From 90b4054aa00353f06011e85719edc1c9eff23b04 Mon Sep 17 00:00:00 2001 From: Russell O'Connor Date: Mon, 29 Jun 2015 22:35:54 +0000 Subject: [PATCH 01/35] cassandra-driver: init at 2.6.0c2 --- pkgs/top-level/python-packages.nix | 23 +++++++++++++++++++++++ 1 file changed, 23 insertions(+) diff --git a/pkgs/top-level/python-packages.nix b/pkgs/top-level/python-packages.nix index d89b40dfa9a3..417e1beaa89d 100644 --- a/pkgs/top-level/python-packages.nix +++ b/pkgs/top-level/python-packages.nix @@ -1689,6 +1689,29 @@ let }; }; + cassandraDriver = buildPythonPackage rec { + name = "cassandra-driver-2.6.0c2"; + + src = pkgs.fetchurl { + url = "http://pypi.python.org/packages/source/c/cassandra-driver/${name}.tar.gz"; + sha256 = "00cc2rkvkxaxn7sf2qzy29s6h394fla73rbdh9krxbswp5nvp27r"; + }; + + propagatedBuildInputs = with self; [ + futures + nose + six + sure + pytz + pyyaml + ]; + + meta = { + homepage = http://datastax.github.io/python-driver/; + description = "A Python client driver for Apache Cassandra"; + }; + }; + celery = buildPythonPackage rec { name = "celery-${version}"; From 5297371b95edf3db81131bdc1ee5c952c245f7c0 Mon Sep 17 00:00:00 2001 From: Stewart Mackenzie Date: Sun, 7 Jun 2015 12:10:52 +0800 Subject: [PATCH 02/35] zerotier-one: service add --- nixos/modules/module-list.nix | 1 + .../services/networking/zerotierone.nix | 32 +++++++++++++++++++ 2 files changed, 33 insertions(+) create mode 100644 nixos/modules/services/networking/zerotierone.nix diff --git a/nixos/modules/module-list.nix b/nixos/modules/module-list.nix index 043b0470edf2..ea6809f540a0 100644 --- a/nixos/modules/module-list.nix +++ b/nixos/modules/module-list.nix @@ -333,6 +333,7 @@ ./services/networking/wicd.nix ./services/networking/wpa_supplicant.nix ./services/networking/xinetd.nix + ./services/networking/zerotierone.nix ./services/networking/znc.nix ./services/printing/cupsd.nix ./services/scheduling/atd.nix diff --git a/nixos/modules/services/networking/zerotierone.nix b/nixos/modules/services/networking/zerotierone.nix new file mode 100644 index 000000000000..886ea18d9809 --- /dev/null +++ b/nixos/modules/services/networking/zerotierone.nix @@ -0,0 +1,32 @@ +{ config, lib, pkgs, ... }: + +with lib; + +let + cfg = config.services.zerotierone; +in +{ + options.services.zerotierone.enable = mkEnableOption "ZeroTierOne"; + + config = mkIf cfg.enable { + systemd.services.zerotierone = { + description = "ZeroTierOne"; + path = [ pkgs.zerotierone ]; + after = [ "network.target" ]; + wantedBy = [ "multi-user.target" ]; + preStart = + '' + mkdir -p /var/lib/zerotier-one + chmod 700 /var/lib/zerotier-one + chown -R root:root /var/lib/zerotier-one + ''; + serviceConfig = { + Type = "forking"; + User = "root"; + PIDFile = "/var/lib/zerotier-one/zerotier-one.pid"; + ExecStart = "${pkgs.zerotierone}/bin/zerotier-one -d"; + }; + }; + environment.systemPackages = [ pkgs.zerotierone ]; + }; +} From 5562750cd037f517e9a73e1fdb2735a5868a8a61 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Guillaume=20Mass=C3=A9?= Date: Tue, 7 Jul 2015 00:00:55 -0400 Subject: [PATCH 03/35] Build popcorntime from ci until yts movie outage is fixed Currently the movie tab is broken. It's fixed in the experimental branch (master) http://status.popcorntime.io/ > * Update - Issue with the subtitles API affects Release 0.3.7-2, Experimental builds are fine > May 13, 22:54 EDT > [...] > * Identified - The issue with the YTS API (Movies) seems to be related to a bad response for one of the movies. The movies page will continue to be intermittent until the issue is resolved. > May 10, 21:29 EDT > * Investigating - YTS (Movies) is currently unavailable for Popcorn Time release 0.3.7-2, but is still working for the experimental builds. We're looking into what the issue could be and why it's only affecting release 0.3.7-2 > May 10, 18:34 EDT --- .../video/popcorntime/default.nix | 45 ++++++++++++------- 1 file changed, 30 insertions(+), 15 deletions(-) diff --git a/pkgs/applications/video/popcorntime/default.nix b/pkgs/applications/video/popcorntime/default.nix index c588833b2f08..3b47587360e3 100644 --- a/pkgs/applications/video/popcorntime/default.nix +++ b/pkgs/applications/video/popcorntime/default.nix @@ -1,24 +1,39 @@ -{ stdenv, fetchurl, runCommand, makeWrapper, node_webkit_0_9 +{ lib, stdenv, fetchurl, runCommand, makeWrapper, node_webkit_0_9, + fromCi ? true, + build ? "652", + version ? if fromCi then "0.3.7-2-0ac62b848" else "0.3.7.2" }: let - version = "0.3.7.2"; + config = + if stdenv.system == "x86_64-linux" then + {sys = "Linux32"; + sha256 = + if fromCi then "06av40b68xy2mv2fp9qg8npqmnvkl00p2jvbm2fdfnpc9jj746iy" + else "0lm9k4fr73a9p00i3xj2ywa4wvjf9csadm0pcz8d6imwwq44sa8b"; + } + else if stdenv.system == "i686-linux" then + {sys = "Linux64"; + sha256 = + if fromCi then "1nr2zaixdr5vqynga7jig3fw9dckcnzcbdmbr8haq4a486x2nq0f" + else "1dz1cp31qbwamm9pf8ydmzzhnb6d9z73bigdv3y74dgicz3dpr91"; + } + else throw "Unsupported system ${stdenv.system}"; + + fetchurlConf = + let + ciBase = "https://ci.popcorntime.io/job/Popcorn-Experimental/652/artifact/build/releases/Popcorn-Time"; + relBase = "https://get.popcorntime.io/build"; + in { + url = + if fromCi then "${ciBase}/${lib.toLower config.sys}/Popcorn-Time-${version}-${config.sys}.tar.xz" + else "${relBase}/Popcorn-Time-${version}-Linux64.tar.xz"; + sha256 = config.sha256; + }; popcorntimePackage = stdenv.mkDerivation rec { name = "popcorntime-package-${version}"; - src = - if stdenv.system == "x86_64-linux" then - fetchurl { - url = "https://get.popcorntime.io/build/Popcorn-Time-${version}-Linux64.tar.xz"; - sha256 = "0lm9k4fr73a9p00i3xj2ywa4wvjf9csadm0pcz8d6imwwq44sa8b"; - } - else if stdenv.system == "i686-linux" then - fetchurl { - url = "https://get.popcorntime.io/build/Popcorn-Time-${version}-Linux32.tar.xz"; - sha256 = "1dz1cp31qbwamm9pf8ydmzzhnb6d9z73bigdv3y74dgicz3dpr91"; - } - else - throw "Unsupported system ${stdenv.system}"; + src = fetchurl fetchurlConf; sourceRoot = "."; installPhase = '' mkdir -p $out From c465170662f99cb0010d7df496d2e55bd0f6479c Mon Sep 17 00:00:00 2001 From: Thomas Strobel Date: Tue, 7 Jul 2015 00:42:15 +0200 Subject: [PATCH 04/35] ocaml-text: 0.6 -> 0.7.1 --- pkgs/development/ocaml-modules/ocaml-text/default.nix | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/pkgs/development/ocaml-modules/ocaml-text/default.nix b/pkgs/development/ocaml-modules/ocaml-text/default.nix index c82785e4aa94..8bbf08e3c74a 100644 --- a/pkgs/development/ocaml-modules/ocaml-text/default.nix +++ b/pkgs/development/ocaml-modules/ocaml-text/default.nix @@ -1,11 +1,11 @@ {stdenv, fetchurl, libiconv, ocaml, findlib, ncurses}: stdenv.mkDerivation { - name = "ocaml-text-0.6"; + name = "ocaml-text-0.7.1"; src = fetchurl { - url = https://forge.ocamlcore.org/frs/download.php/937/ocaml-text-0.6.tar.gz; - sha256 = "0j8gaak0ajnlmn8knvfygqwwzs7awjv5rfn5cbj6qxqbxhjd5m6g"; + url = "https://github.com/vbmithr/ocaml-text/archive/0.7.1.tar.gz"; + sha256 = "0dn096q9gjfj7ibj237mb7lq0742a760zawka6i064qns727qwrg"; }; buildInputs = [ocaml findlib ncurses libiconv]; From 2dfe7d0513db9c0d88fca289135e9f15a81b8061 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Edward=20Tj=C3=B6rnhammar?= Date: Tue, 7 Jul 2015 09:47:22 +0200 Subject: [PATCH 05/35] i2pd: 0.9.0 -> 0.10.0 --- pkgs/tools/networking/i2pd/default.nix | 16 +++++++++------- 1 file changed, 9 insertions(+), 7 deletions(-) diff --git a/pkgs/tools/networking/i2pd/default.nix b/pkgs/tools/networking/i2pd/default.nix index f1b32ddb7e7b..dd28345a48d2 100644 --- a/pkgs/tools/networking/i2pd/default.nix +++ b/pkgs/tools/networking/i2pd/default.nix @@ -1,14 +1,16 @@ -{ stdenv, fetchurl, boost, cryptopp }: +{ stdenv, fetchFromGitHub, boost, cryptopp }: stdenv.mkDerivation rec { - name = "i2pd-${version}"; - version = "0.9.0"; + name = pname + "-" + version; + pname = "i2pd"; + version = "0.10.0"; - src = fetchurl { - name = "i2pd-src-${version}.tar.gz"; - url = "https://github.com/PurpleI2P/i2pd/archive/${version}.tar.gz"; - sha256 = "1rcf4wc34g2alva9jzj6bz0f88g2f5v1w4418b6lp6chvqi7fhc7"; + src = fetchFromGitHub { + owner = "PurpleI2P"; + repo = pname; + rev = version; + sha256 = "11w62rc326rhj2xh06307ngx0fai30qny8ml6n5lrx2y1dzjfxd1"; }; buildInputs = [ boost cryptopp ]; From 41cf8be4123bbbec5701bf16d0f444e645eb4479 Mon Sep 17 00:00:00 2001 From: Luca Bruno Date: Tue, 7 Jul 2015 09:48:29 +0200 Subject: [PATCH 06/35] nixos nix-daemon: lower priority is 19. Closes #8675 --- nixos/modules/services/misc/nix-daemon.nix | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/nixos/modules/services/misc/nix-daemon.nix b/nixos/modules/services/misc/nix-daemon.nix index b79a69e2ba8f..b5a8a7df9fca 100644 --- a/nixos/modules/services/misc/nix-daemon.nix +++ b/nixos/modules/services/misc/nix-daemon.nix @@ -143,7 +143,7 @@ in default = 0; description = '' Nix daemon process priority. This priority propagates to build processes. - 0 is the default Unix process priority, 20 is the lowest. + 0 is the default Unix process priority, 19 is the lowest. ''; }; From e85dac137e7be8940b08744a88fcb8fe60e70000 Mon Sep 17 00:00:00 2001 From: Simon Vandel Sillesen Date: Thu, 2 Jul 2015 03:18:56 +0200 Subject: [PATCH 07/35] sundtek init at 30-06-2015 --- nixos/modules/module-list.nix | 1 + nixos/modules/services/misc/sundtek.nix | 33 +++++++++++++++++ pkgs/misc/drivers/sundtek/default.nix | 48 +++++++++++++++++++++++++ pkgs/top-level/all-packages.nix | 2 ++ 4 files changed, 84 insertions(+) create mode 100644 nixos/modules/services/misc/sundtek.nix create mode 100644 pkgs/misc/drivers/sundtek/default.nix diff --git a/nixos/modules/module-list.nix b/nixos/modules/module-list.nix index d580e269df96..e2d8efcf4c2b 100644 --- a/nixos/modules/module-list.nix +++ b/nixos/modules/module-list.nix @@ -219,6 +219,7 @@ ./services/misc/rogue.nix ./services/misc/siproxd.nix ./services/misc/subsonic.nix + ./services/misc/sundtek.nix ./services/misc/svnserve.nix ./services/misc/synergy.nix ./services/misc/uhub.nix diff --git a/nixos/modules/services/misc/sundtek.nix b/nixos/modules/services/misc/sundtek.nix new file mode 100644 index 000000000000..8438ef79904f --- /dev/null +++ b/nixos/modules/services/misc/sundtek.nix @@ -0,0 +1,33 @@ +{ config, lib, pkgs, ... }: + +with lib; + +let + cfg = config.services.sundtek; + +in +{ + options.services.sundtek = { + enable = mkEnableOption "Sundtek driver"; + }; + + config = mkIf cfg.enable { + + environment.systemPackages = [ pkgs.sundtek ]; + + systemd.services.sundtek = { + description = "Sundtek driver"; + wantedBy = [ "multi-user.target" ]; + + serviceConfig = { + Type = "oneshot"; + ExecStart = '' + ${pkgs.sundtek}/bin/mediasrv -d -v -p ${pkgs.sundtek}/bin ;\ + ${pkgs.sundtek}/bin/mediaclient --start=5 --wait-for-devices + ''; + ExecStop = "${pkgs.sundtek}/bin/mediaclient --shutdown"; + RemainAfterExit = true; + }; + }; + }; +} diff --git a/pkgs/misc/drivers/sundtek/default.nix b/pkgs/misc/drivers/sundtek/default.nix new file mode 100644 index 000000000000..0ad313a72331 --- /dev/null +++ b/pkgs/misc/drivers/sundtek/default.nix @@ -0,0 +1,48 @@ +{ fetchurl, stdenv }: + +with stdenv.lib; + +let + version = "30-06-2015"; + rpath = makeLibraryPath [ "$out/lib" "$out/bin" ]; + platform = with stdenv; + if isx86_64 then "64bit" + else + if isi686 then "32bit" + else abort "${system} not considered in build derivation. Might still be supported."; + +in + stdenv.mkDerivation { + src = fetchurl { + url = "http://www.sundtek.de/media/netinst/${platform}/installer.tar.gz"; + sha256 = "304d2785b5e9046c78fc092341721fdc404074105e63dd635e838559d42313c3"; + }; + name = "sundtek-${version}"; + + phases = [ "unpackPhase" "installPhase" "fixupPhase" ]; + + sourceRoot = "."; + + installPhase = '' + cp -r opt $out + + # add and fix pkg-config file + mkdir -p $out/lib/pkgconfig + substitute $out/doc/libmedia.pc $out/lib/pkgconfig/libmedia.pc \ + --replace /opt $out + ''; + + postFixup = '' + find $out -type f -exec \ + patchelf --set-interpreter "$(cat $NIX_CC/nix-support/dynamic-linker)" {} \ + patchelf --set-rpath ${rpath} {} \; + ''; + + meta = { + description = "Sundtek MediaTV driver"; + maintainers = [ maintainers.simonvandel ]; + platforms = platforms.unix; + license = licenses.unfree; + homepage = "http://support.sundtek.com/index.php/topic,1573.0.html"; + }; + } diff --git a/pkgs/top-level/all-packages.nix b/pkgs/top-level/all-packages.nix index c8bc7e90f334..bd8ac1e3640d 100644 --- a/pkgs/top-level/all-packages.nix +++ b/pkgs/top-level/all-packages.nix @@ -2978,6 +2978,8 @@ let suidChroot = callPackage ../tools/system/suid-chroot { }; + sundtek = callPackage ../misc/drivers/sundtek { }; + super = callPackage ../tools/security/super { }; ssdeep = callPackage ../tools/security/ssdeep { }; From 5aefc44da9b1589dbed85ed8ba319b75b287bf08 Mon Sep 17 00:00:00 2001 From: Jaka Hudoklin Date: Tue, 7 Jul 2015 11:34:33 +0200 Subject: [PATCH 08/35] nixos/kubernetes: fix cadvisor, kubelet autoregistration --- nixos/modules/services/cluster/kubernetes.nix | 15 ++++++++++----- 1 file changed, 10 insertions(+), 5 deletions(-) diff --git a/nixos/modules/services/cluster/kubernetes.nix b/nixos/modules/services/cluster/kubernetes.nix index 86b8817c28c6..d00c1aaa1055 100644 --- a/nixos/modules/services/cluster/kubernetes.nix +++ b/nixos/modules/services/cluster/kubernetes.nix @@ -224,7 +224,7 @@ in { machines = mkOption { description = "Kubernetes controller list of machines to schedule to schedule onto"; - default = [config.networking.hostName]; + default = []; type = types.listOf types.str; }; @@ -242,6 +242,12 @@ in { type = types.bool; }; + registerNode = mkOption { + description = "Whether to auto register kubelet with API server."; + default = true; + type = types.bool; + }; + address = mkOption { description = "Kubernetes kubelet info server listening address."; default = "0.0.0.0"; @@ -274,7 +280,7 @@ in { cadvisorPort = mkOption { description = "Kubernetes kubelet local cadvisor port."; - default = config.services.cadvisor.port; + default = 4194; type = types.int; }; @@ -324,7 +330,7 @@ in { }; kube2sky = { - enable = mkEnableOption "kube2sky dns service"; + enable = mkEnableOption "Whether to enable kube2sky dns service."; domain = mkOption { description = "Kuberntes kube2sky domain under which all DNS names will be hosted."; @@ -445,6 +451,7 @@ in { export PATH="/bin:/sbin:/usr/bin:/usr/sbin:$PATH" exec ${cfg.package}/bin/kubelet \ --api-servers=${concatMapStringsSep "," (f: "http://${f}") cfg.kubelet.apiServers} \ + --register-node=${if cfg.kubelet.registerNode then "true" else "false"} \ --address=${cfg.kubelet.address} \ --port=${toString cfg.kubelet.port} \ --hostname-override=${cfg.kubelet.hostname} \ @@ -511,8 +518,6 @@ in { (mkIf (any (el: el == "node") cfg.roles) { virtualisation.docker.enable = mkDefault true; - services.cadvisor.enable = mkDefault true; - services.cadvisor.port = mkDefault 4194; services.kubernetes.kubelet.enable = mkDefault true; services.kubernetes.proxy.enable = mkDefault true; }) From acc995cf41a8406ffd6e820c38ba31854de865b7 Mon Sep 17 00:00:00 2001 From: Jaka Hudoklin Date: Tue, 7 Jul 2015 11:47:12 +0200 Subject: [PATCH 09/35] Add compass, stylesheet authoring environment --- pkgs/development/tools/compass/Gemfile | 3 + pkgs/development/tools/compass/Gemfile.lock | 28 +++++++ pkgs/development/tools/compass/default.nix | 18 +++++ pkgs/development/tools/compass/gemset.nix | 83 +++++++++++++++++++++ pkgs/top-level/all-packages.nix | 4 +- 5 files changed, 135 insertions(+), 1 deletion(-) create mode 100644 pkgs/development/tools/compass/Gemfile create mode 100644 pkgs/development/tools/compass/Gemfile.lock create mode 100644 pkgs/development/tools/compass/default.nix create mode 100644 pkgs/development/tools/compass/gemset.nix diff --git a/pkgs/development/tools/compass/Gemfile b/pkgs/development/tools/compass/Gemfile new file mode 100644 index 000000000000..e85f28cbaff1 --- /dev/null +++ b/pkgs/development/tools/compass/Gemfile @@ -0,0 +1,3 @@ +source "https://rubygems.org" + +gem 'compass' diff --git a/pkgs/development/tools/compass/Gemfile.lock b/pkgs/development/tools/compass/Gemfile.lock new file mode 100644 index 000000000000..9aebd2b15cea --- /dev/null +++ b/pkgs/development/tools/compass/Gemfile.lock @@ -0,0 +1,28 @@ +GEM + remote: https://rubygems.org/ + specs: + chunky_png (1.3.4) + compass (1.0.3) + chunky_png (~> 1.2) + compass-core (~> 1.0.2) + compass-import-once (~> 1.0.5) + rb-fsevent (>= 0.9.3) + rb-inotify (>= 0.9) + sass (>= 3.3.13, < 3.5) + compass-core (1.0.3) + multi_json (~> 1.0) + sass (>= 3.3.0, < 3.5) + compass-import-once (1.0.5) + sass (>= 3.2, < 3.5) + ffi (1.9.8) + multi_json (1.11.0) + rb-fsevent (0.9.4) + rb-inotify (0.9.5) + ffi (>= 0.5.0) + sass (3.4.13) + +PLATFORMS + ruby + +DEPENDENCIES + compass diff --git a/pkgs/development/tools/compass/default.nix b/pkgs/development/tools/compass/default.nix new file mode 100644 index 000000000000..2b0a5aaf90a0 --- /dev/null +++ b/pkgs/development/tools/compass/default.nix @@ -0,0 +1,18 @@ +{ stdenv, lib, bundlerEnv, ruby }: + +bundlerEnv { + name = "compass-1.0.3"; + + inherit ruby; + gemfile = ./Gemfile; + lockfile = ./Gemfile.lock; + gemset = ./gemset.nix; + + meta = with lib; { + description = "Stylesheet Authoring Environment that makes your website design simpler to implement and easier to maintain."; + homepage = https://github.com/Compass/compass; + license = with licenses; mit; + maintainers = with maintainers; [ offline ]; + platforms = platforms.unix; + }; +} diff --git a/pkgs/development/tools/compass/gemset.nix b/pkgs/development/tools/compass/gemset.nix new file mode 100644 index 000000000000..aaf74f3f33c4 --- /dev/null +++ b/pkgs/development/tools/compass/gemset.nix @@ -0,0 +1,83 @@ +{ + "chunky_png" = { + version = "1.3.4"; + source = { + type = "gem"; + sha256 = "0n5xhkj3vffihl3h9s8yjzazqaqcm4p1nyxa1w2dk3fkpzvb0wfw"; + }; + }; + "compass" = { + version = "1.0.3"; + source = { + type = "gem"; + sha256 = "0lfi83w8z75czr0pf0rmj9hda22082h3cmvczl8r1ma9agf88y2c"; + }; + dependencies = [ + "chunky_png" + "compass-core" + "compass-import-once" + "rb-fsevent" + "rb-inotify" + "sass" + ]; + }; + "compass-core" = { + version = "1.0.3"; + source = { + type = "gem"; + sha256 = "0yaspqwdmzwdcqviclbs3blq7an16pysrfzylz8q1gxmmd6bpj3a"; + }; + dependencies = [ + "multi_json" + "sass" + ]; + }; + "compass-import-once" = { + version = "1.0.5"; + source = { + type = "gem"; + sha256 = "0bn7gwbfz7jvvdd0qdfqlx67fcb83gyvxqc7dr9fhcnks3z8z5rq"; + }; + dependencies = [ + "sass" + ]; + }; + "ffi" = { + version = "1.9.8"; + source = { + type = "gem"; + sha256 = "0ph098bv92rn5wl6rn2hwb4ng24v4187sz8pa0bpi9jfh50im879"; + }; + }; + "multi_json" = { + version = "1.11.0"; + source = { + type = "gem"; + sha256 = "1mg3hp17ch8bkf3ndj40s50yjs0vrqbfh3aq5r02jkpjkh23wgxl"; + }; + }; + "rb-fsevent" = { + version = "0.9.4"; + source = { + type = "gem"; + sha256 = "12if5xsik64kihxf5awsyavlp595y47g9qz77vfp2zvkxgglaka7"; + }; + }; + "rb-inotify" = { + version = "0.9.5"; + source = { + type = "gem"; + sha256 = "0kddx2ia0qylw3r52nhg83irkaclvrncgy2m1ywpbhlhsz1rymb9"; + }; + dependencies = [ + "ffi" + ]; + }; + "sass" = { + version = "3.4.13"; + source = { + type = "gem"; + sha256 = "0wxkjm41xr77pnfi06cbwv6vq0ypbni03jpbpskd7rj5b0zr27ig"; + }; + }; +} \ No newline at end of file diff --git a/pkgs/top-level/all-packages.nix b/pkgs/top-level/all-packages.nix index e90ff4984b85..61a4673d4669 100644 --- a/pkgs/top-level/all-packages.nix +++ b/pkgs/top-level/all-packages.nix @@ -1154,6 +1154,8 @@ let cloogppl = callPackage ../development/libraries/cloog-ppl { }; + compass = callPackage ../development/tools/compass { }; + convmv = callPackage ../tools/misc/convmv { }; cool-retro-term = callPackage ../applications/misc/cool-retro-term { }; @@ -4223,7 +4225,7 @@ let bitstring_2_0_4 = callPackage ../development/ocaml-modules/bitstring/2.0.4.nix { }; bitstring_git = callPackage ../development/ocaml-modules/bitstring { }; - + bitstring = if lib.versionOlder "4.02" ocaml_version then bitstring_git From 9fa19cfcea4ed163f96eeaa5c9c103ad099bea18 Mon Sep 17 00:00:00 2001 From: Eelco Dolstra Date: Tue, 7 Jul 2015 11:56:28 +0200 Subject: [PATCH 10/35] apache-httpd: Don't set default content encodings In general, you don't want a .tar.gz file to be served with "Content-Encoding: x-gzip", because this causes browsers (like Chrome or "curl --compressed") to decompress the file on the fly. So you end up with a .tar rather than .tar.gz file, which is unexpected. If people want such encodings, they should set them in their own NixOS configuration. --- nixos/modules/services/web-servers/apache-httpd/default.nix | 3 --- 1 file changed, 3 deletions(-) diff --git a/nixos/modules/services/web-servers/apache-httpd/default.nix b/nixos/modules/services/web-servers/apache-httpd/default.nix index 2885fd396525..7350a6a68c70 100644 --- a/nixos/modules/services/web-servers/apache-httpd/default.nix +++ b/nixos/modules/services/web-servers/apache-httpd/default.nix @@ -187,9 +187,6 @@ let MIMEMagicFile ${httpd}/conf/magic - - AddEncoding x-compress Z - AddEncoding x-gzip gz tgz ''; From 3a1dc590f499dcfee861bee2f79acaec6c0c6c74 Mon Sep 17 00:00:00 2001 From: Pascal Wittmann Date: Tue, 7 Jul 2015 13:11:00 +0200 Subject: [PATCH 11/35] dwb: update from 2014-12-15 to 2015-07-07 --- .../networking/browsers/dwb/default.nix | 15 ++++++++------- 1 file changed, 8 insertions(+), 7 deletions(-) diff --git a/pkgs/applications/networking/browsers/dwb/default.nix b/pkgs/applications/networking/browsers/dwb/default.nix index f4b36d5e7567..6f6ffd67a539 100644 --- a/pkgs/applications/networking/browsers/dwb/default.nix +++ b/pkgs/applications/networking/browsers/dwb/default.nix @@ -1,16 +1,17 @@ -{ stdenv, fetchgit, pkgconfig, makeWrapper, libsoup, webkitgtk2, gtk2, gnutls, json_c, - m4, glib_networking, gsettings_desktop_schemas, dconf }: +{ stdenv, fetchgit, pkgconfig, makeWrapper, libsoup, webkitgtk2, gtk2, gnutls +, json_c, m4, glib_networking, gsettings_desktop_schemas, dconf }: stdenv.mkDerivation { - name = "dwb-2014-12-15"; + name = "dwb-2015-07-07"; src = fetchgit { url = "https://bitbucket.org/0mark/dwb_collect"; - rev = "b94785470b11a0b6b52eecfc3bae276796b83a0d"; - sha256 = "09xbifj223mflj62rfhi6q7cvnkpkzkwyyqhkm8w067pdscdhyvs"; + rev = "9a50dcc7134015c6cb1d26afb77840cf69f7c782"; + sha256 = "03nyr3c0x5b1jqax0zh407vvi4j47zkj1i52lqs35j2d2sci3lkb"; }; - buildInputs = [ pkgconfig makeWrapper gsettings_desktop_schemas libsoup webkitgtk2 gtk2 gnutls json_c m4 ]; + buildInputs = [ pkgconfig makeWrapper gsettings_desktop_schemas libsoup + webkitgtk2 gtk2 gnutls json_c m4 ]; # There are Xlib and gtk warnings therefore I have set Wno-error makeFlags = ''PREFIX=$(out) GTK=2 CPPFLAGS="-Wno-error"''; @@ -27,7 +28,7 @@ stdenv.mkDerivation { homepage = http://portix.bitbucket.org/dwb/; description = "A lightweight web browser based on the webkit web browser engine and the gtk toolkit"; platforms = platforms.mesaPlatforms; - maintainers = with maintainers;[ pSub ]; + maintainers = with maintainers; [ pSub ]; license = licenses.gpl3; }; } From 7bab5ee5d017d9124bdb99d48adf331a656cb3ec Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Guillaume=20Mass=C3=A9?= Date: Tue, 7 Jul 2015 10:23:40 -0400 Subject: [PATCH 12/35] Following name convention for popcorntime http://nixos.org/nixpkgs/manual/#sec-package-naming --- pkgs/applications/video/popcorntime/default.nix | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/pkgs/applications/video/popcorntime/default.nix b/pkgs/applications/video/popcorntime/default.nix index 3b47587360e3..45d8c452111f 100644 --- a/pkgs/applications/video/popcorntime/default.nix +++ b/pkgs/applications/video/popcorntime/default.nix @@ -32,7 +32,9 @@ let }; popcorntimePackage = stdenv.mkDerivation rec { - name = "popcorntime-package-${version}"; + name = + if fromCi then "popcorntime-git-2015-07-07" + else "popcorntime-${version}"; src = fetchurl fetchurlConf; sourceRoot = "."; installPhase = '' From afb7655c6854151d84427f1c04600032ad12cace Mon Sep 17 00:00:00 2001 From: Austin Seipp Date: Tue, 7 Jul 2015 09:31:10 -0500 Subject: [PATCH 13/35] nixpkgs: arcanist 20150525 -> 20150707 Signed-off-by: Austin Seipp --- pkgs/development/tools/misc/arcanist/default.nix | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/pkgs/development/tools/misc/arcanist/default.nix b/pkgs/development/tools/misc/arcanist/default.nix index dfa83ffb3127..a6a457c2b583 100644 --- a/pkgs/development/tools/misc/arcanist/default.nix +++ b/pkgs/development/tools/misc/arcanist/default.nix @@ -3,18 +3,18 @@ let libphutil = fetchgit { url = "git://github.com/phacility/libphutil.git"; - rev = "672c0f7d5da9be6cda619428a9da3b91a670ea2f"; - sha256 = "830c7abce7244afa188255a6f288c345004cc4be1c8bbe93afa2aa2f1768f025"; + rev = "3753a09dfc7e7ee2626946735e420e5b50480f89"; + sha256 = "86c2613fed23edff58452ceb9fa98ceb559c7e41abdb6752f87ebcf0f50a1a66"; }; arcanist = fetchgit { url = "git://github.com/phacility/arcanist.git"; - rev = "64d03ff68bf2ff4ef99186472704df8aface9ef3"; - sha256 = "e9c5f9a9dcb1be0b7fd6f5fbda865e14277ddb0c1cedd256c459b3540ec6ded7"; + rev = "4d6d3feb7fc1fb63789554dddee8e489999c1201"; + sha256 = "e3a9314544c4430ac6e67ba2ae180a96b009b3ab848ba8712fc2b308cf880372"; }; in stdenv.mkDerivation rec { name = "arcanist-${version}"; - version = "20150525"; + version = "20150707"; src = [ arcanist libphutil ]; buildInputs = [ php makeWrapper flex ]; From b028c14256d08c1dcb5a26f37edc879885cac20d Mon Sep 17 00:00:00 2001 From: aszlig Date: Tue, 7 Jul 2015 18:25:10 +0200 Subject: [PATCH 14/35] python-wrapper: Fix variable name for sed expr. Regression introduced by 5f557885313088a235762d3cb7fd76ec0b1e6547. The commit not only changes documentation, but also changed a few variable names. One of them is $i which now is $f and it contains the name of the file to wrap. This was accidentally found by @Profpatsch (thanks!) who found himself getting the basename of the last patch file to end up in sys.argv[0]. The reason for this is that $i is used in the for loop of the generic patchPhase and thus is reused later when the Python file is to be wrapped. I have also added a small comment noting about this, to be sure that this won't accidentally occur the next time someone changes variable names. Signed-off-by: aszlig --- pkgs/development/python-modules/generic/wrap.sh | 3 +++ pkgs/top-level/python-packages.nix | 2 +- 2 files changed, 4 insertions(+), 1 deletion(-) diff --git a/pkgs/development/python-modules/generic/wrap.sh b/pkgs/development/python-modules/generic/wrap.sh index 33b9a06f6080..b6d2a66afff6 100644 --- a/pkgs/development/python-modules/generic/wrap.sh +++ b/pkgs/development/python-modules/generic/wrap.sh @@ -37,6 +37,9 @@ wrapPythonProgramsIn() { # dont wrap EGG-INFO scripts since they are called from python if echo "$f" | grep -qv EGG-INFO/scripts; then echo "wrapping \`$f'..." + # The magicalSedExpression will invoke a "$(basename "$f")", so + # if you change $f to something else, be sure to also change it + # in pkgs/top-level/python-packages.nix! sed -i "$f" -re '@magicalSedExpression@' # wrapProgram creates the executable shell script described # above. The script will set PYTHONPATH and PATH variables.! diff --git a/pkgs/top-level/python-packages.nix b/pkgs/top-level/python-packages.nix index d2aecc941581..3e9e07361dc6 100644 --- a/pkgs/top-level/python-packages.nix +++ b/pkgs/top-level/python-packages.nix @@ -68,7 +68,7 @@ let /\\$/{N;br} /__future__|^ *(#.*)?$/{n;br} ${concatImapStrings mkStringSkipper quoteVariants} - /^ *[^# ]/i import sys; sys.argv[0] = '"'$(basename "$i")'"' + /^ *[^# ]/i import sys; sys.argv[0] = '"'$(basename "$f")'"' } ''; } From 08ff83eab3ade9c923e36f03bc09d297bbe5e9f3 Mon Sep 17 00:00:00 2001 From: "William A. Kennington III" Date: Tue, 7 Jul 2015 11:34:50 -0700 Subject: [PATCH 15/35] nixos/btrfs: Fix parsing of `btrfs subvolume show` with btrfsprogs 4.1 --- nixos/modules/installer/tools/nixos-generate-config.pl | 2 +- nixos/modules/system/boot/loader/grub/install-grub.pl | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/nixos/modules/installer/tools/nixos-generate-config.pl b/nixos/modules/installer/tools/nixos-generate-config.pl index a929e1eb8262..b768be6a3e01 100644 --- a/nixos/modules/installer/tools/nixos-generate-config.pl +++ b/nixos/modules/installer/tools/nixos-generate-config.pl @@ -354,7 +354,7 @@ EOF if ($status != 0 || join("", @msg) =~ /ERROR:/) { die "Failed to retrieve subvolume info for $mountPoint\n"; } - my @ids = join("", @id_info) =~ m/Object ID:[ \t\n]*([^ \t\n]*)/; + my @ids = join("", @id_info) =~ m/Subvolume ID:[ \t\n]*([^ \t\n]*)/; if ($#ids > 0) { die "Btrfs subvol name for $mountPoint listed multiple times in mount\n" } elsif ($#ids == 0) { diff --git a/nixos/modules/system/boot/loader/grub/install-grub.pl b/nixos/modules/system/boot/loader/grub/install-grub.pl index c4b1abc8cb03..34bff727b73a 100644 --- a/nixos/modules/system/boot/loader/grub/install-grub.pl +++ b/nixos/modules/system/boot/loader/grub/install-grub.pl @@ -186,7 +186,7 @@ sub GrubFs { if ($status != 0) { die "Failed to retrieve subvolume info for @{[$fs->mount]}\n"; } - my @ids = join("", @id_info) =~ m/Object ID:[ \t\n]*([^ \t\n]*)/; + my @ids = join("", @id_info) =~ m/Subvolume ID:[ \t\n]*([^ \t\n]*)/; if ($#ids > 0) { die "Btrfs subvol name for @{[$fs->device]} listed multiple times in mount\n" } elsif ($#ids == 0) { From 528fae6dd304ac3c2db4e49fa894b9c7ef575d08 Mon Sep 17 00:00:00 2001 From: Thomas Strobel Date: Tue, 7 Jul 2015 23:32:54 +0200 Subject: [PATCH 16/35] diffpdf: init at 2.1.3 --- pkgs/applications/misc/diffpdf/default.nix | 53 +++++++++++++++++++ .../misc/diffpdf/fix_path_poppler_qt4.patch | 16 ++++++ pkgs/top-level/all-packages.nix | 2 + 3 files changed, 71 insertions(+) create mode 100644 pkgs/applications/misc/diffpdf/default.nix create mode 100644 pkgs/applications/misc/diffpdf/fix_path_poppler_qt4.patch diff --git a/pkgs/applications/misc/diffpdf/default.nix b/pkgs/applications/misc/diffpdf/default.nix new file mode 100644 index 000000000000..88952f5eb761 --- /dev/null +++ b/pkgs/applications/misc/diffpdf/default.nix @@ -0,0 +1,53 @@ +{ stdenv, fetchurl, qt4, poppler_qt4 }: + +stdenv.mkDerivation rec { + version = "2.1.3"; + name = "diffpdf-${version}"; + + src = fetchurl { + url = "http://www.qtrac.eu/${name}.tar.gz"; + sha256 = "0cr468fi0d512jjj23r5flfzx957vibc9c25gwwhi0d773h2w566"; + }; + + patches = [ ./fix_path_poppler_qt4.patch ]; + + buildInputs = [ qt4 poppler_qt4 ]; + + preBuild = '' + substituteInPlace diffpdf.pro --replace @@NIX_POPPLER_QT4@@ ${poppler_qt4} + [ -e "*.qm" ] && make clean + lrelease diffpdf.pro + qmake -makefile PREFIX=\$out + ''; + + installPhase = '' + mkdir -p $out/bin $out/share/man/man1 + + install -Dpm755 -D diffpdf $out/bin/diffpdf + install -Dpm644 -D diffpdf.1 $out/share/man/man1/diffpdf.1 + + install -dpm755 $out/share/doc/${name} $out/share/licenses/${name} $out/share/pixmaps $out/share/applications + install -Dpm644 CHANGES README help.html $out/share/doc/${name}/ + install -Dpm644 gpl-2.0.txt $out/share/licenses/${name}/ + install -Dpm644 images/icon.png $out/share/pixmaps/${name}.png + + cat > $out/share/applications/diffpdf.desktop < Date: Tue, 7 Jul 2015 00:37:53 -0400 Subject: [PATCH 17/35] ruby: fix version 2.2.0 --- pkgs/development/interpreters/ruby/ruby-2.2.0.nix | 5 ++--- 1 file changed, 2 insertions(+), 3 deletions(-) diff --git a/pkgs/development/interpreters/ruby/ruby-2.2.0.nix b/pkgs/development/interpreters/ruby/ruby-2.2.0.nix index 0fb01a5a5350..b6375aa687d7 100644 --- a/pkgs/development/interpreters/ruby/ruby-2.2.0.nix +++ b/pkgs/development/interpreters/ruby/ruby-2.2.0.nix @@ -59,9 +59,8 @@ stdenv.mkDerivation rec { "${patchSet}/patches/ruby/2.2.0/railsexpress/05-fix-packed-bitfield-compat-warning-for-older-gccs.patch" ]; - # Ruby >= 2.1.0 tries to download config.{guess,sub} - postPatch = '' - rm tool/config_files.rb + postPatch = ops useRailsExpress '' + sed -i configure.in -e '/config.guess/d' cp ${config}/config.guess tool/ cp ${config}/config.sub tool/ ''; From 357324df2698810d274d43040c04e463198ce63f Mon Sep 17 00:00:00 2001 From: Charles Strahan Date: Tue, 7 Jul 2015 01:58:05 -0400 Subject: [PATCH 18/35] ruby: add 2.2.2, bump patch levels * Adds Ruby 2.2.2 * 1.9.3-p547 -> 1.9.3-p551 * 2.0.0-p481 -> 2.0.0-p645 --- .../interpreters/ruby/ruby-1.9.3.nix | 43 +++---- .../interpreters/ruby/ruby-2.0.0.nix | 17 ++- .../interpreters/ruby/ruby-2.2.2.nix | 110 ++++++++++++++++++ pkgs/top-level/all-packages.nix | 1 + 4 files changed, 141 insertions(+), 30 deletions(-) create mode 100644 pkgs/development/interpreters/ruby/ruby-2.2.2.nix diff --git a/pkgs/development/interpreters/ruby/ruby-1.9.3.nix b/pkgs/development/interpreters/ruby/ruby-1.9.3.nix index c53a012d7537..70c0d9a1c9cc 100644 --- a/pkgs/development/interpreters/ruby/ruby-1.9.3.nix +++ b/pkgs/development/interpreters/ruby/ruby-1.9.3.nix @@ -24,10 +24,10 @@ stdenv.mkDerivation rec { owner = "ruby"; repo = "ruby"; rev = "v1_9_3_${passthru.patchLevel}"; - sha256 = "040x67snfjrql5j7blizpm9j58jhwvh00v8h1h59aq90h52lkj68"; + sha256 = "1r9xzzxmci2ajb34qb4y1w424mz878zdgzxkfp9w60agldxnb36s"; } else fetchurl { url = "http://cache.ruby-lang.org/pub/ruby/1.9/${name}.tar.bz2"; - sha256 = "0k7g0ahicjnd4sij2pml1p1dcb95ms3k3j1k3169n02kzz9qwn7g"; + sha256 = "07kpvv2z7g6shflls7fyfga8giifahwlnl30l49qdm9i6izf7idh"; }; # Have `configure' avoid `/usr/bin/nroff' in non-chroot builds. @@ -52,24 +52,25 @@ stdenv.mkDerivation rec { ./ruby19-parallel-install.patch ./bitperfect-rdoc.patch ] ++ ops useRailsExpress [ - "${patchSet}/patches/ruby/1.9.3/p547/railsexpress/01-fix-make-clean.patch" - "${patchSet}/patches/ruby/1.9.3/p547/railsexpress/02-railsbench-gc.patch" - "${patchSet}/patches/ruby/1.9.3/p547/railsexpress/03-display-more-detailed-stack-trace.patch" - "${patchSet}/patches/ruby/1.9.3/p547/railsexpress/04-fork-support-for-gc-logging.patch" - "${patchSet}/patches/ruby/1.9.3/p547/railsexpress/05-track-live-dataset-size.patch" - "${patchSet}/patches/ruby/1.9.3/p547/railsexpress/06-webrick_204_304_keep_alive_fix.patch" - "${patchSet}/patches/ruby/1.9.3/p547/railsexpress/07-export-a-few-more-symbols-for-ruby-prof.patch" - "${patchSet}/patches/ruby/1.9.3/p547/railsexpress/08-thread-variables.patch" - "${patchSet}/patches/ruby/1.9.3/p547/railsexpress/09-faster-loading.patch" - "${patchSet}/patches/ruby/1.9.3/p547/railsexpress/10-falcon-st-opt.patch" - "${patchSet}/patches/ruby/1.9.3/p547/railsexpress/11-falcon-sparse-array.patch" - "${patchSet}/patches/ruby/1.9.3/p547/railsexpress/12-falcon-array-queue.patch" - "${patchSet}/patches/ruby/1.9.3/p547/railsexpress/13-railsbench-gc-fixes.patch" - "${patchSet}/patches/ruby/1.9.3/p547/railsexpress/14-show-full-backtrace-on-stack-overflow.patch" - "${patchSet}/patches/ruby/1.9.3/p547/railsexpress/15-configurable-fiber-stack-sizes.patch" - "${patchSet}/patches/ruby/1.9.3/p547/railsexpress/16-backport-psych-20.patch" - "${patchSet}/patches/ruby/1.9.3/p547/railsexpress/17-fix-missing-c-return-event.patch" - "${patchSet}/patches/ruby/1.9.3/p547/railsexpress/18-fix-process-daemon-call.patch" + "${patchSet}/patches/ruby/1.9.3/p${passthru.patchLevel}/railsexpress/01-fix-make-clean.patch" + "${patchSet}/patches/ruby/1.9.3/p${passthru.patchLevel}/railsexpress/02-zero-broken-tests.patch" + "${patchSet}/patches/ruby/1.9.3/p${passthru.patchLevel}/railsexpress/03-railsbench-gc.patch" + "${patchSet}/patches/ruby/1.9.3/p${passthru.patchLevel}/railsexpress/04-display-more-detailed-stack-trace.patch" + "${patchSet}/patches/ruby/1.9.3/p${passthru.patchLevel}/railsexpress/05-fork-support-for-gc-logging.patch" + "${patchSet}/patches/ruby/1.9.3/p${passthru.patchLevel}/railsexpress/06-track-live-dataset-size.patch" + "${patchSet}/patches/ruby/1.9.3/p${passthru.patchLevel}/railsexpress/07-webrick_204_304_keep_alive_fix.patch" + "${patchSet}/patches/ruby/1.9.3/p${passthru.patchLevel}/railsexpress/08-export-a-few-more-symbols-for-ruby-prof.patch" + "${patchSet}/patches/ruby/1.9.3/p${passthru.patchLevel}/railsexpress/09-thread-variables.patch" + "${patchSet}/patches/ruby/1.9.3/p${passthru.patchLevel}/railsexpress/10-faster-loading.patch" + "${patchSet}/patches/ruby/1.9.3/p${passthru.patchLevel}/railsexpress/11-falcon-st-opt.patch" + "${patchSet}/patches/ruby/1.9.3/p${passthru.patchLevel}/railsexpress/12-falcon-sparse-array.patch" + "${patchSet}/patches/ruby/1.9.3/p${passthru.patchLevel}/railsexpress/13-falcon-array-queue.patch" + "${patchSet}/patches/ruby/1.9.3/p${passthru.patchLevel}/railsexpress/14-railsbench-gc-fixes.patch" + "${patchSet}/patches/ruby/1.9.3/p${passthru.patchLevel}/railsexpress/15-show-full-backtrace-on-stack-overflow.patch" + "${patchSet}/patches/ruby/1.9.3/p${passthru.patchLevel}/railsexpress/16-configurable-fiber-stack-sizes.patch" + "${patchSet}/patches/ruby/1.9.3/p${passthru.patchLevel}/railsexpress/17-backport-psych-20.patch" + "${patchSet}/patches/ruby/1.9.3/p${passthru.patchLevel}/railsexpress/18-fix-missing-c-return-event.patch" + "${patchSet}/patches/ruby/1.9.3/p${passthru.patchLevel}/railsexpress/19-fix-process-daemon-call.patch" ]; configureFlags = [ "--enable-shared" "--enable-pthread" ] @@ -113,7 +114,7 @@ stdenv.mkDerivation rec { majorVersion = "1"; minorVersion = "9"; teenyVersion = "3"; - patchLevel = "547"; + patchLevel = "551"; rubyEngine = "ruby"; libPath = "lib/${rubyEngine}/${majorVersion}.${minorVersion}.${teenyVersion}"; gemPath = "lib/${rubyEngine}/gems/${majorVersion}.${minorVersion}.${teenyVersion}"; diff --git a/pkgs/development/interpreters/ruby/ruby-2.0.0.nix b/pkgs/development/interpreters/ruby/ruby-2.0.0.nix index 31408b738072..dc6c70b676d4 100644 --- a/pkgs/development/interpreters/ruby/ruby-2.0.0.nix +++ b/pkgs/development/interpreters/ruby/ruby-2.0.0.nix @@ -25,10 +25,10 @@ stdenv.mkDerivation rec { owner = "ruby"; repo = "ruby"; rev = "v2_0_0_${passthru.patchLevel}"; - sha256 = "07ccnxgiqxn5ycmq2wl7j3aqmndm4n358y35kzaivb488ayjg3pj"; + sha256 = "14bnas1iif2shyaz4ylb0832x96y2mda52x0v0aglkvqmcz1cfxb"; } else fetchurl { - url = "http://cache.ruby-lang.org/pub/ruby/2.0/${name}.tar.bz2"; - sha256 = "1qnqccyfhx0fykxqbzlxq0yvyvq6q9v32givyfyr303dx7bxlqh7"; + url = "https://cache.ruby-lang.org/pub/ruby/2.0/${name}.tar.bz2"; + sha256 = "1sc36qxqhziqbrvp99z4qdx9j0f8r1xhcbb6scb3m4nb02cwzk9d"; }; # Have `configure' avoid `/usr/bin/nroff' in non-chroot builds. @@ -51,11 +51,10 @@ stdenv.mkDerivation rec { enableParallelBuilding = true; patches = ops useRailsExpress [ - "${patchSet}/patches/ruby/2.0.0/p481/railsexpress/01-zero-broken-tests.patch" - "${patchSet}/patches/ruby/2.0.0/p481/railsexpress/02-railsexpress-gc.patch" - "${patchSet}/patches/ruby/2.0.0/p481/railsexpress/03-display-more-detailed-stack-trace.patch" - "${patchSet}/patches/ruby/2.0.0/p481/railsexpress/04-show-full-backtrace-on-stack-overflow.patch" - "${patchSet}/patches/ruby/2.0.0/p481/railsexpress/05-fix-missing-c-return-event.patch" + "${patchSet}/patches/ruby/2.0.0/p${passthru.patchLevel}/railsexpress/01-zero-broken-tests.patch" + "${patchSet}/patches/ruby/2.0.0/p${passthru.patchLevel}/railsexpress/02-railsexpress-gc.patch" + "${patchSet}/patches/ruby/2.0.0/p${passthru.patchLevel}/railsexpress/03-display-more-detailed-stack-trace.patch" + "${patchSet}/patches/ruby/2.0.0/p${passthru.patchLevel}/railsexpress/04-show-full-backtrace-on-stack-overflow.patch" ]; configureFlags = ["--enable-shared" ] @@ -96,7 +95,7 @@ stdenv.mkDerivation rec { majorVersion = "2"; minorVersion = "0"; teenyVersion = "0"; - patchLevel = "481"; + patchLevel = "645"; rubyEngine = "ruby"; libPath = "lib/${rubyEngine}/${majorVersion}.${minorVersion}.${teenyVersion}"; gemPath = "lib/${rubyEngine}/gems/${majorVersion}.${minorVersion}.${teenyVersion}"; diff --git a/pkgs/development/interpreters/ruby/ruby-2.2.2.nix b/pkgs/development/interpreters/ruby/ruby-2.2.2.nix new file mode 100644 index 000000000000..5537d0e8c806 --- /dev/null +++ b/pkgs/development/interpreters/ruby/ruby-2.2.2.nix @@ -0,0 +1,110 @@ +{ stdenv, lib, fetchurl, fetchgit, fetchFromGitHub +, zlib, zlibSupport ? true +, openssl, opensslSupport ? true +, gdbm, gdbmSupport ? true +, ncurses, readline, cursesSupport ? true +, groff, docSupport ? false +, libyaml, yamlSupport ? true +, libffi, fiddleSupport ? true +, ruby_2_2_2, autoreconfHook, bison, useRailsExpress ? true +}: + +let + op = stdenv.lib.optional; + ops = stdenv.lib.optionals; + patchSet = import ./rvm-patchsets.nix { inherit fetchFromGitHub; }; + config = import ./config.nix fetchgit; + baseruby = ruby_2_2_2.override { useRailsExpress = false; }; +in + +stdenv.mkDerivation rec { + version = with passthru; "${majorVersion}.${minorVersion}.${teenyVersion}-p${patchLevel}"; + + name = "ruby-${version}"; + + src = if useRailsExpress then fetchFromGitHub { + owner = "ruby"; + repo = "ruby"; + rev = "v2_2_2"; + sha256 = "08mw1ql2ghy483cp8xzzm78q17simn4l6phgm2gah7kjh9y3vbrn"; + } else fetchurl { + url = "http://cache.ruby-lang.org/pub/ruby/2.2/ruby-2.2.2.tar.gz"; + sha256 = "0i4v7l8pnam0by2cza12zldlhrffqchwb2m9shlnp7j2gqqhzz2z"; + }; + + # Have `configure' avoid `/usr/bin/nroff' in non-chroot builds. + NROFF = "${groff}/bin/nroff"; + + buildInputs = ops useRailsExpress [ autoreconfHook bison ] + ++ (op fiddleSupport libffi) + ++ (ops cursesSupport [ ncurses readline ]) + ++ (op docSupport groff) + ++ (op zlibSupport zlib) + ++ (op opensslSupport openssl) + ++ (op gdbmSupport gdbm) + ++ (op yamlSupport libyaml) + # Looks like ruby fails to build on darwin without readline even if curses + # support is not enabled, so add readline to the build inputs if curses + # support is disabled (if it's enabled, we already have it) and we're + # running on darwin + ++ (op (!cursesSupport && stdenv.isDarwin) readline); + + enableParallelBuilding = true; + + patches = ops useRailsExpress [ + "${patchSet}/patches/ruby/2.2.2/railsexpress/01-zero-broken-tests.patch" + "${patchSet}/patches/ruby/2.2.2/railsexpress/02-improve-gc-stats.patch" + "${patchSet}/patches/ruby/2.2.2/railsexpress/03-display-more-detailed-stack-trace.patch" + "${patchSet}/patches/ruby/2.2.2/railsexpress/04-backported-bugfixes-222.patch" + ]; + + postPatch = ops useRailsExpress '' + sed -i configure.in -e '/config.guess/d' + cp ${config}/config.guess tool/ + cp ${config}/config.sub tool/ + ''; + + configureFlags = ["--enable-shared" ] + ++ op useRailsExpress "--with-baseruby=${baseruby}/bin/ruby" + # on darwin, we have /usr/include/tk.h -- so the configure script detects + # that tk is installed + ++ ( if stdenv.isDarwin then [ "--with-out-ext=tk " ] else [ ]); + + installFlags = stdenv.lib.optionalString docSupport "install-doc"; + # Bundler tries to create this directory + postInstall = '' + # Bundler tries to create this directory + mkdir -pv $out/${passthru.gemPath} + mkdir -p $out/nix-support + cat > $out/nix-support/setup-hook < Date: Wed, 8 Jul 2015 00:22:57 +0200 Subject: [PATCH 19/35] pdfdiff: init at 0.92 --- pkgs/applications/misc/pdfdiff/default.nix | 41 ++++++++++++++++++++++ pkgs/top-level/all-packages.nix | 2 ++ 2 files changed, 43 insertions(+) create mode 100644 pkgs/applications/misc/pdfdiff/default.nix diff --git a/pkgs/applications/misc/pdfdiff/default.nix b/pkgs/applications/misc/pdfdiff/default.nix new file mode 100644 index 000000000000..43b980353439 --- /dev/null +++ b/pkgs/applications/misc/pdfdiff/default.nix @@ -0,0 +1,41 @@ +{ stdenv, pythonPackages, fetchurl, xpdf }: +let + py = pythonPackages; +in +py.buildPythonPackage rec { + name = "pdfdiff-${version}"; + version = "0.92"; + + src = fetchurl { + url = "http://www.cs.ox.ac.uk/people/cas.cremers/downloads/software/pdfdiff.py"; + sha256 = "0zxwjjbklz87wkbhkmsvhc7xmv5php7m2a9vm6ydhmhlxsybf836"; + }; + + buildInputs = [ pythonPackages.wrapPython ]; + + doCheck = false; + + phases = [ "unpackPhase" "patchPhase" "installPhase" ]; + + unpackPhase = "cp $src pdfdiff.py"; + + postPatch = '' + sed -i -r 's|pdftotextProgram = "pdftotext"|pdftotextProgram = "${xpdf}/bin/pdftotext"|' pdfdiff.py + sed -i -r 's|progName = "pdfdiff.py"|progName = "pdfdiff"|' pdfdiff.py + ''; + + installPhase = '' + mkdir -p $out/bin + cp pdfdiff.py $out/bin/pdfdiff + chmod +x $out/bin/pdfdiff + + substituteInPlace $out/bin/pdfdiff --replace "#!/usr/bin/python" "#!${pythonPackages.python.interpreter}" + ''; + + meta = with stdenv.lib; { + homepage = http://www.cs.ox.ac.uk/people/cas.cremers/misc/pdfdiff.html; + description = "Tool to view the difference between two PDF or PS files"; + license = licenses.gpl2Plus; + platforms = platforms.linux; + }; +} diff --git a/pkgs/top-level/all-packages.nix b/pkgs/top-level/all-packages.nix index bd8ac1e3640d..8c766cbef572 100644 --- a/pkgs/top-level/all-packages.nix +++ b/pkgs/top-level/all-packages.nix @@ -12132,6 +12132,8 @@ let maxlib = callPackage ../applications/audio/pd-plugins/maxlib { }; + pdfdiff = callPackage ../applications/misc/pdfdiff { }; + mupdf = callPackage ../applications/misc/mupdf { openjpeg = openjpeg_2_0; }; From 75f53bc6150a4b524779fa16f21e563a7c8745e3 Mon Sep 17 00:00:00 2001 From: Charles Strahan Date: Tue, 7 Jul 2015 18:37:54 -0400 Subject: [PATCH 20/35] ruby: set the default to 2.2.2 --- pkgs/top-level/all-packages.nix | 20 ++++++++++---------- 1 file changed, 10 insertions(+), 10 deletions(-) diff --git a/pkgs/top-level/all-packages.nix b/pkgs/top-level/all-packages.nix index 19f6458ac2d8..54251592159c 100644 --- a/pkgs/top-level/all-packages.nix +++ b/pkgs/top-level/all-packages.nix @@ -5083,22 +5083,22 @@ let ruby_1_8_7 = callPackage ../development/interpreters/ruby/ruby-1.8.7.nix { }; ruby_1_9_3 = callPackage ../development/interpreters/ruby/ruby-1.9.3.nix { }; - ruby_2_0_0 = lowPrio (callPackage ../development/interpreters/ruby/ruby-2.0.0.nix { }); - ruby_2_1_0 = lowPrio (callPackage ../development/interpreters/ruby/ruby-2.1.0.nix { }); - ruby_2_1_1 = lowPrio (callPackage ../development/interpreters/ruby/ruby-2.1.1.nix { }); - ruby_2_1_2 = lowPrio (callPackage ../development/interpreters/ruby/ruby-2.1.2.nix { }); - ruby_2_1_3 = lowPrio (callPackage ../development/interpreters/ruby/ruby-2.1.3.nix { }); - ruby_2_1_6 = lowPrio (callPackage ../development/interpreters/ruby/ruby-2.1.6.nix { }); - ruby_2_2_0 = lowPrio (callPackage ../development/interpreters/ruby/ruby-2.2.0.nix { }); - ruby_2_2_2 = lowPrio (callPackage ../development/interpreters/ruby/ruby-2.2.2.nix { }); + ruby_2_0_0 = callPackage ../development/interpreters/ruby/ruby-2.0.0.nix { }; + ruby_2_1_0 = callPackage ../development/interpreters/ruby/ruby-2.1.0.nix { }; + ruby_2_1_1 = callPackage ../development/interpreters/ruby/ruby-2.1.1.nix { }; + ruby_2_1_2 = callPackage ../development/interpreters/ruby/ruby-2.1.2.nix { }; + ruby_2_1_3 = callPackage ../development/interpreters/ruby/ruby-2.1.3.nix { }; + ruby_2_1_6 = callPackage ../development/interpreters/ruby/ruby-2.1.6.nix { }; + ruby_2_2_0 = callPackage ../development/interpreters/ruby/ruby-2.2.0.nix { }; + ruby_2_2_2 = callPackage ../development/interpreters/ruby/ruby-2.2.2.nix { }; # Ruby aliases - ruby = ruby_2_1; + ruby = ruby_2_2; ruby_1_8 = ruby_1_8_7; ruby_1_9 = ruby_1_9_3; ruby_2_0 = ruby_2_0_0; ruby_2_1 = ruby_2_1_6; - ruby_2_2 = ruby_2_2_0; + ruby_2_2 = ruby_2_2_2; rubygemsFun = ruby: builderDefsPackage (import ../development/interpreters/ruby/rubygems.nix) { inherit ruby makeWrapper; From 450c0da6d7a60b54eaf0720d6bcde4a5d23d6639 Mon Sep 17 00:00:00 2001 From: Leroy Hopson Date: Wed, 8 Jul 2015 18:44:30 +1200 Subject: [PATCH 21/35] vimPlugins: change wombat256 source to github See issue #8694. Previously wombat256 was downloading its source from the vim website using fetchurl. The builder was failing when it tried to unpack the .vim source file. Using the vim-scripts github repo avoids this problem. --- pkgs/misc/vim-plugins/default.nix | 18 ++++++++---------- pkgs/misc/vim-plugins/vim-plugin-names | 2 +- 2 files changed, 9 insertions(+), 11 deletions(-) diff --git a/pkgs/misc/vim-plugins/default.nix b/pkgs/misc/vim-plugins/default.nix index b91a1a2ae106..056f6d1e9d3a 100644 --- a/pkgs/misc/vim-plugins/default.nix +++ b/pkgs/misc/vim-plugins/default.nix @@ -80,6 +80,7 @@ rec { vimshell = vimshell-vim; watchdogs = vim-watchdogs; webapi-vim = WebAPI; + wombat256 = wombat256-vim; # backwards compat, added 2015-7-8 yankring = YankRing; CSApprox = buildVimPluginFrom2Nix { # created by nix#NixDerivation @@ -1315,18 +1316,15 @@ rec { }; - wombat256 = buildVimPluginFrom2Nix { # created by nix#NixDerivation - name = "wombat256"; - src = fetchurl { - url = "http://www.vim.org/scripts/download_script.php?src_id=13400"; - name = "wombat256mod.vim"; - sha256 = "1san0jg9sfm6chhnr1wc5nhczlp11ibca0v7i4gf68h9ick9mysn"; + wombat256-vim = buildVimPluginFrom2Nix { # created by nix#NixDerivation + name = "wombat256-vim-2010-10-17"; + src = fetchgit { + url = "git://github.com/vim-scripts/wombat256.vim"; + rev = "8734ba45dcf5e38c4d2686b35c94f9fcb30427e2"; + sha256 = "2feb7d57ab0a9f2ea44ccd606e540db64ab3285956398a50ecc562d7b8dbcd05"; }; - buildInputs = [ unzip ]; dependencies = []; - meta = { - url = "http://www.vim.org/scripts/script.php?script_id=2465"; - }; + }; } diff --git a/pkgs/misc/vim-plugins/vim-plugin-names b/pkgs/misc/vim-plugins/vim-plugin-names index 972754ec2baf..91d7f32fce53 100644 --- a/pkgs/misc/vim-plugins/vim-plugin-names +++ b/pkgs/misc/vim-plugins/vim-plugin-names @@ -57,6 +57,7 @@ "github:vim-scripts/a.vim" "github:vim-scripts/align" "github:vim-scripts/tabmerge" +"github:vim-scripts/wombat256.vim" "github:wakatime/vim-wakatime" "github:wincent/command-t" "matchit.zip" @@ -97,4 +98,3 @@ "vim-snippets" "vim2hs" "vundle" -"wombat256" From abf2642290a5f891039c8194ddfd84da0b4c9e43 Mon Sep 17 00:00:00 2001 From: Pascal Wittmann Date: Wed, 8 Jul 2015 10:26:55 +0200 Subject: [PATCH 22/35] st: update from 0.5 to 0.6 --- pkgs/applications/misc/st/default.nix | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/pkgs/applications/misc/st/default.nix b/pkgs/applications/misc/st/default.nix index 1dcdf78456d2..1ef8f697aeee 100644 --- a/pkgs/applications/misc/st/default.nix +++ b/pkgs/applications/misc/st/default.nix @@ -4,11 +4,11 @@ with stdenv.lib; stdenv.mkDerivation rec { - name = "st-0.5"; + name = "st-0.6"; src = fetchurl { url = "http://dl.suckless.org/st/${name}.tar.gz"; - sha256 = "0knxpzaa86pprng6hak8hx8bw22yw22rpz1ffxjpcvqlz3xdv05f"; + sha256 = "0avsfc1qp8zvshsfjwwrkvk411jlqy58z225bsdhjkl1qc40qcc5"; }; configFile = optionalString (conf!=null) (writeText "config.def.h" conf); From 4e33dd4e993c1b88a50dbb5f6855c569986cd30c Mon Sep 17 00:00:00 2001 From: Jaka Hudoklin Date: Tue, 7 Jul 2015 11:54:45 +0200 Subject: [PATCH 23/35] openshift: init at 1.0.1 --- .../networking/cluster/openshift/default.nix | 31 +++++++++++++++++++ pkgs/top-level/all-packages.nix | 2 ++ 2 files changed, 33 insertions(+) create mode 100644 pkgs/applications/networking/cluster/openshift/default.nix diff --git a/pkgs/applications/networking/cluster/openshift/default.nix b/pkgs/applications/networking/cluster/openshift/default.nix new file mode 100644 index 000000000000..527ddd99af1e --- /dev/null +++ b/pkgs/applications/networking/cluster/openshift/default.nix @@ -0,0 +1,31 @@ +{ stdenv, fetchgit, go, git, which }: + +stdenv.mkDerivation rec { + name = "openshift-origin-${version}"; + version = "1.0.1"; + + src = fetchgit { + url = https://github.com/openshift/origin.git; + rev = "1b601951daa44964c9bc7e4a2264d65489e3a58c"; + sha256 = "0nwyj3cgajmbd356w0362zxkd3p3pply58an2bmi3d3bswp3k89g"; + leaveDotGit = true; + deepClone = true; + }; + + buildInputs = [ go git which ]; + + buildPhase = "hack/build-go.sh"; + + installPhase = '' + mkdir -p "$out/bin" + cp _output/local/go/bin/* "$out/bin/" + ''; + + meta = with stdenv.lib; { + description = "Build, deploy, and manage your applications with Docker and Kubernetes"; + license = licenses.asl20; + homepage = http://www.openshift.org; + maintainers = with maintainers; [offline]; + platforms = [ "x86_64-linux" ]; + }; +} diff --git a/pkgs/top-level/all-packages.nix b/pkgs/top-level/all-packages.nix index e90ff4984b85..1422b687b728 100644 --- a/pkgs/top-level/all-packages.nix +++ b/pkgs/top-level/all-packages.nix @@ -12075,6 +12075,8 @@ let mutt-kz = callPackage ../applications/networking/mailreaders/mutt-kz { }; + openshift = callPackage ../applications/networking/cluster/openshift { }; + panamax_api = callPackage ../applications/networking/cluster/panamax/api { ruby = ruby_2_1; }; From e987d1c1e32d877d3d214165991a87bc81833c30 Mon Sep 17 00:00:00 2001 From: Shea Levy Date: Wed, 8 Jul 2015 06:24:38 -0400 Subject: [PATCH 24/35] requireFile: Make more flexible --- pkgs/build-support/trivial-builders.nix | 24 +++++++++++++++++------- 1 file changed, 17 insertions(+), 7 deletions(-) diff --git a/pkgs/build-support/trivial-builders.nix b/pkgs/build-support/trivial-builders.nix index 7e73f98db782..d9eeaa31359d 100644 --- a/pkgs/build-support/trivial-builders.nix +++ b/pkgs/build-support/trivial-builders.nix @@ -88,23 +88,33 @@ rec { (lib.concatMapStrings (x: "ln -s '${x.path}' '${x.name}';\n") entries)); # Require file - requireFile = {name, sha256, url ? null, message ? null} : + requireFile = { name ? null + , sha256 ? null + , sha1 ? null + , url ? null + , message ? null + } : assert (message != null) || (url != null); + assert (sha256 != null) || (sha1 != null); + assert (name != null) || (url != null); let msg = if message != null then message else '' - Unfortunately, we may not download file ${name} automatically. + Unfortunately, we may not download file ${name_} automatically. Please, go to ${url}, download it yourself, and add it to the Nix store using either - nix-store --add-fixed sha256 ${name} + nix-store --add-fixed ${hashAlgo} ${name_} or - nix-prefetch-url file://path/to/${name} + nix-prefetch-url --type ${hashAlgo} file://path/to/${name_} ''; + hashAlgo = if sha256 != null then "sha256" else "sha1"; + hash = if sha256 != null then sha256 else sha1; + name_ = if name == null then baseNameOf (toString url) else name; in stdenv.mkDerivation { - inherit name; - outputHashAlgo = "sha256"; - outputHash = sha256; + name = name_; + outputHashAlgo = hashAlgo; + outputHash = hash; builder = writeScript "restrict-message" '' source ${stdenv}/setup cat <<_EOF_ From a5a8bad0e6b7af11ec25dd34a5dba16fef6c5faa Mon Sep 17 00:00:00 2001 From: Shea Levy Date: Wed, 8 Jul 2015 06:24:55 -0400 Subject: [PATCH 25/35] buildMaven: Handle authenticated repos --- pkgs/build-support/build-maven.nix | 8 +++++--- 1 file changed, 5 insertions(+), 3 deletions(-) diff --git a/pkgs/build-support/build-maven.nix b/pkgs/build-support/build-maven.nix index 26be7d2aebb7..646b32435837 100644 --- a/pkgs/build-support/build-maven.nix +++ b/pkgs/build-support/build-maven.nix @@ -1,4 +1,4 @@ -{ stdenv, maven, runCommand, writeText, fetchurl, lib }: +{ stdenv, maven, runCommand, writeText, fetchurl, lib, requireFile }: /* Takes an info file generated by mvn2nix * (https://github.com/NixOS/mvn2nix-maven-plugin) and builds the maven * project with it. @@ -15,9 +15,11 @@ infoFile: let script = writeText "build-maven-repository.sh" '' ${lib.concatStrings (map (dep: let - inherit (dep) url sha1 groupId artifactId version; + inherit (dep) url sha1 groupId artifactId version authenticated; - fetch = fetchurl { inherit url sha1; }; + fetch = (if authenticated then requireFile else fetchurl) { + inherit url sha1; + }; in '' dir=$out/$(echo ${groupId} | sed 's|\.|/|g')/${artifactId}/${version} mkdir -p $dir From e54d0371b9f608967d79abb31f6b0e9893c59dc3 Mon Sep 17 00:00:00 2001 From: Sander van der Burg Date: Wed, 8 Jul 2015 12:03:56 +0000 Subject: [PATCH 26/35] disnix: bump to version 0.4 --- .../package-management/disnix/DisnixWebService/default.nix | 6 +++--- pkgs/tools/package-management/disnix/default.nix | 6 +++--- pkgs/tools/package-management/disnix/disnixos/default.nix | 6 +++--- pkgs/tools/package-management/disnix/dysnomia/default.nix | 6 +++--- 4 files changed, 12 insertions(+), 12 deletions(-) diff --git a/pkgs/tools/package-management/disnix/DisnixWebService/default.nix b/pkgs/tools/package-management/disnix/DisnixWebService/default.nix index 4e143bed5194..65a90bfae96d 100644 --- a/pkgs/tools/package-management/disnix/DisnixWebService/default.nix +++ b/pkgs/tools/package-management/disnix/DisnixWebService/default.nix @@ -1,10 +1,10 @@ {stdenv, fetchurl, apacheAnt, jdk, axis2, dbus_java}: stdenv.mkDerivation { - name = "DisnixWebService-0.3"; + name = "DisnixWebService-0.4"; src = fetchurl { - url = http://hydra.nixos.org/build/20419315/download/4/DisnixWebService-0.3.tar.bz2; - sha256 = "03vm84h7div200jr5z28hiwk0fq7i45j0ki18c2h4pmbsd89479i"; + url = http://hydra.nixos.org/build/23484798/download/4/DisnixWebService-0.4.tar.bz2; + sha256 = "1rfzmh4rxip8nq25fvi6vw51xb7h0nch4l06s0xgwwv4gw8p0lhm"; }; buildInputs = [ apacheAnt jdk ]; PREFIX = ''''${env.out}''; diff --git a/pkgs/tools/package-management/disnix/default.nix b/pkgs/tools/package-management/disnix/default.nix index 98213d9cf342..39d8132ba097 100644 --- a/pkgs/tools/package-management/disnix/default.nix +++ b/pkgs/tools/package-management/disnix/default.nix @@ -1,11 +1,11 @@ { stdenv, fetchurl, pkgconfig, dbus_glib, libxml2, libxslt, getopt, nixUnstable, dysnomia, libintlOrEmpty, libiconv }: stdenv.mkDerivation { - name = "disnix-0.3"; + name = "disnix-0.4"; src = fetchurl { - url = http://hydra.nixos.org/build/20419300/download/4/disnix-0.3.tar.gz; - sha256 = "11yh270r8mgnkz98ax3p4rlc5dh88sxykvsmcpvgaqnqjh1rwd3j"; + url = http://hydra.nixos.org/build/23484781/download/4/disnix-0.4.tar.gz; + sha256 = "1hvjy19br4x7cvgn0rslysrp3w7jfh30s7piq6v9j2b6k6wmh2hk"; }; buildInputs = [ pkgconfig dbus_glib libxml2 libxslt getopt nixUnstable libintlOrEmpty libiconv dysnomia ]; diff --git a/pkgs/tools/package-management/disnix/disnixos/default.nix b/pkgs/tools/package-management/disnix/disnixos/default.nix index 52312ca7191e..4603f108d378 100644 --- a/pkgs/tools/package-management/disnix/disnixos/default.nix +++ b/pkgs/tools/package-management/disnix/disnixos/default.nix @@ -1,11 +1,11 @@ { stdenv, fetchurl, disnix, socat, pkgconfig, getopt }: stdenv.mkDerivation { - name = "disnixos-0.2"; + name = "disnixos-0.3"; src = fetchurl { - url = http://hydra.nixos.org/build/20419306/download/3/disnixos-0.2.tar.gz; - sha256 = "1xysklly0gvh0np0h3f30sfs5lx6qnwj59l8caynwn46qy596gnx"; + url = http://hydra.nixos.org/build/23484787/download/3/disnixos-0.3.tar.gz; + sha256 = "08v9vbg3727mv4iyzwfnf5x3la2xjj1agbbzm8aaa09q7alqasvw"; }; buildInputs = [ socat pkgconfig disnix getopt ]; diff --git a/pkgs/tools/package-management/disnix/dysnomia/default.nix b/pkgs/tools/package-management/disnix/dysnomia/default.nix index 0507ff45dc72..f79250cf0189 100644 --- a/pkgs/tools/package-management/disnix/dysnomia/default.nix +++ b/pkgs/tools/package-management/disnix/dysnomia/default.nix @@ -20,10 +20,10 @@ assert enableEjabberdDump -> ejabberd != null; assert enableMongoDatabase -> mongodb != null; stdenv.mkDerivation { - name = "dysnomia-0.3"; + name = "dysnomia-0.4"; src = fetchurl { - url = http://hydra.nixos.org/build/20419293/download/1/dysnomia-0.3.tar.gz; - sha256 = "09z9ad72wzxjvbc3hynbj9n1y4rrxw1by1wxacjmdqyp46h4b746"; + url = http://hydra.nixos.org/build/23484767/download/1/dysnomia-0.4.tar.gz; + sha256 = "1xyd1gzsy4nlbv2l2lrrs964vvb74yhmb8snr4chf7hcyaybb6cq"; }; preConfigure = if enableEjabberdDump then "export PATH=$PATH:${ejabberd}/sbin" else ""; From 8ff60567ae1eb31e02de16e2f1e9e444592903f8 Mon Sep 17 00:00:00 2001 From: Tobias Geerinckx-Rice Date: Tue, 7 Jul 2015 14:09:38 +0200 Subject: [PATCH 27/35] shairport-sync: 2.3.0 -> 2.3.6.5 - Enable additional backends: pipe, stdout - Support high-quality resampling with soxr - Support configuration files, but don't install one - Cut down on boilerplate code with fetchFromGitHub/autoreconfHook --- pkgs/servers/shairport-sync/default.nix | 28 ++++++++++++++----------- 1 file changed, 16 insertions(+), 12 deletions(-) diff --git a/pkgs/servers/shairport-sync/default.nix b/pkgs/servers/shairport-sync/default.nix index 2bfe74900f6a..2ee5683a2ca2 100644 --- a/pkgs/servers/shairport-sync/default.nix +++ b/pkgs/servers/shairport-sync/default.nix @@ -1,36 +1,40 @@ -{ stdenv, fetchurl, openssl, avahi, alsaLib, libdaemon, autoconf, automake, libtool, popt, unzip, pkgconfig, libconfig, libpulseaudio }: +{ stdenv, fetchFromGitHub, autoreconfHook, openssl, avahi, alsaLib +, libdaemon, popt, pkgconfig, libconfig, libpulseaudio, soxr }: stdenv.mkDerivation rec { - version = "2.3.0"; + version = "2.3.6.5"; name = "shairport-sync-${version}"; - src = fetchurl { - url = "https://github.com/mikebrady/shairport-sync/archive/${version}.zip"; - sha256 = "1kslif2ifrn0frvi39d44wpn53sjahwq0xjc0hd98ycf3xbcgndg"; + src = fetchFromGitHub { + sha256 = "1337y62pnch27s2gr47miip3na1am24xprlc5a27lbr764nr85s3"; + rev = version; + repo = "shairport-sync"; + owner = "mikebrady"; }; buildInputs = [ + autoreconfHook openssl avahi alsaLib libdaemon - autoconf - automake pkgconfig - libtool popt - unzip libconfig libpulseaudio + soxr ]; enableParallelBuilding = true; - preConfigure = "autoreconf -vfi"; - configureFlags = "--with-alsa --with-avahi --with-ssl=openssl --without-initscript --with-pulseaudio"; + configureFlags = '' + --with-alsa --with-pipe --with-pulseaudio --with-stdout + --with-avahi --with-ssl=openssl --with-soxr + --without-configfiles --without-initscript + ''; meta = with stdenv.lib; { - homepage = https://github.com/mikebrady/shairport-sync; + inherit (src.meta) homepage; description = "Airtunes server and emulator with multi-room capabilities"; license = licenses.mit; platforms = platforms.unix; From 0b6e9f38caeedde5c0bc741968ed06738949ab15 Mon Sep 17 00:00:00 2001 From: Tobias Geerinckx-Rice Date: Wed, 8 Jul 2015 16:07:57 +0200 Subject: [PATCH 28/35] python-packages: pgcli 0.17.0 -> 0.18.0 Changes: https://raw.githubusercontent.com/dbcli/pgcli/master/changelog.rst --- pkgs/top-level/python-packages.nix | 13 ++++++------- 1 file changed, 6 insertions(+), 7 deletions(-) diff --git a/pkgs/top-level/python-packages.nix b/pkgs/top-level/python-packages.nix index 43e7ff131223..c31f34ffae3a 100644 --- a/pkgs/top-level/python-packages.nix +++ b/pkgs/top-level/python-packages.nix @@ -8839,22 +8839,21 @@ let pgcli = buildPythonPackage rec { name = "pgcli-${version}"; - version = "0.17.0"; + version = "0.18.0"; src = pkgs.fetchFromGitHub { - sha256 = "0fnzhsir1m7a2rlh3iqinrz5i38ssfg9p7s60bkyy55614l146yg"; + sha256 = "1ydi1725ryz9by770kyx06cwrvyvixbg3502brkf5hvbjd8ddzrl"; rev = "v${version}"; repo = "pgcli"; owner = "amjith"; }; - propagatedBuildInputs = with self; [ click jedi prompt_toolkit psycopg2 pygments sqlparse ]; - - postPatch = '' - substituteInPlace setup.py --replace "==" ">=" - ''; + propagatedBuildInputs = with self; [ + click configobj prompt_toolkit psycopg2 pygments sqlparse + ]; meta = { + inherit version; description = "Command-line interface for PostgreSQL"; longDescription = '' Rich command-line interface for PostgreSQL with auto-completion and From 1f2388044930c05c61584bf7a4bdec7a63ef02f4 Mon Sep 17 00:00:00 2001 From: Tobias Geerinckx-Rice Date: Wed, 8 Jul 2015 17:13:24 +0200 Subject: [PATCH 29/35] geolite-legacy: 2015-06-15 -> 2015-07-08 --- pkgs/data/misc/geolite-legacy/default.nix | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/pkgs/data/misc/geolite-legacy/default.nix b/pkgs/data/misc/geolite-legacy/default.nix index b6cc2a25266f..ae7b344ff0e7 100644 --- a/pkgs/data/misc/geolite-legacy/default.nix +++ b/pkgs/data/misc/geolite-legacy/default.nix @@ -8,17 +8,17 @@ let # Annoyingly, these files are updated without a change in URL. This means that # builds will start failing every month or so, until the hashes are updated. - version = "2015-06-15"; + version = "2015-07-08"; in stdenv.mkDerivation { name = "geolite-legacy-${version}"; srcGeoIP = fetchDB "GeoLiteCountry/GeoIP.dat.gz" - "1cd25xsw214bdmc657q3a1dcivjnh6ravdsgia2w7q8bq8g61yfp"; + "0c6jcmlgkybsqiwqwa21igjazf95dj38mn516cqqqfdg7ciaj1d5"; srcGeoIPv6 = fetchDB "GeoIPv6.dat.gz" "1vi82p41vas18yp17yk236pn1xamsi9662aav79fa0hm43i3ydx3"; srcGeoLiteCity = fetchDB "GeoLiteCity.dat.xz" - "1z87ng2a2zmqnvxhcmapnarc9w2ycb18vpivvzx893y7fh39h34s"; + "0x5ihg7qikzc195nix9r0izvbdnj4hy4rznvaxk56rf8yqcigdyv"; srcGeoLiteCityv6 = fetchDB "GeoLiteCityv6-beta/GeoLiteCityv6.dat.gz" "0xjzg76vdsayxyy1yyw64w781vad4c9nbhw61slh2qmazdr360g9"; srcGeoIPASNum = fetchDB "asnum/GeoIPASNum.dat.gz" From 8ead9cf0c51dc03f6a29fbb421fc923fa978ac4b Mon Sep 17 00:00:00 2001 From: William Casarin Date: Sat, 4 Jul 2015 16:42:54 -0700 Subject: [PATCH 30/35] caffe: init at rev 77d66dfc Initial version of the Caffe deep learning framework from Berkeley --- .../science/math/caffe/default.nix | 70 +++++++++++++++++++ pkgs/top-level/all-packages.nix | 4 ++ 2 files changed, 74 insertions(+) create mode 100644 pkgs/applications/science/math/caffe/default.nix diff --git a/pkgs/applications/science/math/caffe/default.nix b/pkgs/applications/science/math/caffe/default.nix new file mode 100644 index 000000000000..fc7d96115294 --- /dev/null +++ b/pkgs/applications/science/math/caffe/default.nix @@ -0,0 +1,70 @@ +{ stdenv +, openblas +, boost +, cudaSupport ? true +, cudnnSupport ? false +, cudnn ? null +, cudatoolkit7 +, fetchFromGitHub +, google-gflags +, glog +, hdf5 +, leveldb +, lmdb +, opencv +, protobuf +, snappy +}: + + +let optional = stdenv.lib.optional; +in stdenv.mkDerivation rec { + # Use git revision because latest "release" is really old + name = "caffe-git-2015-07-02"; + + src = fetchFromGitHub { + owner = "BVLC"; + repo = "caffe"; + rev = "77d66dfc907dd875d69bb9fc12dd950b531e464f"; + sha256 = "0vd4qrc49dhsawj298xpkd5mvi35sh56kdswx3yp8ya4fjajwakx"; + }; + + preConfigure = "mv Makefile.config.example Makefile.config"; + + makeFlags = "BLAS=open " + + (if !cudaSupport then "CPU_ONLY=1 " else "CUDA_DIR=${cudatoolkit7} ") + + (if cudnnSupport then "USE_CUDNN=1 " else ""); + + # too many issues with tests to run them for now + doCheck = false; + checkPhase = "make runtest ${makeFlags}"; + + buildInputs = [ openblas boost google-gflags glog hdf5 leveldb lmdb opencv + protobuf snappy ] + ++ optional cudaSupport cudatoolkit7 + ++ optional cudnnSupport cudnn; + + installPhase = '' + mkdir -p $out/{bin,share,lib} + for bin in $(find build/tools -executable -type f -name '*.bin'); + do + cp $bin $out/bin/$(basename $bin .bin) + done + + cp -r build/examples $out/share + cp -r build/lib $out + ''; + + meta = with stdenv.lib; { + description = "Deep learning framework"; + longDescription = '' + Caffe is a deep learning framework made with expression, speed, and + modularity in mind. It is developed by the Berkeley Vision and Learning + Center (BVLC) and by community contributors. + ''; + homepage = http://caffe.berkeleyvision.org/; + maintainers = with maintainers; [ jb55 ]; + license = licenses.bsd2; + platforms = platforms.linux; + }; +} diff --git a/pkgs/top-level/all-packages.nix b/pkgs/top-level/all-packages.nix index d92cfd3c7614..139f655110c8 100644 --- a/pkgs/top-level/all-packages.nix +++ b/pkgs/top-level/all-packages.nix @@ -14401,6 +14401,10 @@ let ### SCIENCE / MATH + caffe = callPackage ../applications/science/math/caffe { + cudaSupport = config.caffe.cudaSupport or config.cudaSupport or true; + }; + ecm = callPackage ../applications/science/math/ecm { }; eukleides = callPackage ../applications/science/math/eukleides { From c0de3b306be36d7e1f491998c9c096973a430121 Mon Sep 17 00:00:00 2001 From: Pascal Wittmann Date: Wed, 8 Jul 2015 19:14:36 +0200 Subject: [PATCH 31/35] nixos/bitlbee: add hostname, config dir and protocols options --- nixos/modules/services/networking/bitlbee.nix | 32 ++++++++++++++++++- 1 file changed, 31 insertions(+), 1 deletion(-) diff --git a/nixos/modules/services/networking/bitlbee.nix b/nixos/modules/services/networking/bitlbee.nix index 7276603da16f..ca2fff91704f 100644 --- a/nixos/modules/services/networking/bitlbee.nix +++ b/nixos/modules/services/networking/bitlbee.nix @@ -17,10 +17,12 @@ let [settings] RunMode = Daemon User = bitlbee - ConfigDir = /var/lib/bitlbee + ConfigDir = ${cfg.configDir} DaemonInterface = ${cfg.interface} DaemonPort = ${toString cfg.portNumber} AuthMode = ${cfg.authMode} + ${lib.optionalStringv (cfg.hostName != "") "HostName = ${cfg.hostName}"} + Protocols = ${cfg.protocols} ${cfg.extraSettings} [defaults] @@ -73,6 +75,34 @@ in ''; }; + hostName = mkOption { + default = ""; + type = types.str; + description = '' + Normally, BitlBee gets a hostname using getsockname(). If you have a nicer + alias for your BitlBee daemon, you can set it here and BitlBee will identify + itself with that name instead. + ''; + }; + + configDir = mkOption { + default = "/var/lib/bitlbee"; + type = types.path; + description = '' + Specify an alternative directory to store all the per-user configuration + files. + ''; + }; + + protocols = mkOption { + default = ""; + type = types.str; + description = '' + This option allows to remove the support of protocol, even if compiled + in. If nothing is given, there are no restrictions. + ''; + }; + extraSettings = mkOption { default = ""; description = '' From 1e4483b1ec7da4b662628f05eb220ea7a9ca1aea Mon Sep 17 00:00:00 2001 From: Pascal Wittmann Date: Wed, 8 Jul 2015 19:30:20 +0200 Subject: [PATCH 32/35] nixos/bitlbee: fixed protocols option --- nixos/modules/services/networking/bitlbee.nix | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/nixos/modules/services/networking/bitlbee.nix b/nixos/modules/services/networking/bitlbee.nix index ca2fff91704f..1ffd57e0621d 100644 --- a/nixos/modules/services/networking/bitlbee.nix +++ b/nixos/modules/services/networking/bitlbee.nix @@ -22,7 +22,7 @@ let DaemonPort = ${toString cfg.portNumber} AuthMode = ${cfg.authMode} ${lib.optionalStringv (cfg.hostName != "") "HostName = ${cfg.hostName}"} - Protocols = ${cfg.protocols} + ${lib.optionalString (cfg.protocols != "") "Protocols = ${cfg.protocols}"} ${cfg.extraSettings} [defaults] From bd82a79fc1c5bee7ec1378a68afbeb6cc5721b40 Mon Sep 17 00:00:00 2001 From: "William A. Kennington III" Date: Wed, 8 Jul 2015 11:28:41 -0700 Subject: [PATCH 33/35] xorriso: 1.3.8 -> 1.4.0 --- pkgs/tools/cd-dvd/xorriso/default.nix | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/pkgs/tools/cd-dvd/xorriso/default.nix b/pkgs/tools/cd-dvd/xorriso/default.nix index c5595fab2e0b..29d483f725fa 100644 --- a/pkgs/tools/cd-dvd/xorriso/default.nix +++ b/pkgs/tools/cd-dvd/xorriso/default.nix @@ -1,11 +1,11 @@ { fetchurl, stdenv, libcdio, zlib, bzip2, readline, acl, attr }: stdenv.mkDerivation rec { - name = "xorriso-1.3.8"; + name = "xorriso-1.4.0"; src = fetchurl { url = "mirror://gnu/xorriso/${name}.tar.gz"; - sha256 = "0zhhj9lr9z7hnb2alac54mc28w1l0mbanphhpmy3ylsi8rih84lh"; + sha256 = "0mhfxn2idkrw1i65a5y4gnb1fig85zpnszb9ax7w4a2v062y1l8b"; }; doCheck = true; From 590c46701810c59f4369226fd45244238b0add5f Mon Sep 17 00:00:00 2001 From: Rehno Lindeque Date: Mon, 6 Jul 2015 18:58:50 +0200 Subject: [PATCH 34/35] nodejs: 0.12.0 -> 0.12.6 0.12.5 and 0.12.6 were both critical security releases. --- pkgs/development/web/nodejs/default.nix | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/pkgs/development/web/nodejs/default.nix b/pkgs/development/web/nodejs/default.nix index 151033bfe249..1e3260bd10f8 100644 --- a/pkgs/development/web/nodejs/default.nix +++ b/pkgs/development/web/nodejs/default.nix @@ -12,7 +12,7 @@ let ln -sv /usr/sbin/dtrace $out/bin ''; - version = "0.12.0"; + version = "0.12.6"; deps = { inherit openssl zlib libuv; @@ -36,7 +36,7 @@ in stdenv.mkDerivation { src = fetchurl { url = "http://nodejs.org/dist/v${version}/node-v${version}.tar.gz"; - sha256 = "0cifd2qhpyrbxx71a4hsagzk24qas8m5zvwcyhx69cz9yhxf404p"; + sha256 = "1llsl7zl3080zd7jfhhy4d5s9pnhr15niw6vivp9sflpa71mlfvs"; }; configureFlags = concatMap sharedConfigureFlags (builtins.attrNames deps); From e861889e9922cdf4601ec316bbbaaad0d7cf3d62 Mon Sep 17 00:00:00 2001 From: "William A. Kennington III" Date: Wed, 8 Jul 2015 12:05:31 -0700 Subject: [PATCH 35/35] nixos/tests/installer: Add a testcase for fat32 /boot --- nixos/release-combined.nix | 1 + nixos/release.nix | 1 + nixos/tests/installer.nix | 21 +++++++++++++++++++++ 3 files changed, 23 insertions(+) diff --git a/nixos/release-combined.nix b/nixos/release-combined.nix index 191d5044341f..2d2976ea5b7c 100644 --- a/nixos/release-combined.nix +++ b/nixos/release-combined.nix @@ -56,6 +56,7 @@ in rec { (all nixos.tests.installer.lvm) (all nixos.tests.installer.luksroot) (all nixos.tests.installer.separateBoot) + (all nixos.tests.installer.separateBootFat) (all nixos.tests.installer.simple) (all nixos.tests.installer.simpleLabels) (all nixos.tests.installer.simpleProvided) diff --git a/nixos/release.nix b/nixos/release.nix index a8b6d275f1d8..c288adfd2063 100644 --- a/nixos/release.nix +++ b/nixos/release.nix @@ -229,6 +229,7 @@ in rec { tests.installer.lvm = forAllSystems (system: hydraJob (import tests/installer.nix { inherit system; }).lvm.test); tests.installer.luksroot = forAllSystems (system: hydraJob (import tests/installer.nix { inherit system; }).luksroot.test); tests.installer.separateBoot = forAllSystems (system: hydraJob (import tests/installer.nix { inherit system; }).separateBoot.test); + tests.installer.separateBootFat = forAllSystems (system: hydraJob (import tests/installer.nix { inherit system; }).separateBootFat.test); tests.installer.simple = forAllSystems (system: hydraJob (import tests/installer.nix { inherit system; }).simple.test); tests.installer.simpleLabels = forAllSystems (system: hydraJob (import tests/installer.nix { inherit system; }).simpleLabels.test); tests.installer.simpleProvided = forAllSystems (system: hydraJob (import tests/installer.nix { inherit system; }).simpleProvided.test); diff --git a/nixos/tests/installer.nix b/nixos/tests/installer.nix index 32be1ea23b98..4da5c29ca0d3 100644 --- a/nixos/tests/installer.nix +++ b/nixos/tests/installer.nix @@ -254,6 +254,27 @@ in { ''; }; + # Same as the previous, but with fat32 /boot. + separateBootFat = makeInstallerTest "separateBootFat" + { createPartitions = + '' + $machine->succeed( + "parted /dev/vda mklabel msdos", + "parted /dev/vda -- mkpart primary ext2 1M 50MB", # /boot + "parted /dev/vda -- mkpart primary linux-swap 50MB 1024M", + "parted /dev/vda -- mkpart primary ext2 1024M -1s", # / + "udevadm settle", + "mkswap /dev/vda2 -L swap", + "swapon -L swap", + "mkfs.ext3 -L nixos /dev/vda3", + "mount LABEL=nixos /mnt", + "mkfs.vfat -n BOOT /dev/vda1", + "mkdir -p /mnt/boot", + "mount LABEL=BOOT /mnt/boot", + ); + ''; + }; + # Create two physical LVM partitions combined into one volume group # that contains the logical swap and root partitions. lvm = makeInstallerTest "lvm"