From ff54e4724c63056eda5db89fec9fe3de7a1a0f99 Mon Sep 17 00:00:00 2001 From: Shea Levy Date: Thu, 11 Apr 2013 18:28:08 -0400 Subject: [PATCH 01/31] Catalyst::Action::REST: Bump to 1.07 Signed-off-by: Shea Levy --- pkgs/top-level/perl-packages.nix | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/pkgs/top-level/perl-packages.nix b/pkgs/top-level/perl-packages.nix index 4091ecda5840..816c83304a6c 100644 --- a/pkgs/top-level/perl-packages.nix +++ b/pkgs/top-level/perl-packages.nix @@ -338,10 +338,10 @@ rec { }; CatalystActionREST = buildPerlPackage { - name = "Catalyst-Action-REST-1.06"; + name = "Catalyst-Action-REST-1.07"; src = fetchurl { - url = mirror://cpan/authors/id/B/BO/BOBTFISH/Catalyst-Action-REST-1.06.tar.gz; - sha256 = "0z72cf8zgmwmcqlhkawz9fikc0g44972sidfs16x7rwdhzavd01k"; + url = mirror://cpan/authors/id/B/BO/BOBTFISH/Catalyst-Action-REST-1.07.tar.gz; + sha256 = "0c893iia1bmqlrknylaqhc9ln1xqz7yw9z639rxmyjyidx5b4q0d"; }; propagatedBuildInputs = [ CatalystRuntime ClassInspector ConfigGeneral DataSerializer DataTaxi FreezeThaw HTMLParser JSONXS LWPUserAgent Moose MROCompat namespaceautoclean ParamsValidate PHPSerialization URIFind XMLSimple YAMLSyck ]; meta = { From d71d9542ea791ab34af69861bbf8d44f6f9c368e Mon Sep 17 00:00:00 2001 From: Eelco Dolstra Date: Fri, 12 Apr 2013 01:31:18 +0200 Subject: [PATCH 02/31] icu4c: Update to 51.1 --- pkgs/development/libraries/icu/default.nix | 21 +++++++++++---------- 1 file changed, 11 insertions(+), 10 deletions(-) diff --git a/pkgs/development/libraries/icu/default.nix b/pkgs/development/libraries/icu/default.nix index 0474b79a8479..3d37db20edcd 100644 --- a/pkgs/development/libraries/icu/default.nix +++ b/pkgs/development/libraries/icu/default.nix @@ -2,25 +2,26 @@ let pname = "icu4c"; - version = "4.8.1"; + version = "51.1"; in stdenv.mkDerivation { name = pname + "-" + version; - + src = fetchurl { - url = "http://download.icu-project.org/files/${pname}/${version}/${pname}-" - + (stdenv.lib.replaceChars ["."] ["_"] version) + "-src.tgz"; - sha256 = "13zq190gl54zr84f0k48w9knarjsb966jkailyy06yhqjipcv90r"; + url = http://download.icu-project.org/files/icu4c/51.1/icu4c-51_1-src.tgz; + sha256 = "0sv6hgkm92pm27zgjxgk284lcxxbsl0syi40ckw2b7yj7d8sxrc7"; }; - postUnpack = " - sourceRoot=\${sourceRoot}/source - echo Source root reset to \${sourceRoot} - "; - + postUnpack = '' + sourceRoot=''${sourceRoot}/source + echo Source root reset to ''${sourceRoot} + ''; + configureFlags = "--disable-debug"; + enableParallelBuilding = true; + meta = { description = "Unicode and globalization support library"; homepage = http://site.icu-project.org/; From b6e3834ce04ce6dede6c90c71153ec01cac16178 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Vladim=C3=ADr=20=C4=8Cun=C3=A1t?= Date: Fri, 12 Apr 2013 03:07:31 +0200 Subject: [PATCH 03/31] gcc47: minor update to 4.7.3 Tested buildability on x86_64-linux + stdenv-updates. --- pkgs/development/compilers/gcc/4.7/default.nix | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/pkgs/development/compilers/gcc/4.7/default.nix b/pkgs/development/compilers/gcc/4.7/default.nix index 92411e6687e2..4f260d75afcc 100644 --- a/pkgs/development/compilers/gcc/4.7/default.nix +++ b/pkgs/development/compilers/gcc/4.7/default.nix @@ -49,7 +49,7 @@ assert langGo -> langCC; with stdenv.lib; with builtins; -let version = "4.7.2"; +let version = "4.7.3"; # Whether building a cross-compiler for GNU/Hurd. crossGNU = cross != null && cross.config == "i586-pc-gnu"; @@ -197,7 +197,7 @@ stdenv.mkDerivation ({ src = fetchurl { url = "mirror://gnu/gcc/gcc-${version}/gcc-${version}.tar.bz2"; - sha256 = "115h03hil99ljig8lkrq4qk426awmzh0g99wrrggxf8g07bq74la"; + sha256 = "1hx9h64ivarlzi4hxvq42as5m9vlr5cyzaaq4gzj4i619zmkfz1g"; }; inherit patches; From 7ab70b3a4196ee08c150e0d9a1efb6470e34f723 Mon Sep 17 00:00:00 2001 From: Mathijs Kwik Date: Thu, 11 Apr 2013 23:01:24 +0200 Subject: [PATCH 04/31] linux-3.2: upgrade to 3.2.43 --- pkgs/os-specific/linux/kernel/linux-3.2.nix | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/pkgs/os-specific/linux/kernel/linux-3.2.nix b/pkgs/os-specific/linux/kernel/linux-3.2.nix index 3280ac7ad244..7703b4b4cfb9 100644 --- a/pkgs/os-specific/linux/kernel/linux-3.2.nix +++ b/pkgs/os-specific/linux/kernel/linux-3.2.nix @@ -240,7 +240,7 @@ in import ./generic.nix ( rec { - version = "3.2.42"; + version = "3.2.43"; modDirVersion = version; @@ -250,7 +250,7 @@ import ./generic.nix ( src = fetchurl { url = "mirror://kernel/linux/kernel/v3.0/linux-${version}.tar.xz"; - sha256 = "17cwyv474pnwj7i7i513l6g1iz8sp92gvf0crpmrrvv93064xz08"; + sha256 = "0cg88mdlqs7zj2ndj4i9hmvmxasmgv2fqlpzr87qm7bqkmmb6p58"; }; config = configWithPlatform stdenv.platform; From ca392fb8a9024a8f19a7d084336c33a1d87557b0 Mon Sep 17 00:00:00 2001 From: Mathijs Kwik Date: Fri, 12 Apr 2013 10:37:11 +0200 Subject: [PATCH 05/31] vlc: upgrade to 2.0.6 --- pkgs/applications/video/vlc/default.nix | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/pkgs/applications/video/vlc/default.nix b/pkgs/applications/video/vlc/default.nix index a7cce109fdfe..3c96cd134181 100644 --- a/pkgs/applications/video/vlc/default.nix +++ b/pkgs/applications/video/vlc/default.nix @@ -10,11 +10,11 @@ stdenv.mkDerivation rec { name = "vlc-${version}"; - version = "2.0.5"; + version = "2.0.6"; src = fetchurl { url = "http://download.videolan.org/pub/videolan/vlc/${version}/${name}.tar.xz"; - sha256 = "0vkbv477a7z0v55sigz6c3abxljz7jyysp7z8s29zk8vhq0fpyfz"; + sha256 = "0qqrpry41vawihhggcx00vibbn73hxdal1gim1qnrqrcbq1rik1i"; }; buildInputs = From ec8a661bf4f8538fd38352cda13b429b431e3364 Mon Sep 17 00:00:00 2001 From: Rob Vermaas Date: Fri, 12 Apr 2013 14:26:16 +0200 Subject: [PATCH 06/31] boost-1.44.0: also apply time utc patch that was applied for 1.49.0. Needed to be adapted for 1.44.0. --- pkgs/development/libraries/boost/1.44.nix | 1 + .../libraries/boost/time_utc_144.patch | 520 ++++++++++++++++++ 2 files changed, 521 insertions(+) create mode 100644 pkgs/development/libraries/boost/time_utc_144.patch diff --git a/pkgs/development/libraries/boost/1.44.nix b/pkgs/development/libraries/boost/1.44.nix index e0235cd8b39f..7ed3c311de2a 100644 --- a/pkgs/development/libraries/boost/1.44.nix +++ b/pkgs/development/libraries/boost/1.44.nix @@ -68,6 +68,7 @@ stdenv.mkDerivation { url = https://svn.boost.org/trac/boost/raw-attachment/ticket/4688/boost_filesystem.patch ; sha256 = "15k91ihzs6190pnryh4cl0b3c2pjpl9d790mr14x16zq52y7px2d"; }) + ./time_utc_144.patch ]; crossAttrs = rec { diff --git a/pkgs/development/libraries/boost/time_utc_144.patch b/pkgs/development/libraries/boost/time_utc_144.patch new file mode 100644 index 000000000000..512832c18295 --- /dev/null +++ b/pkgs/development/libraries/boost/time_utc_144.patch @@ -0,0 +1,520 @@ +diff -rc boost_1_44_0/boost/thread/xtime.hpp boost_1_44_0-new/boost/thread/xtime.hpp +*** boost_1_44_0/boost/thread/xtime.hpp 2008-06-18 15:01:08.000000000 +0200 +--- boost_1_44_0-new/boost/thread/xtime.hpp 2013-04-12 14:00:27.125713549 +0200 +*************** +*** 20,26 **** + + enum xtime_clock_types + { +! TIME_UTC=1 + // TIME_TAI, + // TIME_MONOTONIC, + // TIME_PROCESS, +--- 20,26 ---- + + enum xtime_clock_types + { +! TIME_UTC_=1 + // TIME_TAI, + // TIME_MONOTONIC, + // TIME_PROCESS, +*************** +*** 68,74 **** + + inline int xtime_get(struct xtime* xtp, int clock_type) + { +! if (clock_type == TIME_UTC) + { + *xtp=get_xtime(get_system_time()); + return clock_type; +--- 68,74 ---- + + inline int xtime_get(struct xtime* xtp, int clock_type) + { +! if (clock_type == TIME_UTC_) + { + *xtp=get_xtime(get_system_time()); + return clock_type; +diff -rc boost_1_44_0/libs/interprocess/test/condition_test_template.hpp boost_1_44_0-new/libs/interprocess/test/condition_test_template.hpp +*** boost_1_44_0/libs/interprocess/test/condition_test_template.hpp 2009-10-15 20:45:53.000000000 +0200 +--- boost_1_44_0-new/libs/interprocess/test/condition_test_template.hpp 2013-04-12 14:00:20.215658855 +0200 +*************** +*** 49,56 **** + const int NANOSECONDS_PER_MILLISECOND = 1000000; + + boost::xtime xt; +! int ret = boost::xtime_get(&xt, boost::TIME_UTC); +! assert(ret == static_cast(boost::TIME_UTC));(void)ret; + nsecs += xt.nsec; + msecs += nsecs / NANOSECONDS_PER_MILLISECOND; + secs += msecs / MILLISECONDS_PER_SECOND; +--- 49,56 ---- + const int NANOSECONDS_PER_MILLISECOND = 1000000; + + boost::xtime xt; +! int ret = boost::xtime_get(&xt, boost::TIME_UTC_); +! assert(ret == static_cast(boost::TIME_UTC_));(void)ret; + nsecs += xt.nsec; + msecs += nsecs / NANOSECONDS_PER_MILLISECOND; + secs += msecs / MILLISECONDS_PER_SECOND; +diff -rc boost_1_44_0/libs/interprocess/test/util.hpp boost_1_44_0-new/libs/interprocess/test/util.hpp +*** boost_1_44_0/libs/interprocess/test/util.hpp 2009-10-15 20:45:53.000000000 +0200 +--- boost_1_44_0-new/libs/interprocess/test/util.hpp 2013-04-12 14:00:20.219658887 +0200 +*************** +*** 71,77 **** + boost::xtime xsecs(int secs) + { + boost::xtime ret; +! boost::xtime_get(&ret, boost::TIME_UTC); + ret.sec += secs; + return ret; + } +--- 71,77 ---- + boost::xtime xsecs(int secs) + { + boost::xtime ret; +! boost::xtime_get(&ret, boost::TIME_UTC_); + ret.sec += secs; + return ret; + } +diff -rc boost_1_44_0/libs/spirit/classic/test/grammar_mt_tests.cpp boost_1_44_0-new/libs/spirit/classic/test/grammar_mt_tests.cpp +*** boost_1_44_0/libs/spirit/classic/test/grammar_mt_tests.cpp 2008-06-22 17:05:38.000000000 +0200 +--- boost_1_44_0-new/libs/spirit/classic/test/grammar_mt_tests.cpp 2013-04-12 14:00:18.836647940 +0200 +*************** +*** 70,76 **** + { + static long const nanoseconds_per_second = 1000L*1000L*1000L; + boost::xtime xt; +! boost::xtime_get(&xt, boost::TIME_UTC); + xt.nsec+=1000*1000*milliseconds; + while (xt.nsec > nanoseconds_per_second) + { +--- 70,76 ---- + { + static long const nanoseconds_per_second = 1000L*1000L*1000L; + boost::xtime xt; +! boost::xtime_get(&xt, boost::TIME_UTC_); + xt.nsec+=1000*1000*milliseconds; + while (xt.nsec > nanoseconds_per_second) + { +diff -rc boost_1_44_0/libs/spirit/classic/test/owi_mt_tests.cpp boost_1_44_0-new/libs/spirit/classic/test/owi_mt_tests.cpp +*** boost_1_44_0/libs/spirit/classic/test/owi_mt_tests.cpp 2008-06-22 17:05:38.000000000 +0200 +--- boost_1_44_0-new/libs/spirit/classic/test/owi_mt_tests.cpp 2013-04-12 14:00:18.836647940 +0200 +*************** +*** 86,92 **** + return test_size; + + boost::xtime now; +! boost::xtime_get(&now, boost::TIME_UTC); + unsigned long seconds = now.sec - start_time.sec; + if (seconds < 4) + { +--- 86,92 ---- + return test_size; + + boost::xtime now; +! boost::xtime_get(&now, boost::TIME_UTC_); + unsigned long seconds = now.sec - start_time.sec; + if (seconds < 4) + { +*************** +*** 187,193 **** + void concurrent_creation_of_objects() + { + { +! boost::xtime_get(&start_time, boost::TIME_UTC); + boost::thread thread1(callable_ref(test1)); + boost::thread thread2(callable_ref(test2)); + boost::thread thread3(callable_ref(test3)); +--- 187,193 ---- + void concurrent_creation_of_objects() + { + { +! boost::xtime_get(&start_time, boost::TIME_UTC_); + boost::thread thread1(callable_ref(test1)); + boost::thread thread2(callable_ref(test2)); + boost::thread thread3(callable_ref(test3)); +diff -rc boost_1_44_0/libs/thread/example/starvephil.cpp boost_1_44_0-new/libs/thread/example/starvephil.cpp +*** boost_1_44_0/libs/thread/example/starvephil.cpp 2006-09-14 23:51:01.000000000 +0200 +--- boost_1_44_0-new/libs/thread/example/starvephil.cpp 2013-04-12 14:00:19.413652507 +0200 +*************** +*** 50,56 **** + << "very hot ..." << std::endl; + } + boost::xtime xt; +! boost::xtime_get(&xt, boost::TIME_UTC); + xt.sec += 3; + boost::thread::sleep(xt); + m_chickens += value; +--- 50,56 ---- + << "very hot ..." << std::endl; + } + boost::xtime xt; +! boost::xtime_get(&xt, boost::TIME_UTC_); + xt.sec += 3; + boost::thread::sleep(xt); + m_chickens += value; +*************** +*** 85,91 **** + std::cout << "(" << clock() << ") Chef: cooking ..." << std::endl; + } + boost::xtime xt; +! boost::xtime_get(&xt, boost::TIME_UTC); + xt.sec += 2; + boost::thread::sleep(xt); + { +--- 85,91 ---- + std::cout << "(" << clock() << ") Chef: cooking ..." << std::endl; + } + boost::xtime xt; +! boost::xtime_get(&xt, boost::TIME_UTC_); + xt.sec += 2; + boost::thread::sleep(xt); + { +*************** +*** 111,117 **** + if (m_id > 0) + { + boost::xtime xt; +! boost::xtime_get(&xt, boost::TIME_UTC); + xt.sec += 3; + boost::thread::sleep(xt); + } +--- 111,117 ---- + if (m_id > 0) + { + boost::xtime xt; +! boost::xtime_get(&xt, boost::TIME_UTC_); + xt.sec += 3; + boost::thread::sleep(xt); + } +diff -rc boost_1_44_0/libs/thread/example/tennis.cpp boost_1_44_0-new/libs/thread/example/tennis.cpp +*** boost_1_44_0/libs/thread/example/tennis.cpp 2009-10-19 11:18:13.000000000 +0200 +--- boost_1_44_0-new/libs/thread/example/tennis.cpp 2013-04-12 14:00:19.412652499 +0200 +*************** +*** 104,110 **** + boost::thread thrdb(thread_adapter(&player, (void*)PLAYER_B)); + + boost::xtime xt; +! boost::xtime_get(&xt, boost::TIME_UTC); + xt.sec += 1; + boost::thread::sleep(xt); + { +--- 104,110 ---- + boost::thread thrdb(thread_adapter(&player, (void*)PLAYER_B)); + + boost::xtime xt; +! boost::xtime_get(&xt, boost::TIME_UTC_); + xt.sec += 1; + boost::thread::sleep(xt); + { +diff -rc boost_1_44_0/libs/thread/example/thread.cpp boost_1_44_0-new/libs/thread/example/thread.cpp +*** boost_1_44_0/libs/thread/example/thread.cpp 2006-09-14 23:51:01.000000000 +0200 +--- boost_1_44_0-new/libs/thread/example/thread.cpp 2013-04-12 14:00:19.414652515 +0200 +*************** +*** 14,20 **** + void operator()() + { + boost::xtime xt; +! boost::xtime_get(&xt, boost::TIME_UTC); + xt.sec += m_secs; + + boost::thread::sleep(xt); +--- 14,20 ---- + void operator()() + { + boost::xtime xt; +! boost::xtime_get(&xt, boost::TIME_UTC_); + xt.sec += m_secs; + + boost::thread::sleep(xt); +diff -rc boost_1_44_0/libs/thread/example/xtime.cpp boost_1_44_0-new/libs/thread/example/xtime.cpp +*** boost_1_44_0/libs/thread/example/xtime.cpp 2006-09-14 23:51:01.000000000 +0200 +--- boost_1_44_0-new/libs/thread/example/xtime.cpp 2013-04-12 14:00:19.413652507 +0200 +*************** +*** 10,16 **** + int main(int argc, char* argv[]) + { + boost::xtime xt; +! boost::xtime_get(&xt, boost::TIME_UTC); + xt.sec += 1; + boost::thread::sleep(xt); // Sleep for 1 second + } +--- 10,16 ---- + int main(int argc, char* argv[]) + { + boost::xtime xt; +! boost::xtime_get(&xt, boost::TIME_UTC_); + xt.sec += 1; + boost::thread::sleep(xt); // Sleep for 1 second + } +diff -rc boost_1_44_0/libs/thread/src/pthread/thread.cpp boost_1_44_0-new/libs/thread/src/pthread/thread.cpp +*** boost_1_44_0/libs/thread/src/pthread/thread.cpp 2010-07-09 21:13:09.000000000 +0200 +--- boost_1_44_0-new/libs/thread/src/pthread/thread.cpp 2013-04-12 14:00:19.415652523 +0200 +*************** +*** 350,356 **** + cond.timed_wait(lock, xt); + # endif + xtime cur; +! xtime_get(&cur, TIME_UTC); + if (xtime_cmp(xt, cur) <= 0) + return; + } +--- 350,356 ---- + cond.timed_wait(lock, xt); + # endif + xtime cur; +! xtime_get(&cur, TIME_UTC_); + if (xtime_cmp(xt, cur) <= 0) + return; + } +*************** +*** 365,371 **** + BOOST_VERIFY(!pthread_yield()); + # else + xtime xt; +! xtime_get(&xt, TIME_UTC); + sleep(xt); + # endif + } +--- 365,371 ---- + BOOST_VERIFY(!pthread_yield()); + # else + xtime xt; +! xtime_get(&xt, TIME_UTC_); + sleep(xt); + # endif + } +diff -rc boost_1_44_0/libs/thread/src/pthread/timeconv.inl boost_1_44_0-new/libs/thread/src/pthread/timeconv.inl +*** boost_1_44_0/libs/thread/src/pthread/timeconv.inl 2010-04-01 17:04:15.000000000 +0200 +--- boost_1_44_0-new/libs/thread/src/pthread/timeconv.inl 2013-04-12 14:00:19.414652515 +0200 +*************** +*** 20,27 **** + inline void to_time(int milliseconds, boost::xtime& xt) + { + int res = 0; +! res = boost::xtime_get(&xt, boost::TIME_UTC); +! BOOST_ASSERT(res == boost::TIME_UTC); + + xt.sec += (milliseconds / MILLISECONDS_PER_SECOND); + xt.nsec += ((milliseconds % MILLISECONDS_PER_SECOND) * +--- 20,27 ---- + inline void to_time(int milliseconds, boost::xtime& xt) + { + int res = 0; +! res = boost::xtime_get(&xt, boost::TIME_UTC_); +! BOOST_ASSERT(res == boost::TIME_UTC_); + + xt.sec += (milliseconds / MILLISECONDS_PER_SECOND); + xt.nsec += ((milliseconds % MILLISECONDS_PER_SECOND) * +*************** +*** 57,64 **** + { + boost::xtime cur; + int res = 0; +! res = boost::xtime_get(&cur, boost::TIME_UTC); +! BOOST_ASSERT(res == boost::TIME_UTC); + + if (boost::xtime_cmp(xt, cur) <= 0) + { +--- 57,64 ---- + { + boost::xtime cur; + int res = 0; +! res = boost::xtime_get(&cur, boost::TIME_UTC_); +! BOOST_ASSERT(res == boost::TIME_UTC_); + + if (boost::xtime_cmp(xt, cur) <= 0) + { +*************** +*** 88,95 **** + { + boost::xtime cur; + int res = 0; +! res = boost::xtime_get(&cur, boost::TIME_UTC); +! BOOST_ASSERT(res == boost::TIME_UTC); + + if (boost::xtime_cmp(xt, cur) <= 0) + milliseconds = 0; +--- 88,95 ---- + { + boost::xtime cur; + int res = 0; +! res = boost::xtime_get(&cur, boost::TIME_UTC_); +! BOOST_ASSERT(res == boost::TIME_UTC_); + + if (boost::xtime_cmp(xt, cur) <= 0) + milliseconds = 0; +*************** +*** 110,117 **** + { + boost::xtime cur; + int res = 0; +! res = boost::xtime_get(&cur, boost::TIME_UTC); +! BOOST_ASSERT(res == boost::TIME_UTC); + + if (boost::xtime_cmp(xt, cur) <= 0) + microseconds = 0; +--- 110,117 ---- + { + boost::xtime cur; + int res = 0; +! res = boost::xtime_get(&cur, boost::TIME_UTC_); +! BOOST_ASSERT(res == boost::TIME_UTC_); + + if (boost::xtime_cmp(xt, cur) <= 0) + microseconds = 0; +diff -rc boost_1_44_0/libs/thread/src/win32/timeconv.inl boost_1_44_0-new/libs/thread/src/win32/timeconv.inl +*** boost_1_44_0/libs/thread/src/win32/timeconv.inl 2007-11-25 19:38:02.000000000 +0100 +--- boost_1_44_0-new/libs/thread/src/win32/timeconv.inl 2013-04-12 14:00:19.416652531 +0200 +*************** +*** 17,24 **** + inline void to_time(int milliseconds, boost::xtime& xt) + { + int res = 0; +! res = boost::xtime_get(&xt, boost::TIME_UTC); +! assert(res == boost::TIME_UTC); + + xt.sec += (milliseconds / MILLISECONDS_PER_SECOND); + xt.nsec += ((milliseconds % MILLISECONDS_PER_SECOND) * +--- 17,24 ---- + inline void to_time(int milliseconds, boost::xtime& xt) + { + int res = 0; +! res = boost::xtime_get(&xt, boost::TIME_UTC_); +! assert(res == boost::TIME_UTC_); + + xt.sec += (milliseconds / MILLISECONDS_PER_SECOND); + xt.nsec += ((milliseconds % MILLISECONDS_PER_SECOND) * +*************** +*** 54,61 **** + { + boost::xtime cur; + int res = 0; +! res = boost::xtime_get(&cur, boost::TIME_UTC); +! assert(res == boost::TIME_UTC); + + if (boost::xtime_cmp(xt, cur) <= 0) + { +--- 54,61 ---- + { + boost::xtime cur; + int res = 0; +! res = boost::xtime_get(&cur, boost::TIME_UTC_); +! assert(res == boost::TIME_UTC_); + + if (boost::xtime_cmp(xt, cur) <= 0) + { +*************** +*** 85,92 **** + { + boost::xtime cur; + int res = 0; +! res = boost::xtime_get(&cur, boost::TIME_UTC); +! assert(res == boost::TIME_UTC); + + if (boost::xtime_cmp(xt, cur) <= 0) + milliseconds = 0; +--- 85,92 ---- + { + boost::xtime cur; + int res = 0; +! res = boost::xtime_get(&cur, boost::TIME_UTC_); +! assert(res == boost::TIME_UTC_); + + if (boost::xtime_cmp(xt, cur) <= 0) + milliseconds = 0; +*************** +*** 107,114 **** + { + boost::xtime cur; + int res = 0; +! res = boost::xtime_get(&cur, boost::TIME_UTC); +! assert(res == boost::TIME_UTC); + + if (boost::xtime_cmp(xt, cur) <= 0) + microseconds = 0; +--- 107,114 ---- + { + boost::xtime cur; + int res = 0; +! res = boost::xtime_get(&cur, boost::TIME_UTC_); +! assert(res == boost::TIME_UTC_); + + if (boost::xtime_cmp(xt, cur) <= 0) + microseconds = 0; +diff -rc boost_1_44_0/libs/thread/test/test_xtime.cpp boost_1_44_0-new/libs/thread/test/test_xtime.cpp +*** boost_1_44_0/libs/thread/test/test_xtime.cpp 2008-07-08 09:44:55.000000000 +0200 +--- boost_1_44_0-new/libs/thread/test/test_xtime.cpp 2013-04-12 14:00:19.432652657 +0200 +*************** +*** 17,24 **** + { + boost::xtime xt1, xt2, cur; + BOOST_CHECK_EQUAL( +! boost::xtime_get(&cur, boost::TIME_UTC), +! static_cast(boost::TIME_UTC)); + + xt1 = xt2 = cur; + xt1.nsec -= 1; +--- 17,24 ---- + { + boost::xtime xt1, xt2, cur; + BOOST_CHECK_EQUAL( +! boost::xtime_get(&cur, boost::TIME_UTC_), +! static_cast(boost::TIME_UTC_)); + + xt1 = xt2 = cur; + xt1.nsec -= 1; +*************** +*** 42,55 **** + boost::xtime orig, cur, old; + BOOST_CHECK_EQUAL( + boost::xtime_get(&orig, +! boost::TIME_UTC), static_cast(boost::TIME_UTC)); + old = orig; + + for (int x=0; x < 100; ++x) + { + BOOST_CHECK_EQUAL( +! boost::xtime_get(&cur, boost::TIME_UTC), +! static_cast(boost::TIME_UTC)); + BOOST_CHECK(boost::xtime_cmp(cur, orig) >= 0); + BOOST_CHECK(boost::xtime_cmp(cur, old) >= 0); + old = cur; +--- 42,55 ---- + boost::xtime orig, cur, old; + BOOST_CHECK_EQUAL( + boost::xtime_get(&orig, +! boost::TIME_UTC_), static_cast(boost::TIME_UTC)); + old = orig; + + for (int x=0; x < 100; ++x) + { + BOOST_CHECK_EQUAL( +! boost::xtime_get(&cur, boost::TIME_UTC_), +! static_cast(boost::TIME_UTC_)); + BOOST_CHECK(boost::xtime_cmp(cur, orig) >= 0); + BOOST_CHECK(boost::xtime_cmp(cur, old) >= 0); + old = cur; +diff -rc boost_1_44_0/libs/thread/test/util.inl boost_1_44_0-new/libs/thread/test/util.inl +*** boost_1_44_0/libs/thread/test/util.inl 2008-11-03 23:29:39.000000000 +0100 +--- boost_1_44_0-new/libs/thread/test/util.inl 2013-04-12 14:00:19.433652665 +0200 +*************** +*** 28,35 **** + const int NANOSECONDS_PER_MILLISECOND = 1000000; + + boost::xtime xt; +! if (boost::TIME_UTC != boost::xtime_get (&xt, boost::TIME_UTC)) +! BOOST_ERROR ("boost::xtime_get != boost::TIME_UTC"); + + nsecs += xt.nsec; + msecs += nsecs / NANOSECONDS_PER_MILLISECOND; +--- 28,35 ---- + const int NANOSECONDS_PER_MILLISECOND = 1000000; + + boost::xtime xt; +! if (boost::TIME_UTC_ != boost::xtime_get (&xt, boost::TIME_UTC)) +! BOOST_ERROR ("boost::xtime_get != boost::TIME_UTC_"); + + nsecs += xt.nsec; + msecs += nsecs / NANOSECONDS_PER_MILLISECOND; From 4a429f5276686ede8e79cea074cb081b7a06f1b6 Mon Sep 17 00:00:00 2001 From: Eelco Dolstra Date: Fri, 12 Apr 2013 14:31:53 +0200 Subject: [PATCH 07/31] systemd: Update to 201 Fixes NixOS/nixos#135 and NixOS/nixos#126. --- ...aemon-reexec-do-the-right-thing-on-N.patch | 8 +++--- ...e-duplicate-paths-in-systemctl-start.patch | 8 +++--- ...ts-for-uninitialised-encrypted-devic.patch | 4 +-- ...o-configuration-hints-for-some-units.patch | 8 +++--- ...rop-the-dependency-on-local-fs.targe.patch | 4 +-- .../0006-Don-t-call-plymouth-quit.patch | 4 +-- ...007-Ignore-IPv6-link-local-addresses.patch | 22 +++++++-------- ...on-t-try-to-unmount-nix-or-nix-store.patch | 28 +++++++++++++++++++ pkgs/os-specific/linux/systemd/default.nix | 13 +++++++-- 9 files changed, 67 insertions(+), 32 deletions(-) create mode 100644 pkgs/os-specific/linux/systemd/0008-Don-t-try-to-unmount-nix-or-nix-store.patch diff --git a/pkgs/os-specific/linux/systemd/0001-Make-systemctl-daemon-reexec-do-the-right-thing-on-N.patch b/pkgs/os-specific/linux/systemd/0001-Make-systemctl-daemon-reexec-do-the-right-thing-on-N.patch index 568ad3780126..7324325fad4f 100644 --- a/pkgs/os-specific/linux/systemd/0001-Make-systemctl-daemon-reexec-do-the-right-thing-on-N.patch +++ b/pkgs/os-specific/linux/systemd/0001-Make-systemctl-daemon-reexec-do-the-right-thing-on-N.patch @@ -1,7 +1,7 @@ -From 75bc507c854a8fe1f819a6b04ebe9e05cd9c425c Mon Sep 17 00:00:00 2001 +From d9c2065158b63db16c9bf0fed37b3f759ef85cbd Mon Sep 17 00:00:00 2001 From: Eelco Dolstra Date: Tue, 8 Jan 2013 15:44:33 +0100 -Subject: [PATCH 1/7] Make "systemctl daemon-reexec" do the right thing on +Subject: [PATCH 1/8] Make "systemctl daemon-reexec" do the right thing on NixOS --- @@ -9,10 +9,10 @@ Subject: [PATCH 1/7] Make "systemctl daemon-reexec" do the right thing on 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/src/core/main.c b/src/core/main.c -index 25f55fc..c2e42b7 100644 +index 7899761..f6f83f4 100644 --- a/src/core/main.c +++ b/src/core/main.c -@@ -1887,7 +1887,7 @@ finish: +@@ -1884,7 +1884,7 @@ finish: char_array_0(sfd); i = 0; diff --git a/pkgs/os-specific/linux/systemd/0002-Ignore-duplicate-paths-in-systemctl-start.patch b/pkgs/os-specific/linux/systemd/0002-Ignore-duplicate-paths-in-systemctl-start.patch index c9e9d806eb9e..31a6642978b2 100644 --- a/pkgs/os-specific/linux/systemd/0002-Ignore-duplicate-paths-in-systemctl-start.patch +++ b/pkgs/os-specific/linux/systemd/0002-Ignore-duplicate-paths-in-systemctl-start.patch @@ -1,17 +1,17 @@ -From b8acf19dbd37f801d5eeb76170f84bc8d75e464c Mon Sep 17 00:00:00 2001 +From f3838af51d461ca3d339618d17962f2d57d1a7fa Mon Sep 17 00:00:00 2001 From: Eelco Dolstra Date: Tue, 8 Jan 2013 15:45:01 +0100 -Subject: [PATCH 2/7] Ignore duplicate paths in "systemctl start" +Subject: [PATCH 2/8] Ignore duplicate paths in "systemctl start" --- src/systemctl/systemctl.c | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-) diff --git a/src/systemctl/systemctl.c b/src/systemctl/systemctl.c -index 1191c7a..4cd64f5 100644 +index fd9f580..b8252c9 100644 --- a/src/systemctl/systemctl.c +++ b/src/systemctl/systemctl.c -@@ -1510,8 +1510,10 @@ static int start_unit_one( +@@ -1507,8 +1507,10 @@ static int start_unit_one( r = set_put(s, p); if (r < 0) { free(p); diff --git a/pkgs/os-specific/linux/systemd/0003-Start-device-units-for-uninitialised-encrypted-devic.patch b/pkgs/os-specific/linux/systemd/0003-Start-device-units-for-uninitialised-encrypted-devic.patch index 70eba00d22fa..30382f557587 100644 --- a/pkgs/os-specific/linux/systemd/0003-Start-device-units-for-uninitialised-encrypted-devic.patch +++ b/pkgs/os-specific/linux/systemd/0003-Start-device-units-for-uninitialised-encrypted-devic.patch @@ -1,7 +1,7 @@ -From 7e7d0ebc8617dfdae4ece9f5b66dc63031bb3fbc Mon Sep 17 00:00:00 2001 +From 6960f2025e95e69079540c4828f62e16d7e75fb1 Mon Sep 17 00:00:00 2001 From: Eelco Dolstra Date: Tue, 8 Jan 2013 15:46:30 +0100 -Subject: [PATCH 3/7] Start device units for uninitialised encrypted devices +Subject: [PATCH 3/8] Start device units for uninitialised encrypted devices This is necessary because the NixOS service that initialises the filesystem depends on the appearance of the device unit. Also, this diff --git a/pkgs/os-specific/linux/systemd/0004-Set-switch-to-configuration-hints-for-some-units.patch b/pkgs/os-specific/linux/systemd/0004-Set-switch-to-configuration-hints-for-some-units.patch index b25f65187d79..610f8a1de630 100644 --- a/pkgs/os-specific/linux/systemd/0004-Set-switch-to-configuration-hints-for-some-units.patch +++ b/pkgs/os-specific/linux/systemd/0004-Set-switch-to-configuration-hints-for-some-units.patch @@ -1,7 +1,7 @@ -From fa5fabd0123f2d5be7efa877f8dbbf0ae7b929da Mon Sep 17 00:00:00 2001 +From 22d416e766e11dbc381620beff89284a0e23827b Mon Sep 17 00:00:00 2001 From: Eelco Dolstra Date: Tue, 8 Jan 2013 15:48:19 +0100 -Subject: [PATCH 4/7] Set switch-to-configuration hints for some units +Subject: [PATCH 4/8] Set switch-to-configuration hints for some units MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit @@ -24,13 +24,13 @@ to prevent all user sessions from being killed when this unit changes. 4 files changed, 12 insertions(+) diff --git a/units/local-fs.target b/units/local-fs.target -index ee02e4e..63ae843 100644 +index 18c3d74..a09054c 100644 --- a/units/local-fs.target +++ b/units/local-fs.target @@ -11,3 +11,5 @@ Documentation=man:systemd.special(7) After=local-fs-pre.target OnFailure=emergency.target - OnFailureIsolate=yes + OnFailureIsolate=no + +X-StopOnReconfiguration=yes diff --git a/units/remote-fs.target b/units/remote-fs.target diff --git a/pkgs/os-specific/linux/systemd/0005-sysinit.target-Drop-the-dependency-on-local-fs.targe.patch b/pkgs/os-specific/linux/systemd/0005-sysinit.target-Drop-the-dependency-on-local-fs.targe.patch index d94890dccc18..1f6da920091f 100644 --- a/pkgs/os-specific/linux/systemd/0005-sysinit.target-Drop-the-dependency-on-local-fs.targe.patch +++ b/pkgs/os-specific/linux/systemd/0005-sysinit.target-Drop-the-dependency-on-local-fs.targe.patch @@ -1,7 +1,7 @@ -From c2dce9a0088f7d155659bcbf1e9e69467e679244 Mon Sep 17 00:00:00 2001 +From 4b0a5f8b3f8fed53f34021dd6139699740b0c3ff Mon Sep 17 00:00:00 2001 From: Eelco Dolstra Date: Tue, 8 Jan 2013 15:56:03 +0100 -Subject: [PATCH 5/7] sysinit.target: Drop the dependency on local-fs.target +Subject: [PATCH 5/8] sysinit.target: Drop the dependency on local-fs.target and swap.target Having all services with DefaultDependencies=yes depend on diff --git a/pkgs/os-specific/linux/systemd/0006-Don-t-call-plymouth-quit.patch b/pkgs/os-specific/linux/systemd/0006-Don-t-call-plymouth-quit.patch index 9e4995dfc1fc..f56d6cc41be7 100644 --- a/pkgs/os-specific/linux/systemd/0006-Don-t-call-plymouth-quit.patch +++ b/pkgs/os-specific/linux/systemd/0006-Don-t-call-plymouth-quit.patch @@ -1,7 +1,7 @@ -From f1b273a7203da1dd3ef51529b5b2e481c7a8d999 Mon Sep 17 00:00:00 2001 +From fbb62c4d5973f7556ce6c3bc9242180b7e087de8 Mon Sep 17 00:00:00 2001 From: Eelco Dolstra Date: Tue, 8 Jan 2013 18:36:28 +0100 -Subject: [PATCH 6/7] Don't call "plymouth quit" +Subject: [PATCH 6/8] Don't call "plymouth quit" NixOS doesn't use Plymouth (yet). --- diff --git a/pkgs/os-specific/linux/systemd/0007-Ignore-IPv6-link-local-addresses.patch b/pkgs/os-specific/linux/systemd/0007-Ignore-IPv6-link-local-addresses.patch index fb59b676e516..f12061715471 100644 --- a/pkgs/os-specific/linux/systemd/0007-Ignore-IPv6-link-local-addresses.patch +++ b/pkgs/os-specific/linux/systemd/0007-Ignore-IPv6-link-local-addresses.patch @@ -1,7 +1,7 @@ -From 61fa587560634d5c71a62a4a2fc2a37eb043e9a4 Mon Sep 17 00:00:00 2001 +From 72a89fd9b4e35da375a1cdcf0d30a0f31a78d9a5 Mon Sep 17 00:00:00 2001 From: Eelco Dolstra Date: Mon, 4 Feb 2013 12:41:14 +0100 -Subject: [PATCH 7/7] Ignore IPv6 link-local addresses +Subject: [PATCH 7/8] Ignore IPv6 link-local addresses Returning IPv6 link-local addresses is a bad idea, because they only work if an application connects specifically over the corresponding @@ -18,19 +18,19 @@ to returning ::1. 1 file changed, 4 insertions(+) diff --git a/src/nss-myhostname/netlink.c b/src/nss-myhostname/netlink.c -index 53c3b50..621ca1d 100644 +index b1ef912..4f2ab5c 100644 --- a/src/nss-myhostname/netlink.c +++ b/src/nss-myhostname/netlink.c -@@ -155,6 +155,10 @@ int ifconf_acquire_addresses(struct address **_list, unsigned *_n_list) { - ifaddrmsg->ifa_scope == RT_SCOPE_NOWHERE) - continue; +@@ -113,6 +113,10 @@ static int read_reply(int fd, struct address **list, unsigned *n_list) { + ifaddrmsg->ifa_scope == RT_SCOPE_NOWHERE) + continue; -+ if (ifaddrmsg->ifa_family == AF_INET6 && -+ ifaddrmsg->ifa_scope == RT_SCOPE_LINK) -+ continue; ++ if (ifaddrmsg->ifa_family == AF_INET6 && ++ ifaddrmsg->ifa_scope == RT_SCOPE_LINK) ++ continue; + - if (ifaddrmsg->ifa_flags & IFA_F_DEPRECATED) - continue; + if (ifaddrmsg->ifa_flags & IFA_F_DEPRECATED) + continue; -- 1.8.1 diff --git a/pkgs/os-specific/linux/systemd/0008-Don-t-try-to-unmount-nix-or-nix-store.patch b/pkgs/os-specific/linux/systemd/0008-Don-t-try-to-unmount-nix-or-nix-store.patch new file mode 100644 index 000000000000..c8959871c009 --- /dev/null +++ b/pkgs/os-specific/linux/systemd/0008-Don-t-try-to-unmount-nix-or-nix-store.patch @@ -0,0 +1,28 @@ +From ceb0fc701960de1568fe2732f390a7b92b76f2e1 Mon Sep 17 00:00:00 2001 +From: Eelco Dolstra +Date: Fri, 12 Apr 2013 13:16:57 +0200 +Subject: [PATCH 8/8] Don't try to unmount /nix or /nix/store + +They'll still be remounted read-only. + +https://github.com/NixOS/nixos/issues/126 +--- + src/core/umount.c | 2 ++ + 1 file changed, 2 insertions(+) + +diff --git a/src/core/umount.c b/src/core/umount.c +index 8c69e74..ff13a5d 100644 +--- a/src/core/umount.c ++++ b/src/core/umount.c +@@ -435,6 +435,8 @@ static int mount_points_list_umount(MountPoint **head, bool *changed, bool log_e + * anyway, since we are running from it. They have + * already been remounted ro. */ + if (path_equal(m->path, "/") ++ || path_equal(m->path, "/nix") ++ || path_equal(m->path, "/nix/store") + #ifndef HAVE_SPLIT_USR + || path_equal(m->path, "/usr") + #endif +-- +1.8.1 + diff --git a/pkgs/os-specific/linux/systemd/default.nix b/pkgs/os-specific/linux/systemd/default.nix index dfa99959b30c..3f95aee77be6 100644 --- a/pkgs/os-specific/linux/systemd/default.nix +++ b/pkgs/os-specific/linux/systemd/default.nix @@ -6,11 +6,11 @@ assert stdenv.gcc.libc or null != null; stdenv.mkDerivation rec { - name = "systemd-200"; + name = "systemd-201"; src = fetchurl { url = "http://www.freedesktop.org/software/systemd/${name}.tar.xz"; - sha256 = "05y2r25441nznif5xi5gab4c6xdywiqzgcl3nsmg0j2wzalbl24s"; + sha256 = "046cr1q7xv7bslzc16g8zz8nddf64lw8v01isw1204n21cd9yafn"; }; patches = @@ -21,6 +21,7 @@ stdenv.mkDerivation rec { ./0005-sysinit.target-Drop-the-dependency-on-local-fs.targe.patch ./0006-Don-t-call-plymouth-quit.patch ./0007-Ignore-IPv6-link-local-addresses.patch + ./0008-Don-t-try-to-unmount-nix-or-nix-store.patch ] ++ stdenv.lib.optional stdenv.isArm ./libc-bug-accept4-arm.patch; buildInputs = @@ -68,11 +69,17 @@ stdenv.mkDerivation rec { NIX_CFLAGS_COMPILE = [ # Can't say ${polkit}/bin/pkttyagent here because that would # lead to a cyclic dependency. - "-UPOLKIT_AGENT_BINARY_PATH -DPOLKIT_AGENT_BINARY_PATH=\"/run/current-system/sw/bin/pkttyagent\"" + "-UPOLKIT_AGENT_BINARY_PATH" "-DPOLKIT_AGENT_BINARY_PATH=\"/run/current-system/sw/bin/pkttyagent\"" "-fno-stack-protector" + # Work around our kernel headers being too old. FIXME: remove # this after the next stdenv update. "-DFS_NOCOW_FL=0x00800000" + + # Set the release_agent on /sys/fs/cgroup/systemd to the + # currently running systemd (/run/current-system/systemd) so + # that we don't use an obsolete/garbage-collected release agent. + "-USYSTEMD_CGROUP_AGENT_PATH" "-DSYSTEMD_CGROUP_AGENT_PATH=\"/run/current-system/systemd/lib/systemd/systemd-cgroups-agent\"" ]; # Use /var/lib/udev rather than /etc/udev for the generated hardware From 4adad458e75ef2fd5cb1afd1d00c3d18e3dcc20b Mon Sep 17 00:00:00 2001 From: Eelco Dolstra Date: Fri, 12 Apr 2013 14:37:50 +0200 Subject: [PATCH 08/31] Remove the "proprietary" license We already had "unfree". --- pkgs/applications/audio/linuxsampler/default.nix | 2 +- .../networking/instant-messengers/hipchat/default.nix | 2 +- pkgs/development/libraries/libspotify/default.nix | 2 +- pkgs/development/tools/neoload/default.nix | 4 ++-- pkgs/games/oilrush/default.nix | 2 +- pkgs/lib/licenses.nix | 5 ----- pkgs/os-specific/linux/firmware/b43-firmware/5.1.138.nix | 2 +- pkgs/servers/sql/oracle-xe/default.nix | 2 +- pkgs/stdenv/generic/default.nix | 2 +- pkgs/tools/security/fprot/default.nix | 5 +++-- 10 files changed, 12 insertions(+), 16 deletions(-) diff --git a/pkgs/applications/audio/linuxsampler/default.nix b/pkgs/applications/audio/linuxsampler/default.nix index d9413c031546..1408a1775ee5 100644 --- a/pkgs/applications/audio/linuxsampler/default.nix +++ b/pkgs/applications/audio/linuxsampler/default.nix @@ -41,7 +41,7 @@ stdenv.mkDerivation rec { have questions on the subject, that are not yet covered by the FAQ, please contact us. ''; - license = licenses.proprietary; + license = licenses.unfree; maintainers = [ maintainers.goibhniu ]; platforms = platforms.linux; }; diff --git a/pkgs/applications/networking/instant-messengers/hipchat/default.nix b/pkgs/applications/networking/instant-messengers/hipchat/default.nix index b202a0f09db8..e51798502371 100644 --- a/pkgs/applications/networking/instant-messengers/hipchat/default.nix +++ b/pkgs/applications/networking/instant-messengers/hipchat/default.nix @@ -57,7 +57,7 @@ in stdenv.mkDerivation { meta = { description = "HipChat Desktop Client"; homepage = http://www.hipchat.com; - license = stdenv.lib.licenses.proprietary; + license = stdenv.lib.licenses.unfree; platforms = [ "i686-linux" "x86_64-linux" ]; }; } diff --git a/pkgs/development/libraries/libspotify/default.nix b/pkgs/development/libraries/libspotify/default.nix index 9c28a99fee8d..1972a4be6536 100644 --- a/pkgs/development/libraries/libspotify/default.nix +++ b/pkgs/development/libraries/libspotify/default.nix @@ -56,6 +56,6 @@ if stdenv.system != "x86_64-linux" then throw '' maintainers = [ stdenv.lib.maintainers.shlevy ]; - license = stdenv.lib.licenses.proprietary; + license = stdenv.lib.licenses.unfree; }; } diff --git a/pkgs/development/tools/neoload/default.nix b/pkgs/development/tools/neoload/default.nix index d7a203ad3f41..25f66e9cd7ea 100644 --- a/pkgs/development/tools/neoload/default.nix +++ b/pkgs/development/tools/neoload/default.nix @@ -80,12 +80,12 @@ in stdenv.mkDerivation rec { ''; meta = { - description = "load testing software for Web applications to realistically simulate user activity and analyze server behavior."; + description = "load testing software for Web applications to realistically simulate user activity and analyze server behavior"; homepage = https://www.neotys.com/product/overview-neoload.html; # https://www.neotys.com/documents/legal/eula/neoload/eula_en.html - license = stdenv.lib.licenses.proprietary; + license = stdenv.lib.licenses.unfree; maintainers = [ stdenv.lib.maintainers.bluescreen303 ]; platforms = [ "i686-linux" "x86_64-linux" ]; diff --git a/pkgs/games/oilrush/default.nix b/pkgs/games/oilrush/default.nix index 339c3bbd1a84..b96fd7c3e9f2 100644 --- a/pkgs/games/oilrush/default.nix +++ b/pkgs/games/oilrush/default.nix @@ -67,7 +67,7 @@ stdenv.mkDerivation { of Tower Defense. ''; homepage = http://oilrush-game.com/; - license = [ "proprietary" ]; + license = "unfree"; #maintainers = with stdenv.lib.maintainers; [ astsmtl ]; #platforms = with stdenv.lib.platforms; linux; }; diff --git a/pkgs/lib/licenses.nix b/pkgs/lib/licenses.nix index 634a20e720a9..583cece32220 100644 --- a/pkgs/lib/licenses.nix +++ b/pkgs/lib/licenses.nix @@ -177,11 +177,6 @@ url = http://docs.python.org/license.html; }; - proprietary = { - shortName = "Proprietary"; - fullName = "Proprietary (non redistributable) license"; - }; - tcltk = { shortName = "Tcl/Tk"; fullName = "Tcl/Tk license"; diff --git a/pkgs/os-specific/linux/firmware/b43-firmware/5.1.138.nix b/pkgs/os-specific/linux/firmware/b43-firmware/5.1.138.nix index 1c4173c72fd4..f941d9275c01 100644 --- a/pkgs/os-specific/linux/firmware/b43-firmware/5.1.138.nix +++ b/pkgs/os-specific/linux/firmware/b43-firmware/5.1.138.nix @@ -22,7 +22,7 @@ stdenv.mkDerivation { meta = { description = "Firmware for cards supported by the b43 kernel module"; homepage = http://wireless.kernel.org/en/users/Drivers/b43; - license = stdenv.lib.licenses.proprietary; + license = stdenv.lib.licenses.unfree; maintainers = [ stdenv.lib.maintainers.shlevy ]; }; } diff --git a/pkgs/servers/sql/oracle-xe/default.nix b/pkgs/servers/sql/oracle-xe/default.nix index 940e57ab8fb1..57ff50175bb5 100644 --- a/pkgs/servers/sql/oracle-xe/default.nix +++ b/pkgs/servers/sql/oracle-xe/default.nix @@ -78,6 +78,6 @@ stdenv.mkDerivation rec { meta = { description = "Oracle Database Express Edition"; homepage = "http://www.oracle.com/technetwork/products/express-edition/"; - license = licenses.proprietary; + license = licenses.unfree; }; } diff --git a/pkgs/stdenv/generic/default.nix b/pkgs/stdenv/generic/default.nix index fe4bbbc94dd6..dc8d92715def 100644 --- a/pkgs/stdenv/generic/default.nix +++ b/pkgs/stdenv/generic/default.nix @@ -49,7 +49,7 @@ let # Add a utility function to produce derivations that use this # stdenv and its shell. mkDerivation = attrs: - if !allowUnfree && (let l = attrs.meta.license or ""; in l == "unfree" || l == "unfree-redistributable" || l == lib.licenses.proprietary) then + if !allowUnfree && (let l = attrs.meta.license or ""; in l == "unfree" || l == "unfree-redistributable") then throw "package ‘${attrs.name}’ has an unfree license, refusing to evaluate" else lib.addPassthru (derivation ( diff --git a/pkgs/tools/security/fprot/default.nix b/pkgs/tools/security/fprot/default.nix index 95f7140b9180..2a8531a17954 100644 --- a/pkgs/tools/security/fprot/default.nix +++ b/pkgs/tools/security/fprot/default.nix @@ -1,4 +1,5 @@ { stdenv, fetchurl }: + stdenv.mkDerivation rec { name = "f-prot-${version}"; @@ -33,8 +34,8 @@ stdenv.mkDerivation rec { meta = with stdenv.lib; { homepage = http://www.f-prot.com; - description = "a popular proprietary antivirus, Linux workstation edition."; - license = licenses.proprietary; + description = "A popular proprietary antivirus program"; + license = licenses.unfree; maintainers = [ maintainers.phreedom ]; platforms = platforms.linux; }; From 8fc1fe9f6b2a723f23bfa566b7ef4dbbc7365508 Mon Sep 17 00:00:00 2001 From: Eelco Dolstra Date: Fri, 12 Apr 2013 15:01:01 +0200 Subject: [PATCH 09/31] socat: Update to 1.7.2.1 CVE-2012-0219 --- pkgs/tools/networking/socat/default.nix | 15 +++++++++------ pkgs/top-level/release.nix | 1 - 2 files changed, 9 insertions(+), 7 deletions(-) diff --git a/pkgs/tools/networking/socat/default.nix b/pkgs/tools/networking/socat/default.nix index 7028c3bf6059..727bbe086059 100644 --- a/pkgs/tools/networking/socat/default.nix +++ b/pkgs/tools/networking/socat/default.nix @@ -1,17 +1,20 @@ { stdenv, fetchurl, openssl }: stdenv.mkDerivation rec { - name = "socat-1.7.2.0"; - + name = "socat-1.7.2.1"; + src = fetchurl { url = "http://www.dest-unreach.org/socat/download/${name}.tar.bz2"; - sha256 = "00hq0ia1fs4sy0qpavzlpf4qmnhh2ybq5is2kqzvqky14zlvvcsr"; + sha256 = "0xw2qmmixv7jwsrgx2vy54bq695d6my3pm3z4dcpmf9vqvb2xsps"; }; buildInputs = [ openssl ]; - + meta = { - description = "Socat - a different replacement for netcat"; - homepage = "http://www.dest-unreach.org/socat/"; + description = "A utility for bidirectional data transfer between two independent data channels"; + homepage = http://www.dest-unreach.org/socat/; + platforms = stdenv.lib.platforms.linux; + license = stdenv.lib.licenses.gpl2; + maintainers = stdenv.lib.maintainers.eelco; }; } diff --git a/pkgs/top-level/release.nix b/pkgs/top-level/release.nix index 697c9b5f58d6..8b8371a95c78 100644 --- a/pkgs/top-level/release.nix +++ b/pkgs/top-level/release.nix @@ -274,7 +274,6 @@ let slim = linux; sloccount = allBut "i686-cygwin"; smartmontools = linux; - socat = linux; spidermonkey = linux; splashutils = linux; sqlite = allBut "i686-cygwin"; From 4d5ba15ea9223f6f40f588da9c21d03262a959c3 Mon Sep 17 00:00:00 2001 From: Eelco Dolstra Date: Fri, 12 Apr 2013 15:25:53 +0200 Subject: [PATCH 10/31] openssh: Update to 6.2p1 --- pkgs/tools/filesystems/squashfs/default.nix | 8 +- pkgs/tools/networking/openssh/default.nix | 12 +- .../openssh/fix-identity-warnings.patch | 251 ++++++++++++++++++ pkgs/top-level/release.nix | 1 - 4 files changed, 264 insertions(+), 8 deletions(-) create mode 100644 pkgs/tools/networking/openssh/fix-identity-warnings.patch diff --git a/pkgs/tools/filesystems/squashfs/default.nix b/pkgs/tools/filesystems/squashfs/default.nix index f66c54cc9e1b..bec5592ccaed 100644 --- a/pkgs/tools/filesystems/squashfs/default.nix +++ b/pkgs/tools/filesystems/squashfs/default.nix @@ -7,17 +7,17 @@ stdenv.mkDerivation rec { url = mirror://sourceforge/squashfs/squashfs4.2.tar.gz; sha256 = "15if08j0pl5hmnz9pwshwrp4fjp0jsm9larjxmjvdnr2m5d1kq6r"; }; - + buildInputs = [ zlib xz ]; preBuild = "cd squashfs-tools"; - + NIX_LDFLAGS = "-lgcc_s"; # for pthread_cancel installFlags = "INSTALL_DIR=\${out}/bin"; - + makeFlags = "XZ_SUPPORT=1"; - + meta = { homepage = http://squashfs.sourceforge.net/; description = "Tool for creating and unpacking squashfs filesystems"; diff --git a/pkgs/tools/networking/openssh/default.nix b/pkgs/tools/networking/openssh/default.nix index 1c0ed3c6e778..9de3156f2a75 100644 --- a/pkgs/tools/networking/openssh/default.nix +++ b/pkgs/tools/networking/openssh/default.nix @@ -13,11 +13,11 @@ let in stdenv.mkDerivation rec { - name = "openssh-6.1p1"; + name = "openssh-6.2p1"; src = fetchurl { url = "ftp://ftp.nl.uu.net/pub/OpenBSD/OpenSSH/portable/${name}.tar.gz"; - sha1 = "751c92c912310c3aa9cadc113e14458f843fc7b3"; + sha1 = "8824708c617cc781b2bb29fa20bd905fd3d2a43d"; }; prePatch = stdenv.lib.optionalString hpnSupport @@ -26,7 +26,11 @@ stdenv.mkDerivation rec { export NIX_LDFLAGS="$NIX_LDFLAGS -lgcc_s" ''; - patches = [ ./locale_archive.patch ]; + patches = + [ ./locale_archive.patch + # Upstream fix for gratuitous "no such identity" warnings. + ./fix-identity-warnings.patch + ]; buildInputs = [ zlib openssl libedit pkgconfig pam ]; @@ -64,5 +68,7 @@ stdenv.mkDerivation rec { homepage = http://www.openssh.org/; description = "An implementation of the SSH protocol"; license = "bsd"; + platforms = stdenv.lib.platforms.linux; + maintainers = stdenv.lib.maintainers.eelco; }; } diff --git a/pkgs/tools/networking/openssh/fix-identity-warnings.patch b/pkgs/tools/networking/openssh/fix-identity-warnings.patch new file mode 100644 index 000000000000..c341889b3a47 --- /dev/null +++ b/pkgs/tools/networking/openssh/fix-identity-warnings.patch @@ -0,0 +1,251 @@ +https://bugzilla.mindrot.org/show_bug.cgi?id=2084 + +@@ -, +, @@ + - dtucker@cvs.openbsd.org 2013/02/17 23:16:57 + [readconf.c ssh.c readconf.h sshconnect2.c] + Keep track of which IndentityFile options were manually supplied and which + were default options, and don't warn if the latter are missing. + ok markus@ + - dtucker@cvs.openbsd.org 2013/02/22 04:45:09 + [ssh.c readconf.c readconf.h] + Don't complain if IdentityFiles specified in system-wide configs are + missing. ok djm, deraadt. +Index: readconf.c +=================================================================== +RCS file: /home/dtucker/openssh/cvs/openssh/readconf.c,v +--- a/readconf.c 2 Oct 2011 07:59:03 -0000 1.174 ++++ b/readconf.c 5 Apr 2013 02:36:11 -0000 +@@ -1,4 +1,4 @@ +-/* $OpenBSD: readconf.c,v 1.194 2011/09/23 07:45:05 markus Exp $ */ ++/* $OpenBSD: readconf.c,v 1.196 2013/02/22 04:45:08 dtucker Exp $ */ + /* + * Author: Tatu Ylonen + * Copyright (c) 1995 Tatu Ylonen , Espoo, Finland +@@ -326,6 +326,26 @@ clear_forwardings(Options *options) + options->tun_open = SSH_TUNMODE_NO; + } + ++void ++add_identity_file(Options *options, const char *dir, const char *filename, ++ int userprovided) ++{ ++ char *path; ++ ++ if (options->num_identity_files >= SSH_MAX_IDENTITY_FILES) ++ fatal("Too many identity files specified (max %d)", ++ SSH_MAX_IDENTITY_FILES); ++ ++ if (dir == NULL) /* no dir, filename is absolute */ ++ path = xstrdup(filename); ++ else ++ (void)xasprintf(&path, "%.100s%.100s", dir, filename); ++ ++ options->identity_file_userprovided[options->num_identity_files] = ++ userprovided; ++ options->identity_files[options->num_identity_files++] = path; ++} ++ + /* + * Returns the number of the token pointed to by cp or oBadOption. + */ +@@ -353,7 +373,7 @@ parse_token(const char *cp, const char * + int + process_config_line(Options *options, const char *host, + char *line, const char *filename, int linenum, +- int *activep) ++ int *activep, int userconfig) + { + char *s, **charptr, *endofnumber, *keyword, *arg, *arg2; + char **cpptr, fwdarg[256]; +@@ -586,9 +606,7 @@ parse_yesnoask: + if (*intptr >= SSH_MAX_IDENTITY_FILES) + fatal("%.200s line %d: Too many identity files specified (max %d).", + filename, linenum, SSH_MAX_IDENTITY_FILES); +- charptr = &options->identity_files[*intptr]; +- *charptr = xstrdup(arg); +- *intptr = *intptr + 1; ++ add_identity_file(options, NULL, arg, userconfig); + } + break; + +@@ -1075,7 +1093,7 @@ parse_int: + + int + read_config_file(const char *filename, const char *host, Options *options, +- int checkperm) ++ int flags) + { + FILE *f; + char line[1024]; +@@ -1085,7 +1103,7 @@ read_config_file(const char *filename, c + if ((f = fopen(filename, "r")) == NULL) + return 0; + +- if (checkperm) { ++ if (flags & SSHCONF_CHECKPERM) { + struct stat sb; + + if (fstat(fileno(f), &sb) == -1) +@@ -1106,7 +1124,8 @@ read_config_file(const char *filename, c + while (fgets(line, sizeof(line), f)) { + /* Update line number counter. */ + linenum++; +- if (process_config_line(options, host, line, filename, linenum, &active) != 0) ++ if (process_config_line(options, host, line, filename, linenum, ++ &active, flags & SSHCONF_USERCONF) != 0) + bad_options++; + } + fclose(f); +@@ -1280,30 +1299,17 @@ fill_default_options(Options * options) + options->protocol = SSH_PROTO_2; + if (options->num_identity_files == 0) { + if (options->protocol & SSH_PROTO_1) { +- len = 2 + strlen(_PATH_SSH_CLIENT_IDENTITY) + 1; +- options->identity_files[options->num_identity_files] = +- xmalloc(len); +- snprintf(options->identity_files[options->num_identity_files++], +- len, "~/%.100s", _PATH_SSH_CLIENT_IDENTITY); ++ add_identity_file(options, "~/", ++ _PATH_SSH_CLIENT_IDENTITY, 0); + } + if (options->protocol & SSH_PROTO_2) { +- len = 2 + strlen(_PATH_SSH_CLIENT_ID_RSA) + 1; +- options->identity_files[options->num_identity_files] = +- xmalloc(len); +- snprintf(options->identity_files[options->num_identity_files++], +- len, "~/%.100s", _PATH_SSH_CLIENT_ID_RSA); +- +- len = 2 + strlen(_PATH_SSH_CLIENT_ID_DSA) + 1; +- options->identity_files[options->num_identity_files] = +- xmalloc(len); +- snprintf(options->identity_files[options->num_identity_files++], +- len, "~/%.100s", _PATH_SSH_CLIENT_ID_DSA); ++ add_identity_file(options, "~/", ++ _PATH_SSH_CLIENT_ID_RSA, 0); ++ add_identity_file(options, "~/", ++ _PATH_SSH_CLIENT_ID_DSA, 0); + #ifdef OPENSSL_HAS_ECC +- len = 2 + strlen(_PATH_SSH_CLIENT_ID_ECDSA) + 1; +- options->identity_files[options->num_identity_files] = +- xmalloc(len); +- snprintf(options->identity_files[options->num_identity_files++], +- len, "~/%.100s", _PATH_SSH_CLIENT_ID_ECDSA); ++ add_identity_file(options, "~/", ++ _PATH_SSH_CLIENT_ID_ECDSA, 0); + #endif + } + } +Index: readconf.h +=================================================================== +RCS file: /home/dtucker/openssh/cvs/openssh/readconf.h,v +--- a/readconf.h 2 Oct 2011 07:59:03 -0000 1.83 ++++ b/readconf.h 5 Apr 2013 02:36:11 -0000 +@@ -1,4 +1,4 @@ +-/* $OpenBSD: readconf.h,v 1.91 2011/09/23 07:45:05 markus Exp $ */ ++/* $OpenBSD: readconf.h,v 1.93 2013/02/22 04:45:09 dtucker Exp $ */ + + /* + * Author: Tatu Ylonen +@@ -96,6 +96,7 @@ typedef struct { + + int num_identity_files; /* Number of files for RSA/DSA identities. */ + char *identity_files[SSH_MAX_IDENTITY_FILES]; ++ int identity_file_userprovided[SSH_MAX_IDENTITY_FILES]; + Key *identity_keys[SSH_MAX_IDENTITY_FILES]; + + /* Local TCP/IP forward requests. */ +@@ -148,15 +149,20 @@ typedef struct { + #define REQUEST_TTY_YES 2 + #define REQUEST_TTY_FORCE 3 + ++#define SSHCONF_CHECKPERM 1 /* check permissions on config file */ ++#define SSHCONF_USERCONF 2 /* user provided config file not system */ ++ + void initialize_options(Options *); + void fill_default_options(Options *); + int read_config_file(const char *, const char *, Options *, int); + int parse_forward(Forward *, const char *, int, int); + + int +-process_config_line(Options *, const char *, char *, const char *, int, int *); ++process_config_line(Options *, const char *, char *, const char *, int, int *, ++ int); + + void add_local_forward(Options *, const Forward *); + void add_remote_forward(Options *, const Forward *); ++void add_identity_file(Options *, const char *, const char *, int); + + #endif /* READCONF_H */ +Index: ssh.c +=================================================================== +RCS file: /home/dtucker/openssh/cvs/openssh/ssh.c,v +--- a/ssh.c 6 Jul 2012 03:45:01 -0000 1.366 ++++ b/ssh.c 5 Apr 2013 02:36:11 -0000 +@@ -1,4 +1,4 @@ +-/* $OpenBSD: ssh.c,v 1.370 2012/07/06 01:47:38 djm Exp $ */ ++/* $OpenBSD: ssh.c,v 1.372 2013/02/22 04:45:09 dtucker Exp $ */ + /* + * Author: Tatu Ylonen + * Copyright (c) 1995 Tatu Ylonen , Espoo, Finland +@@ -405,12 +405,7 @@ main(int ac, char **av) + strerror(errno)); + break; + } +- if (options.num_identity_files >= +- SSH_MAX_IDENTITY_FILES) +- fatal("Too many identity files specified " +- "(max %d)", SSH_MAX_IDENTITY_FILES); +- options.identity_files[options.num_identity_files++] = +- xstrdup(optarg); ++ add_identity_file(&options, NULL, optarg, 1); + break; + case 'I': + #ifdef ENABLE_PKCS11 +@@ -584,7 +579,8 @@ main(int ac, char **av) + dummy = 1; + line = xstrdup(optarg); + if (process_config_line(&options, host ? host : "", +- line, "command-line", 0, &dummy) != 0) ++ line, "command-line", 0, &dummy, SSHCONF_USERCONF) ++ != 0) + exit(255); + xfree(line); + break; +@@ -678,14 +674,15 @@ main(int ac, char **av) + * file if the user specifies a config file on the command line. + */ + if (config != NULL) { +- if (!read_config_file(config, host, &options, 0)) ++ if (!read_config_file(config, host, &options, SSHCONF_USERCONF)) + fatal("Can't open user config file %.100s: " + "%.100s", config, strerror(errno)); + } else { + r = snprintf(buf, sizeof buf, "%s/%s", pw->pw_dir, + _PATH_SSH_USER_CONFFILE); + if (r > 0 && (size_t)r < sizeof(buf)) +- (void)read_config_file(buf, host, &options, 1); ++ (void)read_config_file(buf, host, &options, ++ SSHCONF_CHECKPERM|SSHCONF_USERCONF); + + /* Read systemwide configuration file after user config. */ + (void)read_config_file(_PATH_HOST_CONFIG_FILE, host, +Index: sshconnect2.c +=================================================================== +RCS file: /home/dtucker/openssh/cvs/openssh/sshconnect2.c,v +--- a/sshconnect2.c 20 Mar 2013 01:55:15 -0000 1.184 ++++ b/sshconnect2.c 5 Apr 2013 02:36:07 -0000 +@@ -1,4 +1,4 @@ +-/* $OpenBSD: sshconnect2.c,v 1.191 2013/02/15 00:21:01 dtucker Exp $ */ ++/* $OpenBSD: sshconnect2.c,v 1.192 2013/02/17 23:16:57 dtucker Exp $ */ + /* + * Copyright (c) 2000 Markus Friedl. All rights reserved. + * Copyright (c) 2008 Damien Miller. All rights reserved. +@@ -1384,7 +1384,7 @@ pubkey_prepare(Authctxt *authctxt) + id = xcalloc(1, sizeof(*id)); + id->key = key; + id->filename = xstrdup(options.identity_files[i]); +- id->userprovided = 1; ++ id->userprovided = options.identity_file_userprovided[i]; + TAILQ_INSERT_TAIL(&files, id, next); + } + /* Prefer PKCS11 keys that are explicitly listed */ diff --git a/pkgs/top-level/release.nix b/pkgs/top-level/release.nix index 8b8371a95c78..8fc364a60e38 100644 --- a/pkgs/top-level/release.nix +++ b/pkgs/top-level/release.nix @@ -228,7 +228,6 @@ let ntp = linux; ocaml = linux; octave = linux; - openssh = linux; openssl = all; pam_console = linux; pam_login = linux; From e5402a4baf44cd82e6b22b1e1f60133a02aa09c3 Mon Sep 17 00:00:00 2001 From: Rob Vermaas Date: Fri, 12 Apr 2013 19:04:39 +0200 Subject: [PATCH 11/31] webob needs ssl module --- pkgs/top-level/python-packages.nix | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/pkgs/top-level/python-packages.nix b/pkgs/top-level/python-packages.nix index b36b8a8362c7..79d2e7e684c1 100644 --- a/pkgs/top-level/python-packages.nix +++ b/pkgs/top-level/python-packages.nix @@ -4445,7 +4445,7 @@ pythonPackages = python.modules // rec { md5 = "11825b7074ba7043e157805e4e6e0f55"; }; - propagatedBuildInputs = [ nose ]; + propagatedBuildInputs = [ nose python.modules.ssl ]; meta = { description = "WSGI request and response object"; From b5d4db707cd065d0ab28f51e593ea75fcadccf49 Mon Sep 17 00:00:00 2001 From: Peter Simons Date: Thu, 11 Apr 2013 23:37:20 +0200 Subject: [PATCH 12/31] haskell-accelerate: update to version 0.12.2.0 --- pkgs/development/libraries/haskell/accelerate/default.nix | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/pkgs/development/libraries/haskell/accelerate/default.nix b/pkgs/development/libraries/haskell/accelerate/default.nix index 24f09f66d357..f4c70657caa9 100644 --- a/pkgs/development/libraries/haskell/accelerate/default.nix +++ b/pkgs/development/libraries/haskell/accelerate/default.nix @@ -2,8 +2,8 @@ cabal.mkDerivation (self: { pname = "accelerate"; - version = "0.12.1.0"; - sha256 = "1zvrb36xvvzfdl0k7a25329mdplwa76k9wk0yf3za3j0kb20d4f4"; + version = "0.12.2.0"; + sha256 = "1fv7d2prpkwy2gy0llafksayka76jv8c0sd66x6632gb586pfwgs"; meta = { homepage = "https://github.com/AccelerateHS/accelerate/"; description = "An embedded language for accelerated array processing"; From b577c76a938b0145f8426bdf4c95ee5f0b3227e3 Mon Sep 17 00:00:00 2001 From: Peter Simons Date: Thu, 11 Apr 2013 23:37:20 +0200 Subject: [PATCH 13/31] haskell-publicsuffixlist: update to version 0.1 --- .../libraries/haskell/publicsuffixlist/default.nix | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/pkgs/development/libraries/haskell/publicsuffixlist/default.nix b/pkgs/development/libraries/haskell/publicsuffixlist/default.nix index e42d0a2bc789..f61cb0f99a30 100644 --- a/pkgs/development/libraries/haskell/publicsuffixlist/default.nix +++ b/pkgs/development/libraries/haskell/publicsuffixlist/default.nix @@ -2,8 +2,8 @@ cabal.mkDerivation (self: { pname = "publicsuffixlist"; - version = "0.0.4"; - sha256 = "0qwx2739pmmjfy6w3iri1fgyin3295vzn6rvazh34qd89i5vi3pb"; + version = "0.1"; + sha256 = "0mbrmhgyjp8jms3fd3nq4knc4j97sw8ijrmnlfjs7qj8jw4vwzxk"; buildDepends = [ cereal dataDefault text utf8String ]; testDepends = [ cereal dataDefault HUnit idna text utf8String ]; meta = { From 5a711cbf42b397a0873754474f04c07e06d8f3d0 Mon Sep 17 00:00:00 2001 From: Peter Simons Date: Thu, 11 Apr 2013 23:37:20 +0200 Subject: [PATCH 14/31] haskell-wai-extra: update to version 1.3.4 --- .../libraries/haskell/wai-extra/default.nix | 22 +++++++++---------- 1 file changed, 11 insertions(+), 11 deletions(-) diff --git a/pkgs/development/libraries/haskell/wai-extra/default.nix b/pkgs/development/libraries/haskell/wai-extra/default.nix index ec1bd1d3b683..baaa6114ba68 100644 --- a/pkgs/development/libraries/haskell/wai-extra/default.nix +++ b/pkgs/development/libraries/haskell/wai-extra/default.nix @@ -1,19 +1,19 @@ -{ cabal, ansiTerminal, blazeBuilder, blazeBuilderConduit -, caseInsensitive, conduit, dataDefault, dateCache, fastLogger -, hspec, httpTypes, HUnit, network, resourcet, stringsearch, text -, time, transformers, void, wai, waiLogger, waiTest, zlib -, zlibBindings, zlibConduit +{ cabal, ansiTerminal, base64Bytestring, blazeBuilder +, blazeBuilderConduit, caseInsensitive, conduit, dataDefault +, dateCache, fastLogger, hspec, httpTypes, HUnit, network +, resourcet, stringsearch, text, time, transformers, void, wai +, waiLogger, waiTest, word8, zlib, zlibBindings, zlibConduit }: cabal.mkDerivation (self: { pname = "wai-extra"; - version = "1.3.3.2"; - sha256 = "0kw1v68a8dxpxg87r2vjah6n5906mw6cnyy2xx0jbk95qx5g5z8y"; + version = "1.3.4"; + sha256 = "1ay82q58pizc48rh4d8z7ybf2jjvzxqylj6mx34nvrxxlmxf5gfx"; buildDepends = [ - ansiTerminal blazeBuilder blazeBuilderConduit caseInsensitive - conduit dataDefault dateCache fastLogger httpTypes network - resourcet stringsearch text time transformers void wai waiLogger - zlibConduit + ansiTerminal base64Bytestring blazeBuilder blazeBuilderConduit + caseInsensitive conduit dataDefault dateCache fastLogger httpTypes + network resourcet stringsearch text time transformers void wai + waiLogger word8 zlibConduit ]; testDepends = [ blazeBuilder conduit dataDefault fastLogger hspec httpTypes HUnit From 84ff83878059c3917f23aa271f82edb4824c0d98 Mon Sep 17 00:00:00 2001 From: Peter Simons Date: Fri, 12 Apr 2013 21:33:37 +0200 Subject: [PATCH 15/31] emacs-prolog-mode: update to version 1.25 --- .../editors/emacs-modes/prolog/default.nix | 24 ++++++++++--------- 1 file changed, 13 insertions(+), 11 deletions(-) diff --git a/pkgs/applications/editors/emacs-modes/prolog/default.nix b/pkgs/applications/editors/emacs-modes/prolog/default.nix index b89951e65355..237b1ac14834 100644 --- a/pkgs/applications/editors/emacs-modes/prolog/default.nix +++ b/pkgs/applications/editors/emacs-modes/prolog/default.nix @@ -1,19 +1,21 @@ -{stdenv, fetchurl}: +{ stdenv, fetchurl }: -stdenv.mkDerivation -{ - name = "prolog-mode-1.22"; - src = fetchurl - { - url = "http://bruda.ca/emacs-prolog/prolog.el"; - sha256 = "f46915b2436642bb3302cb38cc457d3c121d0c3e95aecdf128fedc2ae5ea0c87"; +stdenv.mkDerivation { + name = "prolog-mode-1.25"; + + src = fetchurl { + url = "http://bruda.ca/_media/emacs/prolog.el"; + sha256 = "0hfd2dr3xc5qxgvc08nkb2l5a05hfldahdc6ymi9vd8798cc46yh"; }; - buildCommand = "install -v -D -m644 $src $out/share/emacs/site-lisp/prolog.el"; + buildCommand = '' + mkdir -p $out/share/emacs/site-lisp/ + cp $src $out/share/emacs/site-lisp/prolog.el + ''; meta = { - homepage = "http://turing.ubishops.ca/home/bruda/emacs-prolog/"; + homepage = "http://bruda.ca/emacs/prolog_mode_for_emacs/"; description = "Prolog mode for Emacs"; - license = "GPL"; + license = stdenv.lib.licenses.gpl2Plus; }; } From cdd57eb434f8451000dd3a869a96c10f4cc09a0f Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Llu=C3=ADs=20Batlle=20i=20Rossell?= Date: Fri, 12 Apr 2013 19:49:48 +0200 Subject: [PATCH 16/31] Adding silc-server. --- pkgs/servers/silc-server/default.nix | 18 ++++++++++++++++++ pkgs/top-level/all-packages.nix | 2 ++ 2 files changed, 20 insertions(+) create mode 100644 pkgs/servers/silc-server/default.nix diff --git a/pkgs/servers/silc-server/default.nix b/pkgs/servers/silc-server/default.nix new file mode 100644 index 000000000000..ee1aad3b11a6 --- /dev/null +++ b/pkgs/servers/silc-server/default.nix @@ -0,0 +1,18 @@ +{ stdenv, fetchurl }: + +stdenv.mkDerivation { + name = "silc-server-1.1.18"; + + src = fetchurl { + url = "http://silcnet.org/download/server/sources/silc-server-1.1.18.tar.bz2"; + sha256 = "0nr0hrwr4kbi611qazmrify7a27nzxb5n7d97f5i9cw3avxlw38s"; + }; + + meta = { + homepage = http://silcnet.org/; + description = "Secure Internet Live Conferencing server"; + license = "GPLv2"; + maintainers = with stdenv.lib.maintainers; [viric]; + platforms = with stdenv.lib.platforms; linux; + }; +} diff --git a/pkgs/top-level/all-packages.nix b/pkgs/top-level/all-packages.nix index eee598dfeec9..5bd1bb67bedb 100644 --- a/pkgs/top-level/all-packages.nix +++ b/pkgs/top-level/all-packages.nix @@ -6221,6 +6221,8 @@ let shadow = callPackage ../os-specific/linux/shadow { }; + silc_server = callPackage ../servers/silc-server { }; + splashutils = callPackage ../os-specific/linux/splashutils/default.nix { }; statifier = builderDefsPackage (import ../os-specific/linux/statifier) { }; From 5e6c0de6c9f1dfd31e58668ea04e08c41d23a452 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Llu=C3=ADs=20Batlle=20i=20Rossell?= Date: Fri, 12 Apr 2013 21:10:30 +0200 Subject: [PATCH 17/31] silc-server: Nicer fetchurl src. --- pkgs/servers/silc-server/default.nix | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/pkgs/servers/silc-server/default.nix b/pkgs/servers/silc-server/default.nix index ee1aad3b11a6..2afec801961c 100644 --- a/pkgs/servers/silc-server/default.nix +++ b/pkgs/servers/silc-server/default.nix @@ -1,10 +1,10 @@ { stdenv, fetchurl }: -stdenv.mkDerivation { +stdenv.mkDerivation rec { name = "silc-server-1.1.18"; src = fetchurl { - url = "http://silcnet.org/download/server/sources/silc-server-1.1.18.tar.bz2"; + url = "http://silcnet.org/download/server/sources/${name}.tar.bz2"; sha256 = "0nr0hrwr4kbi611qazmrify7a27nzxb5n7d97f5i9cw3avxlw38s"; }; From aaf0a34f2a3869b4f04205bfd4097fa57cf8ea47 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Llu=C3=ADs=20Batlle=20i=20Rossell?= Date: Fri, 12 Apr 2013 21:10:44 +0200 Subject: [PATCH 18/31] Adding silc-client as irssi plugin Alone, with its own irssi, doesn't build. --- .../silc-client/server_setup.patch | 28 +++++++++++++++++++ pkgs/top-level/all-packages.nix | 6 ++-- 2 files changed, 32 insertions(+), 2 deletions(-) create mode 100644 pkgs/applications/networking/instant-messengers/silc-client/server_setup.patch diff --git a/pkgs/applications/networking/instant-messengers/silc-client/server_setup.patch b/pkgs/applications/networking/instant-messengers/silc-client/server_setup.patch new file mode 100644 index 000000000000..466194c0a8fe --- /dev/null +++ b/pkgs/applications/networking/instant-messengers/silc-client/server_setup.patch @@ -0,0 +1,28 @@ +Add function to replace the behaviour of server_setup_find_port which was removed from irssi on revision 5125. Fixes bug #577501. +--- a/apps/irssi/src/silc/core/client_ops.c ++++ b/apps/irssi/src/silc/core/client_ops.c +@@ -2790,6 +2790,15 @@ + silc_free(a); + } + ++/* helper function to emulate server_setup_find_port */ ++static SERVER_SETUP_REC *silc_server_setup_find_port(const char *address, ++ int port) { ++ SERVER_SETUP_REC *rec; ++ ++ rec = server_setup_find(address, port, NULL); ++ return (rec == NULL || rec->port != port) ? NULL : rec; ++} ++ + /* Find authentication data by hostname and port. The hostname may be IP + address as well.*/ + +@@ -2811,7 +2820,7 @@ + + /* Check whether we find the password for this server in our + configuration. If it's set, always send it server. */ +- setup = server_setup_find_port(hostname, port); ++ setup = silc_server_setup_find_port(hostname, port); + if (setup && setup->password) { + completion(SILC_AUTH_PASSWORD, setup->password, strlen(setup->password), + context); diff --git a/pkgs/top-level/all-packages.nix b/pkgs/top-level/all-packages.nix index 5bd1bb67bedb..ed71e41787bb 100644 --- a/pkgs/top-level/all-packages.nix +++ b/pkgs/top-level/all-packages.nix @@ -1568,6 +1568,10 @@ let siege = callPackage ../tools/networking/siege {}; + silc_client = callPackage ../applications/networking/instant-messengers/silc-client { }; + + silc_server = callPackage ../servers/silc-server { }; + sleuthkit = callPackage ../tools/system/sleuthkit {}; slimrat = callPackage ../tools/networking/slimrat { @@ -6221,8 +6225,6 @@ let shadow = callPackage ../os-specific/linux/shadow { }; - silc_server = callPackage ../servers/silc-server { }; - splashutils = callPackage ../os-specific/linux/splashutils/default.nix { }; statifier = builderDefsPackage (import ../os-specific/linux/statifier) { }; From acf2979d9ca58c822923dac323ba8dd1ec7a83e6 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Llu=C3=ADs=20Batlle=20i=20Rossell?= Date: Fri, 12 Apr 2013 23:41:09 +0200 Subject: [PATCH 19/31] silc_client: Missing file --- .../silc-client/default.nix | 29 +++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 pkgs/applications/networking/instant-messengers/silc-client/default.nix diff --git a/pkgs/applications/networking/instant-messengers/silc-client/default.nix b/pkgs/applications/networking/instant-messengers/silc-client/default.nix new file mode 100644 index 000000000000..e34c177d7356 --- /dev/null +++ b/pkgs/applications/networking/instant-messengers/silc-client/default.nix @@ -0,0 +1,29 @@ +{ stdenv, fetchurl, perl, pkgconfig, glib, ncurses +, enablePlugin ? true }: + +stdenv.mkDerivation rec { + name = "silc-client-1.1.8" + stdenv.lib.optionalString enablePlugin "-irssi-plugin"; + + src = fetchurl { + url = "http://silcnet.org/download/server/sources/${name}.tar.bz2"; + sha256 = "1qnk35g8sbnfps3bq2k9sy0ymlsijh5n8z59m2ccq4pkmqbfqgv2"; + }; + + dontDisableStatic = true; + + patches = [ ./server_setup.patch ]; + + preConfigure = stdenv.lib.optionalString enablePlugin '' + configureFlags="$configureFlags --with-silc-plugin=$out/lib/irssi" + ''; + + buildInputs = [ perl pkgconfig glib ncurses ]; + + meta = { + homepage = http://silcnet.org/; + description = "Secure Internet Live Conferencing server"; + license = "GPLv2"; + maintainers = with stdenv.lib.maintainers; [viric]; + platforms = with stdenv.lib.platforms; linux; + }; +} From a0bbfe59dd1c44a6e802d8b2b04330e7eb5eeca0 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Llu=C3=ADs=20Batlle=20i=20Rossell?= Date: Fri, 12 Apr 2013 23:44:29 +0200 Subject: [PATCH 20/31] silc_client: error in url I should test better before push. --- .../instant-messengers/silc-client/default.nix | 9 ++++++--- 1 file changed, 6 insertions(+), 3 deletions(-) diff --git a/pkgs/applications/networking/instant-messengers/silc-client/default.nix b/pkgs/applications/networking/instant-messengers/silc-client/default.nix index e34c177d7356..bcfbd3dbce2d 100644 --- a/pkgs/applications/networking/instant-messengers/silc-client/default.nix +++ b/pkgs/applications/networking/instant-messengers/silc-client/default.nix @@ -1,11 +1,14 @@ { stdenv, fetchurl, perl, pkgconfig, glib, ncurses , enablePlugin ? true }: -stdenv.mkDerivation rec { - name = "silc-client-1.1.8" + stdenv.lib.optionalString enablePlugin "-irssi-plugin"; +let + basename = "silc-client-1.1.8"; +in +stdenv.mkDerivation { + name = basename + stdenv.lib.optionalString enablePlugin "-irssi-plugin"; src = fetchurl { - url = "http://silcnet.org/download/server/sources/${name}.tar.bz2"; + url = "http://silcnet.org/download/server/sources/${basename}.tar.bz2"; sha256 = "1qnk35g8sbnfps3bq2k9sy0ymlsijh5n8z59m2ccq4pkmqbfqgv2"; }; From 2080202a34ee79798fa1531ede3c514b94a0eae5 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Llu=C3=ADs=20Batlle=20i=20Rossell?= Date: Fri, 12 Apr 2013 23:48:29 +0200 Subject: [PATCH 21/31] silc_client: more url problems It was harder to test, after nix-prefetch-url. Damn it. --- .../networking/instant-messengers/silc-client/default.nix | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/pkgs/applications/networking/instant-messengers/silc-client/default.nix b/pkgs/applications/networking/instant-messengers/silc-client/default.nix index bcfbd3dbce2d..247c1dd6a2c5 100644 --- a/pkgs/applications/networking/instant-messengers/silc-client/default.nix +++ b/pkgs/applications/networking/instant-messengers/silc-client/default.nix @@ -8,7 +8,7 @@ stdenv.mkDerivation { name = basename + stdenv.lib.optionalString enablePlugin "-irssi-plugin"; src = fetchurl { - url = "http://silcnet.org/download/server/sources/${basename}.tar.bz2"; + url = "http://silcnet.org/download/client/sources/${basename}.tar.bz2"; sha256 = "1qnk35g8sbnfps3bq2k9sy0ymlsijh5n8z59m2ccq4pkmqbfqgv2"; }; From 715691eb970d741fd81d48d13ad4c2c094746068 Mon Sep 17 00:00:00 2001 From: Peter Simons Date: Fri, 12 Apr 2013 22:04:56 +0200 Subject: [PATCH 22/31] haskell-github: update to version 0.6.0 --- .../libraries/haskell/github/default.nix | 13 ++++--------- 1 file changed, 4 insertions(+), 9 deletions(-) diff --git a/pkgs/development/libraries/haskell/github/default.nix b/pkgs/development/libraries/haskell/github/default.nix index 3eafcd70940e..890636e21501 100644 --- a/pkgs/development/libraries/haskell/github/default.nix +++ b/pkgs/development/libraries/haskell/github/default.nix @@ -1,23 +1,18 @@ -{ cabal, fetchurl, aeson, attoparsec, caseInsensitive, conduit, dataDefault +{ cabal, aeson, attoparsec, caseInsensitive, conduit, dataDefault , failure, HTTP, httpConduit, httpTypes, network, text, time , unorderedContainers, vector }: cabal.mkDerivation (self: { pname = "github"; - version = "0.5.0-patched"; - src = fetchurl { - url = "https://github.com/mike-burns/github/archive/df415af64ebd4a28f1f8e5cc726e933545efdd7e.tar.gz"; - sha256 = "1d1ya5j1qz1nf5kfkxp48gb0xbcr4fmf9y0kfpd3gxivfrdkfrig"; - name = "github-${self.version}.tar.gz"; - }; - patches = [ (fetchurl { url = "https://github.com/mike-burns/github/pull/33.patch"; sha256 = "1d0m73ygzpk5rd6ahbrf58mxca56s5sd70yrf7fn2r1bh0rlacap"; }) ]; + version = "0.6.0"; + sha256 = "1bg443rhh57p10q9dwx4aa2964qwg00swmdlvh1r72c343lrv1gj"; buildDepends = [ aeson attoparsec caseInsensitive conduit dataDefault failure HTTP httpConduit httpTypes network text time unorderedContainers vector ]; meta = { - homepage = "https://github.com/mike-burns/github"; + homepage = "https://github.com/fpco/github"; description = "Access to the Github API, v3"; license = self.stdenv.lib.licenses.bsd3; platforms = self.ghc.meta.platforms; From 1bec0e5a34b601da0e0c022be06cda2d4ea9aef0 Mon Sep 17 00:00:00 2001 From: Peter Simons Date: Fri, 12 Apr 2013 22:04:56 +0200 Subject: [PATCH 23/31] haskell-cabal-dev: update to version 0.9.2 --- .../tools/haskell/cabal-dev/default.nix | 14 +++++--------- 1 file changed, 5 insertions(+), 9 deletions(-) diff --git a/pkgs/development/tools/haskell/cabal-dev/default.nix b/pkgs/development/tools/haskell/cabal-dev/default.nix index df7f728c752d..fef9892bce82 100644 --- a/pkgs/development/tools/haskell/cabal-dev/default.nix +++ b/pkgs/development/tools/haskell/cabal-dev/default.nix @@ -1,19 +1,15 @@ -{ cabal, fetchurl, Cabal, cabalInstall, filepath, HTTP, mtl, network, tar -, transformers, zlib, setenv +{ cabal, Cabal, cabalInstall, filepath, HTTP, mtl, network, setenv +, tar, transformers, zlib }: cabal.mkDerivation (self: { pname = "cabal-dev"; - version = "0.9.1-git"; - src = fetchurl { - url = "https://github.com/creswick/cabal-dev/archive/54e7d93d5b309c56192c146c7a807ac3591bc464.tar.gz"; - sha256 = "1isi02jik0vrg48l7r2mj4cf9ms6hpxxz1mmhl7s3kkxx775cxj9"; - name = "${self.name}.tar.gz"; - }; + version = "0.9.2"; + sha256 = "1372bpn8s7d7nm01ggp3m98ldrynidbchk3p14yrjysvxwr3l6q8"; isLibrary = false; isExecutable = true; buildDepends = [ - Cabal filepath HTTP mtl network tar transformers zlib setenv + Cabal filepath HTTP mtl network setenv tar transformers zlib ]; buildTools = [ cabalInstall ]; meta = { From 0b4e664a240018d4e3458c5beac0e0a3168ba3a5 Mon Sep 17 00:00:00 2001 From: Peter Simons Date: Fri, 12 Apr 2013 22:06:55 +0200 Subject: [PATCH 24/31] git-annex: update to version 4.20130405 --- .../version-management/git-and-tools/git-annex/default.nix | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/pkgs/applications/version-management/git-and-tools/git-annex/default.nix b/pkgs/applications/version-management/git-and-tools/git-annex/default.nix index 697e7d3b42e0..cf53ce3191e5 100644 --- a/pkgs/applications/version-management/git-and-tools/git-annex/default.nix +++ b/pkgs/applications/version-management/git-and-tools/git-annex/default.nix @@ -10,14 +10,14 @@ }: let - version = "4.20130314"; + version = "4.20130405"; in stdenv.mkDerivation { name = "git-annex-${version}"; src = fetchurl { url = "http://git.kitenet.net/?p=git-annex.git;a=snapshot;sf=tgz;h=${version}"; - sha256 = "0rwirg9qdbd75c7wl6413blv9045sbxmw20idvbm47qc4q14gzv9"; + sha256 = "13lzkvk5095qj8026lc1p56w0q1c95v7nx8g9p9zrf8mhx6yxb9n"; name = "git-annex-${version}.tar.gz"; }; From 7b6a4238b1b77902b98ad91f50e7c6538eb8a59c Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Llu=C3=ADs=20Batlle=20i=20Rossell?= Date: Sat, 13 Apr 2013 00:24:25 +0200 Subject: [PATCH 25/31] silc-client: the irssi plugin segfaults on join, with current irssi. I fix and make it build the standalone client. --- .../networking/instant-messengers/silc-client/default.nix | 7 ++++++- 1 file changed, 6 insertions(+), 1 deletion(-) diff --git a/pkgs/applications/networking/instant-messengers/silc-client/default.nix b/pkgs/applications/networking/instant-messengers/silc-client/default.nix index 247c1dd6a2c5..a4035604168f 100644 --- a/pkgs/applications/networking/instant-messengers/silc-client/default.nix +++ b/pkgs/applications/networking/instant-messengers/silc-client/default.nix @@ -1,5 +1,8 @@ { stdenv, fetchurl, perl, pkgconfig, glib, ncurses -, enablePlugin ? true }: +, enablePlugin ? false }: + +# Enabling the plugin and using it with a recent irssi, segafults on join: +# http://marc.info/?l=silc-devel&m=125610477802211 let basename = "silc-client-1.1.8"; @@ -16,6 +19,8 @@ stdenv.mkDerivation { patches = [ ./server_setup.patch ]; + configureFlags = "--with-ncurses=${ncurses}"; + preConfigure = stdenv.lib.optionalString enablePlugin '' configureFlags="$configureFlags --with-silc-plugin=$out/lib/irssi" ''; From dc50bd550a01be459eea21452a4bba04672d7c52 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Llu=C3=ADs=20Batlle=20i=20Rossell?= Date: Sat, 13 Apr 2013 01:35:16 +0200 Subject: [PATCH 26/31] Adding fish (blowfish over irc) for irssi. --- .../networking/irc/irssi/fish/default.nix | 31 +++++++++++++++++++ pkgs/top-level/all-packages.nix | 2 ++ 2 files changed, 33 insertions(+) create mode 100644 pkgs/applications/networking/irc/irssi/fish/default.nix diff --git a/pkgs/applications/networking/irc/irssi/fish/default.nix b/pkgs/applications/networking/irc/irssi/fish/default.nix new file mode 100644 index 000000000000..98d5afa0ba9f --- /dev/null +++ b/pkgs/applications/networking/irc/irssi/fish/default.nix @@ -0,0 +1,31 @@ +{ stdenv, fetchurl, irssi, gmp, automake, autoconf, libtool, openssl, glib, pkgconfig }: + +stdenv.mkDerivation rec { + name = "fish-irssi-20130413-e98156bebd"; + + src = fetchurl { + url = https://github.com/falsovsky/FiSH-irssi/tarball/e98156bebd; + name = "${name}.tar.gz"; + sha256 = "1ndr51qrg66h1mfzacwzl1vd6lj39pdc4p4z5iihrj4r2f6gk11a"; + }; + + preConfigure = '' + tar xf ${irssi.src} + configureFlags="$configureFlags --with-irssi-source=`pwd`/${irssi.name}" + + ./regen.sh + ''; + + installPhase = '' + ensureDir $out/lib/irssi/modules + cp src/.libs/libfish.so $out/lib/irssi/modules + ''; + + buildInputs = [ gmp automake autoconf libtool openssl glib pkgconfig ]; + + meta = { + homepage = https://github.com/falsovsky/FiSH-irssi; + license = "unfree"; # I can't find any mention of license + maintainers = with stdenv.lib.maintainers; [viric]; + }; +} diff --git a/pkgs/top-level/all-packages.nix b/pkgs/top-level/all-packages.nix index ed71e41787bb..0181cfece49b 100644 --- a/pkgs/top-level/all-packages.nix +++ b/pkgs/top-level/all-packages.nix @@ -7304,6 +7304,8 @@ let irssi = callPackage ../applications/networking/irc/irssi { }; + irssi_fish = callPackage ../applications/networking/irc/irssi/fish { }; + bip = callPackage ../applications/networking/irc/bip { }; jack_capture = callPackage ../applications/audio/jack-capture { }; From a27001f09f914f40aa72d696dff6e96c11a7d912 Mon Sep 17 00:00:00 2001 From: Florian Friesdorf Date: Sat, 13 Apr 2013 08:42:23 +0200 Subject: [PATCH 27/31] python-py and python-tox, the latter still broken --- pkgs/top-level/python-packages.nix | 25 +++++++++++++++++++++++++ 1 file changed, 25 insertions(+) diff --git a/pkgs/top-level/python-packages.nix b/pkgs/top-level/python-packages.nix index 79d2e7e684c1..a2ea04d99f23 100644 --- a/pkgs/top-level/python-packages.nix +++ b/pkgs/top-level/python-packages.nix @@ -2970,6 +2970,16 @@ pythonPackages = python.modules // rec { }; + py = buildPythonPackage rec { + name = "py-1.4.13"; + + src = fetchurl { + url = "https://pypi.python.org/packages/source/p/py/py-1.4.13.tar.gz"; + md5 = "3857dc8309d5f284669b81184253c2bb"; + }; + }; + + pyasn1 = buildPythonPackage ({ name = "pyasn1-0.0.11a"; @@ -4189,6 +4199,21 @@ pythonPackages = python.modules // rec { }; + # TODO + # py.error.EACCES: [Permission denied]: mkdir('/homeless-shelter',) + # builder for `/nix/store/0czwg0n3pfkmpjphqv1jxfjlgkbziwsx-python-tox-1.4.3.drv' failed with exit code 1 + # tox = buildPythonPackage rec { + # name = "tox-1.4.3"; + # + # buildInputs = [ py virtualenv ]; + # + # src = fetchurl { + # url = "https://pypi.python.org/packages/source/t/tox/tox-1.4.3.tar.gz"; + # md5 = "3727d5b0600d92edf2229a7ce6a0f752"; + # }; + # }; + + trac = buildPythonPackage { name = "trac-0.12.2"; From da0694932c2945bdc95e097abc6a0b2849028d69 Mon Sep 17 00:00:00 2001 From: Florian Friesdorf Date: Sat, 13 Apr 2013 09:52:50 +0200 Subject: [PATCH 28/31] on the way to #463: make pythonPackages self-referential --- pkgs/top-level/python-packages.nix | 134 ++++++++++++++++++----------- 1 file changed, 86 insertions(+), 48 deletions(-) diff --git a/pkgs/top-level/python-packages.nix b/pkgs/top-level/python-packages.nix index a2ea04d99f23..b5d3f5037418 100644 --- a/pkgs/top-level/python-packages.nix +++ b/pkgs/top-level/python-packages.nix @@ -110,7 +110,7 @@ pythonPackages = python.modules // rec { sha256 = "74926d9ddfa69534cfbd08a82f0acccab2c649558062654d5d2ff2999d201384"; }; - propagatedBuildInputs = [ notmuch pkgs.dbacl ]; + propagatedBuildInputs = [ pythonPackages.notmuch pkgs.dbacl ]; # error: invalid command 'test' doCheck = false; @@ -139,34 +139,34 @@ pythonPackages = python.modules // rec { buildInputs = [ pkgs.which pkgs.unzip - coverage - mock - tissue - unittest2 - webtest + pythonPackages.coverage + pythonPackages.mock + pythonPackages.tissue + pythonPackages.unittest2 + pythonPackages.webtest ]; propagatedBuildInputs = [ pkgs.makeWrapper pkgs.bacula - colander - deform - deform_bootstrap - docutils - nose - mysql_connector_repackaged - pg8000 - pyramid - pyramid_beaker - pyramid_exclog - pyramid_jinja2 - pyramid_tm - pytz - sqlalchemy - transaction - waitress - webhelpers - zope_sqlalchemy + pythonPackages.colander + pythonPackages.deform + pythonPackages.deform_bootstrap + pythonPackages.docutils + pythonPackages.nose + pythonPackages.mysql_connector_repackaged + pythonPackages.pg8000 + pythonPackages.pyramid + pythonPackages.pyramid_beaker + pythonPackages.pyramid_exclog + pythonPackages.pyramid_jinja2 + pythonPackages.pyramid_tm + pythonPackages.pytz + pythonPackages.sqlalchemy + pythonPackages.transaction + pythonPackages.waitress + pythonPackages.webhelpers + pythonPackages.zope_sqlalchemy ]; postInstall = '' @@ -196,7 +196,14 @@ pythonPackages = python.modules // rec { # error: invalid command 'test' doCheck = false; - propagatedBuildInputs = [ notmuch urwid twisted magic configobj pygpgme ]; + propagatedBuildInputs = + [ pythonPackages.notmuch + pythonPackages.urwid + pythonPackages.twisted + pythonPackages.magic + pythonPackages.configobj + pythonPackages.pygpgme + ]; postInstall = '' wrapProgram $out/bin/alot \ @@ -219,7 +226,7 @@ pythonPackages = python.modules // rec { md5 = "2b53b5d53fc40af4da7268d3c3e35a50"; }; - buildInputs = [ nose ]; + buildInputs = [ pythonPackages.nose ]; meta = { homepage = http://pypi.python.org/pypi/anyjson/; @@ -280,7 +287,7 @@ pythonPackages = python.modules // rec { # error: invalid command 'test' doCheck = false; - propagatedBuildInputs = [ boto ]; + propagatedBuildInputs = [ pythonPackages.boto ]; }); @@ -316,6 +323,7 @@ pythonPackages = python.modules // rec { }; }); + awscli = buildPythonPackage rec { name = "awscli-0.8.3"; namePrefix = ""; @@ -325,8 +333,11 @@ pythonPackages = python.modules // rec { sha256 = "0v7igh00zja560v8qz315g3m7x9six1hprrrb10cpp9sy8n58xnn"; }; - propagatedBuildInputs = [ argparse botocore colorama ]; - + propagatedBuildInputs = + [ pythonPackages.argparse + pythonPackages.botocore + pythonPackages.colorama + ]; }; @@ -376,7 +387,13 @@ pythonPackages = python.modules // rec { md5 = "c2e102870ed4c53104dec48ceadf8e9d"; }; - buildInputs = [ sqlalchemy pycryptopp nose mock webtest ]; + buildInputs = + [ pythonPackages.sqlalchemy + pythonPackages.pycryptopp + pythonPackages.nose + pythonPackages.mock + pythonPackages.webtest + ]; # http://hydra.nixos.org/build/4511591/log/raw doCheck = false; @@ -402,7 +419,15 @@ pythonPackages = python.modules // rec { # tests depend on $HOME setting configurePhase = "export HOME=$TMPDIR"; - propagatedBuildInputs = [ pyyaml unidecode mutagen munkres musicbrainzngs python.modules.sqlite3 python.modules.readline ]; + propagatedBuildInputs = + [ pythonPackages.pyyaml + pythonPackages.unidecode + pythonPackages.mutagen + pythonPackages.munkres + pythonPackages.musicbrainzngs + python.modules.sqlite3 + python.modules.readline + ]; meta = { homepage = http://beets.radbox.org; @@ -475,7 +500,11 @@ pythonPackages = python.modules // rec { sha256 = "0dbm2clrh7zs4brqqj3xssz3nymdg24ff2lww27s3wliirwqdiv1"; }; - propagatedBuildInputs = [ dateutil requests jmespath ]; + propagatedBuildInputs = + [ pythonPackages.dateutil + pythonPackages.requests + pythonPackages.jmespath + ]; meta = { homepage = https://github.com/boto/botocore; @@ -496,7 +525,7 @@ pythonPackages = python.modules // rec { # rev = "refs/tags/0.9.3"; # }; # - # propagatedBuildInputs = [ argparse python.modules.ssl ]; + # propagatedBuildInputs = [ pythonPackages.argparse python.modules.ssl ]; # # doCheck = false; # @@ -559,9 +588,12 @@ pythonPackages = python.modules // rec { md5 = "530a0614de3a669314c3acd4995c54d5"; }; - buildInputs = [ nose ]; + buildInputs = [ pythonPackages.nose ]; - propagatedBuildInputs = [ amqplib anyjson ]; + propagatedBuildInputs = + [ pythonPackages.amqplib + pythonPackages.anyjson + ]; doCheck = false; # depends on the network @@ -581,7 +613,7 @@ pythonPackages = python.modules // rec { md5 = "853917116e731afbc8c8a43c37e6ddba"; }; - propagatedBuildInputs = [ markdown ]; + propagatedBuildInputs = [ pythonPackages.markdown ]; meta = { homepage = http://www.cheetahtemplate.org/; @@ -616,7 +648,7 @@ pythonPackages = python.modules // rec { sha256 = "16vibfxms5z4ld8gbkra6dkhqm2cc3jnn0fwp7mw70nlwxnmm51c"; }; - buildInputs = [ mock nose decorator ]; + buildInputs = [ pythonPackages.mock pythonPackages.nose pythonPackages.decorator ]; meta = { homepage = http://code.google.com/p/clepy/; @@ -651,7 +683,7 @@ pythonPackages = python.modules // rec { md5 = "308c6e38917bdbfc4d3b0783c614897d"; }; - propagatedBuildInputs = [ clientform ]; + propagatedBuildInputs = [ pythonPackages.clientform ]; doCheck = false; @@ -671,9 +703,9 @@ pythonPackages = python.modules // rec { md5 = "5f39727415b837abd02651eeb2721749"; }; - propagatedBuildInputs = [ stompclient distribute ]; + propagatedBuildInputs = [ pythonPackages.stompclient pythonPackages.distribute ]; - buildInputs = [ coverage sqlalchemy ]; + buildInputs = [ pythonPackages.coverage pythonPackages.sqlalchemy ]; # ValueError: Could not parse auth file: # /tmp/nix-build-.../CoilMQ-0.6.1/coilmq/tests/resources/auth.ini @@ -695,7 +727,7 @@ pythonPackages = python.modules // rec { md5 = "2d9f65a64cb6b7f35d6a0d7b607ce4c6"; }; - propagatedBuildInputs = [ translationstring ]; + propagatedBuildInputs = [ pythonPackages.translationstring ]; meta = { maintainers = [ @@ -750,7 +782,7 @@ pythonPackages = python.modules // rec { meta = { description = "plugin core for use by pytest-cov, nose-cov and nose2-cov"; }; - propagatedBuildInputs = [ coverage ]; + propagatedBuildInputs = [ pythonPackages.coverage ]; }; cssselect = buildPythonPackage rec { @@ -771,7 +803,7 @@ pythonPackages = python.modules // rec { sha256 = "139yfm9yz9k33kgqw4khsljs10rkhhxyywbq9i82bh2r31cil1pp"; }; - buildInputs = [ pkgs.unzip mock ]; + buildInputs = [ pkgs.unzip pythonPackages.mock ]; # couple of failing tests doCheck = false; @@ -793,7 +825,7 @@ pythonPackages = python.modules // rec { md5 = "94ca7e8c9ea0f69c0f3fc6f9fc88f65a"; }; - buildInputs = [ mock ]; + buildInputs = [ pythonPackages.mock ]; # Note: We don't actually need to provide Darcs as a build input. # Darcsver will DTRT when Darcs isn't available. See news.gmane.org @@ -821,7 +853,7 @@ pythonPackages = python.modules // rec { sha256 = "1vlx0lpsxjxz64pz87csx800cwfqznjyr2y7nk3vhmzhkwzyqi2c"; }; - propagatedBuildInputs = [ six ]; + propagatedBuildInputs = [ pythonPackages.six ]; meta = { description = "Powerful extensions to the standard datetime module"; @@ -853,7 +885,13 @@ pythonPackages = python.modules // rec { md5 = "2ed7b69644a6d8f4e1404e1892329240"; }; - propagatedBuildInputs = [ beautifulsoup4 peppercorn colander translationstring chameleon ]; + propagatedBuildInputs = + [ pythonPackages.beautifulsoup4 + pythonPackages.peppercorn + pythonPackages.colander + pythonPackages.translationstring + pythonPackages.chameleon + ]; meta = { maintainers = [ @@ -1858,7 +1896,7 @@ pythonPackages = python.modules // rec { url = "http://pypi.python.org/packages/source/i/ipdb/ipdb-0.7.tar.gz"; md5 = "d879f9b2b0f26e0e999809585dcaec61"; }; - propagatedBuildInputs = [ ipython ]; + propagatedBuildInputs = [ pythonPackages.ipython ]; }; ipdbplugin = buildPythonPackage { @@ -1867,7 +1905,7 @@ pythonPackages = python.modules // rec { url = "https://pypi.python.org/packages/source/i/ipdbplugin/ipdbplugin-1.2.tar.gz"; md5 = "39169b00a2186b99469249c5b0613753"; }; - propagatedBuildInputs = [ nose ipython ]; + propagatedBuildInputs = [ pythonPackages.nose pythonPackages.ipython ]; }; From 2cb87d9ca140928c1817e476843a1d46ab4e217d Mon Sep 17 00:00:00 2001 From: Florian Friesdorf Date: Sat, 13 Apr 2013 10:02:17 +0200 Subject: [PATCH 29/31] pythonPackages.ipythonLight: no qt/numpy dependency --- pkgs/top-level/all-packages.nix | 2 ++ pkgs/top-level/python-packages.nix | 10 +++++++++- 2 files changed, 11 insertions(+), 1 deletion(-) diff --git a/pkgs/top-level/all-packages.nix b/pkgs/top-level/all-packages.nix index 0181cfece49b..f7fc18ff3d08 100644 --- a/pkgs/top-level/all-packages.nix +++ b/pkgs/top-level/all-packages.nix @@ -5308,11 +5308,13 @@ let # regardless. python26Packages = import ./python-packages.nix { inherit pkgs; + inherit (lib) lowPrio; python = python26; }; python27Packages = recurseIntoAttrs (import ./python-packages.nix { inherit pkgs; + inherit (lib) lowPrio; python = python27; }); diff --git a/pkgs/top-level/python-packages.nix b/pkgs/top-level/python-packages.nix index b5d3f5037418..b6b519496f99 100644 --- a/pkgs/top-level/python-packages.nix +++ b/pkgs/top-level/python-packages.nix @@ -1,4 +1,4 @@ -{ pkgs, python }: +{ pkgs, python, lowPrio }: let isPy26 = python.majorVersion == "2.6"; @@ -53,6 +53,14 @@ pythonPackages = python.modules // rec { inherit buildPythonPackage pythonPackages; }; + ipythonLight = lowPrio (import ../shells/ipython { + inherit (pkgs) stdenv fetchurl; + inherit buildPythonPackage pythonPackages; + qtconsoleSupport = false; + pylabSupport = false; + pylabQtSupport = false; + }); + pil = import ../development/python-modules/pil { inherit (pkgs) fetchurl stdenv libjpeg zlib freetype; inherit python buildPythonPackage; From 26431c19cbfb8302e2a11cec2ae743bc73386d8a Mon Sep 17 00:00:00 2001 From: aszlig Date: Fri, 12 Apr 2013 20:32:35 +0200 Subject: [PATCH 30/31] virtualbox+guest: Update to new upstream v4.2.12. All patch files dropped because they're fixed in this release. For a full list of fixes that come with this maintenance release, please refer to: https://www.virtualbox.org/wiki/Changelog Signed-off-by: aszlig --- .../virtualbox/build_fix_3.9.0.patch | 22 ------ .../virtualization/virtualbox/default.nix | 13 ++-- .../virtualbox/guest-additions/default.nix | 4 +- .../virtualbox/strict_types.patch | 68 ------------------- 4 files changed, 6 insertions(+), 101 deletions(-) delete mode 100644 pkgs/applications/virtualization/virtualbox/build_fix_3.9.0.patch delete mode 100644 pkgs/applications/virtualization/virtualbox/strict_types.patch diff --git a/pkgs/applications/virtualization/virtualbox/build_fix_3.9.0.patch b/pkgs/applications/virtualization/virtualbox/build_fix_3.9.0.patch deleted file mode 100644 index 2c3cdebacde8..000000000000 --- a/pkgs/applications/virtualization/virtualbox/build_fix_3.9.0.patch +++ /dev/null @@ -1,22 +0,0 @@ -commit d725168153e3dc5a383b12e0bf9af9b6244ad3eb -Author: vboxsync -Date: Thu Feb 28 13:46:12 2013 +0000 - - Linux 3.9.0 rc0 compile fix - - git-svn-id: http://www.virtualbox.org/svn/vbox/trunk@44867 cfe28804-0f27-0410-a406-dd0f0b0b656f - -diff --git a/src/VBox/Runtime/r0drv/linux/the-linux-kernel.h b/src/VBox/Runtime/r0drv/linux/the-linux-kernel.h -index ec9b502..7a208d1 100644 ---- a/src/VBox/Runtime/r0drv/linux/the-linux-kernel.h -+++ b/src/VBox/Runtime/r0drv/linux/the-linux-kernel.h -@@ -90,6 +90,9 @@ - #include - #include - #include -+#if LINUX_VERSION_CODE >= KERNEL_VERSION(3, 9, 0) -+# include -+#endif - #if LINUX_VERSION_CODE >= KERNEL_VERSION(2, 6, 7) - # include - #endif diff --git a/pkgs/applications/virtualization/virtualbox/default.nix b/pkgs/applications/virtualization/virtualbox/default.nix index d385d431fa39..3dd020dfa105 100644 --- a/pkgs/applications/virtualization/virtualbox/default.nix +++ b/pkgs/applications/virtualization/virtualbox/default.nix @@ -11,8 +11,8 @@ with stdenv.lib; let - version = "4.2.8"; - extpackRevision = "83876"; + version = "4.2.12"; + extpackRevision = "84980"; forEachModule = action: '' for mod in \ @@ -35,7 +35,7 @@ let name = "Oracle_VM_VirtualBox_Extension_Pack-${version}-${extpackRevision}" + ".vbox-extpack"; # Has to be base16 because it's used as an input to VBoxExtPackHelperApp! - sha256 = "fa579416f382b58c4e93d3740d076ceba728e28d987e51aced5865a46cb9111c"; + sha256 = "ad15a92e49095c2115bd1793b3b957d3eaf44af0f5d24bb53d6b4fc81c3e2fc4"; url = "https://www.virtualbox.org/wiki/Downloads"; }; @@ -44,7 +44,7 @@ in stdenv.mkDerivation { src = fetchurl { url = "http://download.virtualbox.org/virtualbox/${version}/VirtualBox-${version}.tar.bz2"; - sha256 = "f336af12244db74e6564dc22e438bbcba70f994aaf0d117fdf70caca9fab1b78"; + sha256 = "eb65ecac94f63d6292a967d39cb5e28326404c10d0e8c2c50399eedb59c17ee6"; }; buildInputs = @@ -54,11 +54,6 @@ in stdenv.mkDerivation { ++ optional javaBindings jdk ++ optional pythonBindings python; - patches = [ - ./strict_types.patch - ./build_fix_3.9.0.patch - ]; - prePatch = '' set -x MODULES_BUILD_DIR=`echo ${kernelDev}/lib/modules/*/build` diff --git a/pkgs/applications/virtualization/virtualbox/guest-additions/default.nix b/pkgs/applications/virtualization/virtualbox/guest-additions/default.nix index 20ef5c66997b..f3d7c18a2c69 100644 --- a/pkgs/applications/virtualization/virtualbox/guest-additions/default.nix +++ b/pkgs/applications/virtualization/virtualbox/guest-additions/default.nix @@ -2,14 +2,14 @@ , libX11, libXt, libXext, libXmu, libXcomposite, libXfixes, libXrandr, libXcursor , dbus }: -let version = "4.2.8"; in +let version = "4.2.12"; in stdenv.mkDerivation { name = "VirtualBox-GuestAdditions-${version}-${kernelDev.version}"; src = fetchurl { url = "http://download.virtualbox.org/virtualbox/${version}/VBoxGuestAdditions_${version}.iso"; - sha256 = "04a5402d8dcdefc83ffb2785351ddc57758781a3759137974469189392ae4ad5"; + sha256 = "aed4730b643aca8daa0829e1122b7c8d592b9f6cea902a98e390c4d22373dfb8"; }; KERN_DIR = "${kernelDev}/lib/modules/*/build"; diff --git a/pkgs/applications/virtualization/virtualbox/strict_types.patch b/pkgs/applications/virtualization/virtualbox/strict_types.patch deleted file mode 100644 index 18ccc77f9b16..000000000000 --- a/pkgs/applications/virtualization/virtualbox/strict_types.patch +++ /dev/null @@ -1,68 +0,0 @@ -diff --git a/src/VBox/HostDrivers/Support/linux/SUPDrv-linux.c b/src/VBox/HostDrivers/Support/linux/SUPDrv-linux.c -index 9cc124c..d86da0c 100644 ---- a/src/VBox/HostDrivers/Support/linux/SUPDrv-linux.c -+++ b/src/VBox/HostDrivers/Support/linux/SUPDrv-linux.c -@@ -253,7 +253,11 @@ static struct platform_device gPlatformDevice = - DECLINLINE(RTUID) vboxdrvLinuxUid(void) - { - #if LINUX_VERSION_CODE >= KERNEL_VERSION(2, 6, 29) -+# ifdef CONFIG_UIDGID_STRICT_TYPE_CHECKS -+ return from_kuid(current_user_ns(), current_uid()); -+# else - return current->cred->uid; -+# endif - #else - return current->uid; - #endif -@@ -262,7 +266,11 @@ DECLINLINE(RTUID) vboxdrvLinuxUid(void) - DECLINLINE(RTGID) vboxdrvLinuxGid(void) - { - #if LINUX_VERSION_CODE >= KERNEL_VERSION(2, 6, 29) -+# ifdef CONFIG_UIDGID_STRICT_TYPE_CHECKS -+ return from_kgid(current_user_ns(), current_gid()); -+# else - return current->cred->gid; -+# endif - #else - return current->gid; - #endif -@@ -271,7 +279,11 @@ DECLINLINE(RTGID) vboxdrvLinuxGid(void) - DECLINLINE(RTUID) vboxdrvLinuxEuid(void) - { - #if LINUX_VERSION_CODE >= KERNEL_VERSION(2, 6, 29) -+# ifdef CONFIG_UIDGID_STRICT_TYPE_CHECKS -+ return from_kuid(current_user_ns(), current_euid()); -+# else - return current->cred->euid; -+# endif - #else - return current->euid; - #endif -diff --git a/src/VBox/HostDrivers/VBoxPci/linux/VBoxPci-linux.c b/src/VBox/HostDrivers/VBoxPci/linux/VBoxPci-linux.c -index 575f739..8909e79 100644 ---- a/src/VBox/HostDrivers/VBoxPci/linux/VBoxPci-linux.c -+++ b/src/VBox/HostDrivers/VBoxPci/linux/VBoxPci-linux.c -@@ -429,7 +429,11 @@ int vboxPciOsDevDetachHostDriver(PVBOXRAWPCIINS pIns) - if (!pNewCreds) - goto done; - -+# ifdef CONFIG_UIDGID_STRICT_TYPE_CHECKS -+ pNewCreds->fsuid = GLOBAL_ROOT_UID;; -+# else - pNewCreds->fsuid = 0; -+# endif - pOldCreds = override_creds(pNewCreds); - #endif - -@@ -539,7 +543,11 @@ int vboxPciOsDevReattachHostDriver(PVBOXRAWPCIINS pIns) - if (!pNewCreds) - goto done; - -+# ifdef CONFIG_UIDGID_STRICT_TYPE_CHECKS -+ pNewCreds->fsuid = GLOBAL_ROOT_UID;; -+# else - pNewCreds->fsuid = 0; -+# endif - pOldCreds = override_creds(pNewCreds); - #endif - RTStrPrintf(szFileBuf, cMaxBuf, From a3fce096afcada408425f2798ebe1dfa13ac80e7 Mon Sep 17 00:00:00 2001 From: aszlig Date: Fri, 12 Apr 2013 20:36:43 +0200 Subject: [PATCH 31/31] chromium: Update all channels to latest versions. stable: 26.0.1410.43 -> 26.0.1410.63 (builds fine, tested) beta/dev: 27.0.1453.15/27.0.1453.12 -> 27.0.1453.47 (builds fine, tested) This should bring beta and dev in par, as dev was older than the beta version. Signed-off-by: aszlig --- .../networking/browsers/chromium/sources.nix | 18 +++++++++--------- 1 file changed, 9 insertions(+), 9 deletions(-) diff --git a/pkgs/applications/networking/browsers/chromium/sources.nix b/pkgs/applications/networking/browsers/chromium/sources.nix index bbdbd4cfeb8a..b1f145bbbe8e 100644 --- a/pkgs/applications/networking/browsers/chromium/sources.nix +++ b/pkgs/applications/networking/browsers/chromium/sources.nix @@ -1,18 +1,18 @@ # This file is autogenerated from update.sh in the same directory. { dev = { - version = "27.0.1453.12"; - url = "http://commondatastorage.googleapis.com/chromium-browser-official/chromium-27.0.1453.12.tar.xz"; - sha256 = "1b2vkcynljl799m41aabdsj9k2plchiga6bi4ah3hc0mwyj0lyl7"; + version = "27.0.1453.47"; + url = "http://commondatastorage.googleapis.com/chromium-browser-official/chromium-27.0.1453.47.tar.xz"; + sha256 = "0dyyxdn75a6b35a7wv9xqzcnskbcxj19bmfd7cq9ya5jdhcvy9j9"; }; beta = { - version = "27.0.1453.15"; - url = "http://commondatastorage.googleapis.com/chromium-browser-official/chromium-27.0.1453.15.tar.xz"; - sha256 = "19y9pbipi4y61avrsgb7y4b1xl8d29v34l403xdghk0d3z2rg65m"; + version = "27.0.1453.47"; + url = "http://commondatastorage.googleapis.com/chromium-browser-official/chromium-27.0.1453.47.tar.xz"; + sha256 = "0dyyxdn75a6b35a7wv9xqzcnskbcxj19bmfd7cq9ya5jdhcvy9j9"; }; stable = { - version = "26.0.1410.43"; - url = "http://commondatastorage.googleapis.com/chromium-browser-official/chromium-26.0.1410.43.tar.xz"; - sha256 = "110x9cs88gqvqya71bqspx2s7ph6ca0als7sp5fbf911cj0iy0ii"; + version = "26.0.1410.63"; + url = "http://commondatastorage.googleapis.com/chromium-browser-official/chromium-26.0.1410.63.tar.xz"; + sha256 = "0gsb0dgk7p04997wlw7swxnnpf5ix9drn0wn07pgsalr8l3zgy3s"; }; }