diff options
Diffstat (limited to 'pkgs/servers')
-rw-r--r-- | pkgs/servers/clickhouse/default.nix | 4 | ||||
-rw-r--r-- | pkgs/servers/computing/slurm/default.nix | 5 | ||||
-rw-r--r-- | pkgs/servers/gotify/default.nix | 4 | ||||
-rw-r--r-- | pkgs/servers/gotify/ui.nix | 4 | ||||
-rw-r--r-- | pkgs/servers/gotify/yarndeps.nix | 8 | ||||
-rw-r--r-- | pkgs/servers/http/apache-modules/mod_wsgi/default.nix | 4 | ||||
-rw-r--r-- | pkgs/servers/mail/dovecot/default.nix | 4 | ||||
-rw-r--r-- | pkgs/servers/mail/rspamd/default.nix | 4 | ||||
-rw-r--r-- | pkgs/servers/mautrix-whatsapp/default.nix | 8 | ||||
-rw-r--r-- | pkgs/servers/mlflow-server/default.nix | 37 | ||||
-rw-r--r-- | pkgs/servers/monitoring/grafana/default.nix | 6 | ||||
-rw-r--r-- | pkgs/servers/plex/raw.nix | 4 | ||||
-rw-r--r-- | pkgs/servers/roundcube/default.nix | 4 | ||||
-rw-r--r-- | pkgs/servers/sql/mariadb/default.nix | 16 | ||||
-rw-r--r-- | pkgs/servers/sql/postgresql/default.nix | 20 | ||||
-rw-r--r-- | pkgs/servers/sql/postgresql/ext/cstore_fdw.nix | 4 | ||||
-rw-r--r-- | pkgs/servers/sql/postgresql/ext/pg_auto_failover.nix | 4 | ||||
-rw-r--r-- | pkgs/servers/tang/default.nix | 32 | ||||
-rw-r--r-- | pkgs/servers/web-apps/jirafeau/default.nix | 34 |
19 files changed, 159 insertions, 47 deletions
diff --git a/pkgs/servers/clickhouse/default.nix b/pkgs/servers/clickhouse/default.nix index 4c586efe1778..90cdfc3e7051 100644 --- a/pkgs/servers/clickhouse/default.nix +++ b/pkgs/servers/clickhouse/default.nix @@ -7,13 +7,13 @@ stdenv.mkDerivation rec { pname = "clickhouse"; - version = "19.13.6.51"; + version = "19.17.8.54"; src = fetchFromGitHub { owner = "yandex"; repo = "ClickHouse"; rev = "v${version}-stable"; - sha256 = "0mcwfam1nrs2g54syw7vvpfkjn3l4gfzvla7xbg92lr03fn6kbn2"; + sha256 = "0ck6kcifj7y4i2j1jj1a9vf5nfpp9mxk5x8y8557zp9yayjm9qyr"; }; nativeBuildInputs = [ cmake libtool ninja ]; diff --git a/pkgs/servers/computing/slurm/default.nix b/pkgs/servers/computing/slurm/default.nix index 637ac0607db1..18ef3bf3fa55 100644 --- a/pkgs/servers/computing/slurm/default.nix +++ b/pkgs/servers/computing/slurm/default.nix @@ -1,7 +1,7 @@ { stdenv, fetchFromGitHub, pkgconfig, libtool, curl , python, munge, perl, pam, openssl, zlib , ncurses, libmysqlclient, gtk2, lua, hwloc, numactl -, readline, freeipmi, libssh2, xorg, lz4 +, readline, freeipmi, libssh2, xorg, lz4, rdma-core # enable internal X11 support via libssh2 , enableX11 ? true }: @@ -35,7 +35,7 @@ stdenv.mkDerivation rec { nativeBuildInputs = [ pkgconfig libtool ]; buildInputs = [ curl python munge perl pam openssl zlib - libmysqlclient ncurses gtk2 lz4 + libmysqlclient ncurses gtk2 lz4 rdma-core lua hwloc numactl readline freeipmi ] ++ stdenv.lib.optionals enableX11 [ libssh2 xorg.xauth ]; @@ -46,6 +46,7 @@ stdenv.mkDerivation rec { "--with-munge=${munge}" "--with-ssl=${openssl.dev}" "--with-zlib=${zlib}" + "--with-ofed=${rdma-core}" "--sysconfdir=/etc/slurm" ] ++ (optional (gtk2 == null) "--disable-gtktest") ++ (optional enableX11 "--with-libssh2=${libssh2.dev}") diff --git a/pkgs/servers/gotify/default.nix b/pkgs/servers/gotify/default.nix index 9782b2890550..f2014aac9fdc 100644 --- a/pkgs/servers/gotify/default.nix +++ b/pkgs/servers/gotify/default.nix @@ -12,13 +12,13 @@ buildGoModule rec { pname = "gotify-server"; # Note that when this is updated, along with the hash, the `ui.nix` file # should include the same changes to the version and the sha256. - version = "2.0.13"; + version = "2.0.14"; src = fetchFromGitHub { owner = "gotify"; repo = "server"; rev = "v${version}"; - sha256 = "11ycs1ci1z8wm4fjgk4454kgszr4s8q9dc96pl77yvlngi4dk46d"; + sha256 = "0hyy9fki2626cgd78l7fkk67lik6g1pkcpf6xr3gl07dxwcclyr8"; }; modSha256 = "1awhbc8qs2bwv6y2vwd92r4ys0l1bzymrb36iamr040x961682wv"; diff --git a/pkgs/servers/gotify/ui.nix b/pkgs/servers/gotify/ui.nix index 2c1bddec68f6..403f01c2a856 100644 --- a/pkgs/servers/gotify/ui.nix +++ b/pkgs/servers/gotify/ui.nix @@ -8,13 +8,13 @@ yarn2nix-moretea.mkYarnPackage rec { packageJSON = ./package.json; yarnNix = ./yarndeps.nix; - version = "2.0.13"; + version = "2.0.14"; src_all = fetchFromGitHub { owner = "gotify"; repo = "server"; rev = "v${version}"; - sha256 = "11ycs1ci1z8wm4fjgk4454kgszr4s8q9dc96pl77yvlngi4dk46d"; + sha256 = "0hyy9fki2626cgd78l7fkk67lik6g1pkcpf6xr3gl07dxwcclyr8"; }; src = "${src_all}/ui"; diff --git a/pkgs/servers/gotify/yarndeps.nix b/pkgs/servers/gotify/yarndeps.nix index 0e81e890a9fe..3f74ad74ccc2 100644 --- a/pkgs/servers/gotify/yarndeps.nix +++ b/pkgs/servers/gotify/yarndeps.nix @@ -1234,11 +1234,11 @@ }; } { - name = "_types_notifyjs___notifyjs_3.0.0.tgz"; + name = "_types_notifyjs___notifyjs_3.0.1.tgz"; path = fetchurl { - name = "_types_notifyjs___notifyjs_3.0.0.tgz"; - url = "https://registry.yarnpkg.com/@types/notifyjs/-/notifyjs-3.0.0.tgz"; - sha1 = "a57126a90be2827d511d00a0615816cd5ca8a740"; + name = "_types_notifyjs___notifyjs_3.0.1.tgz"; + url = "https://registry.yarnpkg.com/@types/notifyjs/-/notifyjs-3.0.1.tgz"; + sha1 = "eba3bec10e44309df4aba31a73bfd26a562bc755"; }; } { diff --git a/pkgs/servers/http/apache-modules/mod_wsgi/default.nix b/pkgs/servers/http/apache-modules/mod_wsgi/default.nix index c0e4cefa40a5..0e4804c1a39a 100644 --- a/pkgs/servers/http/apache-modules/mod_wsgi/default.nix +++ b/pkgs/servers/http/apache-modules/mod_wsgi/default.nix @@ -2,11 +2,11 @@ stdenv.mkDerivation rec { pname = "mod_wsgi"; - version = "4.7.0"; + version = "4.7.1"; src = fetchurl { url = "https://github.com/GrahamDumpleton/mod_wsgi/archive/${version}.tar.gz"; - sha256 = "079f4py20jd6n3d7djak5l9j8p6hfq96lf577iir6qpfsk2p0k3n"; + sha256 = "0dbxhrp3x689ccrhvm2lw2icmmj8i4p86z2lq3xn1zlsf43fax16"; }; buildInputs = [ apacheHttpd python ncurses ]; diff --git a/pkgs/servers/mail/dovecot/default.nix b/pkgs/servers/mail/dovecot/default.nix index 3aff9f53ce74..12da51f9f239 100644 --- a/pkgs/servers/mail/dovecot/default.nix +++ b/pkgs/servers/mail/dovecot/default.nix @@ -9,7 +9,7 @@ }: stdenv.mkDerivation rec { - name = "dovecot-2.3.9.2"; + name = "dovecot-2.3.9.3"; nativeBuildInputs = [ perl pkgconfig ]; buildInputs = @@ -21,7 +21,7 @@ stdenv.mkDerivation rec { src = fetchurl { url = "https://dovecot.org/releases/2.3/${name}.tar.gz"; - sha256 = "1yc6hi4hqg4hcc4495sf4m5f1lnargphi6dawj43if21vncgp127"; + sha256 = "0lcnqib63nv32xr3nr4s3x8k77mbgrhc13swjl2xqnzw4fabd7zq"; }; enableParallelBuilding = true; diff --git a/pkgs/servers/mail/rspamd/default.nix b/pkgs/servers/mail/rspamd/default.nix index 3d04d35a3c51..15a651d8a321 100644 --- a/pkgs/servers/mail/rspamd/default.nix +++ b/pkgs/servers/mail/rspamd/default.nix @@ -10,13 +10,13 @@ assert withHyperscan -> stdenv.isx86_64; stdenv.mkDerivation rec { pname = "rspamd"; - version = "2.2"; + version = "2.3"; src = fetchFromGitHub { owner = "rspamd"; repo = "rspamd"; rev = version; - sha256 = "0rqiz4xm20w80q8p4grcgqcrg14yiddsay0aw00f0v82h4apw7k8"; + sha256 = "1v4kbvj9r0hs8jaisq3fr0rg0qndpbhc5h8cbpfpprmkbw4nj6pf"; }; nativeBuildInputs = [ cmake pkgconfig perl ]; diff --git a/pkgs/servers/mautrix-whatsapp/default.nix b/pkgs/servers/mautrix-whatsapp/default.nix index bb72ce1b45fd..578f125ee2b5 100644 --- a/pkgs/servers/mautrix-whatsapp/default.nix +++ b/pkgs/servers/mautrix-whatsapp/default.nix @@ -2,16 +2,16 @@ buildGoModule { pname = "mautrix-whatsapp-unstable"; - version = "2020-01-12"; + version = "2020-02-09"; src = fetchFromGitHub { owner = "tulir"; repo = "mautrix-whatsapp"; - rev = "39e46833b471b0cf262d4ff57fcd61530b5d2b9e"; - sha256 = "1r1f52advibb97vrhi2gw0d0scnsvfbmfqizsbpjmgm7ci9jjhcl"; + rev = "260555b69ccd20f247405e4d8cab3d49fabda070"; + sha256 = "1ykhwrp8bvhzzw4lg4m1w430ybgzd0zqgrs4jrvfd1m0als2iff7"; }; - modSha256 = "18bcv7x49bqnzwhafh8fvyv9z2d4j6w0iyqql0alq57hy7h7lxik"; + modSha256 = "0ypj79rjwj5bls6aq2cz0d034dnv1sddl43iz51b4fl2bfv0drm9"; meta = with stdenv.lib; { homepage = https://github.com/tulir/mautrix-whatsapp; diff --git a/pkgs/servers/mlflow-server/default.nix b/pkgs/servers/mlflow-server/default.nix new file mode 100644 index 000000000000..eb99fffeb169 --- /dev/null +++ b/pkgs/servers/mlflow-server/default.nix @@ -0,0 +1,37 @@ +{lib, python3, writeText}: + +let + py = python3.pkgs; +in +py.toPythonApplication + (py.mlflow.overridePythonAttrs(old: rec { + pname = "mlflow-server"; + + propagatedBuildInputs = old.propagatedBuildInputs ++ [ + py.boto3 + py.mysqlclient + ]; + + postPatch = '' + substituteInPlace mlflow/utils/process.py --replace \ + "child = subprocess.Popen(cmd, env=cmd_env, cwd=cwd, universal_newlines=True," \ + "cmd[0]='$out/bin/gunicornMlflow'; child = subprocess.Popen(cmd, env=cmd_env, cwd=cwd, universal_newlines=True," + ''; + + gunicornScript = writeText "gunicornMlflow" + '' + #!/usr/bin/env python + import re + import sys + from gunicorn.app.wsgiapp import run + if __name__ == '__main__': + sys.argv[0] = re.sub(r'(-script\.pyw|\.exe)?$', ''', sys.argv[0]) + sys.exit(run()) + ''; + + postInstall = '' + gpath=$out/bin/gunicornMlflow + cp ${gunicornScript} $gpath + chmod 555 $gpath + ''; +})) \ No newline at end of file diff --git a/pkgs/servers/monitoring/grafana/default.nix b/pkgs/servers/monitoring/grafana/default.nix index 427d3d1d42e7..cbb13074afc8 100644 --- a/pkgs/servers/monitoring/grafana/default.nix +++ b/pkgs/servers/monitoring/grafana/default.nix @@ -2,7 +2,7 @@ buildGoPackage rec { pname = "grafana"; - version = "6.6.1"; + version = "6.6.2"; goPackagePath = "github.com/grafana/grafana"; @@ -12,12 +12,12 @@ buildGoPackage rec { rev = "v${version}"; owner = "grafana"; repo = "grafana"; - sha256 = "0yw7yq201f5c3dzy51jaa2mgn0bdh69341a7r9hz9bxpb21w0zq9"; + sha256 = "0zbc9jcr3w7rwsv96csqaifn5d0b435wyrrajr5wzsmhljygvrcy"; }; srcStatic = fetchurl { url = "https://dl.grafana.com/oss/release/grafana-${version}.linux-amd64.tar.gz"; - sha256 = "0xrkaiz3kl1avq040xyyal35rkf2mg6s2y0wggmndvsnwc3q5p0f"; + sha256 = "1plijm7cy92k79ypcnxjmdf2vhlxa4dzwjyl9lkf2npm7kswswsl"; }; postPatch = '' diff --git a/pkgs/servers/plex/raw.nix b/pkgs/servers/plex/raw.nix index 380e5bb4be51..24422842e355 100644 --- a/pkgs/servers/plex/raw.nix +++ b/pkgs/servers/plex/raw.nix @@ -8,13 +8,13 @@ # server, and the FHS userenv and corresponding NixOS module should # automatically pick up the changes. stdenv.mkDerivation rec { - version = "1.18.4.2171-ac2afe5f8"; + version = "1.18.7.2438-f342a5a43"; pname = "plexmediaserver"; # Fetch the source src = fetchurl { url = "https://downloads.plex.tv/plex-media-server-new/${version}/redhat/plexmediaserver-${version}.x86_64.rpm"; - sha256 = "10x4cf1c826vj9gqr7r6k70rrjifmi36sd7imfi7pdw5swizjzqv"; + sha256 = "07lill29ck5h6lnrxj4k709afh36d6giy4jzv1jwcvcq1hdrvmzh"; }; outputs = [ "out" "basedb" ]; diff --git a/pkgs/servers/roundcube/default.nix b/pkgs/servers/roundcube/default.nix index 27ff5b409f79..939424ff2bfd 100644 --- a/pkgs/servers/roundcube/default.nix +++ b/pkgs/servers/roundcube/default.nix @@ -2,11 +2,11 @@ stdenv.mkDerivation rec { pname = "roundcube"; - version = "1.4.2"; + version = "1.4.3"; src = fetchurl { url = "https://github.com/roundcube/roundcubemail/releases/download/${version}/roundcubemail-${version}-complete.tar.gz"; - sha256 = "0s8gkfnyid1r4xv07vjrbl6558xv6dyn4aapvx8snqdm79n78fn8"; + sha256 = "1gsl9rpdkv388i6zvciladhb15fw94a8xjyh4ai1664nkwl51wi4"; }; patches = [ ./0001-Don-t-resolve-symlinks-when-trying-to-find-INSTALL_P.patch ]; diff --git a/pkgs/servers/sql/mariadb/default.nix b/pkgs/servers/sql/mariadb/default.nix index c86ed3defbcc..1f5c9c414571 100644 --- a/pkgs/servers/sql/mariadb/default.nix +++ b/pkgs/servers/sql/mariadb/default.nix @@ -1,7 +1,9 @@ { stdenv, fetchurl, fetchFromGitHub, cmake, pkgconfig, makeWrapper, ncurses, zlib, xz, lzo, lz4, bzip2, snappy , libiconv, openssl, pcre, boost, judy, bison, libxml2, libkrb5, linux-pam, curl -, libaio, libevent, jemalloc, cracklib, systemd, numactl, perl +, libaio, libevent, jemalloc, cracklib, systemd, perl , fixDarwinDylibNames, cctools, CoreServices, less +, numactl # NUMA Support +, withStorageMroonga ? true, kytea, msgpack, zeromq , withoutClient ? false }: @@ -19,14 +21,14 @@ mariadb = server // { }; common = rec { # attributes common to both builds - version = "10.3.20"; + version = "10.3.22"; src = fetchurl { urls = [ "https://downloads.mariadb.org/f/mariadb-${version}/source/mariadb-${version}.tar.gz" "https://downloads.mariadb.com/MariaDB/mariadb-${version}/source/mariadb-${version}.tar.gz" ]; - sha256 = "14n4zfpwhvafz02r95bidmkwq2bz9jj3safqni1h21jfd0nqz0ak"; + sha256 = "1iyf1hl82nqsci5h327a537rvdrc5qcbrd1v3fc4cxy2pmfha01j"; name = "mariadb-${version}.tar.gz"; }; @@ -144,6 +146,7 @@ server = stdenv.mkDerivation (common // { xz lzo lz4 bzip2 snappy libxml2 boost judy libevent cracklib ] ++ optional (stdenv.hostPlatform.isLinux && !stdenv.hostPlatform.isAarch32) numactl + ++ optionals withStorageMroonga [ kytea msgpack zeromq ] ++ optional stdenv.hostPlatform.isLinux linux-pam ++ optional (!stdenv.hostPlatform.isDarwin) mytopEnv; @@ -164,6 +167,10 @@ server = stdenv.mkDerivation (common // { "-DWITH_INNODB_DISALLOW_WRITES=ON" "-DWITHOUT_EXAMPLE=1" "-DWITHOUT_FEDERATED=1" + ] ++ optional (stdenv.hostPlatform.isLinux && !stdenv.hostPlatform.isAarch32) [ + "-DWITH_NUMA=ON" + ] ++ optional (!withStorageMroonga) [ + "-DWITHOUT_MROONGA=ON" ] ++ optionals withoutClient [ "-DWITHOUT_CLIENT=ON" ] ++ optionals stdenv.hostPlatform.isDarwin [ @@ -179,7 +186,6 @@ server = stdenv.mkDerivation (common // { chmod +x "$out"/bin/wsrep_sst_common rm "$out"/bin/{mysql_client_test,mysqltest} rm -r "$out"/data # Don't need testing data - mv "$out"/share/{groonga,groonga-normalizer-mysql} "$out"/share/doc/mysql '' + optionalString withoutClient '' ${ # We don't build with GSSAPI on Darwin optionalString (!stdenv.hostPlatform.isDarwin) '' @@ -188,6 +194,8 @@ server = stdenv.mkDerivation (common // { } rm "$out"/lib/mysql/plugin/client_ed25519.so rm "$out"/lib/{libmysqlclient${libExt},libmysqlclient_r${libExt}} + '' + optionalString withStorageMroonga '' + mv "$out"/share/{groonga,groonga-normalizer-mysql} "$out"/share/doc/mysql '' + optionalString (!stdenv.hostPlatform.isDarwin) '' sed -i 's/-mariadb/-mysql/' "$out"/bin/galera_new_cluster ''; diff --git a/pkgs/servers/sql/postgresql/default.nix b/pkgs/servers/sql/postgresql/default.nix index 890ac2d37779..b9cd50aa5fe0 100644 --- a/pkgs/servers/sql/postgresql/default.nix +++ b/pkgs/servers/sql/postgresql/default.nix @@ -183,41 +183,41 @@ let in self: { postgresql_9_5 = self.callPackage generic { - version = "9.5.20"; + version = "9.5.21"; psqlSchema = "9.5"; - sha256 = "03fygn3nn6l6ar66sldy5akdg1gynny3yxbrpvmmp5ygfnrm2mwj"; + sha256 = "0b3kzc0431bvp55jns42q9h1119gy075mp4aywnkq93pm17nxdby"; this = self.postgresql_9_5; inherit self; }; postgresql_9_6 = self.callPackage generic { - version = "9.6.16"; + version = "9.6.17"; psqlSchema = "9.6"; - sha256 = "1rr2dgv4ams8r2lp13w85c77rkmzpb88fjlc28mvlw6zq2fblv2w"; + sha256 = "1hm0w6n988n9qn2wylhjq02i5ayzb16rzhgkcv09fpsl68ny7qgn"; this = self.postgresql_9_6; inherit self; }; postgresql_10 = self.callPackage generic { - version = "10.11"; + version = "10.12"; psqlSchema = "10.0"; # should be 10, but changing it is invasive - sha256 = "02fcmvbh0mhplj3s2jd24s642ysx7bggnf0h8bs5amh7dgzi8p8d"; + sha256 = "1rsab4zf4rx7pvvhlwhb04kb95aiad9cwazc4ksbvg2gij47z3rq"; this = self.postgresql_10; inherit self; }; postgresql_11 = self.callPackage generic { - version = "11.6"; + version = "11.7"; psqlSchema = "11.1"; # should be 11, but changing it is invasive - sha256 = "0w1iq488kpzfgfnlw4k32lz5by695mpnkq461jrgsr99z5zlz4j9"; + sha256 = "04x343i4v0w4jf1v5ial8rwsizs1qhdjfbanbnibdys6i0xfjjij"; this = self.postgresql_11; inherit self; }; postgresql_12 = self.callPackage generic { - version = "12.1"; + version = "12.2"; psqlSchema = "12"; - sha256 = "1vc3hjcbgkdfczc1ipkk02rahabn7fabpb7qs203jxpnpamz76x0"; + sha256 = "1pmmd59pvfs50gsi728bw9f1jl59xghsjdanfimph0659x6cq7dd"; this = self.postgresql_12; inherit self; }; diff --git a/pkgs/servers/sql/postgresql/ext/cstore_fdw.nix b/pkgs/servers/sql/postgresql/ext/cstore_fdw.nix index 8e30683737db..8bd50c3974c8 100644 --- a/pkgs/servers/sql/postgresql/ext/cstore_fdw.nix +++ b/pkgs/servers/sql/postgresql/ext/cstore_fdw.nix @@ -2,7 +2,7 @@ stdenv.mkDerivation rec { pname = "cstore_fdw"; - version = "1.6.2"; + version = "1.7.0"; nativeBuildInputs = [ protobufc ]; buildInputs = [ postgresql ]; @@ -11,7 +11,7 @@ stdenv.mkDerivation rec { owner = "citusdata"; repo = "cstore_fdw"; rev = "refs/tags/v${version}"; - sha256 = "0kdmzpbhhjdg4p6i5963h7qbs88jzgpqc52gz450h7hwb9ckpv74"; + sha256 = "129mpq8rq16jg7idh6c1j6nij64iywrs7wl3cn02bdb3h8f19z1b"; }; installPhase = '' diff --git a/pkgs/servers/sql/postgresql/ext/pg_auto_failover.nix b/pkgs/servers/sql/postgresql/ext/pg_auto_failover.nix index 5946b8f5ec32..c872e8bf95d2 100644 --- a/pkgs/servers/sql/postgresql/ext/pg_auto_failover.nix +++ b/pkgs/servers/sql/postgresql/ext/pg_auto_failover.nix @@ -2,13 +2,13 @@ stdenv.mkDerivation rec { pname = "pg_auto_failover"; - version = "1.0.5"; + version = "1.0.6"; src = fetchFromGitHub { owner = "citusdata"; repo = pname; rev = "v${version}"; - sha256 = "1idlgqazr2qra5x702f2yjcl99zwm1i5fi84paplfy98i5jjmxm1"; + sha256 = "0fli8wxi5f3vyn9cjjqi0a2z4i9npx4nqndx2lqzzx95khqqknp1"; }; buildInputs = [ postgresql openssl zlib readline ]; diff --git a/pkgs/servers/tang/default.nix b/pkgs/servers/tang/default.nix new file mode 100644 index 000000000000..5aa261bd8a4c --- /dev/null +++ b/pkgs/servers/tang/default.nix @@ -0,0 +1,32 @@ +{ lib, stdenv, fetchFromGitHub, autoreconfHook, pkgconfig, asciidoc +, jansson, jose, http-parser, systemd +}: + +stdenv.mkDerivation rec { + pname = "tang"; + version = "7"; + + src = fetchFromGitHub { + owner = "latchset"; + repo = pname; + rev = "v${version}"; + sha256 = "0y5w1jrq5djh9gpy2r98ja7676nfxss17s1dk7jvgblsijx9qsd7"; + }; + + configureFlags = [ + "--localstatedir=/var" + "--with-systemdsystemunitdir=${placeholder "out"}/lib/systemd/system" + ]; + + nativeBuildInputs = [ autoreconfHook pkgconfig asciidoc ]; + buildInputs = [ jansson jose http-parser systemd ]; + + outputs = [ "out" "man" ]; + + meta = { + description = "Server for binding data to network presence."; + homepage = "https://github.com/latchset/tang"; + maintainers = with lib.maintainers; [ fpletz ]; + license = lib.licenses.gpl3Plus; + }; +} diff --git a/pkgs/servers/web-apps/jirafeau/default.nix b/pkgs/servers/web-apps/jirafeau/default.nix new file mode 100644 index 000000000000..3dc9fb171901 --- /dev/null +++ b/pkgs/servers/web-apps/jirafeau/default.nix @@ -0,0 +1,34 @@ +{ stdenv, fetchFromGitLab, writeText }: + +let + localConfig = writeText "config.local.php" '' + <?php + return require(getenv('JIRAFEAU_CONFIG')); + ?> + ''; +in +stdenv.mkDerivation rec { + pname = "jirafeau"; + version = "4.1.1"; + + src = fetchFromGitLab { + owner = "mojo42"; + repo = "Jirafeau"; + rev = "${version}"; + sha256 = "09gq5zhynygpqj0skq7ifnn9yjjg7qnc6kjvaas7f53av2707z4c"; + }; + + installPhase = '' + mkdir $out + cp -r * $out/ + cp ${localConfig} $out/lib/config.local.php + ''; + + meta = with stdenv.lib; { + description = "Jirafeau is a web site permitting to upload a file in a simple way and give an unique link to it."; + license = licenses.agpl3; + homepage = "https://gitlab.com/mojo42/Jirafeau"; + platforms = platforms.all; + maintainers = with maintainers; [ davidtwco ]; + }; +} |