diff options
author | Frederik Rietdijk <fridh@fridh.nl> | 2017-05-07 21:36:49 +0200 |
---|---|---|
committer | Frederik Rietdijk <fridh@fridh.nl> | 2017-05-07 21:36:49 +0200 |
commit | 7a61788bc1d535213608a6f8d6b195f9a5519820 (patch) | |
tree | 1ab06737aaabedf09c8b58234e39c0e3efc71d39 /pkgs/tools | |
parent | d4dde073fd9d59f104d295df32f60ad8d56889ea (diff) | |
parent | d316088c5b0b4e7ea27439c62aea60162c9bd0c4 (diff) | |
download | nixlib-7a61788bc1d535213608a6f8d6b195f9a5519820.tar nixlib-7a61788bc1d535213608a6f8d6b195f9a5519820.tar.gz nixlib-7a61788bc1d535213608a6f8d6b195f9a5519820.tar.bz2 nixlib-7a61788bc1d535213608a6f8d6b195f9a5519820.tar.lz nixlib-7a61788bc1d535213608a6f8d6b195f9a5519820.tar.xz nixlib-7a61788bc1d535213608a6f8d6b195f9a5519820.tar.zst nixlib-7a61788bc1d535213608a6f8d6b195f9a5519820.zip |
Merge remote-tracking branch 'upstream/master' into HEAD
Diffstat (limited to 'pkgs/tools')
26 files changed, 363 insertions, 85 deletions
diff --git a/pkgs/tools/admin/tigervnc/default.nix b/pkgs/tools/admin/tigervnc/default.nix index 60d2b2bcd111..3df01dccced8 100644 --- a/pkgs/tools/admin/tigervnc/default.nix +++ b/pkgs/tools/admin/tigervnc/default.nix @@ -1,27 +1,29 @@ -{ stdenv, fetchFromGitHub, xorg -, autoconf, automake, cvs, libtool, nasm, pixman, xkeyboard_config -, fontDirectories, libgcrypt, gnutls, pam, flex, bison, gettext -, cmake, libjpeg_turbo, fltk, nettle, libiconv, libtasn1 -}: +{ stdenv, fetchFromGitHub +, xorg, xkeyboard_config, zlib +, libjpeg_turbo, pixman, fltk +, fontDirectories +, cmake, gettext, libtool +, glproto, mesa_glu +, gnutls, pam, nettle +, xterm }: with stdenv.lib; stdenv.mkDerivation rec { - version = "1.8.0pre20170211"; + version = "1.8.0pre20170419"; name = "tigervnc-${version}"; src = fetchFromGitHub { owner = "TigerVNC"; repo = "tigervnc"; - sha256 = "10bs6394ya953gmak8g2d3n133vyfrryq9zq6dc27g8s6lw0mrbh"; - rev = "b6c46a1a99a402d5d17b1afafc4784ce0958d6ec"; + sha256 = "1y3fn7dwlkm7ilqn8bwyqj3bw7s7clnv7d4jml4wyvfihzz9j90b"; + rev = "v1.7.90"; }; inherit fontDirectories; patchPhase = '' - sed -i -e 's,$(includedir)/pixman-1,${if stdenv ? cross then pixman.crossDrv else pixman}/include/pixman-1,' unix/xserver/hw/vnc/Makefile.am - sed -i -e '/^\$cmd \.= " -pn";/a$cmd .= " -xkbdir ${if stdenv ? cross then xkeyboard_config.crossDrv else xkeyboard_config}/etc/X11/xkb";' unix/vncserver + sed -i -e '/^\$cmd \.= " -pn";/a$cmd .= " -xkbdir ${xkeyboard_config}/etc/X11/xkb";' unix/vncserver fontPath= for i in $fontDirectories; do for j in $(find $i -name fonts.dir); do @@ -67,27 +69,23 @@ stdenv.mkDerivation rec { make TIGERVNC_SRCDIR=`pwd`/../.. install popd rm -f $out/lib/xorg/protocol.txt - ''; - crossAttrs = { - buildInputs = (map (x : x.crossDrv) (buildInputs ++ [ - xorg.fixesproto xorg.damageproto xorg.xcmiscproto xorg.bigreqsproto xorg.randrproto xorg.renderproto - xorg.fontsproto xorg.videoproto xorg.compositeproto xorg.scrnsaverproto xorg.resourceproto - xorg.libxkbfile xorg.libXfont xorg.libpciaccess xorg.xineramaproto - ])); - }; + wrapProgram $out/bin/vncserver \ + --prefix PATH : ${stdenv.lib.makeBinPath (with xorg; [ xterm twm xsetroot ]) } + ''; - buildInputs = - [ xorg.libX11 xorg.libXext gettext xorg.libICE xorg.libXtst xorg.libXi xorg.libSM xorg.libXft - nasm libgcrypt gnutls pam pixman libjpeg_turbo fltk xorg.xineramaproto - xorg.libXinerama xorg.libXcursor nettle libiconv libtasn1 - ]; + buildInputs = with xorg; [ + libjpeg_turbo fltk pixman + gnutls pam nettle + fixesproto damageproto compositeproto randrproto + xcmiscproto bigreqsproto randrproto renderproto + fontsproto videoproto scrnsaverproto resourceproto presentproto + utilmacros libXtst libXext libX11 libXext libICE libXi libSM libXft + libxkbfile libXfont2 libpciaccess xineramaproto + glproto mesa_glu + ] ++ xorgserver.buildInputs; - nativeBuildInputs = - [ autoconf automake cvs xorg.utilmacros xorg.fontutil libtool flex bison - cmake gettext - ] - ++ xorg.xorgserver.nativeBuildInputs; + nativeBuildInputs = [ cmake zlib gettext libtool ] ++ xorg.xorgserver.nativeBuildInputs; propagatedNativeBuildInputs = xorg.xorgserver.propagatedNativeBuildInputs; diff --git a/pkgs/tools/audio/beets/default.nix b/pkgs/tools/audio/beets/default.nix index 69f0d89e7f85..c1418d152dd2 100644 --- a/pkgs/tools/audio/beets/default.nix +++ b/pkgs/tools/audio/beets/default.nix @@ -100,7 +100,7 @@ in pythonPackages.buildPythonApplication rec { ++ optional (enableFetchart || enableEmbyupdate || enableAcousticbrainz) - pythonPackages.requests2 + pythonPackages.requests ++ optional enableConvert ffmpeg ++ optional enableDiscogs pythonPackages.discogs_client ++ optional enableKeyfinder keyfinder-cli diff --git a/pkgs/tools/backup/attic/default.nix b/pkgs/tools/backup/attic/default.nix index d4e8634039a9..abfccb97641c 100644 --- a/pkgs/tools/backup/attic/default.nix +++ b/pkgs/tools/backup/attic/default.nix @@ -1,6 +1,32 @@ -{ stdenv, fetchzip, python3Packages, openssl, acl }: +{ stdenv, fetchzip, python3Packages, openssl, acl, fetchurl, pkgconfig, fuse, attr, which }: -python3Packages.buildPythonApplication rec { +let + + # Old version needed for attic (backup program) due to breaking change in + # llfuse >= 0.42. + llfuse-0-41 = python3Packages.buildPythonPackage rec { + name = "llfuse-0.41.1"; + src = fetchurl { + url = "mirror://pypi/l/llfuse/${name}.tar.bz2"; + sha256 = "1imlqw9b73086y97izr036f58pgc5akv4ihc2rrf8j5h75jbrlaa"; + }; + buildInputs = with python3Packages; [ pytest pkgconfig fuse attr which ]; + propagatedBuildInputs = with python3Packages; [ contextlib2 ]; + checkPhase = '' + py.test + ''; + # FileNotFoundError: [Errno 2] No such file or directory: '/usr/bin' + doCheck = false; + meta = { + description = "Python bindings for the low-level FUSE API"; + homepage = https://code.google.com/p/python-llfuse/; + license = stdenv.lib.licenses.lgpl2Plus; + platforms = stdenv.lib.platforms.unix; + maintainers = with stdenv.lib.maintainers; [ bjornfor ]; + }; + }; + +in python3Packages.buildPythonApplication rec { name = "attic-${version}"; version = "0.16"; namePrefix = ""; diff --git a/pkgs/tools/backup/s3ql/default.nix b/pkgs/tools/backup/s3ql/default.nix index a90738d39a4c..05bf38613efd 100644 --- a/pkgs/tools/backup/s3ql/default.nix +++ b/pkgs/tools/backup/s3ql/default.nix @@ -12,7 +12,7 @@ python3Packages.buildPythonApplication rec { buildInputs = [ which ]; # tests will fail without which propagatedBuildInputs = with python3Packages; [ - sqlite apsw pycrypto requests2 defusedxml dugong llfuse + sqlite apsw pycrypto requests defusedxml dugong llfuse cython pytest pytest-catchlog ]; diff --git a/pkgs/tools/filesystems/irods/common.nix b/pkgs/tools/filesystems/irods/common.nix new file mode 100644 index 000000000000..9c5412ddef7c --- /dev/null +++ b/pkgs/tools/filesystems/irods/common.nix @@ -0,0 +1,57 @@ +{ stdenv, bzip2, zlib, autoconf, automake, cmake, gnumake, help2man , texinfo, libtool , cppzmq , libarchive, avro-cpp, boost, jansson, zeromq, openssl, pam, libiodbc, kerberos, gcc, libcxx, which }: + +# Common attributes of irods packages + +with stdenv; + +{ + enableParallelBuilding = true; + + buildInputs = [ bzip2 zlib autoconf automake cmake gnumake help2man texinfo libtool cppzmq libarchive avro-cpp jansson zeromq openssl pam libiodbc kerberos gcc boost libcxx which ]; + + propagateBuildInputs = [ boost ]; + + cmakeFlags = [ + "-DIRODS_EXTERNALS_FULLPATH_CLANG=${stdenv.cc}" + "-DIRODS_EXTERNALS_FULLPATH_CLANG_RUNTIME=${stdenv.cc}" + "-DIRODS_EXTERNALS_FULLPATH_ARCHIVE=${libarchive.lib}" + "-DIRODS_EXTERNALS_FULLPATH_AVRO=${avro-cpp}" + "-DIRODS_EXTERNALS_FULLPATH_BOOST=${boost}" + "-DIRODS_EXTERNALS_FULLPATH_JANSSON=${jansson}" + "-DIRODS_EXTERNALS_FULLPATH_ZMQ=${zeromq}" + "-DIRODS_EXTERNALS_FULLPATH_CPPZMQ=${cppzmq}" + "-DIRODS_LINUX_DISTRIBUTION_NAME=nix" + "-DIRODS_LINUX_DISTRIBUTION_VERSION_MAJOR=${builtins.nixVersion}" + "-DCPACK_GENERATOR=TGZ" + "-DCMAKE_CXX_FLAGS=-I${libcxx}/include/c++/v1" + ]; + + preConfigure = '' + patchShebangs ./packaging + patchShebangs ./scripts + substituteInPlace CMakeLists.txt --replace "DESTINATION usr/bin" "DESTINATION bin" + substituteInPlace CMakeLists.txt --replace "INCLUDE_DIRS usr/include/" "INCLUDE_DIRS include/" + substituteInPlace CMakeLists.txt --replace "DESTINATION usr/lib/" "DESTINATION lib/" + export cmakeFlags="$cmakeFlags + -DCMAKE_INSTALL_PREFIX=$out + " + ''; + + meta = { + description = "Integrated Rule-Oriented Data System (iRODS)"; + longDescription = '' + The Integrated Rule-Oriented Data System (iRODS) is open source data management + software used by research organizations and government agencies worldwide. + iRODS is released as a production-level distribution aimed at deployment in mission + critical environments. It virtualizes data storage resources, so users can take + control of their data, regardless of where and on what device the data is stored. + As data volumes grow and data services become more complex, iRODS is increasingly + important in data management. The development infrastructure supports exhaustive + testing on supported platforms; plug-in support for microservices, storage resources, + drivers, and databases; and extensive documentation, training and support services.''; + homepage = http://irods.org; + license = stdenv.lib.licenses.bsd3; + maintainers = [ stdenv.lib.maintainers.bzizou ]; + platforms = stdenv.lib.platforms.all; + }; +} diff --git a/pkgs/tools/filesystems/irods/default.nix b/pkgs/tools/filesystems/irods/default.nix new file mode 100644 index 000000000000..72118cada9f1 --- /dev/null +++ b/pkgs/tools/filesystems/irods/default.nix @@ -0,0 +1,84 @@ +{ stdenv, fetchurl, python, bzip2, zlib, autoconf, automake, cmake, gnumake, help2man , texinfo, libtool , cppzmq , libarchive, avro-cpp, boost, jansson, zeromq, openssl , pam, libiodbc, kerberos, gcc, libcxx, which }: + +with stdenv; + +let + common = import ./common.nix { + inherit stdenv bzip2 zlib autoconf automake cmake gnumake + help2man texinfo libtool cppzmq libarchive jansson + zeromq openssl pam libiodbc kerberos gcc libcxx + boost avro-cpp which; + }; +in rec { + + # irods: libs and server package + irods = stdenv.mkDerivation (common // rec { + version = "4.2.0"; + prefix = "irods"; + name = "${prefix}-${version}"; + + src = fetchurl { + url = "https://github.com/irods/irods/releases/download/${version}/irods-${version}.tar.gz"; + sha256 = "b5c0d7209219629da139058ce462a237ecc22ad4dae613413a428961e4ff9d3e"; + }; + + # Patches: + # irods_root_path.patch : the root path is obtained by stripping 3 items of the path, + # but we don't use /usr with nix, so remove only 2 items. + patches = [ ./irods_root_path.patch ]; + + preConfigure = common.preConfigure + '' + patchShebangs ./test + substituteInPlace plugins/database/CMakeLists.txt --replace "COMMAND cpp" "COMMAND ${gcc.cc}/bin/cpp" + substituteInPlace cmake/server.cmake --replace "DESTINATION usr/sbin" "DESTINATION sbin" + substituteInPlace cmake/server.cmake --replace "IRODS_DOC_DIR usr/share" "IRODS_DOC_DIR share" + substituteInPlace cmake/runtime_library.cmake --replace "DESTINATION usr/lib" "DESTINATION lib" + substituteInPlace cmake/development_library.cmake --replace "DESTINATION usr/lib" "DESTINATION lib" + substituteInPlace cmake/development_library.cmake --replace "DESTINATION usr/include" "DESTINATION include" + export cmakeFlags="$cmakeFlags + -DCMAKE_EXE_LINKER_FLAGS=-Wl,-rpath,$out/lib + -DCMAKE_MODULE_LINKER_FLAGS=-Wl,-rpath,$out/lib + -DCMAKE_SHARED_LINKER_FLAGS=-Wl,-rpath,$out/lib + " + ''; + + meta = common.meta // { + longDescription = common.meta.longDescription + '' + This package provides the servers and libraries.''; + }; + }); + + + # icommands (CLI) package, depends on the irods package + irods-icommands = stdenv.mkDerivation (common // rec { + version = "4.2.0"; + name = "irods-icommands-${version}"; + src = fetchurl { + url = "http://github.com/irods/irods_client_icommands/archive/${version}.tar.gz"; + sha256 = "b581067c8139b5ef7897f15fc1fc79f69d2e784a0f36d96e8fa3cb260b6378ce"; + }; + + buildInputs = common.buildInputs ++ [ irods ]; + + propagateBuildInputs = [ boost ]; + + preConfigure = common.preConfigure + '' + patchShebangs ./bin + ''; + + cmakeFlags = common.cmakeFlags ++ [ + "-DCMAKE_INSTALL_PREFIX=${out}" + "-DIRODS_DIR=${irods}/lib/irods/cmake" + "-DCMAKE_EXE_LINKER_FLAGS=-Wl,-rpath,${irods}/lib" + "-DCMAKE_MODULE_LINKER_FLAGS=-Wl,-rpath,${irods}/lib" + "-DCMAKE_SHARED_LINKER_FLAGS=-Wl,-rpath,${irods}/lib" + ]; + + meta = common.meta // { + description = common.meta.description + " CLI clients"; + longDescription = common.meta.longDescription + '' + This package provides the CLI clients, called 'icommands'.''; + }; + }); +} + diff --git a/pkgs/tools/filesystems/irods/irods_root_path.patch b/pkgs/tools/filesystems/irods/irods_root_path.patch new file mode 100644 index 000000000000..c88169ac023f --- /dev/null +++ b/pkgs/tools/filesystems/irods/irods_root_path.patch @@ -0,0 +1,11 @@ +--- a/lib/core/src/irods_default_paths.cpp 2016-10-24 17:09:02.955889536 +0200 ++++ b/lib/core/src/irods_default_paths.cpp 2016-10-24 17:09:43.178722157 +0200 +@@ -18,7 +18,7 @@ + try { + boost::filesystem::path path{dl_info.dli_fname}; + path = boost::filesystem::canonical(path); +- path.remove_filename().remove_filename().remove_filename(); // Removes filename and the two directories (usr and lib) between libirods_common.so and base of irods install ++ path.remove_filename().remove_filename(); // Removes filename and the two directories (usr and lib) between libirods_common.so and base of irods install + return path; + } catch(const boost::filesystem::filesystem_error& e) { + THROW(-1, e.what()); diff --git a/pkgs/tools/graphics/pngquant/default.nix b/pkgs/tools/graphics/pngquant/default.nix index 985b8a1c59d5..3d381bc1b67c 100644 --- a/pkgs/tools/graphics/pngquant/default.nix +++ b/pkgs/tools/graphics/pngquant/default.nix @@ -1,29 +1,23 @@ -{ stdenv, fetchFromGitHub, pkgconfig, libpng, zlib, lcms2 }: +{ stdenv, fetchgit, pkgconfig, libpng, zlib, lcms2 }: stdenv.mkDerivation rec { name = "pngquant-${version}"; - version = "2.6.0"; + version = "2.9.1"; - src = fetchFromGitHub { - owner = "pornel"; - repo = "pngquant"; - rev = version; - sha256 = "0sdh9cz330rhj6xvqk3sdhy0393qwyl349klk9r55g88rjp774s5"; + src = fetchgit { + url = "https://www.github.com/pornel/pngquant.git"; + rev = "refs/tags/${version}"; + sha256 = "0xhnrjsk55jy5q68f81y7l61c6x18i4fzkm3i4dgndrhri5g4n1q"; + fetchSubmodules = true; }; - preConfigure = "patchShebangs ."; - buildInputs = [ pkgconfig libpng zlib lcms2 ]; - preInstall = '' - mkdir -p $out/bin - export PREFIX=$out - ''; - meta = with stdenv.lib; { homepage = https://pngquant.org/; description = "A tool to convert 24/32-bit RGBA PNGs to 8-bit palette with alpha channel preserved"; platforms = platforms.linux; - license = licenses.bsd2; # Not exactly bsd2, but alike + license = licenses.gpl3; + maintainers = [ maintainers.volth ]; }; } diff --git a/pkgs/tools/misc/asciinema/default.nix b/pkgs/tools/misc/asciinema/default.nix index 4b228efee9e1..4d6e90a347e7 100644 --- a/pkgs/tools/misc/asciinema/default.nix +++ b/pkgs/tools/misc/asciinema/default.nix @@ -7,7 +7,7 @@ in pythonPackages.buildPythonApplication rec { version = "1.4.0"; buildInputs = with pythonPackages; [ nose ]; - propagatedBuildInputs = with pythonPackages; [ requests2 ]; + propagatedBuildInputs = with pythonPackages; [ requests ]; src = fetchFromGitHub { owner = "asciinema"; diff --git a/pkgs/tools/misc/graylog/default.nix b/pkgs/tools/misc/graylog/default.nix index da7af7ef66f6..b1f3cff0839e 100644 --- a/pkgs/tools/misc/graylog/default.nix +++ b/pkgs/tools/misc/graylog/default.nix @@ -1,12 +1,12 @@ { stdenv, fetchurl }: stdenv.mkDerivation rec { - version = "2.2.2"; + version = "2.2.3"; name = "graylog-${version}"; src = fetchurl { url = "https://packages.graylog2.org/releases/graylog/graylog-${version}.tgz"; - sha256 = "1d6fbyc9m2dkmlv03w3b1n8vq6sga888ag1k55mq3rgn4ba1kx26"; + sha256 = "02x8brzlyx7qpxb1pgs74iv1gdykvs7cihff0rzjmh7bp1y1xq1x"; }; dontBuild = true; diff --git a/pkgs/tools/misc/kargo/default.nix b/pkgs/tools/misc/kargo/default.nix index 734d8fb78e23..4c390f1e80e2 100644 --- a/pkgs/tools/misc/kargo/default.nix +++ b/pkgs/tools/misc/kargo/default.nix @@ -20,7 +20,7 @@ python2Packages.buildPythonApplication rec { markupsafe netaddr pyasn1 - requests2 + requests setuptools ]; diff --git a/pkgs/tools/misc/svtplay-dl/default.nix b/pkgs/tools/misc/svtplay-dl/default.nix index a2d6caa15352..8d65f253c9b4 100644 --- a/pkgs/tools/misc/svtplay-dl/default.nix +++ b/pkgs/tools/misc/svtplay-dl/default.nix @@ -2,7 +2,7 @@ , rtmpdump, substituteAll }: let - inherit (pythonPackages) python nose pycrypto requests2 mock; + inherit (pythonPackages) python nose pycrypto requests mock; in stdenv.mkDerivation rec { name = "svtplay-dl-${version}"; version = "1.9.3"; @@ -14,7 +14,7 @@ in stdenv.mkDerivation rec { sha256 = "14qksi1svi89niffykxg47kay013byls6bnhkrkzkanq04075lmw"; }; - pythonPaths = [ pycrypto requests2 ]; + pythonPaths = [ pycrypto requests ]; buildInputs = [ python perl nose mock rtmpdump makeWrapper ] ++ pythonPaths; nativeBuildInputs = [ zip ]; diff --git a/pkgs/tools/misc/system-config-printer/default.nix b/pkgs/tools/misc/system-config-printer/default.nix index 0d66ef66b485..04aa838270cd 100644 --- a/pkgs/tools/misc/system-config-printer/default.nix +++ b/pkgs/tools/misc/system-config-printer/default.nix @@ -29,7 +29,7 @@ stdenv.mkDerivation rec { nativeBuildInputs = [ wrapGAppsHook ]; pythonPath = with pythonPackages; - [ pycups pycurl dbus-python pygobject3 requests2 pycairo pythonPackages.pycurl ]; + [ pycups pycurl dbus-python pygobject3 requests pycairo pythonPackages.pycurl ]; configureFlags = [ "--with-udev-rules" diff --git a/pkgs/tools/misc/vdirsyncer/default.nix b/pkgs/tools/misc/vdirsyncer/default.nix index d1fa9d5bea6d..731a194cc6a2 100644 --- a/pkgs/tools/misc/vdirsyncer/default.nix +++ b/pkgs/tools/misc/vdirsyncer/default.nix @@ -17,7 +17,7 @@ pythonPackages.buildPythonApplication rec { propagatedBuildInputs = with pythonPackages; [ click click-log click-threading requests_toolbelt - requests2 + requests atomicwrites ]; diff --git a/pkgs/tools/misc/winusb/default.nix b/pkgs/tools/misc/winusb/default.nix new file mode 100644 index 000000000000..b99d77dd70fc --- /dev/null +++ b/pkgs/tools/misc/winusb/default.nix @@ -0,0 +1,35 @@ +{ stdenv, fetchFromGitHub, makeWrapper +, parted, grub2_light, p7zip +, wxGTK30, gksu }: + +stdenv.mkDerivation rec { + name = "winusb-unstable-2017-01-30"; + + src = fetchFromGitHub { + owner = "slacka"; + repo = "WinUSB"; + rev = "599f00cdfd5c931056c576e4b2ae04d9285c4192"; + sha256 = "1219425d1m4463jy85nrc5xz5qy5m8svidbiwnqicy7hp8pdwa7x"; + }; + + buildInputs = [ wxGTK30 makeWrapper ]; + + postInstall = '' + # don't write data into / + substituteInPlace $out/bin/winusb \ + --replace /media/ /tmp/winusb/ + + wrapProgram $out/bin/winusb \ + --prefix PATH : ${stdenv.lib.makeBinPath [ parted grub2_light p7zip ]} + wrapProgram $out/bin/winusbgui \ + --prefix PATH : ${stdenv.lib.makeBinPath [ gksu ]} + ''; + + meta = with stdenv.lib; { + description = "Create bootable USB disks from Windows ISO images"; + homepage = https://github.com/slacka/WinUSB; + license = licenses.gpl3; + maintainers = with maintainers; [ bjornfor gnidorah ]; + platforms = platforms.linux; + }; +} diff --git a/pkgs/tools/networking/dd-agent/default.nix b/pkgs/tools/networking/dd-agent/default.nix index e9a70b17130c..d1171a3c8355 100644 --- a/pkgs/tools/networking/dd-agent/default.nix +++ b/pkgs/tools/networking/dd-agent/default.nix @@ -15,7 +15,7 @@ let propagatedBuildInputs = with pythonPackages; [ six - requests2 + requests websocket_client ipaddress backports_ssl_match_hostname @@ -42,7 +42,7 @@ in stdenv.mkDerivation rec { python unzip makeWrapper - pythonPackages.requests2 + pythonPackages.requests pythonPackages.psycopg2 pythonPackages.psutil pythonPackages.ntplib diff --git a/pkgs/tools/networking/httpie/default.nix b/pkgs/tools/networking/httpie/default.nix index 09200f40c934..84420aa3efb0 100644 --- a/pkgs/tools/networking/httpie/default.nix +++ b/pkgs/tools/networking/httpie/default.nix @@ -9,7 +9,7 @@ pythonPackages.buildPythonApplication rec { sha256 = "1jsgfkyzzizgfy1b0aicb4cp34d5pwskz9c4a8kf4rq3lrpjw87i"; }; - propagatedBuildInputs = with pythonPackages; [ pygments requests2 ]; + propagatedBuildInputs = with pythonPackages; [ pygments requests ]; doCheck = false; diff --git a/pkgs/tools/networking/linkchecker/default.nix b/pkgs/tools/networking/linkchecker/default.nix index d6906fdc554f..78bdea475c4b 100644 --- a/pkgs/tools/networking/linkchecker/default.nix +++ b/pkgs/tools/networking/linkchecker/default.nix @@ -5,7 +5,7 @@ python2Packages.buildPythonApplication rec { version = "9.3"; buildInputs = with python2Packages ; [ pytest ]; - propagatedBuildInputs = with python2Packages ; [ requests2 ] ++ [ gettext ]; + propagatedBuildInputs = with python2Packages ; [ requests ] ++ [ gettext ]; src = fetchurl { url = "mirror://pypi/L/LinkChecker/${name}.tar.gz"; @@ -13,7 +13,7 @@ python2Packages.buildPythonApplication rec { }; # 1. upstream refuses to support ignoring robots.txt - # 2. work around requests2 version detection - can be dropped >v9.3 + # 2. work around requests version detection - can be dropped >v9.3 patches = [ ./add-no-robots-flag.patch ./no-version-check.patch diff --git a/pkgs/tools/networking/mitmproxy/default.nix b/pkgs/tools/networking/mitmproxy/default.nix index dcdcf9b734c0..83a526a5535c 100644 --- a/pkgs/tools/networking/mitmproxy/default.nix +++ b/pkgs/tools/networking/mitmproxy/default.nix @@ -16,7 +16,7 @@ python3Packages.buildPythonPackage rec { blinker click certifi construct cryptography cssutils editorconfig h2 html2text hyperframe jsbeautifier kaitaistruct passlib pyasn1 pyopenssl - pyparsing pyperclip requests2 ruamel_yaml tornado + pyparsing pyperclip requests ruamel_yaml tornado urwid watchdog brotlipy sortedcontainers ]; diff --git a/pkgs/tools/networking/reaver-wps-t6x/default.nix b/pkgs/tools/networking/reaver-wps-t6x/default.nix index 59d2b04786da..6e4a5561f07a 100644 --- a/pkgs/tools/networking/reaver-wps-t6x/default.nix +++ b/pkgs/tools/networking/reaver-wps-t6x/default.nix @@ -1,8 +1,9 @@ -{ stdenv, fetchFromGitHub, libpcap, sqlite, pixiewps }: +{ stdenv, fetchFromGitHub, libpcap, sqlite, pixiewps, makeWrapper }: stdenv.mkDerivation rec { version = "1.5.2"; name = "reaver-wps-t6x-${version}"; + confdir = "/var/db/${name}"; # the sqlite database is at "${confdir}/reaver/reaver.db" src = fetchFromGitHub { owner = "t6x"; @@ -11,17 +12,27 @@ stdenv.mkDerivation rec { sha256 = "0zhlms89ncqz1f1hc22yw9x1s837yv76f1zcjizhgn5h7vp17j4b"; }; + nativeBuildInputs = [ makeWrapper ]; buildInputs = [ libpcap sqlite pixiewps ]; - prePatch = "cd src"; + sourceRoot = "reaver-wps-fork-t6x-v${version}-src/src"; - preInstall = "mkdir -p $out/bin"; + configureFlags = "--sysconfdir=${confdir}"; - meta = { + installPhase = '' + mkdir -p $out/{bin,etc} + cp reaver.db $out/etc/ + cp reaver wash $out/bin/ + + wrapProgram $out/bin/reaver --run "[ -s ${confdir}/reaver/reaver.db ] || install -D $out/etc/reaver.db ${confdir}/reaver/reaver.db" + wrapProgram $out/bin/wash --run "[ -s ${confdir}/reaver/reaver.db ] || install -D $out/etc/reaver.db ${confdir}/reaver/reaver.db" + ''; + + meta = with stdenv.lib; { description = "Online and offline brute force attack against WPS"; homepage = https://github.com/t6x/reaver-wps-fork-t6x; - license = stdenv.lib.licenses.gpl2Plus; - platforms = stdenv.lib.platforms.linux; - maintainer = stdenv.lib.maintainers.nico202; + license = licenses.gpl2Plus; + platforms = platforms.linux; + maintainers = with maintainers; [ nico202 volth ]; }; } diff --git a/pkgs/tools/networking/reaver-wps/default.nix b/pkgs/tools/networking/reaver-wps/default.nix index 9efe3df75201..c9bd3fbaa853 100644 --- a/pkgs/tools/networking/reaver-wps/default.nix +++ b/pkgs/tools/networking/reaver-wps/default.nix @@ -1,27 +1,36 @@ -{ stdenv, fetchurl, libpcap, sqlite }: +{ stdenv, fetchurl, libpcap, sqlite, makeWrapper }: stdenv.mkDerivation rec { - name = "reaver-wps-1.4"; + version = "1.4"; + name = "reaver-wps-${version}"; + confdir = "/var/db/${name}"; # the sqlite database is at "${confdir}/reaver/reaver.db" src = fetchurl { - url = http://reaver-wps.googlecode.com/files/reaver-1.4.tar.gz; + url = "https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/reaver-wps/reaver-${version}.tar.gz"; sha256 = "0bdjai4p8xbsw8zdkkk43rgsif79x0nyx4djpyv0mzh59850blxd"; }; + nativeBuildInputs = [ makeWrapper ]; buildInputs = [ libpcap sqlite ]; - prePatch = '' - cd src - ''; + sourceRoot = "reaver-${version}/src"; + + configureFlags = "--sysconfdir=${confdir}"; + + installPhase = '' + mkdir -p $out/{bin,etc} + cp reaver.db $out/etc/ + cp reaver wash $out/bin/ - preInstall = '' - mkdir -p $out/bin + wrapProgram $out/bin/reaver --run "[ -s ${confdir}/reaver/reaver.db ] || install -D $out/etc/reaver.db ${confdir}/reaver/reaver.db" + wrapProgram $out/bin/wash --run "[ -s ${confdir}/reaver/reaver.db ] || install -D $out/etc/reaver.db ${confdir}/reaver/reaver.db" ''; - meta = { + meta = with stdenv.lib; { description = "Brute force attack against Wifi Protected Setup"; homepage = http://code.google.com/p/reaver-wps; - license = stdenv.lib.licenses.gpl2Plus; - platforms = stdenv.lib.platforms.linux; + license = licenses.gpl2Plus; + platforms = platforms.linux; + maintainers = with maintainers; [ nico202 volth ]; }; } diff --git a/pkgs/tools/networking/urlwatch/default.nix b/pkgs/tools/networking/urlwatch/default.nix index c1b19f745a3f..8161f700ce18 100644 --- a/pkgs/tools/networking/urlwatch/default.nix +++ b/pkgs/tools/networking/urlwatch/default.nix @@ -15,7 +15,7 @@ python3Packages.buildPythonApplication rec { keyring minidb pyyaml - requests2 + requests ]; meta = with stdenv.lib; { diff --git a/pkgs/tools/package-management/nox/default.nix b/pkgs/tools/package-management/nox/default.nix index 1184c0194bc7..bba7c3d7fa69 100644 --- a/pkgs/tools/package-management/nox/default.nix +++ b/pkgs/tools/package-management/nox/default.nix @@ -15,7 +15,7 @@ pythonPackages.buildPythonApplication rec { propagatedBuildInputs = with pythonPackages; [ dogpile_cache click - requests2 + requests characteristic ]; diff --git a/pkgs/tools/security/pass/default.nix b/pkgs/tools/security/pass/default.nix index 83394d984ad7..baa53492d3ee 100644 --- a/pkgs/tools/security/pass/default.nix +++ b/pkgs/tools/security/pass/default.nix @@ -13,15 +13,15 @@ assert x11Support -> xclip != null && dmenu != null; stdenv.mkDerivation rec { - version = "1.7"; + version = "1.7.1"; name = "password-store-${version}"; src = fetchurl { url = "http://git.zx2c4.com/password-store/snapshot/${name}.tar.xz"; - sha256 = "002mw7j0m33bw483rllzhcf41wp3ixka8yma6kqrfaj57jyw66hn"; + sha256 = "0scqkpll2q8jhzcgcsh9kqz0gwdpvynivqjmmbzax2irjfaiklpn"; }; - patches = [ ./set-correct-program-name-for-sleep.patch + patches = [ ./set-correct-program-name-for-sleep.patch ] ++ stdenv.lib.optional stdenv.isDarwin ./no-darwin-getopt.patch; nativeBuildInputs = [ makeWrapper ]; diff --git a/pkgs/tools/security/vulnix/default.nix b/pkgs/tools/security/vulnix/default.nix index 55defd680909..a058c2ee1a87 100644 --- a/pkgs/tools/security/vulnix/default.nix +++ b/pkgs/tools/security/vulnix/default.nix @@ -27,7 +27,7 @@ in pythonPackages.buildPythonApplication rec{ colorama lxml pyyaml - requests2 + requests external.zodb ]); diff --git a/pkgs/tools/system/socklog/default.nix b/pkgs/tools/system/socklog/default.nix new file mode 100644 index 000000000000..e0adad4eff85 --- /dev/null +++ b/pkgs/tools/system/socklog/default.nix @@ -0,0 +1,53 @@ +{ stdenv, fetchurl }: + +with stdenv.lib; + +stdenv.mkDerivation rec { + name = "socklog-${version}"; + version = "2.1.0"; + + src = fetchurl { + url = "http://smarden.org/socklog/socklog-${version}.tar.gz"; + sha256 = "0mdlmhiq2j2fip7c4l669ams85yc3c1s1d89am7dl170grw9m1ma"; + }; + + sourceRoot = "admin/socklog-${version}"; + + outputs = [ "out" "man" "doc" ]; + + configurePhase = '' + echo "$NIX_CC/bin/cc $NIX_CFLAGS_COMPILE" >src/conf-cc + echo "$NIX_CC/bin/cc -s" >src/conf-ld + ''; + + buildPhase = ''package/compile''; + + installPhase = '' + runHook preInstall + + mkdir -p $out/bin + mv command"/"* $out/bin + + for i in {1,8} ; do + mkdir -p $man/share/man/man$i + mv man"/"*.$i $man/share/man/man$i + done + + mkdir -p $doc/share/socklog/html + mv doc"/"*.html $doc/share/socklog/html/ + + runHook postInstall + ''; + + checkPhase = ''package/check''; + + doCheck = true; + + meta = { + description = "System and kernel logging services"; + homepage = http://smarden.org/socklog/; + license = licenses.publicDomain; + platforms = platforms.unix; + maintainers = [ maintainers.joachifm ]; + }; +} |