diff --git a/nixos/modules/config/fonts/fontconfig.nix b/nixos/modules/config/fonts/fontconfig.nix
index 6f17bd396a0b..922a9cf961df 100644
--- a/nixos/modules/config/fonts/fontconfig.nix
+++ b/nixos/modules/config/fonts/fontconfig.nix
@@ -142,7 +142,7 @@ with lib;
config =
let fontconfig = config.fonts.fontconfig;
fcBool = x: "" + (if x then "true" else "false") + "";
- nixosConf = ''
+ renderConf = ''
@@ -169,6 +169,21 @@ with lib;
+ ${optionalString (fontconfig.dpi != 0) ''
+
+
+ ${toString fontconfig.dpi}
+
+
+ ''}
+
+
+ '';
+ genericAliasConf = ''
+
+
+
+
${optionalString (fontconfig.defaultFonts.sansSerif != []) ''
@@ -201,14 +216,6 @@ with lib;
''}
- ${optionalString (fontconfig.dpi != 0) ''
-
-
- ${toString fontconfig.dpi}
-
-
- ''}
-
'';
in mkIf fontconfig.enable {
@@ -219,7 +226,8 @@ with lib;
environment.etc."fonts/fonts.conf".source =
pkgs.makeFontsConf { fontconfig = pkgs.fontconfig_210; fontDirectories = config.fonts.fonts; };
- environment.etc."fonts/conf.d/98-nixos.conf".text = nixosConf;
+ environment.etc."fonts/conf.d/10-nixos-rendering.conf".text = renderConf;
+ environment.etc."fonts/conf.d/60-nixos-generic-alias.conf".text = genericAliasConf;
# Versioned fontconfig > 2.10. Take shared fonts.conf from fontconfig.
# Otherwise specify only font directories.
@@ -236,7 +244,8 @@ with lib;
'';
- environment.etc."fonts/${pkgs.fontconfig.configVersion}/conf.d/98-nixos.conf".text = nixosConf;
+ environment.etc."fonts/${pkgs.fontconfig.configVersion}/conf.d/10-nixos-rendering.conf".text = renderConf;
+ environment.etc."fonts/${pkgs.fontconfig.configVersion}/conf.d/60-nixos-generic-alias.conf".text = genericAliasConf;
environment.etc."fonts/${pkgs.fontconfig.configVersion}/conf.d/99-user.conf" = {
enable = fontconfig.includeUserConf;
diff --git a/nixos/modules/misc/ids.nix b/nixos/modules/misc/ids.nix
index b25e3d7e40db..1e5393f26b54 100644
--- a/nixos/modules/misc/ids.nix
+++ b/nixos/modules/misc/ids.nix
@@ -228,6 +228,7 @@
subsonic = 204;
riak = 205;
shout = 206;
+ gateone = 207;
# When adding a uid, make sure it doesn't match an existing gid. And don't use uids above 399!
@@ -434,6 +435,7 @@
subsonic = 204;
riak = 205;
#shout = 206; #unused
+ gateone = 207;
# When adding a gid, make sure it doesn't match an existing
# uid. Users and groups with the same name should have equal
diff --git a/nixos/modules/module-list.nix b/nixos/modules/module-list.nix
index 212555d7efcc..409f22920871 100644
--- a/nixos/modules/module-list.nix
+++ b/nixos/modules/module-list.nix
@@ -72,7 +72,6 @@
./programs/ssmtp.nix
./programs/uim.nix
./programs/venus.nix
- ./programs/virtualbox-host.nix
./programs/wvdial.nix
./programs/freetds.nix
./programs/zsh/zsh.nix
@@ -283,6 +282,7 @@
./services/networking/firewall.nix
./services/networking/flashpolicyd.nix
./services/networking/freenet.nix
+ ./services/networking/gateone.nix
./services/networking/git-daemon.nix
./services/networking/gnunet.nix
./services/networking/gogoclient.nix
@@ -486,6 +486,7 @@
./virtualisation/openvswitch.nix
./virtualisation/parallels-guest.nix
./virtualisation/virtualbox-guest.nix
+ ./virtualisation/virtualbox-host.nix
./virtualisation/vmware-guest.nix
./virtualisation/xen-dom0.nix
]
diff --git a/nixos/modules/services/hardware/freefall.nix b/nixos/modules/services/hardware/freefall.nix
index 6e6960bac491..7867956c1ab0 100644
--- a/nixos/modules/services/hardware/freefall.nix
+++ b/nixos/modules/services/hardware/freefall.nix
@@ -39,11 +39,14 @@ with lib;
mkService = dev:
assert dev != "";
let dev' = utils.escapeSystemdPath dev; in
- nameValuePair "freefall-${dev'}"
- { description = "Free-fall protection for ${dev}";
+ nameValuePair "freefall-${dev'}" {
+ description = "Free-fall protection for ${dev}";
after = [ "${dev'}.device" ];
wantedBy = [ "${dev'}.device" ];
path = [ pkgs.freefall ];
+ unitConfig = {
+ DefaultDependencies = false;
+ };
serviceConfig = {
ExecStart = "${pkgs.freefall}/bin/freefall ${dev}";
Restart = "on-failure";
diff --git a/nixos/modules/services/networking/gateone.nix b/nixos/modules/services/networking/gateone.nix
new file mode 100644
index 000000000000..b8ae5490d7ba
--- /dev/null
+++ b/nixos/modules/services/networking/gateone.nix
@@ -0,0 +1,59 @@
+{ config, lib, pkgs, ...}:
+with lib;
+let
+ cfg = config.services.gateone;
+in
+{
+options = {
+ services.gateone = {
+ enable = mkEnableOption "GateOne server";
+ pidDir = mkOption {
+ default = "/run/gateone";
+ type = types.path;
+ description = ''Path of pid files for GateOne.'';
+ };
+ settingsDir = mkOption {
+ default = "/var/lib/gateone";
+ type = types.path;
+ description = ''Path of configuration files for GateOne.'';
+ };
+ };
+};
+config = mkIf cfg.enable {
+ environment.systemPackages = with pkgs.pythonPackages; [
+ gateone pkgs.openssh pkgs.procps pkgs.coreutils ];
+
+ users.extraUsers.gateone = {
+ description = "GateOne privilege separation user";
+ uid = config.ids.uids.gateone;
+ home = cfg.settingsDir;
+ };
+ users.extraGroups.gateone.gid = config.ids.gids.gateone;
+
+ systemd.services.gateone = with pkgs; {
+ description = "GateOne web-based terminal";
+ path = [ pythonPackages.gateone nix openssh procps coreutils ];
+ preStart = ''
+ if [ ! -d ${cfg.settingsDir} ] ; then
+ mkdir -m 0750 -p ${cfg.settingsDir}
+ mkdir -m 0750 -p ${cfg.pidDir}
+ chown -R gateone.gateone ${cfg.settingsDir}
+ chown -R gateone.gateone ${cfg.pidDir}
+ fi
+ '';
+ #unitConfig.RequiresMountsFor = "${cfg.settingsDir}";
+ serviceConfig = {
+ ExecStart = ''${pythonPackages.gateone}/bin/gateone --settings_dir=${cfg.settingsDir} --pid_file=${cfg.pidDir}/gateone.pid --gid=${toString config.ids.gids.gateone} --uid=${toString config.ids.uids.gateone}'';
+ User = "gateone";
+ Group = "gateone";
+ WorkingDirectory = cfg.settingsDir;
+ PermissionsStartOnly = true;
+
+ };
+
+ wantedBy = [ "multi-user.target" ];
+ requires = [ "network.target" ];
+ };
+};
+}
+
diff --git a/nixos/modules/services/printing/cupsd.nix b/nixos/modules/services/printing/cupsd.nix
index fd9589883edc..e743aa8a3236 100644
--- a/nixos/modules/services/printing/cupsd.nix
+++ b/nixos/modules/services/printing/cupsd.nix
@@ -230,8 +230,8 @@ in
];
};
- systemd.services.cups-browsed =
- { description = "Make remote CUPS printers available locally";
+ systemd.services.cups-browsed = mkIf config.services.avahi.enable
+ { description = "CUPS Remote Printer Discovery";
wantedBy = [ "multi-user.target" ];
wants = [ "cups.service" "avahi-daemon.service" ];
diff --git a/nixos/modules/virtualisation/virtualbox-guest.nix b/nixos/modules/virtualisation/virtualbox-guest.nix
index a0e4bd558e05..6c4014fc4a1e 100644
--- a/nixos/modules/virtualisation/virtualbox-guest.nix
+++ b/nixos/modules/virtualisation/virtualbox-guest.nix
@@ -54,7 +54,7 @@ in
unitConfig.ConditionVirtualization = "oracle";
- serviceConfig.ExecStart = "@${kernel.virtualboxGuestAdditions}/sbin/VBoxService VBoxService --foreground";
+ serviceConfig.ExecStart = "@${kernel.virtualboxGuestAdditions}/bin/VBoxService VBoxService --foreground";
};
services.xserver.videoDrivers = mkOverride 50 [ "virtualbox" ];
diff --git a/nixos/modules/programs/virtualbox-host.nix b/nixos/modules/virtualisation/virtualbox-host.nix
similarity index 100%
rename from nixos/modules/programs/virtualbox-host.nix
rename to nixos/modules/virtualisation/virtualbox-host.nix
diff --git a/nixos/tests/avahi.nix b/nixos/tests/avahi.nix
index a39104f603ec..a8369a6d1f88 100644
--- a/nixos/tests/avahi.nix
+++ b/nixos/tests/avahi.nix
@@ -2,7 +2,7 @@
import ./make-test.nix ({ pkgs, ... } : {
name = "avahi";
meta = with pkgs.stdenv.lib.maintainers; {
- maintainers = [ eelco chaoflow wizeman ];
+ maintainers = [ eelco chaoflow ];
};
nodes = {
diff --git a/nixos/tests/printing.nix b/nixos/tests/printing.nix
index 0db9a529644b..ea18114b61c4 100644
--- a/nixos/tests/printing.nix
+++ b/nixos/tests/printing.nix
@@ -3,7 +3,7 @@
import ./make-test.nix ({pkgs, ... }: {
name = "printing";
meta = with pkgs.stdenv.lib.maintainers; {
- maintainers = [ iElectric eelco chaoflow jgeerds vcunat ];
+ maintainers = [ iElectric eelco chaoflow jgeerds ];
};
nodes = {
diff --git a/nixos/tests/riak.nix b/nixos/tests/riak.nix
index a56f51c4e50e..f36d12bdb2cf 100644
--- a/nixos/tests/riak.nix
+++ b/nixos/tests/riak.nix
@@ -16,6 +16,6 @@ import ./make-test.nix {
$master->waitForUnit("riak");
$master->sleep(20); # Hopefully this is long enough!!
- $master->succeed("RIAK_DATA_DIR='/var/db/riak' RIAK_LOG_DIR='/var/log/riak' RIAK_ETC_DIR='/etc/riak' riak ping 2>&1");
+ $master->succeed("riak ping 2>&1");
'';
}
diff --git a/nixos/tests/virtualbox.nix b/nixos/tests/virtualbox.nix
index f94d219aba60..4895eb134dc1 100644
--- a/nixos/tests/virtualbox.nix
+++ b/nixos/tests/virtualbox.nix
@@ -8,7 +8,7 @@ import ./make-test.nix ({ pkgs, ... }: with pkgs.lib; let
#!${pkgs.stdenv.shell} -xe
export PATH="${pkgs.coreutils}/bin:${pkgs.utillinux}/bin"
- ${pkgs.linuxPackages.virtualboxGuestAdditions}/sbin/VBoxService
+ ${pkgs.linuxPackages.virtualboxGuestAdditions}/bin/VBoxService
${(attrs.vmScript or (const "")) pkgs}
i=0
@@ -39,7 +39,7 @@ import ./make-test.nix ({ pkgs, ... }: with pkgs.lib; let
];
boot.initrd.extraUtilsCommands = ''
- copy_bin_and_libs "${pkgs.linuxPackages.virtualboxGuestAdditions}/sbin/mount.vboxsf"
+ copy_bin_and_libs "${pkgs.linuxPackages.virtualboxGuestAdditions}/bin/mount.vboxsf"
copy_bin_and_libs "${pkgs.utillinux}/bin/unshare"
${(attrs.extraUtilsCommands or (const "")) pkgs}
'';
diff --git a/pkgs/applications/graphics/inkscape/default.nix b/pkgs/applications/graphics/inkscape/default.nix
index 41531ed0de84..409fd0a767ce 100644
--- a/pkgs/applications/graphics/inkscape/default.nix
+++ b/pkgs/applications/graphics/inkscape/default.nix
@@ -2,9 +2,20 @@
, libpng, zlib, popt, boehmgc, libxml2, libxslt, glib, gtkmm
, glibmm, libsigcxx, lcms, boost, gettext, makeWrapper, intltool
, gsl, python, pyxml, lxml, poppler, imagemagick, libwpg, librevenge
-, libvisio, libcdr, libexif
+, libvisio, libcdr, libexif, unzip
+, boxMakerPlugin ? false # boxmaker plugin
}:
+let
+
+boxmaker = fetchurl {
+ # http://www.inkscapeforum.com/viewtopic.php?f=11&t=10403
+ url = "http://www.keppel.demon.co.uk/111000/files/BoxMaker0.91.zip";
+ sha256 = "5c5697f43dc3a95468f61f479cb50b7e2b93379a1729abf19e4040ac9f43a1a8";
+};
+
+in
+
stdenv.mkDerivation rec {
name = "inkscape-0.91";
@@ -34,12 +45,23 @@ stdenv.mkDerivation rec {
libxml2 libxslt glib gtkmm glibmm libsigcxx lcms boost gettext
makeWrapper intltool gsl poppler imagemagick libwpg librevenge
libvisio libcdr libexif
- ];
+ ] ++ stdenv.lib.optional boxMakerPlugin unzip;
enableParallelBuilding = true;
doCheck = true;
postInstall = ''
+ ${if boxMakerPlugin then "
+ mkdir -p $out/share/inkscape/extensions/
+ # boxmaker packaged version 0.91 in a directory called 0.85 ?!??
+ unzip ${boxmaker};
+ cp boxmake-upd-0.85/* $out/share/inkscape/extensions/
+ rm -Rf boxmake-upd-0.85
+ "
+ else
+ ""
+ }
+
# Make sure PyXML modules can be found at run-time.
for i in "$out/bin/"*
do
diff --git a/pkgs/applications/misc/calibre/default.nix b/pkgs/applications/misc/calibre/default.nix
index 787b5e805287..4c15ccc04289 100644
--- a/pkgs/applications/misc/calibre/default.nix
+++ b/pkgs/applications/misc/calibre/default.nix
@@ -5,11 +5,12 @@
}:
stdenv.mkDerivation rec {
- name = "calibre-2.31.0";
+ name = "calibre-2.33.0";
+ version = "2.33.0";
src = fetchurl {
- url = "mirror://sourceforge/calibre/${name}.tar.xz";
- sha256 = "1414c324alvgwbiszalklck1kay41yca2wnm488imr2768fihzkz";
+ url = "https://github.com/kovidgoyal/calibre/releases/download/v${version}/${name}.tar.xz";
+ sha256 = "0j1micmjffi6rsn3ayblnz0wq648v05ckbn1qsiz086iaj2285q9";
};
inherit python;
diff --git a/pkgs/applications/misc/llpp/default.nix b/pkgs/applications/misc/llpp/default.nix
index bd0727ccab11..9d9b69f59588 100644
--- a/pkgs/applications/misc/llpp/default.nix
+++ b/pkgs/applications/misc/llpp/default.nix
@@ -1,19 +1,20 @@
{ stdenv, makeWrapper, fetchgit, pkgconfig, ninja, ocaml, findlib, mupdf, lablgl
-, gtk3, openjpeg, jbig2dec, mujs, xsel }:
+, gtk3, openjpeg, jbig2dec, mujs, xsel, openssl }:
let ocamlVersion = (builtins.parseDrvName (ocaml.name)).version;
in stdenv.mkDerivation rec {
name = "llpp-${version}";
- version = "21-git-2015-06-27";
+ version = "21-git-2015-07-30";
src = fetchgit {
url = "git://repo.or.cz/llpp.git";
- rev = "843c42ef41bb78a3b1ee995fc2bab91f8796e8ad";
- sha256 = "0h8wa7f5bj5sm3sr8namcyy81s4s80hyasimyfw935lqyw2q2k60";
+ rev = "e9fe06d684b145a104cc319673076e069e853cac";
+ sha256 = "0x3hgn6sfjln2sqdw40ylcj943rn732a6mlfwz01llx8ykiyvsvq";
+ fetchSubmodules = false;
};
buildInputs = [ pkgconfig ninja makeWrapper ocaml findlib mupdf lablgl
- gtk3 jbig2dec openjpeg mujs ];
+ gtk3 jbig2dec openjpeg mujs openssl ];
configurePhase = ''
sh configure.sh -O -F ${mupdf}
diff --git a/pkgs/applications/networking/browsers/chromium/plugins.nix b/pkgs/applications/networking/browsers/chromium/plugins.nix
index 5bb6a93d8d74..0b0e5bd08382 100644
--- a/pkgs/applications/networking/browsers/chromium/plugins.nix
+++ b/pkgs/applications/networking/browsers/chromium/plugins.nix
@@ -53,7 +53,7 @@ let
wvDescription = "Playback of encrypted HTML audio/video content";
wvMimeTypes = "application/x-ppapi-widevine-cdm";
wvModule = "$widevine/lib/libwidevinecdmadapter.so";
- wvInfo = "#${wvName}#${wvDescription}:${wvMimeTypes}";
+ wvInfo = "#${wvName}#${wvDescription};${wvMimeTypes}";
in ''
flashVersion="$(
sed -n -r 's/.*"version": "([^"]+)",.*/\1/p' PepperFlash/manifest.json
diff --git a/pkgs/applications/networking/browsers/dwb/default.nix b/pkgs/applications/networking/browsers/dwb/default.nix
index 6f6ffd67a539..d79a5215ce21 100644
--- a/pkgs/applications/networking/browsers/dwb/default.nix
+++ b/pkgs/applications/networking/browsers/dwb/default.nix
@@ -30,5 +30,9 @@ stdenv.mkDerivation {
platforms = platforms.mesaPlatforms;
maintainers = with maintainers; [ pSub ];
license = licenses.gpl3;
+
+ # dwb is no longer maintained by portix and efforts to keep it alive
+ # were not successful, see issue #7952 for discussion.
+ broken = true;
};
}
diff --git a/pkgs/applications/networking/cluster/mesos/default.nix b/pkgs/applications/networking/cluster/mesos/default.nix
index c330b8acfbf3..f9c34fdd29df 100644
--- a/pkgs/applications/networking/cluster/mesos/default.nix
+++ b/pkgs/applications/networking/cluster/mesos/default.nix
@@ -9,14 +9,14 @@ let
soext = if stdenv.system == "x86_64-darwin" then "dylib" else "so";
in stdenv.mkDerivation rec {
- version = "0.22.1";
+ version = "0.23.0";
name = "mesos-${version}";
dontDisableStatic = true;
src = fetchurl {
url = "http://www.apache.org/dist/mesos/${version}/mesos-${version}.tar.gz";
- sha256 = "0ry0ppzgpab68fz5bzd7ry5rjbg8xjz73x1x4c5id42cpsqnn7x5";
+ sha256 = "1v5xpn4wal4vcrvcklchx9slkpa8xlwqkdbnxzy9zkzpq5g3arxr";
};
buildInputs = [
@@ -93,13 +93,15 @@ in stdenv.mkDerivation rec {
echo "export MESOS_NATIVE_LIBRARY=$MESOS_NATIVE_JAVA_LIBRARY" >> $out/nix-support/setup-hook
# Inspired by: pkgs/development/python-modules/generic/default.nix
+ pushd src/python
mkdir -p $out/lib/${python.libPrefix}/site-packages
export PYTHONPATH="$out/lib/${python.libPrefix}/site-packages:$PYTHONPATH"
- ${python}/bin/${python.executable} src/python/setup.py install \
+ ${python}/bin/${python.executable} setup.py install \
--install-lib=$out/lib/${python.libPrefix}/site-packages \
--old-and-unmanageable \
--prefix="$out"
rm -f "$out/lib/${python.libPrefix}"/site-packages/site.py*
+ popd
'';
postFixup = ''
diff --git a/pkgs/applications/networking/instant-messengers/telegram-cli/default.nix b/pkgs/applications/networking/instant-messengers/telegram-cli/default.nix
index a68e0ee11045..90c8e9a7e9eb 100644
--- a/pkgs/applications/networking/instant-messengers/telegram-cli/default.nix
+++ b/pkgs/applications/networking/instant-messengers/telegram-cli/default.nix
@@ -1,28 +1,26 @@
{ stdenv, fetchgit, libconfig, lua5_2, openssl, readline, zlib
+, libevent, pkgconfig, python, jansson, bash
}:
stdenv.mkDerivation rec {
- name = "telegram-cli-2014-03-04";
+ name = "telegram-cli-2015-07-30";
src = fetchgit {
url = "https://github.com/vysheng/tg.git";
- rev = "ac6079a00ac66bb37a3179a82af130b41ec39bc9";
- sha256 = "1rpwnyzmqk7p97n5pd00m5c6rypc39mb3hs94qxxrdcpwpgcb73q";
+ sha256 = "0phn9nl0sf2fylzfwi427xq60cfrnpsvhh8bp55y1wcjkmp0fxsn";
+ rev = "2052f4b381337d75e783facdbfad56b04dec1a9c";
};
- buildInputs = [ libconfig lua5_2 openssl readline zlib ];
-
- NIX_CFLAGS_COMPILE = "-Wno-error=deprecated-declarations"; # CPPFunction
-
+ buildInputs = [ libconfig lua5_2 openssl readline zlib libevent pkgconfig python jansson ];
installPhase = ''
mkdir -p $out/bin
- cp ./telegram $out/bin/telegram-wo-key
- cp ./tg.pub $out/
- cat > $out/bin/telegram < $out/bin/telegram-cli <