [ pkgconfig ]; diff --git a/pkgs/tools/system/netdata/default.nix b/pkgs/tools/system/netdata/default.nix index 6f86647f4c70..97a250f79d89 100644 --- a/pkgs/tools/system/netdata/default.nix +++ b/pkgs/tools/system/netdata/default.nix @@ -1,39 +1,42 @@ -{ stdenv, fetchFromGitHub, autoreconfHook, zlib, pkgconfig, libuuid }: +{ stdenv, fetchurl, autoreconfHook, pkgconfig, zlib, libuuid, libossp_uuid, CoreFoundation, IOKit }: stdenv.mkDerivation rec{ - version = "1.10.0"; + version = "1.11.0"; name = "netdata-${version}"; - src = fetchFromGitHub { - rev = "v${version}"; - owner = "firehol"; - repo = "netdata"; - sha256 = "02spfisabjkkgd9fairldlf84n83vbv2xafg0g5jrpfa972pjl9r"; + src = fetchurl { + url = "https://github.com/netdata/netdata/releases/download/v${version}/netdata-v${version}.tar.gz"; + sha256 = "17b14w34jif6bviw3s81imbazkvvafwxff7d5zjy6wicq88q8b64"; }; nativeBuildInputs = [ autoreconfHook pkgconfig ]; - buildInputs = [ zlib libuuid ]; + buildInputs = [ zlib ] + ++ (if stdenv.isDarwin then [ libossp_uuid CoreFoundation IOKit ] else [ libuuid ]); - # Build will fail trying to create /var/{cache,lib,log}/netdata without this - postPatch = '' - sed -i '/dist_.*_DATA = \.keep/d' src/Makefile.am + patches = [ + ./no-files-in-etc-and-var.patch + ]; + + postInstall = stdenv.lib.optionalString (!stdenv.isDarwin) '' + # rename this plugin so netdata will look for setuid wrapper + mv $out/libexec/netdata/plugins.d/apps.plugin \ + $out/libexec/netdata/plugins.d/apps.plugin.org ''; configureFlags = [ "--localstatedir=/var" + "--sysconfdir=/etc" ]; - # App fails on runtime if the default config file is not detected - # The upstream installer does prepare an empty file too - postInstall = '' - touch $out/etc/netdata/netdata.conf + postFixup = '' + rm -r $out/sbin ''; meta = with stdenv.lib; { description = "Real-time performance monitoring tool"; - homepage = http://netdata.firehol.org; + homepage = https://my-netdata.io/; license = licenses.gpl3; - platforms = platforms.linux; + platforms = platforms.unix; maintainers = [ maintainers.lethalman ]; }; diff --git a/pkgs/tools/system/netdata/no-files-in-etc-and-var.patch b/pkgs/tools/system/netdata/no-files-in-etc-and-var.patch new file mode 100644 index 000000000000..bf9b6c19e7c3 --- /dev/null +++ b/pkgs/tools/system/netdata/no-files-in-etc-and-var.patch @@ -0,0 +1,86 @@ +diff -ruN orig/Makefile.am new/Makefile.am +--- orig/Makefile.am 2018-11-02 08:56:21.000000000 -0500 ++++ new/Makefile.am 2018-11-16 10:30:22.000000000 -0500 +@@ -99,10 +99,10 @@ + $(NULL) + + sbin_PROGRAMS = +-dist_cache_DATA = installer/.keep +-dist_varlib_DATA = installer/.keep +-dist_registry_DATA = installer/.keep +-dist_log_DATA = installer/.keep ++dist_cache_DATA = ++dist_varlib_DATA = ++dist_registry_DATA = ++dist_log_DATA = + plugins_PROGRAMS = + + LIBNETDATA_FILES = \ +diff -ruN orig/collectors/charts.d.plugin/Makefile.am new/collectors/charts.d.plugin/Makefile.am +--- orig/collectors/charts.d.plugin/Makefile.am 2018-11-02 08:56:21.000000000 -0500 ++++ new/collectors/charts.d.plugin/Makefile.am 2018-11-16 11:16:47.000000000 -0500 +@@ -32,7 +32,6 @@ + + userchartsconfigdir=$(configdir)/charts.d + dist_userchartsconfig_DATA = \ +- $(top_srcdir)/installer/.keep \ + $(NULL) + + chartsconfigdir=$(libconfigdir)/charts.d +diff -ruN orig/collectors/node.d.plugin/Makefile.am new/collectors/node.d.plugin/Makefile.am +--- orig/collectors/node.d.plugin/Makefile.am 2018-11-02 08:56:21.000000000 -0500 ++++ new/collectors/node.d.plugin/Makefile.am 2018-11-16 11:16:42.000000000 -0500 +@@ -23,7 +23,6 @@ + + usernodeconfigdir=$(configdir)/node.d + dist_usernodeconfig_DATA = \ +- $(top_srcdir)/installer/.keep \ + $(NULL) + + nodeconfigdir=$(libconfigdir)/node.d +diff -ruN orig/collectors/python.d.plugin/Makefile.am new/collectors/python.d.plugin/Makefile.am +--- orig/collectors/python.d.plugin/Makefile.am 2018-11-02 08:56:21.000000000 -0500 ++++ new/collectors/python.d.plugin/Makefile.am 2018-11-16 10:56:06.000000000 -0500 +@@ -29,7 +29,6 @@ + + userpythonconfigdir=$(configdir)/python.d + dist_userpythonconfig_DATA = \ +- $(top_srcdir)/installer/.keep \ + $(NULL) + + pythonconfigdir=$(libconfigdir)/python.d +diff -ruN orig/collectors/statsd.plugin/Makefile.am new/collectors/statsd.plugin/Makefile.am +--- orig/collectors/statsd.plugin/Makefile.am 2018-11-02 08:56:21.000000000 -0500 ++++ new/collectors/statsd.plugin/Makefile.am 2018-11-16 10:53:04.000000000 -0500 +@@ -15,6 +15,5 @@ + + userstatsdconfigdir=$(configdir)/statsd.d + dist_userstatsdconfig_DATA = \ +- $(top_srcdir)/installer/.keep \ + $(NULL) + +diff -ruN orig/health/Makefile.am new/health/Makefile.am +--- orig/health/Makefile.am 2018-11-02 08:56:21.000000000 -0500 ++++ new/health/Makefile.am 2018-11-16 10:56:30.000000000 -0500 +@@ -16,7 +16,6 @@ + + userhealthconfigdir=$(configdir)/health.d + dist_userhealthconfig_DATA = \ +- $(top_srcdir)/installer/.keep \ + $(NULL) + + healthconfigdir=$(libconfigdir)/health.d +diff -ruN orig/system/Makefile.am new/system/Makefile.am +--- orig/system/Makefile.am 2018-11-02 08:56:21.000000000 -0500 ++++ new/system/Makefile.am 2018-11-16 10:29:21.000000000 -0500 +@@ -17,10 +17,6 @@ + include $(top_srcdir)/build/subst.inc + SUFFIXES = .in + +-dist_config_SCRIPTS = \ +- edit-config \ +- $(NULL) +- + nodist_noinst_DATA = \ + netdata-openrc \ + netdata.logrotate \ diff --git a/pkgs/tools/system/stress-ng/default.nix b/pkgs/tools/system/stress-ng/default.nix index 22080db908cc..57f2d60ddf5a 100644 --- a/pkgs/tools/system/stress-ng/default.nix +++ b/pkgs/tools/system/stress-ng/default.nix @@ -1,15 +1,21 @@ -{ stdenv, fetchurl, attr, keyutils }: +{ stdenv, fetchurl +, attr, keyutils, libaio, libapparmor, libbsd, libcap, libgcrypt, lksctp-tools, zlib +}: stdenv.mkDerivation rec { name = "stress-ng-${version}"; - version = "0.06.14"; + version = "0.09.46"; src = fetchurl { - sha256 = "06kycxfwkdrm2vs9xk8cb6c1mki29ymrrqwwxxqx4icnwvq135hv"; - url = "http://kernel.ubuntu.com/~cking/tarballs/stress-ng/${name}.tar.gz"; + url = "http://kernel.ubuntu.com/~cking/tarballs/stress-ng/${name}.tar.xz"; + sha256 = "0m1f46vqixx2mgqdrjwkl8w9did7n99sy96rbcgkkn9g99y59qjm"; }; - buildInputs = [ attr keyutils ]; + # All platforms inputs then Linux-only ones + buildInputs = [ libbsd libgcrypt zlib ] + ++ stdenv.lib.optionals stdenv.hostPlatform.isLinux [ + attr keyutils libaio libapparmor libcap lksctp-tools + ]; patchPhase = '' substituteInPlace Makefile --replace "/usr" "" @@ -36,9 +42,10 @@ stdenv.mkDerivation rec { hardware issues such as thermal overruns as well as operating system bugs that only occur when a system is being thrashed hard. ''; - homepage = http://kernel.ubuntu.com/~cking/stress-ng; + homepage = http://kernel.ubuntu.com/~cking/stress-ng/; downloadPage = http://kernel.ubuntu.com/~cking/tarballs/stress-ng/; license = licenses.gpl2Plus; - platforms = platforms.linux; + maintainers = with maintainers; [ c0bw3b ]; + platforms = platforms.linux; # TODO: fix https://github.com/NixOS/nixpkgs/pull/50506#issuecomment-439635963 }; } diff --git a/pkgs/tools/text/glogg/default.nix b/pkgs/tools/text/glogg/default.nix new file mode 100644 index 000000000000..d61a7d184ea4 --- /dev/null +++ b/pkgs/tools/text/glogg/default.nix @@ -0,0 +1,29 @@ +{ stdenv, fetchurl, qmake, boost }: + +stdenv.mkDerivation rec { + + name = "glogg-${version}"; + version = "1.1.4"; + + src = fetchurl { + url = "https://glogg.bonnefon.org/files/${name}.tar.gz"; + sha256 = "0nwnfk9bcz2k7rf08w2cb6qipzdhwmxznik44jxmn9gwxdrdq78c"; + }; + + nativeBuildInputs = [ qmake ]; + buildInputs = [ boost ]; + + qmakeFlags = [ "glogg.pro" ]; + enableParallelBuilding = true; + + meta = with stdenv.lib; { + description = "The fast, smart log explorer"; + longDescription = '' + A multi-platform GUI application to browse and search through long or complex log files. It is designed with programmers and system administrators in mind. glogg can be seen as a graphical, interactive combination of grep and less. + ''; + homepage = https://glogg.bonnefon.org/; + license = licenses.gpl3Plus; + platforms = platforms.linux; + maintainers = with maintainers; [ c0bw3b ]; + }; +} diff --git a/pkgs/tools/typesetting/rubber/default.nix b/pkgs/tools/typesetting/rubber/default.nix index bbcda05dc801..92c1cc526955 100644 --- a/pkgs/tools/typesetting/rubber/default.nix +++ b/pkgs/tools/typesetting/rubber/default.nix @@ -1,12 +1,12 @@ -{ fetchurl, stdenv, python2Packages, texinfo }: +{ fetchurl, stdenv, python3Packages, texinfo }: -python2Packages.buildPythonApplication rec { +python3Packages.buildPythonApplication rec { name = "rubber-${version}"; - version = "1.4"; + version = "1.5.1"; src = fetchurl { url = "https://launchpad.net/rubber/trunk/${version}/+download/${name}.tar.gz"; - sha256 = "1d7hq19vpb3l31grldbxg8lx1qdd18f5f3gqw96q0lhf58agcjl2"; + sha256 = "178dmrp0mza5gqjiqgk6dqs0c10s0c517pk6k9pjbam86vf47a1p"; }; propagatedBuildInputs = [ texinfo ]; @@ -20,7 +20,7 @@ python2Packages.buildPythonApplication rec { # the check scripts forces python2. If we need to use python3 at some point, we should use # the correct python checkPhase = '' - sed -i 's|python=python2|python=${python2Packages.python.interpreter}|' tests/run.sh + sed -i 's|python=python3|python=${python3Packages.python.interpreter}|' tests/run.sh cd tests && ${stdenv.shell} run.sh ''; diff --git a/pkgs/tools/typesetting/tex/lkproof/default.nix b/pkgs/tools/typesetting/tex/lkproof/default.nix index 844eadc4440d..db0ec6d9bead 100644 --- a/pkgs/tools/typesetting/tex/lkproof/default.nix +++ b/pkgs/tools/typesetting/tex/lkproof/default.nix @@ -2,12 +2,12 @@ stdenv.mkDerivation { name = "lkproof-3.1"; - + src = fetchurl { url = http://mirror.ctan.org/macros/latex/contrib/lkproof.zip; sha256 = "1qjkjhpc4rm62qxn18r83zdlwnj1wvnkcpdiqlv7w4bakh0gvjly"; }; - + buildInputs = [ unzip ]; installPhase = " @@ -15,7 +15,8 @@ stdenv.mkDerivation { cp -prd *.sty $out/share/texmf-nix/tex/generic/lkproof "; - meta = { - platforms = stdenv.lib.platforms.unix; + meta = with stdenv.lib; { + platforms = platforms.unix; + license = licenses.gpl1Plus; }; } diff --git a/pkgs/tools/typesetting/tex/pgf/1.x.nix b/pkgs/tools/typesetting/tex/pgf/1.x.nix index de5ef2abccfb..9215a1e0ac48 100644 --- a/pkgs/tools/typesetting/tex/pgf/1.x.nix +++ b/pkgs/tools/typesetting/tex/pgf/1.x.nix @@ -15,8 +15,9 @@ stdenv.mkDerivation { cp -prd * $out/share/texmf-nix "; - meta = { + meta = with stdenv.lib; { branch = "1"; - platforms = stdenv.lib.platforms.unix; + platforms = platforms.unix; + license = licenses.gpl2; }; } diff --git a/pkgs/tools/typesetting/tex/pgf/2.x.nix b/pkgs/tools/typesetting/tex/pgf/2.x.nix index cb8d2dbdf484..56e50e444081 100644 --- a/pkgs/tools/typesetting/tex/pgf/2.x.nix +++ b/pkgs/tools/typesetting/tex/pgf/2.x.nix @@ -15,8 +15,9 @@ stdenv.mkDerivation { cp -prd * $out/share/texmf-nix "; - meta = { + meta = with stdenv.lib; { branch = "2"; - platforms = stdenv.lib.platforms.unix; + platforms = platforms.unix; + license = licenses.gpl2; }; } diff --git a/pkgs/tools/typesetting/tex/pgf/3.x.nix b/pkgs/tools/typesetting/tex/pgf/3.x.nix index 28225ebf28a6..0835c7c547df 100644 --- a/pkgs/tools/typesetting/tex/pgf/3.x.nix +++ b/pkgs/tools/typesetting/tex/pgf/3.x.nix @@ -24,8 +24,9 @@ stdenv.mkDerivation { cp -prd * $out/share/texmf-nix "; - meta = { + meta = with stdenv.lib; { branch = "3"; - platforms = stdenv.lib.platforms.unix; + platforms = platforms.unix; + license = licenses.gpl2; }; } diff --git a/pkgs/tools/typesetting/tex/pgfplots/default.nix b/pkgs/tools/typesetting/tex/pgfplots/default.nix index 2fe3daee6991..fcdebedb7d87 100644 --- a/pkgs/tools/typesetting/tex/pgfplots/default.nix +++ b/pkgs/tools/typesetting/tex/pgfplots/default.nix @@ -19,7 +19,10 @@ stdenv.mkDerivation { cp -prd * $out/share/texmf-nix "; - meta = { - platforms = stdenv.lib.platforms.unix; + meta = with stdenv.lib; { + description = "TeX package to draw plots directly in TeX in two and three dimensions"; + homepage = http://pgfplots.sourceforge.net; + platforms = platforms.unix; + license = licenses.gpl3Plus; }; } |