mirror of
https://github.com/ilyakooo0/nixpkgs.git
synced 2024-11-14 05:37:40 +03:00
Merge branch 'master.upstream' into staging.upstream
This commit is contained in:
commit
926f073f55
@ -142,7 +142,7 @@ with lib;
|
|||||||
config =
|
config =
|
||||||
let fontconfig = config.fonts.fontconfig;
|
let fontconfig = config.fonts.fontconfig;
|
||||||
fcBool = x: "<bool>" + (if x then "true" else "false") + "</bool>";
|
fcBool = x: "<bool>" + (if x then "true" else "false") + "</bool>";
|
||||||
nixosConf = ''
|
renderConf = ''
|
||||||
<?xml version='1.0'?>
|
<?xml version='1.0'?>
|
||||||
<!DOCTYPE fontconfig SYSTEM 'fonts.dtd'>
|
<!DOCTYPE fontconfig SYSTEM 'fonts.dtd'>
|
||||||
<fontconfig>
|
<fontconfig>
|
||||||
@ -169,6 +169,21 @@ with lib;
|
|||||||
</edit>
|
</edit>
|
||||||
</match>
|
</match>
|
||||||
|
|
||||||
|
${optionalString (fontconfig.dpi != 0) ''
|
||||||
|
<match target="pattern">
|
||||||
|
<edit name="dpi" mode="assign">
|
||||||
|
<double>${toString fontconfig.dpi}</double>
|
||||||
|
</edit>
|
||||||
|
</match>
|
||||||
|
''}
|
||||||
|
|
||||||
|
</fontconfig>
|
||||||
|
'';
|
||||||
|
genericAliasConf = ''
|
||||||
|
<?xml version='1.0'?>
|
||||||
|
<!DOCTYPE fontconfig SYSTEM 'fonts.dtd'>
|
||||||
|
<fontconfig>
|
||||||
|
|
||||||
<!-- Default fonts -->
|
<!-- Default fonts -->
|
||||||
${optionalString (fontconfig.defaultFonts.sansSerif != []) ''
|
${optionalString (fontconfig.defaultFonts.sansSerif != []) ''
|
||||||
<alias>
|
<alias>
|
||||||
@ -201,14 +216,6 @@ with lib;
|
|||||||
</alias>
|
</alias>
|
||||||
''}
|
''}
|
||||||
|
|
||||||
${optionalString (fontconfig.dpi != 0) ''
|
|
||||||
<match target="pattern">
|
|
||||||
<edit name="dpi" mode="assign">
|
|
||||||
<double>${toString fontconfig.dpi}</double>
|
|
||||||
</edit>
|
|
||||||
</match>
|
|
||||||
''}
|
|
||||||
|
|
||||||
</fontconfig>
|
</fontconfig>
|
||||||
'';
|
'';
|
||||||
in mkIf fontconfig.enable {
|
in mkIf fontconfig.enable {
|
||||||
@ -219,7 +226,8 @@ with lib;
|
|||||||
environment.etc."fonts/fonts.conf".source =
|
environment.etc."fonts/fonts.conf".source =
|
||||||
pkgs.makeFontsConf { fontconfig = pkgs.fontconfig_210; fontDirectories = config.fonts.fonts; };
|
pkgs.makeFontsConf { fontconfig = pkgs.fontconfig_210; fontDirectories = config.fonts.fonts; };
|
||||||
|
|
||||||
environment.etc."fonts/conf.d/98-nixos.conf".text = nixosConf;
|
environment.etc."fonts/conf.d/10-nixos-rendering.conf".text = renderConf;
|
||||||
|
environment.etc."fonts/conf.d/60-nixos-generic-alias.conf".text = genericAliasConf;
|
||||||
|
|
||||||
# Versioned fontconfig > 2.10. Take shared fonts.conf from fontconfig.
|
# Versioned fontconfig > 2.10. Take shared fonts.conf from fontconfig.
|
||||||
# Otherwise specify only font directories.
|
# Otherwise specify only font directories.
|
||||||
@ -236,7 +244,8 @@ with lib;
|
|||||||
</fontconfig>
|
</fontconfig>
|
||||||
'';
|
'';
|
||||||
|
|
||||||
environment.etc."fonts/${pkgs.fontconfig.configVersion}/conf.d/98-nixos.conf".text = nixosConf;
|
environment.etc."fonts/${pkgs.fontconfig.configVersion}/conf.d/10-nixos-rendering.conf".text = renderConf;
|
||||||
|
environment.etc."fonts/${pkgs.fontconfig.configVersion}/conf.d/60-nixos-generic-alias.conf".text = genericAliasConf;
|
||||||
|
|
||||||
environment.etc."fonts/${pkgs.fontconfig.configVersion}/conf.d/99-user.conf" = {
|
environment.etc."fonts/${pkgs.fontconfig.configVersion}/conf.d/99-user.conf" = {
|
||||||
enable = fontconfig.includeUserConf;
|
enable = fontconfig.includeUserConf;
|
||||||
|
@ -228,6 +228,7 @@
|
|||||||
subsonic = 204;
|
subsonic = 204;
|
||||||
riak = 205;
|
riak = 205;
|
||||||
shout = 206;
|
shout = 206;
|
||||||
|
gateone = 207;
|
||||||
|
|
||||||
# When adding a uid, make sure it doesn't match an existing gid. And don't use uids above 399!
|
# When adding a uid, make sure it doesn't match an existing gid. And don't use uids above 399!
|
||||||
|
|
||||||
@ -434,6 +435,7 @@
|
|||||||
subsonic = 204;
|
subsonic = 204;
|
||||||
riak = 205;
|
riak = 205;
|
||||||
#shout = 206; #unused
|
#shout = 206; #unused
|
||||||
|
gateone = 207;
|
||||||
|
|
||||||
# When adding a gid, make sure it doesn't match an existing
|
# When adding a gid, make sure it doesn't match an existing
|
||||||
# uid. Users and groups with the same name should have equal
|
# uid. Users and groups with the same name should have equal
|
||||||
|
@ -72,7 +72,6 @@
|
|||||||
./programs/ssmtp.nix
|
./programs/ssmtp.nix
|
||||||
./programs/uim.nix
|
./programs/uim.nix
|
||||||
./programs/venus.nix
|
./programs/venus.nix
|
||||||
./programs/virtualbox-host.nix
|
|
||||||
./programs/wvdial.nix
|
./programs/wvdial.nix
|
||||||
./programs/freetds.nix
|
./programs/freetds.nix
|
||||||
./programs/zsh/zsh.nix
|
./programs/zsh/zsh.nix
|
||||||
@ -283,6 +282,7 @@
|
|||||||
./services/networking/firewall.nix
|
./services/networking/firewall.nix
|
||||||
./services/networking/flashpolicyd.nix
|
./services/networking/flashpolicyd.nix
|
||||||
./services/networking/freenet.nix
|
./services/networking/freenet.nix
|
||||||
|
./services/networking/gateone.nix
|
||||||
./services/networking/git-daemon.nix
|
./services/networking/git-daemon.nix
|
||||||
./services/networking/gnunet.nix
|
./services/networking/gnunet.nix
|
||||||
./services/networking/gogoclient.nix
|
./services/networking/gogoclient.nix
|
||||||
@ -486,6 +486,7 @@
|
|||||||
./virtualisation/openvswitch.nix
|
./virtualisation/openvswitch.nix
|
||||||
./virtualisation/parallels-guest.nix
|
./virtualisation/parallels-guest.nix
|
||||||
./virtualisation/virtualbox-guest.nix
|
./virtualisation/virtualbox-guest.nix
|
||||||
|
./virtualisation/virtualbox-host.nix
|
||||||
./virtualisation/vmware-guest.nix
|
./virtualisation/vmware-guest.nix
|
||||||
./virtualisation/xen-dom0.nix
|
./virtualisation/xen-dom0.nix
|
||||||
]
|
]
|
||||||
|
@ -39,11 +39,14 @@ with lib;
|
|||||||
mkService = dev:
|
mkService = dev:
|
||||||
assert dev != "";
|
assert dev != "";
|
||||||
let dev' = utils.escapeSystemdPath dev; in
|
let dev' = utils.escapeSystemdPath dev; in
|
||||||
nameValuePair "freefall-${dev'}"
|
nameValuePair "freefall-${dev'}" {
|
||||||
{ description = "Free-fall protection for ${dev}";
|
description = "Free-fall protection for ${dev}";
|
||||||
after = [ "${dev'}.device" ];
|
after = [ "${dev'}.device" ];
|
||||||
wantedBy = [ "${dev'}.device" ];
|
wantedBy = [ "${dev'}.device" ];
|
||||||
path = [ pkgs.freefall ];
|
path = [ pkgs.freefall ];
|
||||||
|
unitConfig = {
|
||||||
|
DefaultDependencies = false;
|
||||||
|
};
|
||||||
serviceConfig = {
|
serviceConfig = {
|
||||||
ExecStart = "${pkgs.freefall}/bin/freefall ${dev}";
|
ExecStart = "${pkgs.freefall}/bin/freefall ${dev}";
|
||||||
Restart = "on-failure";
|
Restart = "on-failure";
|
||||||
|
59
nixos/modules/services/networking/gateone.nix
Normal file
59
nixos/modules/services/networking/gateone.nix
Normal file
@ -0,0 +1,59 @@
|
|||||||
|
{ config, lib, pkgs, ...}:
|
||||||
|
with lib;
|
||||||
|
let
|
||||||
|
cfg = config.services.gateone;
|
||||||
|
in
|
||||||
|
{
|
||||||
|
options = {
|
||||||
|
services.gateone = {
|
||||||
|
enable = mkEnableOption "GateOne server";
|
||||||
|
pidDir = mkOption {
|
||||||
|
default = "/run/gateone";
|
||||||
|
type = types.path;
|
||||||
|
description = ''Path of pid files for GateOne.'';
|
||||||
|
};
|
||||||
|
settingsDir = mkOption {
|
||||||
|
default = "/var/lib/gateone";
|
||||||
|
type = types.path;
|
||||||
|
description = ''Path of configuration files for GateOne.'';
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
config = mkIf cfg.enable {
|
||||||
|
environment.systemPackages = with pkgs.pythonPackages; [
|
||||||
|
gateone pkgs.openssh pkgs.procps pkgs.coreutils ];
|
||||||
|
|
||||||
|
users.extraUsers.gateone = {
|
||||||
|
description = "GateOne privilege separation user";
|
||||||
|
uid = config.ids.uids.gateone;
|
||||||
|
home = cfg.settingsDir;
|
||||||
|
};
|
||||||
|
users.extraGroups.gateone.gid = config.ids.gids.gateone;
|
||||||
|
|
||||||
|
systemd.services.gateone = with pkgs; {
|
||||||
|
description = "GateOne web-based terminal";
|
||||||
|
path = [ pythonPackages.gateone nix openssh procps coreutils ];
|
||||||
|
preStart = ''
|
||||||
|
if [ ! -d ${cfg.settingsDir} ] ; then
|
||||||
|
mkdir -m 0750 -p ${cfg.settingsDir}
|
||||||
|
mkdir -m 0750 -p ${cfg.pidDir}
|
||||||
|
chown -R gateone.gateone ${cfg.settingsDir}
|
||||||
|
chown -R gateone.gateone ${cfg.pidDir}
|
||||||
|
fi
|
||||||
|
'';
|
||||||
|
#unitConfig.RequiresMountsFor = "${cfg.settingsDir}";
|
||||||
|
serviceConfig = {
|
||||||
|
ExecStart = ''${pythonPackages.gateone}/bin/gateone --settings_dir=${cfg.settingsDir} --pid_file=${cfg.pidDir}/gateone.pid --gid=${toString config.ids.gids.gateone} --uid=${toString config.ids.uids.gateone}'';
|
||||||
|
User = "gateone";
|
||||||
|
Group = "gateone";
|
||||||
|
WorkingDirectory = cfg.settingsDir;
|
||||||
|
PermissionsStartOnly = true;
|
||||||
|
|
||||||
|
};
|
||||||
|
|
||||||
|
wantedBy = [ "multi-user.target" ];
|
||||||
|
requires = [ "network.target" ];
|
||||||
|
};
|
||||||
|
};
|
||||||
|
}
|
||||||
|
|
@ -230,8 +230,8 @@ in
|
|||||||
];
|
];
|
||||||
};
|
};
|
||||||
|
|
||||||
systemd.services.cups-browsed =
|
systemd.services.cups-browsed = mkIf config.services.avahi.enable
|
||||||
{ description = "Make remote CUPS printers available locally";
|
{ description = "CUPS Remote Printer Discovery";
|
||||||
|
|
||||||
wantedBy = [ "multi-user.target" ];
|
wantedBy = [ "multi-user.target" ];
|
||||||
wants = [ "cups.service" "avahi-daemon.service" ];
|
wants = [ "cups.service" "avahi-daemon.service" ];
|
||||||
|
@ -54,7 +54,7 @@ in
|
|||||||
|
|
||||||
unitConfig.ConditionVirtualization = "oracle";
|
unitConfig.ConditionVirtualization = "oracle";
|
||||||
|
|
||||||
serviceConfig.ExecStart = "@${kernel.virtualboxGuestAdditions}/sbin/VBoxService VBoxService --foreground";
|
serviceConfig.ExecStart = "@${kernel.virtualboxGuestAdditions}/bin/VBoxService VBoxService --foreground";
|
||||||
};
|
};
|
||||||
|
|
||||||
services.xserver.videoDrivers = mkOverride 50 [ "virtualbox" ];
|
services.xserver.videoDrivers = mkOverride 50 [ "virtualbox" ];
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
import ./make-test.nix ({ pkgs, ... } : {
|
import ./make-test.nix ({ pkgs, ... } : {
|
||||||
name = "avahi";
|
name = "avahi";
|
||||||
meta = with pkgs.stdenv.lib.maintainers; {
|
meta = with pkgs.stdenv.lib.maintainers; {
|
||||||
maintainers = [ eelco chaoflow wizeman ];
|
maintainers = [ eelco chaoflow ];
|
||||||
};
|
};
|
||||||
|
|
||||||
nodes = {
|
nodes = {
|
||||||
|
@ -3,7 +3,7 @@
|
|||||||
import ./make-test.nix ({pkgs, ... }: {
|
import ./make-test.nix ({pkgs, ... }: {
|
||||||
name = "printing";
|
name = "printing";
|
||||||
meta = with pkgs.stdenv.lib.maintainers; {
|
meta = with pkgs.stdenv.lib.maintainers; {
|
||||||
maintainers = [ iElectric eelco chaoflow jgeerds vcunat ];
|
maintainers = [ iElectric eelco chaoflow jgeerds ];
|
||||||
};
|
};
|
||||||
|
|
||||||
nodes = {
|
nodes = {
|
||||||
|
@ -16,6 +16,6 @@ import ./make-test.nix {
|
|||||||
|
|
||||||
$master->waitForUnit("riak");
|
$master->waitForUnit("riak");
|
||||||
$master->sleep(20); # Hopefully this is long enough!!
|
$master->sleep(20); # Hopefully this is long enough!!
|
||||||
$master->succeed("RIAK_DATA_DIR='/var/db/riak' RIAK_LOG_DIR='/var/log/riak' RIAK_ETC_DIR='/etc/riak' riak ping 2>&1");
|
$master->succeed("riak ping 2>&1");
|
||||||
'';
|
'';
|
||||||
}
|
}
|
||||||
|
@ -8,7 +8,7 @@ import ./make-test.nix ({ pkgs, ... }: with pkgs.lib; let
|
|||||||
#!${pkgs.stdenv.shell} -xe
|
#!${pkgs.stdenv.shell} -xe
|
||||||
export PATH="${pkgs.coreutils}/bin:${pkgs.utillinux}/bin"
|
export PATH="${pkgs.coreutils}/bin:${pkgs.utillinux}/bin"
|
||||||
|
|
||||||
${pkgs.linuxPackages.virtualboxGuestAdditions}/sbin/VBoxService
|
${pkgs.linuxPackages.virtualboxGuestAdditions}/bin/VBoxService
|
||||||
${(attrs.vmScript or (const "")) pkgs}
|
${(attrs.vmScript or (const "")) pkgs}
|
||||||
|
|
||||||
i=0
|
i=0
|
||||||
@ -39,7 +39,7 @@ import ./make-test.nix ({ pkgs, ... }: with pkgs.lib; let
|
|||||||
];
|
];
|
||||||
|
|
||||||
boot.initrd.extraUtilsCommands = ''
|
boot.initrd.extraUtilsCommands = ''
|
||||||
copy_bin_and_libs "${pkgs.linuxPackages.virtualboxGuestAdditions}/sbin/mount.vboxsf"
|
copy_bin_and_libs "${pkgs.linuxPackages.virtualboxGuestAdditions}/bin/mount.vboxsf"
|
||||||
copy_bin_and_libs "${pkgs.utillinux}/bin/unshare"
|
copy_bin_and_libs "${pkgs.utillinux}/bin/unshare"
|
||||||
${(attrs.extraUtilsCommands or (const "")) pkgs}
|
${(attrs.extraUtilsCommands or (const "")) pkgs}
|
||||||
'';
|
'';
|
||||||
|
@ -2,9 +2,20 @@
|
|||||||
, libpng, zlib, popt, boehmgc, libxml2, libxslt, glib, gtkmm
|
, libpng, zlib, popt, boehmgc, libxml2, libxslt, glib, gtkmm
|
||||||
, glibmm, libsigcxx, lcms, boost, gettext, makeWrapper, intltool
|
, glibmm, libsigcxx, lcms, boost, gettext, makeWrapper, intltool
|
||||||
, gsl, python, pyxml, lxml, poppler, imagemagick, libwpg, librevenge
|
, gsl, python, pyxml, lxml, poppler, imagemagick, libwpg, librevenge
|
||||||
, libvisio, libcdr, libexif
|
, libvisio, libcdr, libexif, unzip
|
||||||
|
, boxMakerPlugin ? false # boxmaker plugin
|
||||||
}:
|
}:
|
||||||
|
|
||||||
|
let
|
||||||
|
|
||||||
|
boxmaker = fetchurl {
|
||||||
|
# http://www.inkscapeforum.com/viewtopic.php?f=11&t=10403
|
||||||
|
url = "http://www.keppel.demon.co.uk/111000/files/BoxMaker0.91.zip";
|
||||||
|
sha256 = "5c5697f43dc3a95468f61f479cb50b7e2b93379a1729abf19e4040ac9f43a1a8";
|
||||||
|
};
|
||||||
|
|
||||||
|
in
|
||||||
|
|
||||||
stdenv.mkDerivation rec {
|
stdenv.mkDerivation rec {
|
||||||
name = "inkscape-0.91";
|
name = "inkscape-0.91";
|
||||||
|
|
||||||
@ -34,12 +45,23 @@ stdenv.mkDerivation rec {
|
|||||||
libxml2 libxslt glib gtkmm glibmm libsigcxx lcms boost gettext
|
libxml2 libxslt glib gtkmm glibmm libsigcxx lcms boost gettext
|
||||||
makeWrapper intltool gsl poppler imagemagick libwpg librevenge
|
makeWrapper intltool gsl poppler imagemagick libwpg librevenge
|
||||||
libvisio libcdr libexif
|
libvisio libcdr libexif
|
||||||
];
|
] ++ stdenv.lib.optional boxMakerPlugin unzip;
|
||||||
|
|
||||||
enableParallelBuilding = true;
|
enableParallelBuilding = true;
|
||||||
doCheck = true;
|
doCheck = true;
|
||||||
|
|
||||||
postInstall = ''
|
postInstall = ''
|
||||||
|
${if boxMakerPlugin then "
|
||||||
|
mkdir -p $out/share/inkscape/extensions/
|
||||||
|
# boxmaker packaged version 0.91 in a directory called 0.85 ?!??
|
||||||
|
unzip ${boxmaker};
|
||||||
|
cp boxmake-upd-0.85/* $out/share/inkscape/extensions/
|
||||||
|
rm -Rf boxmake-upd-0.85
|
||||||
|
"
|
||||||
|
else
|
||||||
|
""
|
||||||
|
}
|
||||||
|
|
||||||
# Make sure PyXML modules can be found at run-time.
|
# Make sure PyXML modules can be found at run-time.
|
||||||
for i in "$out/bin/"*
|
for i in "$out/bin/"*
|
||||||
do
|
do
|
||||||
|
@ -5,11 +5,12 @@
|
|||||||
}:
|
}:
|
||||||
|
|
||||||
stdenv.mkDerivation rec {
|
stdenv.mkDerivation rec {
|
||||||
name = "calibre-2.31.0";
|
name = "calibre-2.33.0";
|
||||||
|
version = "2.33.0";
|
||||||
|
|
||||||
src = fetchurl {
|
src = fetchurl {
|
||||||
url = "mirror://sourceforge/calibre/${name}.tar.xz";
|
url = "https://github.com/kovidgoyal/calibre/releases/download/v${version}/${name}.tar.xz";
|
||||||
sha256 = "1414c324alvgwbiszalklck1kay41yca2wnm488imr2768fihzkz";
|
sha256 = "0j1micmjffi6rsn3ayblnz0wq648v05ckbn1qsiz086iaj2285q9";
|
||||||
};
|
};
|
||||||
|
|
||||||
inherit python;
|
inherit python;
|
||||||
|
@ -1,19 +1,20 @@
|
|||||||
{ stdenv, makeWrapper, fetchgit, pkgconfig, ninja, ocaml, findlib, mupdf, lablgl
|
{ stdenv, makeWrapper, fetchgit, pkgconfig, ninja, ocaml, findlib, mupdf, lablgl
|
||||||
, gtk3, openjpeg, jbig2dec, mujs, xsel }:
|
, gtk3, openjpeg, jbig2dec, mujs, xsel, openssl }:
|
||||||
|
|
||||||
let ocamlVersion = (builtins.parseDrvName (ocaml.name)).version;
|
let ocamlVersion = (builtins.parseDrvName (ocaml.name)).version;
|
||||||
in stdenv.mkDerivation rec {
|
in stdenv.mkDerivation rec {
|
||||||
name = "llpp-${version}";
|
name = "llpp-${version}";
|
||||||
version = "21-git-2015-06-27";
|
version = "21-git-2015-07-30";
|
||||||
|
|
||||||
src = fetchgit {
|
src = fetchgit {
|
||||||
url = "git://repo.or.cz/llpp.git";
|
url = "git://repo.or.cz/llpp.git";
|
||||||
rev = "843c42ef41bb78a3b1ee995fc2bab91f8796e8ad";
|
rev = "e9fe06d684b145a104cc319673076e069e853cac";
|
||||||
sha256 = "0h8wa7f5bj5sm3sr8namcyy81s4s80hyasimyfw935lqyw2q2k60";
|
sha256 = "0x3hgn6sfjln2sqdw40ylcj943rn732a6mlfwz01llx8ykiyvsvq";
|
||||||
|
fetchSubmodules = false;
|
||||||
};
|
};
|
||||||
|
|
||||||
buildInputs = [ pkgconfig ninja makeWrapper ocaml findlib mupdf lablgl
|
buildInputs = [ pkgconfig ninja makeWrapper ocaml findlib mupdf lablgl
|
||||||
gtk3 jbig2dec openjpeg mujs ];
|
gtk3 jbig2dec openjpeg mujs openssl ];
|
||||||
|
|
||||||
configurePhase = ''
|
configurePhase = ''
|
||||||
sh configure.sh -O -F ${mupdf}
|
sh configure.sh -O -F ${mupdf}
|
||||||
|
@ -53,7 +53,7 @@ let
|
|||||||
wvDescription = "Playback of encrypted HTML audio/video content";
|
wvDescription = "Playback of encrypted HTML audio/video content";
|
||||||
wvMimeTypes = "application/x-ppapi-widevine-cdm";
|
wvMimeTypes = "application/x-ppapi-widevine-cdm";
|
||||||
wvModule = "$widevine/lib/libwidevinecdmadapter.so";
|
wvModule = "$widevine/lib/libwidevinecdmadapter.so";
|
||||||
wvInfo = "#${wvName}#${wvDescription}:${wvMimeTypes}";
|
wvInfo = "#${wvName}#${wvDescription};${wvMimeTypes}";
|
||||||
in ''
|
in ''
|
||||||
flashVersion="$(
|
flashVersion="$(
|
||||||
sed -n -r 's/.*"version": "([^"]+)",.*/\1/p' PepperFlash/manifest.json
|
sed -n -r 's/.*"version": "([^"]+)",.*/\1/p' PepperFlash/manifest.json
|
||||||
|
@ -30,5 +30,9 @@ stdenv.mkDerivation {
|
|||||||
platforms = platforms.mesaPlatforms;
|
platforms = platforms.mesaPlatforms;
|
||||||
maintainers = with maintainers; [ pSub ];
|
maintainers = with maintainers; [ pSub ];
|
||||||
license = licenses.gpl3;
|
license = licenses.gpl3;
|
||||||
|
|
||||||
|
# dwb is no longer maintained by portix and efforts to keep it alive
|
||||||
|
# were not successful, see issue #7952 for discussion.
|
||||||
|
broken = true;
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
@ -9,14 +9,14 @@ let
|
|||||||
soext = if stdenv.system == "x86_64-darwin" then "dylib" else "so";
|
soext = if stdenv.system == "x86_64-darwin" then "dylib" else "so";
|
||||||
|
|
||||||
in stdenv.mkDerivation rec {
|
in stdenv.mkDerivation rec {
|
||||||
version = "0.22.1";
|
version = "0.23.0";
|
||||||
name = "mesos-${version}";
|
name = "mesos-${version}";
|
||||||
|
|
||||||
dontDisableStatic = true;
|
dontDisableStatic = true;
|
||||||
|
|
||||||
src = fetchurl {
|
src = fetchurl {
|
||||||
url = "http://www.apache.org/dist/mesos/${version}/mesos-${version}.tar.gz";
|
url = "http://www.apache.org/dist/mesos/${version}/mesos-${version}.tar.gz";
|
||||||
sha256 = "0ry0ppzgpab68fz5bzd7ry5rjbg8xjz73x1x4c5id42cpsqnn7x5";
|
sha256 = "1v5xpn4wal4vcrvcklchx9slkpa8xlwqkdbnxzy9zkzpq5g3arxr";
|
||||||
};
|
};
|
||||||
|
|
||||||
buildInputs = [
|
buildInputs = [
|
||||||
@ -93,13 +93,15 @@ in stdenv.mkDerivation rec {
|
|||||||
echo "export MESOS_NATIVE_LIBRARY=$MESOS_NATIVE_JAVA_LIBRARY" >> $out/nix-support/setup-hook
|
echo "export MESOS_NATIVE_LIBRARY=$MESOS_NATIVE_JAVA_LIBRARY" >> $out/nix-support/setup-hook
|
||||||
|
|
||||||
# Inspired by: pkgs/development/python-modules/generic/default.nix
|
# Inspired by: pkgs/development/python-modules/generic/default.nix
|
||||||
|
pushd src/python
|
||||||
mkdir -p $out/lib/${python.libPrefix}/site-packages
|
mkdir -p $out/lib/${python.libPrefix}/site-packages
|
||||||
export PYTHONPATH="$out/lib/${python.libPrefix}/site-packages:$PYTHONPATH"
|
export PYTHONPATH="$out/lib/${python.libPrefix}/site-packages:$PYTHONPATH"
|
||||||
${python}/bin/${python.executable} src/python/setup.py install \
|
${python}/bin/${python.executable} setup.py install \
|
||||||
--install-lib=$out/lib/${python.libPrefix}/site-packages \
|
--install-lib=$out/lib/${python.libPrefix}/site-packages \
|
||||||
--old-and-unmanageable \
|
--old-and-unmanageable \
|
||||||
--prefix="$out"
|
--prefix="$out"
|
||||||
rm -f "$out/lib/${python.libPrefix}"/site-packages/site.py*
|
rm -f "$out/lib/${python.libPrefix}"/site-packages/site.py*
|
||||||
|
popd
|
||||||
'';
|
'';
|
||||||
|
|
||||||
postFixup = ''
|
postFixup = ''
|
||||||
|
@ -1,28 +1,26 @@
|
|||||||
{ stdenv, fetchgit, libconfig, lua5_2, openssl, readline, zlib
|
{ stdenv, fetchgit, libconfig, lua5_2, openssl, readline, zlib
|
||||||
|
, libevent, pkgconfig, python, jansson, bash
|
||||||
}:
|
}:
|
||||||
|
|
||||||
stdenv.mkDerivation rec {
|
stdenv.mkDerivation rec {
|
||||||
name = "telegram-cli-2014-03-04";
|
name = "telegram-cli-2015-07-30";
|
||||||
|
|
||||||
src = fetchgit {
|
src = fetchgit {
|
||||||
url = "https://github.com/vysheng/tg.git";
|
url = "https://github.com/vysheng/tg.git";
|
||||||
rev = "ac6079a00ac66bb37a3179a82af130b41ec39bc9";
|
sha256 = "0phn9nl0sf2fylzfwi427xq60cfrnpsvhh8bp55y1wcjkmp0fxsn";
|
||||||
sha256 = "1rpwnyzmqk7p97n5pd00m5c6rypc39mb3hs94qxxrdcpwpgcb73q";
|
rev = "2052f4b381337d75e783facdbfad56b04dec1a9c";
|
||||||
};
|
};
|
||||||
|
|
||||||
buildInputs = [ libconfig lua5_2 openssl readline zlib ];
|
buildInputs = [ libconfig lua5_2 openssl readline zlib libevent pkgconfig python jansson ];
|
||||||
|
|
||||||
NIX_CFLAGS_COMPILE = "-Wno-error=deprecated-declarations"; # CPPFunction
|
|
||||||
|
|
||||||
installPhase = ''
|
installPhase = ''
|
||||||
mkdir -p $out/bin
|
mkdir -p $out/bin
|
||||||
cp ./telegram $out/bin/telegram-wo-key
|
cp ./bin/telegram-cli $out/bin/telegram-wo-key
|
||||||
cp ./tg.pub $out/
|
cp ./tg-server.pub $out/
|
||||||
cat > $out/bin/telegram <<EOF
|
cat > $out/bin/telegram-cli <<EOF
|
||||||
#!/usr/bin/env bash
|
#!${bash}/bin/sh
|
||||||
$out/bin/telegram-wo-key -k $out/tg.pub
|
$out/bin/telegram-wo-key -k $out/tg-server.pub
|
||||||
EOF
|
EOF
|
||||||
chmod +x $out/bin/telegram
|
chmod +x $out/bin/telegram-cli
|
||||||
'';
|
'';
|
||||||
|
|
||||||
meta = {
|
meta = {
|
||||||
@ -30,5 +28,6 @@ stdenv.mkDerivation rec {
|
|||||||
homepage = https://telegram.org/;
|
homepage = https://telegram.org/;
|
||||||
license = stdenv.lib.licenses.gpl2;
|
license = stdenv.lib.licenses.gpl2;
|
||||||
platforms = stdenv.lib.platforms.linux;
|
platforms = stdenv.lib.platforms.linux;
|
||||||
|
maintainers = stdenv.lib.maintainers.jagajaga;
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
@ -134,7 +134,7 @@ stdenv.mkDerivation {
|
|||||||
[Desktop Entry]
|
[Desktop Entry]
|
||||||
Type=Application
|
Type=Application
|
||||||
Exec=$out/bin/thunderbird
|
Exec=$out/bin/thunderbird
|
||||||
Icon=$out/lib/thunderbird-bin-${version}/chrome/icons/default/default256.png
|
Icon=$out/usr/lib/thunderbird-bin-${version}/chrome/icons/default/default256.png
|
||||||
Name=Thunderbird
|
Name=Thunderbird
|
||||||
GenericName=Mail Reader
|
GenericName=Mail Reader
|
||||||
Categories=Application;Network;
|
Categories=Application;Network;
|
||||||
|
@ -1,13 +1,15 @@
|
|||||||
{ stdenv, fetchurl, makeWrapper, go, lxc, sqlite, iproute, bridge-utils, devicemapper,
|
{ stdenv, fetchFromGitHub, makeWrapper, go, lxc, sqlite, iproute, bridge-utils, devicemapper,
|
||||||
btrfsProgs, iptables, bash, e2fsprogs, xz}:
|
btrfsProgs, iptables, bash, e2fsprogs, xz}:
|
||||||
|
|
||||||
stdenv.mkDerivation rec {
|
stdenv.mkDerivation rec {
|
||||||
name = "docker-${version}";
|
name = "docker-${version}";
|
||||||
version = "1.6.0";
|
version = "1.7.1";
|
||||||
|
|
||||||
src = fetchurl {
|
src = fetchFromGitHub {
|
||||||
url = "https://github.com/dotcloud/docker/archive/v${version}.tar.gz";
|
owner = "docker";
|
||||||
sha256 = "03nzhikxp60falshzyk6ip8g9fhrczhvnvgmzqr8bny6w8x1v84b";
|
repo = "docker";
|
||||||
|
rev = "v${version}";
|
||||||
|
sha256 = "0r0j8aj1a7lbnc9piznp02h5n2gdw3v3n4q2ipmapi9ax0wj82lz";
|
||||||
};
|
};
|
||||||
|
|
||||||
buildInputs = [ makeWrapper go sqlite lxc iproute bridge-utils devicemapper btrfsProgs iptables e2fsprogs ];
|
buildInputs = [ makeWrapper go sqlite lxc iproute bridge-utils devicemapper btrfsProgs iptables e2fsprogs ];
|
||||||
@ -17,7 +19,7 @@ stdenv.mkDerivation rec {
|
|||||||
buildPhase = ''
|
buildPhase = ''
|
||||||
patchShebangs .
|
patchShebangs .
|
||||||
export AUTO_GOPATH=1
|
export AUTO_GOPATH=1
|
||||||
export DOCKER_GITCOMMIT="03nzhikx"
|
export DOCKER_GITCOMMIT="786b29d4"
|
||||||
./hack/make.sh dynbinary
|
./hack/make.sh dynbinary
|
||||||
'';
|
'';
|
||||||
|
|
||||||
@ -35,7 +37,7 @@ stdenv.mkDerivation rec {
|
|||||||
'';
|
'';
|
||||||
|
|
||||||
meta = with stdenv.lib; {
|
meta = with stdenv.lib; {
|
||||||
homepage = http://www.docker.io/;
|
homepage = http://www.docker.com/;
|
||||||
description = "An open source project to pack, ship and run any application as a lightweight container";
|
description = "An open source project to pack, ship and run any application as a lightweight container";
|
||||||
license = licenses.asl20;
|
license = licenses.asl20;
|
||||||
maintainers = with maintainers; [ offline tailhook ];
|
maintainers = with maintainers; [ offline tailhook ];
|
||||||
|
@ -87,9 +87,8 @@ stdenv.mkDerivation {
|
|||||||
sed -i -e "s|/usr/bin|$out/bin|" bin/VBoxClient-all
|
sed -i -e "s|/usr/bin|$out/bin|" bin/VBoxClient-all
|
||||||
|
|
||||||
# Install binaries
|
# Install binaries
|
||||||
mkdir -p $out/sbin
|
install -D -m 4755 lib/VBoxGuestAdditions/mount.vboxsf $out/bin/mount.vboxsf
|
||||||
install -m 4755 lib/VBoxGuestAdditions/mount.vboxsf $out/sbin/mount.vboxsf
|
install -D -m 755 sbin/VBoxService $out/bin/VBoxService
|
||||||
install -m 755 sbin/VBoxService $out/sbin
|
|
||||||
|
|
||||||
mkdir -p $out/bin
|
mkdir -p $out/bin
|
||||||
install -m 755 bin/VBoxClient $out/bin
|
install -m 755 bin/VBoxClient $out/bin
|
||||||
|
@ -33,7 +33,7 @@ let
|
|||||||
|
|
||||||
grKernel = if cfg.stable
|
grKernel = if cfg.stable
|
||||||
then mkKernel pkgs.linux_3_14 stable-patch
|
then mkKernel pkgs.linux_3_14 stable-patch
|
||||||
else mkKernel pkgs.linux_4_0 test-patch;
|
else mkKernel pkgs.linux_4_1 test-patch;
|
||||||
|
|
||||||
## -- grsecurity configuration ---------------------------------------------
|
## -- grsecurity configuration ---------------------------------------------
|
||||||
|
|
||||||
|
@ -1,4 +1,4 @@
|
|||||||
{ fetchurl, stdenv, nss, openssl, pkgconfig }:
|
{ fetchurl, stdenv, nss, nspr, pkgconfig }:
|
||||||
|
|
||||||
|
|
||||||
stdenv.mkDerivation rec {
|
stdenv.mkDerivation rec {
|
||||||
@ -9,7 +9,9 @@ stdenv.mkDerivation rec {
|
|||||||
sha256 = "07w1aq8y8wld43wmbk2q8134p3bfkp2vma78mmsfgw2jn1bh3xhd";
|
sha256 = "07w1aq8y8wld43wmbk2q8134p3bfkp2vma78mmsfgw2jn1bh3xhd";
|
||||||
};
|
};
|
||||||
|
|
||||||
buildInputs = [ nss openssl ];
|
buildInputs = [ pkgconfig nss nspr ];
|
||||||
|
|
||||||
|
configureFlags = [ "--enable-nss" ];
|
||||||
|
|
||||||
meta = with stdenv.lib; {
|
meta = with stdenv.lib; {
|
||||||
platforms = platforms.linux;
|
platforms = platforms.linux;
|
||||||
|
@ -42,6 +42,11 @@ stdenv.mkDerivation {
|
|||||||
EOF
|
EOF
|
||||||
chmod +x $out/bin/g++
|
chmod +x $out/bin/g++
|
||||||
fi
|
fi
|
||||||
|
for executable in $(ls ${gcc.cc}/bin); do
|
||||||
|
if [ ! -x "$out/bin/$executable" ]; then
|
||||||
|
ln -s ${gcc.cc}/bin/$executable $out/bin/$executable
|
||||||
|
fi
|
||||||
|
done
|
||||||
'');
|
'');
|
||||||
};
|
};
|
||||||
|
|
||||||
|
@ -6,18 +6,20 @@
|
|||||||
|
|
||||||
let
|
let
|
||||||
|
|
||||||
version = "3.15.7";
|
# Version 3.15.7 breaks certain (but not all) PCL-based printers:
|
||||||
|
# https://github.com/NixOS/nixpkgs/commit/b0e46fc3ead209ef24ed6214bd41ef6e604af54f
|
||||||
|
version = "3.15.6";
|
||||||
|
|
||||||
name = "hplip-${version}";
|
name = "hplip-${version}";
|
||||||
|
|
||||||
src = fetchurl {
|
src = fetchurl {
|
||||||
url = "mirror://sourceforge/hplip/${name}.tar.gz";
|
url = "mirror://sourceforge/hplip/${name}.tar.gz";
|
||||||
sha256 = "17flpl89lgwlbsy9mka910g530nnvlwqqnif8a9hyq7k90q9046k";
|
sha256 = "1jbnjw7vrn1qawrjfdv8j58w69q8ki1qkzvlh0nk8nxacpp17i9h";
|
||||||
};
|
};
|
||||||
|
|
||||||
plugin = fetchurl {
|
plugin = fetchurl {
|
||||||
url = "http://www.openprinting.org/download/printdriver/auxfiles/HP/plugins/${name}-plugin.run";
|
url = "http://www.openprinting.org/download/printdriver/auxfiles/HP/plugins/${name}-plugin.run";
|
||||||
sha256 = "0fblh5m43jnws4vkwks0b4m9k3jg9kspaj1l8bic0r5swy97s41m";
|
sha256 = "1rymxahz12s1s37rri5qyvka6q0yi0yai08kgspg24176ry3a3fx";
|
||||||
};
|
};
|
||||||
|
|
||||||
hplip_state =
|
hplip_state =
|
||||||
@ -75,23 +77,25 @@ stdenv.mkDerivation {
|
|||||||
{} +
|
{} +
|
||||||
'';
|
'';
|
||||||
|
|
||||||
configureFlags = ''
|
preConfigure = ''
|
||||||
--with-cupsfilterdir=$(out)/lib/cups/filter
|
export configureFlags="$configureFlags
|
||||||
--with-cupsbackenddir=$(out)/lib/cups/backend
|
--with-cupsfilterdir=$out/lib/cups/filter
|
||||||
--with-icondir=$(out)/share/applications
|
--with-cupsbackenddir=$out/lib/cups/backend
|
||||||
--with-systraydir=$(out)/xdg/autostart
|
--with-icondir=$out/share/applications
|
||||||
--with-mimedir=$(out)/etc/cups
|
--with-systraydir=$out/xdg/autostart
|
||||||
|
--with-mimedir=$out/etc/cups
|
||||||
--enable-policykit
|
--enable-policykit
|
||||||
'';
|
"
|
||||||
|
|
||||||
makeFlags = ''
|
export makeFlags="
|
||||||
halpredir=$(out)/share/hal/fdi/preprobe/10osvendor
|
halpredir=$out/share/hal/fdi/preprobe/10osvendor
|
||||||
rulesdir=$(out)/etc/udev/rules.d
|
rulesdir=$out/etc/udev/rules.d
|
||||||
policykit_dir=$(out)/share/polkit-1/actions
|
policykit_dir=$out/share/polkit-1/actions
|
||||||
policykit_dbus_etcdir=$(out)/etc/dbus-1/system.d
|
policykit_dbus_etcdir=$out/etc/dbus-1/system.d
|
||||||
policykit_dbus_sharedir=$(out)/share/dbus-1/system-services
|
policykit_dbus_sharedir=$out/share/dbus-1/system-services
|
||||||
hplip_confdir=$(out)/etc/hp
|
hplip_confdir=$out/etc/hp
|
||||||
hplip_statedir=$(out)/var/lib/hp
|
hplip_statedir=$out/var/lib/hp
|
||||||
|
"
|
||||||
'';
|
'';
|
||||||
|
|
||||||
enableParallelBuilding = true;
|
enableParallelBuilding = true;
|
||||||
@ -175,6 +179,6 @@ stdenv.mkDerivation {
|
|||||||
then licenses.unfree
|
then licenses.unfree
|
||||||
else with licenses; [ mit bsd2 gpl2Plus ];
|
else with licenses; [ mit bsd2 gpl2Plus ];
|
||||||
platforms = [ "i686-linux" "x86_64-linux" "armv6l-linux" "armv7l-linux" ];
|
platforms = [ "i686-linux" "x86_64-linux" "armv6l-linux" "armv7l-linux" ];
|
||||||
maintainers = with maintainers; [ ttuegel jgeerds nckx ];
|
maintainers = with maintainers; [ jgeerds nckx ];
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
24
pkgs/os-specific/linux/ima-evm-utils/default.nix
Normal file
24
pkgs/os-specific/linux/ima-evm-utils/default.nix
Normal file
@ -0,0 +1,24 @@
|
|||||||
|
{ stdenv, fetchgit, autoreconfHook, pkgconfig, openssl, attr, keyutils, asciidoc, libxslt, docbook_xsl }:
|
||||||
|
|
||||||
|
stdenv.mkDerivation rec {
|
||||||
|
name = "ima-evm-utils-${version}";
|
||||||
|
version = "1.0.0";
|
||||||
|
|
||||||
|
src = fetchgit {
|
||||||
|
url = "git://git.code.sf.net/p/linux-ima/ima-evm-utils";
|
||||||
|
rev = "4b56112c095cb5cc34dc35abac37ebfc6eadba65";
|
||||||
|
sha256 = "6f1ef4e84b9214448ea4a530a562a20ad1ba5a7cfefd7ddda90a56e2404f3a87";
|
||||||
|
};
|
||||||
|
|
||||||
|
buildInputs = [ autoreconfHook pkgconfig openssl attr keyutils asciidoc libxslt ];
|
||||||
|
|
||||||
|
buildPhase = "make prefix=$out MANPAGE_DOCBOOK_XSL=${docbook_xsl}/xml/xsl/docbook/manpages/docbook.xsl";
|
||||||
|
|
||||||
|
meta = {
|
||||||
|
description = "evmctl utility to manage digital signatures of the Linux kernel integrity subsystem (IMA/EVM)";
|
||||||
|
homepage = "http://sourceforge.net/projects/linux-ima/";
|
||||||
|
license = stdenv.lib.licenses.gpl2;
|
||||||
|
platforms = stdenv.lib.platforms.linux;
|
||||||
|
maintainers = with stdenv.lib.maintainers; [ tstrobel ];
|
||||||
|
};
|
||||||
|
}
|
@ -1,13 +1,13 @@
|
|||||||
{ stdenv, fetchurl, ... } @ args:
|
{ stdenv, fetchurl, ... } @ args:
|
||||||
|
|
||||||
import ./generic.nix (args // rec {
|
import ./generic.nix (args // rec {
|
||||||
version = "3.14.48";
|
version = "3.14.49";
|
||||||
# Remember to update grsecurity!
|
# Remember to update grsecurity!
|
||||||
extraMeta.branch = "3.14";
|
extraMeta.branch = "3.14";
|
||||||
|
|
||||||
src = fetchurl {
|
src = fetchurl {
|
||||||
url = "mirror://kernel/linux/kernel/v3.x/linux-${version}.tar.xz";
|
url = "mirror://kernel/linux/kernel/v3.x/linux-${version}.tar.xz";
|
||||||
sha256 = "098a7kjfw4jf0f7h6z57f2719jfz3y3jjlcd8y6d95xvhy7xxyw9";
|
sha256 = "1x9p6z195c0nv7hsjcwzmr89yag35v3pyrs0081k2d8dykbl70zs";
|
||||||
};
|
};
|
||||||
|
|
||||||
features.iwlwifi = true;
|
features.iwlwifi = true;
|
||||||
|
@ -1,13 +1,12 @@
|
|||||||
{ stdenv, fetchurl, ... } @ args:
|
{ stdenv, fetchurl, ... } @ args:
|
||||||
|
|
||||||
import ./generic.nix (args // rec {
|
import ./generic.nix (args // rec {
|
||||||
version = "4.0.8";
|
version = "4.0.9";
|
||||||
# Remember to update grsecurity!
|
|
||||||
extraMeta.branch = "4.0";
|
extraMeta.branch = "4.0";
|
||||||
|
|
||||||
src = fetchurl {
|
src = fetchurl {
|
||||||
url = "mirror://kernel/linux/kernel/v4.x/linux-${version}.tar.xz";
|
url = "mirror://kernel/linux/kernel/v4.x/linux-${version}.tar.xz";
|
||||||
sha256 = "1cggqi5kdan818xw5g5wmapcsf501f5m9bympsy6a2cpphknfdmn";
|
sha256 = "0k42blafzd954fncc0b78vi9x1h2k0jhfvkjqxmpv64i7xwwdhsx";
|
||||||
};
|
};
|
||||||
|
|
||||||
features.iwlwifi = true;
|
features.iwlwifi = true;
|
||||||
|
@ -2,6 +2,7 @@
|
|||||||
|
|
||||||
import ./generic.nix (args // rec {
|
import ./generic.nix (args // rec {
|
||||||
version = "4.1.4";
|
version = "4.1.4";
|
||||||
|
# Remember to update grsecurity!
|
||||||
extraMeta.branch = "4.1";
|
extraMeta.branch = "4.1";
|
||||||
|
|
||||||
src = fetchurl {
|
src = fetchurl {
|
||||||
|
@ -65,17 +65,17 @@ rec {
|
|||||||
};
|
};
|
||||||
|
|
||||||
grsecurity_stable = grsecPatch
|
grsecurity_stable = grsecPatch
|
||||||
{ kversion = "3.14.48";
|
{ kversion = "3.14.49";
|
||||||
revision = "201507111210";
|
revision = "201508032312";
|
||||||
branch = "stable";
|
branch = "stable";
|
||||||
sha256 = "0phmqlkx6vqlv79ppf6g4wsx7rwsvwpakpkm9xsq8qazffk7s9qk";
|
sha256 = "09x0rb4pgmghcp6sdz57lwhawlb3bzrc3rg372xknhv6993ainjc";
|
||||||
};
|
};
|
||||||
|
|
||||||
grsecurity_unstable = grsecPatch
|
grsecurity_unstable = grsecPatch
|
||||||
{ kversion = "4.0.8";
|
{ kversion = "4.1.4";
|
||||||
revision = "201507111211";
|
revision = "201508032312";
|
||||||
branch = "test";
|
branch = "test";
|
||||||
sha256 = "1p9ym8hbwaan9pgxgn8k4rm3n33wl8ag1fzmyr5f4mxs634wgwgx";
|
sha256 = "16p1wq98qgwksav0ry6b5jyyi26s404v1k0cwpj7l7n86hxig67i";
|
||||||
};
|
};
|
||||||
|
|
||||||
grsec_fix_path =
|
grsec_fix_path =
|
||||||
|
@ -36,11 +36,11 @@ stdenv.mkDerivation rec {
|
|||||||
|
|
||||||
postPatch = ''
|
postPatch = ''
|
||||||
sed -i deps/node_package/priv/base/env.sh \
|
sed -i deps/node_package/priv/base/env.sh \
|
||||||
-e 's@{{platform_data_dir}}@$RIAK_DATA_DIR@' \
|
-e 's@{{platform_data_dir}}@''${RIAK_DATA_DIR:-/var/db/riak}@' \
|
||||||
-e 's@^RUNNER_SCRIPT_DIR=.*@RUNNER_SCRIPT_DIR='$out'/bin@' \
|
-e 's@^RUNNER_SCRIPT_DIR=.*@RUNNER_SCRIPT_DIR='$out'/bin@' \
|
||||||
-e 's@^RUNNER_BASE_DIR=.*@RUNNER_BASE_DIR='$out'@' \
|
-e 's@^RUNNER_BASE_DIR=.*@RUNNER_BASE_DIR='$out'@' \
|
||||||
-e 's@^RUNNER_ETC_DIR=.*@RUNNER_ETC_DIR=$RIAK_ETC_DIR@' \
|
-e 's@^RUNNER_ETC_DIR=.*@RUNNER_ETC_DIR=''${RIAK_ETC_DIR:-/etc/riak}@' \
|
||||||
-e 's@^RUNNER_LOG_DIR=.*@RUNNER_LOG_DIR=$RIAK_LOG_DIR@'
|
-e 's@^RUNNER_LOG_DIR=.*@RUNNER_LOG_DIR=''${RIAK_LOG_DIR:-/var/log}@'
|
||||||
'';
|
'';
|
||||||
|
|
||||||
preBuild = ''
|
preBuild = ''
|
||||||
|
@ -19,7 +19,7 @@ stdenv.mkDerivation rec {
|
|||||||
meta = with stdenv.lib; {
|
meta = with stdenv.lib; {
|
||||||
homepage = "http://limitcpu.sourceforge.net/";
|
homepage = "http://limitcpu.sourceforge.net/";
|
||||||
description = "A tool to throttle the CPU usage of programs";
|
description = "A tool to throttle the CPU usage of programs";
|
||||||
platforms = with platforms; linux ++ freebsd ++ darwin;
|
platforms = with platforms; linux ++ freebsd;
|
||||||
license = licenses.gpl2;
|
license = licenses.gpl2;
|
||||||
maintainer = [maintainers.rycee];
|
maintainer = [maintainers.rycee];
|
||||||
};
|
};
|
||||||
|
@ -1,11 +1,11 @@
|
|||||||
{ stdenv, fetchurl, ocaml }:
|
{ stdenv, fetchurl, ocaml }:
|
||||||
|
|
||||||
stdenv.mkDerivation rec {
|
stdenv.mkDerivation rec {
|
||||||
name = "hevea-2.23";
|
name = "hevea-2.25";
|
||||||
|
|
||||||
src = fetchurl {
|
src = fetchurl {
|
||||||
url = "http://pauillac.inria.fr/~maranget/hevea/distri/${name}.tar.gz";
|
url = "http://pauillac.inria.fr/~maranget/hevea/distri/${name}.tar.gz";
|
||||||
sha256 = "1f9pj48518ixhjxbviv2zx27v4anp92zgg3x704g1s5cki2w33nv";
|
sha256 = "0kn99v92xsfy12r9gfvwgs0xf3s9s6frfg86a8q6damj1dampiz4";
|
||||||
};
|
};
|
||||||
|
|
||||||
buildInputs = [ ocaml ];
|
buildInputs = [ ocaml ];
|
||||||
|
@ -9589,6 +9589,8 @@ let
|
|||||||
|
|
||||||
ifplugd = callPackage ../os-specific/linux/ifplugd { };
|
ifplugd = callPackage ../os-specific/linux/ifplugd { };
|
||||||
|
|
||||||
|
ima-evm-utils = callPackage ../os-specific/linux/ima-evm-utils { };
|
||||||
|
|
||||||
iomelt = callPackage ../os-specific/linux/iomelt { };
|
iomelt = callPackage ../os-specific/linux/iomelt { };
|
||||||
|
|
||||||
iotop = callPackage ../os-specific/linux/iotop { };
|
iotop = callPackage ../os-specific/linux/iotop { };
|
||||||
@ -11002,7 +11004,7 @@ let
|
|||||||
};
|
};
|
||||||
|
|
||||||
docker = callPackage ../applications/virtualization/docker {
|
docker = callPackage ../applications/virtualization/docker {
|
||||||
go = go_1_3;
|
go = go_1_4;
|
||||||
};
|
};
|
||||||
|
|
||||||
doodle = callPackage ../applications/search/doodle { };
|
doodle = callPackage ../applications/search/doodle { };
|
||||||
|
@ -102,11 +102,11 @@ let self = with self; {
|
|||||||
|
|
||||||
composer = pkgs.stdenv.mkDerivation rec {
|
composer = pkgs.stdenv.mkDerivation rec {
|
||||||
name = "composer-${version}";
|
name = "composer-${version}";
|
||||||
version = "1.0.0-alpha9";
|
version = "1.0.0-alpha10";
|
||||||
|
|
||||||
src = pkgs.fetchurl {
|
src = pkgs.fetchurl {
|
||||||
url = "https://getcomposer.org/download/1.0.0-alpha9/composer.phar";
|
url = "https://getcomposer.org/download/${version}/composer.phar";
|
||||||
sha256 = "1x7i9xs9xggq0qq4kzrwh2pky8skax0l829zwwsy3hcvch3irvrk";
|
sha256 = "0a26zlsr2jffcqlz8z6l8s6c6nlyfj2gxqfgx76knx5wch1psb4z";
|
||||||
};
|
};
|
||||||
|
|
||||||
phases = [ "installPhase" ];
|
phases = [ "installPhase" ];
|
||||||
@ -123,7 +123,7 @@ let self = with self; {
|
|||||||
description = "Dependency Manager for PHP";
|
description = "Dependency Manager for PHP";
|
||||||
license = licenses.mit;
|
license = licenses.mit;
|
||||||
homepage = https://getcomposer.org/;
|
homepage = https://getcomposer.org/;
|
||||||
maintainers = with maintainers; [offline];
|
maintainers = with maintainers; [ globin offline ];
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
}; in self
|
}; in self
|
||||||
|
@ -3432,6 +3432,24 @@ let
|
|||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
|
gateone = buildPythonPackage rec {
|
||||||
|
name = "gateone-1.2-0d57c3";
|
||||||
|
disabled = ! isPy27;
|
||||||
|
src = pkgs.fetchFromGitHub {
|
||||||
|
rev = "11ed97c663b3e8c1b8eba473b5cf8362b10d57c3";
|
||||||
|
owner= "liftoff";
|
||||||
|
repo = "GateOne";
|
||||||
|
sha256 ="0zp9vfs6sqbx4d0g45kkjinfmsl9zqwa6bhp3xd81wx3ph9yr1hq";
|
||||||
|
};
|
||||||
|
propagatedBuildInputs = with pkgs.pythonPackages; [tornado futures html5lib readline pkgs.openssl];
|
||||||
|
meta = {
|
||||||
|
homepage = https://liftoffsoftware.com/;
|
||||||
|
description = "GateOne is a web-based terminal emulator and SSH client";
|
||||||
|
maintainers = with maintainers; [ tomberek ];
|
||||||
|
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
gcutil = buildPythonPackage rec {
|
gcutil = buildPythonPackage rec {
|
||||||
name = "gcutil-1.16.1";
|
name = "gcutil-1.16.1";
|
||||||
meta.maintainers = with maintainers; [ phreedom ];
|
meta.maintainers = with maintainers; [ phreedom ];
|
||||||
@ -5541,6 +5559,7 @@ let
|
|||||||
pyfribidi = buildPythonPackage rec {
|
pyfribidi = buildPythonPackage rec {
|
||||||
version = "0.11.0";
|
version = "0.11.0";
|
||||||
name = "pyfribidi-${version}";
|
name = "pyfribidi-${version}";
|
||||||
|
disabled = isPy3k;
|
||||||
|
|
||||||
src = pkgs.fetchurl {
|
src = pkgs.fetchurl {
|
||||||
url = "https://pypi.python.org/packages/source/p/pyfribidi/${name}.zip";
|
url = "https://pypi.python.org/packages/source/p/pyfribidi/${name}.zip";
|
||||||
@ -12297,14 +12316,14 @@ let
|
|||||||
};
|
};
|
||||||
|
|
||||||
sigal = buildPythonPackage rec {
|
sigal = buildPythonPackage rec {
|
||||||
name = "sigal-0.7.0";
|
name = "sigal-0.9.2";
|
||||||
|
|
||||||
src = pkgs.fetchurl {
|
src = pkgs.fetchurl {
|
||||||
url = "http://pypi.python.org/packages/source/s/sigal/${name}.tar.gz";
|
url = "http://pypi.python.org/packages/source/s/sigal/${name}.tar.gz";
|
||||||
md5 = "d2386706ac8543378aebde1ea4edeba4";
|
sha256 = "0mk3bzaxn9snx9lc0pj9zvgdgdyhkza6b8z5x91772mlv84sfw6c";
|
||||||
};
|
};
|
||||||
|
|
||||||
propagatedBuildInputs = with self; [ jinja2 markdown pillow pilkit clint argh pytest ];
|
propagatedBuildInputs = with self; [ jinja2 markdown pillow pilkit clint click pytest blinker ];
|
||||||
|
|
||||||
meta = {
|
meta = {
|
||||||
description = "Yet another simple static gallery generator";
|
description = "Yet another simple static gallery generator";
|
||||||
|
Loading…
Reference in New Issue
Block a user