Merge branch 'master.upstream' into staging.upstream

This commit is contained in:
William A. Kennington III 2015-08-04 15:32:43 -07:00
commit 926f073f55
37 changed files with 268 additions and 108 deletions

View File

@ -142,7 +142,7 @@ with lib;
config = config =
let fontconfig = config.fonts.fontconfig; let fontconfig = config.fonts.fontconfig;
fcBool = x: "<bool>" + (if x then "true" else "false") + "</bool>"; fcBool = x: "<bool>" + (if x then "true" else "false") + "</bool>";
nixosConf = '' renderConf = ''
<?xml version='1.0'?> <?xml version='1.0'?>
<!DOCTYPE fontconfig SYSTEM 'fonts.dtd'> <!DOCTYPE fontconfig SYSTEM 'fonts.dtd'>
<fontconfig> <fontconfig>
@ -169,6 +169,21 @@ with lib;
</edit> </edit>
</match> </match>
${optionalString (fontconfig.dpi != 0) ''
<match target="pattern">
<edit name="dpi" mode="assign">
<double>${toString fontconfig.dpi}</double>
</edit>
</match>
''}
</fontconfig>
'';
genericAliasConf = ''
<?xml version='1.0'?>
<!DOCTYPE fontconfig SYSTEM 'fonts.dtd'>
<fontconfig>
<!-- Default fonts --> <!-- Default fonts -->
${optionalString (fontconfig.defaultFonts.sansSerif != []) '' ${optionalString (fontconfig.defaultFonts.sansSerif != []) ''
<alias> <alias>
@ -201,14 +216,6 @@ with lib;
</alias> </alias>
''} ''}
${optionalString (fontconfig.dpi != 0) ''
<match target="pattern">
<edit name="dpi" mode="assign">
<double>${toString fontconfig.dpi}</double>
</edit>
</match>
''}
</fontconfig> </fontconfig>
''; '';
in mkIf fontconfig.enable { in mkIf fontconfig.enable {
@ -219,7 +226,8 @@ with lib;
environment.etc."fonts/fonts.conf".source = environment.etc."fonts/fonts.conf".source =
pkgs.makeFontsConf { fontconfig = pkgs.fontconfig_210; fontDirectories = config.fonts.fonts; }; pkgs.makeFontsConf { fontconfig = pkgs.fontconfig_210; fontDirectories = config.fonts.fonts; };
environment.etc."fonts/conf.d/98-nixos.conf".text = nixosConf; environment.etc."fonts/conf.d/10-nixos-rendering.conf".text = renderConf;
environment.etc."fonts/conf.d/60-nixos-generic-alias.conf".text = genericAliasConf;
# Versioned fontconfig > 2.10. Take shared fonts.conf from fontconfig. # Versioned fontconfig > 2.10. Take shared fonts.conf from fontconfig.
# Otherwise specify only font directories. # Otherwise specify only font directories.
@ -236,7 +244,8 @@ with lib;
</fontconfig> </fontconfig>
''; '';
environment.etc."fonts/${pkgs.fontconfig.configVersion}/conf.d/98-nixos.conf".text = nixosConf; environment.etc."fonts/${pkgs.fontconfig.configVersion}/conf.d/10-nixos-rendering.conf".text = renderConf;
environment.etc."fonts/${pkgs.fontconfig.configVersion}/conf.d/60-nixos-generic-alias.conf".text = genericAliasConf;
environment.etc."fonts/${pkgs.fontconfig.configVersion}/conf.d/99-user.conf" = { environment.etc."fonts/${pkgs.fontconfig.configVersion}/conf.d/99-user.conf" = {
enable = fontconfig.includeUserConf; enable = fontconfig.includeUserConf;

View File

@ -228,6 +228,7 @@
subsonic = 204; subsonic = 204;
riak = 205; riak = 205;
shout = 206; shout = 206;
gateone = 207;
# When adding a uid, make sure it doesn't match an existing gid. And don't use uids above 399! # When adding a uid, make sure it doesn't match an existing gid. And don't use uids above 399!
@ -434,6 +435,7 @@
subsonic = 204; subsonic = 204;
riak = 205; riak = 205;
#shout = 206; #unused #shout = 206; #unused
gateone = 207;
# When adding a gid, make sure it doesn't match an existing # When adding a gid, make sure it doesn't match an existing
# uid. Users and groups with the same name should have equal # uid. Users and groups with the same name should have equal

View File

@ -72,7 +72,6 @@
./programs/ssmtp.nix ./programs/ssmtp.nix
./programs/uim.nix ./programs/uim.nix
./programs/venus.nix ./programs/venus.nix
./programs/virtualbox-host.nix
./programs/wvdial.nix ./programs/wvdial.nix
./programs/freetds.nix ./programs/freetds.nix
./programs/zsh/zsh.nix ./programs/zsh/zsh.nix
@ -283,6 +282,7 @@
./services/networking/firewall.nix ./services/networking/firewall.nix
./services/networking/flashpolicyd.nix ./services/networking/flashpolicyd.nix
./services/networking/freenet.nix ./services/networking/freenet.nix
./services/networking/gateone.nix
./services/networking/git-daemon.nix ./services/networking/git-daemon.nix
./services/networking/gnunet.nix ./services/networking/gnunet.nix
./services/networking/gogoclient.nix ./services/networking/gogoclient.nix
@ -486,6 +486,7 @@
./virtualisation/openvswitch.nix ./virtualisation/openvswitch.nix
./virtualisation/parallels-guest.nix ./virtualisation/parallels-guest.nix
./virtualisation/virtualbox-guest.nix ./virtualisation/virtualbox-guest.nix
./virtualisation/virtualbox-host.nix
./virtualisation/vmware-guest.nix ./virtualisation/vmware-guest.nix
./virtualisation/xen-dom0.nix ./virtualisation/xen-dom0.nix
] ]

View File

@ -39,11 +39,14 @@ with lib;
mkService = dev: mkService = dev:
assert dev != ""; assert dev != "";
let dev' = utils.escapeSystemdPath dev; in let dev' = utils.escapeSystemdPath dev; in
nameValuePair "freefall-${dev'}" nameValuePair "freefall-${dev'}" {
{ description = "Free-fall protection for ${dev}"; description = "Free-fall protection for ${dev}";
after = [ "${dev'}.device" ]; after = [ "${dev'}.device" ];
wantedBy = [ "${dev'}.device" ]; wantedBy = [ "${dev'}.device" ];
path = [ pkgs.freefall ]; path = [ pkgs.freefall ];
unitConfig = {
DefaultDependencies = false;
};
serviceConfig = { serviceConfig = {
ExecStart = "${pkgs.freefall}/bin/freefall ${dev}"; ExecStart = "${pkgs.freefall}/bin/freefall ${dev}";
Restart = "on-failure"; Restart = "on-failure";

View File

@ -0,0 +1,59 @@
{ config, lib, pkgs, ...}:
with lib;
let
cfg = config.services.gateone;
in
{
options = {
services.gateone = {
enable = mkEnableOption "GateOne server";
pidDir = mkOption {
default = "/run/gateone";
type = types.path;
description = ''Path of pid files for GateOne.'';
};
settingsDir = mkOption {
default = "/var/lib/gateone";
type = types.path;
description = ''Path of configuration files for GateOne.'';
};
};
};
config = mkIf cfg.enable {
environment.systemPackages = with pkgs.pythonPackages; [
gateone pkgs.openssh pkgs.procps pkgs.coreutils ];
users.extraUsers.gateone = {
description = "GateOne privilege separation user";
uid = config.ids.uids.gateone;
home = cfg.settingsDir;
};
users.extraGroups.gateone.gid = config.ids.gids.gateone;
systemd.services.gateone = with pkgs; {
description = "GateOne web-based terminal";
path = [ pythonPackages.gateone nix openssh procps coreutils ];
preStart = ''
if [ ! -d ${cfg.settingsDir} ] ; then
mkdir -m 0750 -p ${cfg.settingsDir}
mkdir -m 0750 -p ${cfg.pidDir}
chown -R gateone.gateone ${cfg.settingsDir}
chown -R gateone.gateone ${cfg.pidDir}
fi
'';
#unitConfig.RequiresMountsFor = "${cfg.settingsDir}";
serviceConfig = {
ExecStart = ''${pythonPackages.gateone}/bin/gateone --settings_dir=${cfg.settingsDir} --pid_file=${cfg.pidDir}/gateone.pid --gid=${toString config.ids.gids.gateone} --uid=${toString config.ids.uids.gateone}'';
User = "gateone";
Group = "gateone";
WorkingDirectory = cfg.settingsDir;
PermissionsStartOnly = true;
};
wantedBy = [ "multi-user.target" ];
requires = [ "network.target" ];
};
};
}

View File

@ -230,8 +230,8 @@ in
]; ];
}; };
systemd.services.cups-browsed = systemd.services.cups-browsed = mkIf config.services.avahi.enable
{ description = "Make remote CUPS printers available locally"; { description = "CUPS Remote Printer Discovery";
wantedBy = [ "multi-user.target" ]; wantedBy = [ "multi-user.target" ];
wants = [ "cups.service" "avahi-daemon.service" ]; wants = [ "cups.service" "avahi-daemon.service" ];

View File

@ -54,7 +54,7 @@ in
unitConfig.ConditionVirtualization = "oracle"; unitConfig.ConditionVirtualization = "oracle";
serviceConfig.ExecStart = "@${kernel.virtualboxGuestAdditions}/sbin/VBoxService VBoxService --foreground"; serviceConfig.ExecStart = "@${kernel.virtualboxGuestAdditions}/bin/VBoxService VBoxService --foreground";
}; };
services.xserver.videoDrivers = mkOverride 50 [ "virtualbox" ]; services.xserver.videoDrivers = mkOverride 50 [ "virtualbox" ];

View File

@ -2,7 +2,7 @@
import ./make-test.nix ({ pkgs, ... } : { import ./make-test.nix ({ pkgs, ... } : {
name = "avahi"; name = "avahi";
meta = with pkgs.stdenv.lib.maintainers; { meta = with pkgs.stdenv.lib.maintainers; {
maintainers = [ eelco chaoflow wizeman ]; maintainers = [ eelco chaoflow ];
}; };
nodes = { nodes = {

View File

@ -3,7 +3,7 @@
import ./make-test.nix ({pkgs, ... }: { import ./make-test.nix ({pkgs, ... }: {
name = "printing"; name = "printing";
meta = with pkgs.stdenv.lib.maintainers; { meta = with pkgs.stdenv.lib.maintainers; {
maintainers = [ iElectric eelco chaoflow jgeerds vcunat ]; maintainers = [ iElectric eelco chaoflow jgeerds ];
}; };
nodes = { nodes = {

View File

@ -16,6 +16,6 @@ import ./make-test.nix {
$master->waitForUnit("riak"); $master->waitForUnit("riak");
$master->sleep(20); # Hopefully this is long enough!! $master->sleep(20); # Hopefully this is long enough!!
$master->succeed("RIAK_DATA_DIR='/var/db/riak' RIAK_LOG_DIR='/var/log/riak' RIAK_ETC_DIR='/etc/riak' riak ping 2>&1"); $master->succeed("riak ping 2>&1");
''; '';
} }

View File

@ -8,7 +8,7 @@ import ./make-test.nix ({ pkgs, ... }: with pkgs.lib; let
#!${pkgs.stdenv.shell} -xe #!${pkgs.stdenv.shell} -xe
export PATH="${pkgs.coreutils}/bin:${pkgs.utillinux}/bin" export PATH="${pkgs.coreutils}/bin:${pkgs.utillinux}/bin"
${pkgs.linuxPackages.virtualboxGuestAdditions}/sbin/VBoxService ${pkgs.linuxPackages.virtualboxGuestAdditions}/bin/VBoxService
${(attrs.vmScript or (const "")) pkgs} ${(attrs.vmScript or (const "")) pkgs}
i=0 i=0
@ -39,7 +39,7 @@ import ./make-test.nix ({ pkgs, ... }: with pkgs.lib; let
]; ];
boot.initrd.extraUtilsCommands = '' boot.initrd.extraUtilsCommands = ''
copy_bin_and_libs "${pkgs.linuxPackages.virtualboxGuestAdditions}/sbin/mount.vboxsf" copy_bin_and_libs "${pkgs.linuxPackages.virtualboxGuestAdditions}/bin/mount.vboxsf"
copy_bin_and_libs "${pkgs.utillinux}/bin/unshare" copy_bin_and_libs "${pkgs.utillinux}/bin/unshare"
${(attrs.extraUtilsCommands or (const "")) pkgs} ${(attrs.extraUtilsCommands or (const "")) pkgs}
''; '';

View File

@ -2,9 +2,20 @@
, libpng, zlib, popt, boehmgc, libxml2, libxslt, glib, gtkmm , libpng, zlib, popt, boehmgc, libxml2, libxslt, glib, gtkmm
, glibmm, libsigcxx, lcms, boost, gettext, makeWrapper, intltool , glibmm, libsigcxx, lcms, boost, gettext, makeWrapper, intltool
, gsl, python, pyxml, lxml, poppler, imagemagick, libwpg, librevenge , gsl, python, pyxml, lxml, poppler, imagemagick, libwpg, librevenge
, libvisio, libcdr, libexif , libvisio, libcdr, libexif, unzip
, boxMakerPlugin ? false # boxmaker plugin
}: }:
let
boxmaker = fetchurl {
# http://www.inkscapeforum.com/viewtopic.php?f=11&t=10403
url = "http://www.keppel.demon.co.uk/111000/files/BoxMaker0.91.zip";
sha256 = "5c5697f43dc3a95468f61f479cb50b7e2b93379a1729abf19e4040ac9f43a1a8";
};
in
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
name = "inkscape-0.91"; name = "inkscape-0.91";
@ -34,12 +45,23 @@ stdenv.mkDerivation rec {
libxml2 libxslt glib gtkmm glibmm libsigcxx lcms boost gettext libxml2 libxslt glib gtkmm glibmm libsigcxx lcms boost gettext
makeWrapper intltool gsl poppler imagemagick libwpg librevenge makeWrapper intltool gsl poppler imagemagick libwpg librevenge
libvisio libcdr libexif libvisio libcdr libexif
]; ] ++ stdenv.lib.optional boxMakerPlugin unzip;
enableParallelBuilding = true; enableParallelBuilding = true;
doCheck = true; doCheck = true;
postInstall = '' postInstall = ''
${if boxMakerPlugin then "
mkdir -p $out/share/inkscape/extensions/
# boxmaker packaged version 0.91 in a directory called 0.85 ?!??
unzip ${boxmaker};
cp boxmake-upd-0.85/* $out/share/inkscape/extensions/
rm -Rf boxmake-upd-0.85
"
else
""
}
# Make sure PyXML modules can be found at run-time. # Make sure PyXML modules can be found at run-time.
for i in "$out/bin/"* for i in "$out/bin/"*
do do

View File

@ -5,11 +5,12 @@
}: }:
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
name = "calibre-2.31.0"; name = "calibre-2.33.0";
version = "2.33.0";
src = fetchurl { src = fetchurl {
url = "mirror://sourceforge/calibre/${name}.tar.xz"; url = "https://github.com/kovidgoyal/calibre/releases/download/v${version}/${name}.tar.xz";
sha256 = "1414c324alvgwbiszalklck1kay41yca2wnm488imr2768fihzkz"; sha256 = "0j1micmjffi6rsn3ayblnz0wq648v05ckbn1qsiz086iaj2285q9";
}; };
inherit python; inherit python;

View File

@ -1,19 +1,20 @@
{ stdenv, makeWrapper, fetchgit, pkgconfig, ninja, ocaml, findlib, mupdf, lablgl { stdenv, makeWrapper, fetchgit, pkgconfig, ninja, ocaml, findlib, mupdf, lablgl
, gtk3, openjpeg, jbig2dec, mujs, xsel }: , gtk3, openjpeg, jbig2dec, mujs, xsel, openssl }:
let ocamlVersion = (builtins.parseDrvName (ocaml.name)).version; let ocamlVersion = (builtins.parseDrvName (ocaml.name)).version;
in stdenv.mkDerivation rec { in stdenv.mkDerivation rec {
name = "llpp-${version}"; name = "llpp-${version}";
version = "21-git-2015-06-27"; version = "21-git-2015-07-30";
src = fetchgit { src = fetchgit {
url = "git://repo.or.cz/llpp.git"; url = "git://repo.or.cz/llpp.git";
rev = "843c42ef41bb78a3b1ee995fc2bab91f8796e8ad"; rev = "e9fe06d684b145a104cc319673076e069e853cac";
sha256 = "0h8wa7f5bj5sm3sr8namcyy81s4s80hyasimyfw935lqyw2q2k60"; sha256 = "0x3hgn6sfjln2sqdw40ylcj943rn732a6mlfwz01llx8ykiyvsvq";
fetchSubmodules = false;
}; };
buildInputs = [ pkgconfig ninja makeWrapper ocaml findlib mupdf lablgl buildInputs = [ pkgconfig ninja makeWrapper ocaml findlib mupdf lablgl
gtk3 jbig2dec openjpeg mujs ]; gtk3 jbig2dec openjpeg mujs openssl ];
configurePhase = '' configurePhase = ''
sh configure.sh -O -F ${mupdf} sh configure.sh -O -F ${mupdf}

View File

@ -53,7 +53,7 @@ let
wvDescription = "Playback of encrypted HTML audio/video content"; wvDescription = "Playback of encrypted HTML audio/video content";
wvMimeTypes = "application/x-ppapi-widevine-cdm"; wvMimeTypes = "application/x-ppapi-widevine-cdm";
wvModule = "$widevine/lib/libwidevinecdmadapter.so"; wvModule = "$widevine/lib/libwidevinecdmadapter.so";
wvInfo = "#${wvName}#${wvDescription}:${wvMimeTypes}"; wvInfo = "#${wvName}#${wvDescription};${wvMimeTypes}";
in '' in ''
flashVersion="$( flashVersion="$(
sed -n -r 's/.*"version": "([^"]+)",.*/\1/p' PepperFlash/manifest.json sed -n -r 's/.*"version": "([^"]+)",.*/\1/p' PepperFlash/manifest.json

View File

@ -30,5 +30,9 @@ stdenv.mkDerivation {
platforms = platforms.mesaPlatforms; platforms = platforms.mesaPlatforms;
maintainers = with maintainers; [ pSub ]; maintainers = with maintainers; [ pSub ];
license = licenses.gpl3; license = licenses.gpl3;
# dwb is no longer maintained by portix and efforts to keep it alive
# were not successful, see issue #7952 for discussion.
broken = true;
}; };
} }

View File

@ -9,14 +9,14 @@ let
soext = if stdenv.system == "x86_64-darwin" then "dylib" else "so"; soext = if stdenv.system == "x86_64-darwin" then "dylib" else "so";
in stdenv.mkDerivation rec { in stdenv.mkDerivation rec {
version = "0.22.1"; version = "0.23.0";
name = "mesos-${version}"; name = "mesos-${version}";
dontDisableStatic = true; dontDisableStatic = true;
src = fetchurl { src = fetchurl {
url = "http://www.apache.org/dist/mesos/${version}/mesos-${version}.tar.gz"; url = "http://www.apache.org/dist/mesos/${version}/mesos-${version}.tar.gz";
sha256 = "0ry0ppzgpab68fz5bzd7ry5rjbg8xjz73x1x4c5id42cpsqnn7x5"; sha256 = "1v5xpn4wal4vcrvcklchx9slkpa8xlwqkdbnxzy9zkzpq5g3arxr";
}; };
buildInputs = [ buildInputs = [
@ -93,13 +93,15 @@ in stdenv.mkDerivation rec {
echo "export MESOS_NATIVE_LIBRARY=$MESOS_NATIVE_JAVA_LIBRARY" >> $out/nix-support/setup-hook echo "export MESOS_NATIVE_LIBRARY=$MESOS_NATIVE_JAVA_LIBRARY" >> $out/nix-support/setup-hook
# Inspired by: pkgs/development/python-modules/generic/default.nix # Inspired by: pkgs/development/python-modules/generic/default.nix
pushd src/python
mkdir -p $out/lib/${python.libPrefix}/site-packages mkdir -p $out/lib/${python.libPrefix}/site-packages
export PYTHONPATH="$out/lib/${python.libPrefix}/site-packages:$PYTHONPATH" export PYTHONPATH="$out/lib/${python.libPrefix}/site-packages:$PYTHONPATH"
${python}/bin/${python.executable} src/python/setup.py install \ ${python}/bin/${python.executable} setup.py install \
--install-lib=$out/lib/${python.libPrefix}/site-packages \ --install-lib=$out/lib/${python.libPrefix}/site-packages \
--old-and-unmanageable \ --old-and-unmanageable \
--prefix="$out" --prefix="$out"
rm -f "$out/lib/${python.libPrefix}"/site-packages/site.py* rm -f "$out/lib/${python.libPrefix}"/site-packages/site.py*
popd
''; '';
postFixup = '' postFixup = ''

View File

@ -1,28 +1,26 @@
{ stdenv, fetchgit, libconfig, lua5_2, openssl, readline, zlib { stdenv, fetchgit, libconfig, lua5_2, openssl, readline, zlib
, libevent, pkgconfig, python, jansson, bash
}: }:
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
name = "telegram-cli-2014-03-04"; name = "telegram-cli-2015-07-30";
src = fetchgit { src = fetchgit {
url = "https://github.com/vysheng/tg.git"; url = "https://github.com/vysheng/tg.git";
rev = "ac6079a00ac66bb37a3179a82af130b41ec39bc9"; sha256 = "0phn9nl0sf2fylzfwi427xq60cfrnpsvhh8bp55y1wcjkmp0fxsn";
sha256 = "1rpwnyzmqk7p97n5pd00m5c6rypc39mb3hs94qxxrdcpwpgcb73q"; rev = "2052f4b381337d75e783facdbfad56b04dec1a9c";
}; };
buildInputs = [ libconfig lua5_2 openssl readline zlib ]; buildInputs = [ libconfig lua5_2 openssl readline zlib libevent pkgconfig python jansson ];
NIX_CFLAGS_COMPILE = "-Wno-error=deprecated-declarations"; # CPPFunction
installPhase = '' installPhase = ''
mkdir -p $out/bin mkdir -p $out/bin
cp ./telegram $out/bin/telegram-wo-key cp ./bin/telegram-cli $out/bin/telegram-wo-key
cp ./tg.pub $out/ cp ./tg-server.pub $out/
cat > $out/bin/telegram <<EOF cat > $out/bin/telegram-cli <<EOF
#!/usr/bin/env bash #!${bash}/bin/sh
$out/bin/telegram-wo-key -k $out/tg.pub $out/bin/telegram-wo-key -k $out/tg-server.pub
EOF EOF
chmod +x $out/bin/telegram chmod +x $out/bin/telegram-cli
''; '';
meta = { meta = {
@ -30,5 +28,6 @@ stdenv.mkDerivation rec {
homepage = https://telegram.org/; homepage = https://telegram.org/;
license = stdenv.lib.licenses.gpl2; license = stdenv.lib.licenses.gpl2;
platforms = stdenv.lib.platforms.linux; platforms = stdenv.lib.platforms.linux;
maintainers = stdenv.lib.maintainers.jagajaga;
}; };
} }

View File

@ -134,7 +134,7 @@ stdenv.mkDerivation {
[Desktop Entry] [Desktop Entry]
Type=Application Type=Application
Exec=$out/bin/thunderbird Exec=$out/bin/thunderbird
Icon=$out/lib/thunderbird-bin-${version}/chrome/icons/default/default256.png Icon=$out/usr/lib/thunderbird-bin-${version}/chrome/icons/default/default256.png
Name=Thunderbird Name=Thunderbird
GenericName=Mail Reader GenericName=Mail Reader
Categories=Application;Network; Categories=Application;Network;

View File

@ -1,13 +1,15 @@
{ stdenv, fetchurl, makeWrapper, go, lxc, sqlite, iproute, bridge-utils, devicemapper, { stdenv, fetchFromGitHub, makeWrapper, go, lxc, sqlite, iproute, bridge-utils, devicemapper,
btrfsProgs, iptables, bash, e2fsprogs, xz}: btrfsProgs, iptables, bash, e2fsprogs, xz}:
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
name = "docker-${version}"; name = "docker-${version}";
version = "1.6.0"; version = "1.7.1";
src = fetchurl { src = fetchFromGitHub {
url = "https://github.com/dotcloud/docker/archive/v${version}.tar.gz"; owner = "docker";
sha256 = "03nzhikxp60falshzyk6ip8g9fhrczhvnvgmzqr8bny6w8x1v84b"; repo = "docker";
rev = "v${version}";
sha256 = "0r0j8aj1a7lbnc9piznp02h5n2gdw3v3n4q2ipmapi9ax0wj82lz";
}; };
buildInputs = [ makeWrapper go sqlite lxc iproute bridge-utils devicemapper btrfsProgs iptables e2fsprogs ]; buildInputs = [ makeWrapper go sqlite lxc iproute bridge-utils devicemapper btrfsProgs iptables e2fsprogs ];
@ -17,7 +19,7 @@ stdenv.mkDerivation rec {
buildPhase = '' buildPhase = ''
patchShebangs . patchShebangs .
export AUTO_GOPATH=1 export AUTO_GOPATH=1
export DOCKER_GITCOMMIT="03nzhikx" export DOCKER_GITCOMMIT="786b29d4"
./hack/make.sh dynbinary ./hack/make.sh dynbinary
''; '';
@ -35,7 +37,7 @@ stdenv.mkDerivation rec {
''; '';
meta = with stdenv.lib; { meta = with stdenv.lib; {
homepage = http://www.docker.io/; homepage = http://www.docker.com/;
description = "An open source project to pack, ship and run any application as a lightweight container"; description = "An open source project to pack, ship and run any application as a lightweight container";
license = licenses.asl20; license = licenses.asl20;
maintainers = with maintainers; [ offline tailhook ]; maintainers = with maintainers; [ offline tailhook ];

View File

@ -87,9 +87,8 @@ stdenv.mkDerivation {
sed -i -e "s|/usr/bin|$out/bin|" bin/VBoxClient-all sed -i -e "s|/usr/bin|$out/bin|" bin/VBoxClient-all
# Install binaries # Install binaries
mkdir -p $out/sbin install -D -m 4755 lib/VBoxGuestAdditions/mount.vboxsf $out/bin/mount.vboxsf
install -m 4755 lib/VBoxGuestAdditions/mount.vboxsf $out/sbin/mount.vboxsf install -D -m 755 sbin/VBoxService $out/bin/VBoxService
install -m 755 sbin/VBoxService $out/sbin
mkdir -p $out/bin mkdir -p $out/bin
install -m 755 bin/VBoxClient $out/bin install -m 755 bin/VBoxClient $out/bin

View File

@ -33,7 +33,7 @@ let
grKernel = if cfg.stable grKernel = if cfg.stable
then mkKernel pkgs.linux_3_14 stable-patch then mkKernel pkgs.linux_3_14 stable-patch
else mkKernel pkgs.linux_4_0 test-patch; else mkKernel pkgs.linux_4_1 test-patch;
## -- grsecurity configuration --------------------------------------------- ## -- grsecurity configuration ---------------------------------------------

View File

@ -1,4 +1,4 @@
{ fetchurl, stdenv, nss, openssl, pkgconfig }: { fetchurl, stdenv, nss, nspr, pkgconfig }:
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
@ -9,7 +9,9 @@ stdenv.mkDerivation rec {
sha256 = "07w1aq8y8wld43wmbk2q8134p3bfkp2vma78mmsfgw2jn1bh3xhd"; sha256 = "07w1aq8y8wld43wmbk2q8134p3bfkp2vma78mmsfgw2jn1bh3xhd";
}; };
buildInputs = [ nss openssl ]; buildInputs = [ pkgconfig nss nspr ];
configureFlags = [ "--enable-nss" ];
meta = with stdenv.lib; { meta = with stdenv.lib; {
platforms = platforms.linux; platforms = platforms.linux;

View File

@ -42,6 +42,11 @@ stdenv.mkDerivation {
EOF EOF
chmod +x $out/bin/g++ chmod +x $out/bin/g++
fi fi
for executable in $(ls ${gcc.cc}/bin); do
if [ ! -x "$out/bin/$executable" ]; then
ln -s ${gcc.cc}/bin/$executable $out/bin/$executable
fi
done
''); '');
}; };

View File

@ -6,18 +6,20 @@
let let
version = "3.15.7"; # Version 3.15.7 breaks certain (but not all) PCL-based printers:
# https://github.com/NixOS/nixpkgs/commit/b0e46fc3ead209ef24ed6214bd41ef6e604af54f
version = "3.15.6";
name = "hplip-${version}"; name = "hplip-${version}";
src = fetchurl { src = fetchurl {
url = "mirror://sourceforge/hplip/${name}.tar.gz"; url = "mirror://sourceforge/hplip/${name}.tar.gz";
sha256 = "17flpl89lgwlbsy9mka910g530nnvlwqqnif8a9hyq7k90q9046k"; sha256 = "1jbnjw7vrn1qawrjfdv8j58w69q8ki1qkzvlh0nk8nxacpp17i9h";
}; };
plugin = fetchurl { plugin = fetchurl {
url = "http://www.openprinting.org/download/printdriver/auxfiles/HP/plugins/${name}-plugin.run"; url = "http://www.openprinting.org/download/printdriver/auxfiles/HP/plugins/${name}-plugin.run";
sha256 = "0fblh5m43jnws4vkwks0b4m9k3jg9kspaj1l8bic0r5swy97s41m"; sha256 = "1rymxahz12s1s37rri5qyvka6q0yi0yai08kgspg24176ry3a3fx";
}; };
hplip_state = hplip_state =
@ -75,23 +77,25 @@ stdenv.mkDerivation {
{} + {} +
''; '';
configureFlags = '' preConfigure = ''
--with-cupsfilterdir=$(out)/lib/cups/filter export configureFlags="$configureFlags
--with-cupsbackenddir=$(out)/lib/cups/backend --with-cupsfilterdir=$out/lib/cups/filter
--with-icondir=$(out)/share/applications --with-cupsbackenddir=$out/lib/cups/backend
--with-systraydir=$(out)/xdg/autostart --with-icondir=$out/share/applications
--with-mimedir=$(out)/etc/cups --with-systraydir=$out/xdg/autostart
--with-mimedir=$out/etc/cups
--enable-policykit --enable-policykit
''; "
makeFlags = '' export makeFlags="
halpredir=$(out)/share/hal/fdi/preprobe/10osvendor halpredir=$out/share/hal/fdi/preprobe/10osvendor
rulesdir=$(out)/etc/udev/rules.d rulesdir=$out/etc/udev/rules.d
policykit_dir=$(out)/share/polkit-1/actions policykit_dir=$out/share/polkit-1/actions
policykit_dbus_etcdir=$(out)/etc/dbus-1/system.d policykit_dbus_etcdir=$out/etc/dbus-1/system.d
policykit_dbus_sharedir=$(out)/share/dbus-1/system-services policykit_dbus_sharedir=$out/share/dbus-1/system-services
hplip_confdir=$(out)/etc/hp hplip_confdir=$out/etc/hp
hplip_statedir=$(out)/var/lib/hp hplip_statedir=$out/var/lib/hp
"
''; '';
enableParallelBuilding = true; enableParallelBuilding = true;
@ -175,6 +179,6 @@ stdenv.mkDerivation {
then licenses.unfree then licenses.unfree
else with licenses; [ mit bsd2 gpl2Plus ]; else with licenses; [ mit bsd2 gpl2Plus ];
platforms = [ "i686-linux" "x86_64-linux" "armv6l-linux" "armv7l-linux" ]; platforms = [ "i686-linux" "x86_64-linux" "armv6l-linux" "armv7l-linux" ];
maintainers = with maintainers; [ ttuegel jgeerds nckx ]; maintainers = with maintainers; [ jgeerds nckx ];
}; };
} }

View File

@ -0,0 +1,24 @@
{ stdenv, fetchgit, autoreconfHook, pkgconfig, openssl, attr, keyutils, asciidoc, libxslt, docbook_xsl }:
stdenv.mkDerivation rec {
name = "ima-evm-utils-${version}";
version = "1.0.0";
src = fetchgit {
url = "git://git.code.sf.net/p/linux-ima/ima-evm-utils";
rev = "4b56112c095cb5cc34dc35abac37ebfc6eadba65";
sha256 = "6f1ef4e84b9214448ea4a530a562a20ad1ba5a7cfefd7ddda90a56e2404f3a87";
};
buildInputs = [ autoreconfHook pkgconfig openssl attr keyutils asciidoc libxslt ];
buildPhase = "make prefix=$out MANPAGE_DOCBOOK_XSL=${docbook_xsl}/xml/xsl/docbook/manpages/docbook.xsl";
meta = {
description = "evmctl utility to manage digital signatures of the Linux kernel integrity subsystem (IMA/EVM)";
homepage = "http://sourceforge.net/projects/linux-ima/";
license = stdenv.lib.licenses.gpl2;
platforms = stdenv.lib.platforms.linux;
maintainers = with stdenv.lib.maintainers; [ tstrobel ];
};
}

View File

@ -1,13 +1,13 @@
{ stdenv, fetchurl, ... } @ args: { stdenv, fetchurl, ... } @ args:
import ./generic.nix (args // rec { import ./generic.nix (args // rec {
version = "3.14.48"; version = "3.14.49";
# Remember to update grsecurity! # Remember to update grsecurity!
extraMeta.branch = "3.14"; extraMeta.branch = "3.14";
src = fetchurl { src = fetchurl {
url = "mirror://kernel/linux/kernel/v3.x/linux-${version}.tar.xz"; url = "mirror://kernel/linux/kernel/v3.x/linux-${version}.tar.xz";
sha256 = "098a7kjfw4jf0f7h6z57f2719jfz3y3jjlcd8y6d95xvhy7xxyw9"; sha256 = "1x9p6z195c0nv7hsjcwzmr89yag35v3pyrs0081k2d8dykbl70zs";
}; };
features.iwlwifi = true; features.iwlwifi = true;

View File

@ -1,13 +1,12 @@
{ stdenv, fetchurl, ... } @ args: { stdenv, fetchurl, ... } @ args:
import ./generic.nix (args // rec { import ./generic.nix (args // rec {
version = "4.0.8"; version = "4.0.9";
# Remember to update grsecurity!
extraMeta.branch = "4.0"; extraMeta.branch = "4.0";
src = fetchurl { src = fetchurl {
url = "mirror://kernel/linux/kernel/v4.x/linux-${version}.tar.xz"; url = "mirror://kernel/linux/kernel/v4.x/linux-${version}.tar.xz";
sha256 = "1cggqi5kdan818xw5g5wmapcsf501f5m9bympsy6a2cpphknfdmn"; sha256 = "0k42blafzd954fncc0b78vi9x1h2k0jhfvkjqxmpv64i7xwwdhsx";
}; };
features.iwlwifi = true; features.iwlwifi = true;

View File

@ -2,6 +2,7 @@
import ./generic.nix (args // rec { import ./generic.nix (args // rec {
version = "4.1.4"; version = "4.1.4";
# Remember to update grsecurity!
extraMeta.branch = "4.1"; extraMeta.branch = "4.1";
src = fetchurl { src = fetchurl {

View File

@ -65,17 +65,17 @@ rec {
}; };
grsecurity_stable = grsecPatch grsecurity_stable = grsecPatch
{ kversion = "3.14.48"; { kversion = "3.14.49";
revision = "201507111210"; revision = "201508032312";
branch = "stable"; branch = "stable";
sha256 = "0phmqlkx6vqlv79ppf6g4wsx7rwsvwpakpkm9xsq8qazffk7s9qk"; sha256 = "09x0rb4pgmghcp6sdz57lwhawlb3bzrc3rg372xknhv6993ainjc";
}; };
grsecurity_unstable = grsecPatch grsecurity_unstable = grsecPatch
{ kversion = "4.0.8"; { kversion = "4.1.4";
revision = "201507111211"; revision = "201508032312";
branch = "test"; branch = "test";
sha256 = "1p9ym8hbwaan9pgxgn8k4rm3n33wl8ag1fzmyr5f4mxs634wgwgx"; sha256 = "16p1wq98qgwksav0ry6b5jyyi26s404v1k0cwpj7l7n86hxig67i";
}; };
grsec_fix_path = grsec_fix_path =

View File

@ -36,11 +36,11 @@ stdenv.mkDerivation rec {
postPatch = '' postPatch = ''
sed -i deps/node_package/priv/base/env.sh \ sed -i deps/node_package/priv/base/env.sh \
-e 's@{{platform_data_dir}}@$RIAK_DATA_DIR@' \ -e 's@{{platform_data_dir}}@''${RIAK_DATA_DIR:-/var/db/riak}@' \
-e 's@^RUNNER_SCRIPT_DIR=.*@RUNNER_SCRIPT_DIR='$out'/bin@' \ -e 's@^RUNNER_SCRIPT_DIR=.*@RUNNER_SCRIPT_DIR='$out'/bin@' \
-e 's@^RUNNER_BASE_DIR=.*@RUNNER_BASE_DIR='$out'@' \ -e 's@^RUNNER_BASE_DIR=.*@RUNNER_BASE_DIR='$out'@' \
-e 's@^RUNNER_ETC_DIR=.*@RUNNER_ETC_DIR=$RIAK_ETC_DIR@' \ -e 's@^RUNNER_ETC_DIR=.*@RUNNER_ETC_DIR=''${RIAK_ETC_DIR:-/etc/riak}@' \
-e 's@^RUNNER_LOG_DIR=.*@RUNNER_LOG_DIR=$RIAK_LOG_DIR@' -e 's@^RUNNER_LOG_DIR=.*@RUNNER_LOG_DIR=''${RIAK_LOG_DIR:-/var/log}@'
''; '';
preBuild = '' preBuild = ''

View File

@ -19,7 +19,7 @@ stdenv.mkDerivation rec {
meta = with stdenv.lib; { meta = with stdenv.lib; {
homepage = "http://limitcpu.sourceforge.net/"; homepage = "http://limitcpu.sourceforge.net/";
description = "A tool to throttle the CPU usage of programs"; description = "A tool to throttle the CPU usage of programs";
platforms = with platforms; linux ++ freebsd ++ darwin; platforms = with platforms; linux ++ freebsd;
license = licenses.gpl2; license = licenses.gpl2;
maintainer = [maintainers.rycee]; maintainer = [maintainers.rycee];
}; };

View File

@ -1,11 +1,11 @@
{ stdenv, fetchurl, ocaml }: { stdenv, fetchurl, ocaml }:
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
name = "hevea-2.23"; name = "hevea-2.25";
src = fetchurl { src = fetchurl {
url = "http://pauillac.inria.fr/~maranget/hevea/distri/${name}.tar.gz"; url = "http://pauillac.inria.fr/~maranget/hevea/distri/${name}.tar.gz";
sha256 = "1f9pj48518ixhjxbviv2zx27v4anp92zgg3x704g1s5cki2w33nv"; sha256 = "0kn99v92xsfy12r9gfvwgs0xf3s9s6frfg86a8q6damj1dampiz4";
}; };
buildInputs = [ ocaml ]; buildInputs = [ ocaml ];

View File

@ -9589,6 +9589,8 @@ let
ifplugd = callPackage ../os-specific/linux/ifplugd { }; ifplugd = callPackage ../os-specific/linux/ifplugd { };
ima-evm-utils = callPackage ../os-specific/linux/ima-evm-utils { };
iomelt = callPackage ../os-specific/linux/iomelt { }; iomelt = callPackage ../os-specific/linux/iomelt { };
iotop = callPackage ../os-specific/linux/iotop { }; iotop = callPackage ../os-specific/linux/iotop { };
@ -11002,7 +11004,7 @@ let
}; };
docker = callPackage ../applications/virtualization/docker { docker = callPackage ../applications/virtualization/docker {
go = go_1_3; go = go_1_4;
}; };
doodle = callPackage ../applications/search/doodle { }; doodle = callPackage ../applications/search/doodle { };

View File

@ -102,11 +102,11 @@ let self = with self; {
composer = pkgs.stdenv.mkDerivation rec { composer = pkgs.stdenv.mkDerivation rec {
name = "composer-${version}"; name = "composer-${version}";
version = "1.0.0-alpha9"; version = "1.0.0-alpha10";
src = pkgs.fetchurl { src = pkgs.fetchurl {
url = "https://getcomposer.org/download/1.0.0-alpha9/composer.phar"; url = "https://getcomposer.org/download/${version}/composer.phar";
sha256 = "1x7i9xs9xggq0qq4kzrwh2pky8skax0l829zwwsy3hcvch3irvrk"; sha256 = "0a26zlsr2jffcqlz8z6l8s6c6nlyfj2gxqfgx76knx5wch1psb4z";
}; };
phases = [ "installPhase" ]; phases = [ "installPhase" ];
@ -123,7 +123,7 @@ let self = with self; {
description = "Dependency Manager for PHP"; description = "Dependency Manager for PHP";
license = licenses.mit; license = licenses.mit;
homepage = https://getcomposer.org/; homepage = https://getcomposer.org/;
maintainers = with maintainers; [offline]; maintainers = with maintainers; [ globin offline ];
}; };
}; };
}; in self }; in self

View File

@ -3432,6 +3432,24 @@ let
}; };
}; };
gateone = buildPythonPackage rec {
name = "gateone-1.2-0d57c3";
disabled = ! isPy27;
src = pkgs.fetchFromGitHub {
rev = "11ed97c663b3e8c1b8eba473b5cf8362b10d57c3";
owner= "liftoff";
repo = "GateOne";
sha256 ="0zp9vfs6sqbx4d0g45kkjinfmsl9zqwa6bhp3xd81wx3ph9yr1hq";
};
propagatedBuildInputs = with pkgs.pythonPackages; [tornado futures html5lib readline pkgs.openssl];
meta = {
homepage = https://liftoffsoftware.com/;
description = "GateOne is a web-based terminal emulator and SSH client";
maintainers = with maintainers; [ tomberek ];
};
};
gcutil = buildPythonPackage rec { gcutil = buildPythonPackage rec {
name = "gcutil-1.16.1"; name = "gcutil-1.16.1";
meta.maintainers = with maintainers; [ phreedom ]; meta.maintainers = with maintainers; [ phreedom ];
@ -5541,6 +5559,7 @@ let
pyfribidi = buildPythonPackage rec { pyfribidi = buildPythonPackage rec {
version = "0.11.0"; version = "0.11.0";
name = "pyfribidi-${version}"; name = "pyfribidi-${version}";
disabled = isPy3k;
src = pkgs.fetchurl { src = pkgs.fetchurl {
url = "https://pypi.python.org/packages/source/p/pyfribidi/${name}.zip"; url = "https://pypi.python.org/packages/source/p/pyfribidi/${name}.zip";
@ -12297,14 +12316,14 @@ let
}; };
sigal = buildPythonPackage rec { sigal = buildPythonPackage rec {
name = "sigal-0.7.0"; name = "sigal-0.9.2";
src = pkgs.fetchurl { src = pkgs.fetchurl {
url = "http://pypi.python.org/packages/source/s/sigal/${name}.tar.gz"; url = "http://pypi.python.org/packages/source/s/sigal/${name}.tar.gz";
md5 = "d2386706ac8543378aebde1ea4edeba4"; sha256 = "0mk3bzaxn9snx9lc0pj9zvgdgdyhkza6b8z5x91772mlv84sfw6c";
}; };
propagatedBuildInputs = with self; [ jinja2 markdown pillow pilkit clint argh pytest ]; propagatedBuildInputs = with self; [ jinja2 markdown pillow pilkit clint click pytest blinker ];
meta = { meta = {
description = "Yet another simple static gallery generator"; description = "Yet another simple static gallery generator";